CN105992386A - Method and device for activating unauthorized carriers - Google Patents
Method and device for activating unauthorized carriers Download PDFInfo
- Publication number
- CN105992386A CN105992386A CN201510076616.1A CN201510076616A CN105992386A CN 105992386 A CN105992386 A CN 105992386A CN 201510076616 A CN201510076616 A CN 201510076616A CN 105992386 A CN105992386 A CN 105992386A
- Authority
- CN
- China
- Prior art keywords
- terminal
- carrier wave
- unauthorized carrier
- resource
- line activating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method and a device for activating unauthorized carriers. The method comprises steps: during a one or more unauthorized carrier resource competition starting process in a terminal, the terminal voluntarily activates the one or more unauthorized carriers. The resource competition process comprises a specified time waiting process by the terminal and a resource competition process by the terminal, and the specified time is interval time between end of last resource usage by the terminal and starting of resource competition by the terminal. Thus, the problem that the terminal consumes a long time from receiving an activating order to entering an activating state in a related technology can be solved, and the terminal can use the competed resources to the most extent.
Description
Technical field
The present invention relates to the communications field, in particular to Activiation method and the dress of a kind of unauthorized carrier wave
Put.
Background technology
It in Long Term Evolution (Long Term Evolution, referred to as LTE) system, is in the terminal of connected state,
Can only be communicated with base station by an i.e. carrier wave of Serving cell.For providing higher data to mobile subscriber
Speed, advanced long-term evolution system (Long Term Evolution Advance, referred to as LTE-A) proposes
Carrier aggregation technology (Carrier Aggregation, referred to as CA), its objective is as having respective capabilities
User equipment (UE) bigger broadband is provided, improve the peak rate of UE.In LTE, system is supported
The big a width of 20MHz of downstream transmission, carrier aggregation is by the component carrier (Component of two or more
Carriers, referred to as CC) it is aggregating support more than 20MHz, the maximum transmission less than 100MHz
Bandwidth.There is the LTE-A UE of carrier aggregation capacity, can simultaneously transceiving data on multiple component carriers.
In lte-a system, terminal can pass through multiple component carriers (such as CC1, CC2) after entering connected state simultaneously
Communicating with source base station, base station can be that UE specifies a master by explicit configuration or according to protocol conventions
Component carrier (Primary Component Carrier, referred to as PCC), other component carrier is referred to as auxiliary
Component carrier (Secondary Component Carrier, referred to as SCC), the Serving cell on PCC
Being referred to as main Serving cell (Primary Cell, referred to as Pcell), the Serving cell on SCC is referred to as auxiliary clothes
Business cell (Secondary Cell, referred to as Scell).
The burst feature of consideration business, although UE is operated in flank speed at most may use up to 5 carrier waves
Bandwidth, but in burst gap, the practical business flow of UE is seldom or close to zero, if now
UE also continues to the data to be received such as over a number of carriers, it will cause higher power overhead.In order to extend
The working time of UE, the wireless transmission closing unnecessary unlatching receives equipment, reduces unnecessary battery consumption,
Lte-a system introduces the concept that carrier activation deactivates.UE only connects in the carrier wave enterprising row data activating
Receiving and sending, such as Physical Downlink Control Channel, (Physical Downlink Control Channel is referred to as
PDCCH) monitoring;And for temporary transient no carrier wave, base station is notified by implicit commands or implicit rule
Deactivating these carrier waves, on the carrier wave deactivating, UE is not listening to PDCCH channel, does not also receive physics
Data on DSCH Downlink Shared Channel (Physical Downlink Shared Channel, referred to as PDSCH),
Do not send upstream data, thus reach the purpose of power saving yet.PCell is deactivated by base station never, SCell
Can be activated deactivation neatly, the activation of Scell is that base station notifies terminal by MAC CE, eventually
End at least needs 8ms, even 24ms from receiving activation command to entrance state of activation, the time of 34ms.
With the quick growth of data service, in the near future, frequency spectrum is authorized can not to bear so huge
Data volume;So LTE operator considers to dispose in unlicensed spectrum resource (Unlicensed Carrier)
LTE, shares, by unlicensed spectrum, the data traffic authorizing in carrier wave.Unauthorized carrier wave (exempts to authorize frequency spectrum)
Refer under meeting government department (e.g., State Radio Regulatory Commission) pertinent regulations (radio control),
Do not need to authorize the frequency spectrum (or carrier wave) that just can directly use.For example, micro-wave oven, remote toy aircraft, nothing
Line Mouse, Wireless Keyboard, high-fidelity wireless Internet access (Wireless Fidelity, referred to as WiFi) etc. all use
Unauthorized carrier wave.In other instances, unauthorized carrier wave needs could be used by competition.If base station
(including WiFi access point), resource was not arrived in competition, then can not use unauthorized carrier wave.Fig. 1 is related skill
In art unauthorized carrier resource competition and use time chart, as it is shown in figure 1, be one from T2 to T5
Individual complete resource contention and use process, after upper once resource uses and terminates, terminal needs etc. to be specified
Time, referred to as interval time, T2 to T3, after interval time terminates, terminal proceeds by resource contention, T3
To T4, being the resource contention time, resource contention terminates, and the terminal of competition to resource can begin to use resource,
T4 to T5, is the time of the terminal use resource that resource is arrived in competition, and the resource competed uses after terminating, under
One process restarts.Wherein, T2 to T3, can be 0, it is also possible to be not 0.
If enabling unauthorized carrier wave, control information is still sent by authorizing carrier wave, i.e. PCell still authorizes
Carrier wave, unauthorized carrier wave can be as Scell, and in order to distinguish, we are referred to as U-Scell.So U-Scell
Activation, if also needing to 8ms, even 24ms, 34ms, then competition arrive resource major part use
Have activated, even connect activation and also do not complete just without wasting very much.
For terminal in correlation technique from receiving the problem that activation command is time-consumingly grown to entrance state of activation, at present
Effective solution is not yet proposed.
Content of the invention
Present invention is primarily targeted at Activiation method and the device that a kind of unauthorized carrier wave is provided, at least to solve
Certainly in correlation technique terminal from receiving activation command to entering the problem that state of activation is time-consumingly grown.
According to an aspect of the invention, it is provided the Activiation method of a kind of unauthorized carrier wave, also include: at end
During end starts the resource contention of one or more unauthorized carrier wave, described terminal is from line activating one
Or multiple unauthorized carrier wave, wherein, described resource contention process includes: the time to be specified such as described terminal
The process of resource described in process and described terminal challenge, the described appointment time is that described terminal is in upper once resource
Use and terminate to start to compete the interval time of described resource to described terminal.
Further, described terminal includes from the one or more unauthorized carrier wave of line activating: at described end
After described resource is arrived in end competition, described terminal is from the one or more unauthorized carrier wave of line activating.
Further, after described terminal challenge to described resource, described terminal from line activating one or
Multiple unauthorized carrier waves include: described terminal, after waiting described interval time, has detected and can be used for sending
During the idle channel of data, described terminal is from the one or more unauthorized carrier wave of line activating.
Further, described terminal includes from the one or more unauthorized carrier wave of line activating: at described finger
Fix time beginning when, described terminal is from the one or more unauthorized carrier wave of line activating.
Further, start the resource contention of one or more unauthorized carrier wave in terminal during, described end
End includes from the one or more unauthorized carrier wave of line activating: at the end of the described appointment time, described end
End is from the one or more unauthorized carrier wave of line activating.
Further, described terminal includes from the one or more unauthorized carrier wave of line activating: from described
When terminal challenge is to scheduled time before the described resource moment, described terminal is from line activating one or many
Individual unauthorized carrier wave, wherein, it is unauthorized that the described scheduled time activates the one or more more than described terminal
Time needed for carrier wave.
According to another aspect of the present invention, provide the activation device of a kind of unauthorized carrier wave, be positioned at end side,
Including: active module, it is used for during terminal starts the resource contention of one or more unauthorized carrier wave,
From the one or more unauthorized carrier wave of line activating, wherein, described resource contention process includes: described end
The process of resource described in the process of the times to be specified such as end and described terminal challenge, the described appointment time is described
Terminal uses in upper once resource and terminates to start to compete the interval time of described resource to described terminal.
Further, described active module includes: the first activation unit, is used in described terminal challenge to institute
After stating resource, from the one or more unauthorized carrier wave of line activating.
Further, described first activation unit, is additionally operable to described terminal after waiting described interval time,
When the idle channel that can be used for sending data being detected, from the one or more unauthorized load of line activating
Ripple.
Further, described active module includes: the second activation unit, for starting in the described appointment time
When, from the one or more unauthorized carrier wave of line activating.
Further, described active module includes: the 3rd activation unit, for terminating in the described appointment time
When, from the one or more unauthorized carrier wave of line activating.
Further, described active module includes: the 4th activation unit, for arriving from described terminal challenge
During scheduled time before the described resource moment, from the one or more unauthorized carrier wave of line activating, wherein,
The described scheduled time activates the one or more time needed for unauthorized carrier wave more than described terminal.
By the present invention, in the competition process starting one or more unauthorized carrier resource, terminal swashs voluntarily
One or more unauthorized carrier waves alive, when this terminal challenge resource success, can be directly by competing the money that arrive
Source sends data, or notice base station is carried out dispatch terminal by base station and sent data by the resource competed, and passes through
Which, solves terminal in correlation technique from receiving activation command to entering the problem that state of activation is time-consumingly grown,
So that terminal at utmost utilizes the resource that competition is arrived.
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application,
The schematic description and description of the present invention is used for explaining the present invention, is not intended that the improper limit to the present invention
Fixed.In the accompanying drawings:
Fig. 1 is competition and the use time chart of unauthorized carrier resource in correlation technique;
Fig. 2 is the Activiation method flow chart of unauthorized carrier wave according to embodiments of the present invention;
Fig. 3 a~3d is the activation apparatus structure block diagram of unauthorized carrier wave according to embodiments of the present invention;And
Fig. 4 is the Activiation method flow chart of the unauthorized carrier wave according to alternative embodiment of the present invention.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the application and the feature in embodiment
Can be mutually combined.Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Functional overview, the present invention relates to the competition process of unauthorized carrier resource, and this process includes: (1)
A large amount of downlink data is had to need to send in base station discovery terminal, when current area does not has too many resource to use;
Need to notify terminal, seize the resource of unauthorized carrier wave, or have a large amount of upstream data to need to send out in discovery terminal
When sending, need preempting resources, notify that base station is carrying out resource and seizing simultaneously;(2) terminal starts unauthorized load
Resource contention process on ripple, in this process, terminal can from the unauthorized carrier wave of line activating;(3) terminal is competing
Striving resource, notifying that base station, base station schedules terminals, or terminal are sent by described resource voluntarily needs to send
Data.Below in conjunction with embodiments of the invention, the present invention is illustrated;
Present embodiments providing the Activiation method of a kind of unauthorized carrier wave, Fig. 2 is according to embodiments of the present invention non-
Authorize the Activiation method flow chart of carrier wave, as in figure 2 it is shown, the step of the method includes:
Step S202: when terminal has a large amount of downlink data or a large amount of upstream data sends, base station notifies terminal
Remove competitive resource or terminal competitive resource voluntarily and notify base station;
Step S204: during terminal starts the resource contention of one or more unauthorized carrier wave, terminal is certainly
The one or more unauthorized carrier wave of line activating;
Wherein, resource contention process includes: the process of the time to be specified such as terminal and the process of terminal challenge resource,
The appointment time is that terminal uses, in upper once resource, the interval time terminating to terminal to start competitive resource.
Step S206: terminal sends data by this one or more unauthorized carrier waves.
By the present embodiment, in the competition process starting one or more unauthorized carrier resource, terminal is voluntarily
Activate one or more unauthorized carrier wave, when this terminal challenge resource success, can directly be arrived by competition
Resource sends data, or notice base station is carried out dispatch terminal by base station and sent data by the resource competed, logical
Cross which, solve terminal in correlation technique from receiving activation command to entering the problem that state of activation is time-consumingly grown,
So that terminal at utmost utilizes the resource that competition is arrived.
It should be noted that for the appointment time relating in the present embodiment according to actual conditions can be zero or
There is certain stand-by period.
The process starting the competition of one or more unauthorized carrier resource relating to due to the present embodiment includes: eventually
The process of the times to be specified such as end and the process of terminal challenge resource, it is intended that the time is that terminal makes in upper once resource
With terminating to terminal to start the interval time of competitive resource, therefore, for terminal in the present embodiment from line activating one
Individual or multiple unauthorized carrier method, which is entered by the several optional embodiment below in conjunction with the present embodiment
Row illustrates;
Optional embodiment one: after terminal challenge to resource, i.e. terminal, after waiting interval time, detect
When having the idle channel that can be used for sending data, terminal is from the one or more unauthorized carrier wave of line activating.
Optional embodiment two: when reaching the appointment time, terminal is from the one or more unauthorized carrier wave of line activating.
Optional embodiment three: at the end of at the appointed time, terminal is from the one or more unauthorized carrier wave of line activating.
Optional embodiment four: when estimating that the scheduled time before the resource moment is arrived in competition from terminal, terminal is certainly
The one or more unauthorized carrier wave of line activating, wherein, the scheduled time is activated one or more unauthorized more than terminal
Time needed for carrier wave.Wherein, this scheduled time is on the premise of more than the required time, can be as required
It is adjusted correspondingly.
It should be noted that the optional embodiment of aforementioned four is not intended that limitation of the invention, starting one
Or other moment during the competition of multiple unauthorized carrier resource, terminal also can be from line activating as required
This one or more unauthorized carrier waves;
Additionally providing the activation device of a kind of unauthorized carrier wave in the present embodiment, this device is used for realizing above-mentioned reality
Execute example and optional embodiment, carry out repeating no more of explanation.As used below, term " mould
Block " " unit " can realize the software of predetermined function and/or the combination of hardware.Although described by following example
Device preferably realize with software, but hardware, or the realization of the combination of software and hardware is also possible
And be contemplated.
Fig. 3 a~3d is the activation apparatus structure block diagram of unauthorized carrier wave according to embodiments of the present invention, this device position
In end side, this device includes: active module 32, for starting one or more unauthorized carrier wave in terminal
Resource contention during, from the one or more unauthorized carrier wave of line activating, wherein, resource contention process includes:
The process of the time to be specified such as terminal and the process of terminal challenge resource, it is intended that the time is that terminal is in upper once resource
Use the interval time terminating to terminal to start competitive resource.
As shown in Figure 3 a, this active module 32 includes: the first activation unit 322, for arriving in terminal challenge
After resource, from the one or more unauthorized carrier wave of line activating.
Alternatively, this first activation unit 322, is additionally operable to terminal and is waiting after interval time, and having detected can
During for sending the idle channel of data, from the one or more unauthorized carrier wave of line activating.
As shown in Figure 3 b, this active module 32 includes: the second activation unit 324, for when reaching appointment
Between when, from the one or more unauthorized carrier wave of line activating.
As shown in Figure 3 c, this active module 32 includes: the 3rd activation unit 326, at the appointed time tying
Shu Shi, from the one or more unauthorized carrier wave of line activating.
As shown in Figure 3 d, active module 32 includes: the 4th activation unit 328, for arriving from terminal challenge
During scheduled time before the resource moment, from the one or more unauthorized carrier wave of line activating, wherein, the scheduled time
Activate the time needed for one or more unauthorized carrier wave more than terminal.
Below in conjunction with alternative embodiment of the present invention, the present invention is illustrated;
This alternative embodiment provides the Activiation method of a kind of unauthorized carrier wave, and the implementation of the method includes:
Mode one: terminal is from line activating after getting resource, i.e. terminal detects after waiting interval time that channel is empty
In the spare time, data can be sent, then from this unauthorized carrier wave of line activating
Mode two: terminal is carrying out being carried out activation when resource is seized, i.e. terminal has DSR
The notice sending or receiving base station is needed to need competitive resource, when starting waiting for interval time, from line activating
This unauthorized carrier wave, detects that after interval time channel status is idle, then send data at once.
Mode three: terminal is carrying out being carried out activation when resource is seized, i.e. terminal has DSR
Needing to send or receive the notice of base station needs competitive resource, after waiting and terminating interval time, from line activating
This unauthorized carrier wave, detects that after interval time channel status is idle, then send data at once.
Mode four: terminal ensures that the very first time sends data when getting resource, and terminal decides activation in its sole discretion, and this is non-
Authorize the moment of carrier wave, such as need 4ms from line activating, then just push away forward 4ms in the time getting resource
From line activating.
Before this, terminal is carried out competitive resource, notify after terminal preempting resources that eNB resource can be used, eNB
Dispatch terminal again.
Fig. 4 is the Activiation method flow chart of the unauthorized carrier wave according to alternative embodiment of the present invention, as shown in Figure 4,
The step of the method includes:
Step S402: terminal initiates wireless heterogeneous networks (Radio Resource in authorizing carrier cell
Control is referred to as RRC) connection establishment process, and enter connected state.
Step S404: due to the increase of portfolio, base station is configured with unauthorized carrier wave to terminal, and terminal is by non-
Authorizing carrier wave and cell to carry out carrier aggregation, unauthorized carrier wave is in deactivation status.
Step S406: base station discovery terminal has a large amount of downlink data to need to send, and current area does not provide too much
Source can use, and therefore notifies terminal, needs to seize the resource of unauthorized carrier wave, can comprise needs and seize money
The information in source, such as holding time, occupied bandwidth etc.;
Or terminal is found to have a large amount of upstream data to be needed to send, and needs preempting resources, is notifying base station simultaneously
Carry out resource to seize, the information needing preempting resources, such as holding time, occupied bandwidth etc. can be comprised;
Step S408: the resource contention process on the unauthorized carrier wave of terminal startup, in this process, in conjunction with
Fig. 1, terminal includes from the mode of the unauthorized carrier wave of line activating:
Optional example one:
1) the T2 moment, terminal initially enters the wait appointed interval time;
2) in the T3 moment, it is intended that interval time terminates, terminal proceeds by the competition process of resource;
3) the T4 moment, competition process terminates, the success of terminal preempting resources, can carry out data transmission, voluntarily
Activating unauthorized carrier wave, if terminal does not compete resource, then unauthorized carrier wave continues to keep deactivation status;
Optional example two:
1) the T2 moment, terminal initially enters the wait appointed interval time, from the unauthorized carrier wave of line activating;
2) in the T3 moment, it is intended that interval time terminates, terminal proceeds by the competition process of resource;
3) the T4 moment, competition process terminates, the success of terminal preempting resources, if terminal does not compete resource,
Then deactivate unauthorized carrier wave voluntarily;
Optional example three:
1) the T2 moment, terminal initially enters the wait appointed interval time;
2) in the T3 moment, it is intended that interval time terminates, terminal proceeds by the competition process of resource, from line activating
Unauthorized carrier wave;
3) the T4 moment, competition process terminates, the success of terminal preempting resources, if terminal does not compete resource,
Then deactivate unauthorized carrier wave voluntarily;
Optional example four:
Terminal needs the time of 4ms from the unauthorized carrier wave of line activating, if the unauthorized carrier wave of terminal discovery is not yet
Activating, the terminal judges distance T4 moment also has 4ms, from the unauthorized carrier wave of line activating;It should be noted that
This 4ms can be able to change according to time state, or can be pre-configured with;
1) the T2 moment, terminal initially enters the wait appointed interval time, if the unauthorized carrier wave of terminal discovery is still
Un-activation, the terminal judges distance T4 moment also has 4ms, from the unauthorized carrier wave of line activating;
2) in the T3 moment, it is intended that interval time terminates, terminal proceeds by the competition process of resource, if terminal
Finding that unauthorized carrier wave not yet activates, the terminal judges distance T4 moment also has 4ms, from the unauthorized load of line activating
Ripple;
3) the T4 moment, competition process terminates, the success of terminal preempting resources, if terminal does not compete resource,
Then deactivate unauthorized carrier wave voluntarily;
Step S410: terminal challenge to resource, notifies base station, can comprise the time letter of the resource competed
Breath, bandwidth information etc.;
Step S412: terminal is scheduling by base station;
Step S414: terminal is robbed after the resource that accounts for uses and finish, and calculates activationary time next time such as right
In mode one, next activationary time is the T4 moment, if it exceeds appointed threshold (such as 10ms, Ke Yimo
Recognize or configure) just deactivate unauthorized carrier wave, by the time next activation T4 on opportunity is to reactivation, if not
Exceed appointed threshold (such as 10ms can give tacit consent to or configure), then keep unauthorized carrier activation state.
Other modes by that analogy, are not repeated to describe.
By in this alternative embodiment, use the mode from the unauthorized carrier wave of line activating for the terminal, thus relative to phase
Mode in the technology of pass, can the resource competed of more good utilisation.
In another embodiment, additionally providing a kind of software, this software is used for performing above-described embodiment and excellent
Select the technical scheme described in embodiment.
In another embodiment, additionally provide a kind of storage medium, this storage medium is stored with above-mentioned soft
Part, this storage medium includes but is not limited to: CD, floppy disk, hard disk, scratch pad memory etc..
Obviously, those skilled in the art should be understood that each module of the invention described above or each step can be used logical
Computing device realize, they can concentrate in single computing device, or is distributed in multiple calculating
On the network that device is formed, alternatively, they can be realized by the executable program code of computing device,
It is thus possible to be stored in storage device is performed by computing device, and in some cases, can
Perform shown or described step with the order to be different from herein, or they are fabricated to respectively each collection
Become circuit module, or the multiple module in them or step are fabricated to single integrated circuit module realize.
So, the present invention is not restricted to the combination of any specific hardware and software.
Above are only the alternative embodiment of the present invention, be not limited to the present invention, for this area
For technical staff, the present invention can have various modifications and variations.All within the spirit and principles in the present invention,
Any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (12)
1. the Activiation method of a unauthorized carrier wave, it is characterised in that also include:
During terminal starts the resource contention of one or more unauthorized carrier wave, described terminal swashs voluntarily
The one or more unauthorized carrier wave alive, wherein, described resource contention process includes: described terminal etc.
The process of resource described in the process of time to be specified and described terminal challenge, the described appointment time is described end
End uses in upper once resource and terminates to start to compete the interval time of described resource to described terminal.
2. method according to claim 1, it is characterised in that described terminal is from line activating one or many
Individual unauthorized carrier wave includes:
After described terminal challenge to described resource, from line activating, the one or more non-awards described terminal
Power carrier wave.
3. method according to claim 2, it is characterised in that after described terminal challenge to described resource,
Described terminal includes from the one or more unauthorized carrier wave of line activating:
Described terminal, after waiting described interval time, detects the idle channel that can be used for sending data
When, described terminal is from the one or more unauthorized carrier wave of line activating.
4. method according to claim 1, it is characterised in that described terminal is from line activating one or many
Individual unauthorized carrier wave includes:
When the described appointment time starts, described terminal is from the one or more unauthorized carrier wave of line activating.
5. method according to claim 1, it is characterised in that start one or more unauthorized load in terminal
During the resource contention of ripple, described terminal includes from the one or more unauthorized carrier wave of line activating:
At the end of the described appointment time, described terminal is from the one or more unauthorized carrier wave of line activating.
6. method according to claim 1, it is characterised in that described terminal is from line activating one or many
Individual unauthorized carrier wave includes:
When the scheduled time before described terminal challenge to described resource moment, described terminal swashs voluntarily
The one or more unauthorized carrier wave alive, wherein, the described scheduled time is activated described more than described terminal
Time needed for one or more unauthorized carrier waves.
7. an activation device for unauthorized carrier wave, is positioned at end side, it is characterised in that include:
Active module, is used for during terminal starts the resource contention of one or more unauthorized carrier wave,
From the one or more unauthorized carrier wave of line activating, wherein, described resource contention process includes: described
The process of resource described in the process of the time to be specified such as terminal and described terminal challenge, the described appointment time is
Described terminal uses in upper once resource and terminates to start to compete the interval time of described resource to described terminal.
8. device according to claim 7, it is characterised in that described active module includes:
First activation unit, for after described terminal challenge to described resource, from line activating one
Or multiple unauthorized carrier wave.
9. device according to claim 8, it is characterised in that
Described first activation unit, is additionally operable to described terminal after waiting described interval time, has detected
When can be used for the idle channel sending data, from the one or more unauthorized carrier wave of line activating.
10. device according to claim 7, it is characterised in that described active module includes:
Second activation unit, for when the described appointment time starts, from line activating the one or more
Unauthorized carrier wave.
11. devices according to claim 7, it is characterised in that described active module includes:
3rd activation unit, at the end of the described appointment time, from line activating the one or more
Unauthorized carrier wave.
12. devices according to claim 7, it is characterised in that described active module includes:
4th activation unit, in the scheduled time before described terminal challenge to described resource moment
When, from the one or more unauthorized carrier wave of line activating, wherein, the described scheduled time is more than described end
End activates the one or more time needed for unauthorized carrier wave.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510076616.1A CN105992386A (en) | 2015-02-12 | 2015-02-12 | Method and device for activating unauthorized carriers |
PCT/CN2015/091293 WO2016127657A1 (en) | 2015-02-12 | 2015-09-30 | Unlicensed-carrier activation method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510076616.1A CN105992386A (en) | 2015-02-12 | 2015-02-12 | Method and device for activating unauthorized carriers |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105992386A true CN105992386A (en) | 2016-10-05 |
Family
ID=56615197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510076616.1A Withdrawn CN105992386A (en) | 2015-02-12 | 2015-02-12 | Method and device for activating unauthorized carriers |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105992386A (en) |
WO (1) | WO2016127657A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109699084A (en) * | 2017-10-20 | 2019-04-30 | 维沃移动通信有限公司 | Information transferring method, terminal and the network equipment under unauthorized frequency range |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018103020A1 (en) * | 2016-12-07 | 2018-06-14 | 华为技术有限公司 | Uplink data transmission method and apparatus |
CN108616880B (en) * | 2017-01-17 | 2022-07-29 | 中兴通讯股份有限公司 | Data transmission method, device and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102238522A (en) * | 2010-04-30 | 2011-11-09 | 索尼公司 | Method, base station, terminal and communication system for updating component carrier |
CN102612088A (en) * | 2011-01-18 | 2012-07-25 | 华为技术有限公司 | Communication method, system and base station based on carrier converging technology in heterogeneous network |
WO2012106843A1 (en) * | 2011-02-11 | 2012-08-16 | Renesas Mobile Corporation | Signaling method to enable controlled tx deferring in mixed licensed and unlicensed spectrum carrier aggregation in future lte-a networks |
CN104244431A (en) * | 2013-06-24 | 2014-12-24 | 电信科学技术研究院 | Transmission scheduling method and device in cognitive radio system |
CN104285418A (en) * | 2012-03-15 | 2015-01-14 | 诺基亚通信公司 | Configuration of carrier-related reference signal transmission |
CN104301273A (en) * | 2014-08-25 | 2015-01-21 | 中兴通讯股份有限公司 | Method and base station for transmitting and receiving signals by using unauthorized carrier waves and user equipment |
CN105992318A (en) * | 2015-02-11 | 2016-10-05 | 中兴通讯股份有限公司 | Management method of deactivation timer and terminal thereof |
-
2015
- 2015-02-12 CN CN201510076616.1A patent/CN105992386A/en not_active Withdrawn
- 2015-09-30 WO PCT/CN2015/091293 patent/WO2016127657A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102238522A (en) * | 2010-04-30 | 2011-11-09 | 索尼公司 | Method, base station, terminal and communication system for updating component carrier |
CN102612088A (en) * | 2011-01-18 | 2012-07-25 | 华为技术有限公司 | Communication method, system and base station based on carrier converging technology in heterogeneous network |
WO2012106843A1 (en) * | 2011-02-11 | 2012-08-16 | Renesas Mobile Corporation | Signaling method to enable controlled tx deferring in mixed licensed and unlicensed spectrum carrier aggregation in future lte-a networks |
CN104285418A (en) * | 2012-03-15 | 2015-01-14 | 诺基亚通信公司 | Configuration of carrier-related reference signal transmission |
CN104244431A (en) * | 2013-06-24 | 2014-12-24 | 电信科学技术研究院 | Transmission scheduling method and device in cognitive radio system |
CN104301273A (en) * | 2014-08-25 | 2015-01-21 | 中兴通讯股份有限公司 | Method and base station for transmitting and receiving signals by using unauthorized carrier waves and user equipment |
CN105992318A (en) * | 2015-02-11 | 2016-10-05 | 中兴通讯股份有限公司 | Management method of deactivation timer and terminal thereof |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109699084A (en) * | 2017-10-20 | 2019-04-30 | 维沃移动通信有限公司 | Information transferring method, terminal and the network equipment under unauthorized frequency range |
Also Published As
Publication number | Publication date |
---|---|
WO2016127657A1 (en) | 2016-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102303964B1 (en) | Method and apparatus for managing bandwidth portions | |
US11184058B2 (en) | Enhanced acknowledgment and power saving for wireless communications | |
JP7478751B2 (en) | User Equipment for Monitoring Downlink Control Channel - Patent application | |
US20160337975A1 (en) | Channel monitoring method and device | |
KR20190134063A (en) | Method and apparatus for reducing power consumption of a terminal in a wireless communication system | |
JP2018511970A (en) | Data transmission method and apparatus in TDD system | |
WO2016177137A1 (en) | Data transmission method and device | |
CN105992386A (en) | Method and device for activating unauthorized carriers | |
CN113475113A (en) | Method and apparatus for processing multiple active BWPs | |
EP3745810B1 (en) | Methods and apparatuses for determining transmission path of packet in wireless communication | |
US11622365B1 (en) | On-off transient power time mask at a UE supporting full-duplex GNB operation | |
CN103874221A (en) | Resource scheduling method and apparatus | |
CN115399054A (en) | Discontinuous reception during early data transfer | |
KR20200107796A (en) | Method and apparatus for configuring bandwidth part in sidelink communication | |
CN114303414A (en) | Method for scheduling under inactive condition in sidelink unicast | |
WO2024093903A1 (en) | Communication method and apparatus, and system and storage medium | |
US20230292321A1 (en) | Techniques for reducing latency of data in the presence of scheduled uplink transmissions | |
WO2023245405A1 (en) | Sidelink communication using fixed frame periods | |
US20240147521A1 (en) | Techniques for transmitting discovery bursts using full duplex operations | |
WO2024026586A1 (en) | Adaptive jitter indication via a wakeup signal | |
US20230362981A1 (en) | Signaling for channel access using multi-beam sensing | |
US20230362820A1 (en) | Bandwidth part (bwp) dynamic adaptation in accordance with an energy level at a user equipment (ue) | |
WO2024059446A1 (en) | Concurrent code division and frequency division signaling via an uplink channel | |
WO2024030208A1 (en) | Adaptation of a first available resource block and resource block group size for full-duplex communications | |
WO2024030809A1 (en) | Downlink pre-emption and uplink cancellation for full-duplex systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161005 |