CN109937603B - Contention-based transmission method and device - Google Patents

Contention-based transmission method and device Download PDF

Info

Publication number
CN109937603B
CN109937603B CN201780069516.3A CN201780069516A CN109937603B CN 109937603 B CN109937603 B CN 109937603B CN 201780069516 A CN201780069516 A CN 201780069516A CN 109937603 B CN109937603 B CN 109937603B
Authority
CN
China
Prior art keywords
value
upper limit
contention window
cta
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780069516.3A
Other languages
Chinese (zh)
Other versions
CN109937603A (en
Inventor
丁志明
庄宏成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN109937603A publication Critical patent/CN109937603A/en
Application granted granted Critical
Publication of CN109937603B publication Critical patent/CN109937603B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]

Abstract

The embodiment of the application provides a contention-based transmission method and device, which are beneficial to improving the efficiency of data transmission. The method comprises the following steps: the base station detects data sent by at least one terminal device based on competition on the license-free resource in a first time interval; the base station determines a contention window upper limit value equal to a first value according to a detection result, wherein the contention window upper limit value equal to the first value is used for a plurality of terminal devices to contend for the authorization-free resource after the first time period; and the base station sends first indication information according to the upper limit value of the contention window equal to the first numerical value, wherein the first indication information is used for indicating the upper limit value of the contention window equal to the first numerical value.

Description

Contention-based transmission method and device
The present application claims priority from a chinese patent application entitled "a contention-based communication method and apparatus in licensed spectrum wireless communication system" filed by the chinese patent office on 03.05/2017, application No. 201710305399.8, which is incorporated herein by reference in its entirety.
Technical Field
The present application relates to the field of communications, and more particularly, to a contention-based transmission method and apparatus.
Background
In a wireless cellular network, for example, in a Long Term Evolution (LTE) system, before sending data, a terminal device first needs to establish a radio resource control connection with a base station to enter a radio resource control connection state, and after obtaining an authorization instruction of the base station, the terminal device can send data according to an instruction requirement of the base station. This mode of transmitting data upstream is referred to as a grant transmission mode. The terminal device determines that there is data to be sent to the air interface to send the data out, which requires more signaling interaction and results in larger signaling overhead.
In order to save signaling overhead, a grant free transmission mode is proposed. In the authorization-free transmission mode, the base station does not schedule transmission resources of specific terminal equipment, and when a plurality of terminal equipment simultaneously have data to be transmitted, the terminal equipment performs data transmission on pre-configured shared resources, namely authorization-free resources, based on a random mode. How to improve the efficiency of transmitting data on the authorization-free resource by the terminal equipment becomes a technical problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides a contention-based transmission method, which is beneficial to improving the data transmission of terminal equipment on an authorization-free resource.
In a first aspect, a contention-based transmission method is provided, which includes: the base station detects data sent by at least one terminal device based on competition on the license-free resource in a first time interval; the base station determines a contention window upper limit value equal to a first value according to a detection result, wherein the contention window upper limit value equal to the first value is used for a plurality of terminal devices to contend for the authorization-free resource after the first time period; and the base station sends first indication information according to the upper limit value of the contention window equal to the first numerical value, wherein the first indication information is used for indicating the upper limit value of the contention window equal to the first numerical value.
In the embodiment of the application, the base station can dynamically adjust the upper limit value of the contention window in time according to the receiving condition, which is beneficial to reducing the probability of the terminal equipment sending the uplink data conflict, and is beneficial to improving the resource utilization rate and the efficiency of data transmission.
Optionally, in a possible implementation manner, the detection result includes a reception failure number, a reception failure rate, a reception success number, or a reception success rate.
In a possible implementation manner, before the base station determines, according to the detection result, an upper limit value of a contention window equal to a first value, the method further includes: the base station sends second indication information, where the second indication information is used to indicate a contention window upper limit value equal to a second numerical value, the contention window upper limit value equal to the second numerical value is used for the plurality of terminal devices to contend for the unlicensed resources in the first time period, and the second numerical value is different from the first numerical value; the base station detects data sent by at least one terminal device based on contention on the unlicensed resource in a first time period, and the method comprises the following steps: and the base station detects data sent by at least one terminal device according to the upper limit value of the contention window equal to the second numerical value on the authorization-free resource in the first time period.
In a possible implementation manner, the determining, by the base station, a contention window upper limit equal to a first value according to the detection result includes: if the number of times of reception failure is greater than a first threshold or the reception failure rate is greater than a second threshold, the base station determines the upper limit value of the contention window equal to a first value, wherein the first value is greater than the second value; or if the number of times of reception failure is less than a third threshold or the reception failure rate is less than a fourth threshold, the base station determines the upper limit value of the contention window equal to a first value, where the first value is less than the second value.
In this embodiment of the present application, the base station may dynamically adjust the size of the upper limit value of the contention window, and if the number of times of reception failure is large or the reception failure rate is high, it indicates that the probability of collision on the first unlicensed resource is high, and the base station may adjust the upper limit value of the contention window to be large, so that the initial value of the counter (which will be described in detail later) may be generated in a larger space, and the probability of multiple terminal devices generating the same initial value of the counter may be reduced, which may reduce the probability of collision. If the failure times are less or the failure rate is lower, the base station can adjust the upper limit value of the contention window to be smaller, which is beneficial to avoiding resource waste caused by avoidance of the terminal equipment in a larger range.
In a possible implementation manner, the sending, by the base station, the first indication information according to the first upper limit value includes: the base station sends a system information block SIB, and the SIB carries the first indication information; or the base station sends downlink control information DCI, and the DCI carries the first indication information.
In a second aspect, a contention-based transmission method is provided, the method comprising: the method comprises the steps that terminal equipment receives first indication information sent by a base station, wherein the first indication information is used for indicating a contention window upper limit value equal to a first numerical value; and the terminal equipment competes for the authorization-free resource according to the upper limit value of the competition window equal to the first numerical value.
In the embodiment of the application, the base station determines the value of the upper limit value of the contention window, and the terminal device does not actively adjust the upper limit value of the contention window, so that the base station is favorable for uniformly managing the contention free authorization resource of the served terminal device.
In a possible implementation manner, the contending for the license exemption resource by the terminal device according to the contention window upper limit equal to the first value includes: after the terminal device determines the contention window upper limit value equal to the first numerical value and before the terminal device receives third indication information, the terminal device contends for the license-exempted resource according to the contention window upper limit value equal to the first numerical value, wherein the third indication information is used for indicating the contention window upper limit value not equal to the first numerical value.
In one possible implementation, the method further comprises: the terminal device receives the third indication information, where the third indication information is specifically used to indicate a contention window upper limit value equal to a third numerical value; and the terminal equipment stops using the competition window upper limit value equal to the first numerical value to compete for the authorization-free resource, and uses the competition window upper limit value equal to the third numerical value to compete for the authorization-free resource.
In a possible implementation manner, the receiving, by the terminal device, first indication information sent by a base station includes: the terminal equipment receives a system information block SIB sent by a base station, wherein the SIB carries the first indication information; or the terminal equipment receives downlink control information DCI sent by the base station, wherein the DCI carries the first indication information.
Optionally, in a possible implementation manner, the contending, by the terminal device, for the unlicensed resource according to the contention window upper limit value equal to the first value includes: when the terminal equipment transmits first data for the first time, randomly generating an initial value of a backoff counter according to the upper limit value of the contention window equal to the first numerical value, wherein the initial value is greater than or equal to 0 and less than or equal to the first numerical value; if the value of the backoff counter is less than or equal to the number of transmission units included in the unlicensed resource in a second time period, the terminal device sends data on the unlicensed resource in the second time period; and/or if the value of the backoff counter is greater than the number of transmission units included in the unlicensed resource in the second time period, the terminal device updates the value of the backoff counter and uses the updated value of the backoff counter to compete for the unlicensed resource after the second time period, wherein the value of the backoff counter before updating and the value of the backoff counter after updating satisfy the formula: r '═ R-N, where R' is the value of the backoff counter after updating, R is the value of the backoff counter before updating, and N is equal to the number of transmission units included in the unlicensed resource for the second time period.
In a third aspect, a contention-based transmission method is provided, the method including: the terminal equipment receives indication information from the base station, wherein the indication information is used for indicating an upper limit base value of a contention window upper limit value; the terminal equipment determines the value range of the upper limit value of the competition window according to the upper limit base value; and the terminal equipment sends data to the base station on the authorization-free resource according to the value range.
In the embodiment of the application, the base station indicates the upper limit base value to the terminal device, and the terminal device determines the value range of the upper limit value of the contention window according to the upper limit base value, which is beneficial to improving the flexibility of determining the upper limit value of the contention window by the terminal device.
In a possible implementation manner, if the terminal device receives the indication information after the terminal device retransmits the first data for the p-1 th time and before the terminal device transmits the first data for the p th time, the method further includes: the terminal equipment determines the value of the upper limit value of the contention window according to the upper limit base value, wherein the value of the upper limit value of the contention window meets the condition that W is f (M, p), wherein W is the value of the upper limit value of the contention window (M is more than 0), M is equal to the upper limit base value, and p is more than or equal to 1; and the terminal equipment sends data to the base station on the authorization-free resource according to the value of the upper limit value of the contention window.
In a possible implementation, the minimum value of the value range satisfies the formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or the maximum value of the value range satisfies the formula Wmax=M*2K-1, wherein WmaxAnd M is equal to the maximum value, and M is equal to the upper limit base value, wherein the value of K may be configured by a base station or specified by a protocol.
In a possible implementation manner, the receiving, by the terminal device, the indication information from the base station includes: the terminal equipment receives a system information block SIB sent by the base station, wherein the SIB carries the indication information; or the terminal equipment receives downlink control information DCI sent by the base station, wherein the DCI carries the indication information.
Optionally, in a possible implementation manner, the sending, by the terminal device, data to the base station on an unlicensed resource according to the minimum value and the maximum value includes: when the terminal equipment transmits first data for the first time, randomly generating an initial value of a backoff counter according to a contention window upper limit value which is equal to the minimum value, wherein the initial value is greater than or equal to 0 and less than or equal to the minimum value, and the initial value of the contention window upper limit value is equal to the minimum value; if the value of the backoff counter is less than or equal to the number of transmission units included in the unlicensed resource in the first time period, the terminal device sends data on the unlicensed resource in the first time period; and/or if the value of the backoff counter is greater than the number of transmission units included in the unlicensed resource in the first time period, the terminal device updates the value of the backoff counter and uses the updated value of the backoff counter to compete for the unlicensed resource in the second time period, wherein the value of the backoff counter before updating and the value of the backoff counter after updating satisfy a formula: r ═ R-N, where R equals the value of the backoff counter after update, R equals the value of the backoff counter before update, N equals the number of transmission units included in the unlicensed resource for the first time period, and the second time period is after the first time period.
Optionally, in a possible implementation manner, the method further includes: if the terminal device sends data on the unlicensed resource in the first time period and the terminal device determines that the data sent by the terminal device on the unlicensed resource in the first time period is not successfully received, the terminal device updates the upper limit value of the contention window, and the updated upper limit value of the contention window is greater than the current upper limit value of the contention window and is less than or equal to the maximum value, the method further includes: and the terminal equipment determines whether to send data on the authorization-free resource in the second time period or not according to the updated upper limit value of the contention window.
In a fourth aspect, a contention-based transmission method is provided, the method comprising: the base station determines an upper limit base value, wherein the upper limit base value is used for the terminal equipment to determine the value range of the upper limit value of the competition window; and the base station sends indication information according to the upper limit base value, wherein the indication information is used for the terminal equipment to determine the upper limit base value.
In a possible implementation, the minimum value of the value range satisfies the formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or the maximum value of the value range satisfies the formula Wmax=M*2K-1, wherein WmaxEqual to said maximum value, M is equal to said upper limitAnd a base value, wherein the value of K may be configured by a base station or specified by a protocol.
In one possible implementation manner, the determining, by the base station, an upper limit base value includes: the base station determines the upper limit base value according to the average number of transmission units included in the unlicensed resource in each of at least two periods, L times of the average number of transmission units included in the unlicensed resource in each of at least two periods, or the maximum number of transmission units included in the unlicensed resource in a single period in at least two periods, wherein L is greater than 1.
Optionally, the upper limit base value is equal to an average number of transmission units included in the unlicensed resource in each of the at least two periods, L times an average number of transmission units included in the unlicensed resource in each of the at least two periods, or a maximum number of transmission units included in the unlicensed resource in a single period in the at least two periods.
In a possible implementation manner, the sending, by the base station, the indication information according to the upper limit base value includes: the base station sends a system information block SIB according to the upper limit base number value, and the SIB carries the indication information; or the base station sends downlink control information DCI according to the upper limit base number value, wherein the DCI carries the indication information.
In a fifth aspect, the present application provides a communication device having a function of implementing the behavior of the base station in practice of the above method. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The communication device comprises various means for performing any one of the possible implementations of the first aspect or the first aspect, and may be a base station or a baseband chip.
In a sixth aspect, the present application provides a communication device having a function of implementing the behavior of the terminal device in practice in the above method. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The communication device comprises various units for executing the second aspect or any possible implementation manner of the second aspect, and may be a terminal device or a baseband chip.
In a seventh aspect, the present application provides a communication device, which has a function of implementing the behavior of the terminal device in practice in the method. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The communication device comprises various means for performing any one of the possible implementations of the third aspect or the third aspect, and may be a terminal device or a baseband chip.
In an eighth aspect, the present application provides a communication device having a function of implementing the behavior of the base station in practice of the above method. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The communication device includes various means for performing any one of the possible implementations of the fourth aspect or the fourth aspect, and may be a base station or a baseband chip.
In a ninth aspect, the present application provides a communication device comprising a transceiving component and a processor, such that the communication device performs the method of the first aspect or any one of the possible implementations of the first aspect. Wherein the communication device may be a base station or a baseband chip. If the communication device is a base station, the transceiver component may be a transceiver, and if the communication device is a baseband chip, the transceiver component may be an input/output circuit of the baseband chip.
In a tenth aspect, the present application provides a communication device comprising a transceiving component and a processor, such that the communication device performs the method of the second aspect or any possible implementation manner of the second aspect. The communication device may be a terminal device or a baseband chip. If the communication device is a terminal device, the transceiver component may be a transceiver, and if the communication device is a baseband chip, the transceiver component may be an input/output circuit of the baseband chip.
In an eleventh aspect, the present application provides a communication device comprising a transceiving component and a processor, such that the communication device performs the method of the third aspect or any possible implementation manner of the third aspect. The communication device may be a terminal device or a baseband chip. If the communication device is a terminal device, the transceiver component may be a transceiver, and if the communication device is a baseband chip, the transceiver component may be an input/output circuit of the baseband chip.
In a twelfth aspect, the present application provides a communication device comprising a transceiving component and a processor, such that the communication device performs the method of the fourth aspect or any possible implementation manner of the fourth aspect. Wherein the communication device may be a base station or a baseband chip. If the communication device is a base station, the transceiver component may be a transceiver, and if the communication device is a baseband chip, the transceiver component may be an input/output circuit of the baseband chip.
In a thirteenth aspect, there is provided a computer program product comprising: computer program code which, when executed by a base station, causes the base station to perform the method of the first aspect or any of the possible implementations of the first aspect.
In a fourteenth aspect, there is provided a computer program product, the computer program product comprising: computer program code which, when run by a terminal device, causes the terminal device to perform the method of the second aspect or any of the possible implementations of the second aspect.
In a fifteenth aspect, a computer program product is provided, the computer program product comprising: computer program code which, when run by a terminal device, causes the terminal device to perform the method of the third aspect or any of the possible implementations of the third aspect.
In a sixteenth aspect, there is provided a computer program product comprising: computer program code which, when run by a base station, causes the base station to perform the method of any of the above-described fourth aspect or possible implementations of the fourth aspect.
A seventeenth aspect provides a computer-readable medium having stored thereon program code comprising instructions for performing the method of the first aspect or any one of the possible implementations of the first aspect.
In an eighteenth aspect, a computer-readable medium is provided, the computer-readable medium storing program code comprising instructions for performing the method of the second aspect or any of the possible implementations of the second aspect.
A nineteenth aspect provides a computer-readable medium having stored thereon program code comprising instructions for performing the method of the third aspect or any one of the possible implementations of the third aspect.
In a twentieth aspect, a computer-readable medium is provided, the computer-readable medium having stored thereon program code comprising instructions for performing the method of the fourth aspect or any one of the possible implementations of the fourth aspect.
In the embodiment of the application, the terminal device can compete for the unlicensed resources based on the contention window, which is beneficial to reducing the probability of conflict of the terminal device competing for the unlicensed resources and improving the efficiency of the terminal device for transmitting data on the unlicensed resources.
Drawings
Fig. 1 is an application scenario diagram suitable for the embodiment of the present application.
FIG. 2 is a schematic diagram of one example of a CTA suitable for use in embodiments of the present application.
Fig. 3 is a schematic diagram illustrating an example of a CTU partitioning method using SCMA multiple access technology according to an embodiment of the present invention.
Fig. 4 is a schematic interaction diagram of an example of a contention-based transmission method 200 according to an embodiment of the present application.
Fig. 5 is a schematic flowchart of an example of terminal devices competing for CTA according to an embodiment of the present application.
Fig. 6 is a schematic interaction diagram of another example of a contention-based transmission method 300 according to an embodiment of the present application.
Fig. 7 is a schematic flowchart of another example of terminal devices contending for CTA according to an embodiment of the present application.
Fig. 8 is a schematic block diagram of an example of a base station according to an embodiment of the present application.
Fig. 9 is a schematic block diagram of an example of a terminal device according to an embodiment of the present application.
Fig. 10 is a schematic block diagram of another example of a terminal device according to an embodiment of the present application.
Fig. 11 is a schematic block diagram of another example of a base station according to an embodiment of the present application.
Fig. 12 is a schematic block diagram of yet another example of a base station according to an embodiment of the present application.
Fig. 13 is a schematic block diagram of another example of a terminal device according to an embodiment of the present application.
Fig. 14 is a schematic block diagram of still another example of a terminal device according to an embodiment of the present application.
Fig. 15 is a schematic block diagram of still another example of a base station according to an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
It should be understood that the numbers "first", "second", etc. appearing in the embodiments of the present application are merely for distinguishing different objects. For example, in order to distinguish different signaling types, different service types, and the like, the technical solution of the embodiment of the present application should not be limited in any way.
It should also be understood that the division of modes, cases, and categories in the embodiments of the present application is for convenience of description only and should not be construed as a particular limitation, and features in various modes, cases, and categories may be combined without contradiction.
In the embodiment of the present application, a base station is an apparatus deployed in a radio access network for providing a wireless communication function for a terminal device. The base station in the embodiment of the present application may be a base station, a macro base station, a micro base station (also referred to as a small station), a relay station, an access point, and the like in various forms. In systems using different radio access technologies, the names of devices that function as base stations may differ. For example, the base station of the embodiment of the present application may also be a Base Transceiver Station (BTS) in a global system for mobile communication (GSM) or Code Division Multiple Access (CDMA). But also an evolved NodeB (eNB or eNodeB) in an LTE system. Alternatively, the base station may also be a node b (node b) of a third generation (3rd generation, 3G) system, and in addition, the base station may also be a base station in a fifth generation communication (5G) network or a base station in a Public Land Mobile Network (PLMN) network that is evolved in the future, and the like.
The terminal device in this embodiment may also be referred to as a User Equipment (UE), an access terminal, a terminal equipment unit (subscriber unit), a terminal equipment station, a Mobile Station (MS), a remote station, a remote terminal, a mobile device, a user terminal, a terminal (terminal), a wireless communication device, a terminal equipment agent, or a terminal equipment device. The terminal devices may include a variety of handheld devices, vehicle mounted devices, wearable devices, computing devices, or other processing devices connected to a wireless modem with wireless communication capabilities. But may also include subscriber units, cellular phones (cellular phones), smart phones (smart phones), wireless data cards, Personal Digital Assistants (PDA) computers, tablet computers, wireless modems (modem), handheld devices (handset), laptop computers (laptop computers), Machine Type Communication (MTC) terminals, Stations (ST) in Wireless Local Area Networks (WLAN). Which may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, and a next generation communication system, e.g., a terminal device in a 5G network or a terminal device in a future evolved PLMN network, etc.
To facilitate understanding of the embodiments of the present application, first, related art related to the embodiments of the present application will be briefly described.
The basic principle of the license-free transmission mode is as follows: the base station specifies some authorization-free resources for a plurality of terminal devices to perform uplink data transmission, the resources may be configured semi-statically by the base station, and the terminal device randomly selects one or more resource units in the authorization-free resources to transmit data when having data transmission.
By adopting the prior art, if a large number of terminals need to send data, the probability that a plurality of terminal devices send data by using the same unlicensed resource unit at the same time is very high, i.e. the collision probability is high, which easily results in a large number of retransmissions, and is not favorable for the terminal devices to efficiently transmit data.
Based on the above, the embodiments of the present application provide a contention-based transmission method, which is beneficial to improving the efficiency of transmitting data on an unlicensed resource by a terminal device.
Fig. 1 is an application scenario diagram suitable for the embodiment of the present application. As shown in fig. 1, the application scenario includes a base station 101. The application scenario also comprises a plurality of terminal devices 102 located within the coverage of the base station 101. Base station 101 may communicate with terminal device 102. It should be understood that only two terminal devices 102 within the coverage of base station 101 are illustrated in fig. 1 as an example. Obviously, there may be more terminal devices 102 within the coverage area of the base station 101.
The base station in the following embodiments may correspond to the base station 101 in fig. 1, and the terminal device may correspond to the terminal device 102 in fig. 1 or a plurality of terminal devices similar to the terminal device 102.
Specifically, the base station may specify some unlicensed resources for uplink data transmission by multiple terminals. In this embodiment, the unlicensed resource may be understood as a resource region in which a plurality of terminal devices can transmit data using at least part of resources.
For convenience of description, the "unlicensed resource" may also be referred to as a "contention-based transmission resource area (CTA)".
FIG. 2 is a schematic diagram of one example of a CTA suitable for use in embodiments of the present application. As shown in fig. 2, the base station may treat one subband in the system bandwidth as CTA. The spectral resources are divided into time domain units in the time dimension. The time domain unit may be a slot (slot), a mini-slot (mini-slot), or a symbol, or may also be multiple subframes, multiple slots, multiple minislots, or multiple symbols.
When a CTA occupies a subband, all the resources on this subband do not necessarily belong to the CTA. For example, some fixed time-frequency domain locations within each subframe may have particular use (e.g., a subframe start symbol and an end symbol). For example, some fixed time-frequency domain positions in each subframe are used for transmitting a System Information Block (SIB), or for transmitting Downlink Control Information (DCI), and the like. This resource on the sub-band that has a particular purpose is not a CTA. Based on this, the CTA resources within each subframe can be one or more rectangular resource regions.
The subband occupied by the CTA or the resource region included by the CTA may be adjusted by the base station as needed.
For example, the base station may transmit the CTA resource information through a broadcast message (e.g., SIB or DCI). The terminal device acquires the information related to CTA by receiving the broadcast message.
As an alternative example, the CTA may be used by a group of end devices. For example, the base station may configure a first CTA for use by terminal apparatus # a, terminal apparatus # B, and terminal apparatus # C, which terminal apparatus # D cannot use, and terminal apparatus # D cannot transmit data on the license-free resource based on contention.
As another alternative, the CTA may be a contention-based uplink small data resource region. For example, a terminal device having a requirement for uplink small data transmission among all terminal devices served by the base station may contend for the CTA to transmit uplink small data.
Alternatively, CTA may be a periodically occurring time domain resource, e.g., a time period occupying the entire carrier bandwidth within each subframe, and then dividing a plurality of cells in the frequency domain, each cell occupying one or more subcarriers. The time domain and the frequency domain may also be combined, the CTA of each period (e.g., subframe) occupies one or more rectangular time-frequency resource regions, and a smaller time-frequency resource block is divided in the CTA as a transmission unit. That is, the CTA may occur periodically. For example, the period of CTA may be a subframe, where one subframe is defined as 1 ms time length, i.e., there are CTA resources in each ms. Taking the period of CTA as two subframes as an example, the CTA may be located on subframes numbered #0, #2, #4, #6, and # 8.
Further, the CTA may be divided into a plurality of fixed-size transmission units in the time-frequency domain, and the "fixed-size transmission units" may be denoted as "contention-based transmission units (CTUs)", that is, the CTA may include a plurality of CTUs. The CTUs may be orthogonal to each other in the time-frequency domain, or may be overlapped or overlapped with each other in the time-frequency domain to achieve orthogonality by the code domain or the like. In other words, the CTUs within the CTA may use various multiple access techniques, such as Orthogonal Frequency Division Multiple Access (OFDMA), Sparse Code Multiple Access (SCMA), non-orthogonal multiple access (NOMA), and the like. Under various multiple access techniques, the resources in a CTA may be divided into several CTUs.
Fig. 3 is a schematic diagram illustrating an example of a CTU partitioning method using SCMA multiple access technology according to an embodiment of the present invention. As shown in fig. 3, four Resource Blocks (RBs) may be used as a group, and each group of RBs includes six logical CTUs. Each CTU actually occupies two RBs, each RB being repeatedly occupied by three CTUs. Each CTU in each group of CTUs has a unique code word (code), so that signals overlapping one time-frequency resource unit can be orthogonalized by the code word.
There may be several sizes of CTAs, each size of CTA having different CTUs, i.e. some CTAs are suitable for transmitting small data and some CTAs are small and some CTAs are suitable for transmitting slightly larger data and some CTAs are slightly larger. If there is only one CTA, the UE may not be able to complete all data transmission using one CTU, and at this time, the UE may select at least two CTUs for transmission, or may divide the data into two transmissions. The specific partitioning manner of the CTUs and the specific transmission process of the UE using the CTUs are not limited herein.
Hereinafter, the contention based transmission method according to the embodiment of the present application will be described in detail with reference to fig. 4 to 7.
Fig. 4 is a schematic interaction diagram of an example of a contention-based transmission method 200 according to an embodiment of the present application. It should be understood that fig. 4 shows detailed steps or operations of the method 200, but these steps or operations are only examples, and the embodiments of the present application may also perform other operations, variations of the various operations in fig. 4, or only some of the operations in fig. 4.
The method 200 may be performed by a base station and a terminal device. The base station and the terminal device may respectively correspond to the base station 101 and the terminal device 102 in the communication scenario. As shown in fig. 4, the method 200 may include 210, 220, 230, and 240.
210. At least one terminal device transmits data to a base station on the license-free resource of a first time period based on competition; accordingly, the base station detects data transmitted by at least one terminal device based on contention on the unlicensed resource of the first time period.
For ease of illustration, the "unlicensed resources for the first period" may be referred to herein as "first CTA". The at least one terminal device transmitting data to the base station over the first CTA based on contention may comprise: each terminal device of the at least one terminal device transmits data to the base station through a part of CTUs in the first CTA.
A plurality of terminal devices contend for a first CTA, and at least one terminal device that successfully contends for the first CTA can transmit data to the base station through the first CTA.
The base station may detect data on the first CTA sent by the at least one terminal device based on contention. For example, the base station may listen for signals from each CTU in the first CTA and decode signals on the CTUs that have signals in the first CTA.
220. And the base station determines a contention window upper limit value equal to a first value according to the detection result, wherein the contention window upper limit value equal to the first value is used for the multiple terminal devices to contend for the authorization-free resource after the first time period.
For convenience of explanation, "the contention window upper limit value equal to the first value" may be written as "the first upper limit value". The base station may detect the reception of data received over the first CTA and determine the first upper limit based on the detection.
The detection result may include a variety of information that can be used to indicate the reception of the base station over the first CTA.
As an alternative example, the detection result may include the number of reception failures (or the number of CTUs in which a collision occurs).
Specifically, if a base station listens to a signal at a CTU but cannot decode the signal correctly, it may be considered that the signal reception on the CTU failed (or a collision occurs within the CTU). As an alternative example, a failure in receiving a signal on one CTU may be regarded as a failure. For example, the base station fails to receive signals over F CTUs in the first CTA, and the number of times of failure of the base station in the first CTA may be considered as F.
As another optional example, the detection result may include a reception failure rate.
Alternatively, the reception failure rate η may satisfy the formula: η ═ F/Z, where F is the number of reception failures and Z is the total number of CTUs included in the first CTA. For example, the first CTA includes Z1A CTU, which is detected by the base station to know that F exists in the Z CTUs1A signal reception failure at a CTU, the reception failure rate eta being F1/Z1
Alternatively, the reception failure rate η may satisfy the formula: where F is the number of reception failures and J is the number of CTUs that the base station has monitored for signals in the first CTA. For example, the first CTA includes Z CTUs, where the base station is1J in one CTU1A signal is monitored on a CTU, the J1In one CTU F1A signal reception failure at a CTU, the reception failure rate eta being F1/J1
Preferably, η ═ F/Z is more reasonable as the failure rate.
As still another optional example, the detection result may further include the number of reception successes. If the base station monitors a signal in a CTU and correctly decodes the signal, it can be considered that the signal reception on the CTU is successful. As an alternative example, a successful signal reception on one CTU may be counted as a successful signal reception. For example, the base station successfully receives signals on S CTUs in the first CTA, and the number of successful receiving times of the base station in the first CTA may be considered as S.
As still another optional example, the detection result may further include a reception success rate.
Alternatively, the reception success rate λ may satisfy the formula: λ is S/Z, where S is the number of successful receptions and Z is the number of CTUs included by the first CTA. For example, the first CTA includes Z1A CTU, which gets the Z by detection1In one CTU there is S1The signal on the CTU is successfully received, and the receiving success rate lambda is S1/Z1
Alternatively, the reception success rate λ may satisfy the formula: where S is the number of successful receptions and J is the number of CTUs that the base station has heard a signal in the first CTA. For example, the first CTA includes Z1A CTU, the base station is at the Z1J in one CTU1A signal is monitored on a CTU, the J1S in one CTU1The signal on the CTU is successfully received, and the receiving success rate eta is S1/J1
It should be understood that the reception failure rate and the reception success rate may also be determined in other manners, and the reception failure rate and the reception success rate may be determined according to actual situations, which is not limited herein.
Preferably, it is more reasonable to use the failure rate as the basis for adjusting the upper limit value of the contention window.
Taking the detection result including the number of times of reception failure as an example, the step 220 may include one of the following ways.
Mode #1
The base station may store a correspondence between the number of reception failures and the amount of adjustment of the upper limit value of the contention window.
For convenience of explanation, the correspondence between the number of reception failures and the adjustment amount of the upper limit value of the contention window may be referred to as a first correspondence. Alternatively, the first corresponding relationship may be a corresponding relationship between the range of the number of reception failures and the adjustment amount of the upper limit value of the contention window. For example, the upper limit adjustment amount of the contention window corresponding to the number of reception failures from the first number to the second number is Δ W1Reception failed timesThe upper limit value of the competition window corresponding to the number from the third number to the fourth number is equal to the delta W2. For example, when the number of failures is less than 5, the upper limit value of the contention window is adjusted to the minimum value allowed (alternatively, the base station may store the minimum value allowed by the contention window). And when the failure times are more than or equal to 5 times and less than 10 times, keeping the upper limit value of the existing contention window unchanged. When the failure times are more than or equal to 10 times and less than 15 times, the upper limit value of the competition window is adjusted to be 1.5 times of the prior value. When the failure times are more than or equal to 15 times and less than 20 times, the upper limit value of the competition window is adjusted to be 2 times of the prior value. And so on.
Similarly, the base station may store a corresponding relationship between the reception failure rate (the number of successful reception times or the reception success rate) and the adjustment amount of the upper limit value of the contention window, for example, when the failure rate is less than or equal to 1%, the upper limit value of the contention window is adjusted to the minimum value allowed, or adjusted to 50% of the upper limit value of the current contention window but not less than the minimum value allowed. And when the failure rate is greater than 1% and less than or equal to 2%, keeping the upper limit value of the existing competition window unchanged. And when the failure rate is greater than 2% and less than or equal to 3%, adjusting the upper limit value of the competition window to be 1.5 times of the existing value. And when the failure rate is more than 3% and less than or equal to 4%, adjusting the upper limit value of the competition window to be 2 times of the existing value. And so on.
Instead of using the above-mentioned complex correspondence, a threshold range may be simply defined, for example, the first threshold is 1% and the second threshold is 2%. If the failure rate is less than (or equal to) the first threshold, the upper limit value of the contention window is adjusted to the minimum value, or adjusted to 50% or 75% of the upper limit value of the current contention window, and the like, but not less than the minimum value. If the failure rate is greater than (or equal to) the first threshold and less than (or equal to) the second threshold, the upper limit value of the existing contention window is kept unchanged. If the failure rate is greater than (or equal to) the second threshold, the upper limit of the contention window is adjusted to 1.5 times or 2 times the existing value, etc.
Mode #2
The base station may determine the first upper limit value based on a contention window upper limit value used by the terminal device in the first CTA.
That is, prior to the 210, the method may further include:
201. the base station sends second indication information; accordingly, the terminal device(s) receive the second indication information.
Alternatively, the base station may transmit the second indication information through a broadcast message. For example, the base station may transmit the second indication information through SIB or DCI. The second indication information is used for indicating a contention window upper limit value equal to a second numerical value. For convenience of explanation, the "contention window upper limit value equal to the second value" may be written as a "second upper limit value". The second upper limit value is used for terminal equipment competition time # T1Followed by an unlicensed resource. Optionally, the time # T1The time of the second upper limit value may be determined for the terminal device.
After receiving the second indication information, the terminal device may use the second upper limit value indicated by the second indication information to compete for the time # T1Followed by CTA. That is, after the terminal device determines the second upper limit value, the CTA of the subsequent period can be contended using the second upper limit value, and it is understood that the period after the time # a includes the first period.
The 210 may include:
the base station detects, on the first CTA, data transmitted by at least one terminal device according to the second upper limit value.
The 220 may include:
and the base station determines the upper limit value of the contention window according to the detection result. Wherein, the determined upper limit value of the contention window may be equal to the second upper limit value or may not be equal to the second upper limit value.
For example, if the number of reception failures is greater than (or equal to) a first threshold or the reception failure rate is greater than (or equal to) a second threshold, the base station determines a first upper limit value, where the first upper limit value is greater than the second upper limit value.
Taking the detection result including the number of times of reception failure as an example, if the number of times of reception failure is greater than the first threshold, which indicates that the collision probability is higher in the first CTA, the base station may increase the upper limit value of the contention window, so that the initial value of the counter (which will be described in detail later) may be generated in a larger space, the probability that multiple terminal devices generate the same initial value of the counter may be reduced, and the collision probability may be reduced.
For another example, if the number of reception failures is less than (or equal to) a third threshold or the reception failure rate is less than (or equal to) a fourth threshold, the base station determines the first upper limit value, where the first upper limit value is less than the second upper limit value.
The first threshold is larger than the third threshold, and the second threshold is larger than the fourth threshold.
Taking the detection result including the reception failure rate as an example, if the reception failure rate is smaller than the third threshold, it indicates that there are fewer collisions in the first CTA, and the base station may adjust the upper limit value of the contention window to be small, which is beneficial to avoiding CTA resource waste caused by terminal equipment receding in a larger range.
It should be understood that, when the base station adjusts the upper limit value of the contention window, it is not necessary to adjust the upper limit value step by step (for example, adjust the second upper limit value by multiple), and the base station may directly determine the first upper limit value according to the number of reception failures or the reception failure rate. How the base station determines the first upper limit value according to the second upper limit value is not limited herein.
Similarly, the first upper limit value may be determined according to at least one of the number of successful receptions and the reception success rate, and the second upper limit value.
230. The base station sends first indication information according to the upper limit value of the contention window equal to the first numerical value; accordingly, the terminal device receives the first indication information.
Alternatively, the base station may transmit the first indication information through a broadcast message. For example, the terminal device may transmit the first indication information through SIB or DCI. The first indication information is used for indicating the first upper limit value. Specifically, the first indication information may indicate the first upper limit value in various ways in the embodiment of the present application.
As an alternative example, the first indication information may explicitly indicate the first upper limit value.
As another optional example, the base station and the terminal device may know multiple contention window upper limit values, where the first upper limit value is one of the multiple contention window upper limit values, and the base station may send an identifier of the first upper limit value.
As still another optional example, the first indication information may implicitly indicate the first upper limit value. Specifically, the upper limit value and the upper limit value parameter of the contention window may satisfy the formula: w ═ f (k), where W is the contention window upper limit, W > 0, and k is the upper limit parameter. The first indication information may indicate the upper limit parameter, and the terminal device may determine the first upper limit value after receiving the upper limit parameter. For example, the upper limit value and the upper limit value parameter of the contention window satisfy the formula: w is M2k-1, wherein M is an upper base value, which may be a default value, and which may also be a value that the base station notifies the terminal device. For example, if the terminal device accesses the base station, the base station may send the upper limit base value to the terminal device. For another example, the base station may periodically broadcast the upper base value. The upper base value may be considered known to the terminal device. k (k is more than or equal to 0) is an upper limit parameter value. The first indication information may indicate the upper limit parameter value.
Because the upper limit parameter value is an index, the value range of the upper limit parameter value is small, the number of occupied bits is small, and compared with the first upper limit value explicitly indicated by the first indication information, the first indication information indicates the first upper limit value by indicating the upper limit parameter value, so that the length of a message (for example, a broadcast message carrying the first indication information) carrying the first indication information can be reduced, and the spectrum utilization rate is improved.
240. And the terminal equipment competes for the authorization-free resource according to the first upper limit value.
Specifically, the terminal device contends for the time # T according to the first upper limit value2Followed by CTA. At this time # T2Can be understood as the time after the first period, this time # T2It is also understood that the time when the terminal device determines the first upper limit value (how the terminal device competes for CTA according to the contention window upper limit value will be described in detail later).
Similar to that described above, the base station can detect data transmitted by at least one terminal device based on the first upper limit value over the CTA of the second period. For convenience of description, the CTA in the second period may be denoted as a second CTA, and the base station may determine, according to a detection result of the second CTA, whether the upper limit value of the contention window (in the next week) maintains the first upper limit value or adjusts the first upper limit value to obtain the updated upper limit value of the contention window.
If the base station determines, according to the detection result in the second CTA, that the contention window upper limit value is equal to the third value (the third value is not equal to the first value), the base station may notify the terminal device of the contention window upper limit value equal to the third value through the three indication information. For convenience of explanation, "the upper limit value of the contention window equal to the third value" may be written as "the third upper limit value".
If the base station determines to maintain the first upper limit value unchanged according to the detection result, the base station does not need to send the indication information, and the terminal device can continue to use the first upper limit value to compete for the license-free resource in the next period.
That is, after the terminal device determines the first upper limit value, it contends for CTA according to the first upper limit value until the terminal device receives the third indication information, and the terminal device stops contending for CTA using the first upper limit value and contends for CTA using the third upper limit value indicated by the third indication information.
In this embodiment of the present application, the base station may determine (according to a receiving situation) the contention window upper limit value, and indicate the contention window upper limit value determined by the base station to the terminal device through the indication information, and the terminal device contends for the CTA according to the contention window upper limit value. It should be noted that the indication information in the embodiment of the present application belongs to the same type of information, and all the indication information can be sent in the same manner. For example, by SIB or DCI transmission. Further, when the indication information indicates the upper limit value of the contention window, the indication information may be indicated in an explicit or implicit manner.
Hereinafter, a detailed procedure in which the terminal device competes for CTA according to the upper limit value of the contention window is described.
Fig. 5 is a schematic flowchart of an example of terminal devices competing for CTA according to an embodiment of the present application. It should be understood that fig. 5 shows detailed steps or operations of the terminal device competing for the unlicensed resource, but these steps or operations are merely examples, and other operations or only some of the operations in fig. 5 may also be performed in the embodiments of the present application.
Specifically, the terminal device (e.g., terminal device # a) contending for CTA according to the contention window upper limit value may include:
2a, acquiring a competition window upper limit value W;
specifically, the terminal device may obtain the contention window upper limit value by receiving the indication information sent by the base station.
2b, if the terminal equipment has a need to transmit the first data through the current CTA, the terminal equipment randomly generates the value (initial value) R of the counter0Wherein R is0Has a value range of [0, W]I.e. the initial value is greater than or equal to and less than or equal to W.
Specifically, the terminal device may randomly generate the initial value R of the counter according to W when first data is transmitted0. For example, assume W is equal to a first value W1,R0Has a value range of [0, W1]。
2c, the terminal device receives the number information from the base station, the number information being used for indicating the number N of CTUs included in the current CTA.
The number of CTUs included in the current CTA may be recorded as the current number of CTUs for convenience of explanation.
Similar to the contention window upper limit value in the above, the number information may explicitly or implicitly indicate the number N included by the current CTU, and may also be transmitted through a broadcast message.
It should be understood that the contention window upper limit value W and the number N of current CTUs (N > 0) may be transmitted through one broadcast message or may be transmitted through different broadcast messages. Optionally, as for the contention window upper limit value, the base station may broadcast the contention window upper limit value W once or continuously for multiple times when the contention window upper limit value is changed, a broadcast period of the contention window upper limit value may be long, and the contention window upper limit value W may be placed in an SIB for transmission. For the number of current CTUs, the number of current CTUs belongs to periodic data, and the base station may periodically broadcast the number of current CTUs, which may be put in DCI for transmission.
It should be appreciated that the current number of CTUs need not be broadcast periodically, provided that the number of CTUs in the CTA per cycle is substantially constant. And under the condition that the number N of the current CTUs is changed compared with the number of the last CTUs, the base station broadcasts the number N of the current CTUs.
And 2d, the terminal equipment judges the size relationship between the value of the counter and the number N of the CTUs included in the current CTA, and executes 2e if the value of the counter is less than or equal to N, and executes 2f if the value of the counter is greater than N.
2e, the terminal device transmits data on at least one CTU in the current CTA.
Specifically, the terminal device may select at least one CTU in the current CTA to transmit uplink data based on a certain criterion.
As an optional example, the terminal device may randomly select the at least one CUT to transmit the uplink data.
As another alternative, the terminal device may select at least one CTU to transmit uplink data according to the value of the current counter. For example, the terminal device may determine that the value of the current counter is the index number of the CUT, and the terminal device may transmit uplink data on the CTU corresponding to the index number equal to the value of the current counter. For example, a terminal device may transmit data on CTUs numbered R
2f, the terminal device determines that it is not able to send data in the current CTA, and the terminal device updates the value of the counter. The difference between the updated counter value and the counter value before updating is N, and the terminal device may perform contention for CTA in the next period based on the updated value.
For example, assuming that the current counter has a value of R > N, the terminal device may update the counter value to R' ═ R-N. Wherein, R 'is the value of the backoff counter after updating, R is the value of the backoff counter before updating, N is the number of the current CTUs, and the terminal device can compete for CTA in the next period according to whether R' is greater than the number of CTUs in the next period.
Optionally, the method may further include:
and 2g, if the terminal equipment transmits data on the current CTA, the terminal equipment judges whether the data transmitted on the current CTA is successfully received by the base station.
Specifically, the terminal device may determine whether the data on the current CTA is successfully received in a variety of ways. For example, if the terminal device receives an ACK, the terminal device determines that the data on the current CTA was successfully received. For another example, if the terminal device receives a NACK, the terminal device determines that the data on the current CTA was not successfully received. As another example, if the terminal device does not receive the ACK for a predetermined time (e.g., the timer times out), it is determined that the data on the current CTA was not successfully received.
And 2h, if the terminal equipment determines that the data on the current CTA is successfully received, shifting the successfully received data out of the data buffer to be transmitted without performing other more processing.
And 2i, if the terminal equipment determines that the data transmitted on the current CTA is not successfully received and the terminal equipment does not receive the updated upper limit value of the contention window, the terminal equipment executes 2b and continues the contention of the subsequent CTA.
By adopting the method of the embodiment of the application, the terminal equipment can randomly generate the initial value of the counter according to the upper limit value of the competition window, and determine whether to send data on the current CTA according to the size relationship between the value of the counter and the number of the current CTUs, so that the collision probability can be reduced. For example, assuming that the first upper limit value is equal to 100, 80 terminal devices have a requirement for transmitting data on the second CTA, where the second CTA includes 50 CTUs, the 80 terminal devices may randomly generate an initial value of a counter according to the first upper limit value, the initial value of a counter generated by a part of the 80 terminal devices is greater than 50, the terminal device whose initial value of the generated counter is greater than 50 determines not to transmit data using the CTUs in the second CTA, the terminal device whose initial value of the generated counter is less than or equal to 50 may transmit data using the CTUs in the second CTA, and the number of terminal devices that transmit data using the CTUs in the second CTA is less than 80, which can reduce the probability that multiple terminal devices transmit data on the same CTU at the same time, and is beneficial to improving the efficiency of data transmission. Further, in the embodiment of the present application, the base station may dynamically adjust the upper limit value of the contention window in time according to the receiving condition, that is, it is beneficial to reduce the probability of the terminal device sending the uplink data collision, and at the same time, it is beneficial to improve the resource utilization rate and the efficiency of data transmission.
In the above, an example of the contention based transmission method according to the embodiment of the present application is described, and in the following, another example of the contention based transmission method according to the embodiment of the present application is described.
Fig. 6 is a schematic interaction diagram of another example of a contention-based transmission method 300 according to an embodiment of the present application. It should be understood that fig. 6 shows detailed steps or operations of the method 300, but these steps or operations are only examples, and the embodiments of the present application may also perform other operations, variations of the various operations in fig. 6, or only some of the operations in fig. 6.
The method 300 may be performed by a base station and a terminal device. The base station and the terminal device may respectively correspond to the base station 101 and the terminal device 102 in the communication scenario. As shown in fig. 6, the method 300 may include 310, 320, 330, and 340.
310. The base station determines an upper base value.
Specifically, the upper limit base value is used for the terminal device to determine the value range of the upper limit value of the contention window. The base station may determine the upper base value based on a variety of criteria.
As an alternative example, the upper base number may be equal to the average number of CTUs included in the CTA for each of the at least two periods. Where this period can be understood as one cycle of CTA. That is, the upper limit base value may be equal to the average number of CTUs per cycle (which may be a time slot) over a period of time. For example, the period of time includes three periods, and the period #1 includes the number of CTUs N1The number of CTUs included in cycle #2 is N2The number of CTUs included in cycle #3 is N3The upper base number W ═ N1+N2+N3)/3。
As an optionally further example, the upper base number may be equal to L times the average number of CTUs that the CTA includes for each of the at least two periods, where L > 1. That is, the upper limit base value may be equal to every time periodL times the average number of CTUs per period (which may be a slot). For example, the period of time includes three periods, and the period #1 includes the number of CTUs N1The number of CTUs included in cycle #2 is N2The number of CTUs included in cycle #3 is N3The upper base number W is 2 (N)1+N2+N3)/3。
As an optionally further example, the upper base number may be equal to a maximum number of CTUs included by CTA of a single period of the at least two periods. That is, the upper bound radix value may be equal to the maximum number of CTUs per cycle over a period of time. For example, the period of time includes three periods, and the period #1 includes the number of CTUs N1The number of CTUs included in cycle #2 is N2The number of CTUs included in cycle #3 is N3,N1<N3<N2The upper base number W ═ N2
It should be understood that the base station may also determine the upper limit base value based on other criteria, and the embodiments of the present application are not limited thereto.
320. The base station sends indication information according to the upper limit base value; accordingly, the terminal equipment receives indication information sent by the base station, wherein the indication information is used for indicating the upper limit base value.
Alternatively, the base station may transmit the indication information through a broadcast message. For example, the base station may transmit the indication information through SIB or DCI. In particular, the indication information may explicitly indicate the upper base value, and the indication information may also implicitly indicate the upper base value, for example, the indication information indicates some parameters, and the terminal device may calculate the upper base value through the parameters. For example, when using the SCMA multiple access technique, these parameters may be CTA time length, frequency domain width, time-frequency domain parameters of CTUs, codebook (Code book) parameters, Pilot (Pilot) parameters, etc. How to calculate the number of CTUs is specific, which is related to the specific multiple access technique and will not be described in detail herein.
330. And the terminal equipment determines the value range of the upper limit value of the competition window according to the upper limit base value of the competition window.
It is to be understood that the range of values includes both minimum and maximum values.
Alternatively, the minimum value may satisfy formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or
The maximum value may satisfy formula Wmax=M*2K-1, wherein WmaxEqual to said maximum value, M equal to said upper base value, K > 1. The value of K may be agreed by a protocol or configured by the base station.
As an alternative example, after the terminal device obtains the upper limit base value, the terminal device may initialize the upper limit value of the contention window, for example, to make the upper limit value of the contention window equal to the minimum value. If the terminal device transmits the first data for the first time after receiving the indication information, the terminal device may randomly generate an initial value of the counter according to the upper limit value of the contention window equal to the minimum value, and contend for the current CTA according to a size relationship between the value of the counter and the number of the current CTUs.
As another optional example, the method may further include: the terminal equipment obtains (updates) the value of the upper limit value of the contention window according to the upper limit base number value, and the value of the upper limit value of the contention window meets the formula W ═ f (M, p), wherein p is the number of times of retransmitting the same data or the number of times of continuous transmission failure, and p is more than or equal to 1. For example, the terminal device may be based on W ═ M × 2p-1 obtaining the value of the upper limit value of the contention window.
For example, if the terminal device receives the indication information after the terminal device first transmits the second data and before the terminal device first retransmits the second data, the terminal device may use the formula M × 21-1 determining a contention window upper limit value to be used for the second transmission of the second data.
When the contention window upper limit value is actually adjusted to be larger due to transmission failure, W 'may be simply used, where W is the current contention window upper limit value and W' is the updated contention window upper limit value. But using W ═ M2p-1 calculating a new contention window upper limit value with different effects, e.g. when M changes its value at 3rd retransmission, W-M2pThe results of the calculations of-1 and W' ═ W2 +1 are notThe same applies. Therefore, preferably, W ═ M × 2 is usedpIt is more reasonable to calculate a new contention window upper limit value.
340. And the terminal equipment sends data to the base station on the authorization-free resource according to the value range.
Specifically, the terminal device may compete for the time # T according to the value range2CTA thereafter, at time # T2The time instants of the minimum and maximum values may be determined for the terminal device.
It should be noted that the differences between the method 200 and the method 300 include: in the method 200, the base station determines the upper limit value of the contention window, and notifies the determined upper limit value of the contention window to the terminal device through the indication information, and if the terminal device does not receive the updated upper limit value of the contention window, the terminal device always uses the last received upper limit value of the contention window to contend for the CTA, regardless of whether the data sent by the terminal device in the current CTA is successfully received by the base station or whether the terminal device transmits a certain data for the first time. In the method 300, the base station sends the upper limit base value to the terminal device through the indication information, the terminal device may determine a value range of the upper limit value of the contention window (or determine a value of the upper limit value of the contention window) according to the upper limit base value, and based on the value range of the upper limit value of the contention window, the terminal device may adjust the upper limit value of the contention window according to whether the sent data is successfully received or whether a certain data is first transmitted, and if the terminal device receives the updated upper limit base value, the terminal device may determine the minimum value and the maximum value according to the updated upper limit base value, so as to compete for the subsequent CTA.
Fig. 7 is a schematic flowchart of another example of terminal devices contending for CTA according to an embodiment of the present application. It should be understood that fig. 7 shows detailed steps or operations of the terminal device competing for the unlicensed resource, but these steps or operations are merely examples, and the embodiments of the present application may also perform other operations, variations of the various operations in fig. 7, or perform only some of the operations in fig. 7.
Specifically, the terminal device contending for CTA according to the contention window upper limit value may include:
and 3a, acquiring an upper limit base value M, and acquiring a competition window upper limit value W according to the upper limit base value.
Specifically, the terminal device may obtain the upper limit base value by receiving the indication information sent by the base station.
As can be seen from the above, the obtaining, by the terminal device, the upper limit base number value may include: initializing the upper limit value of the contention window (making the upper limit value of the contention window equal to the minimum value), or obtaining the value of the upper limit value of the contention window according to the upper limit base value, for which specific description may refer to the above related description, which is not described herein for brevity.
3b, if the terminal equipment has the requirement of transmitting the first data through the current CTA, the terminal equipment randomly generates the value (initial value) R of the counter0Wherein R is0Has a value range of [0, W]I.e. the initial value is greater than or equal to and less than or equal to W.
3c, the terminal device receives the number information from the base station, wherein the number information is used for indicating the number N of CTUs included in the current CTA.
And 3d, the terminal equipment judges the size relationship between the value of the counter and the number N of the CTUs included in the current CTA, and executes 3e if the value of the counter is less than or equal to N, and executes 3f if the value of the counter is greater than N.
3e, the terminal equipment transmits data on at least one CTU in the current CTA.
Specifically, the terminal device may select at least one CTU in the current TA to transmit uplink data based on a certain criterion.
3f, the terminal device determines that it is not able to send data in the current CTA, and the terminal device updates the value of the counter. The difference between the updated counter value and the counter value before updating is N, and the terminal device may perform contention for CTA in the next period based on the updated value.
For example, assuming that the current counter has a value of R > N, the terminal device may update the counter value to R '═ R-N and compete for CTA of the next cycle according to whether R' is greater than the number of CTUs of the next cycle.
Optionally, the method may further include:
and 3g, if the terminal equipment transmits data on the current CTA, the terminal equipment judges whether the data transmitted on the current CTA is successfully received by the base station.
And 3h, if the terminal equipment determines that the data on the current CTA is successfully received, shifting the successfully received data out of the data buffer to be transmitted without performing other more processing.
And 3i, if the terminal equipment determines that the data transmitted on the current CTA is not successfully received and the terminal equipment does not receive the updated upper limit base number value, the terminal equipment enlarges the upper limit value of the competition window according to the current upper limit base number value. For example, it may be based on M x 2p-1 expanding the contention window upper limit value by contending for a subsequent CTA according to the expanded contention window upper limit value.
Specifically, if the data transmitted by the terminal device on the current CTA is not successfully received, it may be that at least two terminal devices select the same CTU to transmit the data, so that the data transmitted by the terminal device is not successfully received. In order to reduce the probability of collision occurring again in the next retransmission, the terminal device may increase the value of the upper limit value of the contention window, and return to step 3b to attempt to retransmit the data that remains in the buffer and is not successfully received. Since the terminal device increases the upper limit value of the contention window, the initial value of the counter can be generated in a larger space, the initial values of the counters generated by a plurality of terminal devices are reduced, and the collision probability can be reduced. Alternatively, the terminal device may increase the contention window upper limit value in various ways, for example, the contention window upper limit value may be increased by one time. For example, the increased contention window upper limit value satisfies W '═ 2W +1, where W' is the increased contention window upper limit value and W is the current contention window upper limit value (i.e., the contention window upper limit value before the increase)
By adopting the method of the embodiment of the application, the terminal equipment can randomly generate the initial value of the counter according to the upper limit value of the contention window, and determine whether to send data on the current CTA or not according to the size relationship between the value of the counter and the number of the current CTUs, so that the collision probability can be reduced, and the efficiency of data transmission can be improved. Further, in the embodiment of the present application, the terminal device determines the value range of the upper limit value of the contention window according to the upper limit base value, which is beneficial to improving the flexibility of determining the upper limit value of the contention window by the terminal device and is beneficial to improving the transmission performance.
The method for contention-based data transmission according to the embodiment of the present application is described above with reference to fig. 2 to 7, and the apparatus according to the embodiment of the present application is described below with reference to fig. 8 to 15.
Fig. 8 is a schematic block diagram of an example of a base station according to an embodiment of the present application. As shown in fig. 8, the base station 400 includes:
a receiving unit 410, configured to detect contention-based data sent by at least one terminal device on an unlicensed resource in a first time period; a processing unit 420, configured to determine, according to a detection result of the receiving unit 410, a contention window upper limit value equal to a first value, where the contention window upper limit value equal to the first value is used for a plurality of terminal devices to contend for an unlicensed resource after the first period; a sending unit 430, configured to send first indication information according to the contention window upper limit value equal to the first numerical value determined by the processing unit 420, where the first indication information is used to indicate the contention window upper limit value equal to the first numerical value.
Optionally, before the processing unit 420 determines, according to the detection result, that the contention window upper limit value is equal to the first value, the sending unit is further configured to: sending second indication information, where the second indication information is used to indicate a contention window upper limit value equal to a second numerical value, where the contention window upper limit value equal to the second numerical value is used by the multiple terminal devices to contend for the unlicensed resources in the first time period, and the second numerical value is different from the first numerical value; the receiving unit 410 is specifically configured to: and detecting data sent by at least one terminal device according to the upper limit value of the contention window equal to the second value on the license-free resource in the first period.
Optionally, the detection result includes at least one of a number of reception failures and a reception failure rate, and the processing unit 420 is specifically configured to: if the receiving failure times are larger than a first threshold or the receiving failure rate is larger than a second threshold, determining the upper limit value of the contention window equal to a first numerical value, wherein the first numerical value is larger than the second numerical value; or if the number of times of reception failure is less than a third threshold or the reception failure rate is less than a fourth threshold, determining the upper limit value of the contention window equal to the first value, where the first value is less than the second value.
Optionally, the sending unit 430 is specifically configured to: sending a system information block SIB, wherein the SIB carries the first indication information; or sending Downlink Control Information (DCI), wherein the DCI carries the first indication information.
Fig. 9 is a schematic block diagram of an example of a terminal device according to an embodiment of the present application. As shown in fig. 9, the terminal device 500 includes: a receiving unit 510, configured to receive first indication information sent by a base station, where the first indication information is used to indicate a contention window upper limit equal to a first numerical value; the processing unit 520 is configured to contend for the unlicensed resource according to the contention window upper limit value equal to the first value. Optionally, the processing unit 520 is specifically configured to: after the processing unit 520 determines the contention window upper limit value equal to the first value, and before the receiving unit 510 receives third indication information, the third indication information is used to indicate the contention window upper limit value not equal to the first value, the contention free resource is contended according to the contention window upper limit value equal to the first value.
Optionally, the receiving unit 510 is further configured to: receiving the third indication information, where the third indication information is specifically used to indicate a contention window upper limit value equal to a third numerical value; the processing unit 520 is further configured to: and the terminal equipment stops using the competition window upper limit value equal to the first numerical value to compete for the authorization-free resource, and uses the competition window upper limit value equal to the third numerical value to compete for the authorization-free resource.
Optionally, the receiving unit 510 is specifically configured to: receiving a system information block SIB sent by a base station, wherein the SIB carries the second indication information; or receiving downlink control information DCI sent by the base station, wherein the DCI carries the second indication information.
Fig. 10 is a schematic block diagram of another example of a terminal device according to an embodiment of the present application. As shown in fig. 10, the terminal apparatus 600 includes:
a receiving unit 610, configured to receive indication information from a base station, where the indication information is used to indicate an upper base value of an upper limit value of a contention window;
a processing unit 620, configured to determine a value range of the upper limit value of the contention window according to the upper limit base value received by the receiving unit 610;
a sending unit 630, configured to send data to the base station on an authorization-free resource according to the value range determined by the processing unit 620.
Optionally, if the receiving unit 610 receives the indication information after the transmitting unit 630 retransmits the first data for the p-1 th time and before the transmitting unit 630 transmits the first data for the p-th time, the processing unit 620 is further configured to: and determining the value of the upper limit value of the contention window according to the upper limit base value, wherein the value of the upper limit value of the contention window meets the following requirements: w ═ f (M, p); wherein, W is the value of the upper limit value of the competition window, M is equal to the upper limit base value, and p is more than or equal to 1; the sending unit 630 is specifically configured to: and sending data to the base station on the authorization-free resource according to the value of the upper limit value of the contention window.
Optionally, the minimum value of the value range satisfies formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or the maximum value of the value range satisfies the formula Wmax=M*2K-1, wherein WmaxAnd M is equal to the maximum value, M is equal to the upper limit base value, and the value of K is configured or agreed in advance by the base station.
Optionally, the receiving unit 610 is specifically configured to: receiving a system information block SIB sent by the base station, wherein the SIB carries the indication information; or receiving downlink control information DCI sent by the base station, wherein the DCI carries the indication information.
Fig. 11 is a schematic block diagram of another example of a base station according to an embodiment of the present application. As shown in fig. 11, the base station 700 includes:
a processing unit 710, configured to determine an upper limit base value, where the upper limit base value is used by a terminal device to determine a value range of an upper limit value of a contention window;
a sending unit 720, configured to send indication information according to the upper limit base value, where the indication information is used by the terminal device to determine the upper limit base value.
Optionally, the minimum value of the value range satisfies formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or the maximum value of the value range satisfies the formula Wmax=M*2K-1, wherein WmaxAnd M is equal to the maximum value, M is equal to the upper limit base value, and the value of K is configured or agreed in advance by the base station.
Optionally, the processing unit 710 is specifically configured to: and determining the upper limit base value according to the average number of the transmission units included in the unlicensed resource in each of the at least two periods, L times of the average number of the transmission units included in the unlicensed resource in each of the at least two periods, or the maximum number of the transmission units included in the unlicensed resource in a single period in the at least two periods, wherein L is greater than 1.
Fig. 12 is a schematic block diagram of yet another example of a base station according to an embodiment of the present application. As shown in fig. 12, base station 800 includes a transceiver 810 and a processor 820. The processor 820 is configured to support the base station to perform the corresponding functions of the base station in the above method. Optionally, the base station 800 may further comprise a memory 830, wherein the memory 830 is coupled to the processor 820 and stores program instructions and data necessary for the base station 800. The processor 820 is specifically configured to execute instructions stored in the memory 830, and when the instructions are executed, the base station performs the method performed by the base station in the above-mentioned method.
It should be noted that the base station 400 shown in fig. 8 can be implemented by the base station 800 shown in fig. 12. For example, the receiving unit 410 and/or the transmitting unit 420 shown in fig. 8 may be implemented by the transceiver 810, and the processing unit 420 may be implemented by the processor 820.
Fig. 13 is a schematic block diagram of another example of a terminal device according to an embodiment of the present application. As shown in fig. 13, the terminal device 900 includes a transceiver 910 and a processor 920. The processor 920 is configured to support the terminal device to perform the corresponding functions of the terminal device in the above method. Optionally, the terminal device 900 may further comprise a memory 930, the memory 930 being coupled to the processor 920 and storing program instructions and data necessary for the terminal device 900. The processor 920 is specifically configured to execute instructions stored in the memory 930, and when the instructions are executed, the terminal device executes the method executed by the terminal device in the above-mentioned method.
It should be noted that the terminal device 500 shown in fig. 9 can be implemented by the terminal device 900 shown in fig. 13. For example, the processing unit 520 shown in fig. 9 may be implemented by the processor 520, and the receiving unit 510 may be implemented by the transceiver 910.
Fig. 14 is a schematic block diagram of still another example of a terminal device according to an embodiment of the present application. As shown in fig. 14, the terminal device 1000 includes a transceiver 1010 and a processor 1020. The processor 1020 is configured to support the terminal device to perform the corresponding functions of the terminal device in the above method. Optionally, the terminal device 1000 can further include a memory 1030, the memory 1030 configured to couple with the processor 1020 and store necessary program instructions and data for the terminal device 1000. The processor 1020 is specifically configured to execute instructions stored in the memory 1030, and when the instructions are executed, the terminal device performs the method performed by the terminal device in the above-mentioned method.
It should be noted that the terminal device 600 shown in fig. 10 can be implemented by the terminal device 1000 shown in fig. 14. For example, the processing unit 620 shown in fig. 10 may be implemented by the processor 1020, the receiving unit 610 and/or may be implemented by the transceiver 1010.
Fig. 15 is a schematic block diagram of another example of a base station according to an embodiment of the present application. As shown in fig. 15, the base station 1100 includes a transceiver 1110 and a processor 1120. The processor 1120 is configured to support the terminal device to perform the corresponding functions of the terminal device in the above method. Optionally, the terminal device 1100 may further comprise a memory 1130, the memory 1130 being configured to couple with the processor 620 and to store program instructions and data necessary for the terminal device 1100. The processor 1120 is specifically configured to execute instructions stored in the memory 1130, and when the instructions are executed, the terminal device executes the method executed by the terminal device in the above-mentioned method.
It should be noted that the base station 700 shown in fig. 11 can be implemented by the base station 1100 shown in fig. 15. For example, the processing unit 710 shown in fig. 11 may be implemented by the processor 1120, and the transmitting unit 720 may be implemented by the transceiver 1110.
It should be understood that in the embodiments of the present application, the processor may be a Central Processing Unit (CPU), and the processor may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like.
It will also be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of Random Access Memory (RAM) are available, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and direct bus RAM (DR RAM).
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded or executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., Digital Versatile Disk (DVD)), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a base station) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (30)

1. A method for contention-based transmission, the method comprising:
a base station detects data sent by at least one terminal device based on contention on a first contention transmission resource area CTA, wherein the first contention transmission resource area CTA comprises a plurality of contention transmission units CTU;
the base station stores a first corresponding relationship or obtains a contention window upper limit value used by the terminal device in a first CTA according to a detection result, and determines a contention window upper limit value equal to a first numerical value, where the contention window upper limit value equal to the first numerical value is used for an unlicensed resource after a plurality of terminal devices contend for a first time period, where the detection result includes at least one of a number of reception failures of a CTU in the first CTA and a reception failure rate of the CTU in the first CTA, and the first corresponding relationship is a corresponding relationship between the number of reception failures or the reception failure rate and a contention window upper limit value adjustment amount;
and the base station sends first indication information according to the upper limit value of the contention window equal to the first numerical value, wherein the first indication information is used for indicating the upper limit value of the contention window equal to the first numerical value.
2. The method as claimed in claim 1, wherein before the base station stores the first mapping relationship or obtains the contention window upper limit value used by the terminal device in the first CTA according to the detection result, and determines the contention window upper limit value equal to the first value, the method further comprises:
the base station sends second indication information, where the second indication information is used to indicate a contention window upper limit value equal to a second value, where the contention window upper limit value equal to the second value is used by the plurality of terminal devices to contend for the first CTA, and the second value is different from the first value;
the base station detecting contention-based transmission of data by at least one terminal device over a first CTA, comprising:
the base station detects, on the first CTA, data transmitted by at least one terminal device according to the upper value of the contention window equal to the second value.
3. The method of claim 2, wherein the base station stores the first mapping relationship or obtains a contention window upper limit value used by the terminal device in the first CTA according to the detection result, and determining the contention window upper limit value equal to the first value comprises:
if the number of reception failures of the CTUs in the first CTA is greater than a first threshold or the reception failure rate of the CTUs in the first CTA is greater than a second threshold, the base station determines the contention window upper limit equal to a first value, wherein the first value is greater than the second value; or
If the number of reception failures of CTUs in the first CTA is less than a third threshold or the reception failure rate is less than a fourth threshold, the base station determines the contention window upper limit equal to a first value, where the first value is less than the second value.
4. The method according to any of claims 1 to 3, wherein the base station sends the first indication information according to the upper value of the contention window equal to the first value, comprising:
the base station sends a system information block SIB, and the SIB carries the first indication information; or
And the base station sends Downlink Control Information (DCI), wherein the DCI carries the first indication information.
5. A method for contention-based transmission, the method comprising:
a terminal device receives first indication information sent by a base station, where the first indication information is used to indicate a contention window upper limit value equal to a first numerical value, where the contention window upper limit value of the first numerical value is determined by storing a first corresponding relationship according to a detection result on a first CTA or obtaining the contention window upper limit value used by the terminal device in the first CTA, where the first CTA includes a plurality of CTUs, the detection result includes at least one of a number of reception failures of the CTUs in the first CTA and a reception failure rate of the CTUs in the first CTA, and the first corresponding relationship is a corresponding relationship between the number of reception failures or the reception failure rate and a contention window upper limit value adjustment amount;
and the terminal equipment competes for the authorization-free resource according to the upper limit value of the competition window equal to the first numerical value.
6. The method of claim 5, wherein the terminal device contends for the license exemption resource according to the contention window upper limit value equal to the first value, comprising:
after the terminal device determines the contention window upper limit value equal to the first numerical value and before the terminal device receives third indication information, the terminal device contends for the license-exempted resource according to the contention window upper limit value equal to the first numerical value, wherein the third indication information is used for indicating the contention window upper limit value not equal to the first numerical value.
7. The method of claim 6, further comprising:
the terminal device receives the third indication information, where the third indication information is specifically used to indicate a contention window upper limit value equal to a third numerical value;
and the terminal equipment stops using the competition window upper limit value equal to the first numerical value to compete for the authorization-free resource, and uses the competition window upper limit value equal to the third numerical value to compete for the authorization-free resource.
8. The method according to any one of claims 5 to 7, wherein the receiving, by the terminal device, the first indication information sent by the base station comprises:
the terminal equipment receives a system information block SIB sent by a base station, wherein the SIB carries the first indication information; or the terminal equipment receives downlink control information DCI sent by the base station, wherein the DCI carries the first indication information.
9. A method for contention-based transmission, the method comprising:
the terminal device receives indication information from a base station, wherein the indication information is used for indicating an upper limit base value of a contention window upper limit value, the contention window upper limit value is determined by storing a first corresponding relationship according to a detection result on a first CTA or obtaining the contention window upper limit value used by the terminal device in the first CTA, the first CTA comprises a plurality of CTUs, the detection result comprises at least one of the number of reception failures of the CTUs in the first CTA and the reception failure rate of the CTUs in the first CTA, and the first corresponding relationship is the corresponding relationship between the number of the reception failures or the failure rate and an adjustment amount of the contention window upper limit value;
the terminal equipment determines the value range of the upper limit value of the competition window according to the upper limit base value;
and the terminal equipment sends data to the base station on the authorization-free resource according to the value range.
10. The method of claim 9, wherein if the terminal device receives the indication information after the terminal device retransmits the first data for the p-1 th time and before the terminal device transmits the first data for the p th time, the method further comprises:
the terminal equipment determines the value of the upper limit value of the contention window according to the upper limit base value, wherein the value of the upper limit value of the contention window meets the condition that W is f (M, p), wherein W is the value of the upper limit value of the contention window, M is equal to the upper limit base value, and p is more than or equal to 1;
and the terminal equipment sends data to the base station on the authorization-free resource according to the value of the upper limit value of the contention window.
11. The method according to claim 9 or 10, wherein the minimum value of the range satisfies the formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or
The maximum value of the value range satisfies the formula Wmax=M*2K-1, wherein WmaxAnd M is equal to the maximum value, M is equal to the upper limit base value, and the value of K is configured or agreed in advance by the base station.
12. The method according to claim 9 or 10, wherein the terminal device receives indication information from the base station, and comprises:
the terminal equipment receives a system information block SIB sent by the base station, wherein the SIB carries the indication information; or
And the terminal equipment receives Downlink Control Information (DCI) sent by the base station, wherein the DCI carries the indication information.
13. A method for contention-based transmission, the method comprising:
a base station determines an upper limit base value, wherein the upper limit base value is used for a terminal device to determine a value range of a contention window upper limit value, the upper limit base value is determined according to the contention window upper limit value and an upper limit value parameter, the contention window upper limit value is determined by storing a first corresponding relationship according to a detection result on a first CTA or obtaining the contention window upper limit value used by the terminal device in the first CTA, the first CTA includes a plurality of CTUs, the detection result includes at least one of the number of reception failures of the CTUs in the first CTA and the reception failure rate of the CTUs in the first CTA, and the first corresponding relationship is the corresponding relationship between the number of reception failures or the reception failure rate and a contention window upper limit value adjustment quantity;
and the base station sends indication information according to the upper limit base value, wherein the indication information is used for the terminal equipment to determine the upper limit base value.
14. The method of claim 13, wherein a minimum value of the range satisfies formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or
The maximum value of the value range satisfies the formula Wmax=M*2K-1, wherein WmaxAnd M is equal to the maximum value, M is equal to the upper limit base value, and the value of K is configured or agreed in advance by the base station.
15. The method according to claim 13 or 14, wherein the base station determines an upper base value, comprising:
the base station determines the upper limit base value according to the average number of CTUs included by the CTA in each of at least two periods, L times the average number of CTUs included by the CTA in each of the at least two periods, or the maximum number of CTUs included by the CTA in a single period in at least two periods, wherein L > 1.
16. A base station, characterized in that the base station comprises:
a reception unit configured to detect, on a first CTA, data transmitted by at least one terminal device based on contention, the first CTA including a plurality of CTUs;
a processing unit, configured to store a first corresponding relationship according to the detection result on the first CTA or obtain a contention window upper limit value used by the terminal device in the first CTA, determine a contention window upper limit value equal to a first value, where the contention window upper limit value equal to the first value is used by multiple terminal devices to contend for an unlicensed resource after a first period, where the detection result includes at least one of a number of reception failures of a CTU in the first CTA and a reception failure rate of the CTU in the first CTA, and the first corresponding relationship is a corresponding relationship between the number of the reception failures or the reception failure rate and a contention window upper limit value adjustment amount;
and a sending unit, configured to send first indication information according to the contention window upper limit value equal to the first numerical value determined by the processing unit, where the first indication information is used to indicate the contention window upper limit value equal to the first numerical value.
17. The base station of claim 16, wherein before the processing unit stores the first corresponding relationship according to the detection result or obtains a contention window upper limit value used by the terminal device in the first CTA, and determines a contention window upper limit value equal to the first value, the sending unit is further configured to: transmitting second indication information indicating a contention window upper limit value equal to a second value, the contention window upper limit value equal to the second value being used by the plurality of terminal devices to contend for the first CTA, the second value being different from the first value;
the receiving unit is specifically configured to: detecting, over the first CTA, data transmitted by at least one terminal device in accordance with the contention window upper limit value equal to the second value.
18. The base station of claim 17, wherein the processing unit is specifically configured to:
determining the contention window upper limit equal to a first value if the number of reception failures of a CTU in the first CTA is greater than a first threshold or a reception failure rate of a CTU in the first CTA is greater than a second threshold, wherein the first value is greater than the second value; or
Determining the contention window upper limit equal to a first value if the number of reception failures of a CTU in the first CTA is less than a third threshold or a reception failure rate is less than a fourth threshold, wherein the first value is less than the second value.
19. The base station according to any of claims 16 to 18, wherein the sending unit is specifically configured to:
sending a system information block SIB, wherein the SIB carries the first indication information; or
And sending Downlink Control Information (DCI), wherein the DCI carries the first indication information.
20. A terminal device, characterized in that the terminal device comprises:
a receiving unit, configured to receive first indication information sent by a base station, where the first indication information is used to indicate a contention window upper limit equal to a first numerical value, where the contention window upper limit of the first numerical value is determined by storing a first correspondence relationship according to a detection result in a first CTA or obtaining the contention window upper limit used by a terminal device in the first CTA, where the first CTA includes a plurality of CTUs, the detection result includes at least one of a number of reception failures of a CTU in the first CTA and a reception failure rate of a CTU in the first CTA, and the first correspondence relationship is a correspondence relationship between the number of reception failures or the reception failure rate and a contention window upper limit adjustment amount;
and the processing unit is used for competing the authorization-free resource according to the upper limit value of the competition window equal to the first numerical value.
21. The terminal device of claim 20, wherein the processing unit is specifically configured to:
after the processing unit determines the contention window upper limit value equal to the first value and before the receiving unit receives third indication information, contending for the unlicensed resource according to the contention window upper limit value equal to the first value, where the third indication information is used to indicate the contention window upper limit value not equal to the first value.
22. The terminal device of claim 21, wherein the receiving unit is further configured to: receiving the third indication information, where the third indication information is specifically used to indicate a contention window upper limit value equal to a third numerical value;
the processing unit is further to: and the terminal equipment stops using the competition window upper limit value equal to the first numerical value to compete for the authorization-free resource, and uses the competition window upper limit value equal to the third numerical value to compete for the authorization-free resource.
23. The terminal device of claim 20, wherein the receiving unit is specifically configured to: receiving a system information block SIB sent by a base station, wherein the SIB carries second indication information; or
And receiving Downlink Control Information (DCI) sent by the base station, wherein the DCI carries the second indication information.
24. A terminal device, characterized in that the terminal device comprises:
a receiving unit, configured to receive indication information from a base station, where the indication information is used to indicate an upper limit base value of a contention window upper limit value, where the contention window upper limit value is determined by storing a first correspondence relationship or obtaining the contention window upper limit value used by the terminal device in a first CTA according to a detection result in the first CTA, where the first CTA includes a plurality of CTUs, the detection result includes at least one of a reception failure number of the CTUs in the first CTA and a reception failure rate of the CTUs in the first CTA, and the first correspondence relationship is a correspondence relationship between the reception failure number or the reception failure rate and a contention window upper limit value adjustment amount;
the processing unit is used for determining the value range of the upper limit value of the competition window according to the upper limit base value received by the receiving unit;
and the sending unit is used for sending data to the base station on the authorization-free resource according to the value range determined by the processing unit.
25. The terminal device according to claim 24, wherein if the receiving unit receives the indication information after the transmitting unit retransmits the first data for the p-1 th time and before the transmitting unit transmits the first data for the p-th time,
the processing unit is further to: and determining the value of the upper limit value of the contention window according to the upper limit base value, wherein the value of the upper limit value of the contention window meets the following requirements:
W=f(M,p);
wherein, W is the value of the upper limit value of the competition window, M is equal to the upper limit base value, and p is more than or equal to 1;
the sending unit is specifically configured to: and sending data to the base station on the authorization-free resource according to the value of the upper limit value of the contention window.
26. The terminal device according to claim 24 or 25, wherein the minimum value of the range satisfies formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or
The maximum value of the value range satisfies the formula Wmax=M*2K-1, wherein WmaxAnd M is equal to the maximum value, M is equal to the upper limit base value, and the value of K is configured or agreed in advance by the base station.
27. The terminal device of claim 24, wherein the receiving unit is specifically configured to:
receiving a system information block SIB sent by the base station, wherein the SIB carries the indication information; or
And receiving Downlink Control Information (DCI) sent by the base station, wherein the DCI carries the indication information.
28. A base station, characterized in that the base station comprises:
a processing unit, configured to determine an upper limit base value, where the upper limit base value is used by a terminal device to determine a value range of a contention window upper limit value, where the upper limit base value is determined according to a contention window upper limit value and an upper limit value parameter, where the contention window upper limit value is determined by storing a first corresponding relationship according to a detection result on a first CTA or obtaining the contention window upper limit value used by the terminal device in the first CTA, where the first CTA includes a plurality of CTUs, the detection result includes at least one of a number of reception failures of a CTU in the first CTA and a reception failure rate of the CTU in the first CTA, and the first corresponding relationship is a corresponding relationship between the number of reception failures or the reception failure rate and a contention window upper limit value adjustment amount;
and the sending unit is used for sending indication information according to the upper limit base value, wherein the indication information is used for the terminal equipment to determine the upper limit base value.
29. The base station of claim 28, wherein the minimum value of the range satisfies the formula WminM-1, wherein WminEqual to said minimum value, M equal to said upper base value; or
The maximum value of the value range satisfies the formula Wmax=M*2K-1, wherein WmaxAnd M is equal to the maximum value, M is equal to the upper limit base value, and the value of K is configured or agreed in advance by the base station.
30. The base station according to claim 28 or 29, wherein the processing unit is specifically configured to: the upper base value is determined based on an average number of CTUs included by CTA for each of at least two periods, L times the average number of CTUs included by CTA for each of the at least two periods, or a maximum number of CTUs included by CTA for a single period of at least two periods, where L > 1.
CN201780069516.3A 2017-05-03 2017-06-19 Contention-based transmission method and device Active CN109937603B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201710305399 2017-05-03
CN2017103053998 2017-05-03
PCT/CN2017/089006 WO2018201584A1 (en) 2017-05-03 2017-06-19 Competition-based transmission method and device

Publications (2)

Publication Number Publication Date
CN109937603A CN109937603A (en) 2019-06-25
CN109937603B true CN109937603B (en) 2021-12-28

Family

ID=64015656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780069516.3A Active CN109937603B (en) 2017-05-03 2017-06-19 Contention-based transmission method and device

Country Status (2)

Country Link
CN (1) CN109937603B (en)
WO (1) WO2018201584A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112188546B (en) * 2019-07-03 2023-06-27 成都华为技术有限公司 Method and device for transmitting data
CN110856262B (en) * 2019-09-25 2022-03-01 西安交通大学 Authorization-free uplink transmission method based on joint time-frequency diversity
CN115119220A (en) * 2021-03-19 2022-09-27 维沃移动通信有限公司 Detection window determining method and device and terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105284172A (en) * 2013-03-08 2016-01-27 华为技术有限公司 System and method for uplink grant-free transmission scheme
WO2016144481A1 (en) * 2015-03-06 2016-09-15 Qualcomm Incorporated Mitigation of inter-base station resynchronization loss in lte/lte-a networks with contention-based shared frequency spectrum
CN106304386A (en) * 2015-05-18 2017-01-04 上海贝尔股份有限公司 For the method triggering the random backoff mechanism of LBT in LTE LAA
WO2017024399A1 (en) * 2015-08-12 2017-02-16 Blackberry Limited Uplink resource scheduling control in response to channel busy condition
CN106488565A (en) * 2015-09-02 2017-03-08 中兴通讯股份有限公司 A kind of resource share method based on competition, network element and system
CN106559797A (en) * 2015-09-25 2017-04-05 上海贝尔股份有限公司 For the method and apparatus intercepted before the session in multi-carrier transmission
CN106559907A (en) * 2015-09-24 2017-04-05 株式会社Ntt都科摩 Determine method, wireless base station and the mobile station of contention window size
CN106559906A (en) * 2015-09-21 2017-04-05 中兴通讯股份有限公司 Data transmission method, the sending method of configured information and device

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3611273A1 (en) * 2004-03-31 2020-02-19 The General Hospital Corporation Method to determine responsiveness of cancer to epidermal growth factor receptor targeting treatments
KR20090031684A (en) * 2006-07-21 2009-03-27 파나소닉 주식회사 Communication device performing contention control
CN102158981B (en) * 2010-02-11 2016-06-22 中兴通讯股份有限公司 A kind of uplink data transmission method based on competition and system
CN102387538B (en) * 2010-09-02 2015-06-10 中兴通讯股份有限公司 Resource competition method and station
CN102958185B (en) * 2011-08-17 2016-06-08 华为技术有限公司 The update method of a kind of competition window and a kind of access point
EP2993952B1 (en) * 2013-05-02 2019-07-31 LG Electronics Inc. Method for sensing channel dynamically in wireless lan system and apparatus therefor
CN104581967B (en) * 2013-10-11 2018-12-28 中国移动通信集团公司 Contention access resource adjusting method, contention access request sending method and device
CN104703288B (en) * 2013-12-05 2018-03-09 上海无线通信研究中心 A kind of transmission method based on quasi- random back strategy in wireless distributed network
CN104185298B (en) * 2014-08-29 2017-11-28 华侨大学 Network load dynamic self-adapting parameter regulation means based on priority
CN104812032B (en) * 2015-04-10 2018-09-07 宇龙计算机通信科技(深圳)有限公司 A kind of method and device in unauthorized frequency range application DRX
CN106549742B (en) * 2015-09-23 2021-01-08 索尼公司 Apparatus and method in a wireless communication system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105284172A (en) * 2013-03-08 2016-01-27 华为技术有限公司 System and method for uplink grant-free transmission scheme
WO2016144481A1 (en) * 2015-03-06 2016-09-15 Qualcomm Incorporated Mitigation of inter-base station resynchronization loss in lte/lte-a networks with contention-based shared frequency spectrum
CN106304386A (en) * 2015-05-18 2017-01-04 上海贝尔股份有限公司 For the method triggering the random backoff mechanism of LBT in LTE LAA
WO2017024399A1 (en) * 2015-08-12 2017-02-16 Blackberry Limited Uplink resource scheduling control in response to channel busy condition
CN106488565A (en) * 2015-09-02 2017-03-08 中兴通讯股份有限公司 A kind of resource share method based on competition, network element and system
CN106559906A (en) * 2015-09-21 2017-04-05 中兴通讯股份有限公司 Data transmission method, the sending method of configured information and device
CN106559907A (en) * 2015-09-24 2017-04-05 株式会社Ntt都科摩 Determine method, wireless base station and the mobile station of contention window size
CN106559797A (en) * 2015-09-25 2017-04-05 上海贝尔股份有限公司 For the method and apparatus intercepted before the session in multi-carrier transmission

Also Published As

Publication number Publication date
WO2018201584A1 (en) 2018-11-08
CN109937603A (en) 2019-06-25

Similar Documents

Publication Publication Date Title
US11582729B2 (en) Method for data transmission in sidelink and terminal device
CN109644466B (en) Uplink signal sending method and terminal equipment
US20190335496A1 (en) Channel listening method and apparatus
CN108811116B (en) Method for transmitting control channel, network equipment, network controller and terminal equipment
WO2017121097A1 (en) Method and device for indicating uplink subframe over unlicensed spectrum
CN111867074B (en) Method for receiving data and transmitting data, and communication device
WO2020047922A1 (en) Method for transmitting configuration information and terminal device
CN111132369B (en) Method for selecting channel and transmitting end
EP3944710A1 (en) Method and apparatus for sending cot indication information
CN110771107B (en) Method and apparatus for cross-digital basic configuration scheduling
US20200037277A1 (en) Downlink synchronization signal sending method and receiving method and device
CN111108800B (en) Communication method and device
WO2019128765A1 (en) Channel listening type indication method and device
US20210160852A1 (en) Resource configuration method and terminal device
JP2018508159A (en) Method and apparatus for data transmission in a wireless communication system
WO2020025042A1 (en) Resource configuration method and terminal device
WO2020248287A1 (en) Random access method and device
CN112640556B (en) Method for collision avoidance in cellular network and device for configuring the method
WO2017214984A1 (en) Communication method and apparatus
US20210120630A1 (en) Methods and apparatuses for data transmission and reception
CN109937603B (en) Contention-based transmission method and device
CN110809311A (en) Method and apparatus for performing partial subframe transmission
WO2019127495A1 (en) Signal transmission method, terminal device and network device
CN111865537B (en) Communication method and communication device
CN109429251B (en) Transmission method, terminal equipment and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant