Unauthorized carrier based data transmission method and device and resource seizing method and device
A data transmission method and data transmission technology are applied in the field of unlicensed carrier applications and can solve problems such as interference and difficulty in coordination.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0113] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present invention.
[0114] Such as figure 1 As shown, the subframe structure in the embodiment of the present invention, in chronological order, specifically includes:
[0115] It includes the part that allows the execution of clear channel detection CCA_1 or eCCA_1 (the following "1" is to distinguish different CCA or eCAA (Enhanced Clear Channel Assessment)).
[0116] Wherein, the base station executes CCA or eCCA within this time period. The actual duration of CCA_1 or eCCA_1 is fixed or may vary. The duration of CCA_1 or eCCA_1 can be less than 9us / 34us / 40us. At this time, the base sta...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com