WO2014082193A1 - 不平衡区用户设备随机接入方法、基站及系统 - Google Patents

不平衡区用户设备随机接入方法、基站及系统 Download PDF

Info

Publication number
WO2014082193A1
WO2014082193A1 PCT/CN2012/085306 CN2012085306W WO2014082193A1 WO 2014082193 A1 WO2014082193 A1 WO 2014082193A1 CN 2012085306 W CN2012085306 W CN 2012085306W WO 2014082193 A1 WO2014082193 A1 WO 2014082193A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
user equipment
application protocol
protocol message
preamble signal
Prior art date
Application number
PCT/CN2012/085306
Other languages
English (en)
French (fr)
Inventor
张鹏
王宗杰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201280002623.1A priority Critical patent/CN104025659B/zh
Priority to PCT/CN2012/085306 priority patent/WO2014082193A1/zh
Publication of WO2014082193A1 publication Critical patent/WO2014082193A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network

Definitions

  • the present application relates to the field of communications, and in particular, to a random access method, a base station, and a system for user equipment in an unbalanced area.
  • Hetnet Heterogeneous
  • Network that is, setting a micro base station to be set up in a cell covered by a macro base station having a large coverage.
  • UE user equipment
  • the received macro base station has a strong signal, and the signal received by the micro base station is weak.
  • the macro base station receives a weak signal from the user equipment, and the micro base station receives a strong signal from the user equipment. Therefore, in the access process of the user equipment, a situation occurs in which the user equipment sends an access request to the macro base station. Since the macro base station receives a weak signal from the user equipment, the access request sent by the user equipment is very It may not be received by the macro base station, so the user equipment increases the transmission power until the macro base station receives it.
  • the micro base station receives a strong signal from the user equipment, and the user equipment continuously increases the transmission power, which will cause great interference to the micro base station, and may even cause the micro base station to fail to work normally.
  • the technical problem to be solved by the present application is to provide a random access method, a base station, and a system for a user equipment in an unbalanced area, which can prevent the user equipment from interfering with the auxiliary base station in an unbalanced area.
  • a first aspect of the present invention provides a method for random access of a user equipment in an unbalanced area, comprising the steps of: receiving a preamble signal sent by a user equipment through a physical random access channel; and detecting energy of the preamble signal to obtain Detecting a result; comparing the detection result with a threshold to obtain information about whether the user equipment interferes with the secondary base station, and encapsulating information about whether the user equipment interferes with the secondary base station into the first base station application protocol message; The first base station application protocol message is sent to the serving base station, so that the serving base station determines whether to allow the user equipment to access the auxiliary base station according to the first base station application protocol message.
  • the step of receiving a preamble signal sent by a user equipment by using a physical random access channel includes: detecting the preamble signal to obtain a signature
  • the step of encapsulating information of whether the user equipment interferes with the secondary base station into the first base station application protocol message includes: if the user equipment interferes with the secondary base station, encapsulating the signature sequence number into the first base station In the application protocol message, the user equipment is prohibited from accessing the secondary base station.
  • the step of receiving the preamble signal sent by the user equipment by using the physical random access channel includes: detecting the preamble signal to obtain a signature
  • the step of encapsulating information of whether the user equipment interferes with the secondary base station into the first base station application protocol message includes: whether the information of the permitted or non-random access is used as a result of whether the secondary base station is interfered with and the signature sequence number Encapsulated together into the first base station application protocol message.
  • the step of sending the first base station application protocol message to the serving base station includes: receiving, by the serving base station, The second base station applies a protocol message to indicate whether the serving base station allows the user equipment to access the secondary base station.
  • the first base station application protocol message is sent to a radio network controller, where the radio network controller applies the first base station A protocol message is sent to the serving base station.
  • a second aspect of the present invention provides a base station, where the base station serves as a secondary base station, and includes a receiving module, a detecting module, a determining encapsulating module, and a sending module.
  • the receiving module is configured to receive a user equipment before sending through a physical random access channel.
  • the receiving module sends a preamble signal to the detecting module;
  • the detecting module is configured to receive the preamble signal, and detect energy of the preamble signal to obtain a detection result, the detecting module Sending the detection result to the judgment encapsulating module;
  • the judging encapsulation module is configured to receive the detection result, compare the detection result with a threshold, to obtain information about whether the user equipment interferes with the auxiliary base station, and Encapsulating whether the user equipment interferes with the information of the secondary base station into the first base station application protocol message, the determining encapsulating module sending the first base station application protocol message to the sending module;
  • the sending module is configured to receive the Transmitting, by the first base station application protocol message, the first base station application protocol message to the serving base station, to The serving base station determines whether to permit the user device to access the auxiliary base station according to the first application protocol message.
  • the detecting module is further configured to detect the preamble signal to obtain a signature sequence number, and the detecting module sends the a signature sequence number;
  • the judgment encapsulation module is further configured to receive the signature sequence number, and when the user equipment interferes with the assistant base station, encapsulating the signature sequence number into a first base station application protocol message to prohibit the user The device accesses the secondary base station.
  • the detecting module is further configured to detect the preamble signal to obtain a signature sequence number, and the detecting module sends the a signature sequence number;
  • the judgment encapsulation module is further configured to receive the signature sequence number, and encapsulate, in the first base station application protocol message, information about whether the random access is permitted or not, and the signature sequence number together with the signature sequence number.
  • the receiving module is further configured to receive a second base station application protocol message sent by the serving base station to indicate the Whether the serving base station allows the user equipment to access the secondary base station.
  • the receiving module is further configured to send the first base station application protocol message to a radio network controller, where the radio network controller is configured Transmitting the first base station application protocol message to the serving base station.
  • a third aspect of the present invention provides a base station, where the base station serves as a secondary base station, including a receiver, a processor, and a transmitter.
  • the receiver is configured to receive a preamble signal sent by a user equipment through a physical random access channel.
  • the receiver sends a preamble signal to the processor; the processor is configured to receive the preamble signal, detect energy of the preamble signal to obtain a detection result, and compare the detection result with a threshold value Obtaining whether the user equipment interferes with information of the secondary base station, and encapsulates information about whether the user equipment interferes with the secondary base station into a first base station application protocol message, and the processor sends the first to the sender a base station application protocol message, the transmitter is configured to receive the first base station application protocol message, and send the first base station application protocol message to a serving base station, where the serving base station sends a protocol message according to the first base station Determining whether the user equipment is allowed to access the secondary base station.
  • the processor is further configured to detect the preamble signal to obtain a signature sequence number, when the user equipment interferes with the auxiliary base station, The signature sequence number is encapsulated into the first base station application protocol message to prohibit the user equipment from accessing the secondary base station.
  • the processor is further configured to detect the preamble signal to obtain a signature sequence number, and whether the information that is permitted or not allowed to be randomly accessed is The result of the interference assisted base station is encapsulated into the first base station application protocol message together with the signature sequence number.
  • the receiver is further configured to receive a second base station application protocol message sent by the serving base station to indicate the Whether the serving base station allows the user equipment to access the secondary base station.
  • the receiver is further configured to send the first base station application protocol message to a radio network controller, where the radio network controller is configured Transmitting the first base station application protocol message to the serving base station.
  • another aspect of the present disclosure provides a user equipment random access system in an unbalanced area, including a serving base station, a secondary base station, and a user equipment, where the user equipment can uplink communication to the secondary base station, The communication between the secondary base station and the serving base station may be performed, and the serving base station may perform downlink communication to the user equipment, where the secondary base station is the base station according to any one of the foregoing.
  • the foregoing solution detects the energy of the preamble signal by receiving the preamble signal sent by the user equipment, obtains the detection result, and then compares the detection result with the threshold to obtain whether the information of the auxiliary base station is interfered, and whether the interference will be assisted.
  • the information of the base station is encapsulated into the first base station application protocol message and sent to the serving base station, so that the serving base station determines, according to the first base station application protocol message, whether the user equipment is allowed to access the secondary base station, thereby determining that the user equipment is causing interference to the secondary base station.
  • the user equipment is prohibited from accessing the secondary base station to prevent the user equipment from interfering with the secondary base station in the unbalanced area.
  • FIG. 1 is a schematic structural diagram of an implementation manner of a user equipment random access system in an unbalanced area according to the present application
  • FIG. 2 is a flowchart of an implementation manner of a random access method for user equipment in an unbalanced area according to the present application
  • FIG. 3 is a flowchart of another embodiment of a method for random access of user equipment in an unbalanced area according to the present application
  • FIG. 4 is a schematic structural diagram of an embodiment of a base station according to the present application.
  • FIG. 5 is a schematic structural diagram of another embodiment of a base station according to the present application.
  • FIG. 6 is a schematic structural diagram of still another embodiment of a base station according to the present application.
  • FIG. 1 is a schematic structural diagram of an implementation manner of a user equipment random access system in an unbalanced area according to the present application.
  • the unbalanced area user equipment random access system of this embodiment includes: a serving base station 110, a secondary base station 120, and a user equipment 130.
  • the user equipment 130 can establish a wireless connection with the serving base station 110 and the secondary base station 120, respectively, and the data transmission can be performed between the serving base station 110 and the secondary base station 120.
  • the macro base station is used as the serving base station 110
  • the micro base station is used as the auxiliary base station 120.
  • the user equipment 130 in the cell covered by the serving base station 110 can communicate with the serving base station 110, and the user equipment 130 in the cell covered by the secondary base station 120 can communicate with the auxiliary base station 120, but since the serving base station is here
  • the 110 and the secondary base station 120 form a heterogeneous network. Therefore, three areas are formed between the cell covered by the serving base station 110 and the cell covered by the secondary base station 120.
  • the signal received by the serving base station 110 from the user equipment 130 is strong, and the signal received by the user equipment 130 from the serving base station 110 is also strong.
  • the signal received by the secondary base station 120 from the user equipment 130 is weak, and the user equipment 130 receives the signal.
  • the signal of the secondary base station 120 is also weak; in the area B, the signal received by the serving base station 110 from the user equipment 130 is weak (shown by a broken line in the figure), and the signal received by the user equipment 130 by the serving base station 110 is strong (in the figure As shown by the line, the secondary base station 120 receives the signal from the user equipment 130 (shown by the solid line in the figure), and the signal received by the user equipment 130 from the secondary base station 120 is weak (shown by a broken line in the figure); The signal received by the serving base station 110 from the user equipment 130 is weak, and the signal received by the user equipment 130 from the serving base station 110 is also weak.
  • the signal received by the secondary base station 120 from the user equipment 130 is strong, and the user equipment 130 receives the signal from the secondary base station 120.
  • the signal is also very strong. Therefore, areas A and C are referred to as balanced areas, and area B is referred to as unbalanced areas.
  • the serving base station 110 and the secondary base station 120 can directly communicate with each other.
  • the serving base station 110 and the secondary base station 120 can also pass the radio network controller (RNC, Radio). Network Controller) for communication.
  • RNC Radio Network Controller
  • FIG. 2 is a flowchart of an implementation manner of a random access method for user equipment in an unbalanced area according to the present application.
  • the serving base station in the embodiment is a NodeB
  • the method for random access of the unbalanced area user equipment in this embodiment includes the following steps:
  • the secondary base station receives the user equipment through a physical random access channel (PRACH, Physiacal Random Access CHannel) The preamble signal sent.
  • PRACH Physical Random Access channel
  • the uplink signal of the serving base station receiving the user equipment is weak, but the uplink signal of the auxiliary base station receiving the user equipment is strong, and when the user equipment sends the uplink preamble signal, the auxiliary base station can easily receive the user equipment through the physical The upstream preamble signal sent by the random access channel.
  • the auxiliary base station detects the energy of the preamble signal to obtain a detection result.
  • the auxiliary base station After receiving the preamble signal, the auxiliary base station detects the energy of the preamble signal, thereby obtaining the detection result.
  • the secondary base station compares the detection result of the preamble signal with a threshold to obtain whether the user equipment interferes with the information of the secondary base station, and encapsulates information about whether the user equipment interferes with the secondary base station into the first base station application protocol message.
  • the auxiliary base station After obtaining the detection result, the auxiliary base station compares the detection result of the preamble signal with the threshold, so as to obtain information about whether the user equipment interferes with the auxiliary base station, and if the energy of the preamble signal is greater than or equal to the threshold, the user equipment may interfere with the auxiliary base station. If the energy of the preamble signal is less than the threshold, the user equipment does not interfere with the secondary base station.
  • the detection result of the preamble signal includes a detection result obtained by detecting a signal to noise ratio of the preamble signal, a signal to interference and noise ratio, or energy.
  • Whether the user equipment interferes with the information of the secondary base station includes the intermediate data obtained by comparing the detection result with the threshold value or the result of the detection result compared with the threshold value may directly interfere with or not interfere with the direct result of the secondary base station. Then, the information of whether the user equipment interferes with the secondary base station is encapsulated into the first base station application protocol message.
  • the secondary base station sends the first base station application protocol message to the serving base station.
  • the signal of the user equipment receiving the secondary base station is weak in the unbalanced area, but the signal of the user equipment receiving the serving base station is strong, when the downlink data interaction with the user equipment is required, the downlink data interaction between the serving base station and the user equipment is selected. .
  • the secondary base station After the first base station application protocol message is encapsulated, the secondary base station sends the first base station application protocol message directly to the serving base station, or sends the first base station application protocol message to the wireless network controller first, and then the wireless network controller sends the first The base station application protocol message is sent to the serving base station. If the serving base station receives the intermediate data, it determines whether the secondary base station is interfered according to the intermediate data, thereby determining whether the user equipment is allowed to access the secondary base station; if the serving base station receives the direct result, it directly determines whether the user equipment is allowed to be connected. Into the secondary base station. After determining whether the user equipment is allowed to access the secondary base station, the serving base station performs downlink data interaction with the user equipment, thereby notifying the user equipment whether to access the secondary base station.
  • FIG. 3 is a flowchart of another embodiment of a method for random access of user equipment in an unbalanced area according to the present application.
  • the serving base station in the embodiment is a NodeB
  • the method for random access of the unbalanced area user equipment in this embodiment includes the following steps:
  • the secondary base station receives a preamble signal sent by the user equipment by using a physical random access channel.
  • the uplink signal of the serving base station receiving the user equipment is weak, but the uplink signal of the auxiliary base station receiving the user equipment is strong, and when the user equipment sends the uplink preamble signal, the auxiliary base station can easily receive the user equipment through the physical
  • the auxiliary base station detects the preamble signal to obtain a signature sequence number.
  • the secondary base station After receiving the preamble signal, the secondary base station detects the preamble signal to obtain a signature sequence number.
  • the auxiliary base station detects the energy of the preamble signal to obtain a detection result.
  • the auxiliary base station After receiving the preamble signal, the auxiliary base station detects the energy of the preamble signal, thereby obtaining the detection result.
  • S302 and S303 can be executed in either order, or S302 can be executed first or S303 can be executed first.
  • the secondary base station compares the detection result with the threshold to obtain whether the user equipment interferes with the information of the secondary base station, and encapsulates information about whether the user equipment interferes with the secondary base station into the first base station application protocol message.
  • the auxiliary base station After obtaining the detection result, the auxiliary base station compares the detection result of the preamble signal with the threshold, so as to obtain information about whether the user equipment interferes with the auxiliary base station, and if the energy of the preamble signal is greater than or equal to the threshold, the user equipment may interfere with the auxiliary base station. If the energy of the preamble signal is less than the threshold, the user equipment does not interfere with the secondary base station.
  • the detection result of the preamble signal includes a detection result obtained by detecting a signal to noise ratio of the preamble signal, a signal to interference and noise ratio, or energy.
  • the information of whether the user equipment interferes with the secondary base station includes the intermediate data obtained by comparing the detection result with the threshold value or the result of the detection result compared with the threshold value may directly interfere with or not interfere with the direct result of the secondary base station. Then, the information of whether the user equipment interferes with the secondary base station is encapsulated into the first base station application protocol message. For example, the secondary base station compares the detection result of the preamble signal with the threshold. If it is determined that the user equipment interferes with the secondary base station, the signature sequence number is encapsulated into the first base station application protocol message to prohibit the user equipment from accessing the secondary base station; The user equipment does not interfere with the secondary base station, and the user equipment is allowed to access the secondary base station by default.
  • the secondary base station compares the detection result of the preamble signal with a threshold, and if it is determined that the user equipment does not interfere with the secondary base station, the information for granting the random access is used as a result of not interfering with the secondary base station and the signature sequence number. Encapsulating together into the first base station application protocol message; if it is determined that the user equipment interferes with the secondary base station, the information of the random access is not permitted to be encapsulated into the first base station application protocol message together with the result of the interference with the secondary base station and the signature sequence number.
  • the secondary base station sends the first base station application protocol message to the serving base station.
  • the signal of the user equipment receiving the secondary base station is weak in the unbalanced area, but the signal of the user equipment receiving the serving base station is strong, when the downlink data interaction with the user equipment is required, the downlink data interaction between the serving base station and the user equipment is selected. .
  • the secondary base station After the first base station application protocol message is encapsulated, the secondary base station sends the first base station application protocol message directly to the serving base station, or sends the first base station application protocol message to the wireless network controller first, and then the wireless network controller sends the first The base station application protocol message is sent to the serving base station. If the serving base station receives the intermediate data, it determines whether the secondary base station is interfered according to the intermediate data, thereby determining whether the user equipment is allowed to access the secondary base station; if the serving base station receives the direct result, it directly determines whether the user equipment is allowed to be connected. Into the secondary base station. After determining whether the user equipment is allowed to access the secondary base station, the serving base station performs downlink data interaction with the user equipment, thereby notifying the user equipment whether to access the secondary base station.
  • the secondary base station receives the second base station application protocol message sent by the serving base station.
  • the serving base station After the secondary base station sends the first base station application protocol message to the serving base station, the serving base station sends a second base station application protocol message to the secondary base station, and after receiving the second base station application protocol message, the secondary base station knows that the user equipment can access the secondary base station. It is good to accept the preparation of the user equipment data. Otherwise, no preparation is made to accept the user equipment data.
  • FIG. 4 is a schematic structural diagram of an embodiment of a base station according to the present application.
  • the base station in this embodiment serves as a secondary base station, and includes a receiving module 410, a detecting module 420, a determining encapsulating module 430, and a transmitting module 440.
  • the receiving module 410 is configured to receive a preamble signal sent by the user equipment by using a physical random access channel, and the receiving module 410 sends a preamble signal to the detecting module 420.
  • the signal that the serving base station receives the user equipment is weak, but the signal of the auxiliary base station receiving the user equipment is strong, and when the user equipment sends the preamble signal, the receiving module 410 of the auxiliary base station can easily receive the user equipment.
  • the detecting module 420 is configured to receive the preamble signal, and detect the energy of the preamble signal to obtain a detection result, and the detecting module 420 sends the detection result to the judging encapsulation module 430. For example, after receiving the preamble signal, the auxiliary base station detects the energy of the preamble signal, thereby obtaining the detection result.
  • the determining encapsulation module 430 is configured to receive the detection result, compare the detection result with the threshold, to obtain whether the user equipment interferes with the information of the auxiliary base station, and encapsulate the information that the user equipment interferes with the auxiliary base station into the first base station application protocol message, The determining encapsulation module 430 sends a first base station application protocol message to the sending module 440.
  • the determining encapsulation module 430 compares the detection result of the preamble signal with the threshold value when receiving the preamble signal, thereby obtaining whether the user equipment interferes with the information of the auxiliary base station, and if the energy of the preamble signal is greater than or equal to the threshold value, The user equipment may interfere with the secondary base station; if the energy of the preamble signal is less than the threshold, the user equipment does not interfere with the secondary base station.
  • the detection result of the preamble signal includes a detection result obtained by detecting a signal to noise ratio of the preamble signal, a signal to interference and noise ratio, or energy.
  • Whether the user equipment interferes with the information of the secondary base station includes the intermediate data obtained by comparing the detection result with the threshold value or the result of the detection result compared with the threshold value may directly interfere with or not interfere with the direct result of the secondary base station. Then, the determining encapsulation module 430 encapsulates information about whether the user equipment interferes with the secondary base station into the first base station application protocol message.
  • the sending module 440 is configured to receive the first base station application protocol message, and send the first base station application protocol message to the serving base station, so that the serving base station determines, according to the first base station application protocol message, whether the user equipment is allowed to access the auxiliary base station. For example, because the signal of the user equipment receiving the secondary base station is weak in the unbalanced area, but the signal of the user equipment receiving the serving base station is strong, when the downlink data interaction with the user equipment is required, the serving base station and the user equipment are selected to perform downlink. Data interaction.
  • the auxiliary base station sends the first base station application protocol message directly to the serving base station by using the sending module 440, or sends the first base station application protocol message to the radio network controller first, and then the radio network controller The first base station application protocol message is then sent to the serving base station. If the serving base station receives the intermediate data, it determines whether the secondary base station is interfered according to the intermediate data, thereby determining whether the user equipment is allowed to access the secondary base station; if the serving base station receives the direct result, it directly determines whether the user equipment is allowed to be connected. Into the secondary base station. After determining whether the user equipment is allowed to access the secondary base station, the serving base station performs downlink data interaction with the user equipment, thereby notifying the user equipment whether to access the secondary base station.
  • FIG. 5 is a schematic structural diagram of another embodiment of a base station according to the present application.
  • the base station in this embodiment serves as a secondary base station, and includes a receiving module 510, a detecting module 520, a determining encapsulating module 530, and a transmitting module 540.
  • the receiving module 510 is configured to receive a preamble signal sent by the user equipment by using a physical random access channel. For example, in the unbalanced area, the signal that the serving base station receives the user equipment is weak, but the signal of the auxiliary base station receiving the user equipment is strong, and when the user equipment sends the preamble signal, the receiving module 510 of the auxiliary base station can easily receive the user equipment.
  • the receiving module 510 sends a preamble signal to the detecting module 520 and the determining encapsulating module 530.
  • the detecting module 520 is configured to detect a preamble signal to obtain a signature sequence number and detect the energy of the preamble signal to obtain a detection result, and the detecting module 520 sends the signature sequence number and the detection result to the judgment encapsulating module 530.
  • the determining encapsulation module 530 is configured to receive the signature sequence number and the detection result, compare the detection result with the threshold value to obtain whether the user equipment interferes with the information of the auxiliary base station, and encapsulate the information that the user equipment interferes with the auxiliary base station into the first base station application protocol. In the message.
  • the auxiliary base station determines that the encapsulation module 530 compares the detection result of the preamble signal with the threshold, so as to obtain whether the user equipment interferes with the information of the auxiliary base station, and if the energy of the preamble signal is greater than or equal to the threshold, The user equipment may interfere with the secondary base station; if the energy of the preamble signal is less than the threshold, the user equipment does not interfere with the secondary base station.
  • the detection result of the preamble signal includes a detection result obtained by detecting a signal to noise ratio of the preamble signal, a signal to interference and noise ratio, or energy.
  • the determining encapsulation module 530 encapsulates information about whether the user equipment interferes with the secondary base station into the first base station application protocol message. In an implementation manner, the determining encapsulation module 530 compares the detection result with a threshold.
  • the determining encapsulation module 530 encapsulates the signature sequence number into the first base station application protocol message; if the user equipment is determined The user equipment is not allowed to interfere with the secondary base station, and the user equipment is allowed to access the secondary base station by default.
  • the determining encapsulation module 530 compares the detection result of the preamble signal with a threshold, and if it is determined that the user equipment does not interfere with the secondary base station, the information that grants the random access is used as a result that does not interfere with the secondary base station and The signature sequence number is encapsulated into the first base station application protocol message together; if it is determined that the user equipment interferes with the secondary base station, the information of the random access is not permitted to be encapsulated into the first base station application protocol message together with the result of the interference with the secondary base station and the signature sequence number. in.
  • the determining encapsulation module 530 sends a first base station application protocol message to the sending module 540.
  • the sending module 540 is configured to send the first base station application protocol message to the serving base station, and send the first base station application protocol message to the serving base station, so that the serving base station determines, according to the first base station application protocol message, whether the user equipment is allowed to access the auxiliary base station. For example, because the signal of the user equipment receiving the secondary base station is weak in the unbalanced area, but the signal of the user equipment receiving the serving base station is strong, when the downlink data interaction with the user equipment is required, the serving base station and the user equipment are selected to perform downlink. Data interaction.
  • the sending module 540 directly sends the first base station application protocol message to the serving base station, or sends the first base station application protocol message to the wireless network controller first, and then the wireless network controller sends the first A base station application protocol message is sent to the serving base station. If the serving base station receives the intermediate data, it determines whether the secondary base station is interfered according to the intermediate data, thereby determining whether the user equipment is allowed to access the secondary base station; if the serving base station receives the direct result, it directly determines whether the user equipment is allowed to be connected. Into the secondary base station. After determining whether the user equipment is allowed to access the secondary base station, the serving base station performs downlink data interaction with the user equipment, thereby notifying the user equipment whether to access the secondary base station.
  • the receiving module 510 is further configured to receive a second base station application protocol message sent by the serving base station. For example, after the secondary base station sends the first base station application protocol message to the serving base station, the serving base station sends a second base station application protocol message to the secondary base station, and after receiving the second base station application protocol message, the receiving module 510 knows that the user equipment can access the auxiliary. The base station is ready to accept the data of the user equipment. Otherwise, no preparation is made to accept the user equipment data.
  • FIG. 6 is a schematic structural diagram of still another embodiment of a base station according to the present application.
  • the base station of the present embodiment includes, as a secondary base station, a receiver 610, a processor 620, and a transmitter 630.
  • the receiver 610 is configured to receive a preamble signal sent by the user equipment through a physical random access channel. For example, in an unbalanced area, the signal of the serving base station receiving the user equipment is weak, but the signal of the auxiliary base station receiving the user equipment is strong, and when the user equipment sends the preamble signal, the receiver 610 of the auxiliary base station can easily receive the user equipment.
  • Receiver 610 transmits a preamble signal to processor 620.
  • the processor 620 is configured to receive a preamble signal, detect a preamble signal to obtain a signature sequence number, detect an energy of the preamble signal to obtain a detection result, and compare the detection result of the preamble signal with a threshold to obtain whether the user equipment interferes
  • the information of the secondary base station is encapsulated, and information about whether the user equipment interferes with the secondary base station is encapsulated into the first base station application protocol message. For example, when the auxiliary base station receives the preamble signal, the processor 620 detects the preamble signal to obtain a signature sequence number, detects the energy of the preamble signal to obtain a detection result, and then compares the detection result of the preamble signal with a threshold value.
  • the detection result of the preamble signal includes a detection result obtained by detecting a signal to noise ratio of the preamble signal, a signal to interference and noise ratio, or energy.
  • Whether the user equipment interferes with the information of the secondary base station includes the intermediate data obtained by comparing the detection result with the threshold value or the result of the detection result compared with the threshold value may directly interfere with or not interfere with the direct result of the secondary base station.
  • the processor 620 encapsulates information about whether the user equipment interferes with the secondary base station into the first base station application protocol message.
  • the processor 620 compares the detection result of the preamble signal with a threshold, and if it is determined that the user equipment interferes with the secondary base station, the processor 620 encapsulates the signature sequence number into the first base station application protocol message; The user equipment does not interfere with the secondary base station, and the user equipment is allowed to access the secondary base station by default.
  • the processor 620 compares the detection result of the preamble signal with a threshold, and if it is determined that the user equipment does not interfere with the secondary base station, the information that grants the random access is used as a result and signature that does not interfere with the secondary base station.
  • the sequence number is encapsulated into the first base station application protocol message together; if it is determined that the user equipment interferes with the secondary base station, the information of the random access is not permitted to be encapsulated into the first base station application protocol message together with the result of the interference with the secondary base station and the signature sequence number.
  • Processor 620 transmits a first base station application protocol message to transmitter 630.
  • the transmitter 630 is configured to send the first base station application protocol message to the serving base station, and send the first base station application protocol message to the serving base station, so that the serving base station determines, according to the first base station application protocol message, whether the user equipment is allowed to access the auxiliary base station. For example, because the signal of the user equipment receiving the secondary base station is weak in the unbalanced area, but the signal of the user equipment receiving the serving base station is strong, when the downlink data interaction with the user equipment is required, the serving base station and the user equipment are selected to perform downlink. Data interaction.
  • the transmitter 630 directly sends the first base station application protocol message to the serving base station, or sends the first base station application protocol message to the radio network controller first, and then the radio network controller sends the first A base station application protocol message is sent to the serving base station. . If the serving base station receives the intermediate data, it determines whether the secondary base station is interfered according to the intermediate data, thereby determining whether the user equipment is allowed to access the secondary base station; if the serving base station receives the direct result, it directly determines whether the user equipment is allowed to be connected. Into the secondary base station. After determining whether the user equipment is allowed to access the secondary base station, the serving base station performs downlink data interaction with the user equipment, thereby notifying the user equipment whether to access the secondary base station.
  • the receiver 610 is further configured to receive a second base station application protocol message sent by the serving base station. For example, after the secondary base station sends the first base station application protocol message to the serving base station, the serving base station sends a second base station application protocol message to the secondary base station, and after receiving the second base station application protocol message, the receiver 610 knows that the user equipment can access the assistance. The base station is ready to accept the data of the user equipment. Otherwise, no preparation is made to accept the user equipment data.
  • the present application further provides a user equipment random access system in an unbalanced area, including a serving base station, a secondary base station, and a user equipment, where the user equipment can uplink communication to the secondary base station, and the auxiliary base station and the serving base station can communicate with each other.
  • the serving base station can downlink communication to the user equipment. Please refer to FIG. 1 and related description for details, and details are not repeated herein.
  • the foregoing solution detects the energy of the preamble signal by receiving the preamble signal sent by the user equipment, obtains the detection result, and then compares the detection result with the threshold to obtain whether the information of the auxiliary base station is interfered, and whether the interference will be assisted.
  • the information of the base station is encapsulated into the first base station application protocol message and sent to the serving base station, so that the serving base station determines, according to the first base station application protocol message, whether the user equipment is allowed to access the secondary base station, thereby determining that the user equipment is causing interference to the secondary base station.
  • the user equipment is prohibited from accessing the secondary base station to prevent the user equipment from interfering with the secondary base station in the unbalanced area.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device implementations described above are merely illustrative.
  • the division of the modules or units is only a logical function division.
  • there may be another division manner for example, multiple units or components may be used. Combinations can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read only memory (ROM, Read-Only) Memory, random access memory (RAM), disk or optical disk, and other media that can store program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种不平衡区用户设备随机接入方法、基站及系统。其中,所述方法包括:接收用户设备通过物理随机接入信道所发送的前序信号(S201);对前序信号的能量进行检测以获得检测结果(S202);将检测结果与阈值进行比较以获得用户设备是否会干扰辅助基站的中间数据或直接结果,并将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中(S203);将第一基站应用协议消息向服务基站发送(S204),以供服务基站根据第一基站应用协议消息确定是否允许用户设备接入辅助基站。本发明能够在确定用户设备在会对辅助基站造成干扰时,禁止用户设备接入,防止用户设备在不平衡区对辅助基站进行干扰。

Description

不平衡区用户设备随机接入方法、基站及系统
【技术领域】
本申请涉及通信领域,特别是涉及不平衡区用户设备随机接入方法、基站及系统。
【背景技术】
为了增强网络侧的处理能力,现有技术提供了一种异构网络(Hetnet,Heterogeneous network),即在覆盖范围大的宏基站所覆盖的小区内设置微基站来组网。在这种组网方式下,将会出现一个不平衡区域,在该区域内,用户设备(UE,User Equipment)接收到的宏基站的信号很强,接收到微基站的信号很弱,而且,宏基站收到用户设备的信号很弱,而微基站收到用户设备的信号很强。因此,在用户设备的接入过程中,将会出现这样的情况,用户设备向宏基站发送接入请求,由于宏基站收到用户设备的信号很弱,故用户设备所发送的接入请求很可能没有被宏基站所接收到,于是,用户设备增大发射功率,直到宏基站接收到为止。
但是,正如上面所述微基站接收到用户设备的信号很强,用户设备不断地增大发射功率,将会对微基站造成很大的干扰,甚至会导致微基站不能正常工作。
【发明内容】
本申请主要解决的技术问题是提供不平衡区用户设备随机接入方法、基站及系统,能够防止用户设备在不平衡区对辅助基站进行干扰。
本发明第一方面提供一种不平衡区用户设备随机接入方法,包括如下步骤:接收用户设备通过物理随机接入信道所发送的前序信号;对所述前序信号的能量进行检测以获得检测结果;将所述检测结果与阈值进行比较以获得所述用户设备是否会干扰辅助基站的信息,并将所述用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中;将所述第一基站应用协议消息向服务基站发送,以供所述服务基站根据所述第一基站应用协议消息确定是否允许所述用户设备接入辅助基站。
结合第一方面,在第一方面的第一种可能的实现方式中,所述接收用户设备通过物理随机接入信道所发送的前序信号的步骤之后包括:检测所述前序信号以获得签名序号;所述将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中的步骤包括:如果所述用户设备会干扰所述辅助基站,则将所述签名序号封装到第一基站应用协议消息中,以禁止所述用户设备接入辅助基站。
结合第一方面,在第一方面的第二种可能的实现方式中,所述接收用户设备通过物理随机接入信道所发送的前序信号的步骤之后包括:检测所述前序信号以获得签名序号;所述将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中的步骤包括:将准许或不准随机接入的信息作为是否会干扰辅助基站的结果和所述签名序号一起封装到第一基站应用协议消息中。
结合第一方面的第一种或第二种可能的实施方式,在第三种可能的实现方式中,所述将第一基站应用协议消息向服务基站发送的步骤之后包括:接收服务基站所发送的第二基站应用协议消息以指示所述服务基站是否允许所述用户设备接入辅助基站。
结合第一方面,在第一方面的第四种可能的实现方式中,将所述第一基站应用协议消息向无线网络控制器发送,以供所述无线网络控制器将所述第一基站应用协议消息向所述服务基站发送。
本发明第二方面提供一种基站,所述基站作为辅助基站,包括接收模块、检测模块、判断封装模块以及发送模块;所述接收模块用于接收用户设备通过物理随机接入信道所发送的前序信号,所述接收模块向所述检测模块发送前序信号;所述检测模块用于接收所述前序信号,并对所述前序信号的能量进行检测以获得检测结果,所述检测模块将所述检测结果向所述判断封装模块发送;所述判断封装模块用于接收所述检测结果,将所述检测结果与阈值进行比较以获得所述用户设备是否会干扰辅助基站的信息,并将所述用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中,所述判断封装模块向所述发送模块发送所述第一基站应用协议消息;所述发送模块用于接收所述第一基站应用协议消息,将所述第一基站应用协议消息向服务基站发送,以供所述服务基站根据所述第一基站应用协议消息确定是否允许所述用户设备接入辅助基站。
结合第二方面,在第二方面的第一种可能的实现方式中,所述检测模块还用于检测所述前序信号以获得签名序号,所述检测模块向所述判断封装模块发送所述签名序号;所述判断封装模块还用于接收所述签名序号,在所述用户设备会干扰所述辅助基站时,将所述签名序号封装到第一基站应用协议消息中,以禁止所述用户设备接入辅助基站。
结合第二方面,在第二方面的第二种可能的实现方式中,所述检测模块还用于检测所述前序信号以获得签名序号,所述检测模块向所述判断封装模块发送所述签名序号;所述判断封装模块还用于接收所述签名序号,将准许或不准随机接入的信息作为是否会干扰辅助基站的结果和所述签名序号一起封装到第一基站应用协议消息中。
结合第二方面的第一种或第二种可能的实施方式,在第三种可能的实现方式中,所述接收模块还用于接收服务基站所发送的第二基站应用协议消息以指示所述服务基站是否允许所述用户设备接入辅助基站。
结合第二方面,在第二方面的第四种可能的实现方式中,所述接收模块还用于将所述第一基站应用协议消息向无线网络控制器发送,以供所述无线网络控制器将所述第一基站应用协议消息向所述服务基站发送。
本发明第三方面提供一种基站,所述基站作为辅助基站,包括接收机、处理器以及发送机;所述接收机用于接收用户设备通过物理随机接入信道所发送的前序信号,所述接收机向所述处理器发送前序信号;所述处理器用于接收所述前序信号,对所述前序信号的能量进行检测以获得检测结果,将所述检测结果与阈值进行比较以获得所述用户设备是否会干扰辅助基站的信息,并将所述用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中,所述处理器向所述发送机发送所述第一基站应用协议消息;所述发送机用于接收所述第一基站应用协议消息,将所述第一基站应用协议消息向服务基站发送,以供所述服务基站根据所述第一基站应用协议消息确定是否允许所述用户设备接入辅助基站。
结合第三方面,在第三方面的第一种可能的实现方式中,所述处理器还用于检测所述前序信号以获得签名序号,在所述用户设备会干扰所述辅助基站时,将所述签名序号封装到第一基站应用协议消息中,以禁止所述用户设备接入辅助基站。
结合第三方面,在第三方面的第二种可能的实现方式中,所述处理器还用于检测所述前序信号以获得签名序号,将准许或不准随机接入的信息作为是否会干扰辅助基站的结果和所述签名序号一起封装到第一基站应用协议消息中。
结合第三方面的第一种或第二种可能的实施方式,在第三种可能的实现方式中,所述接收机还用于接收服务基站所发送的第二基站应用协议消息以指示所述服务基站是否允许所述用户设备接入辅助基站。
结合第三方面,在第三方面的第四种可能的实现方式中,所述接收机还用于将所述第一基站应用协议消息向无线网络控制器发送,以供所述无线网络控制器将所述第一基站应用协议消息向所述服务基站发送。
为解决上述技术问题,本申请又一方面提供了一种不平衡区用户设备随机接入系统,包括服务基站、辅助基站以及用户设备,所述用户设备可向所述辅助基站上行通讯,所述辅助基站和所述服务基站之间可进行通讯,所述服务基站可向所述用户设备下行通讯,其中,所述辅助基站为上述任一项所述的基站。
上述方案通过接收用户设备所发送的前序信号,对前序信号的能量进行检测以获得检测结果,然后将检测结果与阈值进行比较以获得是否会干扰辅助基站的信息,并将是否会干扰辅助基站的信息封装到第一基站应用协议消息中向服务基站发送,以供服务基站根据第一基站应用协议消息确定是否允许用户设备接入辅助基站,从而在确定用户设备在会对辅助基站造成干扰时,禁止用户设备接入辅助基站,防止用户设备在不平衡区对辅助基站进行干扰。
【附图说明】
图1是本申请不平衡区用户设备随机接入系统一实施方式的结构示意图;
图2是本申请不平衡区用户设备随机接入方法一实施方式的流程图;
图3是本申请不平衡区用户设备随机接入方法另一实施方式的流程图;
图4是本申请基站一实施方式的结构示意图;
图5是本申请基站另一实施方式的结构示意图;
图6是本申请基站又一实施方式的结构示意图。
【具体实施方式】
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、接口、技术之类的具体细节,以便透彻理解本申请。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施方式中也可以实现本申请。在其它情况中,省略对众所周知的装置、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。
参阅图1,图1是本申请不平衡区用户设备随机接入系统一实施方式的结构示意图。本实施方式的不平衡区用户设备随机接入系统包括:服务基站110、辅助基站120以及用户设备130。其中,用户设备130可分别与服务基站110以及辅助基站120建立无线连接,而服务基站110与辅助基站120之间同样可进行数据传输。在本实施方式中,将宏基站作为服务基站110,而将微基站作为辅助基站120。
通常,服务基站110所覆盖的小区内的用户设备130均可与服务基站110通讯,而辅助基站120所覆盖的小区内的用户设备130均可与辅助基站120进行通讯,但是,由于这里服务基站110与辅助基站120组成了异构网络,所以,服务基站110所覆盖的小区和辅助基站120所覆盖的小区之间形成了三个区域。在区域A中,服务基站110收到用户设备130的信号很强,用户设备130收到服务基站110的信号也很强,辅助基站120收到用户设备130的信号很弱,用户设备130收到辅助基站120的信号也很弱;在区域B中,服务基站110收到用户设备130的信号很弱(图中虚线所示),用户设备130收到服务基站110的信号很强(图中实线所示),辅助基站120收到用户设备130的信号很强(图中实线所示),用户设备130收到辅助基站120的信号很弱(图中虚线所示);在区域C中,服务基站110收到用户设备130的信号很弱,用户设备130收到服务基站110的信号也很弱,辅助基站120收到用户设备130的信号很强,用户设备130收到辅助基站120的信号也很强。所以,区域A和C称作平衡区域,而区域B称作不平衡区域。
在本实施方式中,服务基站110与辅助基站120之间可以直接进行通讯,在其它的实施方式中,服务基站110与辅助基站120之间也可以通过无线网络控制器(RNC,Radio Network Controller)进行通讯。
参阅图2,图2是本申请不平衡区用户设备随机接入方法一实施方式的流程图。可选的,本实施方式中的服务基站为NodeB,本实施方式的不平衡区用户设备随机接入方法包括如下步骤:
S201:辅助基站接收用户设备通过物理随机接入信道(PRACH,Physiacal Random Access CHannel)所发送的前序信号。
在不平衡区域中,服务基站接收用户设备的上行信号很弱,但辅助基站接收用户设备的上行信号很强,用户设备向外发送上行的前序信号时,辅助基站很容易接收用户设备通过物理随机接入信道所发送的上行的前序信号。
S202:辅助基站对前序信号的能量进行检测以获得检测结果。
辅助基站在接收到前序信号后,对前序信号的能量进行检测,从而获得检测结果。
S203:辅助基站将前序信号的检测结果与阈值进行比较以获得用户设备是否会干扰辅助基站的信息,并将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。
辅助基站在获得检测结果后,将前序信号的检测结果与阈值进行比较,从而获得用户设备是否会干扰辅助基站的信息,如果前序信号的能量大于或等于阈值,则用户设备会干扰辅助基站;如果前序信号的能量小于阈值,则用户设备不会干扰辅助基站。可选的,前序信号的检测结果包括对前序信号的信噪比,信干噪比或能量等等进行检测以获得的检测结果。用户设备是否会干扰辅助基站的信息包括检测结果与阈值进行比较所得的中间数据或检测结果与阈值进行比较所得的会干扰或不会干扰辅助基站的直接结果。然后,将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。
S204:辅助基站将第一基站应用协议消息向服务基站发送。
由于在不平衡区域,用户设备接收辅助基站的信号很弱,但用户设备接收服务基站的信号很强,所以,需要与用户设备进行下行数据交互时,选择服务基站与用户设备进行下行的数据交互。
辅助基站在封装好第一基站应用协议消息后,直接向服务基站发送第一基站应用协议消息,或先将第一基站应用协议消息向无线网络控制器发送后,无线网络控制器再将第一基站应用协议消息向服务基站发送。如果服务基站收到中间数据,则会根据所述中间数据确定是否会干扰辅助基站,从而确定是否允许用户设备接入辅助基站;如果服务基站收到直接结果,则会直接确定是否允许用户设备接入辅助基站。在确定是否允许用户设备接入辅助基站后,服务基站与用户设备进行下行数据交互,从而通知用户设备是否接入辅助基站。
参阅图3,图3是本申请不平衡区用户设备随机接入方法另一实施方式的流程图。可选的,本实施方式中的服务基站为NodeB,本实施方式的不平衡区用户设备随机接入方法包括如下步骤:
S301:辅助基站接收用户设备通过物理随机接入信道所发送的前序信号。
在不平衡区域中,服务基站接收用户设备的上行信号很弱,但辅助基站接收用户设备的上行信号很强,用户设备向外发送上行的前序信号时,辅助基站很容易接收用户设备通过物理随机接入信道所发送的上行的前序信号,其中,前序信号中包含了签名序号。
S302:辅助基站检测前序信号以获得签名序号。
在接收到前序信号后,辅助基站对前序信号进行检测从而获得签名序号。
S303:辅助基站对前序信号的能量进行检测以获得检测结果。
辅助基站在接收到前序信号后,对前序信号的能量进行检测,从而获得检测结果。
可以理解地,S302与S303之间可以不分先后顺序,先执行S302或先执行S303皆可。
S304:辅助基站将检测结果与阈值进行比较以获得用户设备是否会干扰辅助基站的信息,并将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。
辅助基站在获得检测结果后,将前序信号的检测结果与阈值进行比较,从而获得用户设备是否会干扰辅助基站的信息,如果前序信号的能量大于或等于阈值,则用户设备会干扰辅助基站;如果前序信号的能量小于阈值,则用户设备不会干扰辅助基站。可选的,前序信号的检测结果包括对前序信号的信噪比,信干噪比或能量等等进行检测以获得的检测结果。用户设备是否会干扰辅助基站的信息包括检测结果与阈值进行比较所得的中间数据或检测结果与阈值进行比较所得的会干扰或不会干扰辅助基站的直接结果。然后,将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。比如,辅助基站将前序信号的检测结果与阈值进行比较,如果确定用户设备会干扰辅助基站,则将签名序号封装到第一基站应用协议消息中,以禁止用户设备接入辅助基站;如果确定用户设备不会干扰辅助基站,则默认允许用户设备接入辅助基站。
在另一实施方式中,辅助基站将前序信号的检测结果与阈值进行比较,如果确定用户设备不会干扰辅助基站,则将准许随机接入的信息作为不会干扰辅助基站的结果和签名序号一起封装到第一基站应用协议消息中;如果确定用户设备会干扰辅助基站,则将不准许随机接入的信息作为会干扰辅助基站的结果和签名序号一起封装到第一基站应用协议消息中。
S305:辅助基站将第一基站应用协议消息向服务基站发送。
由于在不平衡区域,用户设备接收辅助基站的信号很弱,但用户设备接收服务基站的信号很强,所以,需要与用户设备进行下行数据交互时,选择服务基站与用户设备进行下行的数据交互。
辅助基站在封装好第一基站应用协议消息后,直接向服务基站发送第一基站应用协议消息,或先将第一基站应用协议消息向无线网络控制器发送后,无线网络控制器再将第一基站应用协议消息向服务基站发送。如果服务基站收到中间数据,则会根据所述中间数据确定是否会干扰辅助基站,从而确定是否允许用户设备接入辅助基站;如果服务基站收到直接结果,则会直接确定是否允许用户设备接入辅助基站。在确定是否允许用户设备接入辅助基站后,服务基站与用户设备进行下行数据交互,从而通知用户设备是否接入辅助基站。
S306:辅助基站接收服务基站所发送的第二基站应用协议消息。
辅助基站向服务基站发送第一基站应用协议消息后,服务基站向辅助基站发送第二基站应用协议消息,辅助基站接收到第二基站应用协议消息后,知道该用户设备可以接入辅助基站,做好接受该用户设备数据的准备。否则,不做接受该用户设备数据的准备。
参阅图4,图4是本申请基站一实施方式的结构示意图。本实施方式的基站作为辅助基站,包括:接收模块410、检测模块420、判断封装模块430以及发送模块440。下面以NodeB为服务基站进行说明。
接收模块410用于接收用户设备通过物理随机接入信道所发送的前序信号,接收模块410向检测模块420发送前序信号。比如,在不平衡区域中,服务基站接收用户设备的信号很弱,但辅助基站接收用户设备的信号很强,用户设备向外发送前序信号时,辅助基站的接收模块410很容易接收用户设备通过物理随机接入信道所发送的前序信号。
检测模块420用于接收前序信号,并对前序信号的能量进行检测以获得检测结果,检测模块420将检测结果向判断封装模块430发送。比如,辅助基站在接收到前序信号后,对前序信号的能量进行检测,从而获得检测结果。
判断封装模块430用于接收检测结果,将检测结果与阈值进行比较以获得用户设备是否会干扰辅助基站的信息,并将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中,判断封装模块430向发送模块440发送第一基站应用协议消息。比如,判断封装模块430在接收到前序信号时,将前序信号的检测结果与阈值进行比较,从而获得用户设备是否会干扰辅助基站的信息,如果前序信号的能量大于或等于阈值,则用户设备会干扰辅助基站;如果前序信号的能量小于阈值,则用户设备不会干扰辅助基站。可选的,前序信号的检测结果包括对前序信号的信噪比,信干噪比或能量等等进行检测以获得的检测结果。用户设备是否会干扰辅助基站的信息包括检测结果与阈值进行比较所得的中间数据或检测结果与阈值进行比较所得的会干扰或不会干扰辅助基站的直接结果。然后,判断封装模块430将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。
发送模块440用于接收第一基站应用协议消息,将第一基站应用协议消息向服务基站发送,以供服务基站根据第一基站应用协议消息确定是否允许用户设备接入辅助基站。比如,由于在不平衡区域,用户设备接收辅助基站的信号很弱,但用户设备接收服务基站的信号很强,所以,需要与用户设备进行下行数据交互时,选择服务基站与用户设备进行下行的数据交互。辅助基站在封装好第一基站应用协议消息后,通过发送模块440直接向服务基站发送第一基站应用协议消息,或先将第一基站应用协议消息向无线网络控制器发送后,无线网络控制器再将第一基站应用协议消息向服务基站发送。如果服务基站收到中间数据,则会根据所述中间数据确定是否会干扰辅助基站,从而确定是否允许用户设备接入辅助基站;如果服务基站收到直接结果,则会直接确定是否允许用户设备接入辅助基站。在确定是否允许用户设备接入辅助基站后,服务基站与用户设备进行下行数据交互,从而通知用户设备是否接入辅助基站。
参阅图5,图5是本申请基站另一实施方式的结构示意图。本实施方式的基站作为辅助基站,包括:接收模块510、检测模块520、判断封装模块530以及发送模块540。下面以NodeB为服务基站进行说明。
接收模块510用于接收用户设备通过物理随机接入信道所发送的前序信号。比如,在不平衡区域中,服务基站接收用户设备的信号很弱,但辅助基站接收用户设备的信号很强,用户设备向外发送前序信号时,辅助基站的接收模块510很容易接收用户设备通过物理随机接入信道所发送的前序信号,其中,前序信号中包含了签名序号。接收模块510向检测模块520以及判断封装模块530发送前序信号。
检测模块520用于检测前序信号以获得签名序号以及对前序信号的能量进行检测以获得检测结果,检测模块520向判断封装模块530发送签名序号以及检测结果。
判断封装模块530用于接收签名序号以及检测结果,将检测结果与阈值进行比较以获得用户设备是否会干扰辅助基站的信息,并将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。比如,辅助基站在获得检测结果后,判断封装模块530将前序信号的检测结果与阈值进行比较,从而获得用户设备是否会干扰辅助基站的信息,如果前序信号的能量大于或等于阈值,则用户设备会干扰辅助基站;如果前序信号的能量小于阈值,则用户设备不会干扰辅助基站。可选的,前序信号的检测结果包括对前序信号的信噪比,信干噪比或能量等等进行检测以获得的检测结果。用户设备是否会干扰辅助基站的信息包括检测结果与阈值进行比较所得的中间数据或检测结果与阈值进行比较所得的会干扰或不会干扰辅助基站的直接结果。然后,判断封装模块530将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。在一种实施方式中,判断封装模块530将检测结果与阈值进行比较,如果确定用户设备会干扰辅助基站,则判断封装模块530将签名序号封装到第一基站应用协议消息中;如果确定用户设备不会干扰辅助基站,则默认允许用户设备接入辅助基站。在另一实施方式中,判断封装模块530将前序信号的检测结果与阈值进行比较,如果确定用户设备不会干扰辅助基站,则将准许随机接入的信息作为不会干扰辅助基站的结果和签名序号一起封装到第一基站应用协议消息中;如果确定用户设备会干扰辅助基站,则将不准许随机接入的信息作为会干扰辅助基站的结果和签名序号一起封装到第一基站应用协议消息中。判断封装模块530向发送模块540发送第一基站应用协议消息。
发送模块540用于将第一基站应用协议消息向服务基站发送,将第一基站应用协议消息向服务基站发送,以供服务基站根据第一基站应用协议消息确定是否允许用户设备接入辅助基站。比如,由于在不平衡区域,用户设备接收辅助基站的信号很弱,但用户设备接收服务基站的信号很强,所以,需要与用户设备进行下行数据交互时,选择服务基站与用户设备进行下行的数据交互。在封装好第一基站应用协议消息后,发送模块540直接向服务基站发送第一基站应用协议消息,或先将第一基站应用协议消息向无线网络控制器发送后,无线网络控制器再将第一基站应用协议消息向服务基站发送。如果服务基站收到中间数据,则会根据所述中间数据确定是否会干扰辅助基站,从而确定是否允许用户设备接入辅助基站;如果服务基站收到直接结果,则会直接确定是否允许用户设备接入辅助基站。在确定是否允许用户设备接入辅助基站后,服务基站与用户设备进行下行数据交互,从而通知用户设备是否接入辅助基站。
接收模块510还用于接收服务基站所发送的第二基站应用协议消息。比如,辅助基站向服务基站发送第一基站应用协议消息后,服务基站向辅助基站发送第二基站应用协议消息,接收模块510接收到第二基站应用协议消息后,知道该用户设备可以接入辅助基站,做好接受该用户设备数据的准备。否则,不做接受该用户设备数据的准备。
参阅图6,图6是本申请基站又一实施方式的结构示意图。本实施方式的基站作为辅助基站,包括:接收机610、处理器620以及发送机630。下面以NodeB为服务基站进行说明。
接收机610用于接收用户设备通过物理随机接入信道所发送的前序信号。比如,在不平衡区域中,服务基站接收用户设备的信号很弱,但辅助基站接收用户设备的信号很强,用户设备向外发送前序信号时,辅助基站的接收机610很容易接收用户设备通过物理随机接入信道所发送的前序信号,其中,前序信号中包含了签名序号。接收机610向处理器620发送前序信号。
处理器620用于接收前序信号,检测前序信号以获得签名序号,对前序信号的能量进行检测以获得检测结果,将前序信号的检测结果与阈值进行比较以获得用户设备是否会干扰辅助基站的信息,并将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。比如,辅助基站在接收到前序信号时,处理器620检测前序信号以获得签名序号,对前序信号的能量进行检测以获得检测结果,然后将前序信号的检测结果与阈值进行比较,从而获得用户设备是否会干扰辅助基站的信息,如果前序信号的能量大于或等于阈值,则用户设备会干扰辅助基站;如果前序信号的能量小于阈值,则用户设备不会干扰辅助基站。可选的,前序信号的检测结果包括对前序信号的信噪比,信干噪比或能量等等进行检测以获得的检测结果。用户设备是否会干扰辅助基站的信息包括检测结果与阈值进行比较所得的中间数据或检测结果与阈值进行比较所得的会干扰或不会干扰辅助基站的直接结果。处理器620将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中。在一种实施方式中,处理器620将前序信号的检测结果与阈值进行比较,如果确定用户设备会干扰辅助基站,则处理器620将签名序号封装到第一基站应用协议消息中;如果确定用户设备不会干扰辅助基站,则默认允许用户设备接入辅助基站。在另一实施方式中,处理器620将前序信号的检测结果与阈值进行比较,如果确定用户设备不会干扰辅助基站,则将准许随机接入的信息作为不会干扰辅助基站的结果和签名序号一起封装到第一基站应用协议消息中;如果确定用户设备会干扰辅助基站,则将不准许随机接入的信息作为会干扰辅助基站的结果和签名序号一起封装到第一基站应用协议消息中。处理器620向发送机630发送第一基站应用协议消息。
发送机630用于将第一基站应用协议消息向服务基站发送,将第一基站应用协议消息向服务基站发送,以供服务基站根据第一基站应用协议消息确定是否允许用户设备接入辅助基站。比如,由于在不平衡区域,用户设备接收辅助基站的信号很弱,但用户设备接收服务基站的信号很强,所以,需要与用户设备进行下行数据交互时,选择服务基站与用户设备进行下行的数据交互。在封装好第一基站应用协议消息后,发送机630直接向服务基站发送第一基站应用协议消息,或先将第一基站应用协议消息向无线网络控制器发送后,无线网络控制器再将第一基站应用协议消息向服务基站发送。。如果服务基站收到中间数据,则会根据所述中间数据确定是否会干扰辅助基站,从而确定是否允许用户设备接入辅助基站;如果服务基站收到直接结果,则会直接确定是否允许用户设备接入辅助基站。在确定是否允许用户设备接入辅助基站后,服务基站与用户设备进行下行数据交互,从而通知用户设备是否接入辅助基站。
接收机610还用于接收服务基站所发送的第二基站应用协议消息。比如,辅助基站向服务基站发送第一基站应用协议消息后,服务基站向辅助基站发送第二基站应用协议消息,接收机610接收到第二基站应用协议消息后,知道该用户设备可以接入辅助基站,做好接受该用户设备数据的准备。否则,不做接受该用户设备数据的准备。
基于上述基站,本申请还提出了一种不平衡区用户设备随机接入系统,包括服务基站、辅助基站以及用户设备,用户设备可向辅助基站上行通讯,辅助基站和服务基站之间可进行通讯,服务基站可向用户设备下行通讯。具体请参阅附图1及相关说明,此处不重复赘述。
上述方案通过接收用户设备所发送的前序信号,对前序信号的能量进行检测以获得检测结果,然后将检测结果与阈值进行比较以获得是否会干扰辅助基站的信息,并将是否会干扰辅助基站的信息封装到第一基站应用协议消息中向服务基站发送,以供服务基站根据第一基站应用协议消息确定是否允许用户设备接入辅助基站,从而在确定用户设备在会对辅助基站造成干扰时,禁止用户设备接入辅助基站,防止用户设备在不平衡区对辅助基站进行干扰。
在本申请所提供的几个实施方式中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施方式仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施方式方案的目的。
另外,在本申请各个实施方式中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施方式所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。

Claims (16)

  1. 一种不平衡区用户设备随机接入方法,包括如下步骤:
    接收用户设备通过物理随机接入信道所发送的前序信号;
    对所述前序信号的能量进行检测以获得检测结果;
    将所述检测结果与阈值进行比较以获得所述用户设备是否会干扰辅助基站的信息,并将所述用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中;
    将所述第一基站应用协议消息向服务基站发送,以供所述服务基站根据所述第一基站应用协议消息确定是否允许所述用户设备接入辅助基站。
  2. 根据权利要求1所述的方法,其特征在于,
    所述接收用户设备通过物理随机接入信道所发送的前序信号的步骤之后包括:检测所述前序信号以获得签名序号;
    所述将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中的步骤包括:如果所述用户设备会干扰所述辅助基站,则将所述签名序号封装到第一基站应用协议消息中,以禁止所述用户设备接入辅助基站。
  3. 根据权利要求1所述的方法,其特征在于,
    所述接收用户设备通过物理随机接入信道所发送的前序信号的步骤之后包括:检测所述前序信号以获得签名序号;
    所述将用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中的步骤包括:将准许或不准随机接入的信息作为是否会干扰辅助基站的结果和所述签名序号一起封装到第一基站应用协议消息中。
  4. 根据权利要求2或3所述的方法,其特征在于,
    所述将第一基站应用协议消息向服务基站发送的步骤之后包括:接收服务基站所发送的第二基站应用协议消息以指示所述服务基站是否允许所述用户设备接入辅助基站。
  5. 根据权利要求1所述的方法,其特征在于,所述将第一基站应用协议消息向服务基站发送的步骤包括:
    将所述第一基站应用协议消息向无线网络控制器发送,以供所述无线网络控制器将所述第一基站应用协议消息向所述服务基站发送。
  6. 一种基站,其特征在于,所述基站作为辅助基站,包括接收模块、检测模块、判断封装模块以及发送模块;
    所述接收模块用于接收用户设备通过物理随机接入信道所发送的前序信号,所述接收模块向所述检测模块发送前序信号;
    所述检测模块用于接收所述前序信号,并对所述前序信号的能量进行检测以获得检测结果,所述检测模块将所述检测结果向所述判断封装模块发送;
    所述判断封装模块用于接收所述检测结果,将所述检测结果与阈值进行比较以获得所述用户设备是否会干扰辅助基站的信息,并将所述用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中,所述判断封装模块向所述发送模块发送所述第一基站应用协议消息;
    所述发送模块用于接收所述第一基站应用协议消息,将所述第一基站应用协议消息向服务基站发送,以供所述服务基站根据所述第一基站应用协议消息确定是否允许所述用户设备接入辅助基站。
  7. 根据权利要求6所述的基站,其特征在于,
    所述检测模块还用于检测所述前序信号以获得签名序号,所述检测模块向所述判断封装模块发送所述签名序号;
    所述判断封装模块还用于接收所述签名序号,在所述用户设备会干扰所述辅助基站时,将所述签名序号封装到第一基站应用协议消息中,以禁止所述用户设备接入辅助基站。
  8. 根据权利要求6所述的基站,其特征在于,
    所述检测模块还用于检测所述前序信号以获得签名序号,所述检测模块向所述判断封装模块发送所述签名序号;
    所述判断封装模块还用于接收所述签名序号,将准许或不准随机接入的信息作为是否会干扰辅助基站的结果和所述签名序号一起封装到第一基站应用协议消息中。
  9. 根据权利要求7或8所述的基站,其特征在于,
    所述接收模块还用于接收服务基站所发送的第二基站应用协议消息以指示所述服务基站是否允许所述用户设备接入辅助基站。
  10. 根据权利要求6所述的基站,其特征在于,
    所述接收模块还用于将所述第一基站应用协议消息向无线网络控制器发送,以供所述无线网络控制器将所述第一基站应用协议消息向所述服务基站发送。
  11. 一种基站,其特征在于,所述基站作为辅助基站,包括接收机、处理器以及发送机;
    所述接收机用于接收用户设备通过物理随机接入信道所发送的前序信号,所述接收机向所述处理器发送前序信号;
    所述处理器用于接收所述前序信号,对所述前序信号的能量进行检测以获得检测结果,将所述检测结果与阈值进行比较以获得所述用户设备是否会干扰辅助基站的信息,并将所述用户设备是否会干扰辅助基站的信息封装到第一基站应用协议消息中,所述处理器向所述发送机发送所述第一基站应用协议消息;
    所述发送机用于接收所述第一基站应用协议消息,将所述第一基站应用协议消息向服务基站发送,以供所述服务基站根据所述第一基站应用协议消息确定是否允许所述用户设备接入辅助基站。
  12. 根据权利要求11所述的基站,其特征在于,
    所述处理器还用于检测所述前序信号以获得签名序号,在所述用户设备会干扰所述辅助基站时,将所述签名序号封装到第一基站应用协议消息中,以禁止所述用户设备接入辅助基站。
  13. 根据权利要求11所述的基站,其特征在于,
    所述处理器还用于检测所述前序信号以获得签名序号,将准许或不准随机接入的信息作为是否会干扰辅助基站的结果和所述签名序号一起封装到第一基站应用协议消息中。
  14. 根据权利要求12或13所述的基站,其特征在于,
    所述接收机还用于接收服务基站所发送的第二基站应用协议消息以指示所述服务基站是否允许所述用户设备接入辅助基站。
  15. 根据权利要求11所述的基站,其特征在于,
    所述接收机还用于将所述第一基站应用协议消息向无线网络控制器发送,以供所述无线网络控制器将所述第一基站应用协议消息向所述服务基站发送。
  16. 一种不平衡区用户设备随机接入系统,其特征在于,包括服务基站、辅助基站以及用户设备,所述用户设备可向所述辅助基站上行通讯,所述辅助基站和所述服务基站之间可进行通讯,所述服务基站可向所述用户设备下行通讯,其中,所述辅助基站为如权利要求6-10或11-15任一权利要求所述的基站。
PCT/CN2012/085306 2012-11-27 2012-11-27 不平衡区用户设备随机接入方法、基站及系统 WO2014082193A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201280002623.1A CN104025659B (zh) 2012-11-27 2012-11-27 不平衡区用户设备随机接入方法、基站及系统
PCT/CN2012/085306 WO2014082193A1 (zh) 2012-11-27 2012-11-27 不平衡区用户设备随机接入方法、基站及系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/085306 WO2014082193A1 (zh) 2012-11-27 2012-11-27 不平衡区用户设备随机接入方法、基站及系统

Publications (1)

Publication Number Publication Date
WO2014082193A1 true WO2014082193A1 (zh) 2014-06-05

Family

ID=50827007

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/085306 WO2014082193A1 (zh) 2012-11-27 2012-11-27 不平衡区用户设备随机接入方法、基站及系统

Country Status (2)

Country Link
CN (1) CN104025659B (zh)
WO (1) WO2014082193A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778408A (zh) * 2009-01-08 2010-07-14 中国移动通信集团公司 一种基于家庭基站的干扰抑制方法及装置
WO2011118212A1 (ja) * 2010-03-25 2011-09-29 パナソニック株式会社 無線通信システム、フェムトセル基地局及び送信電力制御方法
CN102438249A (zh) * 2011-10-18 2012-05-02 新邮通信设备有限公司 一种在家庭基站和宏基站应用场景下的干扰协调方法
CN102695255A (zh) * 2012-05-29 2012-09-26 西安电子科技大学 一种基于认知技术的异构网络节能方法
US20120258724A1 (en) * 2009-12-15 2012-10-11 Hyung Tae Kim Method and apparatus for removing inter-heterogeneous cell interference

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102131223B (zh) * 2010-01-13 2013-09-11 中国移动通信集团公司 异构网络中的干扰管理方法和系统以及家庭基站

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778408A (zh) * 2009-01-08 2010-07-14 中国移动通信集团公司 一种基于家庭基站的干扰抑制方法及装置
US20120258724A1 (en) * 2009-12-15 2012-10-11 Hyung Tae Kim Method and apparatus for removing inter-heterogeneous cell interference
WO2011118212A1 (ja) * 2010-03-25 2011-09-29 パナソニック株式会社 無線通信システム、フェムトセル基地局及び送信電力制御方法
CN102438249A (zh) * 2011-10-18 2012-05-02 新邮通信设备有限公司 一种在家庭基站和宏基站应用场景下的干扰协调方法
CN102695255A (zh) * 2012-05-29 2012-09-26 西安电子科技大学 一种基于认知技术的异构网络节能方法

Also Published As

Publication number Publication date
CN104025659A (zh) 2014-09-03
CN104025659B (zh) 2017-12-22

Similar Documents

Publication Publication Date Title
WO2012039586A1 (en) Apparatus and method for detecting cause of radio link failure or handover failure in mobile communication system
WO2021206464A1 (en) Method for handling conditional configuration stored in ue
WO2021182667A1 (ko) 무선 침입 방지 시스템, 이를 포함하는 무선 네트워크 시스템 및 무선 네트워크 시스템의 작동 방법
WO2016148548A1 (ko) 연결요구 장치와 연결수용 장치의 초기 셋업을 지원하는 기법
WO2012016473A1 (zh) 无线保真接入方法、接入点及无线保真接入系统
WO2016114640A1 (en) Method of secured transmission and reception of discovery message in a d2d communication system
WO2011049360A2 (ko) 무선랜에서 그룹 주소 할당 방법, 복수 단말들과의 응답 요청 및 응답 프레임 전송방법, 상기 그룹 주소를 이용한 데이터 전송방법
WO2010143846A2 (ko) 반송파 조합 방식 이동통신 시스템에서 단말의 임의접속 방법
WO2017020608A1 (zh) WiFi热点的共享方法和电子设备
WO2018203713A1 (en) Methods and systems for performing paging operations in a 5g network
WO2009142445A2 (ko) 무선통신시스템에서 간섭 제거 장치 및 방법
EP3238492A1 (en) Method and apparatus of synchronizing device to device terminals in time and frequency
WO2013122418A1 (en) Method and apparatus for supporting device-to-device communications
WO2013095074A1 (en) Method and system for secured communication of control information in a wireless network environment
WO2013100582A1 (ko) 무선 통신 시스템 및 그 무선 통신 시스템에서 과부하 제어를 위한 rrc 연결 방법
WO2011105738A2 (en) Method and apparatus for performing handover
WO2013058573A1 (en) Method and apparatus for generating connection identifier for device-to-device communication
WO2015088222A1 (ko) 와이파이 다이렉트 네트워크를 통한 차량간 이상 신호 교환이 가능한 기기 및 그 제어 방법
WO2021034031A1 (en) Apparatus and method for access control, management, and protection in wireless communication system
WO2011078576A2 (en) Initial access method and apparatus of user equipment using power reduction request in heterogeneous network
WO2014051390A2 (ko) 기기간 통신을 수행하는 기기 및 그 방법
WO2016105136A1 (en) Method and apparatus of synchronizing device to device terminals in time and frequency
WO2019190154A1 (ko) 이동통신 시스템에서 스케줄링 요청을 전송하는 방법 및 장치
WO2014082193A1 (zh) 不平衡区用户设备随机接入方法、基站及系统
WO2023017952A1 (ko) 센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12889193

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12889193

Country of ref document: EP

Kind code of ref document: A1