CN109152077A - A kind of method avoiding service conflict and relevant device - Google Patents

A kind of method avoiding service conflict and relevant device Download PDF

Info

Publication number
CN109152077A
CN109152077A CN201710503966.0A CN201710503966A CN109152077A CN 109152077 A CN109152077 A CN 109152077A CN 201710503966 A CN201710503966 A CN 201710503966A CN 109152077 A CN109152077 A CN 109152077A
Authority
CN
China
Prior art keywords
terminal
business
frequency resource
running time
notification message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710503966.0A
Other languages
Chinese (zh)
Inventor
乔梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201710503966.0A priority Critical patent/CN109152077A/en
Publication of CN109152077A publication Critical patent/CN109152077A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/121Wireless traffic scheduling for groups of terminals or users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • H04W72/566Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
    • H04W72/569Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient of the traffic information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of method for avoiding service conflict and relevant devices, and wherein method includes: the transmission that base station carries out first kind business on unauthorized channel;If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, base station judges to execute the terminal of the first kind business and executes whether the terminal of the second class business is same terminal;The base station sends corresponding notification message to the terminal for executing the second class business according to judging result;The base station receives the second class business datum on the specified running time-frequency resource or sends the second class business datum, can be to avoid different types of service conflict on unauthorized channel.

Description

A kind of method avoiding service conflict and relevant device
Technical field
The present invention relates to field of communication technology more particularly to a kind of method for avoiding service conflict and relevant devices.
Background technique
With the continuous development of the communication technology, the 5th third-generation mobile communication technology (New Radio, NR) is carrying out nervous Standardisation process.
Currently, the bandwidth that NR technology is supported also includes unauthorized channel (5GHZ-6GHZ), these unauthorized channels are main It is Wireless Fidelity (Wireless Fidelity, WiFi), bluetooth, radar, the systems such as medical treatment are using.In the movement of prior-generation When the communication technology (Long Term Evolution, LTE) is using unauthorized channel, one of key point is to ensure that can be in justice With the existing coexistence of systems using unauthorized channel on the basis of close friend, in order to ensure coexisting, LTE can pass through Channel Detection Mechanism (such as channel clearance access (Channel Clear Access, CCA) etc.) on unauthorized channel come to detecting, such as Fruit detects that the unauthorized channel is unavailable, then cannot occupy the unauthorized channel, if detecting that the unauthorized channel is available, The unauthorized channel could be occupied.
However, how to avoid the first kind business (such as mobile broadband internet (eMBB business) etc.) in NR technology and Service conflict of the two class business (such as low time delay is highly reliable (URLLC business)) in unauthorized channel is also in fierceness In discussion.
Summary of the invention
The embodiment of the present invention provide it is a kind of service conflict method and relevant device are avoided on unauthorized channel, can be to avoid The different types of service conflict problem on unauthorized channel.
In a first aspect, the embodiment of the invention provides one kind to avoid service conflict method, this method comprises:
Base station carries out the transmission of first kind business on unauthorized channel;
If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, base station judgement executes institute It states the terminal of first kind business and executes whether the terminal of the second class business is same terminal;
The base station sends corresponding notification message to the terminal for executing the second class business according to judging result, In, the notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;It is described Specified running time-frequency resource at least occupies the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The base station receives the second class business datum on the specified running time-frequency resource or sends the second class industry Business data.
Second aspect, the embodiment of the invention also provides one kind to avoid service conflict method, this method comprises:
Terminal receives the notification message that base station is sent;The notification message includes at least the second class that the terminal need to execute In the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies scheduled in the unauthorized channel business First kind business running time-frequency resource in portion of time frequency resources;
The terminal receives the second class business datum or hair on the specified running time-frequency resource that the notification message indicates Send the second class business datum
The third aspect, the embodiment of the invention provides a kind of base station, which includes:
Transmission unit, for carrying out the transmission of first kind business on unauthorized channel;
Judging unit, for if desired transmitting the second class business on the running time-frequency resource that the first kind business is scheduled, Judge to execute the terminal of the first kind business and executes whether the terminal of the second class business is same terminal;
Transmission unit, for sending corresponding notification message to the end for executing the second class business according to judging result End, wherein the notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel; The specified running time-frequency resource at least occupies the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The transmission unit is also used to receive the second class business datum on the specified running time-frequency resource or sends institute State the second class business datum.
Fourth aspect, the embodiment of the invention provides a kind of terminal, which includes:
Receiving unit, for receiving the notification message of base station transmission;The notification message includes at least the terminal and need to hold For the second capable class business in the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies the unauthorized letter Portion of time frequency resources in the running time-frequency resource for the first kind business being scheduled in road;
Transmission unit, for receiving the second class business datum on the specified running time-frequency resource that the notification message indicates Or send the second class business datum.
5th aspect, the embodiment of the invention provides another base station, including processor, input equipment, output equipment and Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing branch The application code that terminal executes the above method is held, the processor is configured for the method for executing above-mentioned first aspect.
6th aspect, the embodiment of the invention provides another terminal, including processor, input equipment, communication interface and Memory, the processor, input equipment, communication interface and memory are connected with each other, wherein the memory is for storing branch The application code that terminal executes the above method is held, the processor is configured for the method for executing above-mentioned second aspect.
7th aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer storage medium It is stored with computer program, the computer program includes program instruction, and described program instruction makes institute when being executed by a processor State the method that processor executes above-mentioned first aspect.
Eighth aspect, the embodiment of the invention provides another computer readable storage medium, the computer storage is situated between Matter is stored with computer program, and the computer program includes program instruction, and described program instruction makes when being executed by a processor The method that the processor executes above-mentioned second aspect.
The embodiment of the present invention passes through base station in unauthorized transmission first kind business, if necessary in the unauthorized letter Road transmits the second class business, then the base station executes the terminal of the first kind business by judgement and executes the second class business Terminal whether be same terminal to determine and send corresponding notification message, can allow execute the terminal of the second class business according to Corresponding notification message completes the transmission of the second class business, so that two types effectively be avoided to rush in the business of unauthorized channel It is prominent.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is provided in an embodiment of the present invention a kind of for avoiding the architecture diagram of service conflict;
Fig. 2 is a kind of schematic flow diagram of method for avoiding service conflict provided in an embodiment of the present invention;
Fig. 3 is the schematic flow diagram for the method that another kind provided in an embodiment of the present invention avoids service conflict;
Fig. 4 be another embodiment of the present invention provides a kind of method for avoiding service conflict schematic flow diagram;
Fig. 5 be another embodiment of the present invention provides another kind avoid service conflict method schematic flow diagram;
Fig. 6 is a kind of schematic block diagram of base station provided in an embodiment of the present invention;
Fig. 7 is another base station schematic block diagram provided in an embodiment of the present invention;
Fig. 8 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 9 be another embodiment of the present invention provides another terminal schematic block diagram;
Figure 10 be another embodiment of the present invention provides a kind of base station schematic block diagram;
Figure 11 be another embodiment of the present invention provides a kind of terminal schematic block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet computer of (for example, touch-screen display and/or touch tablet) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but there is touching Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch tablet).
In following discussion, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal may include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one of the following or multiple: drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be executed at the terminal can be used such as touch sensitive surface at least one is public Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.In this way, the public physical structure of terminal is (for example, touch Sensing surface) it can support the various application programs with user interface intuitive and transparent for a user.
Currently, terminal can use authorization auxiliary mechanism (Lisensed Assisted Access, LAA) function, it is based on The framework of carrier wave polymerization, by authorization channel as main plot, unauthorized channel carrys out the business of transmission terminal as secondary cell.In order to Guarantee and other coexist in the system (such as WiFi, bluetooth etc.) of unauthorized multi-channel operation, terminal is using Channel Detection machine (such as clear channel assessment (CCA) (Channel Clear Assessment, CCA) etc.) this technology of system.
By taking Channel Detection mechanism is CCA detection as an example.When terminal utilizes LAA function, before using unauthorized channel It requires to carry out Channel Detection mechanism to confirm whether the unauthorized channel can be used.Wherein, if terminal executes CCA and detects (example If the time is 25us), then at most occupying maximum duration is 1ms to transmit data, and in NR technology, the second class business is (such as URLLC business) transmission time generally occupy the several orthogonal frequency division multiplexing of unauthorized channel (Orthogonal Frequency Division Multiplexing, OFDM) symbol length (1 include cyclic prefix 15kHz subcarrier spacing OFDM The length of symbol is about 71.4us or so), therefore the CCA testing mechanism can be used for transmitting the second class business.
But there are first kind business (such as eMBB business) and the second class business (such as URLLC business) to rush on unauthorized channel When prominent, how terminal selectively executes Channel Detection mechanism and base station how to cooperate terminal to avoid the problem of conflict also urgently It is to be solved.
Set forth above in order to solve the problems, such as, the embodiment of the invention provides a kind of methods and correlation for avoiding service conflict Equipment.For a better understanding, first the architecture diagram of the embodiment of the present invention is described below.
Referring to Fig. 1, being provided in an embodiment of the present invention a kind of for avoiding the architecture diagram of service conflict.The present invention is implemented It include the first terminal 101, second terminal 102 and the base station 103 in the framework in example.Wherein, the described first terminal 101 and the second terminal 102 can be various types of intelligent terminals, such as can be mobile phone, tablet computer, wearable set Standby, personal digital assistant (English: Personal Digital Assistant, abbreviation: PDA), mobile internet device (English Text: Mobile Internet Device, abbreviation: MID) etc. can be in the terminal of unauthorized channel business;The base station 103 can be public mobile communication base station, and including but not limited to macro base station, micro-base station, omnidirectional station etc. can be in unauthorized channels The terminal of upper transmission services, wherein the base station 103 can be individual base station, be also possible to base station group, herein with no restrictions.
In order to preferably describe, the first terminal 101 and the second terminal 102 are particularly limited as supporting in the following description Carrier wave polymerization and the terminal with authorization auxiliary mechanism (Lisensed Assisted Access, LAA) function, and first end End 101 and the second terminal 102 can be different terminals, or same terminal.
In architecture diagram for avoiding service conflict shown in Fig. 1, the first terminal 101 and the base station 103 are established and are led to Letter connection, the second terminal 101 are also established with the base station 103 and are communicated to connect, which is needing in unauthorized channel When the transmission of upper progress first kind business (be eMBB business in the embodiment of the present invention, but be not construed as limiting in other embodiments), It executes Channel Detection mechanism and (is CCA testing mechanism in the embodiment of the present invention, but is not construed as limiting in other embodiments) judgement letter Whether road can be used, and carry out the transmission of eMBB business on the unauthorized channel with the base station 103 if available.
Carry out eMBB business transmission during, if the second terminal 102 need with the base station 103 this first It (is URLLC business in the embodiment of the present invention, but in other implementations that the second class business is carried out on the scheduled running time-frequency resource of class business Be not construed as limiting in example) transmission, the priority of the second class business is higher than the priority of the first kind business, then the base station 103 It first determines whether to initiate the first terminal 101 of eMBB business and initiates whether the second terminal 102 of URLLC business is same end End.
In one embodiment, if the first terminal 101 and the second terminal 102 are same terminals, i.e., this is first eventually End 101 is equal in the case where the second terminal 102 (hereafter referred to collectively as second terminal), non-awards then the base station 103 occupies this The remaining N number of continuous OFDM symbol (i.e. specified running time-frequency resource) that can be used for the transmission of eMBB business carries out URLLC business in power channel Transmission, and send the first notification message to the second terminal 102, include specified time-frequency money in first notification message Source, the specified running time-frequency resource at least occupy the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business, and The URLLC business datum is received on the specified running time-frequency resource or sends the URLLC business datum.
Further, the second terminal 102 due to know need the unauthorized channel URLLC business it Before, the second terminal 102 is in the unauthorized channel eMBB business.That is, unauthorized at this in needs Before the channel URLLC business, which is had access in the unauthorized channel, therefore, the second terminal 102 can not execute the Channel Detection mechanism, and receive the first notification message of the base station 103, according to first notification message Instruction and base station specify running time-frequency resource to transmit the URLLC business at this.
Further, after the URLLC business of the base station 103 and the second terminal 102 is transmitted, the second terminal 102 it is also an option that property executes CCA testing mechanism, and restores the transmission for carrying out eMBB business with the base station 103.Wherein, this Two terminals 102, which determine, does not execute CCA testing mechanism, including but not limited to following two mode: the channel of the unauthorized channel is surplus The remaining time is less than preset threshold and the second terminal 102 and finishes and the base station before the base station 103 carries out URLLC business The business of 103 eMBB is transmitted.
In one embodiment, if the first terminal 101 and the second terminal 102 are not same terminals, due to URLLC The priority of business is higher than the service priority of eMBB, which can at least interrupt the eMBB industry with the first terminal 101 The transmission of business, and occupy residue in the unauthorized channel and can be used for N number of continuous OFDM symbol of eMBB business transmission (when i.e. specified Frequency resource) transmission that carries out URLLC business, it then will be located at previous or preceding multiple OFDM symbols of the specified running time-frequency resource (i.e. target position) is set as idle state.And then, which sends second notification message to the second terminal 102, is somebody's turn to do It include the specified running time-frequency resource, and the target position being in idle condition in second notification message.
Further, the second terminal 102 due to know need the unauthorized channel URLLC business it Before, the second terminal 102 is not in the unauthorized channel eMBB business, and therefore, which can receive base Stand 103 second notification message, and on the unauthorized channel execute CCA testing mechanism (such as 25us), when the second terminal 102 when detecting the target position being in idle condition, so that it may with the base station 103 this specify running time-frequency resource transmit this second Class business.
Further, after the URLLC business of the base station 103 and the second terminal 102 is transmitted, which can To reserve the OFDM symbol that at least one is in idle condition, in order to which the first terminal 101 is by executing the inspection of CCA testing mechanism The OFDM symbol being in idle condition is measured, so that it is determined that the unauthorized channel idle, so that it may restore the eMBB business and exist The unauthorized channel.
Fig. 2 is referred to, is that the embodiment of the present invention provides a kind of schematic flow diagram of method for avoiding service conflict, such as Fig. 2 Shown in method can include:
S201, in unauthorized channel first kind business, if necessary in the unauthorized channel Second class business, base station judge to execute whether the terminal of the first kind business and the terminal for executing the second class business are same One terminal.
It should be noted that the base station can carry out the transmission of first kind business first on unauthorized channel, if needed The second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, base station judgement executes the end of the first kind business Whether end and the terminal for executing the second class business are same terminal.
It should be noted that the unauthorized channel can for frequency range 5GHZ to 6GHZ channel, WiFi, bluetooth, radar, The unauthorized channel can be used in the systems such as medical treatment, business in mobile communication technology (such as first kind business and the second class Business) it can also be transmitted by the unauthorized channel.
It should also be noted that, the first kind business can be the business such as eMBB business.For example, in NR technology It is middle there are three kinds of business, which is eMBB business, URLLC business and super-intensive Internet of Things (m-MTC) business respectively. Wherein, in NR technology, which has higher bandwidth compared to 3G and 4G period, improves rate and transmission Density.
It should also be noted that, the first kind business can derive from terminal.Transmitting the first kind business can be by the end It is completed jointly with the base station at end.Alternatively, the first kind business can also derive from other equipment, the present invention does not make any limit to this System.
For example, base station can initiate the first kind business, concurrently deliver letters and enable to the end of the execution first kind business End.The terminal of the execution first kind business can know itself to need to be implemented the first kind after receiving the signaling Business.
Again for example, the terminal of the execution first kind business can also voluntarily initiate the first kind business, and send tune Degree request is to the base station, in order to which the base station can allocate resources to the terminal of the execution first kind business, so that the execution the The terminal of a kind of business is in the transmitted over resources of the unauthorized channel first kind business.
In the specific implementation, terminal is needed in the unauthorized channel first kind business, channel inspection can be executed Survey mechanism judges whether the unauthorized channel can be used.If the terminal determines that this is unauthorized by executing Channel Detection mechanism Channel is unavailable, i.e., when the unauthorized channel is currently just occupied by other communication systems, which cannot be in the unauthorized letter The transmission of the first kind business is carried out on road, then the terminal can continue to execute the Channel Detection mechanism, until determining that this is non- Until authorization channel is available.If the terminal determines that the unauthorized channel is available by executing Channel Detection mechanism, so that it may With the base station in the unauthorized channel first kind business.
It should be noted that the terminal and the base station execute channel inspection in the unauthorized channel first kind business Survey mechanism, can to avoid the first kind business and other can be in other business (such as the WiFi, indigo plant of the unauthorized channel Tooth etc.) conflict, while can also be interfered with each other to avoid the first kind business with other business.
It should also be noted that, if necessary in unauthorized the second class of channel business, then the judgement execute this Whether the terminal of a kind of business and the terminal for executing the second class business are same terminal.
Wherein, which can be the business such as URLLC business.Specifically, the URLLC business may include Such as unmanned, industrial automation needs the business of low time delay, highly reliable connection.Currently, to the URLLC industry in NR technology The design of business mainly studies the frame structure of Rel-14, and is passed by defining smaller transmission time slice to reduce Defeated time delay improves throughput of system.For example, already allowing for the design of the low time delays such as mini-slot (mini-slot), benefit in the design With these designs, the maximum transmission time of business can be can satisfy in this when terminal executes Channel Detection mechanism The transmission of URLLC business.
Similar, the business datum of the second class business can be sent to terminal on specified running time-frequency resource by base station, Scheduling request can be sent from terminal to base station, and base station is sent to by terminal on the specified running time-frequency resource of base station instruction.This Invention is not intended to be limited in any this.
S202, the base station send corresponding notification message to the end for executing the second class business according to judging result End.
Wherein, the notification message includes at least the second class business specified time-frequency shared by the unauthorized channel Resource.
Wherein, the specified running time-frequency resource at least occupies the part in the running time-frequency resource of the scheduled first kind business Running time-frequency resource.
It should be noted that the specified running time-frequency resource be that the base station divides on the unauthorized channel it is N number of continuous OFDM symbol, N can be the positive integer less than 7, such as 1 or 2.
In the specific implementation, if the terminal of the terminal of the execution first kind business Yu the execution the second class business is same One terminal, then the base station can send the first notification message to the terminal of execution the second class business;If the execution this first The terminal of the terminal of class business Yu the execution the second class business is not same terminal, then the base station can send the second notice and disappear It ceases to the terminal of execution the second class business.
Optionally, the base station can also send second notification message to the terminal for executing the first kind business, be used for Notify to specify running time-frequency resource to be occupied and the target position described in the terminal for executing the first kind business by other terminals It sets and is arranged to idle state.
It should be noted that the base station sends second notification message to the terminal for executing the first kind business, can notify The terminal of the execution first kind business is not in position and the target position reception data of specifying running time-frequency resource.
S203, the base station receive the second class business datum or transmission described second on the specified running time-frequency resource Class business datum.
It should be noted that the base station can receive second class when the second class business datum derives from the terminal Business datum, and the second class business is transmitted on the specified running time-frequency resource of the unauthorized channel with the terminal.
It should also be noted that, the base station can send second class when the second class business datum derives from base station Business datum, in order to directly transmit the second class business on the specified running time-frequency resource of the unauthorized channel with the terminal.
In embodiments of the present invention, in unauthorized transmission first kind business, if necessary in the unauthorized channel The second class business is transmitted, then the base station executes the terminal of the first kind business by judgement and executes the terminal of the second class business It whether is same terminal to determine that the corresponding notification message of transmission to the terminal for executing the first kind business, allows and executes the second class industry The terminal of business completes the transmission of the second class business according to corresponding notification message, awards to effectively prevent two types non- Weigh the service conflict of channel.
Fig. 3 is referred to, for the method that another kind provided in an embodiment of the present invention avoids service conflict, side as shown in Figure 3 Method can include:
S301, in unauthorized channel first kind business, if necessary in the unauthorized channel Second class business, base station judge to execute whether the terminal of the first kind business and the terminal for executing the second class business are same One terminal.
It should be noted that the specific implementation process of above-mentioned S301 step may refer to the tool in the S201 step in Fig. 2 Hold in vivo, therefore not to repeat here.
It should also be noted that, the base station is if it is determined that executing the terminal of the first kind business and executing the second class business Terminal be same terminal, then execute the S302 step and the S303 step, without execute S304 and S305 step.The base It stands if it is determined that executing the terminal of the first kind business and executing the terminal of the second class business is not same terminal, then executing should S304 and the S305 step, without executing S302 step and the S303 step.
If S302, the terminal for initiating the first kind business and the terminal for initiating the second class business are same One terminal, then the base station divides the specified running time-frequency resource in the unauthorized channel, and at least interrupts the first kind Transmission of the business on the specified running time-frequency resource.That is, base station can interrupt the transmission of entire first kind business, also It is transmission of the terminal first kind business on its scheduled entire running time-frequency resource;First kind business can also only be interrupted described Transmission on specified running time-frequency resource, that is, only interrupt biography of the first kind business on the specified running time-frequency resource occupied by the second class It is defeated, without the transmission of the first kind business datum on other running time-frequency resources of terminal.
Wherein, which specifies and is transmitted on running time-frequency resource at this.
It should be noted that the priority of the second class business is higher than the priority of the first kind business.
Wherein, which can be N number of continuous in the estimated running time-frequency resource for distributing to the transmission of first kind business OFDM symbol.Wherein, N can be less than 7, such as can be 1 or 2.
Specifically, the priority due to the second class business is higher than the priority of the first kind business, when in the second class industry When having the second class business of burst to need to transmit as early as possible during business transmission, which can be paid the utmost attention in the unauthorized letter The second class business is transmitted on road.The base station can expect to distribute to the time-frequency of first kind business transmission in the unauthorized channel N number of continuous OFDM symbol (the namely specified running time-frequency resource) is in resource come the transmission that carries out the second class business.
It should be noted transmission of the base station break to the first kind business, specifically can be directly pause to entire The transmission of the first kind business.
Alternatively, transmission of the base station break to the first kind business, specifically can be and only pauses at the specified time-frequency money The part first kind business transmitted on source, on the unauthorized channel in unappropriated resource, the first kind industry of rest part Business can continue to transmit, in order to the execution first kind business terminal it is next restore transmission when increase and be successfully decoded Possibility.
In some possible embodiments, the base station can also after transferring the second class business, restore this first The transmission of class business.This process of the transmission of the recovery first kind business can execute channel inspection by the terminal selectively Survey mechanism is realized.
S303, the base station send the first notification message to the terminal for executing the second class business.
Wherein, first notification message includes the specified running time-frequency resource, is used to indicate in the specified running time-frequency resource Transmit the second class business.
In the specific implementation, if the base station determines the terminal for executing the first kind business and executes the end of the second class business End is same terminal, it is determined that first notification message is sent to the terminal of the execution the second class business, in order to the execution The terminal of the second class business according to the first notification message instruction, with the base station this specify carried out on running time-frequency resource this second The transmission of class business.
It should be noted that since the terminal that executes the first kind business with the terminal for executing the second class business is same Terminal, the terminal itself could be aware that the first kind business this case that the unauthorized channel is transmitted, so as to not Need to be implemented the Channel Detection mechanism, so that it may according to first notification message, with the base station in the unauthorized channel The second class business, the problem of so as to avoid service conflict.
If not S304, same terminal, then the base station divides the specified running time-frequency resource in the unauthorized channel, And transmission of the first kind business on the specified running time-frequency resource is at least interrupted, and the specified running time-frequency resource will be located at Target position is set as idle state.
It should be noted that the priority of the second class business is higher than the priority of the first kind business.
It should also be noted that, execute the first kind business terminal with execution the second class business terminal be not same When one terminal, which can at least interrupt the first kind business and specify transmission on running time-frequency resource at this, and unauthorized at this Specified running time-frequency resource is divided in channel, and specifies the target position of running time-frequency resource to be set as idle state this.That is, Base station can not send business datum or control information on the target position.
Wherein, which occupies at least one symbol, and is located at before the specified running time-frequency resource in the time domain.Specifically , which can be previous or preceding several OFDM symbols of the specified running time-frequency resource.
It should also be noted that, the purpose of the target position of the idle state is arranged, the execution the second class industry can be The terminal of business can access unauthorized channel when executing Channel Detection mechanism.Wherein, it occupies 1 and arrives several OFDM symbol conducts The target position can also save running time-frequency resource.
In the specific implementation, this is specified the target position of running time-frequency resource to be set as idle state by base station, second class is executed The terminal of business can execute the Channel Detection mechanism to access unauthorized channel, thereby executing second class in the target position Business datum.
In some possible embodiments, since the priority of the second class business is higher than the first kind business, base station It can be with prioritised transmission the second class business.The base station can be paid the utmost attention in the unauthorized channel the second class business. Specifically, the base station can interrupt the transmission to the first kind business on the unauthorized channel, the unauthorized letter is then occupied It is remaining in road to can be used for N number of continuous OFDM symbol (the namely specified running time-frequency resource) that the first kind business is transmitted to be somebody's turn to do The transmission of second class business, and specify the target position of running time-frequency resource to be set as idle this, in order to which the second terminal exists Channel Detection mechanism is executed on the target position of the free time to access unauthorized channel, thereby executing the second class business.
S305, the base station send second notification message to the terminal for executing the second class business.
Wherein, the second notification message includes the specified running time-frequency resource and the target position that is in idle condition, The terminal for executing the second class business is used to indicate in the target position execution Channel Detection being in idle condition, and described Specified running time-frequency resource transmits the second class business.
In the specific implementation, if the base station determines the terminal for executing the first kind business and executes the end of the second class business End is not same terminal, so that it may which, to the terminal transmission second notification message of the execution the second class business, which disappears Breath can allow the terminal of the execution the second class business to know to transmit specified running time-frequency resource and the execution of the second class business The terminal of second class business executes the target position of Channel Detection mechanism.
In some possible embodiments, which can pass through descending control signaling (Downlink Control Information, DCI) or radio resource control signaling (Radio Resource Control, RRC) notify the execution should The terminal of the second class business specified running time-frequency resource and target position, wherein the specified running time-frequency resource may include channel frequency The point parameters such as information and bandwidth.
It should also be noted that, the terminal for executing the second class business in advance not the unauthorized channel this When a kind of business, the terminal of the execution the second class business can not know whether the unauthorized channel is idle, and therefore, which should The terminal of second class business can know whether the unauthorized channel is idle by executing Channel Detection mechanism.
When execute the second class business terminal by Channel Detection mechanism when the target position detects channel idle, It then can access the unauthorized channel, to receive the second class business datum on the specified running time-frequency resource.
In some possible embodiments, if executing the terminal of first kind business and executing the terminal of the second class business is not Same terminal, base station can also be to terminal the first notification messages of transmission of the execution first kind business.First notification message Specify running time-frequency resource occupied with the second class business of transmission described in the terminal of the first kind business for notifying to execute, in this way, holding The terminal of row first kind business then carries out data decoding not on the occupied specified running time-frequency resource.
In some possible embodiments, the base station can also after transferring the second class business, restore this first The transmission of class business.This process of the transmission of the recovery first kind business can be held by the terminal of the execution first kind business Row any type Channel Detection mechanism is realized.
In embodiments of the present invention, base station is by unauthorized transmission first kind business, if necessary to non-at this Authorization channel transmits the second class business, then the base station executes the terminal of the first kind business by judgement and executes the second class industry Whether the terminal of business is same terminal to determine the corresponding notification message of transmission, if it is same terminal, just sends the first notice Message just sends second notification message if not being same terminal, and terminal can be cooperated to carry out Channel Detection, ensure that execution The terminal of the second class business completes the transmission of the second class business according to corresponding notification message, to effectively prevent two kinds Service conflict of the type in unauthorized channel.
Refer to Fig. 4, be another embodiment of the present invention provides a kind of schematic flow diagram for avoiding service conflict method, such as Method shown in Fig. 4 may include:
S401, terminal receive the notification message that base station is sent.
Wherein, the notification message includes at least the second class business specifying in unauthorized channel that the terminal need to execute Running time-frequency resource, the specified running time-frequency resource at least occupy the running time-frequency resource for the first kind business being scheduled in the unauthorized channel In portion of time frequency resources.
If should be noted that terminal is needing before unauthorized the second class of channel business, In the unauthorized channel first kind business.That is, the terminal has accessed the unauthorized channel, Not execute Channel Detection mechanism, and the transmission of the second class business is completed according to the notification message that base station is sent.
If should be noted that terminal is needing before unauthorized the second class of channel business, not In the unauthorized channel first kind business.That is, the terminal does not access the unauthorized channel in advance, To execute the Channel Detection mechanism, and complete according to the notification message that base station is sent the transmission of the second class business.
It should also be noted that, the Channel Detection mechanism can be CCA testing mechanism, which can also be cried Make listem-before-talk (Listen Before Talk, LBT) mechanism, alternatively, the Channel Detection mechanism can also be other kinds of Mechanism.Wherein, which can be used for detecting whether the unauthorized channel can be used, to avoid service conflict.
Wherein, which can classify according to the length of detection cycle, with short cycle (25us) For CCA testing mechanism, if the terminal executes the CCA testing mechanism of the short cycle (25us), the time of transmission services is most It can be mostly 1ms, and in NR technology, the time of URLLC business transmission is usually length (1 of 1 to 2 OFDM symbol The length of the OFDM symbol of 15kHz subcarrier spacing including cyclic prefix is about 71.4us or so), therefore the time of 1ms A URLLC business has been passed enough.In other words, which can be used for the transmission to the URLLC business.
S402, the terminal receive the second class business datum on the specified running time-frequency resource that the notification message indicates Or send the second class business datum.
Wherein, base station determine issue which kind of notification message, can be according to execute the first kind business terminal with hold The terminal whether same terminal of row the second class business determines.
It should be noted that the notification message may include: the first notification message and second notification message.
In the specific implementation, the terminal can send the second class industry when the second class business datum derives from the terminal Be engaged in data, and and base station the second class business is transmitted on the specified running time-frequency resource of the unauthorized channel.
It should also be noted that, the terminal can receive second class when the second class business datum derives from base station Business datum, and the second class business is transmitted on the specified running time-frequency resource of the unauthorized channel with the base station.
Optionally, the judging result is the terminal for executing the first kind business and execution second class The terminal of business is not same terminal;The notification message is second notification message;The second notification message includes the finger The target position determining running time-frequency resource and being in idle condition.
Optionally, the notification message is second notification message, and the second notification message further includes being in idle condition Target position.The terminal received on the specified running time-frequency resource that the notification message indicates the second class business datum or Before sending the second class business datum, the method also includes: the terminals according to the instruction of the second notification message Channel Detection is executed in the target position being in idle condition, to access the unauthorized channel.
In some possible embodiments, if the terminal executes the biography of first kind business not on the unauthorized channel It is defeated, then the terminal can receive the second notification message of the base station, and by executing the channel to the unauthorized channel Whether testing mechanism is idle to determine the unauthorized channel, when it is idle for detecting the unauthorized channel, can access this Unauthorized channel.Wherein, which includes the specified running time-frequency resource, which specifies this in mesh of running time-frequency resource Cursor position is set as idle state, in order to which the terminal determines whether the unauthorized channel is idle.
In the specific implementation, the base station at least terminal first kind business can specify time-frequency at this on the unauthorized channel Then the transmission of resource occupies the remaining N number of continuous OFDM symbol that can be used for first kind business transmission in the unauthorized channel This is specified the target position of running time-frequency resource the transmission that carries out the second class business by (namely this specified running time-frequency resource) It is set as idle.In order to which the Channel Detection mechanism of the second terminal is set in the target position for detecting the specified running time-frequency resource When being set to the free time, the unauthorized channel idle is determined.
Then the terminal can be by executing the Channel Detection mechanism, if detecting that this refers to by the Channel Detection mechanism When determining the target position of running time-frequency resource and being set as the free time, determines the unauthorized channel idle, the specified running time-frequency resource can be occupied To transmit the second class business.
In some possible embodiments, before the unauthorized transmission the second class business, if there is also The first kind business is being transmitted, and the first kind business is not that the terminal executes.So terminal of the execution first kind business After can also detecting that the second class business is completed by the Channel Detection mechanism, restore with the base station in the unauthorized channel On carry out the transmission of the first kind business.
In embodiments of the present invention, terminal detect need in unauthorized the second class of channel business, then lead to The notification message for receiving base station is crossed, cooperation terminal can when executing Channel Detection mechanism and not executing Channel Detection mechanism The transmission to the second class business is completed, saves power consumption, and effectively prevent different types of service conflict.
Refer to Fig. 5, be another embodiment of the present invention provides another kind avoid the schematic flow diagram of service conflict method, Method as shown in Figure 5 may include:
S501, the terminal execute the transmission of first kind business on the unauthorized channel.
It should be noted that in the terminal unauthorized channel can be executed before the transmission for executing the first kind business Channel Detection mechanism, if detecting the unauthorized channel idle, so that it may access the unauthorized channel, with execute this first The transmission of class business.
In some possible embodiments, it if the terminal executes the Channel Detection mechanism of unauthorized channel, detects The unauthorized channel is busy, it is necessary to the Channel Detection mechanism for executing the unauthorized channel again, until detecting that this non-is awarded Weigh channel idle, so that it may the unauthorized channel is accessed, to execute the transmission of the first kind business.
S502, the terminal receive the notification message that base station is sent.
Wherein, the notification message includes at least the second class business specifying in unauthorized channel that the terminal need to execute Running time-frequency resource, the specified running time-frequency resource at least occupy the running time-frequency resource for the first kind business being scheduled in the unauthorized channel In portion of time frequency resources.
It should be noted that when the judging result is the terminal for executing the first kind business and the execution institute When the terminal for stating the second class business is same terminal, the notification message is the first notification message, the first notification message packet The specified running time-frequency resource is included, the specified running time-frequency resource at least occupies the first kind business being scheduled in the unauthorized channel Running time-frequency resource in portion of time frequency resources.
It should be noted that the specific implementation process of above-mentioned S502 step can refer in the S401 step in Fig. 4 Particular content, therefore not to repeat here.
S503, the terminal at least interrupt transmission of the first kind business on the specified running time-frequency resource.
In the specific implementation, the terminal is being needed when executing the transmission of the second class business on the unauthorized channel, it can be with The first kind business, which is interrupted, according to the notification message specifies at this transmission on running time-frequency resource.Alternatively, the terminal can also basis The notification message interrupts transmission of the first kind business on the unauthorized channel.
S504, the terminal receive the second class business datum on the specified running time-frequency resource that the notification message indicates Or send the second class business datum.
In the specific implementation, the terminal before the unauthorized transmission the second class business, is gone back on the unauthorized channel There is first kind business transmitting, the base station is if it is determined that executing the terminal of the first kind business and executing the second class business at this time Terminal be same terminal, so that it may to the terminal send the first notification message.
In some possible embodiments, which exists before needing to be implemented the second class business due to knowing The unauthorized channel first kind business.That is, the terminal has access in the authorization channel, so that it may no The Channel Detection mechanism is executed, and receives first notification message.
Further, which can occupy the finger on the unauthorized channel according to the instruction of first notification message Running time-frequency resource is determined, to carry out the transmission of the second class business.
Wherein, which, which can be residue in the unauthorized channel, can be used for the N number of of first kind business transmission OFDM symbol, N can less than 7, for example, 1 or 2.
If S505, the second class business are transmitted, when the terminal judges the remaining occupancy of the unauthorized channel Between be less than preset threshold, then the terminal does not execute the Channel Detection mechanism to the unauthorized channel.
It should be noted that the terminal and the base station be when the unauthorized channel completes the transmission to the second class business, The terminal can execute the Channel Detection mechanism to the unauthorized channel, can not also execute the channel inspection to the unauthorized channel Survey mechanism.
Optionally, when the terminal judges the remaining occupancy of unauthorized channel when the second class business is transmitted Between whether be less than preset threshold, if the remaining holding time of the unauthorized channel be less than the preset threshold, the terminal The Channel Detection mechanism to the unauthorized channel is not executed.
It should be noted that the preset threshold can be determined according to which type of Channel Detection mechanism is executed.Citing comes It says, which can be the CCA testing mechanism of short cycle (25us), then the preset threshold can be somebody's turn to do with executing When short-period CCA testing mechanism, the maximum duration 1ms of the second class business is transmitted as the preset threshold.Similar, such as Fruit is the CCA testing mechanism in other periods, which can be the transmission when executing the CCA testing mechanism in other periods The maximum duration of the second class business, this is not restricted.
In some possible embodiments, which is the CCA testing mechanism of short cycle (25us), this is pre- If threshold value is 1ms.The terminal detects that the remaining holding time of the unauthorized channel is less than 1ms, so that it may not execute the channel Testing mechanism.
Optionally, if the remaining holding time of the unauthorized channel is greater than or equal to the preset threshold, the end End executes the Channel Detection mechanism to the unauthorized channel, continues described first to access the unauthorized channel again The transmission of class business.
In some possible embodiments, which is the CCA testing mechanism of short cycle (25us), this is pre- If threshold value is 1ms.The terminal detects that the remaining holding time of the unauthorized channel is greater than or equal to 1ms, so that it may which executing should Channel Detection mechanism, when detecting the unauthorized channel idle by executing the Channel Detection mechanism, so that it may access again The unauthorized channel, to continue to execute the transmission of the first kind business.
Optionally, if the second class business is transmitted, the terminal judges before transmitting the second class business Whether the first kind business is transmitted, and the terminal does not execute the Channel Detection machine to the unauthorized channel if completing System.
In the specific implementation, if the terminal before the unauthorized transmission the second class business, has finished on pair The transmission of the first kind business, then the terminal can also determine the Channel Detection mechanism not executed to unauthorized channel.
It should also be noted that, the terminal can also not execute the channel to unauthorized channel under other specific conditions Testing mechanism, this is not restricted.
It should also be noted that, the terminal can be held other than the above-mentioned optional way enumerated and other specific conditions The row Channel Detection mechanism to unauthorized channel, and when detecting the unauthorized channel idle, it can execute to the first kind The transmission of business.
In embodiments of the present invention, terminal detect need in unauthorized the second class of channel business, pass through The first notification message for receiving base station, to transmit the second class business, and after the second class business is transmitted, according to working as Preceding situation executes the Channel Detection mechanism by selectivity and completes the transmission to the first kind business, can complete to this The transmission of two class business, while power consumption is also saved, and after the second class business has passed, selectively hold according to present case The row Channel Detection mechanism, both avoids the wasting of resources, while also effectively preventing different types of service conflict.
Fig. 6 is referred to, is a kind of schematic block diagram of base station provided in an embodiment of the present invention.Base station as shown in FIG. 6 can To include:
Transmission unit 601, for carrying out the transmission of first kind business on unauthorized channel.
Judging unit 602, for if desired transmitting the second class industry on the running time-frequency resource that the first kind business is scheduled Business judges the terminal for executing the first kind business and executes whether the terminal of the second class business is same terminal.
Transmission unit 603 executes the second class business to described for sending corresponding notification message according to judging result Terminal.
Wherein, the notification message includes at least the second class business specified time-frequency shared by the unauthorized channel Resource;The specified running time-frequency resource at least occupies the money of the few time-frequency in the running time-frequency resource of the scheduled first kind business Source.
The transmission unit is also used to receive the second class business datum on the specified running time-frequency resource or sends institute State the second class business datum.
In embodiments of the present invention, by unauthorized transmission first kind business, if necessary to unauthorized at this Transmission the second class business, then judge to execute the terminal of the first kind business with execute the second class business terminal whether be Same terminal sends corresponding notification message to the terminal for executing the first kind business to determine, allows the end for executing the second class business The transmission of the second class business is completed at end according to corresponding notification message, to effectively prevent two types in unauthorized channel Service conflict.
Referring to Fig. 7, being the schematic block diagram of another base station provided in an embodiment of the present invention, base station as shown in Figure 7 Can include:
Transmission unit 701, for carrying out the transmission of first kind business on unauthorized channel.
Judging unit 702, for if desired transmitting the second class industry on the running time-frequency resource that the first kind business is scheduled Business judges the terminal for executing the first kind business and executes whether the terminal of the second class business is same terminal.
Transmission unit 703 executes the second class business to described for sending corresponding notification message according to judging result Terminal.
Wherein, the notification message includes at least the second class business specified time-frequency shared by the unauthorized channel Resource;The specified running time-frequency resource at least occupies the money of the few time-frequency in the running time-frequency resource of the scheduled first kind business Source.
The transmission unit 701 is also used to receive the second class business datum or hair on the specified running time-frequency resource Send the second class business datum.
Optionally, the priority of the second class business is higher than the priority of the first kind business.
The base station further include: processing unit 704, for dividing the specified time-frequency money in the unauthorized channel Source, and at least interrupt transmission of the first kind business on the specified running time-frequency resource.
Optionally, if the terminal for executing the first kind business is with the terminal for executing the second class business Same terminal, the transmission unit 703 disappear specifically for sending the first notice to the terminal for executing the second class business Breath.
Wherein, first notification message includes the specified running time-frequency resource, is used to indicate in the specified running time-frequency resource Transmit the second class business.
Optionally, if the terminal for executing the first kind business and the terminal for executing the second class business not For same terminal, the processing unit 704 is also used to set idle shape for the target position for being located at the specified running time-frequency resource State.
Optionally, the target position occupies at least one symbol, is located at before the specified running time-frequency resource in the time domain.
Optionally, the transmission unit 703, specifically for sending second to the terminal for executing the second class business Notification message.
Wherein, the second notification message includes the specified running time-frequency resource and the target position that is in idle condition, The terminal for executing the second class business is used to indicate in the target position execution Channel Detection being in idle condition, and described Specified running time-frequency resource transmits the second class business.
Optionally, the transmission unit 703 is also used to disappear to the second notice of terminal transmission for executing the first kind business Breath, for notifying to specify running time-frequency resource to be occupied and described described in the terminal for executing the first kind business by other terminals Target position is arranged to idle state
In embodiments of the present invention, by unauthorized transmission first kind business, if necessary to unauthorized at this Transmission the second class business, then judge to execute the terminal of the first kind business with execute the second class business terminal whether be Same terminal sends corresponding notification message to determine, if it is same terminal, the first notification message is just sent, if not being same As soon as terminal sends second notification message, terminal can be cooperated to carry out Channel Detection, ensure that the end for executing the second class business The transmission of the second class business is completed at end according to corresponding notification message, to effectively prevent two types in unauthorized channel Service conflict.
Fig. 8 is referred to, is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal as shown in Figure 8 can Include:
Receiving unit 801, for receiving the notification message of base station transmission.
Wherein, the notification message includes at least the second class business specifying in unauthorized channel that the terminal need to execute Running time-frequency resource, the specified running time-frequency resource at least occupy the running time-frequency resource for the first kind business being scheduled in the unauthorized channel In portion of time frequency resources.
Transmission unit 802, for receiving the second class business on the specified running time-frequency resource that the notification message indicates Data send the second class business datum.
Optionally, the notification message is second notification message, and the second notification message further includes being in idle condition Target position.
The terminal further include: access unit 803, for the instruction according to the second notification message in idle shape The target position of state executes Channel Detection, to access the unauthorized channel.
In embodiments of the present invention, needs are being detected in unauthorized the second class of channel business, then by connecing The notification message of base station is received, cooperation can be completed to this when executing Channel Detection mechanism and not executing Channel Detection mechanism The transmission of second class business, saves power consumption, and effectively prevents different types of service conflict.
Fig. 9 is referred to, is the schematic block diagram of another terminal provided in an embodiment of the present invention.Terminal as shown in Figure 9 Can include:
Receiving unit 901, for receiving the notification message of base station transmission.
Wherein, the notification message includes at least the second class business specifying in unauthorized channel that the terminal need to execute Running time-frequency resource, the specified running time-frequency resource at least occupy the running time-frequency resource for the first kind business being scheduled in the unauthorized channel In portion of time frequency resources.
Transmission unit 902, for receiving the second class business on the specified running time-frequency resource that the notification message indicates Data send the second class business datum.
Optionally, the terminal further include: execution unit 903, for executing first kind industry on the unauthorized channel The transmission of business;The priority of the first kind business is lower than the priority of the second class business.
Interrupt location 904 receives on the specified running time-frequency resource that the notification message indicates for the transmission unit 902 Before the second class business datum or transmission the second class business datum, the first kind business is at least interrupted in the finger Determine the transmission on running time-frequency resource.
Optionally, the terminal further include: judging unit 905, for judging that the second class business is transmitted when institute Whether the remaining holding time for stating unauthorized channel is less than preset threshold.
Wherein, access unit 906, if specifically for the unauthorized channel remaining holding time be greater than or equal to it is described Preset threshold, then execute to the Channel Detection mechanism of the unauthorized channel, with access again the unauthorized channel continue into The transmission of the row first kind business is not held if the remaining holding time of the unauthorized channel is less than the preset threshold Channel Detection mechanism of the row to the unauthorized channel.
In embodiments of the present invention, detect need in unauthorized the second class of channel business, pass through reception First notification message of base station, to transmit the second class business, and after the second class business is transmitted, according to current Situation executes the Channel Detection mechanism by selectivity to complete the transmission to the first kind business, can complete to second class The transmission of business, while power consumption is also saved, and after the second class business has passed, selectively being executed according to present case should Channel Detection mechanism both avoids the wasting of resources, while also effectively preventing different types of service conflict.
Referring to Figure 10, be another embodiment of the present invention provides a kind of base station schematic block diagram.The present embodiment is retouched The base station stated, comprising: at least one input equipment 1000;At least one processor 2000, such as CPU;At least one processor 3000;At least one communication interface 4000, above-mentioned input equipment 1000, processor 2000, memory 3000 and communication interface 4000 are connected by bus.
It should be appreciated that in embodiments of the present invention, above-mentioned input equipment 1000 can be the equipment to terminal input signal, It may include touch panel, may include touch screen and touch screen etc. in the touch panel.Above-mentioned communication interface 4000 can wrap Include display (LCD etc.).
Above-mentioned processor 2000 can be central processing unit (Central Processing Unit, CPU), the processing Device can also be other general processors, digital signal processor (Digital Signal Processor, DSP), dedicated collection At circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
Above-mentioned memory 3000 may include read-only memory and random access memory, and refer to the offer of processor 2000 Order and data.The a part of of memory 3000 can also include nonvolatile RAM.For example, memory 3000 is also It can store the information of device type.
Specifically, the program instruction that above-mentioned processor 2000 can call above-mentioned memory 3000 to store, realizes such as this hair Method shown in bright embodiment base station side.
Specifically, above-mentioned processor 2000, which calls, is stored in the following step of program instruction execution that above-mentioned memory 3000 stores It is rapid:
The transmission of first kind business is carried out on unauthorized channel;
If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, judges to execute described the Whether the terminal of a kind of business and the terminal for executing the second class business are same terminal;
Corresponding notification message is sent to the terminal for executing the second class business according to judging result, wherein described Notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;The specified time-frequency Resource at least occupies the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The second class business datum is received on the specified running time-frequency resource or sends the second class business datum.
The method that processor executes in the embodiment of the present invention is described from the angle of processor, it is to be understood that this Processor will execute the cooperation that the above method needs other hardware configurations in inventive embodiments.For example, enterprising in unauthorized channel The transmission of row first kind business controls above-mentioned communication interface 4000 by above-mentioned processor 2000 to transmit related data, and judgement is held Whether the terminal of the row first kind business and the terminal of execution the second class business are same terminal, are sent out according to judging result It send corresponding notification message to the terminal for executing the second class business, above-mentioned deposit can be controlled by above-mentioned processor 2000 Storage program in reservoir 3000 is realized.The embodiment of the present invention is not described in detail and limits to concrete implementation process.
Optionally, which can realize that above-mentioned Fig. 2 and Fig. 3 is corresponding real by above-mentioned processor 2000 and other equipment Apply the corresponding steps that base station executes in the method in example.It should be understood that the embodiment of the present invention is the entity dress of corresponding method embodiment Embodiment is set, the description to embodiment of the method is also applied for the embodiment of the present invention.
In embodiments of the present invention, in unauthorized transmission first kind business, if necessary in the unauthorized channel The second class business is transmitted, then judges the terminal for executing the first kind business and whether the terminal for executing the second class business is same Terminal sends corresponding notification message to the terminal for executing the first kind business to determine, allows the terminal root for executing the second class business The transmission of the second class business is completed according to corresponding notification message, to effectively prevent two types in the industry of unauthorized channel Business conflict.
A kind of computer readable storage medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program and may be implemented when the computer program is executed by processor: is carried out on unauthorized channel The transmission of a kind of business;If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, judgement is held Whether the terminal of the row first kind business and the terminal of execution the second class business are same terminal;It is sent out according to judging result Send corresponding notification message to the terminal for executing the second class business, wherein the notification message includes at least described the Two class business specified running time-frequency resource shared by the unauthorized channel;The specified running time-frequency resource at least occupies described scheduled First kind business running time-frequency resource in portion of time frequency resources;The second class business is received on the specified running time-frequency resource Data send the second class business datum.
It should be noted that the detailed process that the computer readable storage medium is executed by processor can be found in the second implementation Method described in example and 3rd embodiment, details are not described herein.
The computer readable storage medium can be the internal storage unit of terminal described in aforementioned any embodiment, example Such as the hard disk or memory of terminal.The computer readable storage medium is also possible to the External memory equipment of the terminal, such as The plug-in type hard disk being equipped in the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer readable storage medium can also be wrapped both The internal storage unit for including the terminal also includes External memory equipment.The computer readable storage medium is described for storing Other programs and data needed for computer program and the terminal.The computer readable storage medium can be also used for temporarily When store the data that has exported or will export.
Referring to Figure 11, be another embodiment of the present invention provides a kind of terminal schematic block diagram.The present embodiment is retouched The terminal stated, comprising: at least one input equipment 5000;At least one processor 6000, such as CPU;At least one processor 7000;At least one output equipment 8000, above-mentioned input equipment 5000, processor 6000, memory 7000 and output equipment 8000 are connected by bus.
It should be appreciated that in embodiments of the present invention, above-mentioned input equipment 5000 can be the equipment to terminal input signal, It may include touch panel, may include touch screen and touch screen etc. in the touch panel.Above-mentioned output equipment 8000 can wrap Include display (LCD etc.).
Above-mentioned processor 6000 can be central processing unit (Central Processing Unit, CPU), the processing Device can also be other general processors, digital signal processor (Digital Signal Processor, DSP), dedicated collection At circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
Above-mentioned memory 7000 may include read-only memory and random access memory, and refer to the offer of processor 6000 Order and data.The a part of of memory 7000 can also include nonvolatile RAM.For example, memory 7000 is also It can store the information of device type.
The program instruction that above-mentioned processor 2000 can call above-mentioned memory 3000 to store realizes such as the embodiment of the present invention Method shown in base station side.
Specifically, above-mentioned processor 6000, which calls, is stored in the following step of program instruction execution that above-mentioned memory 7000 stores It is rapid:
Receive the notification message that base station is sent;The notification message includes at least the second class business that the terminal need to execute In the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies the to be scheduled in the unauthorized channel Portion of time frequency resources in the running time-frequency resource of a kind of business;
The second class business datum is received on the specified running time-frequency resource of notification message instruction or sends described the Two class business datums.
The method that processor executes in the embodiment of the present invention is described from the angle of processor, it is to be understood that this Processor will execute the cooperation that the above method needs other hardware configurations in inventive embodiments.For example, receiving the logical of base station transmission Know message, above-mentioned input equipment 5000 is controlled by above-mentioned processor 6000 to transmit related data, is indicated in the notification message Specified running time-frequency resource on receive the second class business datum or send the second class business datum, can be by above-mentioned processing Device 2000 control storage program in above-mentioned memory 3000 and above-mentioned input equipment 5000 and above-mentioned output equipment 8000 into Row is realized.The embodiment of the present invention is not described in detail and limits to concrete implementation process.
Optionally, which can realize that above-mentioned Fig. 4 and Fig. 5 is corresponding real by above-mentioned processor 6000 and other equipment Apply the corresponding steps that base station executes in the method in example.It should be understood that the embodiment of the present invention is the entity dress of corresponding method embodiment Embodiment is set, the description to embodiment of the method is also applied for the embodiment of the present invention.
In embodiments of the present invention, needs are being detected in unauthorized the second class of channel business, then by connecing The notification message of base station is received, cooperation can be completed to this when executing Channel Detection mechanism and not executing Channel Detection mechanism The transmission of second class business, saves power consumption, and effectively prevents different types of service conflict.
A kind of computer readable storage medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program and may be implemented when the computer program is executed by processor: receiving the notice that base station is sent and disappears Breath;The notification message includes at least the second class business that need to execute of the terminal in the specified running time-frequency resource of unauthorized channel, The specified running time-frequency resource at least occupies the part in the running time-frequency resource for the first kind business being scheduled in the unauthorized channel Running time-frequency resource;The second class business datum is received on the specified running time-frequency resource of notification message instruction or sends described the Two class business datums.
It should be noted that the detailed process that the computer readable storage medium is executed by processor can be found in the 4th implementation Method described in example and the 5th embodiment, details are not described herein.
The computer readable storage medium can be the internal storage unit of terminal described in aforementioned any embodiment, example Such as the hard disk or memory of terminal.The computer readable storage medium is also possible to the External memory equipment of the terminal, such as The plug-in type hard disk being equipped in the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer readable storage medium can also be wrapped both The internal storage unit for including the terminal also includes External memory equipment.The computer readable storage medium is described for storing Other programs and data needed for computer program and the terminal.The computer readable storage medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This A little functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Specially Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description The specific work process at end and unit, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed terminal and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored or not executed.In addition, shown or discussed phase Mutually between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication of device or unit Connection is also possible to electricity, mechanical or other form connections.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, is also possible to two or more units and is integrated in one unit.It is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection scope subject to.

Claims (26)

1. a kind of method for avoiding service conflict characterized by comprising
Base station carries out the transmission of first kind business on unauthorized channel;
If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, base station judgement executes described the Whether the terminal of a kind of business and the terminal for executing the second class business are same terminal;
The base station sends corresponding notification message to the terminal for executing the second class business according to judging result, wherein The notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;It is described specified Running time-frequency resource at least occupies the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The base station receives the second class business datum on the specified running time-frequency resource or sends the second class business number According to.
2. the method as described in claim 1, which is characterized in that the priority of the second class business is higher than the first kind industry The priority of business;
The base station sends corresponding notification message to the terminal and execution for executing the first kind business according to judging result Before the terminal of the second class business, further includes:
The base station divides the specified running time-frequency resource in the unauthorized channel, and at least interrupts the first kind business and exist Transmission on the specified running time-frequency resource.
3. method according to claim 2, which is characterized in that if the terminal for executing the first kind business is held with described The terminal of row the second class business is same terminal;The base station sends corresponding notification message according to judging result and holds to described The terminal of row the second class business, comprising:
The base station sends the first notification message to the terminal for executing the second class business;
Wherein, first notification message includes the specified running time-frequency resource, is used to indicate and transmits in the specified running time-frequency resource The second class business.
4. method according to claim 2, which is characterized in that if the terminal for executing the first kind business is held with described The terminal of row the second class business is not same terminal;The base station sends corresponding notification message to described according to judging result Before the terminal for executing the second class business, further includes:
The target position for being located at the specified running time-frequency resource is set idle state by the base station.
5. method as claimed in claim 4, which is characterized in that the target position occupies at least one symbol, in the time domain Before the specified running time-frequency resource.
6. method as claimed in claim 4, which is characterized in that the base station according to judging result send corresponding notification message to The terminal for executing the second class business, comprising:
The base station sends second notification message to the terminal for executing the second class business;
Wherein, the second notification message includes the specified running time-frequency resource and the target position that is in idle condition, is used for Indicate that the terminal for executing the second class business executes Channel Detection in the target position being in idle condition, and described specified Running time-frequency resource transmits the second class business.
7. method as claimed in claim 6, which is characterized in that the method also includes:
The base station sends second notification message to the terminal for executing the first kind business, described executes described for notifying Specified running time-frequency resource is occupied by other terminals described in the terminal of a kind of business and the target position is arranged to idle state.
8. a kind of method for avoiding service conflict characterized by comprising
Terminal receives the notification message that base station is sent;The notification message includes at least the second class business that the terminal need to execute In the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies the to be scheduled in the unauthorized channel Portion of time frequency resources in the running time-frequency resource of a kind of business;
The terminal receives the second class business datum on the specified running time-frequency resource that the notification message indicates or sends institute State the second class business datum.
9. method according to claim 8, which is characterized in that before the notification message that the terminal receives that base station is sent, The method also includes:
The terminal executes the transmission of first kind business on the unauthorized channel;The priority of the first kind business is lower than The priority of the second class business;
The terminal receives the second class business datum on the specified running time-frequency resource that the notification message indicates or sends institute Before stating the second class business datum, the method also includes:
The terminal at least interrupts transmission of the first kind business on the specified running time-frequency resource.
10. method according to claim 8, which is characterized in that the notification message is second notification message, and described second is logical Know that message further includes the target position being in idle condition;
The terminal receives the second class business datum on the specified running time-frequency resource that the notification message indicates or sends institute Before stating the second class business datum, the method also includes:
The terminal executes Channel Detection in the target position being in idle condition according to the instruction of the second notification message, with Access the unauthorized channel.
11. method according to claim 8, which is characterized in that further include:
The terminal judges whether the remaining holding time of unauthorized channel when the second class business is transmitted is less than Preset threshold;
If the remaining holding time of the unauthorized channel is greater than or equal to the preset threshold, the terminal is executed to described The Channel Detection mechanism of unauthorized channel, to access the biography that the unauthorized channel continues the first kind business again It is defeated;
If the remaining holding time of the unauthorized channel is less than the preset threshold, the terminal does not execute non-awards to described Weigh the Channel Detection mechanism of channel.
12. a kind of base station characterized by comprising
Transmission unit, for carrying out the transmission of first kind business on unauthorized channel;
Judging unit judges for if desired transmitting the second class business on the running time-frequency resource that the first kind business is scheduled It executes the terminal of the first kind business and executes whether the terminal of the second class business is same terminal;
Transmission unit, for sending corresponding notification message to the terminal for executing the second class business according to judging result, Wherein, the notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;Institute It states specified running time-frequency resource and at least occupies portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The transmission unit is also used to receive the second class business datum on the specified running time-frequency resource or sends described the Two class business datums.
13. base station as claimed in claim 12, which is characterized in that the priority of the second class business is higher than the first kind The priority of business;
The base station further include:
Processing unit for dividing the specified running time-frequency resource in the unauthorized channel, and at least interrupts the first kind Transmission of the business on the specified running time-frequency resource.
14. base station as claimed in claim 13, which is characterized in that if the terminal for executing the first kind business with it is described The terminal for executing the second class business is same terminal;The transmission unit is specifically used for executing second class to described The terminal of business sends the first notification message;
Wherein, first notification message includes the specified running time-frequency resource, is used to indicate and transmits in the specified running time-frequency resource The second class business.
15. base station as claimed in claim 13, which is characterized in that if the terminal for executing the first kind business with it is described The terminal for executing the second class business is not same terminal;The processing unit is also used to be located at the specified time-frequency money The target position in source is set as idle state.
16. base station as claimed in claim 15, which is characterized in that the target position occupies at least one symbol, in time domain It is upper to be located at before the specified running time-frequency resource.
17. base station as claimed in claim 15, which is characterized in that the transmission unit is specifically used for described in the execution The terminal of second class business sends second notification message;
Wherein, the second notification message includes the specified running time-frequency resource and the target position that is in idle condition, is used for Indicate that the terminal for executing the second class business executes Channel Detection in the target position being in idle condition, and described specified Running time-frequency resource transmits the second class business.
18. base station as claimed in claim 17, which is characterized in that the transmission unit is also used to the execution first kind The terminal of business sends second notification message, and time-frequency money is specified described in the terminal for executing the first kind business for notifying Source is occupied by other terminals and the target position is arranged to idle state.
19. a kind of terminal characterized by comprising
Receiving unit, for receiving the notification message of base station transmission;The notification message includes at least what the terminal need to execute In the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies in the unauthorized channel second class business Portion of time frequency resources in the running time-frequency resource of scheduled first kind business;
Transmission unit, for receiving the second class business datum or hair on the specified running time-frequency resource that the notification message indicates Send the second class business datum.
20. terminal as claimed in claim 19, which is characterized in that the terminal further include:
Execution unit, for executing the transmission of first kind business on the unauthorized channel;The first kind business it is preferential Grade is lower than the priority of the second class business;
Interrupt location receives second class for the transmission unit on the specified running time-frequency resource that the notification message indicates Before business datum or transmission the second class business datum, the first kind business is at least interrupted in the specified running time-frequency resource On transmission.
21. terminal as claimed in claim 19, which is characterized in that the notification message be second notification message, described second Notification message further includes the target position being in idle condition;
The terminal further include:
Access unit executes channel inspection in the target position being in idle condition for the instruction according to the second notification message It surveys, to access the unauthorized channel.
22. terminal as claimed in claim 19, which is characterized in that further include:
Judging unit, whether the remaining holding time of the unauthorized channel when for judging that the second class business is transmitted Less than preset threshold;
Wherein, the access unit, if specifically for the unauthorized channel remaining holding time be greater than or equal to it is described pre- If threshold value, then the Channel Detection mechanism to the unauthorized channel is executed, is continued with accessing the unauthorized channel again The transmission of the first kind business does not execute if the remaining holding time of the unauthorized channel is less than the preset threshold To the Channel Detection mechanism of the unauthorized channel.
23. a kind of base station, which is characterized in that the processor, defeated including processor, input equipment, communication interface and memory Enter equipment, communication interface and memory to be connected with each other, wherein the memory is for storing application code, the processing Device is configured for calling said program code, executes the method according to claim 1 to 7.
24. a kind of terminal, which is characterized in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein the memory is for storing application code, the processing Device is configured for calling said program code, executes such as the described in any item methods of claim 8-11.
25. a kind of computer readable storage medium, which is characterized in that the computer storage medium is stored with computer program, The computer program includes program instruction, and described program instruction makes the processor execute such as right when being executed by a processor It is required that the described in any item methods of 1-7.
26. a kind of computer readable storage medium, which is characterized in that the computer storage medium is stored with computer program, The computer program includes program instruction, and described program instruction makes the processor execute such as right when being executed by a processor It is required that the described in any item methods of 8-11.
CN201710503966.0A 2017-06-27 2017-06-27 A kind of method avoiding service conflict and relevant device Withdrawn CN109152077A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710503966.0A CN109152077A (en) 2017-06-27 2017-06-27 A kind of method avoiding service conflict and relevant device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710503966.0A CN109152077A (en) 2017-06-27 2017-06-27 A kind of method avoiding service conflict and relevant device

Publications (1)

Publication Number Publication Date
CN109152077A true CN109152077A (en) 2019-01-04

Family

ID=64805533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710503966.0A Withdrawn CN109152077A (en) 2017-06-27 2017-06-27 A kind of method avoiding service conflict and relevant device

Country Status (1)

Country Link
CN (1) CN109152077A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021087909A1 (en) * 2019-11-07 2021-05-14 Oppo广东移动通信有限公司 Signal transmission method and device, and mobile terminal and storage medium
WO2024051301A1 (en) * 2022-09-09 2024-03-14 华为技术有限公司 Communication method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021087909A1 (en) * 2019-11-07 2021-05-14 Oppo广东移动通信有限公司 Signal transmission method and device, and mobile terminal and storage medium
CN114900892A (en) * 2019-11-07 2022-08-12 Oppo广东移动通信有限公司 Signal transmission method, device, mobile terminal and storage medium
WO2024051301A1 (en) * 2022-09-09 2024-03-14 华为技术有限公司 Communication method and apparatus

Similar Documents

Publication Publication Date Title
CN109699084B (en) Information transmission method, terminal and network equipment under unlicensed frequency band
CN105898883B (en) A kind of configuration method of lead code, sending method and relevant device
US10736038B2 (en) Channel monitoring method and device
EP3576481B1 (en) Data transmission method and user equipment
CN108282895A (en) A kind of accidental access method and terminal
JP2017534221A (en) Channel sharing for license-assisted access in long-term evolution operations
CN110932829B (en) Transmission time indication method of unlicensed frequency band, network equipment and terminal
CN105122858A (en) Handling downlink semi-persistent scheduling retransmission in wireless networks
CN107949067A (en) The control method and relevant apparatus of a kind of Channel Detection
EP3253146B1 (en) Data transmission method and data transmission site
US20190045532A1 (en) Method and terminal for detecting scheduling instructions
CN109699078B (en) Information transmission method under unlicensed frequency band, network device and terminal
CN110167050A (en) A kind of transmission method and terminal of channel status information reports
CN111148261B (en) Uplink transmission method, user equipment and network side equipment
CN109644454A (en) Terminal wake-up control method, device and storage medium
CN103460784A (en) Method, apparatus and computer program product for triggering the determination of a timing advance for one component carrier based upon another component carrier
CN105764146B (en) A kind of method of sub-frame configuration, method, relevant device and the system of data transmission
CN109150475A (en) A kind of information transferring method, base station and terminal
CN107371243A (en) A kind of resource determining method, relevant device and system
CN109152077A (en) A kind of method avoiding service conflict and relevant device
CN110149716A (en) Communication means and communication device
CN104285460B (en) Method and apparatus for managing wireless transmitter
CN108282318B (en) Configuration method of transmission resources, base station and terminal
CN110351864A (en) A kind of indicating means interrupting transmission, network side equipment and terminal
CN109803378A (en) A kind of resource selection triggering method and user terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190104