CN105992386A - Method and device for activating unauthorized carriers - Google Patents

Method and device for activating unauthorized carriers Download PDF

Info

Publication number
CN105992386A
CN105992386A CN201510076616.1A CN201510076616A CN105992386A CN 105992386 A CN105992386 A CN 105992386A CN 201510076616 A CN201510076616 A CN 201510076616A CN 105992386 A CN105992386 A CN 105992386A
Authority
CN
China
Prior art keywords
terminal
carrier wave
unauthorized carrier
resource
line activating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510076616.1A
Other languages
Chinese (zh)
Inventor
陈中明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510076616.1A priority Critical patent/CN105992386A/en
Priority to PCT/CN2015/091293 priority patent/WO2016127657A1/en
Publication of CN105992386A publication Critical patent/CN105992386A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method and a device for activating unauthorized carriers. The method comprises steps: during a one or more unauthorized carrier resource competition starting process in a terminal, the terminal voluntarily activates the one or more unauthorized carriers. The resource competition process comprises a specified time waiting process by the terminal and a resource competition process by the terminal, and the specified time is interval time between end of last resource usage by the terminal and starting of resource competition by the terminal. Thus, the problem that the terminal consumes a long time from receiving an activating order to entering an activating state in a related technology can be solved, and the terminal can use the competed resources to the most extent.

Description

The Activiation method of unauthorized carrier wave and device
Technical field
The present invention relates to the communications field, in particular to Activiation method and the dress of a kind of unauthorized carrier wave Put.
Background technology
It in Long Term Evolution (Long Term Evolution, referred to as LTE) system, is in the terminal of connected state, Can only be communicated with base station by an i.e. carrier wave of Serving cell.For providing higher data to mobile subscriber Speed, advanced long-term evolution system (Long Term Evolution Advance, referred to as LTE-A) proposes Carrier aggregation technology (Carrier Aggregation, referred to as CA), its objective is as having respective capabilities User equipment (UE) bigger broadband is provided, improve the peak rate of UE.In LTE, system is supported The big a width of 20MHz of downstream transmission, carrier aggregation is by the component carrier (Component of two or more Carriers, referred to as CC) it is aggregating support more than 20MHz, the maximum transmission less than 100MHz Bandwidth.There is the LTE-A UE of carrier aggregation capacity, can simultaneously transceiving data on multiple component carriers. In lte-a system, terminal can pass through multiple component carriers (such as CC1, CC2) after entering connected state simultaneously Communicating with source base station, base station can be that UE specifies a master by explicit configuration or according to protocol conventions Component carrier (Primary Component Carrier, referred to as PCC), other component carrier is referred to as auxiliary Component carrier (Secondary Component Carrier, referred to as SCC), the Serving cell on PCC Being referred to as main Serving cell (Primary Cell, referred to as Pcell), the Serving cell on SCC is referred to as auxiliary clothes Business cell (Secondary Cell, referred to as Scell).
The burst feature of consideration business, although UE is operated in flank speed at most may use up to 5 carrier waves Bandwidth, but in burst gap, the practical business flow of UE is seldom or close to zero, if now UE also continues to the data to be received such as over a number of carriers, it will cause higher power overhead.In order to extend The working time of UE, the wireless transmission closing unnecessary unlatching receives equipment, reduces unnecessary battery consumption, Lte-a system introduces the concept that carrier activation deactivates.UE only connects in the carrier wave enterprising row data activating Receiving and sending, such as Physical Downlink Control Channel, (Physical Downlink Control Channel is referred to as PDCCH) monitoring;And for temporary transient no carrier wave, base station is notified by implicit commands or implicit rule Deactivating these carrier waves, on the carrier wave deactivating, UE is not listening to PDCCH channel, does not also receive physics Data on DSCH Downlink Shared Channel (Physical Downlink Shared Channel, referred to as PDSCH), Do not send upstream data, thus reach the purpose of power saving yet.PCell is deactivated by base station never, SCell Can be activated deactivation neatly, the activation of Scell is that base station notifies terminal by MAC CE, eventually End at least needs 8ms, even 24ms from receiving activation command to entrance state of activation, the time of 34ms.
With the quick growth of data service, in the near future, frequency spectrum is authorized can not to bear so huge Data volume;So LTE operator considers to dispose in unlicensed spectrum resource (Unlicensed Carrier) LTE, shares, by unlicensed spectrum, the data traffic authorizing in carrier wave.Unauthorized carrier wave (exempts to authorize frequency spectrum) Refer under meeting government department (e.g., State Radio Regulatory Commission) pertinent regulations (radio control), Do not need to authorize the frequency spectrum (or carrier wave) that just can directly use.For example, micro-wave oven, remote toy aircraft, nothing Line Mouse, Wireless Keyboard, high-fidelity wireless Internet access (Wireless Fidelity, referred to as WiFi) etc. all use Unauthorized carrier wave.In other instances, unauthorized carrier wave needs could be used by competition.If base station (including WiFi access point), resource was not arrived in competition, then can not use unauthorized carrier wave.Fig. 1 is related skill In art unauthorized carrier resource competition and use time chart, as it is shown in figure 1, be one from T2 to T5 Individual complete resource contention and use process, after upper once resource uses and terminates, terminal needs etc. to be specified Time, referred to as interval time, T2 to T3, after interval time terminates, terminal proceeds by resource contention, T3 To T4, being the resource contention time, resource contention terminates, and the terminal of competition to resource can begin to use resource, T4 to T5, is the time of the terminal use resource that resource is arrived in competition, and the resource competed uses after terminating, under One process restarts.Wherein, T2 to T3, can be 0, it is also possible to be not 0.
If enabling unauthorized carrier wave, control information is still sent by authorizing carrier wave, i.e. PCell still authorizes Carrier wave, unauthorized carrier wave can be as Scell, and in order to distinguish, we are referred to as U-Scell.So U-Scell Activation, if also needing to 8ms, even 24ms, 34ms, then competition arrive resource major part use Have activated, even connect activation and also do not complete just without wasting very much.
For terminal in correlation technique from receiving the problem that activation command is time-consumingly grown to entrance state of activation, at present Effective solution is not yet proposed.
Content of the invention
Present invention is primarily targeted at Activiation method and the device that a kind of unauthorized carrier wave is provided, at least to solve Certainly in correlation technique terminal from receiving activation command to entering the problem that state of activation is time-consumingly grown.
According to an aspect of the invention, it is provided the Activiation method of a kind of unauthorized carrier wave, also include: at end During end starts the resource contention of one or more unauthorized carrier wave, described terminal is from line activating one Or multiple unauthorized carrier wave, wherein, described resource contention process includes: the time to be specified such as described terminal The process of resource described in process and described terminal challenge, the described appointment time is that described terminal is in upper once resource Use and terminate to start to compete the interval time of described resource to described terminal.
Further, described terminal includes from the one or more unauthorized carrier wave of line activating: at described end After described resource is arrived in end competition, described terminal is from the one or more unauthorized carrier wave of line activating.
Further, after described terminal challenge to described resource, described terminal from line activating one or Multiple unauthorized carrier waves include: described terminal, after waiting described interval time, has detected and can be used for sending During the idle channel of data, described terminal is from the one or more unauthorized carrier wave of line activating.
Further, described terminal includes from the one or more unauthorized carrier wave of line activating: at described finger Fix time beginning when, described terminal is from the one or more unauthorized carrier wave of line activating.
Further, start the resource contention of one or more unauthorized carrier wave in terminal during, described end End includes from the one or more unauthorized carrier wave of line activating: at the end of the described appointment time, described end End is from the one or more unauthorized carrier wave of line activating.
Further, described terminal includes from the one or more unauthorized carrier wave of line activating: from described When terminal challenge is to scheduled time before the described resource moment, described terminal is from line activating one or many Individual unauthorized carrier wave, wherein, it is unauthorized that the described scheduled time activates the one or more more than described terminal Time needed for carrier wave.
According to another aspect of the present invention, provide the activation device of a kind of unauthorized carrier wave, be positioned at end side, Including: active module, it is used for during terminal starts the resource contention of one or more unauthorized carrier wave, From the one or more unauthorized carrier wave of line activating, wherein, described resource contention process includes: described end The process of resource described in the process of the times to be specified such as end and described terminal challenge, the described appointment time is described Terminal uses in upper once resource and terminates to start to compete the interval time of described resource to described terminal.
Further, described active module includes: the first activation unit, is used in described terminal challenge to institute After stating resource, from the one or more unauthorized carrier wave of line activating.
Further, described first activation unit, is additionally operable to described terminal after waiting described interval time, When the idle channel that can be used for sending data being detected, from the one or more unauthorized load of line activating Ripple.
Further, described active module includes: the second activation unit, for starting in the described appointment time When, from the one or more unauthorized carrier wave of line activating.
Further, described active module includes: the 3rd activation unit, for terminating in the described appointment time When, from the one or more unauthorized carrier wave of line activating.
Further, described active module includes: the 4th activation unit, for arriving from described terminal challenge During scheduled time before the described resource moment, from the one or more unauthorized carrier wave of line activating, wherein, The described scheduled time activates the one or more time needed for unauthorized carrier wave more than described terminal.
By the present invention, in the competition process starting one or more unauthorized carrier resource, terminal swashs voluntarily One or more unauthorized carrier waves alive, when this terminal challenge resource success, can be directly by competing the money that arrive Source sends data, or notice base station is carried out dispatch terminal by base station and sent data by the resource competed, and passes through Which, solves terminal in correlation technique from receiving activation command to entering the problem that state of activation is time-consumingly grown, So that terminal at utmost utilizes the resource that competition is arrived.
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, The schematic description and description of the present invention is used for explaining the present invention, is not intended that the improper limit to the present invention Fixed.In the accompanying drawings:
Fig. 1 is competition and the use time chart of unauthorized carrier resource in correlation technique;
Fig. 2 is the Activiation method flow chart of unauthorized carrier wave according to embodiments of the present invention;
Fig. 3 a~3d is the activation apparatus structure block diagram of unauthorized carrier wave according to embodiments of the present invention;And
Fig. 4 is the Activiation method flow chart of the unauthorized carrier wave according to alternative embodiment of the present invention.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the application and the feature in embodiment Can be mutually combined.Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Functional overview, the present invention relates to the competition process of unauthorized carrier resource, and this process includes: (1) A large amount of downlink data is had to need to send in base station discovery terminal, when current area does not has too many resource to use; Need to notify terminal, seize the resource of unauthorized carrier wave, or have a large amount of upstream data to need to send out in discovery terminal When sending, need preempting resources, notify that base station is carrying out resource and seizing simultaneously;(2) terminal starts unauthorized load Resource contention process on ripple, in this process, terminal can from the unauthorized carrier wave of line activating;(3) terminal is competing Striving resource, notifying that base station, base station schedules terminals, or terminal are sent by described resource voluntarily needs to send Data.Below in conjunction with embodiments of the invention, the present invention is illustrated;
Present embodiments providing the Activiation method of a kind of unauthorized carrier wave, Fig. 2 is according to embodiments of the present invention non- Authorize the Activiation method flow chart of carrier wave, as in figure 2 it is shown, the step of the method includes:
Step S202: when terminal has a large amount of downlink data or a large amount of upstream data sends, base station notifies terminal Remove competitive resource or terminal competitive resource voluntarily and notify base station;
Step S204: during terminal starts the resource contention of one or more unauthorized carrier wave, terminal is certainly The one or more unauthorized carrier wave of line activating;
Wherein, resource contention process includes: the process of the time to be specified such as terminal and the process of terminal challenge resource, The appointment time is that terminal uses, in upper once resource, the interval time terminating to terminal to start competitive resource.
Step S206: terminal sends data by this one or more unauthorized carrier waves.
By the present embodiment, in the competition process starting one or more unauthorized carrier resource, terminal is voluntarily Activate one or more unauthorized carrier wave, when this terminal challenge resource success, can directly be arrived by competition Resource sends data, or notice base station is carried out dispatch terminal by base station and sent data by the resource competed, logical Cross which, solve terminal in correlation technique from receiving activation command to entering the problem that state of activation is time-consumingly grown, So that terminal at utmost utilizes the resource that competition is arrived.
It should be noted that for the appointment time relating in the present embodiment according to actual conditions can be zero or There is certain stand-by period.
The process starting the competition of one or more unauthorized carrier resource relating to due to the present embodiment includes: eventually The process of the times to be specified such as end and the process of terminal challenge resource, it is intended that the time is that terminal makes in upper once resource With terminating to terminal to start the interval time of competitive resource, therefore, for terminal in the present embodiment from line activating one Individual or multiple unauthorized carrier method, which is entered by the several optional embodiment below in conjunction with the present embodiment Row illustrates;
Optional embodiment one: after terminal challenge to resource, i.e. terminal, after waiting interval time, detect When having the idle channel that can be used for sending data, terminal is from the one or more unauthorized carrier wave of line activating.
Optional embodiment two: when reaching the appointment time, terminal is from the one or more unauthorized carrier wave of line activating.
Optional embodiment three: at the end of at the appointed time, terminal is from the one or more unauthorized carrier wave of line activating.
Optional embodiment four: when estimating that the scheduled time before the resource moment is arrived in competition from terminal, terminal is certainly The one or more unauthorized carrier wave of line activating, wherein, the scheduled time is activated one or more unauthorized more than terminal Time needed for carrier wave.Wherein, this scheduled time is on the premise of more than the required time, can be as required It is adjusted correspondingly.
It should be noted that the optional embodiment of aforementioned four is not intended that limitation of the invention, starting one Or other moment during the competition of multiple unauthorized carrier resource, terminal also can be from line activating as required This one or more unauthorized carrier waves;
Additionally providing the activation device of a kind of unauthorized carrier wave in the present embodiment, this device is used for realizing above-mentioned reality Execute example and optional embodiment, carry out repeating no more of explanation.As used below, term " mould Block " " unit " can realize the software of predetermined function and/or the combination of hardware.Although described by following example Device preferably realize with software, but hardware, or the realization of the combination of software and hardware is also possible And be contemplated.
Fig. 3 a~3d is the activation apparatus structure block diagram of unauthorized carrier wave according to embodiments of the present invention, this device position In end side, this device includes: active module 32, for starting one or more unauthorized carrier wave in terminal Resource contention during, from the one or more unauthorized carrier wave of line activating, wherein, resource contention process includes: The process of the time to be specified such as terminal and the process of terminal challenge resource, it is intended that the time is that terminal is in upper once resource Use the interval time terminating to terminal to start competitive resource.
As shown in Figure 3 a, this active module 32 includes: the first activation unit 322, for arriving in terminal challenge After resource, from the one or more unauthorized carrier wave of line activating.
Alternatively, this first activation unit 322, is additionally operable to terminal and is waiting after interval time, and having detected can During for sending the idle channel of data, from the one or more unauthorized carrier wave of line activating.
As shown in Figure 3 b, this active module 32 includes: the second activation unit 324, for when reaching appointment Between when, from the one or more unauthorized carrier wave of line activating.
As shown in Figure 3 c, this active module 32 includes: the 3rd activation unit 326, at the appointed time tying Shu Shi, from the one or more unauthorized carrier wave of line activating.
As shown in Figure 3 d, active module 32 includes: the 4th activation unit 328, for arriving from terminal challenge During scheduled time before the resource moment, from the one or more unauthorized carrier wave of line activating, wherein, the scheduled time Activate the time needed for one or more unauthorized carrier wave more than terminal.
Below in conjunction with alternative embodiment of the present invention, the present invention is illustrated;
This alternative embodiment provides the Activiation method of a kind of unauthorized carrier wave, and the implementation of the method includes:
Mode one: terminal is from line activating after getting resource, i.e. terminal detects after waiting interval time that channel is empty In the spare time, data can be sent, then from this unauthorized carrier wave of line activating
Mode two: terminal is carrying out being carried out activation when resource is seized, i.e. terminal has DSR The notice sending or receiving base station is needed to need competitive resource, when starting waiting for interval time, from line activating This unauthorized carrier wave, detects that after interval time channel status is idle, then send data at once.
Mode three: terminal is carrying out being carried out activation when resource is seized, i.e. terminal has DSR Needing to send or receive the notice of base station needs competitive resource, after waiting and terminating interval time, from line activating This unauthorized carrier wave, detects that after interval time channel status is idle, then send data at once.
Mode four: terminal ensures that the very first time sends data when getting resource, and terminal decides activation in its sole discretion, and this is non- Authorize the moment of carrier wave, such as need 4ms from line activating, then just push away forward 4ms in the time getting resource From line activating.
Before this, terminal is carried out competitive resource, notify after terminal preempting resources that eNB resource can be used, eNB Dispatch terminal again.
Fig. 4 is the Activiation method flow chart of the unauthorized carrier wave according to alternative embodiment of the present invention, as shown in Figure 4, The step of the method includes:
Step S402: terminal initiates wireless heterogeneous networks (Radio Resource in authorizing carrier cell Control is referred to as RRC) connection establishment process, and enter connected state.
Step S404: due to the increase of portfolio, base station is configured with unauthorized carrier wave to terminal, and terminal is by non- Authorizing carrier wave and cell to carry out carrier aggregation, unauthorized carrier wave is in deactivation status.
Step S406: base station discovery terminal has a large amount of downlink data to need to send, and current area does not provide too much Source can use, and therefore notifies terminal, needs to seize the resource of unauthorized carrier wave, can comprise needs and seize money The information in source, such as holding time, occupied bandwidth etc.;
Or terminal is found to have a large amount of upstream data to be needed to send, and needs preempting resources, is notifying base station simultaneously Carry out resource to seize, the information needing preempting resources, such as holding time, occupied bandwidth etc. can be comprised;
Step S408: the resource contention process on the unauthorized carrier wave of terminal startup, in this process, in conjunction with Fig. 1, terminal includes from the mode of the unauthorized carrier wave of line activating:
Optional example one:
1) the T2 moment, terminal initially enters the wait appointed interval time;
2) in the T3 moment, it is intended that interval time terminates, terminal proceeds by the competition process of resource;
3) the T4 moment, competition process terminates, the success of terminal preempting resources, can carry out data transmission, voluntarily Activating unauthorized carrier wave, if terminal does not compete resource, then unauthorized carrier wave continues to keep deactivation status;
Optional example two:
1) the T2 moment, terminal initially enters the wait appointed interval time, from the unauthorized carrier wave of line activating;
2) in the T3 moment, it is intended that interval time terminates, terminal proceeds by the competition process of resource;
3) the T4 moment, competition process terminates, the success of terminal preempting resources, if terminal does not compete resource, Then deactivate unauthorized carrier wave voluntarily;
Optional example three:
1) the T2 moment, terminal initially enters the wait appointed interval time;
2) in the T3 moment, it is intended that interval time terminates, terminal proceeds by the competition process of resource, from line activating Unauthorized carrier wave;
3) the T4 moment, competition process terminates, the success of terminal preempting resources, if terminal does not compete resource, Then deactivate unauthorized carrier wave voluntarily;
Optional example four:
Terminal needs the time of 4ms from the unauthorized carrier wave of line activating, if the unauthorized carrier wave of terminal discovery is not yet Activating, the terminal judges distance T4 moment also has 4ms, from the unauthorized carrier wave of line activating;It should be noted that This 4ms can be able to change according to time state, or can be pre-configured with;
1) the T2 moment, terminal initially enters the wait appointed interval time, if the unauthorized carrier wave of terminal discovery is still Un-activation, the terminal judges distance T4 moment also has 4ms, from the unauthorized carrier wave of line activating;
2) in the T3 moment, it is intended that interval time terminates, terminal proceeds by the competition process of resource, if terminal Finding that unauthorized carrier wave not yet activates, the terminal judges distance T4 moment also has 4ms, from the unauthorized load of line activating Ripple;
3) the T4 moment, competition process terminates, the success of terminal preempting resources, if terminal does not compete resource, Then deactivate unauthorized carrier wave voluntarily;
Step S410: terminal challenge to resource, notifies base station, can comprise the time letter of the resource competed Breath, bandwidth information etc.;
Step S412: terminal is scheduling by base station;
Step S414: terminal is robbed after the resource that accounts for uses and finish, and calculates activationary time next time such as right In mode one, next activationary time is the T4 moment, if it exceeds appointed threshold (such as 10ms, Ke Yimo Recognize or configure) just deactivate unauthorized carrier wave, by the time next activation T4 on opportunity is to reactivation, if not Exceed appointed threshold (such as 10ms can give tacit consent to or configure), then keep unauthorized carrier activation state. Other modes by that analogy, are not repeated to describe.
By in this alternative embodiment, use the mode from the unauthorized carrier wave of line activating for the terminal, thus relative to phase Mode in the technology of pass, can the resource competed of more good utilisation.
In another embodiment, additionally providing a kind of software, this software is used for performing above-described embodiment and excellent Select the technical scheme described in embodiment.
In another embodiment, additionally provide a kind of storage medium, this storage medium is stored with above-mentioned soft Part, this storage medium includes but is not limited to: CD, floppy disk, hard disk, scratch pad memory etc..
Obviously, those skilled in the art should be understood that each module of the invention described above or each step can be used logical Computing device realize, they can concentrate in single computing device, or is distributed in multiple calculating On the network that device is formed, alternatively, they can be realized by the executable program code of computing device, It is thus possible to be stored in storage device is performed by computing device, and in some cases, can Perform shown or described step with the order to be different from herein, or they are fabricated to respectively each collection Become circuit module, or the multiple module in them or step are fabricated to single integrated circuit module realize. So, the present invention is not restricted to the combination of any specific hardware and software.
Above are only the alternative embodiment of the present invention, be not limited to the present invention, for this area For technical staff, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, Any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (12)

1. the Activiation method of a unauthorized carrier wave, it is characterised in that also include:
During terminal starts the resource contention of one or more unauthorized carrier wave, described terminal swashs voluntarily The one or more unauthorized carrier wave alive, wherein, described resource contention process includes: described terminal etc. The process of resource described in the process of time to be specified and described terminal challenge, the described appointment time is described end End uses in upper once resource and terminates to start to compete the interval time of described resource to described terminal.
2. method according to claim 1, it is characterised in that described terminal is from line activating one or many Individual unauthorized carrier wave includes:
After described terminal challenge to described resource, from line activating, the one or more non-awards described terminal Power carrier wave.
3. method according to claim 2, it is characterised in that after described terminal challenge to described resource, Described terminal includes from the one or more unauthorized carrier wave of line activating:
Described terminal, after waiting described interval time, detects the idle channel that can be used for sending data When, described terminal is from the one or more unauthorized carrier wave of line activating.
4. method according to claim 1, it is characterised in that described terminal is from line activating one or many Individual unauthorized carrier wave includes:
When the described appointment time starts, described terminal is from the one or more unauthorized carrier wave of line activating.
5. method according to claim 1, it is characterised in that start one or more unauthorized load in terminal During the resource contention of ripple, described terminal includes from the one or more unauthorized carrier wave of line activating:
At the end of the described appointment time, described terminal is from the one or more unauthorized carrier wave of line activating.
6. method according to claim 1, it is characterised in that described terminal is from line activating one or many Individual unauthorized carrier wave includes:
When the scheduled time before described terminal challenge to described resource moment, described terminal swashs voluntarily The one or more unauthorized carrier wave alive, wherein, the described scheduled time is activated described more than described terminal Time needed for one or more unauthorized carrier waves.
7. an activation device for unauthorized carrier wave, is positioned at end side, it is characterised in that include:
Active module, is used for during terminal starts the resource contention of one or more unauthorized carrier wave, From the one or more unauthorized carrier wave of line activating, wherein, described resource contention process includes: described The process of resource described in the process of the time to be specified such as terminal and described terminal challenge, the described appointment time is Described terminal uses in upper once resource and terminates to start to compete the interval time of described resource to described terminal.
8. device according to claim 7, it is characterised in that described active module includes:
First activation unit, for after described terminal challenge to described resource, from line activating one Or multiple unauthorized carrier wave.
9. device according to claim 8, it is characterised in that
Described first activation unit, is additionally operable to described terminal after waiting described interval time, has detected When can be used for the idle channel sending data, from the one or more unauthorized carrier wave of line activating.
10. device according to claim 7, it is characterised in that described active module includes:
Second activation unit, for when the described appointment time starts, from line activating the one or more Unauthorized carrier wave.
11. devices according to claim 7, it is characterised in that described active module includes:
3rd activation unit, at the end of the described appointment time, from line activating the one or more Unauthorized carrier wave.
12. devices according to claim 7, it is characterised in that described active module includes:
4th activation unit, in the scheduled time before described terminal challenge to described resource moment When, from the one or more unauthorized carrier wave of line activating, wherein, the described scheduled time is more than described end End activates the one or more time needed for unauthorized carrier wave.
CN201510076616.1A 2015-02-12 2015-02-12 Method and device for activating unauthorized carriers Withdrawn CN105992386A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510076616.1A CN105992386A (en) 2015-02-12 2015-02-12 Method and device for activating unauthorized carriers
PCT/CN2015/091293 WO2016127657A1 (en) 2015-02-12 2015-09-30 Unlicensed-carrier activation method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510076616.1A CN105992386A (en) 2015-02-12 2015-02-12 Method and device for activating unauthorized carriers

Publications (1)

Publication Number Publication Date
CN105992386A true CN105992386A (en) 2016-10-05

Family

ID=56615197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510076616.1A Withdrawn CN105992386A (en) 2015-02-12 2015-02-12 Method and device for activating unauthorized carriers

Country Status (2)

Country Link
CN (1) CN105992386A (en)
WO (1) WO2016127657A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109699084A (en) * 2017-10-20 2019-04-30 维沃移动通信有限公司 Information transferring method, terminal and the network equipment under unauthorized frequency range

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018103020A1 (en) * 2016-12-07 2018-06-14 华为技术有限公司 Uplink data transmission method and apparatus
CN108616880B (en) * 2017-01-17 2022-07-29 中兴通讯股份有限公司 Data transmission method, device and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238522A (en) * 2010-04-30 2011-11-09 索尼公司 Method, base station, terminal and communication system for updating component carrier
CN102612088A (en) * 2011-01-18 2012-07-25 华为技术有限公司 Communication method, system and base station based on carrier converging technology in heterogeneous network
WO2012106843A1 (en) * 2011-02-11 2012-08-16 Renesas Mobile Corporation Signaling method to enable controlled tx deferring in mixed licensed and unlicensed spectrum carrier aggregation in future lte-a networks
CN104244431A (en) * 2013-06-24 2014-12-24 电信科学技术研究院 Transmission scheduling method and device in cognitive radio system
CN104285418A (en) * 2012-03-15 2015-01-14 诺基亚通信公司 Configuration of carrier-related reference signal transmission
CN104301273A (en) * 2014-08-25 2015-01-21 中兴通讯股份有限公司 Method and base station for transmitting and receiving signals by using unauthorized carrier waves and user equipment
CN105992318A (en) * 2015-02-11 2016-10-05 中兴通讯股份有限公司 Management method of deactivation timer and terminal thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238522A (en) * 2010-04-30 2011-11-09 索尼公司 Method, base station, terminal and communication system for updating component carrier
CN102612088A (en) * 2011-01-18 2012-07-25 华为技术有限公司 Communication method, system and base station based on carrier converging technology in heterogeneous network
WO2012106843A1 (en) * 2011-02-11 2012-08-16 Renesas Mobile Corporation Signaling method to enable controlled tx deferring in mixed licensed and unlicensed spectrum carrier aggregation in future lte-a networks
CN104285418A (en) * 2012-03-15 2015-01-14 诺基亚通信公司 Configuration of carrier-related reference signal transmission
CN104244431A (en) * 2013-06-24 2014-12-24 电信科学技术研究院 Transmission scheduling method and device in cognitive radio system
CN104301273A (en) * 2014-08-25 2015-01-21 中兴通讯股份有限公司 Method and base station for transmitting and receiving signals by using unauthorized carrier waves and user equipment
CN105992318A (en) * 2015-02-11 2016-10-05 中兴通讯股份有限公司 Management method of deactivation timer and terminal thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109699084A (en) * 2017-10-20 2019-04-30 维沃移动通信有限公司 Information transferring method, terminal and the network equipment under unauthorized frequency range

Also Published As

Publication number Publication date
WO2016127657A1 (en) 2016-08-18

Similar Documents

Publication Publication Date Title
KR102303964B1 (en) Method and apparatus for managing bandwidth portions
US11184058B2 (en) Enhanced acknowledgment and power saving for wireless communications
JP7478751B2 (en) User Equipment for Monitoring Downlink Control Channel - Patent application
US20160337975A1 (en) Channel monitoring method and device
KR20190134063A (en) Method and apparatus for reducing power consumption of a terminal in a wireless communication system
JP2018511970A (en) Data transmission method and apparatus in TDD system
WO2016177137A1 (en) Data transmission method and device
CN105992386A (en) Method and device for activating unauthorized carriers
CN113475113A (en) Method and apparatus for processing multiple active BWPs
EP3745810B1 (en) Methods and apparatuses for determining transmission path of packet in wireless communication
US11622365B1 (en) On-off transient power time mask at a UE supporting full-duplex GNB operation
CN103874221A (en) Resource scheduling method and apparatus
CN115399054A (en) Discontinuous reception during early data transfer
KR20200107796A (en) Method and apparatus for configuring bandwidth part in sidelink communication
CN114303414A (en) Method for scheduling under inactive condition in sidelink unicast
WO2024093903A1 (en) Communication method and apparatus, and system and storage medium
US20230292321A1 (en) Techniques for reducing latency of data in the presence of scheduled uplink transmissions
WO2023245405A1 (en) Sidelink communication using fixed frame periods
US20240147521A1 (en) Techniques for transmitting discovery bursts using full duplex operations
WO2024026586A1 (en) Adaptive jitter indication via a wakeup signal
US20230362981A1 (en) Signaling for channel access using multi-beam sensing
US20230362820A1 (en) Bandwidth part (bwp) dynamic adaptation in accordance with an energy level at a user equipment (ue)
WO2024059446A1 (en) Concurrent code division and frequency division signaling via an uplink channel
WO2024030208A1 (en) Adaptation of a first available resource block and resource block group size for full-duplex communications
WO2024030809A1 (en) Downlink pre-emption and uplink cancellation for full-duplex systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20161005