Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unauthorized resource transmission method and device

A transmission method and an unauthorized technology, applied in the transmission field of unauthorized resources, can solve the problems of many wireless access sites, difficult cooperation, and many wireless access technologies.

Inactive Publication Date: 2016-11-23
ZTE CORP
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 5. There are many wireless access technologies (across different communication standards, collaboration is difficult, and network topologies are diverse);
[0008] 6. There are many wireless access sites (large number of users, difficult collaboration, and high centralized management overhead);
[0011] However, LTE faces many problems in using unlicensed carriers for data transmission. One of the problems is how to quickly notify the information of successfully occupying unlicensed carrier resources after the UE side participates in the competition for unlicensed carrier resources and how to efficiently for uplink data transmission
There is currently no specific solution for this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized resource transmission method and device
  • Unauthorized resource transmission method and device
  • Unauthorized resource transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0103] This embodiment describes the processing performed by the first transmission node in a method for transmitting unauthorized resources, such as figure 1 shown, including:

[0104] Step 1, the first transmission node performs idle channel assessment CCA detection on the designated unlicensed carrier resource;

[0105] The first transmission node includes a first terminal.

[0106] Step 2, when it is detected that the unlicensed carrier resources are idle, send indication information on public resources or designated resources or send indication information and perform a data transmission, the indication information is used to notify that the unlicensed carrier resources are occupied .

[0107] The common resource is located on an unlicensed carrier resource, the maximum range is two subframes, and the minimum range is a complete OFDM symbol.

[0108] Specifically, the common resources include the following resources in the time domain: the first complete OFDM symbol af...

Embodiment 2

[0124] The device for implementing the above method is located at the first transmission node, such as figure 2 As shown, including a first detection module and a sending module, wherein:

[0125] The first detection module is configured to perform idle channel assessment CCA detection on designated unlicensed carrier resources;

[0126] The sending module is configured to, when the first detection module detects that the unlicensed carrier resource is idle, send indication information on public resources or designated resources or send indication information and perform a data transmission, and the indication information is used To notify that the unlicensed carrier resources are occupied.

[0127] It should be noted that since the device provided in this embodiment can implement the method of the first embodiment above, other detailed operations can refer to the corresponding content of the first embodiment, which will not be repeated here.

Embodiment 3

[0129] This embodiment describes the processing performed by the second transmission node in a method for transmitting unauthorized resources, such as image 3 As shown, the method includes:

[0130] Step 1, the second transmission node performs detection on public resources or designated resources;

[0131] For the locations of the public resources and designated resources, refer to the description in Embodiment 1.

[0132] Step 2: When the indication information is detected, judge whether the second transmission node can use the unlicensed carrier resource that the first transmission node competes for to perform data transmission according to the content of the indication message.

[0133] In this example, the first transmission node includes the first terminal; the second transmission node includes one or more of the following nodes: the first base station to which the first terminal belongs, the adjacent base station of the first base station, Other terminals that have p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unauthorized resource transmission method and device. Processing steps implemented by a first transmission node are as follows: implementing CCA detection on an assigned unauthorized carrier resource by the first transmission node, and sending indicating information or sending the indicating information and implementing data transmission on a public resource or an assigned resource for once when detecting that the unauthorized carrier resource is idle, wherein the indicating information is used for notifying that the unauthorized carrier resource has been occupied; and the processing steps implemented by a second transmission node are as follows: implementing detection on the public resource or an assigned resource by the second transmission node, and judging whether the second transmission node can use the unauthorized carrier resource competed by the first transmission node to implement data transmission according to contents of the indicating information when the indicating information is detected. By adopting the scheme disclosed by the embodiment of the invention, the use ratio of the unauthorized carrier resource can be greatly increased.

Description

technical field [0001] The present invention relates to wireless communication technology, in particular to a method and device for transmitting non-authorized resources. Background technique [0002] Unlicensed carriers have the following characteristics: [0003] 1. Free / low cost (no need to purchase unlicensed spectrum, spectrum resource is zero cost); [0004] 2. Low access requirements and low cost (individuals and enterprises can participate in the deployment, and the equipment of equipment manufacturers can be deployed arbitrarily); [0005] 3. The available bandwidth is large (5GHz, 2.4GHz unlicensed frequency bands can be used); [0006] 4. Shared resources (when multiple different systems are operating or different operators of the same system are operating, some ways of sharing resources can be considered to improve spectrum efficiency); [0007] 5. There are many wireless access technologies (across different communication standards, collaboration is difficult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L5/00H04W74/08
CPCH04W72/04Y02D30/70
Inventor 杨玲苟伟戴博夏树强彭佛才毕峰李新彩
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products