CN109691212A - The cell switching method and equipment of unauthorized uplink - Google Patents

The cell switching method and equipment of unauthorized uplink Download PDF

Info

Publication number
CN109691212A
CN109691212A CN201780054238.4A CN201780054238A CN109691212A CN 109691212 A CN109691212 A CN 109691212A CN 201780054238 A CN201780054238 A CN 201780054238A CN 109691212 A CN109691212 A CN 109691212A
Authority
CN
China
Prior art keywords
target
unauthorized
terminal device
transmission
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780054238.4A
Other languages
Chinese (zh)
Other versions
CN109691212B (en
Inventor
庄宏成
韩云博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN109691212A publication Critical patent/CN109691212A/en
Application granted granted Critical
Publication of CN109691212B publication Critical patent/CN109691212B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling

Abstract

The application provides the cell switching method and equipment of a kind of unauthorized uplink, source base station is by including switching type information into the switching request message that target BS is sent, switching type information is used to indicate terminal device and supports unauthorized transmission, and the characteristic of the unauthorized business of terminal device, to obtain the first unauthorized transmission of configuration information, first unauthorized transmission of configuration information includes that terminal device and target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, and switching command message is sent to terminal device, it include the first unauthorized transmission of configuration information in switching command message.Since terminal device obtains the first unauthorized transmission of configuration information for communicating and using with target BS in advance, not only reduce blind examination of the target BS to the unauthorized business of terminal device, it is ensured that being properly received for unauthorized business.

Description

The cell switching method and equipment of unauthorized uplink
This application claims Patent Office of the People's Republic of China is submitted on June 27th, 2017, application No. is 201710502216.1, a kind of priority of the Chinese patent application of application entitled " method of grant-free uplink switching ", entire contents are hereby incorporated by reference in the application.
Technical field
This application involves the communication technologys, more particularly to a kind of cell switching method and equipment of unauthorized (grant-free) uplink.
Background technique
At present, existing mobile communication system is mainly used based on request-authorization uplink data transmission method, but becoming increasingly abundant with application scenarios, terminal type and application type, in the evolution process of future mobile communication system, terminal device number will be in explosive growth, and user also has high requirement to network delay under specific application scene.In this case, it is traditional based on request-authorization uplink data transmission method since higher time delay and signaling overheads will be no longer applicable in.
Compared to traditional based on request-authorization transmission method, in unauthorized transmission method, user directly sends upstream data using specific resource, does not need to undergo the process from service request to base station uplink authorization, therefore, there is very big advantage in terms of network delay and signaling overheads.In unauthorized transmission method, equally exist cell handoff scenario, in existing method, source base station carries out cell switch determining, and switching request is sent to target BS, carried terminal equipment carries out code resource used by the selected competition transmission unit (Contention Transmission Unit, CTU) of unauthorized transmission and terminal device in switching request message.After target BS receives the switching request message of source base station, according to the loading condition of target BS, and competition transmission unit and code resource used by terminal device, judge whether to agree to that the terminal device accesses target BS using the competition transmission unit and code resource carried in switching request message;If agreeing to that the terminal accesses target BS using the competition transmission unit and code resource carried in switching request message, indicate that the terminal device carries out unauthorized transmission using the competition transmission unit and code resource carried in switching request message in switching request acknowledgement message;Target BS is accessed using the competition transmission unit and code resource carried in switching request message if disagreeing the terminal device, indicates new competition transmission unit and code resource to terminal device in switching request acknowledgement message.
But, competition transmission unit and code resource information have only been sent to terminal device by target BS in the prior art, the parameter that will not eat dishes without rice or wine is sent to terminal device, the parameter difference of eating dishes without rice or wine used due to different scenes and business, therefore, do not ensure that target BS is properly received the data of unauthorized business.
Summary of the invention
The application provides the cell switching method and equipment of a kind of unauthorized uplink, ensure that being properly received for unauthorized business.
The application first aspect provides a kind of cell switching method of unauthorized uplink, comprising:
Source base station sends switching request message to target BS, includes switching type information in the switching request message, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
The source base station receives the handoff response that target BS is sent, it include the first unauthorized transmission of configuration information in the handoff response, the first unauthorized transmission of configuration information includes: the terminal device and the target BS carries out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, and the information of the first unauthorized transfer resource and the configuration information of the first ascending idle port configured transmission are that the target BS is determined according to the characteristic of the unauthorized business;
The source base station sends switching command message to the terminal device, includes the described first unauthorized transmission of configuration information in the switching command message.
Optionally, further include in the handoff response target BS pilot signal transmission power, further include Timing Advance of the terminal device in the target BS in the switching command message, then the method also includes:
The source base station determines the terminal device in the Timing Advance of the target BS according to the transmission power of the pilot signal of the target BS.
It optionally, further include Timing Advance of the terminal device in the target BS in the handoff response.
It optionally, further include the uplink synchronous resource of the target BS in the handoff response and the switching command message.
The application second aspect provides a kind of cell switching method of unauthorized uplink, comprising:
Terminal device receives the switching command message that source base station is sent, it include the first unauthorized transmission of configuration information in the switching command message, the first unauthorized transmission of configuration information includes: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission
The terminal device sends unauthorized business according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS.
It optionally, include: Timing Advance of the terminal device in the target BS in the switching command message, the Timing Advance is determined by the source base station or the target BS;
The terminal device sends unauthorized business according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS, comprising:
The terminal device sends unauthorized business according to the described first unauthorized transmission of configuration information and the Timing Advance, Xiang Suoshu target BS.
It optionally, include: the uplink synchronous resource of the target BS in the switching command message;
The terminal device is sent before unauthorized business according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS, further includes:
The terminal device sends signal in the uplink synchronous resource of the target BS;
The terminal device receives Timing Advance of the terminal device in target BS of the target BS transmission, and the terminal device is that the signal that the target BS is sent in the uplink synchronous resource of the target BS according to the terminal device is determining in the Timing Advance of target BS;
The terminal device sends unauthorized business according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS, comprising:
Timing Advance of the terminal device according to the described first unauthorized transmission of configuration information and the terminal device in target BS, the unauthorized business of Xiang Suoshu target BS transmission.
The application third aspect provides a kind of cell switching method of unauthorized uplink, comprising:
Target BS receives the switching request message that source base station is sent, and includes switching type information in the switching request message, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
The target BS is according to the characteristic of the unauthorized business, determine that the first unauthorized transmission of configuration information, the first unauthorized transmission of configuration information include: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
The target BS sends handoff response to the source base station, includes the described first unauthorized transmission of configuration information in the handoff response.
Optionally, further include the RSRP for the target BS that the terminal device measurement obtains in the switching request, further include Timing Advance of the terminal device in the target BS in the handoff response, then the method also includes:
The RSRP for the target BS that the target BS is obtained according to the terminal device measurement determines the terminal device in the Timing Advance of the target BS.
Optionally, further include in the handoff response target BS pilot signal the uplink synchronous resource for sending power or the target BS.
The application fourth aspect provides a kind of source base station, comprising:
Sending module includes switching type information in the switching request message for sending switching request message to target BS, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
Receiving module, for receiving the handoff response of target BS transmission, it include the first unauthorized transmission of configuration information in the handoff response, the first unauthorized transmission of configuration information includes: the terminal device and the target BS carries out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, and the information of the first unauthorized transfer resource and the configuration information of the first ascending idle port configured transmission are that the target BS is determined according to the characteristic of the unauthorized business;
The sending module is also used to send switching command message to the terminal device, includes the described first unauthorized transmission of configuration information in the switching command message.
Optionally, further include in the handoff response target BS pilot signal transmission power, further include Timing Advance of the terminal device in the target BS in the switching command message, then the source base station further include:
Determining module determines the terminal device in the Timing Advance of the target BS for the transmission power according to the pilot signal of the target BS.
It optionally, further include Timing Advance of the terminal device in the target BS in the handoff response.
It optionally, further include the uplink synchronous resource of the target BS in the handoff response and the switching command message.
The 5th aspect of the application provides a kind of terminal device, comprising:
Receiving module includes first in the switching command message for receiving the switching command message of source base station transmission Unauthorized transmission of configuration information, the first unauthorized transmission of configuration information include: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
Sending module, for according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS to send unauthorized business.
It optionally, include: Timing Advance of the terminal device in the target BS in the switching command message, the Timing Advance is determined by the source base station or the target BS;
The sending module, is specifically used for: according to the described first unauthorized transmission of configuration information and the Timing Advance, Xiang Suoshu target BS sends unauthorized business.
It optionally, include: the uplink synchronous resource of the target BS in the switching command message;
The sending module is also used to send signal in the uplink synchronous resource of the target BS;
The receiving module, it is also used to receive Timing Advance of the terminal device in target BS of the target BS transmission, the terminal device is that the signal that the target BS is sent in the uplink synchronous resource of the target BS according to the terminal device is determining in the Timing Advance of target BS;
The sending module is according to the described first unauthorized transmission of configuration information, unauthorized business is sent to the target BS, specifically: the Timing Advance according to the described first unauthorized transmission of configuration information and the terminal device in target BS, the unauthorized business of Xiang Suoshu target BS transmission.
The 6th aspect of the application provides a kind of target BS, comprising:
Receiving module includes switching type information in the switching request message for receiving the switching request message of source base station transmission, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
Processing module, for the characteristic according to the unauthorized business, determine that the first unauthorized transmission of configuration information, the first unauthorized transmission of configuration information include: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
Sending module includes the described first unauthorized transmission of configuration information in the handoff response for sending handoff response to the source base station.
Optionally, further include the RSRP for the target BS that the terminal device measurement obtains in the switching request, further include Timing Advance of the terminal device in the target BS in the handoff response, the processing module is also used to:
According to the RSRP for the target BS that the terminal device measurement obtains, determine the terminal device in the Timing Advance of the target BS.
Optionally, further include in the handoff response target BS pilot signal the uplink synchronous resource for sending power or the target BS.
The 7th aspect of the application provides a kind of source base station source base station, comprising:
Transmitter includes switching type information in the switching request message for sending switching request message to target BS, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
Receiver includes the first unauthorized transmission of configuration information in the handoff response for receiving the handoff response of target BS transmission, and the first unauthorized transmission of configuration information includes: that the terminal device and the target BS carry out The configuration information of the unauthorized information for transmitting the first unauthorized transfer resource used and the first ascending idle port configured transmission, the information of the first unauthorized transfer resource and the configuration information of the first ascending idle port configured transmission are that the target BS is determined according to the characteristic of the unauthorized business;
The transmitter is also used to send switching command message to the terminal device, includes the described first unauthorized transmission of configuration information in the switching command message.
Optionally, further include in the handoff response target BS pilot signal transmission power, further include Timing Advance of the terminal device in the target BS in the switching command message, then the source base station further include:
Processor determines the terminal device in the Timing Advance of the target BS for the transmission power according to the pilot signal of the target BS.
It optionally, further include Timing Advance of the terminal device in the target BS in the handoff response.
It optionally, further include the uplink synchronous resource of the target BS in the handoff response and the switching command message.
The application eighth aspect provides a kind of terminal device, comprising:
Receiver, for receiving the switching command message of source base station transmission, it include the first unauthorized transmission of configuration information in the switching command message, the first unauthorized transmission of configuration information includes: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
Transmitter, for according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS to send unauthorized business.
It optionally, include: Timing Advance of the terminal device in the target BS in the switching command message, the Timing Advance is determined by the source base station or the target BS;
The transmitter, is specifically used for: according to the described first unauthorized transmission of configuration information and the Timing Advance, Xiang Suoshu target BS sends unauthorized business.
It optionally, include: the uplink synchronous resource of the target BS in the switching command message;
The transmitter is also used to send signal in the uplink synchronous resource of the target BS;
The receiver, it is also used to receive Timing Advance of the terminal device in target BS of the target BS transmission, the terminal device is that the signal that the target BS is sent in the uplink synchronous resource of the target BS according to the terminal device is determining in the Timing Advance of target BS;
The transmitter is according to the described first unauthorized transmission of configuration information, unauthorized business is sent to the target BS, specifically: the Timing Advance according to the described first unauthorized transmission of configuration information and the terminal device in target BS, the unauthorized business of Xiang Suoshu target BS transmission.
The 9th aspect of the application provides a kind of target BS, comprising:
Receiver includes switching type information in the switching request message for receiving the switching request message of source base station transmission, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
Processor, for the characteristic according to the unauthorized business, determine that the first unauthorized transmission of configuration information, the first unauthorized transmission of configuration information include: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
Transmitter includes the described first unauthorized transmission of configuration information in the handoff response for sending handoff response to the source base station.
Optionally, further include the RSRP for the target BS that the terminal device measurement obtains in the switching request, further include Timing Advance of the terminal device in the target BS in the handoff response, the processor is also used to:
According to the RSRP for the target BS that the terminal device measurement obtains, determine the terminal device in the Timing Advance of the target BS.
Optionally, further include in the handoff response target BS pilot signal the uplink synchronous resource for sending power or the target BS.
In the application first aspect into the 9th aspect, it further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.
Further, further include in the switching request message terminal device unauthorized business buffer status report BSR.
In the application first aspect into the 9th aspect, the first ascending idle port configured transmission or the second ascending idle port parameter include at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.
Optionally, the uplink waveform includes the orthogonal frequency division multiplexing DFT-S-OFDM or multicarrier cyclic prefix orthogonal frequency division multiplexing CP-OFDM of single carrier Discrete Fourier transformation spread spectrum;The multi-access mode includes orthogonal frequency division multiple access OFDMA or non-orthogonal multiple NOMA;The wireless frame structure includes demodulated reference signal DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
The tenth aspect of the application provides a kind of computer-readable medium, and the computer-readable medium includes computer executed instructions, the method that the computer executed instructions are used to that source base station to be made to execute the offer of the application first aspect.
The tenth one side of the application provides a kind of computer-readable medium, and the computer-readable medium includes computer executed instructions, the method that the computer executed instructions are used to that terminal device to be made to execute the offer of the application second aspect.
The 12nd aspect of the application provides a kind of computer-readable medium, and the computer-readable medium includes computer executed instructions, the method that the computer executed instructions are used to that target BS to be made to execute the offer of the application third aspect.
The 13rd aspect of the application provides a kind of system on chip, the system can be applied to source base station, the system on chip includes: at least one communication interface, at least one processor, at least one processor, the communication interface, memory and processor call the instruction stored in the memory by bus bar, the processor, the operation of source base station in the method to execute the offer of the application first aspect.
The application fourteenth aspect provides a kind of system on chip, the system can be applied to terminal device, the system on chip includes: at least one communication interface, at least one processor, at least one processor, the communication interface, memory and processor call the instruction stored in the memory by bus bar, the processor, the operation of terminal device in the method to execute the offer of the application second aspect.
The 15th aspect of the application provides a kind of system on chip, the system can be applied to target BS, the system on chip includes: at least one communication interface, at least one processor, at least one processor, the communication interface, memory and processor are by bus bar, and the processor calls the instruction stored in the memory, to execute sheet The operation of target BS in the method for third aspect offer is provided.
The cell switching method and equipment of unauthorized uplink provided by the present application, source base station is by including switching type information into the switching request message that target BS is sent, switching type information is used to indicate terminal device and supports unauthorized transmission, and the characteristic of the unauthorized business of terminal device, to obtain the first unauthorized transmission of configuration information, first unauthorized transmission of configuration information includes that terminal device and target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, and switching command message is sent to terminal device, it include the first unauthorized transmission of configuration information in switching command message.Since terminal device obtains the first unauthorized transmission of configuration information for communicating and using with target BS in advance, not only reduce blind examination of the target BS to the unauthorized business of terminal device, it is ensured that being properly received for unauthorized business.
Detailed description of the invention
Fig. 1 is a kind of schematic diagram for network architecture that the embodiment of the present application is applicable in;
Fig. 2 is the flow chart of the cell switching method for the unauthorized uplink that embodiment one provides;
Fig. 3 is the signaling process figure of the cell switching method for the unauthorized uplink that embodiment two provides;
Fig. 4 is the signaling process figure of the cell switching method for the unauthorized uplink that embodiment three provides;
Fig. 5 is the signaling process figure of the cell switching method for the unauthorized uplink that example IV provides;
Fig. 6 is a kind of structural schematic diagram for source base station that embodiment five provides;
Fig. 7 is a kind of structural schematic diagram for terminal device that embodiment six provides;
Fig. 8 is a kind of structural schematic diagram for target BS that embodiment seven provides;
Fig. 9 is the structural schematic diagram for the source base station that embodiment eight provides.
Figure 10 is the structural schematic diagram for the terminal device that embodiment nine provides.
Figure 11 is the structural schematic diagram for the terminal device that embodiment ten provides.
Specific embodiment
The application provides a kind of cell switching method of unauthorized uplink, Fig. 1 is a kind of schematic diagram for network architecture that the embodiment of the present application is applicable in, as shown in Figure 1, it include two base stations: source base station, target BS and at least one terminal device in the network architecture, source base station is the base station for being currently terminal device service, target BS is the base station that terminal device needs to be handed over, the Target cell where source cell and target BS where source base station can be co-frequency cell, it may be alien-frequency district, can also be different system cell.In the network architecture shown in Fig. 1, source base station and target BS are two different base stations, it should be noted that the present processes are readily applicable to the scene that source base station and target BS are the same base station, i.e. source cell and the Target cell different community that belongs to the same base station.
It should be clear that, the source base station and target BS mentioned in the application can be global system for mobile telecommunications (Global System of Mobile communication, abbreviation GSM) system or CDMA (Code Division Multiple Access, abbreviation CDMA) system base station (Base Transceiver Station, abbreviation BTS), it is also possible to wideband code division multiple access (Wideband Code Division Multiple Access, abbreviation WCDMA) base station (NodeB in system, abbreviation NB), it can also be long term evolution (Long Term E Volution, abbreviation LTE) evolved base station (evolved NodeB in system, abbreviation eNB), access point (access point,) or relay station AP, it is also possible to the 5th third-generation mobile communication (5Generation, 5G) base station in system (such as gNB or transfer point (Transmission Point, TRP)) etc., can also be cloud Radio Access Network (Cloud Radio Access Network, CRAN) wireless controller and wearable device or mobile unit etc. under scene.It is not limited thereto.5G system is also referred to as new wireless communication system, new access technology (New Radio) or next generation mobile communication system.
Base station may include indoor baseband processing unit (Building Baseband Unit,) and far-end RF module (Remote Radio Unit BBU, RRU), RRU and antenna-feeder system (i.e. antenna) connection, BBU and RRU can according to need and dismantle use.It should be noted that base station can also use other common hardware frameworks during specific implementation.
The terminal device mentioned in the application can be user equipment (User Equipment, UE), access terminal, UE unit, the station UE, movement station, mobile station, remote station, remote terminal, mobile device, UE terminal, terminal, wireless telecom equipment, UE agency or UE device etc..It can also be cellular phone, wireless phone, session initiation protocol (Session Initiation Protocol, SIP) phone, wireless local loop (Wireless Local Loop, WLL it) stands, personal digital assistant (Personal Digital Assistant, PDA), handheld device with wireless communication function, it calculates equipment or is connected to other processing equipments of radio modem, mobile unit, wearable device, public land mobile network (the Public Land Mobile Network of terminal or the following evolution in the following 5G network, PLMN the terminal etc. in).
Fig. 2 is the flow chart for the cell switching method of unauthorized uplink that embodiment one provides, as shown in Fig. 2, method provided in this embodiment the following steps are included:
Step S101, source base station sends switching request message to target BS, includes switching type information in the switching request message, which is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and terminal device.
Source base station determines that terminal device needs to carry out cell switching, then switching request message is sent to target BS, source base station can determine whether to carry out cell switching according to the measurement result of terminal device, and measurement result includes one or more of the signal quality of source base station and target BS, signal strength, loading condition.Illustratively, when the signal quality of source base station is lower than first threshold, and the signal quality of target BS is higher than second threshold, source base station, which determines, carries out cell switching.
Switching type information is for the unauthorized transfer resource that target BS is that terminal device distributes that unauthorized transmission uses.Whether source base station can support unauthorized transmission by switching type indication bit position (bit) instruction terminal equipment, such as, indicate that terminal device supports unauthorized transmission when the value of switching type indication bit position is 1, when the value of switching type indication bit position is 0, indicate that terminal device does not support unauthorized transmission.The characteristic of unauthorized business is, for example: packet services, low time delay business etc..Unauthorized transmission services refer to the business transmitted on unauthorized transfer resource, and the unauthorized transfer resource that terminal device uses is pre-configured by base station, when subsequent each transmission services, do not need to the unauthorized transfer resource of base station requests.
Optionally, it further include the second unauthorized transmission of configuration information in switching request message, the second unauthorized transmission of configuration information includes: that terminal device and source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.The information of second unauthorized transfer resource can be the index or running time-frequency resource information of the second unauthorized transfer resource, and running time-frequency resource includes time-domain resource and frequency domain resource.If being pre-configured with the index of unauthorized transfer resource and the corresponding relationship of running time-frequency resource on each base station and terminal device, source base station can only carry the index of the second unauthorized transfer resource in switching request message, and target BS can determine that source base station and terminal carry out the unauthorized running time-frequency resource information transmitted and used according to the index of the second unauthorized transfer resource.If not configuring the index of unauthorized transfer resource and the corresponding relationship of running time-frequency resource on each base station and terminal device, source base station needs are switching Source base station is carried in request message and terminal carries out the unauthorized running time-frequency resource information transmitted and used.
The scene and type of business that next generation mobile communication system needs support are more; different scenes are different with the demand of business; such as enhancing mobile broadband (Enhanced Mobile Broadband; eMBB) the higher data rate of business need; (Massive Machine Type Communication is communicated between large-scale machines; MTC) business need largely connects; super reliable low time delay communication (ultra-Reliable and Low Latency Communication, uRLLC) business need low time delay and high reliability.One kind technology of eating dishes without rice or wine obviously is not able to satisfy all scenes and business, therefore next generation mobile communication system introduces the soft technology Soft-AI that eats dishes without rice or wine, so as to match a variety of different business and different application scenarios.
In the present embodiment, second ascending idle port configured transmission includes uplink waveform, multi-access mode, modulation coding scheme, at least one of wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix (Cyclic Prefix, CP) length.Uplink waveform includes orthogonal frequency division multiplexing (the Discrete Fourier Transform Spread Frequency Division Multiple Access of single carrier Discrete Fourier transformation spread spectrum,) or multicarrier cyclic prefix orthogonal frequency division multiplexing (Cyclic Prefix Orthogonal Frequency Division Multiple, CP-OFDM DFT-S-OFDM.Multi-access mode includes orthogonal frequency division multiple access (Orthogonal Frequency Division Multiple Access, OFDMA) or non-orthogonal multiple (Non-Orthogonal Multiple Access, NOMA).Wireless frame structure includes demodulated reference signal (Demodulation Reference Signal, DMRS) configuration.Subcarrier spacing can for 15KHZ, 30KHZ or other.Power control relevant parameter includes at least one of uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor, power adjustment.When multi-access mode is NOMA, the second ascending idle port configured transmission further includes at least one of code book, pilot frequency sequence, frequency expansion sequence, power domain superposition pattern.
The configuration information of second ascending idle port configured transmission can be the index of the second ascending idle port configured transmission, different index corresponds to different ascending idle port configured transmissions, and index and the corresponding relationship of the second ascending idle port configured transmission are pre-configured on terminal device and base station.The configuration information of second ascending idle port configured transmission can also be the specific value of ascending idle port parameter.Uplink waveform, multi-access mode in second ascending idle port configured transmission are semi-static parameter, and semi-static parameter can be configured by high-level signaling, for example, wireless heterogeneous networks (Radio Resource Control, RRC) signaling.Subcarrier spacing, CP length, wireless frame structure, power control relevant parameter are dynamic parameter, and dynamic parameter constantly changes with the time, need dynamic update in real time.
If terminal device is carrying out unauthorized business, it then can be with buffer status report (the Buffer Status Report of the unauthorized business of carried terminal equipment in switching request message, BSR), BSR is used to notify the size of data volume in the unauthorized business buffer area of the uplink of target BS terminal device.
Step S102, source base station receives the handoff response that target BS is sent, and includes the first unauthorized transmission of configuration information in handoff response.
The first unauthorized transmission of configuration information includes: that terminal device and target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission.The first unauthorized transmission of configuration information is that the content for including determines in switching request message that target BS is sent according to terminal device.
Illustratively, when the characteristic of the unauthorized business of terminal device is packet services, it is single carrier (DFT-S-OFDM) that target BS, which can choose uplink waveform, and multi-access mode is NOMA, subcarrier spacing is smaller, the biggish unauthorized transfer resource of CP length.When the characteristic of the unauthorized business of terminal device is low time delay business, it is multicarrier (CP-OFDM) that target BS, which can choose uplink waveform, and multi-access mode is OFDMA, and subcarrier spacing is larger, The lesser unauthorized transfer resource of CP length.
If in switching request message further including the unauthorized transmission of configuration information of BSR and/or second of the unauthorized business of terminal device, target BS can also determine the first unauthorized transmission of configuration information according to the unauthorized transmission of configuration information of BSR and/or second of the unauthorized business of terminal device.For example, target BS knows the current upstream traffic of terminal device according to the BSR of the unauthorized business of terminal device, it is the suitably unauthorized transfer resource of terminal device allocated size according to upstream traffic.Target BS is sent to source base station after determining the first unauthorized transmission of configuration information, by the first unauthorized transmission of configuration information carrying in handoff response.
Step S103, source base station sends switching command message to terminal device, includes the first unauthorized transmission of configuration information in the switching command message.
After terminal device receives switching command information, when sending demand if there is upstream data and allow to carry out transmitting uplink data using unauthorized mode, then according to the first unauthorized transmission of configuration information used in target BS, unauthorized business is sent to target BS.
In the present embodiment, source base station sends switching request message to target BS, it include switching type information in the switching request message, switching type information is used to indicate terminal device and supports unauthorized transmission, and the characteristic of the unauthorized business of terminal device, and receive the handoff response of target BS transmission, it include the first unauthorized transmission of configuration information in handoff response, first unauthorized transmission of configuration information includes: that terminal device and target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, switching command message is sent to terminal device, it include the first unauthorized transmission of configuration information in switching command message.Since terminal device obtains the first unauthorized transmission of configuration information of target BS in advance, not only reduce blind examination of the target BS to the unauthorized business of terminal device, it is ensured that being properly received for unauthorized business.
On the basis of example 1, Fig. 3 is the signaling process figure for the cell switching method of unauthorized uplink that embodiment two provides, as shown in figure 3, method provided in this embodiment the following steps are included:
Step S201, source base station, which is determined, carries out cell switching to terminal device.
Step S202, source base station sends switching request message to target BS, includes switching type information and the second unauthorized transmission of configuration information in switching request message.
Switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and terminal device.Second unauthorized transmission of configuration information includes: that terminal device and source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.It can also include the BSR of the unauthorized business of terminal device in switching request message if terminal device is currently carrying out unauthorized business.
Step S203, target BS sends handoff response to source base station, includes the transmission power of the pilot signal of the first unauthorized transmission of configuration information and target BS in handoff response.
First unauthorized transmission of configuration information includes: that terminal device and target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission.The transmission power of the pilot signal of target BS determines terminal device in the Timing Advance of target BS for source base station.
Step S204, source base station determines terminal device in the Timing Advance of target BS according to the transmission power of the pilot signal of target BS.
Specifically, source base station obtains Reference Signal Received Power (the Reference Signal Receiving Power of source base station according to terminal device measurement, RSRP), the transmission power of the pilot signal of the RSRP of target BS, the transmission power of the pilot signal of source base station and target BS, determines terminal device in the Timing Advance of target BS.It is exemplary , can by following formula computing terminal equipment target BS Timing Advance:
TAt,ue=TAs,ueα(Ppilot,t-RSRPt,ue)/(Ppilot,s-RSRPs,ue)
Wherein, RSRPs,ueIndicate the RSRP, RSRP of the source base station that terminal device measurement obtainst,ueIndicate the RSRP, P of the target BS that terminal device measurespilot,sIndicate the transmission power of the pilot signal of source base station, Ppilot,tIndicate the transmission power of the pilot signal of target BS, TAs,ueTerminal device is indicated in the Timing Advance of source base station, α indicates the correction parameter of the mode of source base station, may be configured as 1, α and can be target BS being sent to source base station, is also possible to what source base station was obtained from Network Management System.
Step S205, source base station sends switching command message to terminal device, includes the Timing Advance of the first unauthorized transmission of configuration information and terminal device in target BS in switching command message.
Step S206, terminal device sends unauthorized business to target BS according to the first unauthorized transmission of configuration information and terminal device in the Timing Advance of target BS.
After terminal device receives switching command information, when sending demand if there is upstream data and allow to carry out transmitting uplink data using unauthorized mode, unauthorized business is then sent to target BS in the Timing Advance of target BS according to the first unauthorized transmission of configuration information and terminal device used in target BS.
In the present embodiment, in cell switch process, terminal device not only reduces blind examination of the target BS to the unauthorized business of terminal device, it is ensured that being properly received for unauthorized business by obtaining the first unauthorized transmission of configuration information of target BS in advance.In addition, source base station is also that terminal device has determined terminal device in the Timing Advance of target BS, and the Timing Advance by terminal device in target BS has been sent to terminal device, so that after terminal device is switched to target BS, the unauthorized business of uplink can be directly transmitted, it ensure that time delay, and reduce the interference in cell.
On the basis of example 1, Fig. 4 is the signaling process figure for the cell switching method of unauthorized uplink that embodiment three provides, as shown in figure 4, method provided in this embodiment the following steps are included:
Step S301, source base station, which is determined, carries out cell switching to terminal device.
Step S302, source base station sends switching request message to target BS, includes the RSRP of switching type information, the second unauthorized transmission of configuration information and target BS in switching request message.
Switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and terminal device.Second unauthorized transmission of configuration information includes: that terminal device and source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.It can also include the BSR of the unauthorized business of terminal device in switching request message if terminal device is currently carrying out unauthorized business.The RSRP of target BS is that terminal device measurement obtains, and is sent to source base station.
Step S303, the RSRP for the target BS that target BS is obtained according to terminal device measurement determines terminal device in the Timing Advance of target BS.
Specifically, target BS can determine terminal device in the Timing Advance of target BS according to the RSRP for the target BS that the RSRP for the target BS that terminal device measurement obtains, the first terminal device measuring of target base station service obtain, the transmission power of the pilot signal of target BS and first terminal equipment in the Timing Advance of target BS.Illustratively, target BS can Timing Advance of the computing terminal equipment in target BS according to the following formula:
TAt,ue=TAt,ue'(Ppilot,t-RSRPt,ue)/(Ppilot,t-RSRPt,ue')
Wherein, RSRPt,ueIndicate the RSRP, RSRP of the target BS that the terminal device measurement of switching obtainst,ue'It indicates The RSRP for the target BS that first terminal device measuring arrives, Ppilot,tIndicate the transmission power of the pilot signal of target BS, TAt,ueIndicate Timing Advance of the terminal device of switching in target BS, TAt,ue'Indicate first terminal equipment in the Timing Advance of target BS.
Step S304, target BS sends handoff response to source base station, includes the Timing Advance of the first unauthorized transmission of configuration information and terminal device in target BS in handoff response.
First unauthorized transmission of configuration information includes: that terminal device and target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission.
Step S305, source base station sends switching command message to terminal device, includes the Timing Advance of the first unauthorized transmission of configuration information and terminal device in target BS in switching command message.
Step S306, terminal device sends unauthorized business to target BS according to the first unauthorized transmission of configuration information and terminal device in the Timing Advance of target BS.
After terminal device receives switching command information, when sending demand if there is upstream data and allow to carry out transmitting uplink data using unauthorized mode, unauthorized business is then sent to target BS in the Timing Advance of target BS according to the first unauthorized transmission of configuration information and terminal device used in target BS.
In the present embodiment, in cell switch process, terminal device not only reduces blind examination of the target BS to the unauthorized business of terminal device, it is ensured that being properly received for unauthorized business by obtaining the first unauthorized transmission of configuration information of target BS in advance.In addition, the RSRP for the target BS that target BS is obtained also according to terminal device measurement, determine terminal device in the Timing Advance of target BS, and the Timing Advance by terminal device in target BS has been sent to terminal device, so that after terminal device is switched to target BS, the unauthorized business of uplink can be directly transmitted, ensure that time delay, and reduces the interference in cell.
On the basis of example 1, Fig. 5 is the signaling process figure for the cell switching method of unauthorized uplink that example IV provides, as shown in figure 5, method provided in this embodiment the following steps are included:
Step S401, source base station, which is determined, carries out cell switching to terminal device.
Step S402, source base station sends switching request message to target BS, includes switching type information and the second unauthorized transmission of configuration information in switching request message.
Switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and terminal device.Second unauthorized transmission of configuration information includes: that terminal device and source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.It can also include the BSR of the unauthorized business of terminal device in switching request message if terminal device is currently carrying out unauthorized business.
Step S403, target BS sends handoff response to source base station, includes the uplink synchronous resource of the first unauthorized transmission of configuration information and target BS in handoff response.
Step S404, source base station sends switching command message to terminal device, includes the uplink synchronous resource of the first unauthorized transmission of configuration information and target BS in switching command message.
Step S405, terminal device sends signal in the uplink synchronous resource of target BS.
After terminal device receives switching command message, when sending demand if there is upstream data and allow to carry out transmitting uplink data using unauthorized mode, then information is sent in the uplink synchronous resource of target BS and send signal.
Step S406, target BS according to the signal received in uplink synchronous resource determine terminal device in the Timing Advance of target BS,
Step S407, target BS sends terminal device in the Timing Advance of target BS to terminal device.
Step S408, terminal device sends unauthorized business to target BS according to the first unauthorized transmission of configuration information and terminal device in the Timing Advance of target BS.
In the present embodiment, in cell switch process, terminal device not only reduces blind examination of the target BS to the unauthorized business of terminal device, it is ensured that being properly received for unauthorized business by obtaining the first unauthorized transmission of configuration information of target BS in advance.In addition, target BS is by sending oneself uplink synchronous resource to terminal device, terminal device sends signal in uplink synchronous resource, target BS determines terminal device in the Timing Advance of target BS according to the signal sent in uplink synchronous resource, and the Timing Advance by terminal device in target BS has been sent to terminal device, so that the unauthorized business of uplink can be directly transmitted after terminal device is switched to target BS, it ensure that time delay, and reduce the interference in cell.
Fig. 6 is a kind of structural schematic diagram for source base station that embodiment five provides, as shown in fig. 6, source base station provided in this embodiment includes:
Sending module 11 includes switching type information in the switching request message for sending switching request message to target BS, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
Receiving module 12, for receiving the handoff response of target BS transmission, it include the first unauthorized transmission of configuration information in the handoff response, the first unauthorized transmission of configuration information includes: the terminal device and the target BS carries out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, and the information of the first unauthorized transfer resource and the configuration information of the first ascending idle port configured transmission are that the target BS is determined according to the characteristic of the unauthorized business;
The sending module 11 is also used to send switching command message to the terminal device, includes the described first unauthorized transmission of configuration information in the switching command message.
Optionally, it further include the transmission power of the pilot signal of the target BS in the handoff response, it further include Timing Advance of the terminal device in the target BS in the switching command message, then the source base station further includes determining module, determining module is used for the transmission power of the pilot signal according to the target BS, determines the terminal device in the Timing Advance of the target BS.
It optionally, further include Timing Advance of the terminal device in the target BS in the handoff response.
It optionally, further include the uplink synchronous resource of the target BS in the handoff response and the switching command message.
Optionally, it further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.Further, further include in the switching request message terminal device unauthorized business BSR.
Optionally, the first ascending idle port configured transmission or the second ascending idle port parameter include at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.Wherein, the uplink waveform includes single carrier DFT-S-OFDM or multicarrier CP-OFDM;The multi-access mode includes OFDMA or NOMA;The wireless frame structure includes DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
Fig. 7 is a kind of structural schematic diagram for terminal device that embodiment six provides, as shown in fig. 7, the present embodiment provides Terminal device include:
Receiving module 21, for receiving the switching command message of source base station transmission, it include the first unauthorized transmission of configuration information in the switching command message, the first unauthorized transmission of configuration information includes: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
Sending module 22, for according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS to send unauthorized business.
It optionally, include: Timing Advance of the terminal device in the target BS in the switching command message, the Timing Advance is determined by the source base station or the target BS.The then sending module 22, is specifically used for: according to the described first unauthorized transmission of configuration information and the Timing Advance, Xiang Suoshu target BS sends unauthorized business.
It optionally, include: the uplink synchronous resource of the target BS in the switching command message.Correspondingly, the sending module 22, is also used to send signal in the uplink synchronous resource of the target BS;The receiving module 21, it is also used to receive Timing Advance of the terminal device in target BS of the target BS transmission, the terminal device is that the signal that the target BS is sent in the uplink synchronous resource of the target BS according to the terminal device is determining in the Timing Advance of target BS.The sending module 22 is according to the described first unauthorized transmission of configuration information, unauthorized business is sent to the target BS, specifically: the Timing Advance according to the described first unauthorized transmission of configuration information and the terminal device in target BS, the unauthorized business of Xiang Suoshu target BS transmission.
Optionally, it further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.Further, further include in the switching request message terminal device unauthorized business BSR.
Optionally, the first ascending idle port configured transmission or the second ascending idle port parameter include at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.Wherein, the uplink waveform includes single carrier DFT-S-OFDM or multicarrier CP-OFDM;The multi-access mode includes OFDMA or NOMA;The wireless frame structure includes DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
Fig. 8 is a kind of structural schematic diagram for target BS that embodiment seven provides, as shown in figure 8, target BS provided in this embodiment includes:
Receiving module 31, for receiving the switching request message of source base station transmission, it include switching type information in the switching request message, the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
Processing module 32, for the characteristic according to the unauthorized business, determine that the first unauthorized transmission of configuration information, the first unauthorized transmission of configuration information include: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
Sending module 33 includes the described first unauthorized transmission of configuration information in the handoff response for sending handoff response to the source base station.
It optionally, further include the RSRP for the target BS that the terminal device measurement obtains in the switching request, It further include Timing Advance of the terminal device in the target BS in the handoff response, the processing module 32, it is also used to: according to the RSRP for the target BS that the terminal device measurement obtains, determining the terminal device in the Timing Advance of the target BS.
Optionally, further include in the handoff response target BS pilot signal the uplink synchronous resource for sending power or the target BS.
Optionally, it further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.Further, further include in the switching request message terminal device unauthorized business BSR.
Optionally, the first ascending idle port configured transmission or the second ascending idle port parameter include at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.Wherein, the uplink waveform includes single carrier DFT-S-OFDM or multicarrier CP-OFDM;The multi-access mode includes OFDMA or NOMA;The wireless frame structure includes DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
Fig. 9 is the structural schematic diagram for the source base station that embodiment eight provides, as shown in Figure 9, source base station 400 provided in this embodiment includes: processor 41, memory 42, receiver 43 and transmitter 44, the memory 42, receiver 43 and transmitter 44 are connected and communicated by bus with the processor 41, the memory 42 is for storing computer executed instructions, the processor 41 is for executing the computer executed instructions, so that the source base station 400 executes the step of source base station executes in the method that embodiment one is provided to example IV, it is specific:
Transmitter 44 includes switching type information in the switching request message for sending switching request message to target BS, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
Receiver 43, for receiving the handoff response of target BS transmission, it include the first unauthorized transmission of configuration information in the handoff response, the first unauthorized transmission of configuration information includes: the terminal device and the target BS carries out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, and the information of the first unauthorized transfer resource and the configuration information of the first ascending idle port configured transmission are that the target BS is determined according to the characteristic of the unauthorized business;
The transmitter 44 is also used to send switching command message to the terminal device, includes the described first unauthorized transmission of configuration information in the switching command message.
Optionally, it further include the transmission power of the pilot signal of the target BS in the handoff response, it further include Timing Advance of the terminal device in the target BS in the switching command message, processor 41, for the transmission power according to the pilot signal of the target BS, determine the terminal device in the Timing Advance of the target BS.
It optionally, further include Timing Advance of the terminal device in the target BS in the handoff response.
It optionally, further include the uplink synchronous resource of the target BS in the handoff response and the switching command message.
It optionally, further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out unauthorized the second unauthorized biography transmitted and used The configuration information of the information of defeated resource and the second ascending idle port configured transmission.Further, further include in the switching request message terminal device unauthorized business BSR.
Optionally, the first ascending idle port configured transmission or the second ascending idle port parameter include at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.Wherein, the uplink waveform includes single carrier DFT-S-OFDM or multicarrier CP-OFDM;The multi-access mode includes OFDMA or NOMA;The wireless frame structure includes DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
Figure 10 is the structural schematic diagram for the terminal device that embodiment nine provides, as shown in Figure 10, terminal device 500 provided in this embodiment includes: processor 51, memory 52, receiver 53 and transmitter 54, the memory 52, receiver 53 and transmitter 54 are connected and communicated by bus with the processor 51, the memory 52 is for storing computer executed instructions, the processor 51 is for executing the computer executed instructions, so that the terminal device 500 executes the step of terminal device executes in the method that embodiment one is provided to example IV, it is specific:
Receiver 53, for receiving the switching command message of source base station transmission, it include the first unauthorized transmission of configuration information in the switching command message, the first unauthorized transmission of configuration information includes: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission
Transmitter 54, for according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS to send unauthorized business.
It optionally, include: Timing Advance of the terminal device in the target BS in the switching command message, the Timing Advance is determined by the source base station or the target BS;The transmitter 54, is specifically used for: according to the described first unauthorized transmission of configuration information and the Timing Advance, Xiang Suoshu target BS sends unauthorized business.
It optionally, include: the uplink synchronous resource of the target BS in the switching command message;The transmitter 54 is also used to send signal in the uplink synchronous resource of the target BS;The receiver 53, it is also used to receive Timing Advance of the terminal device in target BS of the target BS transmission, the terminal device is that the signal that the target BS is sent in the uplink synchronous resource of the target BS according to the terminal device is determining in the Timing Advance of target BS;The transmitter 54 is according to the described first unauthorized transmission of configuration information, unauthorized business is sent to the target BS, specifically: the Timing Advance according to the described first unauthorized transmission of configuration information and the terminal device in target BS, the unauthorized business of Xiang Suoshu target BS transmission.
Optionally, the first ascending idle port configured transmission or the second ascending idle port parameter include at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.Wherein, the uplink waveform includes single carrier DFT-S-OFDM or multicarrier CP-OFDM;The multi-access mode includes OFDMA or NOMA;The wireless frame structure includes DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
Figure 11 is the structural schematic diagram for the target BS that embodiment ten provides, as shown in figure 11, target BS 600 provided in this embodiment includes: processor 61, memory 62, receiver 63 and transmitter 64, the memory 62, receiver 63 and transmitter 64 are connected and communicated by bus with the processor 61, and the memory 62 is for depositing Computer executed instructions are stored up, the processor 61 is for executing the computer executed instructions, so that the target BS 600 executes the step of terminal device executes in the method that embodiment one is provided to example IV, it is specific:
Receiver 63 includes switching type information in the switching request message for receiving the switching request message of source base station transmission, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
Processor 61, for the characteristic according to the unauthorized business, determine that the first unauthorized transmission of configuration information, the first unauthorized transmission of configuration information include: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
Transmitter 64 includes the described first unauthorized transmission of configuration information in the handoff response for sending handoff response to the source base station.
Optionally, it further include the RSRP for the target BS that the terminal device measurement obtains in the switching request, it further include Timing Advance of the terminal device in the target BS in the handoff response, the processor 61, it is also used to: according to the RSRP for the target BS that the terminal device measurement obtains, determining the terminal device in the Timing Advance of the target BS.
Optionally, further include in the handoff response target BS pilot signal the uplink synchronous resource for sending power or the target BS.
Optionally, it further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.Further, further include in the switching request message terminal device unauthorized business BSR.
Optionally, the first ascending idle port configured transmission or the second ascending idle port parameter include at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.Wherein, the uplink waveform includes single carrier DFT-S-OFDM or multicarrier CP-OFDM;The multi-access mode includes OFDMA or NOMA;The wireless frame structure includes DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
It is understood that, processor in the application can be central processing unit (CPU), general processor, digital signal processor (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA) perhaps other programmable logic device, transistor logic hardware component or any combination thereof.It, which may be implemented or executes, combines various illustrative logic blocks, module and circuit described in present disclosure.The processor is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP and the combination of microprocessor etc..
Bus described herein can be industry standard architecture (Industry Standard Architecture, ISA) bus, external equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended Industry Standard Architecture, EISA) bus etc..Bus can be divided into address bus, data/address bus, control bus etc..For convenient for indicating, the bus in illustrations does not limit only a bus or a type of bus.
In several embodiments provided herein, it should be understood that disclosed device and method may be implemented in other ways.For example, the apparatus embodiments described above are merely exemplary, for example, the unit Division, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, and component shown as a unit may or may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in each embodiment of the application can integrate in one processing unit, it is also possible to each unit and physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit, can store in a computer readable storage medium.Above-mentioned SFU software functional unit is stored in a storage medium, it uses including some instructions so that a computer equipment (can be personal computer, server or the network equipment etc.) or processor (English: processor) execute the part steps of each embodiment the method for the application.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (English: Read-Only Memory, referred to as: ROM), the various media that can store program code such as random access memory (English: Random Access Memory, abbreviation: RAM), magnetic or disk.

Claims (30)

  1. A kind of cell switching method of unauthorized uplink characterized by comprising
    Source base station sends switching request message to target BS, includes switching type information in the switching request message, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
    The source base station receives the handoff response that target BS is sent, it include the first unauthorized transmission of configuration information in the handoff response, the first unauthorized transmission of configuration information includes: the terminal device and the target BS carries out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, and the information of the first unauthorized transfer resource and the configuration information of the first ascending idle port configured transmission are that the target BS is determined according to the characteristic of the unauthorized business;
    The source base station sends switching command message to the terminal device, includes the described first unauthorized transmission of configuration information in the switching command message.
  2. According to the method for claim 1, it is characterized in that, further include the transmission power of the pilot signal of the target BS in the handoff response, further include Timing Advance of the terminal device in the target BS in the switching command message, then the method also includes:
    The source base station determines the terminal device in the Timing Advance of the target BS according to the transmission power of the pilot signal of the target BS.
  3. The method according to claim 1, wherein further including Timing Advance of the terminal device in the target BS in the handoff response.
  4. The method according to claim 1, wherein further including the uplink synchronous resource of the target BS in the handoff response and the switching command message.
  5. Method according to claim 1-4, it is characterized in that, it further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.
  6. According to the method described in claim 5, it is characterized in that, further including the buffer status report BSR of the unauthorized business of the terminal device in the switching request message.
  7. A kind of cell switching method of unauthorized uplink characterized by comprising
    Terminal device receives the switching command message that source base station is sent, it include the first unauthorized transmission of configuration information in the switching command message, the first unauthorized transmission of configuration information includes: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
    The terminal device sends unauthorized business according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS.
  8. The method according to the description of claim 7 is characterized in that including: Timing Advance of the terminal device in the target BS in the switching command message, the Timing Advance is determined by the source base station or the target BS;
    The terminal device sends unauthorized business according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS, comprising:
    The terminal device sends unauthorized business according to the described first unauthorized transmission of configuration information and the Timing Advance, Xiang Suoshu target BS.
  9. The method according to the description of claim 7 is characterized in that including: the uplink synchronous resource of the target BS in the switching command message;
    The terminal device is sent before unauthorized business according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS, further includes:
    The terminal device sends signal in the uplink synchronous resource of the target BS;
    The terminal device receives Timing Advance of the terminal device in target BS of the target BS transmission, and the terminal device is that the signal that the target BS is sent in the uplink synchronous resource of the target BS according to the terminal device is determining in the Timing Advance of target BS;
    The terminal device sends unauthorized business according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS, comprising:
    Timing Advance of the terminal device according to the described first unauthorized transmission of configuration information and the terminal device in target BS, the unauthorized business of Xiang Suoshu target BS transmission.
  10. A kind of cell switching method of unauthorized uplink characterized by comprising
    Target BS receives the switching request message that source base station is sent, and includes switching type information in the switching request message, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
    The target BS is according to the characteristic of the unauthorized business, determine that the first unauthorized transmission of configuration information, the first unauthorized transmission of configuration information include: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
    The target BS sends handoff response to the source base station, includes the described first unauthorized transmission of configuration information in the handoff response.
  11. According to the method for claim 10, it is characterized in that, further include the RSRP for the target BS that the terminal device measurement obtains in the switching request, further include Timing Advance of the terminal device in the target BS in the handoff response, then the method also includes:
    The RSRP for the target BS that the target BS is obtained according to the terminal device measurement determines the terminal device in the Timing Advance of the target BS.
  12. According to the method described in claim 10, it is characterized in that, further including the uplink synchronous resource for sending power or the target BS of the pilot signal of the target BS in the handoff response.
  13. The described in any item methods of 0-12 according to claim 1, it is characterized in that, it further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.
  14. According to the method for claim 13, which is characterized in that further include the buffer status report BSR of the unauthorized business of the terminal device in the switching request message.
  15. - 14 described in any item methods according to claim 1, it is characterized in that, the first ascending idle port configured transmission includes at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.
  16. According to the method for claim 15, which is characterized in that the uplink waveform includes the orthogonal frequency division multiplexing DFT-S-OFDM or multicarrier cyclic prefix orthogonal frequency division multiplexing CP-OFDM of single carrier Discrete Fourier transformation spread spectrum;The multi-access mode includes orthogonal frequency division multiple access OFDMA or non-orthogonal multiple NOMA;The wireless frame structure includes demodulated reference signal DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
  17. A kind of source base station characterized by comprising
    Transmitter includes switching type information in the switching request message for sending switching request message to target BS, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
    Receiver, for receiving the handoff response of target BS transmission, it include the first unauthorized transmission of configuration information in the handoff response, the first unauthorized transmission of configuration information includes: the terminal device and the target BS carries out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission, and the information of the first unauthorized transfer resource and the configuration information of the first ascending idle port configured transmission are that the target BS is determined according to the characteristic of the unauthorized business;
    The transmitter is also used to send switching command message to the terminal device, includes the described first unauthorized transmission of configuration information in the switching command message.
  18. Source base station according to claim 17, it is characterized in that, further include the transmission power of the pilot signal of the target BS in the handoff response, further include Timing Advance of the terminal device in the target BS in the switching command message, then the source base station further include:
    Processor determines the terminal device in the Timing Advance of the target BS for the transmission power according to the pilot signal of the target BS.
  19. Source base station according to claim 17, which is characterized in that further include Timing Advance of the terminal device in the target BS in the handoff response.
  20. Source base station according to claim 17, which is characterized in that further include the uplink synchronous resource of the target BS in the handoff response and the switching command message.
  21. A kind of terminal device characterized by comprising
    Receiver, for receiving the switching command message of source base station transmission, it include the first unauthorized transmission of configuration information in the switching command message, the first unauthorized transmission of configuration information includes: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission
    Transmitter, for according to the described first unauthorized transmission of configuration information, Xiang Suoshu target BS to send unauthorized business.
  22. Terminal device according to claim 21, which is characterized in that include: Timing Advance of the terminal device in the target BS in the switching command message, the Timing Advance is determined by the source base station or the target BS;
    The transmitter, is specifically used for: according to the described first unauthorized transmission of configuration information and the Timing Advance, Xiang Suoshu target BS sends unauthorized business.
  23. Terminal device according to claim 21, which is characterized in that include: the uplink synchronous resource of the target BS in the switching command message;
    The transmitter is also used to send signal in the uplink synchronous resource of the target BS;
    The receiver, it is also used to receive Timing Advance of the terminal device in target BS of the target BS transmission, the terminal device is that the signal that the target BS is sent in the uplink synchronous resource of the target BS according to the terminal device is determining in the Timing Advance of target BS;
    The transmitter is according to the described first unauthorized transmission of configuration information, unauthorized business is sent to the target BS, specifically: the Timing Advance according to the described first unauthorized transmission of configuration information and the terminal device in target BS, the unauthorized business of Xiang Suoshu target BS transmission.
  24. A kind of target BS characterized by comprising
    Receiver includes switching type information in the switching request message for receiving the switching request message of source base station transmission, and the switching type information is used to indicate the characteristic that terminal device supports the unauthorized business of unauthorized transmission and the terminal device;
    Processor, for the characteristic according to the unauthorized business, determine that the first unauthorized transmission of configuration information, the first unauthorized transmission of configuration information include: that the terminal device and the target BS carry out the information of unauthorized the first unauthorized transfer resource for transmitting and using and the configuration information of the first ascending idle port configured transmission;
    Transmitter includes the described first unauthorized transmission of configuration information in the handoff response for sending handoff response to the source base station.
  25. Target BS according to claim 24, it further include Timing Advance of the terminal device in the target BS in the handoff response it is characterized in that, further including the RSRP for the target BS that the terminal device measurement obtains in the switching request, the processor, is also used to:
    According to the RSRP for the target BS that the terminal device measurement obtains, determine the terminal device in the Timing Advance of the target BS.
  26. Target BS according to claim 24, which is characterized in that further include the uplink synchronous resource for sending power or the target BS of the pilot signal of the target BS in the handoff response.
  27. The described in any item source base stations of 7-20, the described in any item target BS of 24-26 according to claim 1, it is characterized in that, it further include the second unauthorized transmission of configuration information in the switching request message, the second unauthorized transmission of configuration information includes: that the terminal device and the source base station carry out the information of unauthorized the second unauthorized transfer resource for transmitting and using and the configuration information of the second ascending idle port configured transmission.
  28. Source base station or target BS according to claim 27, which is characterized in that further include the buffer status report BSR of the unauthorized business of the terminal device in the switching request message.
  29. The described in any item target BS of any one of the described in any item source base stations of 7-20,21-23 terminal device, 24-26 according to claim 1, it is characterized in that, the first ascending idle port configured transmission includes at least one of uplink waveform, multi-access mode, modulation coding scheme, wireless frame structure, power control relevant parameter, subcarrier spacing and cyclic prefix CP length.
  30. Source base station, target BS or terminal device according to claim 29, which is characterized in that the uplink waveform includes the orthogonal frequency division multiplexing DFT-S-OFDM or multicarrier cyclic prefix orthogonal frequency division multiplexing CP-OFDM of single carrier Discrete Fourier transformation spread spectrum;The multi-access mode includes orthogonal frequency division multiple access OFDMA or non-orthogonal multiple NOMA;The wireless frame structure includes demodulated reference signal DMRS configuration;The power control relevant parameter includes uplink maximum transmission power, the desired receiving power level in base station, path loss compensation factor or power adjustment.
CN201780054238.4A 2017-06-27 2017-07-28 Cell switching method and device for unauthorized uplink transmission Active CN109691212B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201710502216 2017-06-27
CN2017105022161 2017-06-27
PCT/CN2017/094910 WO2019000544A1 (en) 2017-06-27 2017-07-28 Cell handover method and device for grant-free uplink transmission

Publications (2)

Publication Number Publication Date
CN109691212A true CN109691212A (en) 2019-04-26
CN109691212B CN109691212B (en) 2021-02-05

Family

ID=64740894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780054238.4A Active CN109691212B (en) 2017-06-27 2017-07-28 Cell switching method and device for unauthorized uplink transmission

Country Status (2)

Country Link
CN (1) CN109691212B (en)
WO (1) WO2019000544A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112203285A (en) * 2020-09-07 2021-01-08 北京遥感设备研究所 Multi-cell joint cooperative transmission control method, device and system
CN112203284A (en) * 2020-09-07 2021-01-08 北京遥感设备研究所 Terminal position self-adaptive multi-cell joint resource allocation method, device and system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116264728A (en) * 2021-12-15 2023-06-16 华为技术有限公司 Method for advanced synchronization and communication device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307220A (en) * 2014-07-15 2016-02-03 中兴通讯股份有限公司 D2D service switch implementation method and device
CN105376812A (en) * 2014-08-29 2016-03-02 电信科学技术研究院 Uplink transmission main carrier switching and control method and apparatus, base station, and UE
CN105578382A (en) * 2014-11-06 2016-05-11 中兴通讯股份有限公司 Resource acquisition method and device, resource configuration method and device, resource pool configuration method and device
US20160302203A1 (en) * 2015-04-10 2016-10-13 Futurewei Technologies, Inc. Communications with carrier selection, switching and measurements
CN106714232A (en) * 2015-11-13 2017-05-24 中兴通讯股份有限公司 Measuring and reporting method and terminal of unauthorized carriers, and configuration method and base station of unauthorized carriers

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105992373B (en) * 2015-01-30 2020-09-15 中兴通讯股份有限公司 Data transmission method, device, base station and user equipment
CN114222372A (en) * 2015-04-17 2022-03-22 索尼公司 Electronic device and method for wireless communication
CN105611542B (en) * 2015-12-30 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of communication means based on unauthorized frequency range, relevant device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307220A (en) * 2014-07-15 2016-02-03 中兴通讯股份有限公司 D2D service switch implementation method and device
CN105376812A (en) * 2014-08-29 2016-03-02 电信科学技术研究院 Uplink transmission main carrier switching and control method and apparatus, base station, and UE
CN105578382A (en) * 2014-11-06 2016-05-11 中兴通讯股份有限公司 Resource acquisition method and device, resource configuration method and device, resource pool configuration method and device
US20160302203A1 (en) * 2015-04-10 2016-10-13 Futurewei Technologies, Inc. Communications with carrier selection, switching and measurements
CN106714232A (en) * 2015-11-13 2017-05-24 中兴通讯股份有限公司 Measuring and reporting method and terminal of unauthorized carriers, and configuration method and base station of unauthorized carriers

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112203285A (en) * 2020-09-07 2021-01-08 北京遥感设备研究所 Multi-cell joint cooperative transmission control method, device and system
CN112203284A (en) * 2020-09-07 2021-01-08 北京遥感设备研究所 Terminal position self-adaptive multi-cell joint resource allocation method, device and system
CN112203285B (en) * 2020-09-07 2023-10-17 北京遥感设备研究所 Multi-cell joint cooperative transmission control method, device and system
CN112203284B (en) * 2020-09-07 2023-10-17 北京遥感设备研究所 Multi-cell joint resource allocation method, device and system with self-adaptive terminal position

Also Published As

Publication number Publication date
CN109691212B (en) 2021-02-05
WO2019000544A1 (en) 2019-01-03

Similar Documents

Publication Publication Date Title
CN108347778B (en) Communication method and device
CN107295542B (en) Information transmission method, user equipment and network equipment
CN110601809B (en) Information sending method and device and information receiving method and device
TWI737844B (en) Method for transmitting reference siganl and communication equipment
WO2017004774A1 (en) Data transmission method, wireless network device and communication system
US11259335B2 (en) Resource allocation method, terminal, and network device
US20200163097A1 (en) Communication method, network device, and relay device
JP7335997B2 (en) Different methods for PRACH and PUSCH separation in NR
CN108810983B (en) Method for sending and receiving information, network equipment and terminal equipment
CN108811074B (en) Information transmission method and device
US20220046563A1 (en) Wireless Communication Method and Device
WO2020024218A1 (en) Standalone sss for rrm and channel estimation enhancement
KR20210127996A (en) Random access method and device
JP2018509112A (en) Common information transmission method and apparatus
US11272547B2 (en) Communication method, network device, and user equipment
CN109691212A (en) The cell switching method and equipment of unauthorized uplink
EP4117379A1 (en) Method and device for communication
CN110677912B (en) Information sending method and device, information receiving method and device
JP7152527B2 (en) Wireless communication method, network equipment and terminal equipment
TWI762726B (en) Wireless communication method, network device and terminal device
WO2017000269A1 (en) Data transmission method and device
EP3468243B1 (en) Csi-rs transmission method and network device
WO2020030290A1 (en) Apparatus, method and computer program
WO2018006741A1 (en) Signal transmission method and apparatus
WO2019029464A1 (en) Data transmission method and device for flexible duplex system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant