CN109152077A - A kind of method avoiding service conflict and relevant device - Google Patents
A kind of method avoiding service conflict and relevant device Download PDFInfo
- Publication number
- CN109152077A CN109152077A CN201710503966.0A CN201710503966A CN109152077A CN 109152077 A CN109152077 A CN 109152077A CN 201710503966 A CN201710503966 A CN 201710503966A CN 109152077 A CN109152077 A CN 109152077A
- Authority
- CN
- China
- Prior art keywords
- terminal
- business
- frequency resource
- running time
- notification message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
- H04W72/121—Wireless traffic scheduling for groups of terminals or users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
- H04W72/1263—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
- H04W72/566—Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
- H04W72/569—Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient of the traffic information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of method for avoiding service conflict and relevant devices, and wherein method includes: the transmission that base station carries out first kind business on unauthorized channel;If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, base station judges to execute the terminal of the first kind business and executes whether the terminal of the second class business is same terminal;The base station sends corresponding notification message to the terminal for executing the second class business according to judging result;The base station receives the second class business datum on the specified running time-frequency resource or sends the second class business datum, can be to avoid different types of service conflict on unauthorized channel.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of method for avoiding service conflict and relevant devices.
Background technique
With the continuous development of the communication technology, the 5th third-generation mobile communication technology (New Radio, NR) is carrying out nervous
Standardisation process.
Currently, the bandwidth that NR technology is supported also includes unauthorized channel (5GHZ-6GHZ), these unauthorized channels are main
It is Wireless Fidelity (Wireless Fidelity, WiFi), bluetooth, radar, the systems such as medical treatment are using.In the movement of prior-generation
When the communication technology (Long Term Evolution, LTE) is using unauthorized channel, one of key point is to ensure that can be in justice
With the existing coexistence of systems using unauthorized channel on the basis of close friend, in order to ensure coexisting, LTE can pass through Channel Detection
Mechanism (such as channel clearance access (Channel Clear Access, CCA) etc.) on unauthorized channel come to detecting, such as
Fruit detects that the unauthorized channel is unavailable, then cannot occupy the unauthorized channel, if detecting that the unauthorized channel is available,
The unauthorized channel could be occupied.
However, how to avoid the first kind business (such as mobile broadband internet (eMBB business) etc.) in NR technology and
Service conflict of the two class business (such as low time delay is highly reliable (URLLC business)) in unauthorized channel is also in fierceness
In discussion.
Summary of the invention
The embodiment of the present invention provide it is a kind of service conflict method and relevant device are avoided on unauthorized channel, can be to avoid
The different types of service conflict problem on unauthorized channel.
In a first aspect, the embodiment of the invention provides one kind to avoid service conflict method, this method comprises:
Base station carries out the transmission of first kind business on unauthorized channel;
If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, base station judgement executes institute
It states the terminal of first kind business and executes whether the terminal of the second class business is same terminal;
The base station sends corresponding notification message to the terminal for executing the second class business according to judging result,
In, the notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;It is described
Specified running time-frequency resource at least occupies the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The base station receives the second class business datum on the specified running time-frequency resource or sends the second class industry
Business data.
Second aspect, the embodiment of the invention also provides one kind to avoid service conflict method, this method comprises:
Terminal receives the notification message that base station is sent;The notification message includes at least the second class that the terminal need to execute
In the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies scheduled in the unauthorized channel business
First kind business running time-frequency resource in portion of time frequency resources;
The terminal receives the second class business datum or hair on the specified running time-frequency resource that the notification message indicates
Send the second class business datum
The third aspect, the embodiment of the invention provides a kind of base station, which includes:
Transmission unit, for carrying out the transmission of first kind business on unauthorized channel;
Judging unit, for if desired transmitting the second class business on the running time-frequency resource that the first kind business is scheduled,
Judge to execute the terminal of the first kind business and executes whether the terminal of the second class business is same terminal;
Transmission unit, for sending corresponding notification message to the end for executing the second class business according to judging result
End, wherein the notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;
The specified running time-frequency resource at least occupies the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The transmission unit is also used to receive the second class business datum on the specified running time-frequency resource or sends institute
State the second class business datum.
Fourth aspect, the embodiment of the invention provides a kind of terminal, which includes:
Receiving unit, for receiving the notification message of base station transmission;The notification message includes at least the terminal and need to hold
For the second capable class business in the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies the unauthorized letter
Portion of time frequency resources in the running time-frequency resource for the first kind business being scheduled in road;
Transmission unit, for receiving the second class business datum on the specified running time-frequency resource that the notification message indicates
Or send the second class business datum.
5th aspect, the embodiment of the invention provides another base station, including processor, input equipment, output equipment and
Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing branch
The application code that terminal executes the above method is held, the processor is configured for the method for executing above-mentioned first aspect.
6th aspect, the embodiment of the invention provides another terminal, including processor, input equipment, communication interface and
Memory, the processor, input equipment, communication interface and memory are connected with each other, wherein the memory is for storing branch
The application code that terminal executes the above method is held, the processor is configured for the method for executing above-mentioned second aspect.
7th aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer storage medium
It is stored with computer program, the computer program includes program instruction, and described program instruction makes institute when being executed by a processor
State the method that processor executes above-mentioned first aspect.
Eighth aspect, the embodiment of the invention provides another computer readable storage medium, the computer storage is situated between
Matter is stored with computer program, and the computer program includes program instruction, and described program instruction makes when being executed by a processor
The method that the processor executes above-mentioned second aspect.
The embodiment of the present invention passes through base station in unauthorized transmission first kind business, if necessary in the unauthorized letter
Road transmits the second class business, then the base station executes the terminal of the first kind business by judgement and executes the second class business
Terminal whether be same terminal to determine and send corresponding notification message, can allow execute the terminal of the second class business according to
Corresponding notification message completes the transmission of the second class business, so that two types effectively be avoided to rush in the business of unauthorized channel
It is prominent.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is provided in an embodiment of the present invention a kind of for avoiding the architecture diagram of service conflict;
Fig. 2 is a kind of schematic flow diagram of method for avoiding service conflict provided in an embodiment of the present invention;
Fig. 3 is the schematic flow diagram for the method that another kind provided in an embodiment of the present invention avoids service conflict;
Fig. 4 be another embodiment of the present invention provides a kind of method for avoiding service conflict schematic flow diagram;
Fig. 5 be another embodiment of the present invention provides another kind avoid service conflict method schematic flow diagram;
Fig. 6 is a kind of schematic block diagram of base station provided in an embodiment of the present invention;
Fig. 7 is another base station schematic block diagram provided in an embodiment of the present invention;
Fig. 8 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 9 be another embodiment of the present invention provides another terminal schematic block diagram;
Figure 10 be another embodiment of the present invention provides a kind of base station schematic block diagram;
Figure 11 be another embodiment of the present invention provides a kind of terminal schematic block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface
The mobile phone, laptop computer or tablet computer of (for example, touch-screen display and/or touch tablet) etc it is other just
Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but there is touching
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch tablet).
In following discussion, the terminal including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal may include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one of the following or multiple: drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be executed at the terminal can be used such as touch sensitive surface at least one is public
Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.In this way, the public physical structure of terminal is (for example, touch
Sensing surface) it can support the various application programs with user interface intuitive and transparent for a user.
Currently, terminal can use authorization auxiliary mechanism (Lisensed Assisted Access, LAA) function, it is based on
The framework of carrier wave polymerization, by authorization channel as main plot, unauthorized channel carrys out the business of transmission terminal as secondary cell.In order to
Guarantee and other coexist in the system (such as WiFi, bluetooth etc.) of unauthorized multi-channel operation, terminal is using Channel Detection machine
(such as clear channel assessment (CCA) (Channel Clear Assessment, CCA) etc.) this technology of system.
By taking Channel Detection mechanism is CCA detection as an example.When terminal utilizes LAA function, before using unauthorized channel
It requires to carry out Channel Detection mechanism to confirm whether the unauthorized channel can be used.Wherein, if terminal executes CCA and detects (example
If the time is 25us), then at most occupying maximum duration is 1ms to transmit data, and in NR technology, the second class business is (such as
URLLC business) transmission time generally occupy the several orthogonal frequency division multiplexing of unauthorized channel (Orthogonal Frequency
Division Multiplexing, OFDM) symbol length (1 include cyclic prefix 15kHz subcarrier spacing OFDM
The length of symbol is about 71.4us or so), therefore the CCA testing mechanism can be used for transmitting the second class business.
But there are first kind business (such as eMBB business) and the second class business (such as URLLC business) to rush on unauthorized channel
When prominent, how terminal selectively executes Channel Detection mechanism and base station how to cooperate terminal to avoid the problem of conflict also urgently
It is to be solved.
Set forth above in order to solve the problems, such as, the embodiment of the invention provides a kind of methods and correlation for avoiding service conflict
Equipment.For a better understanding, first the architecture diagram of the embodiment of the present invention is described below.
Referring to Fig. 1, being provided in an embodiment of the present invention a kind of for avoiding the architecture diagram of service conflict.The present invention is implemented
It include the first terminal 101, second terminal 102 and the base station 103 in the framework in example.Wherein, the described first terminal
101 and the second terminal 102 can be various types of intelligent terminals, such as can be mobile phone, tablet computer, wearable set
Standby, personal digital assistant (English: Personal Digital Assistant, abbreviation: PDA), mobile internet device (English
Text: Mobile Internet Device, abbreviation: MID) etc. can be in the terminal of unauthorized channel business;The base station
103 can be public mobile communication base station, and including but not limited to macro base station, micro-base station, omnidirectional station etc. can be in unauthorized channels
The terminal of upper transmission services, wherein the base station 103 can be individual base station, be also possible to base station group, herein with no restrictions.
In order to preferably describe, the first terminal 101 and the second terminal 102 are particularly limited as supporting in the following description
Carrier wave polymerization and the terminal with authorization auxiliary mechanism (Lisensed Assisted Access, LAA) function, and first end
End 101 and the second terminal 102 can be different terminals, or same terminal.
In architecture diagram for avoiding service conflict shown in Fig. 1, the first terminal 101 and the base station 103 are established and are led to
Letter connection, the second terminal 101 are also established with the base station 103 and are communicated to connect, which is needing in unauthorized channel
When the transmission of upper progress first kind business (be eMBB business in the embodiment of the present invention, but be not construed as limiting in other embodiments),
It executes Channel Detection mechanism and (is CCA testing mechanism in the embodiment of the present invention, but is not construed as limiting in other embodiments) judgement letter
Whether road can be used, and carry out the transmission of eMBB business on the unauthorized channel with the base station 103 if available.
Carry out eMBB business transmission during, if the second terminal 102 need with the base station 103 this first
It (is URLLC business in the embodiment of the present invention, but in other implementations that the second class business is carried out on the scheduled running time-frequency resource of class business
Be not construed as limiting in example) transmission, the priority of the second class business is higher than the priority of the first kind business, then the base station 103
It first determines whether to initiate the first terminal 101 of eMBB business and initiates whether the second terminal 102 of URLLC business is same end
End.
In one embodiment, if the first terminal 101 and the second terminal 102 are same terminals, i.e., this is first eventually
End 101 is equal in the case where the second terminal 102 (hereafter referred to collectively as second terminal), non-awards then the base station 103 occupies this
The remaining N number of continuous OFDM symbol (i.e. specified running time-frequency resource) that can be used for the transmission of eMBB business carries out URLLC business in power channel
Transmission, and send the first notification message to the second terminal 102, include specified time-frequency money in first notification message
Source, the specified running time-frequency resource at least occupy the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business, and
The URLLC business datum is received on the specified running time-frequency resource or sends the URLLC business datum.
Further, the second terminal 102 due to know need the unauthorized channel URLLC business it
Before, the second terminal 102 is in the unauthorized channel eMBB business.That is, unauthorized at this in needs
Before the channel URLLC business, which is had access in the unauthorized channel, therefore, the second terminal
102 can not execute the Channel Detection mechanism, and receive the first notification message of the base station 103, according to first notification message
Instruction and base station specify running time-frequency resource to transmit the URLLC business at this.
Further, after the URLLC business of the base station 103 and the second terminal 102 is transmitted, the second terminal
102 it is also an option that property executes CCA testing mechanism, and restores the transmission for carrying out eMBB business with the base station 103.Wherein, this
Two terminals 102, which determine, does not execute CCA testing mechanism, including but not limited to following two mode: the channel of the unauthorized channel is surplus
The remaining time is less than preset threshold and the second terminal 102 and finishes and the base station before the base station 103 carries out URLLC business
The business of 103 eMBB is transmitted.
In one embodiment, if the first terminal 101 and the second terminal 102 are not same terminals, due to URLLC
The priority of business is higher than the service priority of eMBB, which can at least interrupt the eMBB industry with the first terminal 101
The transmission of business, and occupy residue in the unauthorized channel and can be used for N number of continuous OFDM symbol of eMBB business transmission (when i.e. specified
Frequency resource) transmission that carries out URLLC business, it then will be located at previous or preceding multiple OFDM symbols of the specified running time-frequency resource
(i.e. target position) is set as idle state.And then, which sends second notification message to the second terminal 102, is somebody's turn to do
It include the specified running time-frequency resource, and the target position being in idle condition in second notification message.
Further, the second terminal 102 due to know need the unauthorized channel URLLC business it
Before, the second terminal 102 is not in the unauthorized channel eMBB business, and therefore, which can receive base
Stand 103 second notification message, and on the unauthorized channel execute CCA testing mechanism (such as 25us), when the second terminal
102 when detecting the target position being in idle condition, so that it may with the base station 103 this specify running time-frequency resource transmit this second
Class business.
Further, after the URLLC business of the base station 103 and the second terminal 102 is transmitted, which can
To reserve the OFDM symbol that at least one is in idle condition, in order to which the first terminal 101 is by executing the inspection of CCA testing mechanism
The OFDM symbol being in idle condition is measured, so that it is determined that the unauthorized channel idle, so that it may restore the eMBB business and exist
The unauthorized channel.
Fig. 2 is referred to, is that the embodiment of the present invention provides a kind of schematic flow diagram of method for avoiding service conflict, such as Fig. 2
Shown in method can include:
S201, in unauthorized channel first kind business, if necessary in the unauthorized channel
Second class business, base station judge to execute whether the terminal of the first kind business and the terminal for executing the second class business are same
One terminal.
It should be noted that the base station can carry out the transmission of first kind business first on unauthorized channel, if needed
The second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, base station judgement executes the end of the first kind business
Whether end and the terminal for executing the second class business are same terminal.
It should be noted that the unauthorized channel can for frequency range 5GHZ to 6GHZ channel, WiFi, bluetooth, radar,
The unauthorized channel can be used in the systems such as medical treatment, business in mobile communication technology (such as first kind business and the second class
Business) it can also be transmitted by the unauthorized channel.
It should also be noted that, the first kind business can be the business such as eMBB business.For example, in NR technology
It is middle there are three kinds of business, which is eMBB business, URLLC business and super-intensive Internet of Things (m-MTC) business respectively.
Wherein, in NR technology, which has higher bandwidth compared to 3G and 4G period, improves rate and transmission
Density.
It should also be noted that, the first kind business can derive from terminal.Transmitting the first kind business can be by the end
It is completed jointly with the base station at end.Alternatively, the first kind business can also derive from other equipment, the present invention does not make any limit to this
System.
For example, base station can initiate the first kind business, concurrently deliver letters and enable to the end of the execution first kind business
End.The terminal of the execution first kind business can know itself to need to be implemented the first kind after receiving the signaling
Business.
Again for example, the terminal of the execution first kind business can also voluntarily initiate the first kind business, and send tune
Degree request is to the base station, in order to which the base station can allocate resources to the terminal of the execution first kind business, so that the execution the
The terminal of a kind of business is in the transmitted over resources of the unauthorized channel first kind business.
In the specific implementation, terminal is needed in the unauthorized channel first kind business, channel inspection can be executed
Survey mechanism judges whether the unauthorized channel can be used.If the terminal determines that this is unauthorized by executing Channel Detection mechanism
Channel is unavailable, i.e., when the unauthorized channel is currently just occupied by other communication systems, which cannot be in the unauthorized letter
The transmission of the first kind business is carried out on road, then the terminal can continue to execute the Channel Detection mechanism, until determining that this is non-
Until authorization channel is available.If the terminal determines that the unauthorized channel is available by executing Channel Detection mechanism, so that it may
With the base station in the unauthorized channel first kind business.
It should be noted that the terminal and the base station execute channel inspection in the unauthorized channel first kind business
Survey mechanism, can to avoid the first kind business and other can be in other business (such as the WiFi, indigo plant of the unauthorized channel
Tooth etc.) conflict, while can also be interfered with each other to avoid the first kind business with other business.
It should also be noted that, if necessary in unauthorized the second class of channel business, then the judgement execute this
Whether the terminal of a kind of business and the terminal for executing the second class business are same terminal.
Wherein, which can be the business such as URLLC business.Specifically, the URLLC business may include
Such as unmanned, industrial automation needs the business of low time delay, highly reliable connection.Currently, to the URLLC industry in NR technology
The design of business mainly studies the frame structure of Rel-14, and is passed by defining smaller transmission time slice to reduce
Defeated time delay improves throughput of system.For example, already allowing for the design of the low time delays such as mini-slot (mini-slot), benefit in the design
With these designs, the maximum transmission time of business can be can satisfy in this when terminal executes Channel Detection mechanism
The transmission of URLLC business.
Similar, the business datum of the second class business can be sent to terminal on specified running time-frequency resource by base station,
Scheduling request can be sent from terminal to base station, and base station is sent to by terminal on the specified running time-frequency resource of base station instruction.This
Invention is not intended to be limited in any this.
S202, the base station send corresponding notification message to the end for executing the second class business according to judging result
End.
Wherein, the notification message includes at least the second class business specified time-frequency shared by the unauthorized channel
Resource.
Wherein, the specified running time-frequency resource at least occupies the part in the running time-frequency resource of the scheduled first kind business
Running time-frequency resource.
It should be noted that the specified running time-frequency resource be that the base station divides on the unauthorized channel it is N number of continuous
OFDM symbol, N can be the positive integer less than 7, such as 1 or 2.
In the specific implementation, if the terminal of the terminal of the execution first kind business Yu the execution the second class business is same
One terminal, then the base station can send the first notification message to the terminal of execution the second class business;If the execution this first
The terminal of the terminal of class business Yu the execution the second class business is not same terminal, then the base station can send the second notice and disappear
It ceases to the terminal of execution the second class business.
Optionally, the base station can also send second notification message to the terminal for executing the first kind business, be used for
Notify to specify running time-frequency resource to be occupied and the target position described in the terminal for executing the first kind business by other terminals
It sets and is arranged to idle state.
It should be noted that the base station sends second notification message to the terminal for executing the first kind business, can notify
The terminal of the execution first kind business is not in position and the target position reception data of specifying running time-frequency resource.
S203, the base station receive the second class business datum or transmission described second on the specified running time-frequency resource
Class business datum.
It should be noted that the base station can receive second class when the second class business datum derives from the terminal
Business datum, and the second class business is transmitted on the specified running time-frequency resource of the unauthorized channel with the terminal.
It should also be noted that, the base station can send second class when the second class business datum derives from base station
Business datum, in order to directly transmit the second class business on the specified running time-frequency resource of the unauthorized channel with the terminal.
In embodiments of the present invention, in unauthorized transmission first kind business, if necessary in the unauthorized channel
The second class business is transmitted, then the base station executes the terminal of the first kind business by judgement and executes the terminal of the second class business
It whether is same terminal to determine that the corresponding notification message of transmission to the terminal for executing the first kind business, allows and executes the second class industry
The terminal of business completes the transmission of the second class business according to corresponding notification message, awards to effectively prevent two types non-
Weigh the service conflict of channel.
Fig. 3 is referred to, for the method that another kind provided in an embodiment of the present invention avoids service conflict, side as shown in Figure 3
Method can include:
S301, in unauthorized channel first kind business, if necessary in the unauthorized channel
Second class business, base station judge to execute whether the terminal of the first kind business and the terminal for executing the second class business are same
One terminal.
It should be noted that the specific implementation process of above-mentioned S301 step may refer to the tool in the S201 step in Fig. 2
Hold in vivo, therefore not to repeat here.
It should also be noted that, the base station is if it is determined that executing the terminal of the first kind business and executing the second class business
Terminal be same terminal, then execute the S302 step and the S303 step, without execute S304 and S305 step.The base
It stands if it is determined that executing the terminal of the first kind business and executing the terminal of the second class business is not same terminal, then executing should
S304 and the S305 step, without executing S302 step and the S303 step.
If S302, the terminal for initiating the first kind business and the terminal for initiating the second class business are same
One terminal, then the base station divides the specified running time-frequency resource in the unauthorized channel, and at least interrupts the first kind
Transmission of the business on the specified running time-frequency resource.That is, base station can interrupt the transmission of entire first kind business, also
It is transmission of the terminal first kind business on its scheduled entire running time-frequency resource;First kind business can also only be interrupted described
Transmission on specified running time-frequency resource, that is, only interrupt biography of the first kind business on the specified running time-frequency resource occupied by the second class
It is defeated, without the transmission of the first kind business datum on other running time-frequency resources of terminal.
Wherein, which specifies and is transmitted on running time-frequency resource at this.
It should be noted that the priority of the second class business is higher than the priority of the first kind business.
Wherein, which can be N number of continuous in the estimated running time-frequency resource for distributing to the transmission of first kind business
OFDM symbol.Wherein, N can be less than 7, such as can be 1 or 2.
Specifically, the priority due to the second class business is higher than the priority of the first kind business, when in the second class industry
When having the second class business of burst to need to transmit as early as possible during business transmission, which can be paid the utmost attention in the unauthorized letter
The second class business is transmitted on road.The base station can expect to distribute to the time-frequency of first kind business transmission in the unauthorized channel
N number of continuous OFDM symbol (the namely specified running time-frequency resource) is in resource come the transmission that carries out the second class business.
It should be noted transmission of the base station break to the first kind business, specifically can be directly pause to entire
The transmission of the first kind business.
Alternatively, transmission of the base station break to the first kind business, specifically can be and only pauses at the specified time-frequency money
The part first kind business transmitted on source, on the unauthorized channel in unappropriated resource, the first kind industry of rest part
Business can continue to transmit, in order to the execution first kind business terminal it is next restore transmission when increase and be successfully decoded
Possibility.
In some possible embodiments, the base station can also after transferring the second class business, restore this first
The transmission of class business.This process of the transmission of the recovery first kind business can execute channel inspection by the terminal selectively
Survey mechanism is realized.
S303, the base station send the first notification message to the terminal for executing the second class business.
Wherein, first notification message includes the specified running time-frequency resource, is used to indicate in the specified running time-frequency resource
Transmit the second class business.
In the specific implementation, if the base station determines the terminal for executing the first kind business and executes the end of the second class business
End is same terminal, it is determined that first notification message is sent to the terminal of the execution the second class business, in order to the execution
The terminal of the second class business according to the first notification message instruction, with the base station this specify carried out on running time-frequency resource this second
The transmission of class business.
It should be noted that since the terminal that executes the first kind business with the terminal for executing the second class business is same
Terminal, the terminal itself could be aware that the first kind business this case that the unauthorized channel is transmitted, so as to not
Need to be implemented the Channel Detection mechanism, so that it may according to first notification message, with the base station in the unauthorized channel
The second class business, the problem of so as to avoid service conflict.
If not S304, same terminal, then the base station divides the specified running time-frequency resource in the unauthorized channel,
And transmission of the first kind business on the specified running time-frequency resource is at least interrupted, and the specified running time-frequency resource will be located at
Target position is set as idle state.
It should be noted that the priority of the second class business is higher than the priority of the first kind business.
It should also be noted that, execute the first kind business terminal with execution the second class business terminal be not same
When one terminal, which can at least interrupt the first kind business and specify transmission on running time-frequency resource at this, and unauthorized at this
Specified running time-frequency resource is divided in channel, and specifies the target position of running time-frequency resource to be set as idle state this.That is,
Base station can not send business datum or control information on the target position.
Wherein, which occupies at least one symbol, and is located at before the specified running time-frequency resource in the time domain.Specifically
, which can be previous or preceding several OFDM symbols of the specified running time-frequency resource.
It should also be noted that, the purpose of the target position of the idle state is arranged, the execution the second class industry can be
The terminal of business can access unauthorized channel when executing Channel Detection mechanism.Wherein, it occupies 1 and arrives several OFDM symbol conducts
The target position can also save running time-frequency resource.
In the specific implementation, this is specified the target position of running time-frequency resource to be set as idle state by base station, second class is executed
The terminal of business can execute the Channel Detection mechanism to access unauthorized channel, thereby executing second class in the target position
Business datum.
In some possible embodiments, since the priority of the second class business is higher than the first kind business, base station
It can be with prioritised transmission the second class business.The base station can be paid the utmost attention in the unauthorized channel the second class business.
Specifically, the base station can interrupt the transmission to the first kind business on the unauthorized channel, the unauthorized letter is then occupied
It is remaining in road to can be used for N number of continuous OFDM symbol (the namely specified running time-frequency resource) that the first kind business is transmitted to be somebody's turn to do
The transmission of second class business, and specify the target position of running time-frequency resource to be set as idle this, in order to which the second terminal exists
Channel Detection mechanism is executed on the target position of the free time to access unauthorized channel, thereby executing the second class business.
S305, the base station send second notification message to the terminal for executing the second class business.
Wherein, the second notification message includes the specified running time-frequency resource and the target position that is in idle condition,
The terminal for executing the second class business is used to indicate in the target position execution Channel Detection being in idle condition, and described
Specified running time-frequency resource transmits the second class business.
In the specific implementation, if the base station determines the terminal for executing the first kind business and executes the end of the second class business
End is not same terminal, so that it may which, to the terminal transmission second notification message of the execution the second class business, which disappears
Breath can allow the terminal of the execution the second class business to know to transmit specified running time-frequency resource and the execution of the second class business
The terminal of second class business executes the target position of Channel Detection mechanism.
In some possible embodiments, which can pass through descending control signaling (Downlink Control
Information, DCI) or radio resource control signaling (Radio Resource Control, RRC) notify the execution should
The terminal of the second class business specified running time-frequency resource and target position, wherein the specified running time-frequency resource may include channel frequency
The point parameters such as information and bandwidth.
It should also be noted that, the terminal for executing the second class business in advance not the unauthorized channel this
When a kind of business, the terminal of the execution the second class business can not know whether the unauthorized channel is idle, and therefore, which should
The terminal of second class business can know whether the unauthorized channel is idle by executing Channel Detection mechanism.
When execute the second class business terminal by Channel Detection mechanism when the target position detects channel idle,
It then can access the unauthorized channel, to receive the second class business datum on the specified running time-frequency resource.
In some possible embodiments, if executing the terminal of first kind business and executing the terminal of the second class business is not
Same terminal, base station can also be to terminal the first notification messages of transmission of the execution first kind business.First notification message
Specify running time-frequency resource occupied with the second class business of transmission described in the terminal of the first kind business for notifying to execute, in this way, holding
The terminal of row first kind business then carries out data decoding not on the occupied specified running time-frequency resource.
In some possible embodiments, the base station can also after transferring the second class business, restore this first
The transmission of class business.This process of the transmission of the recovery first kind business can be held by the terminal of the execution first kind business
Row any type Channel Detection mechanism is realized.
In embodiments of the present invention, base station is by unauthorized transmission first kind business, if necessary to non-at this
Authorization channel transmits the second class business, then the base station executes the terminal of the first kind business by judgement and executes the second class industry
Whether the terminal of business is same terminal to determine the corresponding notification message of transmission, if it is same terminal, just sends the first notice
Message just sends second notification message if not being same terminal, and terminal can be cooperated to carry out Channel Detection, ensure that execution
The terminal of the second class business completes the transmission of the second class business according to corresponding notification message, to effectively prevent two kinds
Service conflict of the type in unauthorized channel.
Refer to Fig. 4, be another embodiment of the present invention provides a kind of schematic flow diagram for avoiding service conflict method, such as
Method shown in Fig. 4 may include:
S401, terminal receive the notification message that base station is sent.
Wherein, the notification message includes at least the second class business specifying in unauthorized channel that the terminal need to execute
Running time-frequency resource, the specified running time-frequency resource at least occupy the running time-frequency resource for the first kind business being scheduled in the unauthorized channel
In portion of time frequency resources.
If should be noted that terminal is needing before unauthorized the second class of channel business,
In the unauthorized channel first kind business.That is, the terminal has accessed the unauthorized channel,
Not execute Channel Detection mechanism, and the transmission of the second class business is completed according to the notification message that base station is sent.
If should be noted that terminal is needing before unauthorized the second class of channel business, not
In the unauthorized channel first kind business.That is, the terminal does not access the unauthorized channel in advance,
To execute the Channel Detection mechanism, and complete according to the notification message that base station is sent the transmission of the second class business.
It should also be noted that, the Channel Detection mechanism can be CCA testing mechanism, which can also be cried
Make listem-before-talk (Listen Before Talk, LBT) mechanism, alternatively, the Channel Detection mechanism can also be other kinds of
Mechanism.Wherein, which can be used for detecting whether the unauthorized channel can be used, to avoid service conflict.
Wherein, which can classify according to the length of detection cycle, with short cycle (25us)
For CCA testing mechanism, if the terminal executes the CCA testing mechanism of the short cycle (25us), the time of transmission services is most
It can be mostly 1ms, and in NR technology, the time of URLLC business transmission is usually length (1 of 1 to 2 OFDM symbol
The length of the OFDM symbol of 15kHz subcarrier spacing including cyclic prefix is about 71.4us or so), therefore the time of 1ms
A URLLC business has been passed enough.In other words, which can be used for the transmission to the URLLC business.
S402, the terminal receive the second class business datum on the specified running time-frequency resource that the notification message indicates
Or send the second class business datum.
Wherein, base station determine issue which kind of notification message, can be according to execute the first kind business terminal with hold
The terminal whether same terminal of row the second class business determines.
It should be noted that the notification message may include: the first notification message and second notification message.
In the specific implementation, the terminal can send the second class industry when the second class business datum derives from the terminal
Be engaged in data, and and base station the second class business is transmitted on the specified running time-frequency resource of the unauthorized channel.
It should also be noted that, the terminal can receive second class when the second class business datum derives from base station
Business datum, and the second class business is transmitted on the specified running time-frequency resource of the unauthorized channel with the base station.
Optionally, the judging result is the terminal for executing the first kind business and execution second class
The terminal of business is not same terminal;The notification message is second notification message;The second notification message includes the finger
The target position determining running time-frequency resource and being in idle condition.
Optionally, the notification message is second notification message, and the second notification message further includes being in idle condition
Target position.The terminal received on the specified running time-frequency resource that the notification message indicates the second class business datum or
Before sending the second class business datum, the method also includes: the terminals according to the instruction of the second notification message
Channel Detection is executed in the target position being in idle condition, to access the unauthorized channel.
In some possible embodiments, if the terminal executes the biography of first kind business not on the unauthorized channel
It is defeated, then the terminal can receive the second notification message of the base station, and by executing the channel to the unauthorized channel
Whether testing mechanism is idle to determine the unauthorized channel, when it is idle for detecting the unauthorized channel, can access this
Unauthorized channel.Wherein, which includes the specified running time-frequency resource, which specifies this in mesh of running time-frequency resource
Cursor position is set as idle state, in order to which the terminal determines whether the unauthorized channel is idle.
In the specific implementation, the base station at least terminal first kind business can specify time-frequency at this on the unauthorized channel
Then the transmission of resource occupies the remaining N number of continuous OFDM symbol that can be used for first kind business transmission in the unauthorized channel
This is specified the target position of running time-frequency resource the transmission that carries out the second class business by (namely this specified running time-frequency resource)
It is set as idle.In order to which the Channel Detection mechanism of the second terminal is set in the target position for detecting the specified running time-frequency resource
When being set to the free time, the unauthorized channel idle is determined.
Then the terminal can be by executing the Channel Detection mechanism, if detecting that this refers to by the Channel Detection mechanism
When determining the target position of running time-frequency resource and being set as the free time, determines the unauthorized channel idle, the specified running time-frequency resource can be occupied
To transmit the second class business.
In some possible embodiments, before the unauthorized transmission the second class business, if there is also
The first kind business is being transmitted, and the first kind business is not that the terminal executes.So terminal of the execution first kind business
After can also detecting that the second class business is completed by the Channel Detection mechanism, restore with the base station in the unauthorized channel
On carry out the transmission of the first kind business.
In embodiments of the present invention, terminal detect need in unauthorized the second class of channel business, then lead to
The notification message for receiving base station is crossed, cooperation terminal can when executing Channel Detection mechanism and not executing Channel Detection mechanism
The transmission to the second class business is completed, saves power consumption, and effectively prevent different types of service conflict.
Refer to Fig. 5, be another embodiment of the present invention provides another kind avoid the schematic flow diagram of service conflict method,
Method as shown in Figure 5 may include:
S501, the terminal execute the transmission of first kind business on the unauthorized channel.
It should be noted that in the terminal unauthorized channel can be executed before the transmission for executing the first kind business
Channel Detection mechanism, if detecting the unauthorized channel idle, so that it may access the unauthorized channel, with execute this first
The transmission of class business.
In some possible embodiments, it if the terminal executes the Channel Detection mechanism of unauthorized channel, detects
The unauthorized channel is busy, it is necessary to the Channel Detection mechanism for executing the unauthorized channel again, until detecting that this non-is awarded
Weigh channel idle, so that it may the unauthorized channel is accessed, to execute the transmission of the first kind business.
S502, the terminal receive the notification message that base station is sent.
Wherein, the notification message includes at least the second class business specifying in unauthorized channel that the terminal need to execute
Running time-frequency resource, the specified running time-frequency resource at least occupy the running time-frequency resource for the first kind business being scheduled in the unauthorized channel
In portion of time frequency resources.
It should be noted that when the judging result is the terminal for executing the first kind business and the execution institute
When the terminal for stating the second class business is same terminal, the notification message is the first notification message, the first notification message packet
The specified running time-frequency resource is included, the specified running time-frequency resource at least occupies the first kind business being scheduled in the unauthorized channel
Running time-frequency resource in portion of time frequency resources.
It should be noted that the specific implementation process of above-mentioned S502 step can refer in the S401 step in Fig. 4
Particular content, therefore not to repeat here.
S503, the terminal at least interrupt transmission of the first kind business on the specified running time-frequency resource.
In the specific implementation, the terminal is being needed when executing the transmission of the second class business on the unauthorized channel, it can be with
The first kind business, which is interrupted, according to the notification message specifies at this transmission on running time-frequency resource.Alternatively, the terminal can also basis
The notification message interrupts transmission of the first kind business on the unauthorized channel.
S504, the terminal receive the second class business datum on the specified running time-frequency resource that the notification message indicates
Or send the second class business datum.
In the specific implementation, the terminal before the unauthorized transmission the second class business, is gone back on the unauthorized channel
There is first kind business transmitting, the base station is if it is determined that executing the terminal of the first kind business and executing the second class business at this time
Terminal be same terminal, so that it may to the terminal send the first notification message.
In some possible embodiments, which exists before needing to be implemented the second class business due to knowing
The unauthorized channel first kind business.That is, the terminal has access in the authorization channel, so that it may no
The Channel Detection mechanism is executed, and receives first notification message.
Further, which can occupy the finger on the unauthorized channel according to the instruction of first notification message
Running time-frequency resource is determined, to carry out the transmission of the second class business.
Wherein, which, which can be residue in the unauthorized channel, can be used for the N number of of first kind business transmission
OFDM symbol, N can less than 7, for example, 1 or 2.
If S505, the second class business are transmitted, when the terminal judges the remaining occupancy of the unauthorized channel
Between be less than preset threshold, then the terminal does not execute the Channel Detection mechanism to the unauthorized channel.
It should be noted that the terminal and the base station be when the unauthorized channel completes the transmission to the second class business,
The terminal can execute the Channel Detection mechanism to the unauthorized channel, can not also execute the channel inspection to the unauthorized channel
Survey mechanism.
Optionally, when the terminal judges the remaining occupancy of unauthorized channel when the second class business is transmitted
Between whether be less than preset threshold, if the remaining holding time of the unauthorized channel be less than the preset threshold, the terminal
The Channel Detection mechanism to the unauthorized channel is not executed.
It should be noted that the preset threshold can be determined according to which type of Channel Detection mechanism is executed.Citing comes
It says, which can be the CCA testing mechanism of short cycle (25us), then the preset threshold can be somebody's turn to do with executing
When short-period CCA testing mechanism, the maximum duration 1ms of the second class business is transmitted as the preset threshold.Similar, such as
Fruit is the CCA testing mechanism in other periods, which can be the transmission when executing the CCA testing mechanism in other periods
The maximum duration of the second class business, this is not restricted.
In some possible embodiments, which is the CCA testing mechanism of short cycle (25us), this is pre-
If threshold value is 1ms.The terminal detects that the remaining holding time of the unauthorized channel is less than 1ms, so that it may not execute the channel
Testing mechanism.
Optionally, if the remaining holding time of the unauthorized channel is greater than or equal to the preset threshold, the end
End executes the Channel Detection mechanism to the unauthorized channel, continues described first to access the unauthorized channel again
The transmission of class business.
In some possible embodiments, which is the CCA testing mechanism of short cycle (25us), this is pre-
If threshold value is 1ms.The terminal detects that the remaining holding time of the unauthorized channel is greater than or equal to 1ms, so that it may which executing should
Channel Detection mechanism, when detecting the unauthorized channel idle by executing the Channel Detection mechanism, so that it may access again
The unauthorized channel, to continue to execute the transmission of the first kind business.
Optionally, if the second class business is transmitted, the terminal judges before transmitting the second class business
Whether the first kind business is transmitted, and the terminal does not execute the Channel Detection machine to the unauthorized channel if completing
System.
In the specific implementation, if the terminal before the unauthorized transmission the second class business, has finished on pair
The transmission of the first kind business, then the terminal can also determine the Channel Detection mechanism not executed to unauthorized channel.
It should also be noted that, the terminal can also not execute the channel to unauthorized channel under other specific conditions
Testing mechanism, this is not restricted.
It should also be noted that, the terminal can be held other than the above-mentioned optional way enumerated and other specific conditions
The row Channel Detection mechanism to unauthorized channel, and when detecting the unauthorized channel idle, it can execute to the first kind
The transmission of business.
In embodiments of the present invention, terminal detect need in unauthorized the second class of channel business, pass through
The first notification message for receiving base station, to transmit the second class business, and after the second class business is transmitted, according to working as
Preceding situation executes the Channel Detection mechanism by selectivity and completes the transmission to the first kind business, can complete to this
The transmission of two class business, while power consumption is also saved, and after the second class business has passed, selectively hold according to present case
The row Channel Detection mechanism, both avoids the wasting of resources, while also effectively preventing different types of service conflict.
Fig. 6 is referred to, is a kind of schematic block diagram of base station provided in an embodiment of the present invention.Base station as shown in FIG. 6 can
To include:
Transmission unit 601, for carrying out the transmission of first kind business on unauthorized channel.
Judging unit 602, for if desired transmitting the second class industry on the running time-frequency resource that the first kind business is scheduled
Business judges the terminal for executing the first kind business and executes whether the terminal of the second class business is same terminal.
Transmission unit 603 executes the second class business to described for sending corresponding notification message according to judging result
Terminal.
Wherein, the notification message includes at least the second class business specified time-frequency shared by the unauthorized channel
Resource;The specified running time-frequency resource at least occupies the money of the few time-frequency in the running time-frequency resource of the scheduled first kind business
Source.
The transmission unit is also used to receive the second class business datum on the specified running time-frequency resource or sends institute
State the second class business datum.
In embodiments of the present invention, by unauthorized transmission first kind business, if necessary to unauthorized at this
Transmission the second class business, then judge to execute the terminal of the first kind business with execute the second class business terminal whether be
Same terminal sends corresponding notification message to the terminal for executing the first kind business to determine, allows the end for executing the second class business
The transmission of the second class business is completed at end according to corresponding notification message, to effectively prevent two types in unauthorized channel
Service conflict.
Referring to Fig. 7, being the schematic block diagram of another base station provided in an embodiment of the present invention, base station as shown in Figure 7
Can include:
Transmission unit 701, for carrying out the transmission of first kind business on unauthorized channel.
Judging unit 702, for if desired transmitting the second class industry on the running time-frequency resource that the first kind business is scheduled
Business judges the terminal for executing the first kind business and executes whether the terminal of the second class business is same terminal.
Transmission unit 703 executes the second class business to described for sending corresponding notification message according to judging result
Terminal.
Wherein, the notification message includes at least the second class business specified time-frequency shared by the unauthorized channel
Resource;The specified running time-frequency resource at least occupies the money of the few time-frequency in the running time-frequency resource of the scheduled first kind business
Source.
The transmission unit 701 is also used to receive the second class business datum or hair on the specified running time-frequency resource
Send the second class business datum.
Optionally, the priority of the second class business is higher than the priority of the first kind business.
The base station further include: processing unit 704, for dividing the specified time-frequency money in the unauthorized channel
Source, and at least interrupt transmission of the first kind business on the specified running time-frequency resource.
Optionally, if the terminal for executing the first kind business is with the terminal for executing the second class business
Same terminal, the transmission unit 703 disappear specifically for sending the first notice to the terminal for executing the second class business
Breath.
Wherein, first notification message includes the specified running time-frequency resource, is used to indicate in the specified running time-frequency resource
Transmit the second class business.
Optionally, if the terminal for executing the first kind business and the terminal for executing the second class business not
For same terminal, the processing unit 704 is also used to set idle shape for the target position for being located at the specified running time-frequency resource
State.
Optionally, the target position occupies at least one symbol, is located at before the specified running time-frequency resource in the time domain.
Optionally, the transmission unit 703, specifically for sending second to the terminal for executing the second class business
Notification message.
Wherein, the second notification message includes the specified running time-frequency resource and the target position that is in idle condition,
The terminal for executing the second class business is used to indicate in the target position execution Channel Detection being in idle condition, and described
Specified running time-frequency resource transmits the second class business.
Optionally, the transmission unit 703 is also used to disappear to the second notice of terminal transmission for executing the first kind business
Breath, for notifying to specify running time-frequency resource to be occupied and described described in the terminal for executing the first kind business by other terminals
Target position is arranged to idle state
In embodiments of the present invention, by unauthorized transmission first kind business, if necessary to unauthorized at this
Transmission the second class business, then judge to execute the terminal of the first kind business with execute the second class business terminal whether be
Same terminal sends corresponding notification message to determine, if it is same terminal, the first notification message is just sent, if not being same
As soon as terminal sends second notification message, terminal can be cooperated to carry out Channel Detection, ensure that the end for executing the second class business
The transmission of the second class business is completed at end according to corresponding notification message, to effectively prevent two types in unauthorized channel
Service conflict.
Fig. 8 is referred to, is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal as shown in Figure 8 can
Include:
Receiving unit 801, for receiving the notification message of base station transmission.
Wherein, the notification message includes at least the second class business specifying in unauthorized channel that the terminal need to execute
Running time-frequency resource, the specified running time-frequency resource at least occupy the running time-frequency resource for the first kind business being scheduled in the unauthorized channel
In portion of time frequency resources.
Transmission unit 802, for receiving the second class business on the specified running time-frequency resource that the notification message indicates
Data send the second class business datum.
Optionally, the notification message is second notification message, and the second notification message further includes being in idle condition
Target position.
The terminal further include: access unit 803, for the instruction according to the second notification message in idle shape
The target position of state executes Channel Detection, to access the unauthorized channel.
In embodiments of the present invention, needs are being detected in unauthorized the second class of channel business, then by connecing
The notification message of base station is received, cooperation can be completed to this when executing Channel Detection mechanism and not executing Channel Detection mechanism
The transmission of second class business, saves power consumption, and effectively prevents different types of service conflict.
Fig. 9 is referred to, is the schematic block diagram of another terminal provided in an embodiment of the present invention.Terminal as shown in Figure 9
Can include:
Receiving unit 901, for receiving the notification message of base station transmission.
Wherein, the notification message includes at least the second class business specifying in unauthorized channel that the terminal need to execute
Running time-frequency resource, the specified running time-frequency resource at least occupy the running time-frequency resource for the first kind business being scheduled in the unauthorized channel
In portion of time frequency resources.
Transmission unit 902, for receiving the second class business on the specified running time-frequency resource that the notification message indicates
Data send the second class business datum.
Optionally, the terminal further include: execution unit 903, for executing first kind industry on the unauthorized channel
The transmission of business;The priority of the first kind business is lower than the priority of the second class business.
Interrupt location 904 receives on the specified running time-frequency resource that the notification message indicates for the transmission unit 902
Before the second class business datum or transmission the second class business datum, the first kind business is at least interrupted in the finger
Determine the transmission on running time-frequency resource.
Optionally, the terminal further include: judging unit 905, for judging that the second class business is transmitted when institute
Whether the remaining holding time for stating unauthorized channel is less than preset threshold.
Wherein, access unit 906, if specifically for the unauthorized channel remaining holding time be greater than or equal to it is described
Preset threshold, then execute to the Channel Detection mechanism of the unauthorized channel, with access again the unauthorized channel continue into
The transmission of the row first kind business is not held if the remaining holding time of the unauthorized channel is less than the preset threshold
Channel Detection mechanism of the row to the unauthorized channel.
In embodiments of the present invention, detect need in unauthorized the second class of channel business, pass through reception
First notification message of base station, to transmit the second class business, and after the second class business is transmitted, according to current
Situation executes the Channel Detection mechanism by selectivity to complete the transmission to the first kind business, can complete to second class
The transmission of business, while power consumption is also saved, and after the second class business has passed, selectively being executed according to present case should
Channel Detection mechanism both avoids the wasting of resources, while also effectively preventing different types of service conflict.
Referring to Figure 10, be another embodiment of the present invention provides a kind of base station schematic block diagram.The present embodiment is retouched
The base station stated, comprising: at least one input equipment 1000;At least one processor 2000, such as CPU;At least one processor
3000;At least one communication interface 4000, above-mentioned input equipment 1000, processor 2000, memory 3000 and communication interface
4000 are connected by bus.
It should be appreciated that in embodiments of the present invention, above-mentioned input equipment 1000 can be the equipment to terminal input signal,
It may include touch panel, may include touch screen and touch screen etc. in the touch panel.Above-mentioned communication interface 4000 can wrap
Include display (LCD etc.).
Above-mentioned processor 2000 can be central processing unit (Central Processing Unit, CPU), the processing
Device can also be other general processors, digital signal processor (Digital Signal Processor, DSP), dedicated collection
At circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
Above-mentioned memory 3000 may include read-only memory and random access memory, and refer to the offer of processor 2000
Order and data.The a part of of memory 3000 can also include nonvolatile RAM.For example, memory 3000 is also
It can store the information of device type.
Specifically, the program instruction that above-mentioned processor 2000 can call above-mentioned memory 3000 to store, realizes such as this hair
Method shown in bright embodiment base station side.
Specifically, above-mentioned processor 2000, which calls, is stored in the following step of program instruction execution that above-mentioned memory 3000 stores
It is rapid:
The transmission of first kind business is carried out on unauthorized channel;
If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, judges to execute described the
Whether the terminal of a kind of business and the terminal for executing the second class business are same terminal;
Corresponding notification message is sent to the terminal for executing the second class business according to judging result, wherein described
Notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;The specified time-frequency
Resource at least occupies the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The second class business datum is received on the specified running time-frequency resource or sends the second class business datum.
The method that processor executes in the embodiment of the present invention is described from the angle of processor, it is to be understood that this
Processor will execute the cooperation that the above method needs other hardware configurations in inventive embodiments.For example, enterprising in unauthorized channel
The transmission of row first kind business controls above-mentioned communication interface 4000 by above-mentioned processor 2000 to transmit related data, and judgement is held
Whether the terminal of the row first kind business and the terminal of execution the second class business are same terminal, are sent out according to judging result
It send corresponding notification message to the terminal for executing the second class business, above-mentioned deposit can be controlled by above-mentioned processor 2000
Storage program in reservoir 3000 is realized.The embodiment of the present invention is not described in detail and limits to concrete implementation process.
Optionally, which can realize that above-mentioned Fig. 2 and Fig. 3 is corresponding real by above-mentioned processor 2000 and other equipment
Apply the corresponding steps that base station executes in the method in example.It should be understood that the embodiment of the present invention is the entity dress of corresponding method embodiment
Embodiment is set, the description to embodiment of the method is also applied for the embodiment of the present invention.
In embodiments of the present invention, in unauthorized transmission first kind business, if necessary in the unauthorized channel
The second class business is transmitted, then judges the terminal for executing the first kind business and whether the terminal for executing the second class business is same
Terminal sends corresponding notification message to the terminal for executing the first kind business to determine, allows the terminal root for executing the second class business
The transmission of the second class business is completed according to corresponding notification message, to effectively prevent two types in the industry of unauthorized channel
Business conflict.
A kind of computer readable storage medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program and may be implemented when the computer program is executed by processor: is carried out on unauthorized channel
The transmission of a kind of business;If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, judgement is held
Whether the terminal of the row first kind business and the terminal of execution the second class business are same terminal;It is sent out according to judging result
Send corresponding notification message to the terminal for executing the second class business, wherein the notification message includes at least described the
Two class business specified running time-frequency resource shared by the unauthorized channel;The specified running time-frequency resource at least occupies described scheduled
First kind business running time-frequency resource in portion of time frequency resources;The second class business is received on the specified running time-frequency resource
Data send the second class business datum.
It should be noted that the detailed process that the computer readable storage medium is executed by processor can be found in the second implementation
Method described in example and 3rd embodiment, details are not described herein.
The computer readable storage medium can be the internal storage unit of terminal described in aforementioned any embodiment, example
Such as the hard disk or memory of terminal.The computer readable storage medium is also possible to the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped in the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer readable storage medium can also be wrapped both
The internal storage unit for including the terminal also includes External memory equipment.The computer readable storage medium is described for storing
Other programs and data needed for computer program and the terminal.The computer readable storage medium can be also used for temporarily
When store the data that has exported or will export.
Referring to Figure 11, be another embodiment of the present invention provides a kind of terminal schematic block diagram.The present embodiment is retouched
The terminal stated, comprising: at least one input equipment 5000;At least one processor 6000, such as CPU;At least one processor
7000;At least one output equipment 8000, above-mentioned input equipment 5000, processor 6000, memory 7000 and output equipment
8000 are connected by bus.
It should be appreciated that in embodiments of the present invention, above-mentioned input equipment 5000 can be the equipment to terminal input signal,
It may include touch panel, may include touch screen and touch screen etc. in the touch panel.Above-mentioned output equipment 8000 can wrap
Include display (LCD etc.).
Above-mentioned processor 6000 can be central processing unit (Central Processing Unit, CPU), the processing
Device can also be other general processors, digital signal processor (Digital Signal Processor, DSP), dedicated collection
At circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
Above-mentioned memory 7000 may include read-only memory and random access memory, and refer to the offer of processor 6000
Order and data.The a part of of memory 7000 can also include nonvolatile RAM.For example, memory 7000 is also
It can store the information of device type.
The program instruction that above-mentioned processor 2000 can call above-mentioned memory 3000 to store realizes such as the embodiment of the present invention
Method shown in base station side.
Specifically, above-mentioned processor 6000, which calls, is stored in the following step of program instruction execution that above-mentioned memory 7000 stores
It is rapid:
Receive the notification message that base station is sent;The notification message includes at least the second class business that the terminal need to execute
In the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies the to be scheduled in the unauthorized channel
Portion of time frequency resources in the running time-frequency resource of a kind of business;
The second class business datum is received on the specified running time-frequency resource of notification message instruction or sends described the
Two class business datums.
The method that processor executes in the embodiment of the present invention is described from the angle of processor, it is to be understood that this
Processor will execute the cooperation that the above method needs other hardware configurations in inventive embodiments.For example, receiving the logical of base station transmission
Know message, above-mentioned input equipment 5000 is controlled by above-mentioned processor 6000 to transmit related data, is indicated in the notification message
Specified running time-frequency resource on receive the second class business datum or send the second class business datum, can be by above-mentioned processing
Device 2000 control storage program in above-mentioned memory 3000 and above-mentioned input equipment 5000 and above-mentioned output equipment 8000 into
Row is realized.The embodiment of the present invention is not described in detail and limits to concrete implementation process.
Optionally, which can realize that above-mentioned Fig. 4 and Fig. 5 is corresponding real by above-mentioned processor 6000 and other equipment
Apply the corresponding steps that base station executes in the method in example.It should be understood that the embodiment of the present invention is the entity dress of corresponding method embodiment
Embodiment is set, the description to embodiment of the method is also applied for the embodiment of the present invention.
In embodiments of the present invention, needs are being detected in unauthorized the second class of channel business, then by connecing
The notification message of base station is received, cooperation can be completed to this when executing Channel Detection mechanism and not executing Channel Detection mechanism
The transmission of second class business, saves power consumption, and effectively prevents different types of service conflict.
A kind of computer readable storage medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program and may be implemented when the computer program is executed by processor: receiving the notice that base station is sent and disappears
Breath;The notification message includes at least the second class business that need to execute of the terminal in the specified running time-frequency resource of unauthorized channel,
The specified running time-frequency resource at least occupies the part in the running time-frequency resource for the first kind business being scheduled in the unauthorized channel
Running time-frequency resource;The second class business datum is received on the specified running time-frequency resource of notification message instruction or sends described the
Two class business datums.
It should be noted that the detailed process that the computer readable storage medium is executed by processor can be found in the 4th implementation
Method described in example and the 5th embodiment, details are not described herein.
The computer readable storage medium can be the internal storage unit of terminal described in aforementioned any embodiment, example
Such as the hard disk or memory of terminal.The computer readable storage medium is also possible to the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped in the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer readable storage medium can also be wrapped both
The internal storage unit for including the terminal also includes External memory equipment.The computer readable storage medium is described for storing
Other programs and data needed for computer program and the terminal.The computer readable storage medium can be also used for temporarily
When store the data that has exported or will export.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This
A little functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Specially
Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
The specific work process at end and unit, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed terminal and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored or not executed.In addition, shown or discussed phase
Mutually between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication of device or unit
Connection is also possible to electricity, mechanical or other form connections.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs
Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, is also possible to two or more units and is integrated in one unit.It is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace
It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection scope subject to.
Claims (26)
1. a kind of method for avoiding service conflict characterized by comprising
Base station carries out the transmission of first kind business on unauthorized channel;
If desired the second class business is transmitted on the running time-frequency resource that the first kind business is scheduled, base station judgement executes described the
Whether the terminal of a kind of business and the terminal for executing the second class business are same terminal;
The base station sends corresponding notification message to the terminal for executing the second class business according to judging result, wherein
The notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;It is described specified
Running time-frequency resource at least occupies the portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The base station receives the second class business datum on the specified running time-frequency resource or sends the second class business number
According to.
2. the method as described in claim 1, which is characterized in that the priority of the second class business is higher than the first kind industry
The priority of business;
The base station sends corresponding notification message to the terminal and execution for executing the first kind business according to judging result
Before the terminal of the second class business, further includes:
The base station divides the specified running time-frequency resource in the unauthorized channel, and at least interrupts the first kind business and exist
Transmission on the specified running time-frequency resource.
3. method according to claim 2, which is characterized in that if the terminal for executing the first kind business is held with described
The terminal of row the second class business is same terminal;The base station sends corresponding notification message according to judging result and holds to described
The terminal of row the second class business, comprising:
The base station sends the first notification message to the terminal for executing the second class business;
Wherein, first notification message includes the specified running time-frequency resource, is used to indicate and transmits in the specified running time-frequency resource
The second class business.
4. method according to claim 2, which is characterized in that if the terminal for executing the first kind business is held with described
The terminal of row the second class business is not same terminal;The base station sends corresponding notification message to described according to judging result
Before the terminal for executing the second class business, further includes:
The target position for being located at the specified running time-frequency resource is set idle state by the base station.
5. method as claimed in claim 4, which is characterized in that the target position occupies at least one symbol, in the time domain
Before the specified running time-frequency resource.
6. method as claimed in claim 4, which is characterized in that the base station according to judging result send corresponding notification message to
The terminal for executing the second class business, comprising:
The base station sends second notification message to the terminal for executing the second class business;
Wherein, the second notification message includes the specified running time-frequency resource and the target position that is in idle condition, is used for
Indicate that the terminal for executing the second class business executes Channel Detection in the target position being in idle condition, and described specified
Running time-frequency resource transmits the second class business.
7. method as claimed in claim 6, which is characterized in that the method also includes:
The base station sends second notification message to the terminal for executing the first kind business, described executes described for notifying
Specified running time-frequency resource is occupied by other terminals described in the terminal of a kind of business and the target position is arranged to idle state.
8. a kind of method for avoiding service conflict characterized by comprising
Terminal receives the notification message that base station is sent;The notification message includes at least the second class business that the terminal need to execute
In the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies the to be scheduled in the unauthorized channel
Portion of time frequency resources in the running time-frequency resource of a kind of business;
The terminal receives the second class business datum on the specified running time-frequency resource that the notification message indicates or sends institute
State the second class business datum.
9. method according to claim 8, which is characterized in that before the notification message that the terminal receives that base station is sent,
The method also includes:
The terminal executes the transmission of first kind business on the unauthorized channel;The priority of the first kind business is lower than
The priority of the second class business;
The terminal receives the second class business datum on the specified running time-frequency resource that the notification message indicates or sends institute
Before stating the second class business datum, the method also includes:
The terminal at least interrupts transmission of the first kind business on the specified running time-frequency resource.
10. method according to claim 8, which is characterized in that the notification message is second notification message, and described second is logical
Know that message further includes the target position being in idle condition;
The terminal receives the second class business datum on the specified running time-frequency resource that the notification message indicates or sends institute
Before stating the second class business datum, the method also includes:
The terminal executes Channel Detection in the target position being in idle condition according to the instruction of the second notification message, with
Access the unauthorized channel.
11. method according to claim 8, which is characterized in that further include:
The terminal judges whether the remaining holding time of unauthorized channel when the second class business is transmitted is less than
Preset threshold;
If the remaining holding time of the unauthorized channel is greater than or equal to the preset threshold, the terminal is executed to described
The Channel Detection mechanism of unauthorized channel, to access the biography that the unauthorized channel continues the first kind business again
It is defeated;
If the remaining holding time of the unauthorized channel is less than the preset threshold, the terminal does not execute non-awards to described
Weigh the Channel Detection mechanism of channel.
12. a kind of base station characterized by comprising
Transmission unit, for carrying out the transmission of first kind business on unauthorized channel;
Judging unit judges for if desired transmitting the second class business on the running time-frequency resource that the first kind business is scheduled
It executes the terminal of the first kind business and executes whether the terminal of the second class business is same terminal;
Transmission unit, for sending corresponding notification message to the terminal for executing the second class business according to judging result,
Wherein, the notification message includes at least the second class business specified running time-frequency resource shared by the unauthorized channel;Institute
It states specified running time-frequency resource and at least occupies portion of time frequency resources in the running time-frequency resource of the scheduled first kind business;
The transmission unit is also used to receive the second class business datum on the specified running time-frequency resource or sends described the
Two class business datums.
13. base station as claimed in claim 12, which is characterized in that the priority of the second class business is higher than the first kind
The priority of business;
The base station further include:
Processing unit for dividing the specified running time-frequency resource in the unauthorized channel, and at least interrupts the first kind
Transmission of the business on the specified running time-frequency resource.
14. base station as claimed in claim 13, which is characterized in that if the terminal for executing the first kind business with it is described
The terminal for executing the second class business is same terminal;The transmission unit is specifically used for executing second class to described
The terminal of business sends the first notification message;
Wherein, first notification message includes the specified running time-frequency resource, is used to indicate and transmits in the specified running time-frequency resource
The second class business.
15. base station as claimed in claim 13, which is characterized in that if the terminal for executing the first kind business with it is described
The terminal for executing the second class business is not same terminal;The processing unit is also used to be located at the specified time-frequency money
The target position in source is set as idle state.
16. base station as claimed in claim 15, which is characterized in that the target position occupies at least one symbol, in time domain
It is upper to be located at before the specified running time-frequency resource.
17. base station as claimed in claim 15, which is characterized in that the transmission unit is specifically used for described in the execution
The terminal of second class business sends second notification message;
Wherein, the second notification message includes the specified running time-frequency resource and the target position that is in idle condition, is used for
Indicate that the terminal for executing the second class business executes Channel Detection in the target position being in idle condition, and described specified
Running time-frequency resource transmits the second class business.
18. base station as claimed in claim 17, which is characterized in that the transmission unit is also used to the execution first kind
The terminal of business sends second notification message, and time-frequency money is specified described in the terminal for executing the first kind business for notifying
Source is occupied by other terminals and the target position is arranged to idle state.
19. a kind of terminal characterized by comprising
Receiving unit, for receiving the notification message of base station transmission;The notification message includes at least what the terminal need to execute
In the specified running time-frequency resource of unauthorized channel, the specified running time-frequency resource at least occupies in the unauthorized channel second class business
Portion of time frequency resources in the running time-frequency resource of scheduled first kind business;
Transmission unit, for receiving the second class business datum or hair on the specified running time-frequency resource that the notification message indicates
Send the second class business datum.
20. terminal as claimed in claim 19, which is characterized in that the terminal further include:
Execution unit, for executing the transmission of first kind business on the unauthorized channel;The first kind business it is preferential
Grade is lower than the priority of the second class business;
Interrupt location receives second class for the transmission unit on the specified running time-frequency resource that the notification message indicates
Before business datum or transmission the second class business datum, the first kind business is at least interrupted in the specified running time-frequency resource
On transmission.
21. terminal as claimed in claim 19, which is characterized in that the notification message be second notification message, described second
Notification message further includes the target position being in idle condition;
The terminal further include:
Access unit executes channel inspection in the target position being in idle condition for the instruction according to the second notification message
It surveys, to access the unauthorized channel.
22. terminal as claimed in claim 19, which is characterized in that further include:
Judging unit, whether the remaining holding time of the unauthorized channel when for judging that the second class business is transmitted
Less than preset threshold;
Wherein, the access unit, if specifically for the unauthorized channel remaining holding time be greater than or equal to it is described pre-
If threshold value, then the Channel Detection mechanism to the unauthorized channel is executed, is continued with accessing the unauthorized channel again
The transmission of the first kind business does not execute if the remaining holding time of the unauthorized channel is less than the preset threshold
To the Channel Detection mechanism of the unauthorized channel.
23. a kind of base station, which is characterized in that the processor, defeated including processor, input equipment, communication interface and memory
Enter equipment, communication interface and memory to be connected with each other, wherein the memory is for storing application code, the processing
Device is configured for calling said program code, executes the method according to claim 1 to 7.
24. a kind of terminal, which is characterized in that the processor, defeated including processor, input equipment, output equipment and memory
Enter equipment, output equipment and memory to be connected with each other, wherein the memory is for storing application code, the processing
Device is configured for calling said program code, executes such as the described in any item methods of claim 8-11.
25. a kind of computer readable storage medium, which is characterized in that the computer storage medium is stored with computer program,
The computer program includes program instruction, and described program instruction makes the processor execute such as right when being executed by a processor
It is required that the described in any item methods of 1-7.
26. a kind of computer readable storage medium, which is characterized in that the computer storage medium is stored with computer program,
The computer program includes program instruction, and described program instruction makes the processor execute such as right when being executed by a processor
It is required that the described in any item methods of 8-11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710503966.0A CN109152077A (en) | 2017-06-27 | 2017-06-27 | A kind of method avoiding service conflict and relevant device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710503966.0A CN109152077A (en) | 2017-06-27 | 2017-06-27 | A kind of method avoiding service conflict and relevant device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109152077A true CN109152077A (en) | 2019-01-04 |
Family
ID=64805533
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710503966.0A Withdrawn CN109152077A (en) | 2017-06-27 | 2017-06-27 | A kind of method avoiding service conflict and relevant device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109152077A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021087909A1 (en) * | 2019-11-07 | 2021-05-14 | Oppo广东移动通信有限公司 | Signal transmission method and device, and mobile terminal and storage medium |
WO2024051301A1 (en) * | 2022-09-09 | 2024-03-14 | 华为技术有限公司 | Communication method and apparatus |
-
2017
- 2017-06-27 CN CN201710503966.0A patent/CN109152077A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021087909A1 (en) * | 2019-11-07 | 2021-05-14 | Oppo广东移动通信有限公司 | Signal transmission method and device, and mobile terminal and storage medium |
CN114900892A (en) * | 2019-11-07 | 2022-08-12 | Oppo广东移动通信有限公司 | Signal transmission method, device, mobile terminal and storage medium |
WO2024051301A1 (en) * | 2022-09-09 | 2024-03-14 | 华为技术有限公司 | Communication method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109699084B (en) | Information transmission method, terminal and network equipment under unlicensed frequency band | |
CN105898883B (en) | A kind of configuration method of lead code, sending method and relevant device | |
US10736038B2 (en) | Channel monitoring method and device | |
EP3576481B1 (en) | Data transmission method and user equipment | |
CN108282895A (en) | A kind of accidental access method and terminal | |
JP2017534221A (en) | Channel sharing for license-assisted access in long-term evolution operations | |
CN110932829B (en) | Transmission time indication method of unlicensed frequency band, network equipment and terminal | |
CN105122858A (en) | Handling downlink semi-persistent scheduling retransmission in wireless networks | |
CN107949067A (en) | The control method and relevant apparatus of a kind of Channel Detection | |
EP3253146B1 (en) | Data transmission method and data transmission site | |
US20190045532A1 (en) | Method and terminal for detecting scheduling instructions | |
CN109699078B (en) | Information transmission method under unlicensed frequency band, network device and terminal | |
CN110167050A (en) | A kind of transmission method and terminal of channel status information reports | |
CN111148261B (en) | Uplink transmission method, user equipment and network side equipment | |
CN109644454A (en) | Terminal wake-up control method, device and storage medium | |
CN103460784A (en) | Method, apparatus and computer program product for triggering the determination of a timing advance for one component carrier based upon another component carrier | |
CN105764146B (en) | A kind of method of sub-frame configuration, method, relevant device and the system of data transmission | |
CN109150475A (en) | A kind of information transferring method, base station and terminal | |
CN107371243A (en) | A kind of resource determining method, relevant device and system | |
CN109152077A (en) | A kind of method avoiding service conflict and relevant device | |
CN110149716A (en) | Communication means and communication device | |
CN104285460B (en) | Method and apparatus for managing wireless transmitter | |
CN108282318B (en) | Configuration method of transmission resources, base station and terminal | |
CN110351864A (en) | A kind of indicating means interrupting transmission, network side equipment and terminal | |
CN109803378A (en) | A kind of resource selection triggering method and user terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190104 |