CN106559908A - A kind of method and apparatus for realizing listem-before-talk - Google Patents

A kind of method and apparatus for realizing listem-before-talk Download PDF

Info

Publication number
CN106559908A
CN106559908A CN201510622254.1A CN201510622254A CN106559908A CN 106559908 A CN106559908 A CN 106559908A CN 201510622254 A CN201510622254 A CN 201510622254A CN 106559908 A CN106559908 A CN 106559908A
Authority
CN
China
Prior art keywords
carrier wave
cca
idle
unauthorized carrier
equal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510622254.1A
Other languages
Chinese (zh)
Other versions
CN106559908B (en
Inventor
苟伟
毕峰
赵亚军
杨玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510622254.1A priority Critical patent/CN106559908B/en
Priority to CN202011298719.XA priority patent/CN112584359A/en
Priority to PCT/CN2016/094962 priority patent/WO2017050060A1/en
Publication of CN106559908A publication Critical patent/CN106559908A/en
Application granted granted Critical
Publication of CN106559908B publication Critical patent/CN106559908B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0219Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave where the power saving management affects multiple terminals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method and apparatus for realizing listem-before-talk, including:Whether website detects unauthorized carrier wave idle in the specified CCA time slots in initial idle channel estimating CCA stages;If it is not, then producing random back value;Then website detects whether unauthorized carrier wave is idle in the first delay cycle, if it is, continuing executing with the step of whether judging random back value equal to 0;Wherein, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n is the integer more than or equal to 1, and k is the integer more than or equal to 0, and when n is equal to 1, k is equal to 1.By the solution of the present invention, website is detecting unauthorized carrier wave free time in the first delay cycle, just performs the step of whether judging random back value equal to 0, as the first delay cycle is 34 μ s when n is equal to 1, this improves the fairness with WiFi system competition.

Description

A kind of method and apparatus for realizing listem-before-talk
Technical field
The present invention relates to unauthorized carrier wave field, espespecially one kind realizes listem-before-talk (LBT, Listen Before Talk method and apparatus).
Background technology
At present, the communication network of Long Term Evolution (LTE, Long Term Evolution) is all portion Affix one's name to what is runed in carrier wave is authorized, with the development of LTE, some companies propose " suggestion research LTE The Qualcomm of the problem being deployed in unauthorized carrier wave ", such as U.S. thinks:With data service Rapid growth, in the near future, authorize carrier wave by can not bear fastext increase bring it is huge Data volume.Consider, by disposing LTE in unauthorized carrier wave, the data in mandate carrier wave to be shared with this Flow, can solve business and increase the data volume pressure for bringing.Meanwhile, unauthorized carrier wave has following spy Point:On the one hand, as unauthorized carrier wave need not be bought, or carrier resource is zero cost, therefore non- Authorize carrier wave free or low expense;On the other hand, as personal, enterprise can participate in deployment, equipment The equipment of business can also, therefore the requirements for sale of unauthorized carrier wave is low;Furthermore, unauthorized carrier wave has altogether Enjoying property, when all being runed wherein by multiple different systems or same system different operators run wherein When, it may be considered that the mode of some shared resources, to improve carrier wave efficiency.
Although in sum, LTE has obvious advantage in being deployed in unauthorized carrier wave, in portion During administration, still have problems;Mainly include:Wireless access technology is more (across different communication marks Standard, cooperation are difficult, and network topology is various) and wireless access website it is many (number of users is big, the difficulty that cooperates greatly, Centralized management expense is big).As wireless access technology is more, there will be in unauthorized carrier wave various Wireless system, be difficult to each other coordinate, serious interference.Therefore, it is deployed in for LTE unauthorized In carrier wave, it is still desirable to support that the control of unauthorized carrier wave, majority state require system in unauthorized carrier wave During middle deployment, need to support LBT mechanism.Can be avoided between adjacent system by LBT mechanism while It is the interference for bringing each other using unauthorized carrier wave.And travel further into competition fallback mechanism, i.e., it is adjacent Near system website (the usually neighbouring transmission node of same system), can after competing fallback mechanism To avoid the neighbouring transmission node of identical systems while the interference brought during using unauthorized carrier wave.
At present, LTE is being studied and for LTE to be deployed in unauthorized carrier wave (referred to as LAA systems), Wherein most companies think that LAA system descendings will be adopted and realize awarding for non-based on fallback mechanism is competed Carrier wave is usufructuary seizes for power.But there is presently no determination and be adapted to LAA systems, especially considering After the relative fairness of the competition mechanism of WiFi system, the flow process of the presently disclosed method for realizing LBT Figure is as shown in figure 1, the method is generally comprised:
Step 100, website determine whether that data need to send, if it has, then execution step 101, such as Fruit does not then continue executing with step 100.
Step 101, website detect specified clear channel assessment (CCA) of the unauthorized carrier wave in the initial CCA stages It is whether idle in (CCA, Clear Channel Assessment) time slot, if it is, execution step 102, if not then execution step 104.
In this step, the time of the specified CCA time slots in initial CCA stages can be 9 microseconds (μ s).
Step 102, website detect whether unauthorized carrier wave is idle in delay cycle, if it is, holding Row step 103, if it is not, then return to step 101.
In this step, delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 103, one packet of station transmission, and judge whether to continue transmission, if it is, holding Row step 104, if it is not, then return to step 100.
Step 100~103 are the initial CCA stages.
Step 104, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 105, website detect whether unauthorized carrier wave is idle in delay cycle, if it is, holding Row step 106, if it is not, then continuing executing with step 105.
Whether step 106, website judge N equal to 0, if it is, return to step 103, if it is not, Then execution step 107.
Step 107, website perform N=N-1, or do nothing.
Step 108, do not perceive in extension CCA time slots, and execution step 105, or website inspection Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 106, if It is not, then return to step 105.
Step 104~108 are the extension CCA stages.
Wherein, when step 107 and step 108 do not perform the direct return to step 105 of any action, Realize self-dalay mechanism.
In the existing method for realizing LBT, if in the initial CCA stages, website detects unauthorized Carrier wave is idle in CCA time slots, then be directly entered the extension CCA stages, if the N values for producing are 0, And detect that unauthorized carrier wave is idle within the time delay CCA cycles, when the value of n is 1, website is only examined Measure 25 μ s free time just carry out data transmission, and WiFi system need detect 34 μ s free time just carry out data Transmission, therefore, it is relatively low with the fairness of WiFi system competition.
The content of the invention
In order to solve the above problems, the present invention proposes a kind of method and apparatus for realizing listem-before-talk, energy Enough fairness improved with WiFi system competition.
In order to achieve the above object, the present invention proposes a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages It is whether idle;If it is not, then producing random back value;
Then website detects whether unauthorized carrier wave is idle in the first delay cycle, if it is, continuing The step of whether execution judges random back value equal to 0;Wherein, the first delay cycle when it is a length of [16+9 × (n+k)] μ s, n are the integer more than or equal to 1, and k is the integer more than or equal to 0, and works as n During equal to 1, k is equal to 1.
Preferably, when the unauthorized carrier wave is detected in the specified CCA in the initial CCA stages When idle in gap, the method also includes:
The website detects whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then Continue executing with the unauthorized carrier wave of the detection whether idle in the specified CCA time slots in initial CCA stages The step of;Wherein, when a length of (16+9n) μ s of second delay cycle.
Preferably, when detecting the unauthorized carrier wave and being idle in second delay cycle, the party Method also includes:
One packet of the station transmission, and continue executing with the step of judging whether continuation transmission.
Preferably, when the n is more than 1, the k is equal to 0 or 1.
Preferably, the website detects unauthorized carrier wave free time within the first time delay CCA cycles includes:
The website first to unauthorized carrier wave perform the detection of (n+k) secondary CCA time slots successively, such as Really (n+k) is secondary detects the free time, and it is idle in 16 μ s to detect the unauthorized carrier wave again;
Or, it is idle in the 16 μ s that the website first detects the unauthorized carrier wave, then non-awards to described Power carrier wave performs the detection of (n+k) secondary CCA time slots successively, if (n+k) is secondary to detect sky It is not busy.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified clear channel assessment (CCA) CCA time slots in initial CCA stages It is whether idle;If it is not, then producing random back value;
Then website detects whether unauthorized carrier wave is idle in CCA time slots, if it is, detection is non- Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, continuing executing with The step of whether judging random back value equal to 0.
Preferably, when the website detects unauthorized carrier wave in the specified CCA in extension CCA stages Also include before free time in gap:
The website judges the random back value whether equal to 0, when judging described random back value etc. When 0.
Preferably, when the website judges that the random back value is not equal to 0, the method also includes:
The website performs the unauthorized carrier wave of the detection whether idle step in the second delay cycle.
Preferably, when a length of (16+9n) μ s of second delay cycle, n is more than or equal to 1 Integer, when a length of [16+9 × (n-1)] μ s of the 3rd delay cycle
The website detects unauthorized carrier wave idle packet in the second delay cycle or the 3rd delay cycle Include:
The website first performs the inspection of the secondary CCA time slots of n or (n-1) successively to the unauthorized carrier wave Survey, if n or (n-1) secondary inspection are to the free time, and detect the unauthorized carrier wave again in 16 μ s It is idle;
Or, it is idle in the 16 μ s that the website first detects the unauthorized carrier wave, then non-awards to described Power carrier wave performs the detection of the secondary CCA time slots of n or (n-1) successively, if n or (n-1) are secondary Detect the free time.
Preferably, when the website detects finger of the unauthorized carrier wave in the extension CCA stages Determine busy in CCA time slots, the method also includes:
The website continues executing with the detection unauthorized carrier wave when the specified CCA in CCA stages is extended Whether idle step in gap.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified clear channel assessment (CCA) CCA time slots in initial CCA stages It is whether idle, if it is not, then producing random back value;Wherein, the random back value of generation is more than or waits In 1, and q is less than or equal to, sizes of the q for contention window;
Then website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing The step of whether execution judges random back value equal to 0;Wherein, the second delay cycle when it is a length of (16+9n) μ s, n are the integer more than or equal to 1.
Preferably, when the website judge continue transmission packet when, the random back value be more than or Equal to 0 and less than or equal to (q-1).
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages It is whether idle, if it is not, then producing random back value;
Random back value is added 1 by website;
Then website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing The step of random back value after judging Jia 1 is performed whether equal to 0;Wherein, the second delay cycle when A length of (16+9n) μ s, n are the integer more than or equal to 1.
Preferably, when the unauthorized carrier wave is detected in the specified CCA in the initial CCA stages When idle in gap, the method also includes:
The website detects whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then Continue executing with the unauthorized carrier wave of the detection whether idle in the specified CCA time slots in initial CCA stages The step of.
Preferably, when detecting the unauthorized carrier wave and being idle in second delay cycle, the party Method also includes:
One packet of the station transmission, and judge whether to continue transmission, if it is not, then continuing executing with It is described to determine whether that data need the step of sending.
Preferably, when the website judges to continue transmission packet, the method also includes:
The website produces the random back value, detects the unauthorized carrier wave in second time delay It is idle in cycle, continue executing with described the step of whether random back value is equal to 0 judged.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages It is whether idle, if it is, whether the unauthorized carrier wave of detection is idle in the second delay cycle, if not, Random back value is produced then;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or Integer equal to 1;
Website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing executing with The step of whether judging random back value equal to 0.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
First detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages It is whether idle in specified CCA time slots, if it is not, then sending the first notification message to the first generation module; Detect whether unauthorized carrier wave is idle in the first delay cycle, if it is, sending out to the first judge module Second notification message is sent, wherein, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n is big In or integer equal to 1, k is the integer more than or equal to 0, and when n is equal to 1, k is equal to 1;
First generation module, for receiving the first notification message, produces random back value;
First judge module, for receiving second notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
Preferably, the first detection module is additionally operable to:
It is idle in the specified CCA time slots in the initial CCA stages when the unauthorized carrier wave is detected When, detect whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing executing with The unauthorized carrier wave of the detection whether idle step in the specified CCA time slots in initial CCA stages; Wherein, when a length of (16+9n) μ s of second delay cycle.
Preferably, the first detection module is additionally operable to:
When detecting the unauthorized carrier wave and being idle in second delay cycle, mould is sent to first Block sends third notice message;
Also include:
First sending module, for receiving the third notice message, transmits a packet;
First judge module is additionally operable to:
Continue executing with and judge whether the step of continuing transmission.
Preferably, the first detection module specifically for:
For detecting whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then second notification message is sent to the first generation module;First the unauthorized carrier wave is performed successively (n+k) detection of secondary CCA time slots, if (n+k) is secondary to detect the free time, and is detected again The unauthorized carrier wave is idle in 16 μ s;Or, first detect the unauthorized carrier wave in 16 μ s Free time, then perform the detection of (n+k) secondary CCA time slots to the unauthorized carrier wave successively, if (n+k) It is secondary to detect the free time, then third notice message is sent to the first judge module.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
Second detection module, for detecting the unauthorized carrier wave in initial idle channel estimating CCA ranks It is whether idle in the specified CCA time slots of section, if it is not, then send clematis stem to the second generation module knowing Message;Detect whether unauthorized carrier wave is idle in the specified CCA time slots in extension CCA stages, if It is then to detect whether unauthorized carrier wave is idle in the second delay cycle or the 3rd delay cycle, if it is, Then the 7th notification message is sent to the second judge module;
Second generation module, for receiving the 6th notification message, produces random back value;
Second judge module, for receiving the 7th notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
Preferably, second judge module is additionally operable to:
Whether the random back value is judged equal to 0, if it is, sending out to second detection module Send the 8th notification message;
Second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then the 6th notification message is sent to the second generation module;The 6th notification message is received, is detected non- Authorize carrier wave whether idle in the specified CCA time slots in extension CCA stages, if it is, detection is non- Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, sentencing to second Disconnected module sends the 5th notification message.
Preferably, second judge module is additionally operable to:
Judge that the random back value is not equal to 0, the 7th is sent to second detection module and notify to disappear Breath;
Second detection module is additionally operable to:
The 7th notification message is received, the unauthorized carrier wave of the execution detection is in the second delay cycle Whether idle step.
Preferably, second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then the 4th notification message is sent to the second generation module;Detect unauthorized carrier wave in extension CCA It is whether idle in the specified CCA time slots in stage, if it is, first being held to the unauthorized carrier wave successively The detection of row n or (n-1) secondary CCA time slots, if n or (n-1) secondary inspection are to the free time, and It is idle in 16 μ s that the unauthorized carrier wave is detected again;Or, first detect the unauthorized carrier wave and exist It is idle in 16 μ s, then the inspection for performing the secondary CCA time slots of n or (n-1) to the unauthorized carrier wave successively Survey, if n or (n-1) is secondary detects the free time, the 5th is sent to the second judge module and notify to disappear Breath.
Preferably, second detection module is additionally operable to:
Detect the unauthorized carrier wave to hurry in the specified CCA time slots in the extension CCA stages, after Whether unauthorized carrier wave described in continuous perform detection is empty in the specified CCA time slots in the extension CCA stages Not busy step.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
3rd detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages It is whether idle in specified CCA time slots, if it is not, then sending the 8th notification message to the 3rd generation module; Detect whether unauthorized carrier wave is idle if it is, sending to the 3rd judge module in the second delay cycle 9th notification message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or equal to 1 integer;
3rd generation module, for receiving the 8th notification message, produces random back value;Wherein, produce Raw random back value is more than or equal to 1, and is less than or equal to q, sizes of the q for contention window;
3rd judge module, for receiving the 9th notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
4th detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages It is whether idle in specified CCA time slots, if it is not, then sending the tenth notification message to the 4th generation module; Detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, sending out to the 4th judge module Send the 11st notification message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or Integer equal to 1;
4th generation module, for receiving the tenth notification message, produces random back value;
Computing module, for adding 1 by random back value;
4th judge module, for receiving the 11st notification message, continue executing with judge Jia 1 after with The step of whether machine fallback value is equal to 0.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
5th detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages It is whether idle in specified CCA time slots, if it is, the detection unauthorized carrier wave is in the second time delay week It is whether idle in phase, if it is not, then sending the 12nd notification message to the 5th generation module;Wherein, When a length of (16+9n) μ s of two delay cycles, n is the integer more than or equal to 1;Detect unauthorized load Whether ripple is idle in the second delay cycle, if it is, send the 13rd to the 5th judge module notifying Message;
5th generation module, for receiving the 12nd notification message, produces random back value;
5th judge module, for receiving the 13rd notification message, continues executing with and judges random back value The step of whether equal to 0.
The invention allows for a kind of method for realizing listem-before-talk, including:
According to the unauthorized carrier wave of detection, in observation window, in each predetermined period, whether idle testing result is calculated Tolerance amount;
Judge that calculated tolerance amount, more than pre-determined threshold, contention window is tuned up, and using after tuning up Contention window realize the process of listem-before-talk.
Preferably, when judging that the calculated tolerance amount is less than or equal to the pre-determined threshold, The method also includes:
The contention window is turned down or the contention window is adjusted to into minima, and using the contention window after turning down Realize the process of listem-before-talk.
Preferably, it is described according to detecting that whether idle unauthorized carrier wave in each predetermined period in observation window Testing result computation measure amount includes:
Determine that the tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is CCA The quantity of time slot, or testing result is busy and the quantity of predetermined period for CCA time slots, or detection knot Fruit is busy accumulation duration, or testing result is idle accumulation duration;
Or the quantity of the CCA time slots in the quantity and the observation window that testing result is busy predetermined period Between ratio, or testing result is busy and the quantity of predetermined period for CCA time slots and the observation Ratio between the quantity of the CCA time slots in window, or testing result is busy accumulation duration and the sight The ratio surveyed between the duration of window, or the duration that testing result is idle accumulation duration and the observation window Between ratio.
Preferably, the method also includes:
The priority level of listem-before-talk is determined according to the service quality rating of business, it is preferential using what is determined The corresponding parameter of rank realizes the process of listem-before-talk;
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not Unauthorized carrier wave is obtained, or is judged using corresponding continuous parameters k2 of the priority level determined It is secondary to obtain unauthorized carrier wave in the initial CCA stages, the priority level of listem-before-talk is heightened, wherein, K1, k2 are the integer more than or equal to 1.
Preferably, the method also includes:
Judge that transmission finds signal DRS, the priority level of listem-before-talk is adjusted to into limit priority Not.
Preferably, the method also includes:
Judge the different physical channel of simultaneous transmission, the priority level of listem-before-talk is adjusted to into Service Quality The corresponding priority level of amount grade highest physical channel.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
3rd computing module, for according to detect unauthorized carrier wave in observation window in each predetermined period whether Idle testing result computation measure amount;
5th judge module, for judging calculated tolerance amount more than pre-determined threshold, to adjustment mould Block sends the 15th notification message;
Adjusting module, for receiving the 15th notification message, contention window is tuned up, and using after tuning up Contention window realize the process of listem-before-talk.
Preferably, the 5th judge module is additionally operable to:
The calculated tolerance amount is judged less than or equal to the pre-determined threshold, to the adjustment mould Block sends the 16th notification message;
The adjusting module is additionally operable to:
The 16th notification message is received, the contention window is turned down or is adjusted to most the contention window Little value, and the process of listem-before-talk is realized using the contention window after turning down.
Preferably, the 3rd computing module specifically for:
Determine that the tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is CCA The quantity of time slot, or testing result is busy and the quantity of predetermined period for CCA time slots, or detection knot Fruit is busy accumulation duration, or testing result is idle accumulation duration;
Or the quantity of the CCA time slots in the quantity and the observation window that testing result is busy predetermined period Between ratio, or testing result is busy and the quantity of predetermined period for CCA time slots and the observation Ratio between the quantity of the CCA time slots in window, or testing result is busy accumulation duration and the sight The ratio surveyed between the duration of window, or the duration that testing result is idle accumulation duration and the observation window Between ratio.
Preferably, also include:
Determining module, for the priority level of listem-before-talk is determined according to the service quality rating of business, adopts The process of listem-before-talk is realized with the corresponding parameter of the priority level determined;
5th judge module is additionally operable to:
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not Unauthorized carrier wave is obtained, or is judged using corresponding continuous parameters k2 of the priority level determined It is secondary to obtain unauthorized carrier wave in the initial CCA stages, the 17th notification message is sent to the adjusting module; Wherein, k1, k2 are the integer more than or equal to 1;
The adjusting module is additionally operable to:
The 17th notification message is received, the priority level of listem-before-talk is heightened.
Preferably, the 5th judge module is additionally operable to:
Judge that transmission finds signal DRS, the 18th notification message is sent to the adjusting module;
The adjusting module is additionally operable to:
The 18th notification message is received, the priority level of listem-before-talk is adjusted to into limit priority Not.
Preferably, the 5th judge module is additionally operable to:
Judge the different physical channel of simultaneous transmission, the 19th notification message is sent to the adjusting module;
The adjusting module is additionally operable to:
The 19th notification message is received, the priority level of listem-before-talk is adjusted to into service quality etc. The corresponding priority level of level highest physical channel.
The invention allows for a kind of method for realizing listem-before-talk, including:
There are data to be sent in judging buffer area, or in multi-carrier polymerizing or frequency reuse or up multiplex Family carries out unauthorized carrier wave competition when being multiplexed when, or the random back value for judging to produce is more than or equal to pre- Gating limit value, or judge that data are reached, or after obtaining the time of the transmission data for determining, it is allowed to perform Self-dalay mechanism.
Preferably, the number of times for performing self-dalay mechanism is less than or equal to the predetermined threshold value.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
6th judge module, for judging to have data to be sent in buffer area, or in multi-carrier polymerizing or Frequency reuse or uplink multi-users carry out unauthorized carrier wave competition when being multiplexed when, or judge the random of generation Fallback value is more than or equal to predetermined threshold value, or judges that data are reached, or obtains the transmission data for determining Time after, to performing module send the 20th notification message;
Performing module, for receiving the 20th notification message, it is allowed to perform self-dalay mechanism.
Compared with prior art, technical scheme includes:Website detects unauthorized carrier wave first It is whether idle in the specified CCA time slots in stage beginning CCA;If it is not, then producing random back value; Website detects whether unauthorized carrier wave is idle in the first delay cycle, if it is, continuing executing with judgement The step of whether random back value is equal to 0;Wherein, the first delay cycle when a length of [16+9 × (n+k)] μ s, n are the integer more than or equal to 1, and k is the integer more than or equal to 0, and when n is equal to 1, K is equal to 1.By the solution of the present invention, website is detecting unauthorized carrier wave sky in the first delay cycle In the spare time, just perform the step of whether random back value being judged equal to 0, as the first delay cycle is equal in n It is 34 μ s when 1, this improves the fairness with WiFi system competition.
Description of the drawings
Below the accompanying drawing in the embodiment of the present invention is illustrated, the accompanying drawing in embodiment is for this Bright further understands, and is used for explaining the present invention together with description, does not constitute to present invention protection model The restriction enclosed.
Fig. 1 is the flow chart of the existing method for realizing listem-before-talk;
Fig. 2 is the flow chart of the method that the present invention realizes listem-before-talk;
The flow chart that Fig. 3 realizes the method for listem-before-talk for first embodiment of the invention;
The flow chart that Fig. 4 realizes the method for listem-before-talk for second embodiment of the invention;
The flow chart that Fig. 5 realizes the method for listem-before-talk for third embodiment of the invention;
The flow chart that Fig. 6 realizes the method for listem-before-talk for fourth embodiment of the invention;
The flow chart that Fig. 7 realizes the method for listem-before-talk for fifth embodiment of the invention;
The flow chart that Fig. 8 realizes the method for listem-before-talk for sixth embodiment of the invention;
Fig. 9 be the present invention the first realize listem-before-talk device structure composition schematic diagram;
Figure 10 is the structure composition schematic diagram of the device that the present invention realizes listem-before-talk for second;
Figure 11 be the present invention the third realize listem-before-talk device structure composition schematic diagram;
Figure 12 is the structure composition schematic diagram of the device that the 4th kind of the present invention realizes listem-before-talk;
Figure 13 is the structure composition schematic diagram of the device that the 4th kind of the present invention realizes listem-before-talk.
Specific embodiment
For the ease of the understanding of those skilled in the art, below in conjunction with the accompanying drawings the present invention is further retouched State, can not be used for limiting the scope of the invention.It should be noted that in the case where not conflicting, The various modes in embodiment and embodiment in the application can be mutually combined.
Referring to Fig. 2, the present invention proposes a kind of method for realizing LBT, including:
Step 200, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages The no free time;If it is not, then producing random back value.
In this step, website can be using unauthorized carrier wave send data equipment, such as base station, movement Terminal etc..
In this step, how website detects specified CCA time slot of the unauthorized carrier wave in the initial CCA stages Inside the free time belongs to the known technology of those skilled in the art, the protection model being not intended to limit the present invention Enclose, repeat no more here.
It is in this step, empty in the specified CCA time slots in initial CCA stages when unauthorized carrier wave is detected Idle, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing to hold The row unauthorized carrier wave of detection whether idle step in the specified CCA time slots in initial CCA stages;Its In, when a length of (16+9n) μ s of the second delay cycle.
Wherein, when detecting unauthorized carrier wave and being idle in the second delay cycle, one number of station transmission According to bag, and continue executing with the step of judging whether continuation transmission.
Step 201, and then website detect whether unauthorized carrier wave idle in the first delay cycle, if It is then to continue executing with the step of whether judging random back value equal to 0.
In this step, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n be more than or equal to 1 integer, k are the integer more than or equal to 0, and when n is equal to 1, k is equal to 1.
Wherein, when n is more than 1, k is equal to 0 or 1.
Wherein, website detects unauthorized carrier wave free time in the first delay cycle includes:
Website first performs the detection of (n+k) secondary CCA time slots successively to unauthorized carrier wave, if (n+k) It is secondary to detect the free time, and it is idle in 16 μ s to detect unauthorized carrier wave again;
Or, it is idle in the 16 μ s that website first detects unauthorized carrier wave, then unauthorized carrier wave is held successively The detection of the secondary CCA time slots of row (n+k), if (n+k) is secondary to detect the free time.
That is, website by the duration of [16+9 × (n+k)] μ s be divided into (n+k) individual CCA time slots and 16 μ s are detected respectively, are hurried when unauthorized carrier wave is detected in any one CCA time slot or 16 μ s When, it is believed that unauthorized carrier wave hurries in the first delay cycle;When detecting unauthorized carrier wave in all CCA When idle in time slot and 16 μ s, just think that unauthorized carrier wave is idle in the first delay cycle.
Wherein, when website detects unauthorized carrier wave busy in the first delay cycle, website is continued executing with Detect unauthorized carrier wave whether idle step in the first delay cycle.
In said method, by when a length of [16+9 × (n+k)] the μ s for arranging the first delay cycle, and work as When n is equal to 1, k is equal to 1, it is ensured that website can carry out the detection of 34 μ s when n is equal to 1, improves With the fairness of WiFi system competition.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages;Such as It is really no, then produce random back value;Then website detects finger of the unauthorized carrier wave in the extension CCA stages Determine whether idle in CCA time slots, if it is, the unauthorized carrier wave of detection is in the second delay cycle or the It is whether idle in three delay cycles, if it is, continue executing with judging whether random back value is equal to 0 Step.
Wherein, when a length of (16+9n) μ s of the second delay cycle, n is the integer more than or equal to 1, When a length of [16+9 × (n-1)] μ s of the 3rd delay cycle.
Wherein, detecting unauthorized carrier wave in website also includes before the free time in CCA time slots:
Whether website judges random back value equal to 0, when judging that the random back value is equal to 0.
Wherein, hurry in the specified CCA time slots in extension CCA stages when website detects unauthorized carrier wave When, whether website continues executing with the unauthorized carrier wave of detection in the specified CCA time slots in extension CCA stages Idle step.
Wherein, when website judges that random back value is not equal to 0, the unauthorized carrier wave of website perform detection The whether idle step in the second delay cycle.
Wherein, website detects unauthorized carrier wave idle packet in the second delay cycle or the 3rd delay cycle Include:
Website first performs the detection of the secondary CCA time slots of n or (n-1) successively to unauthorized carrier wave, if N or (n-1) secondary inspection are to the free time, and it is idle in 16 μ s to detect unauthorized carrier wave again;
Or, it is idle in the 16 μ s that website first detects unauthorized carrier wave, then unauthorized carrier wave is held successively The detection of row n or (n-1) secondary CCA time slots, if n or (n-1) is secondary detects the free time.
That is, the duration of (16+9n) μ s or [16+9 × (n-1)] μ s is divided into n or (n-1) by website Individual CCA time slots and 16 μ s are detected respectively, when detecting unauthorized carrier wave in any one CCA Busy in time slot or 16 μ s, it is believed that unauthorized carrier wave hurries in the second delay cycle or the 3rd delay cycle; When detecting unauthorized carrier wave and being idle in all CCA time slots and 16 μ s, unauthorized carrier wave is just thought It is idle in the second delay cycle or the 3rd delay cycle.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then produce random back value;Wherein, the random back value of generation is more than or equal to 1, and is less than Or it is equal to q, sizes of the q for contention window;Then website detects that unauthorized carrier wave is in the second delay cycle The no free time, if it is, continuing executing with the step of whether judging random back value equal to 0.
Wherein, when a length of (16+9n) μ s of the second delay cycle, n is the integer more than or equal to 1.
Wherein, when website judges to continue transmission packet, random back value is more than or equal to 0 and little In or be equal to (q-1).
After said method, the random back value of generation is necessarily not equal to 0, therefore, website is at least needed Detect unauthorized carrier wave idle in the second delay cycle and extension CCA time slots, just carry out data The transmission of bag, so as to improve the fairness with WiFi competitions.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then produce random back value;Random back value is added 1 by website;Then website detects unauthorized load Whether ripple is idle in the second delay cycle, if it is, continue executing with judging the random back after Jia 1 The step of whether value is equal to 0;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than Or the integer equal to 1.
Wherein, when detecting unauthorized carrier wave and being idle in the specified CCA time slots in initial CCA stages, Website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing executing with detection Unauthorized carrier wave whether idle step in the specified CCA time slots in initial CCA stages.
Wherein, when detecting unauthorized carrier wave and being idle in the second delay cycle, one number of station transmission According to bag, and judge whether to continue transmission, if it is not, then continue executing with determining whether that data need to send The step of.
Wherein, when website judges to continue transmission packet, website produces random back value, detects Unauthorized carrier wave is idle in second delay cycle, continues executing with and judges whether random back value is equal to 0 the step of.
After said method, the random back value of generation is necessarily not equal to 0 after adding 1, therefore, website At least need unauthorized carrier wave to be detected in the second delay cycle and extend the free time in CCA time slots, just enter The transmission of row packet, so as to improve the fairness with WiFi competitions.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as Fruit is then to detect whether unauthorized carrier wave is idle in the second delay cycle, if it is not, then producing random Fallback value;Wherein, when a length of (16+9n) μ s of the second delay cycle, n is whole more than or equal to 1 Number;Website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing executing with The step of whether judging random back value equal to 0.
By said method, website can just enter extension after the detection for performing second delay cycle In the CCA stages, so as to save flow process, in unauthorized heavier loads, website obtains bigger gain.
The method of the present invention is described in detail below by several specific embodiments.
First embodiment, referring to Fig. 3, the method includes:
Step 300, website determine whether that data need to send, if it has, then execution step 301, such as Fruit does not then continue executing with step 300.
Step 301, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages The no free time, if it is, execution step 302, if not then execution step 304.
In this step, the duration of the specified CCA time slots in initial CCA stages can be 9 μ s.
Step 302, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 303, if it is not, then return to step 301.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 303, one packet of station transmission, and judge whether to continue transmission, if it is, holding Row step 304, if it is not, then return to step 300.
Step 300~303 are the initial CCA stages.
Step 304, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 305, website detect whether unauthorized carrier wave is idle in the first delay cycle, if it is, Then execution step 306, if it is not, then continuing executing with step 305.
In this step, the duration of the first delay cycle can be [16+9 × (n+k)] μ s, n be more than or Integer equal to 1, k are the integer more than or equal to 0, and when n is equal to 1, k is equal to 1.
Wherein, when n is more than 1, k is equal to 0 or 1.
Whether step 306, website judge N equal to 0, if it is, return to step 303, if it is not, Then execution step 307.
Step 307, website perform N=N-1, or do nothing.
Step 308, do not perceive in extension CCA time slots, and execution step 305, or website inspection Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 306, if It is not, then return to step 305.
Step 304~308 are the extension CCA stages.
Second embodiment, referring to Fig. 4, the method includes:
Step 400, website determine whether that data need to send, if it has, then execution step 401, such as Fruit does not then continue executing with step 400.
Step 401, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages The no free time, if it is, execution step 402, if not then execution step 404.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 402, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 403, if it is not, then return to step 401.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 403, one packet of station transmission, and judge whether to continue transmission, if it is, holding Row step 404, if it is not, then return to step 400.
Step 400~403 are the initial CCA stages.
Step 404, website produce random back value N.
In this step, (namely enter from step 402 from the initial CCA stages into the extension CCA stages Enter step 404) when, random back value N of generation in the range of [1, q], from non-initial CCA rank When section enters extension CCA stages (namely entering step 404 from step 403), the random of generation is returned Value N is moved back in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 405, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 406, if it is not, then continuing executing with step 405.
Whether step 406, website judge N equal to 0, if it is, return to step 403, if it is not, Then execution step 407.
Step 407, website perform N=N-1, or do nothing.
Step 408, do not perceive in extension CCA time slots, and execution step 405, or website inspection Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 406, if It is not, then return to step 405.
Step 404~408 are the extension CCA stages.
3rd embodiment, referring to Fig. 5, the method includes:
Step 500, website determine whether that data need to send, if it has, then execution step 501, such as Fruit does not then continue executing with step 500.
Step 501, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages The no free time, if it is, execution step 502, if not then execution step 504.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 502, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 503, if it is not, then return to step 501.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 503, one packet of station transmission, and judge whether to continue transmission, if it is, holding Row step 504, if it is not, then return to step 500.
Step 500~105 are the initial CCA stages.
Step 504, website produce random back value N, and add 1 by N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 505, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 506, if it is not, then continuing executing with step 505.
Whether step 506, website judge N equal to 0, if it is, return to step 503, if it is not, Then execution step 507.
Step 507, website perform N=N-1, or do nothing.
Step 508, do not perceive in extension CCA time slots, and execution step 505, or website inspection Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 506, if It is not, then return to step 505.
Step 504~508 are the extension CCA stages.
Fourth embodiment, referring to Fig. 6, the method includes:
Step 600, website determine whether that data need to send, if it has, then execution step 601, such as Fruit does not then continue executing with step 600.
Step 601, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages The no free time, if it is, execution step 602, if not then execution step 604.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 602, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 603, if it is not, then execution step 604.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 603, one packet of station transmission, and judge whether to continue transmission, if it is, holding Row step 604, if it is not, then return to step 600.
Step 600~603 are the initial CCA stages.
Step 604, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 605, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 606, if it is not, then continuing executing with step 605.
Whether step 606, website judge N equal to 0, if it is, return to step 603, if it is not, Then execution step 607.
Step 607, website perform N=N-1, or do nothing.
Step 608, do not perceive in extension CCA time slots, and execution step 605, or website inspection Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 606, if It is not, then return to step 605.
Step 604~608 are the extension CCA stages.
5th embodiment, referring to Fig. 7, the method includes:
Step 700, website determine whether that data need to send, if it has, then execution step 701, such as Fruit does not then continue executing with step 700.
Step 701, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages The no free time, if it is, execution step 702, if not then execution step 704.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 702, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 703, if it is not, then return to step 701.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 703, one packet of station transmission, and judge whether to continue transmission, if it is, holding Row step 711 or step 704, if it is not, then return to step 700.
Step 700~703 are the initial CCA stages.
Step 704, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Whether step 705, website judge N equal to 0, if it is, execution step 706, if it is not, Then execution step 707.
Step 706, website detect that unauthorized carrier wave is in the specified CCA time slots in extension CCA stages The no free time, if it is, execution step 707, if it is not, then continuing executing with step 706.
Step 707, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 708, if it is not, then continuing executing with step 707.
Whether step 708, website judge N equal to 0, if it is, return to step 703, if it is not, Then execution step 709.
Step 709, website perform N=N-1, or do nothing.
Step 710, do not perceive in extension CCA time slots, and execution step 707, or website inspection Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 708, if It is not, then return to step 707.
Step 704~710 are the extension CCA stages.
Step 711, website produce random back value N, and continue executing with step 707.
Sixth embodiment, referring to Fig. 8, the method includes:
Step 800, website determine whether that data need to send, if it has, then execution step 801, such as Fruit does not then continue executing with step 800.
Step 801, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages The no free time, if it is, execution step 802, if not then execution step 804.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 802, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 803, if it is not, then return to step 801.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 803, one packet of station transmission, and judge whether to continue transmission, if it is, holding Row step 810 or step 804, if it is not, then execution step 700.
Step 800~803 are the initial CCA stages.
Step 804, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 805, website detect that unauthorized carrier wave is in the specified CCA time slots in extension CCA stages The no free time, if it is, execution step 806, if it is not, then continuing executing with step 805.
Step 806, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, Then execution step 807, if it is not, then continuing executing with step 806.
Whether step 807, website judge N equal to 0, if it is, return to step 803, if it is not, Then execution step 808.
Step 808, website perform N=N-1, or do nothing.
Step 809, do not perceive in extension CCA time slots, and execution step 806, or website inspection Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 807, if It is not, then return to step 806.
Step 804~809 are the extension CCA stages.
Step 810, website produce random back value N, and continue executing with step 806.
First embodiment can be used in combination between sixth embodiment.
Referring to Fig. 9, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
First detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages It is inside whether idle, if it is not, then sending the first notification message to the first generation module;Detect unauthorized load Whether ripple is idle in the first delay cycle, if it is, send second to the first judge module to notify to disappear Breath, wherein, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n is more than or equal to 1 Integer, k are the integer more than or equal to 0, and when n is equal to 1, k is equal to 1;
First generation module, for receiving the first notification message, produces random back value;
First judge module, for receiving second notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
Wherein, the function of the first judge module, first detection module and the first generation module can be passed through Computing device storage program/instruction realization in memory, can also pass through firmware/logic circuit/collection Into circuit realiration.
In the device of the present invention, first detection module is additionally operable to:
Detect whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing executing with The unauthorized carrier wave of the detection whether idle step in the specified CCA time slots in initial CCA stages; Wherein, when a length of (16+9n) μ s of second delay cycle.
In the device of the present invention, first detection module is additionally operable to:
When detecting the unauthorized carrier wave and being idle in second delay cycle, mould is sent to first Block sends third notice message;
Also include:
First sending module, for receiving the third notice message, transmits a packet;
First judge module is additionally operable to:
Continue executing with and judge whether the step of continuing transmission.
The present invention device in, first detection module specifically for:
For detecting whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then second notification message is sent to the first generation module;(n+k) is performed successively to unauthorized carrier wave first The detection of secondary CCA time slots, if (n+k) is secondary to detect the free time, and detects described non-award again Power carrier wave is idle in 16 μ s;Or, it is idle in the 16 μ s first to detect the unauthorized carrier wave, then Perform the detection of (n+k) secondary CCA time slots to unauthorized carrier wave successively, if (n+k) is secondary examined The free time is measured, then third notice message is sent to the first judge module.
Referring to Figure 10, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
Second detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages It is inside whether idle, if it is not, then sending the 4th notification message to the second generation module;Detect unauthorized load Whether ripple is idle in extension CCA time slots, if it is, the unauthorized carrier wave of detection is in the second time delay week It is whether idle in phase or the 3rd delay cycle, if it is, send the 5th to the second judge module to notify to disappear Breath;
Second generation module, for receiving the 4th notification message, produces random back value;
Second judge module, for receiving the 5th notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
Wherein, the function of the second judge module, the second detection module and the second generation module can be passed through Computing device storage program/instruction realization in memory, can also pass through firmware/logic circuit/collection Into circuit realiration.
In the device of the present invention, the second judge module is additionally operable to:
Whether the random back value is judged equal to 0, if it is, sending out to second detection module Send the 8th notification message;
Second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then the 6th notification message is sent to the second generation module;The 6th notification message is received, is detected non- Authorize carrier wave whether idle in the specified CCA time slots in extension CCA stages, if it is, detection is non- Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, sentencing to second Disconnected module sends the 5th notification message.
In the device of the present invention, the second judge module is additionally operable to:
Judge that the random back value is not equal to 0, the 7th is sent to second detection module and notify to disappear Breath;
Second detection module is additionally operable to:
The 7th notification message is received, the unauthorized carrier wave of the execution detection is in the second delay cycle Whether idle step.
The present invention device in, the second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then the 4th notification message is sent to the second generation module;Detect unauthorized carrier wave in extension CCA It is whether idle in the specified CCA time slots in stage, if it is, first performing n successively to unauthorized carrier wave Or the detection of (n-1) secondary CCA time slots, if n or (n-1) secondary inspection are to the free time, and examine again Measure the unauthorized carrier wave idle in 16 μ s;Or, the unauthorized carrier wave is first detected in 16 μ s The interior free time, then perform the detection of the secondary CCA time slots of n or (n-1) to unauthorized carrier wave successively, if N or (n-1) is secondary detects the free time, then send the 5th notification message to the second judge module.
In the device of the present invention, the second detection module is additionally operable to:
Detect the unauthorized carrier wave to hurry in the specified CCA time slots in the extension CCA stages, after Whether unauthorized carrier wave described in continuous perform detection is empty in the specified CCA time slots in the extension CCA stages Not busy step.
Referring to Figure 11, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
3rd detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages It is inside whether idle, if it is not, then sending the 8th notification message to the 3rd generation module;Detect unauthorized load Whether ripple is idle if it is, sending the 9th notification message to the 3rd judge module in the second delay cycle; Wherein, when a length of (16+9n) μ s of the second delay cycle, n is the integer more than or equal to 1;
3rd generation module, for receiving the 8th notification message, produces random back value;Wherein, produce Raw random back value is more than or equal to 1, and is less than or equal to q, sizes of the q for contention window;
3rd judge module, for receiving the 9th notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
Wherein, the function of the 3rd judge module, the 3rd detection module and the 3rd generation module can be passed through Computing device storage program/instruction realization in memory, can also pass through firmware/logic circuit/collection Into circuit realiration.
Referring to Figure 12, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
4th detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages It is inside whether idle, if it is not, then sending the tenth notification message to the 4th generation module;Detect unauthorized load Whether ripple is idle in the second delay cycle, if it is, send the 11st to the 4th judge module notifying Message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n is the integer more than or equal to 1;
4th generation module, for receiving the tenth notification message, produces random back value;
Computing module, for adding 1 by random back value;
4th judge module, for receiving the 11st notification message, continue executing with judge Jia 1 after with The step of whether machine fallback value is equal to 0.
Wherein, the function of the 4th judge module, the 4th detection module, the 4th generation module and computing module Can store program/instruction in memory by computing device to realize, can also by firmware/ Logic circuit/integrated circuit is realized.
Referring to Figure 13, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
5th detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages It is inside whether idle, if it is, whether the detection unauthorized carrier wave is idle in the second delay cycle, If it is not, then sending the 12nd notification message to the 5th generation module;Wherein, the second delay cycle when A length of (16+9n) μ s, n are the integer more than or equal to 1;Detect unauthorized carrier wave in the second time delay week It is whether idle in phase, if it is, sending the 13rd notification message to the 5th judge module;
5th generation module, for receiving the 12nd notification message, produces random back value;
5th judge module, for receiving the 13rd notification message, continues executing with and judges random back value The step of whether equal to 0.
Wherein, the function of the 5th judge module, the 5th detection module and the 5th generation module can be passed through Computing device storage program/instruction realization in memory, can also pass through firmware/logic circuit/collection Into circuit realiration.
The present invention proposes the process that eight kinds of modes realize listem-before-talk, under specific descriptions.
1 thinking of mode is described
Based on the flow chart that Fig. 1 illustrates, arrange delay cycle in initial CCA stages when it is a length of (16+n*9) during us, then arrange extension CCA in delay cycle when a length of (16+ (n+k) * 9) Us (is merely representative of duration, before and after not differentiating between the CCA slot and 16usCCA detection of n 9us here Sequentially).Wherein n is positive integer, and k is 0 or positive integer.
When being equal to 1 for n, during the duration of the delay cycle in setting extension CCA, configuration k is only 1. In Fig. 1 being overcome thus, before website sends data for the first time (or the unauthorized carrier wave of acquisition makes Before with power), the free time length in unauthorized carrier wave is not less than the demand of 34us.If be not arranged such, So below in the case of, it may appear that website is unsatisfactory for the situation of above-mentioned condition.For example, delay cycle N is configured to 1, then when website performs initial CCA, the CCA of a time slot is detected as hurrying, then stand Point enters the extension CCA stages, randomly generates fallback value N, and then lucky N=0 performs delay cycle CCA detection, if now the CCA of delay period is detected as the free time, website will obtain non-awarding The right to use of power carrier wave.Now the idle total duration of the unauthorized carrier wave of website experience is that delay cycle is idle Duration, be (16+1*9) us (i.e. 25us).After using above-mentioned parameter configuration, then website Flow process is not changed in, but due to extending when a length of (16+ (1+1) of the delay cycle in CCA stages * 9) us (i.e. 34us), so now the idle total duration of the unauthorized carrier wave of website experience is time delay week The duration of free time phase, is (16+ (1+1) * 9) us (i.e. 34us).Meet above-mentioned requirements, so as to protect The fairness of LAA systems and wifi system competitions is demonstrate,proved.
Above-mentioned setting can be constantly present, no matter whether n is 1.
Or above-mentioned setting can also be arranged only for the situation that n is 1.Thus, when n is more than 1 When, it is 0 or 1 that website allows the k arranged in the delay cycle in extension CCA.
2 thinking of mode is described
Description in problem square formula 1 to be solved.
Based on flow process Fig. 1, when website performs extension CCA stage, the generation scope for limiting N is [1~q]. So avoid N and be randomly generated the situation for 1, it is also possible to overcome the problems referred to above.In order to not affect The impact in extension CCA stages, Ke Yishi, when website is entered from non-initial CCA are entered from other entrances During extension CCA stages, it is [0~q-1] that website randomly generates the scope of N, enters from initial CCA and extends The generation scope of the restriction N in CCA stages is [1~q].It is of course also possible to being directed to all entrance extends CCA Stage, the span for all limiting N are [1~q].
3 thinking of mode is described
It is still based on flow process Fig. 1.After random back N value is produced for website, website is performed N=N+1, then using new N values as random back N values.Likewise, website is also allowed to, When website enters extension CCA stages from non-initial CCA, website limits the generation scope of N and is [0~q-1], and do not perform N=N+1.Likewise, when website enters extension CCA from the initial CCA stages During the stage, it is [0~q-1] that website limits the generation scope of N values, and performs N=N+1.
The thinking description of mode 4
With reference to Fig. 6, based on Fig. 1, mode 4 for Fig. 1 in the initial CCA stages be modified.
From the beginning of whether data cell is sent, if necessary to send data, website performs a CCA to website The detection of time slot,
When the free time is detected as, then detect into delay cycle CCA, if delay cycle CCA is detected as Free time, then website start send data;If delay cycle CCA is detected as hurrying, website is entered and is expanded The exhibition CCA stages.
When being detected as doing, then website enters the extension CCA stages.
Other flow processs may be referred to Fig. 1.
Relative to the existing procedure of Fig. 1, when a CCA slot in initial CCA stages is detected as the free time When, in mode 4, website only needs to perform a delay cycle CCA detection again and can just enter extend The CCA stages, and in Fig. 1, after website performs a delay cycle CCA detection, in addition it is also necessary to perform again One CCA slot detection can just judge whether to enter the extension CCA stages.Obviously, mode 4 Faster, the situation in unauthorized heavier loads can be obtained more large gain to speed by this characteristic.
5 thinking of mode is described
The flow process for being still based on Fig. 1 is modified, and is primarily directed to extend CCA stages, the side of overcoming The problem mentioned in formula 1.
With reference to Fig. 7, based on flow process Fig. 1, the extension CCA stages are entered in website, website produces random returning The N values moved back, judge whether N is 0,
As N=0, website performs CCA time slots (slot) detection, when the free time is detected as, stands Point is detected into delay cycle CCA;When busy is detected as, website continues executing with one time slot CCA is detected.
When N is non-zero, website is detected into delay cycle CCA.
Aforesaid way enters extension CCA stage from initial CCA for website.Can certainly be applied to Other modes enter the extension CCA stages.But for other modes enter extension CCA stages, this Shen Please give one preferably, when website was entered from the non-initial CCA stage extends CCA, website is produced Delay cycle CCA detections are directly entered after the N values of raw random back, and (flow process is not illustrated in FIG. 3 Go out).
Other flow processs may be referred to Fig. 1.
After using the flow process, the problem mentioned during mode 1 can be overcome.
6 thinking of mode is described
With reference to Fig. 8, based on flow process Fig. 1, website enters the extension CCA stages, and website produces random back N values, website perform a CCA time slot detection, when the free time is detected as, website enters time delay Cycle CCA is detected.When busy is detected as, website repeats the detection of one CCA time slots.
Aforesaid way enters extension CCA stage from initial CCA for website.Can certainly be applied to Other modes enter the extension CCA stages.But for other modes enter extension CCA stages, this Shen Please give one preferably, when website was entered from the non-initial CCA stage extends CCA, website is produced Delay cycle CCA detections are directly entered after the N values of raw random back, and (flow process is not illustrated in FIG. 4 Go out).
Other flow processs may be referred to Fig. 1.
In mode 6, relative to mode 1, the detection time of website can be shortened.For example, in Fig. 1, Website performs delay cycle CCA detections, a delay cycle after the generation of random back N value, directly Shi Changwei (16+n*9) us, website can just draw after needing most long (16+n*9) us of detection it is whether idle, Or at least need the detection for performing 16us just draw the free time, so as to decide whether into next ring Section.In mode 6, it is only necessary to perform a CCA slot (9us) detection can just draw it is whether idle, So as to decide whether to carry out next link.Obviously, mode 6 can draw whether enter the next one in advance The conclusion of link, it is possible to shorten the time of whole detection, so as to lift indirectly spectrum efficiency.
The problem that mode 6 is mentioned in can also overcoming mode 1.
7 thinking of mode is described
It is existing according to flow process Fig. 1, when extending the delay cycle CCA in CCA a length of (16+n*9) us.In for mode 7, during flowage structure (Fig. 4) based on mode 6, site configuration in mode 7 Delay cycle CCA durations are reduced into the CCA slot, the CCA of now reduce a 9us of a 9us Slot may be considered a CCA slot before being placed on delay cycle and instead of.
The characteristics of there is mode 7 mode 6 to shorten detection time.
Other flow processs may be referred to Fig. 1.
8 thinking of mode is described
Delay cycle in extension CCA is defined as by (n*9+16) us, wherein 9 represent a CCA Slot, 16 represent the CCA detections of a 16us.So, extend the delay cycle CCA in CCA Detection is just changed into:N CCA slot is first carried out, if it is all idle, then the CCA for performing a 16us Detection, if idle, then whole delay cycle CCA is detected as the free time.If any one CCA slot It is detected as hurrying, then it is considered that this delay cycle CCA is detected as hurrying.
Mode 8 is directly using the flow process of Fig. 1.This sample loading mode 8 can also realize the effect for shortening detection time Rate.
In the case where not conflicting, aforementioned manner 1~8 can be used in combination..
Embodiment 1
A kind of structure of delay cycle.CCA slot of the structure by n continuous 9us, is one afterwards The CCA detection compositions of individual 16us.
When the CCA detections that website n slot of detection is idle and 16us are idle, delay cycle CCA It is detected as the free time.When website detects that any one CCA slot is busy, then website thinks this time delay week Phase CCA is detected as hurrying.Now website can immediately begin to next CCA slot detections.That is, When website can interpolate that out the CCA slot for detecting for busy, website will be immediately performed next CCA Slot is detected, so as to shorten the time.
Embodiment 2
Based on existing flow process Fig. 1, the delay cycle in CCA stages and prolonging for initial CCA stages are extended When the cycle in configure carried out according to the structure of 16us+n*9us.In the present embodiment, it is proposed that for Modify inside the delay cycle in extension CCA stages.The configuration in delay cycle for example now is pressed Carry out according to the structure of n*9us+16us.Remaining is not use up flow process and still uses flow process Fig. 1.Wherein, n*9us Indicate the CCA slot of n 9us, 16us represent perform one when a length of 16us CCA detection.
Above-mentioned mode 8 is so achieved that, is conducive to shortening the detection time of whole listem-before-talk, saved Time about can be used to transmission data, so as to lift spectrum efficiency.
Embodiment 3
Based on existing flow process Fig. 1, when the delay cycle duration in site configuration/selection initial CCA stages When detecting for the CCA of 16us+9us, then the corresponding configuration of website/selections extends prolonging for CCA stages When cycle duration for 16us+9us+9us CCA detection duration.And can randomly generate only for website N values be 0 when use (other N values can also be used, and during N=0, efficiency is best).Remaining the step of Still continue to use flow process Fig. 1.
If a length of 16us+9us+9us during the delay cycle in site configuration/selection initial CCA stages, that The delay cycle in the corresponding configuration of website/selection extension CCA stages be 16us+9us+9us (this by In n be non-1, it is possible to configuration equal to the initial CCA stages delay cycle duration) or 16us+9us+9us+9us (this is always to maintain 9us longer than the delay cycle in initial CCA stages).
Thus can be with the purpose of implementation 1.
The application also provides the counting rule that is self-adaptative adjustment LBT contention window sizes.
Basic ideas are, during website performs LBT, when a time slot is not observed, website for The time slot is busy (hurrying) according to unauthorized carrier wave in time slot.
Wherein, when website calculate adjustment LBT contention window sizes parameter when, the time slot be busy state not As the foundation of parameter increase and decrease.
Wherein, the parameter is:The quantity of busy time slot, or the quantity in busy cycle.
Further, the definition in busy cycle is:Between two free timeslots and unauthorized carrier wave is tested Survey time total amount (the The total amount of time between two idle slots during to do Which the medium is determined to be busy), or an equivalent definition is:One group of company Continue the CCA time slots to do.
Further, when website calculates the parameter of adjustment LBT contention window sizes, the time slot is busy shape The foundation that state increases and decreases not as the parameter, specifically includes:During for the quantity that parameter is busy time slot, The time slot is not calculated as busy time slot, and the quantity of busy time slot does not increase or do not reduce.For parameter is busy Cycle quantity when, the time slot is not calculated as the part in busy cycle or busy cycle.
Further, the time slot is present as a CCA time slot in website observation window, calculates in CCA In the quantity of time slot.Or the time slot is not calculated in CCA not as a CCA time slot in observation window In the quantity of time slot.Or the duration of the time slot is not as a part of duration of observation window.
Further, the computing formula for calculating competition rollback window size includes:
Mode 1:The quantity in the cycle of tolerance amount=busy;
Mode 2:The quantity of the quantity/CCA time slots in the cycle of tolerance amount=busy;
Mode 3:The quantity of the time slot of tolerance amount=busy;
Mode 4:The quantity of the quantity/CCA time slots of the time slot of tolerance amount=busy.
Mode 5:The quantity of tolerance amount=time slot.
Mode 6:The accumulation duration of tolerance amount=busy;
Mode 7:The duration of the accumulation duration/observation window of tolerance amount=busy;
Mode 8:The accumulation duration in tolerance amount=spare time;
Mode 9:The duration of the accumulation duration/observation window in tolerance amount=spare time.
Busy accumulation duration includes specifying in the time period, and unauthorized carrier wave is the cumulative of busy time.Now Above-mentioned is not observed and is considered that busy time slot is not cumulatively added.
Not busy accumulation duration includes performing in the time period, and unauthorized carrier wave is the cumulative of not busy time.
Tolerance amount is a predetermined threshold value, is constant, or be it is related to random back N value, or Person is related to current competitive window window length.When tolerance amount is more than threshold value, contention window is tuned up.Degree of working as When amount amount is less than threshold value, initial contention window size is turned or returned to contention window down.
After website determines the corresponding priority of LBT according to the QoS grades of business, if website is used The corresponding parameter of the priority, such as minimum competition rollback window do not obtain unauthorized carrier wave for continuous k time and use Power, then website unauthorized carrier wave next time can be competed using more higher leveled LBT priority parameters The right to use.The value of preferred k is 3.
After website determines the corresponding priority of LBT according to the QoS grades of business, if website is used The priority obtains the unauthorized carrier wave right to use for continuous k time, and the acquisition right to use is all direct each time Initial CCA stages (being based on cat4 types) get the right to use of unauthorized carrier wave.Then website can be with The right to use of unauthorized carrier wave next time is competed using more higher leveled LBT priority parameters.Preferably The value of k is 2.
When station transmission finds signal (DRS), and during simultaneous transmission PDSCH, website should be selected In data burst (burst), the corresponding parameter of priority of highest LBT is performing listem-before-talk mechanism. For example, the burst of website planned transmission includes DRS and PDSCH, then in both website selections most The corresponding LBT priority of high QoS is seizing unauthorized carrier wave.For example, in the subframe that DRS is located When also needing to hop control information or PDSCH, website selects therein, corresponding with highest LBT priority parameter performing LBT.
When transmission burst being included different physical channels for one, website selects highest QoS The corresponding LBT priority of physical channel parameter performing LBT;Or website selects different physics In channel, the parameter of corresponding highest LBT priority is performing LBT.
Self-dalay treatment mechanism in a kind of LBT flow processs, for improving existing flow process.
In flow process Fig. 1, in the extension CCA stages, there is " doing nothing " (do nothing) Process, with reference to flow process Fig. 1, it is found which is mainly characterized by website and performs CCA slot detections, when Testing result is the free time, but the N values of random back are not successively decreased.This mode there may be following wind Danger or problem.
Often keep in website Jing the flow process for performing Fig. 1 to be the unauthorized carrier wave of competition, but always returning at random When moving back value N and being decremented to less a certain numerical value, such as N=1 performs do nothing, Zhi Daoyou always Data reach to continue executing with successively decreasing for N, so as to realize the unauthorized carrier wave of acquisition of quick, high probability The right to use, and send data purpose.But can be to think about it, if do nothing are processed not in addition Limit and use, all of website all obtains the right to use of unauthorized carrier wave in a manner mentioned above.So must The competition conflict between website, i.e., multiple adjacent bus stations is so caused to obtain the right to use simultaneously, formation is done each other Disturb.This has some to conflict with the purpose of the introducing listem-before-talk of random back mechanism.In order to overcome or alleviated by The appearance of the problems referred to above, it is possible to use method below.
Mode 1:When having data to be sent in the buffer area (buffer) of website, website performs Fig. 1 flow processs When, website allows to perform self-dalay mechanism.
Mode 2:LBT mechanism of the website in single execution flow chart 1 is used for the unauthorized carrier wave of competition Temporary, self-dalay number of processing is performed no more than predetermined threshold.Predetermined threshold for perform LBT when with The N values that machine is produced;Or the function of N values, such as N/2, N/3 (rounding during non-integer) etc.; Or when performing LBT contention window size L, or the function of L-value, such as L/2, L/3 (non-integer When round) etc..
Mode 3:From delay process only when website is multi-carrier polymerizing, it is frequency reuse purpose, up many Unauthorized carrier wave when user is multiplexed is used when competing.
Mode 4:When website performs LBT, the random back N value of generation is allowed more than predetermined threshold value Using from delay process.Pre-determined threshold is constant value, or predetermined threshold is the big of contention window when performing LBT Function of little L-value, such as L/2, L/3 (rounding during non-integer) etc..
Mode 5:(in buffer, there are data) when website only has data to reach, website can be performed first to be listened After say that mechanism competes unauthorized carrier wave.Further, website has the behavior of data to be in judging buffer:Mac Layer notifies/triggering physical layer, has data to reach, and time point is t0.Physical layer from t0 or t0+t1 when Punctum starts to perform LBT flow processs for starting point.With reference to Fig. 1, such as starting point is t0, then first CCA The time location of slot is t0+9us (t0 is starting point, and duration is 9us), if detection is idle, The time location of delay cycle is that (t0+9us is starting point to t0+9us+ (16+n*9) us, (16+n*9) Us is the persistent period).No matter, testing result is busy or spare time, each CCA slot or delay cycle Time location all can be predetermined.CCA slot afterwards or the time location of delay cycle are by that analogy.
Mode 6:When website (UE sides) is obtained determines the plan transmission time, website can perform stream Journey Fig. 1 is the unauthorized carrier wave of competition.For example, after UE receives the uplink authorization information of base station, can be with The delivery time point of upstream data is determined according to reception uplink authorization information, then UE can received Listem-before-talk mechanism is performed after uplink authorization information, and allows the execution before data is activation moment point to prolong certainly Shi Gongneng.
The invention allows for a kind of method for realizing listem-before-talk, including:
According to the unauthorized carrier wave of detection, in observation window, in each predetermined period, whether idle testing result is calculated Tolerance amount;Judge that calculated tolerance amount, more than pre-determined threshold, contention window is tuned up, and using tune Contention window after big realizes the process of listem-before-talk.
Wherein, contention window is tuned up can be, but not limited to be it is double tune up, it is or exponentially-increased, or linear Increase etc..
Wherein, when judging that calculated tolerance amount is less than or equal to pre-determined threshold, contention window is adjusted It is little or contention window is adjusted to into minima, and the process of listem-before-talk is realized using the contention window after turning down.
Wherein, contention window is turned down can be, but not limited to be it is double turn down, or reduce by index, it is or linear Reduce etc..
Wherein, according to the unauthorized carrier wave of detection, in observation window, in each predetermined period, whether idle detection is tied Fruit computation measure amount includes:
It is determined that tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is when being CCA The quantity of gap, or testing result is busy and the quantity of predetermined period for CCA time slots, or testing result For the accumulation duration for hurrying, or testing result is idle accumulation duration;
Or between the quantity of the CCA time slots in the quantity and observation window that testing result is busy predetermined period Ratio, or testing result is busy and for the CCA in the quantity and observation window of the predetermined period of CCA time slots Ratio between the quantity of time slot, or testing result is between busy accumulation duration and the duration of observation window Ratio between ratio, or the accumulation duration and the duration of observation window that testing result is the free time.
Wherein, testing result be busy predetermined period can be testing result be busy adjacent each CCA The time of time slot and/or 16 μ s.
Wherein, testing result is that busy accumulation duration refers to that testing result is busy accumulation duration in observation window, Testing result is that idle accumulation duration refers to that testing result is idle accumulation duration in observation window.
Wherein, observation window refers to that website starts the time experienced to unauthorized carrier wave by competition to competition.
Further, can so that the priority level of listem-before-talk is determined according to the service quality rating of business, The process of listem-before-talk is realized using the corresponding parameter of the priority level determined;Judge to adopt and determine The corresponding parameter of priority level in minimum competition window do not obtain unauthorized carrier wave for continuous k1 time, or judge Go out and obtain unauthorized in the initial CCA stages k2 time using the priority level corresponding continuous parameters determined Carrier wave, the priority level of listem-before-talk is heightened, wherein, k1, k2 are the integer more than or equal to 1.
Wherein it is possible to but be not limited to the priority level of listem-before-talk is defined as the service quality rating of business.
Wherein, the priority level of listem-before-talk corresponding parameter includes the maximum of contention window, contention window Minima and n.
Further, can also judge that transmission finds signal DRS, the priority level of listem-before-talk is adjusted It is whole for limit priority it is other.
Further, the different physical channel of simultaneous transmission can also be judged, by the preferential of listem-before-talk Rank adjusting is the corresponding priority level of service quality rating highest physical channel.
The invention allows for a kind of device for realizing listem-before-talk, it is characterised in that at least include:
3rd computing module, for according to detect unauthorized carrier wave in observation window in each predetermined period whether Idle testing result computation measure amount;
5th judge module, for judging calculated tolerance amount more than pre-determined threshold, to adjustment mould Block sends the 15th notification message;
Adjusting module, for receiving the 15th notification message, contention window is tuned up, and using after tuning up Contention window realize the process of listem-before-talk.
Wherein, the function of the 3rd computing module, the 5th judge module and adjusting module can be by processing Device performs storage program/instruction in memory and realizes, can also pass through firmware/logic circuit/integrated electricity Realize on road.
In the device of the present invention, the 5th judge module is additionally operable to:
Judge that calculated tolerance amount, less than or equal to pre-determined threshold, sends the 16th to adjusting module Notification message;
Adjusting module is additionally operable to:
The 16th notification message is received, contention window is turned down or contention window is adjusted to into minima, and adopted Contention window after turning down realizes the process of listem-before-talk.
The present invention device in, the 3rd computing module specifically for:
It is determined that tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is when being CCA The quantity of gap, or testing result is busy and the quantity of predetermined period for CCA time slots, or testing result For the accumulation duration for hurrying, or testing result is idle accumulation duration;
Or between the quantity of the CCA time slots in the quantity and observation window that testing result is busy predetermined period Ratio, or testing result is busy and for the CCA in the quantity and observation window of the predetermined period of CCA time slots Ratio between the quantity of time slot, or testing result is between busy accumulation duration and the duration of observation window Ratio between ratio, or the accumulation duration and the duration of observation window that testing result is the free time.
In the device of the present invention, also include:
Determining module, for the priority level of listem-before-talk is determined according to the service quality rating of business, adopts The process of listem-before-talk is realized with the corresponding parameter of the priority level determined;
5th judge module is additionally operable to:
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not Obtain unauthorized carrier wave, or judge using priority level corresponding continuous parameters determined k2 time first Stage beginning CCA obtains unauthorized carrier wave, sends the 17th notification message to adjusting module;Wherein, k1, K2 is the integer more than or equal to 1;
Adjusting module is additionally operable to:
The 17th notification message is received, the priority level of listem-before-talk is heightened.
Wherein it is determined that the function of module can be by computing device store program in memory/ Instruction is realized, can also be realized by firmware/logic circuit/integrated circuit.
In the device of the present invention, the 5th judge module is additionally operable to:
Judge that transmission finds signal DRS, the 18th notification message is sent to adjusting module;
Adjusting module is additionally operable to:
The 18th notification message is received, the priority level of listem-before-talk limit priority is adjusted to into other.
In the device of the present invention, the 5th judge module is additionally operable to:
Judge the different physical channel of simultaneous transmission, the 19th notification message is sent to adjusting module;
Adjusting module is additionally operable to:
The 19th notification message is received, the priority level of listem-before-talk is adjusted to into service quality rating most The corresponding priority level of high physical channel.
The invention allows for a kind of method for realizing listem-before-talk, including:
There are data to be sent in judging buffer area, or in multi-carrier polymerizing or frequency reuse or up multiplex Family carries out unauthorized carrier wave competition when being multiplexed when, or the random back value for judging to produce is more than or equal to pre- Gating limit value, or judge that data are reached, or after obtaining the time of the transmission data for determining, it is allowed to perform Self-dalay mechanism.
Wherein, whether have in how judging buffer area that data are to be sent to belong to the known of those skilled in the art Technology, the protection domain being not intended to limit the present invention, is repeated no more here.
Wherein it is possible to pass through media access control (MAC, Media Access Control) layer to physics The mode that sends a notification message of layer judging whether data reach, when physical layer receives notification message, Judge that data are reached, when physical layer does not receive notification message, judge that data are not reached.
Wherein, base station can pass through the delivery time that uplink authorization information sends data to terminal.
Wherein, the number of times for performing self-dalay mechanism can also be limited less than or equal to predetermined threshold value.
Wherein, predetermined threshold value can be the random back value for producing, or the function of random back value is (such as N/2, N/3 etc.), or size q of contention window, or the function (such as q/2, q/3 etc.) of the size of contention window.
Wherein, self-dalay mechanism is referred in Fig. 1 in step 107 and step 108 after N is equal to 1 no longer The value of N is deducted into 1, is not also detected, that is, done nothing.
The number of times of self-dalay mechanism by said method, is performed by limiting each website, reduce website it Between competition conflict probability.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
6th judge module, for judging to have data to be sent in buffer area, or in multi-carrier polymerizing or Frequency reuse or uplink multi-users carry out unauthorized carrier wave competition when being multiplexed when, or judge the random of generation Fallback value is more than or equal to predetermined threshold value, or judges that data are reached, or obtains the transmission data for determining Time after, to performing module send the 20th notification message;
Performing module, for receiving the 20th notification message, it is allowed to perform self-dalay mechanism.
Wherein, the function of the 6th judge module and performing module can be stored in by computing device Program/instruction in reservoir is realized, can also be realized by firmware/logic circuit/integrated circuit.
It should be noted that embodiment described above is for only for ease of those skilled in the art's understanding , protection scope of the present invention is not limited to, in the premise of the inventive concept without departing from the present invention Under, those skilled in the art are to any obvious replacement made of the invention and improvement etc. at this Within the protection domain of invention.

Claims (44)

1. a kind of method for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages It is whether idle;If it is not, then producing random back value;
Then website detects whether unauthorized carrier wave is idle in the first delay cycle, if it is, continuing The step of whether execution judges random back value equal to 0;Wherein, the first delay cycle when it is a length of [16+9 × (n+k)] μ s, n are the integer more than or equal to 1, and k is the integer more than or equal to 0, and works as n During equal to 1, k is equal to 1.
2. method according to claim 1, it is characterised in that when detecting the unauthorized carrier wave When idle in the specified CCA time slots in the initial CCA stages, the method also includes:
The website detects whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then Continue executing with the unauthorized carrier wave of the detection whether idle in the specified CCA time slots in initial CCA stages The step of;Wherein, when a length of (16+9n) μ s of second delay cycle.
3. method according to claim 2, it is characterised in that when detecting the unauthorized carrier wave When idle in second delay cycle, the method also includes:
One packet of the station transmission, and continue executing with the step of judging whether continuation transmission.
4. method according to claim 1, it is characterised in that when the n is more than 1, described K is equal to 0 or 1.
5. method according to claim 1, it is characterised in that the website detects unauthorized load Ripple free time within the first time delay CCA cycles includes:
The website first to unauthorized carrier wave perform the detection of (n+k) secondary CCA time slots successively, such as Really (n+k) is secondary detects the free time, and it is idle in 16 μ s to detect the unauthorized carrier wave again;
Or, it is idle in the 16 μ s that the website first detects the unauthorized carrier wave, then non-awards to described Power carrier wave performs the detection of (n+k) secondary CCA time slots successively, if (n+k) is secondary to detect sky It is not busy.
6. a kind of method for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified clear channel assessment (CCA) CCA time slots in initial CCA stages It is whether idle;If it is not, then producing random back value;
Then website detects whether unauthorized carrier wave is idle in CCA time slots, if it is, detection is non- Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, continuing executing with The step of whether judging random back value equal to 0.
7. method according to claim 6, it is characterised in that detect in the website unauthorized Carrier wave also included before the free time in the specified CCA time slots in extension CCA stages:
The website judges the random back value whether equal to 0, when judging described random back value etc. When 0.
8. method according to claim 7, it is characterised in that when the website judge it is described with When machine fallback value is not equal to 0, the method also includes:
The website performs the unauthorized carrier wave of the detection whether idle step in the second delay cycle.
9. the method according to claim 6 or 7, it is characterised in that second delay cycle Shi Changwei (16+9n) μ s, n are the integer more than or equal to 1, the 3rd delay cycle when it is a length of [16+9×(n-1)]μs
The website detects unauthorized carrier wave idle packet in the second delay cycle or the 3rd delay cycle Include:
The website first performs the inspection of the secondary CCA time slots of n or (n-1) successively to the unauthorized carrier wave Survey, if n or (n-1) secondary inspection are to the free time, and detect the unauthorized carrier wave again in 16 μ s It is idle;
Or, it is idle in the 16 μ s that the website first detects the unauthorized carrier wave, then non-awards to described Power carrier wave performs the detection of the secondary CCA time slots of n or (n-1) successively, if n or (n-1) are secondary Detect the free time.
10. method according to claim 6, it is characterised in that when the website detect it is described Unauthorized carrier wave busy in the specified CCA time slots in the extension CCA stages, the method also include:
The website continues executing with the detection unauthorized carrier wave when the specified CCA in CCA stages is extended Whether idle step in gap.
A kind of 11. methods for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified clear channel assessment (CCA) CCA time slots in initial CCA stages It is whether idle, if it is not, then producing random back value;Wherein, the random back value of generation is more than or waits In 1, and q is less than or equal to, sizes of the q for contention window;
Then website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing The step of whether execution judges random back value equal to 0;Wherein, the second delay cycle when it is a length of (16+9n) μ s, n are the integer more than or equal to 1.
12. methods according to claim 11, it is characterised in that when the website is judged to continue During transmission packet, the random back value is more than or equal to 0 and is less than or equal to (q-1).
A kind of 13. methods for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages It is whether idle, if it is not, then producing random back value;
Random back value is added 1 by website;
Then website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing The step of random back value after judging Jia 1 is performed whether equal to 0;Wherein, the second delay cycle when A length of (16+9n) μ s, n are the integer more than or equal to 1.
14. methods according to claim 6 or 11 or 13, it is characterised in that when detecting State unauthorized carrier wave it is idle in the specified CCA time slots in the initial CCA stages when, the method is also wrapped Include:
The website detects whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then Continue executing with the unauthorized carrier wave of the detection whether idle in the specified CCA time slots in initial CCA stages The step of.
15. methods according to claim 14, it is characterised in that when detecting the unauthorized load When ripple is idle in second delay cycle, the method also includes:
One packet of the station transmission, and judge whether to continue transmission, if it is not, then continuing executing with It is described to determine whether that data need the step of sending.
16. methods according to claim 15, it is characterised in that when the website is judged to continue During transmission packet, the method also includes:
The website produces the random back value, detects the unauthorized carrier wave in second time delay It is idle in cycle, continue executing with described the step of whether random back value is equal to 0 judged.
A kind of 17. methods for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages It is whether idle, if it is, whether the unauthorized carrier wave of detection is idle in the second delay cycle, if not, Random back value is produced then;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or Integer equal to 1;
Website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing executing with The step of whether judging random back value equal to 0.
18. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
First detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages It is whether idle in specified CCA time slots, if it is not, then sending the first notification message to the first generation module; Detect whether unauthorized carrier wave is idle in the first delay cycle, if it is, sending out to the first judge module Second notification message is sent, wherein, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n is big In or integer equal to 1, k is the integer more than or equal to 0, and when n is equal to 1, k is equal to 1;
First generation module, for receiving the first notification message, produces random back value;
First judge module, for receiving second notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
19. devices according to claim 18, it is characterised in that the first detection module is also used In:
It is idle in the specified CCA time slots in the initial CCA stages when the unauthorized carrier wave is detected When, detect whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing executing with The unauthorized carrier wave of the detection whether idle step in the specified CCA time slots in initial CCA stages; Wherein, when a length of (16+9n) μ s of second delay cycle.
20. devices according to claim 19, it is characterised in that the first detection module is also used In:
When detecting the unauthorized carrier wave and being idle in second delay cycle, mould is sent to first Block sends third notice message;
Also include:
First sending module, for receiving the third notice message, transmits a packet;
First judge module is additionally operable to:
Continue executing with and judge whether the step of continuing transmission.
21. devices according to claim 18, it is characterised in that the first detection module is concrete For:
For detecting whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then second notification message is sent to the first generation module;First the unauthorized carrier wave is performed successively (n+k) detection of secondary CCA time slots, if (n+k) is secondary to detect the free time, and is detected again The unauthorized carrier wave is idle in 16 μ s;Or, first detect the unauthorized carrier wave in 16 μ s Free time, then perform the detection of (n+k) secondary CCA time slots to the unauthorized carrier wave successively, if (n+k) It is secondary to detect the free time, then third notice message is sent to the first judge module.
22. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
Second detection module, for detecting the unauthorized carrier wave in initial idle channel estimating CCA ranks It is whether idle in the specified CCA time slots of section, if it is not, then send clematis stem to the second generation module knowing Message;Detect whether unauthorized carrier wave is idle in the specified CCA time slots in extension CCA stages, if It is then to detect whether unauthorized carrier wave is idle in the second delay cycle or the 3rd delay cycle, if it is, Then the 7th notification message is sent to the second judge module;
Second generation module, for receiving the 6th notification message, produces random back value;
Second judge module, for receiving the 7th notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
23. devices according to claim 22, it is characterised in that second judge module is also used In:
Whether the random back value is judged equal to 0, if it is, sending out to second detection module Send the 8th notification message;
Second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then the 6th notification message is sent to the second generation module;The 6th notification message is received, is detected non- Authorize carrier wave whether idle in the specified CCA time slots in extension CCA stages, if it is, detection is non- Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, sentencing to second Disconnected module sends the 5th notification message.
24. devices according to claim 23, it is characterised in that second judge module is also used In:
Judge that the random back value is not equal to 0, the 7th is sent to second detection module and notify to disappear Breath;
Second detection module is additionally operable to:
The 7th notification message is received, the unauthorized carrier wave of the execution detection is in the second delay cycle Whether idle step.
25. devices according to claim 22, it is characterised in that second detection module is concrete For:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as It is really no, then the 4th notification message is sent to the second generation module;Detect unauthorized carrier wave in extension CCA It is whether idle in the specified CCA time slots in stage, if it is, first being held to the unauthorized carrier wave successively The detection of row n or (n-1) secondary CCA time slots, if n or (n-1) secondary inspection are to the free time, and It is idle in 16 μ s that the unauthorized carrier wave is detected again;Or, first detect the unauthorized carrier wave and exist It is idle in 16 μ s, then the inspection for performing the secondary CCA time slots of n or (n-1) to the unauthorized carrier wave successively Survey, if n or (n-1) is secondary detects the free time, the 5th is sent to the second judge module and notify to disappear Breath.
26. devices according to claim 22, it is characterised in that second detection module is also used In:
Detect the unauthorized carrier wave to hurry in the specified CCA time slots in the extension CCA stages, after Whether unauthorized carrier wave described in continuous perform detection is empty in the specified CCA time slots in the extension CCA stages Not busy step.
27. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
3rd detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages It is whether idle in specified CCA time slots, if it is not, then sending the 8th notification message to the 3rd generation module; Detect whether unauthorized carrier wave is idle if it is, sending to the 3rd judge module in the second delay cycle 9th notification message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or equal to 1 integer;
3rd generation module, for receiving the 8th notification message, produces random back value;Wherein, produce Raw random back value is more than or equal to 1, and is less than or equal to q, sizes of the q for contention window;
3rd judge module, for receiving the 9th notification message, continues executing with and judges that random back value is It is not no the step of be equal to 0.
28. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
4th detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages It is whether idle in specified CCA time slots, if it is not, then sending the tenth notification message to the 4th generation module; Detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, sending out to the 4th judge module Send the 11st notification message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or Integer equal to 1;
4th generation module, for receiving the tenth notification message, produces random back value;
Computing module, for adding 1 by random back value;
4th judge module, for receiving the 11st notification message, continue executing with judge Jia 1 after with The step of whether machine fallback value is equal to 0.
29. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
5th detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages It is whether idle in specified CCA time slots, if it is, the detection unauthorized carrier wave is in the second time delay week It is whether idle in phase, if it is not, then sending the 12nd notification message to the 5th generation module;Wherein, When a length of (16+9n) μ s of two delay cycles, n is the integer more than or equal to 1;Detect unauthorized load Whether ripple is idle in the second delay cycle, if it is, send the 13rd to the 5th judge module notifying Message;
5th generation module, for receiving the 12nd notification message, produces random back value;
5th judge module, for receiving the 13rd notification message, continues executing with and judges random back value The step of whether equal to 0.
A kind of 30. methods for realizing listem-before-talk, it is characterised in that include:
According to the unauthorized carrier wave of detection, in observation window, in each predetermined period, whether idle testing result is calculated Tolerance amount;
Judge that calculated tolerance amount, more than pre-determined threshold, contention window is tuned up, and using after tuning up Contention window realize the process of listem-before-talk.
31. methods according to claim 30, it is characterised in that when judging described being calculated Tolerance amount be less than or equal to the pre-determined threshold when, the method also includes:
The contention window is turned down or the contention window is adjusted to into minima, and using the contention window after turning down Realize the process of listem-before-talk.
32. methods according to claim 30 or 31, it is characterised in that described non-according to detecting In each predetermined period, whether idle testing result computation measure amount includes in observation window to authorize carrier wave:
Determine that the tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is CCA The quantity of time slot, or testing result is busy and the quantity of predetermined period for CCA time slots, or detection knot Fruit is busy accumulation duration, or testing result is idle accumulation duration;
Or the quantity of the CCA time slots in the quantity and the observation window that testing result is busy predetermined period Between ratio, or testing result is busy and the quantity of predetermined period for CCA time slots and the observation Ratio between the quantity of the CCA time slots in window, or testing result is busy accumulation duration and the sight The ratio surveyed between the duration of window, or the duration that testing result is idle accumulation duration and the observation window Between ratio.
33. methods according to claim 30, it is characterised in that the method also includes:
The priority level of listem-before-talk is determined according to the service quality rating of business, it is preferential using what is determined The corresponding parameter of rank realizes the process of listem-before-talk;
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not Unauthorized carrier wave is obtained, or is judged using corresponding continuous parameters k2 of the priority level determined It is secondary to obtain unauthorized carrier wave in the initial CCA stages, the priority level of listem-before-talk is heightened, wherein, K1, k2 are the integer more than or equal to 1.
34. methods according to claim 30, it is characterised in that the method also includes:
Judge that transmission finds signal DRS, the priority level of listem-before-talk is adjusted to into limit priority Not.
35. methods according to claim 30, it is characterised in that the method also includes:
Judge the different physical channel of simultaneous transmission, the priority level of listem-before-talk is adjusted to into Service Quality The corresponding priority level of amount grade highest physical channel.
36. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
3rd computing module, for according to detect unauthorized carrier wave in observation window in each predetermined period whether Idle testing result computation measure amount;
5th judge module, for judging calculated tolerance amount more than pre-determined threshold, to adjustment mould Block sends the 15th notification message;
Adjusting module, for receiving the 15th notification message, contention window is tuned up, and using after tuning up Contention window realize the process of listem-before-talk.
37. devices according to claim 36, it is characterised in that the 5th judge module is also used In:
The calculated tolerance amount is judged less than or equal to the pre-determined threshold, to the adjustment mould Block sends the 16th notification message;
The adjusting module is additionally operable to:
The 16th notification message is received, the contention window is turned down or is adjusted to most the contention window Little value, and the process of listem-before-talk is realized using the contention window after turning down.
38. devices according to claim 36 or 37, it is characterised in that the described 3rd calculates mould Block specifically for:
Determine that the tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is CCA The quantity of time slot, or testing result is busy and the quantity of predetermined period for CCA time slots, or detection knot Fruit is busy accumulation duration, or testing result is idle accumulation duration;
Or the quantity of the CCA time slots in the quantity and the observation window that testing result is busy predetermined period Between ratio, or testing result is busy and the quantity of predetermined period for CCA time slots and the observation Ratio between the quantity of the CCA time slots in window, or testing result is busy accumulation duration and the sight The ratio surveyed between the duration of window, or the duration that testing result is idle accumulation duration and the observation window Between ratio.
39. devices according to claim 36, it is characterised in that also include:
Determining module, for the priority level of listem-before-talk is determined according to the service quality rating of business, adopts The process of listem-before-talk is realized with the corresponding parameter of the priority level determined;
5th judge module is additionally operable to:
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not Unauthorized carrier wave is obtained, or is judged using corresponding continuous parameters k2 of the priority level determined It is secondary to obtain unauthorized carrier wave in the initial CCA stages, the 17th notification message is sent to the adjusting module; Wherein, k1, k2 are the integer more than or equal to 1;
The adjusting module is additionally operable to:
The 17th notification message is received, the priority level of listem-before-talk is heightened.
40. devices according to claim 36, it is characterised in that the 5th judge module is also used In:
Judge that transmission finds signal DRS, the 18th notification message is sent to the adjusting module;
The adjusting module is additionally operable to:
The 18th notification message is received, the priority level of listem-before-talk is adjusted to into limit priority Not.
41. devices according to claim 36, it is characterised in that the 5th judge module is also used In:
Judge the different physical channel of simultaneous transmission, the 19th notification message is sent to the adjusting module;
The adjusting module is additionally operable to:
The 19th notification message is received, the priority level of listem-before-talk is adjusted to into service quality etc. The corresponding priority level of level highest physical channel.
A kind of 42. methods for realizing listem-before-talk, it is characterised in that include:
There are data to be sent in judging buffer area, or in multi-carrier polymerizing or frequency reuse or up multiplex Family carries out unauthorized carrier wave competition when being multiplexed when, or the random back value for judging to produce is more than or equal to pre- Gating limit value, or judge that data are reached, or after obtaining the time of the transmission data for determining, it is allowed to perform Self-dalay mechanism.
43. methods according to claim 42, it is characterised in that the execution self-dalay mechanism Number of times is less than or equal to the predetermined threshold value.
44. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
6th judge module, for judging to have data to be sent in buffer area, or in multi-carrier polymerizing or Frequency reuse or uplink multi-users carry out unauthorized carrier wave competition when being multiplexed when, or judge the random of generation Fallback value is more than or equal to predetermined threshold value, or judges that data are reached, or obtains the transmission data for determining Time after, to performing module send the 20th notification message;
Performing module, for receiving the 20th notification message, it is allowed to perform self-dalay mechanism.
CN201510622254.1A 2015-09-25 2015-09-25 Method and device for realizing listen before talk Active CN106559908B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201510622254.1A CN106559908B (en) 2015-09-25 2015-09-25 Method and device for realizing listen before talk
CN202011298719.XA CN112584359A (en) 2015-09-25 2016-08-11 Communication method, device and equipment
PCT/CN2016/094962 WO2017050060A1 (en) 2015-09-25 2016-08-12 Method and device for implementing listen-before-talk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510622254.1A CN106559908B (en) 2015-09-25 2015-09-25 Method and device for realizing listen before talk

Publications (2)

Publication Number Publication Date
CN106559908A true CN106559908A (en) 2017-04-05
CN106559908B CN106559908B (en) 2021-11-09

Family

ID=58385819

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510622254.1A Active CN106559908B (en) 2015-09-25 2015-09-25 Method and device for realizing listen before talk
CN202011298719.XA Pending CN112584359A (en) 2015-09-25 2016-08-11 Communication method, device and equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202011298719.XA Pending CN112584359A (en) 2015-09-25 2016-08-11 Communication method, device and equipment

Country Status (2)

Country Link
CN (2) CN106559908B (en)
WO (1) WO2017050060A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109314998A (en) * 2017-04-25 2019-02-05 华为技术有限公司 A kind of accidental access method and device
WO2019036909A1 (en) * 2017-08-22 2019-02-28 Nokia Technologies Oy Method, computer program and apparatus
CN112601233A (en) * 2020-11-03 2021-04-02 浙江华云信息科技有限公司 Authorization-free frequency band channel access method applied to smart power grid
WO2022077466A1 (en) * 2020-10-16 2022-04-21 Apple Inc. Semi-static channel access for traffic with different priorities

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019183938A1 (en) * 2018-03-30 2019-10-03 北京小米移动软件有限公司 Data transmission method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101258686A (en) * 2005-11-24 2008-09-03 诺基亚公司 Method, equipment and system for supporting measurement of 'fist hearing then talking' recognizing one or more non-occupied RF sub tape
CN104363657A (en) * 2014-11-06 2015-02-18 东莞宇龙通信科技有限公司 Device with base station function and method and system for data transmission
CN104469914A (en) * 2014-12-10 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Channel detection method and system, base station and terminal
CN104539405A (en) * 2015-01-28 2015-04-22 深圳酷派技术有限公司 Channel detection method, channel detection system, base station and terminal
CN104717686A (en) * 2015-03-31 2015-06-17 深圳酷派技术有限公司 Channel detection method of unauthorized frequency band and network cell equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101820690A (en) * 2009-02-26 2010-09-01 ***通信集团公司 Random access control method, system and equipment
CN102238722B (en) * 2010-04-30 2015-03-11 华为技术有限公司 Method for processing Un subframe configuration, base station and relay station
US20120238208A1 (en) * 2011-03-17 2012-09-20 Maik Bienas Mobile radio communication devices and servers
CN103428768B (en) * 2012-05-16 2016-12-14 华为技术有限公司 A kind of cut-in method, base station, access point and subscriber equipment
EP2862398B1 (en) * 2012-06-13 2017-09-06 Telefonaktiebolaget LM Ericsson (publ) A method and node for paging in a radio access network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101258686A (en) * 2005-11-24 2008-09-03 诺基亚公司 Method, equipment and system for supporting measurement of 'fist hearing then talking' recognizing one or more non-occupied RF sub tape
CN104363657A (en) * 2014-11-06 2015-02-18 东莞宇龙通信科技有限公司 Device with base station function and method and system for data transmission
CN104469914A (en) * 2014-12-10 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Channel detection method and system, base station and terminal
CN104539405A (en) * 2015-01-28 2015-04-22 深圳酷派技术有限公司 Channel detection method, channel detection system, base station and terminal
CN104717686A (en) * 2015-03-31 2015-06-17 深圳酷派技术有限公司 Channel detection method of unauthorized frequency band and network cell equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BROADCOM CORPORATION: "《R1-150584 3GPP TSG RAN WG1 Meeting #80》", 13 February 2015 *
PAUL NIKOLICH: "《RP-150543_IEEE802_LMSC》", 13 March 2015 *
ZTE: "《R1-151809 3GPP TSG RAN WG1 Meeting #80bis》", 24 April 2015 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109314998A (en) * 2017-04-25 2019-02-05 华为技术有限公司 A kind of accidental access method and device
CN109314998B (en) * 2017-04-25 2020-12-15 华为技术有限公司 Random access method and device
US10999875B2 (en) 2017-04-25 2021-05-04 Huawei Technologies Co., Ltd. Random access method and apparatus
WO2019036909A1 (en) * 2017-08-22 2019-02-28 Nokia Technologies Oy Method, computer program and apparatus
WO2022077466A1 (en) * 2020-10-16 2022-04-21 Apple Inc. Semi-static channel access for traffic with different priorities
US11979911B2 (en) 2020-10-16 2024-05-07 Apple Inc. Semi-static channel access for traffic with different priorities
CN112601233A (en) * 2020-11-03 2021-04-02 浙江华云信息科技有限公司 Authorization-free frequency band channel access method applied to smart power grid
CN112601233B (en) * 2020-11-03 2023-10-20 浙江华云信息科技有限公司 Unlicensed frequency band channel access method applied to smart grid

Also Published As

Publication number Publication date
WO2017050060A1 (en) 2017-03-30
CN112584359A (en) 2021-03-30
CN106559908B (en) 2021-11-09

Similar Documents

Publication Publication Date Title
CN104994591B (en) Method of adjustment, adjustment system and the base station of channel occupancy probabilities
CN106559908A (en) A kind of method and apparatus for realizing listem-before-talk
CN105636231B (en) A kind of channel-monitoring method and apparatus
CN104363657B (en) Data transmission method, system and the equipment with base station functions
CN101801000B (en) Secondary user access method for maximization of capacity of dynamic spectrum sharing system
CN108633106B (en) Random access and indicating means, device after a kind of random access backoff
EP3030035B1 (en) Station and access point for managing contention in a wireless communications system
CN106452701A (en) Unauthorized multi-carrier listen before talk (LBT) execution method and device
CN106162917B (en) Method and equipment for preempting transmission resources on unauthorized carrier waves
CN105393608B (en) A kind of method of user equipment and power distribution
CN105517181B (en) Carrier resource processing method and device of unauthorized carrier and transmission node
EP3163932B1 (en) Interference coordination method and device
CN103517278B (en) Access the competing method of public frequency band
CN107006015A (en) The method and communication equipment communicated using frequency spectrum resource
CN103580792B (en) Resource allocation method and device
Khairy et al. A hybrid-LBT MAC with adaptive sleep for LTE LAA coexisting with Wi-Fi over unlicensed band
CN108243498A (en) A kind of method and apparatus of satellite system resource allocation
JP6587259B2 (en) Unlicensed carrier competition method and apparatus
CN105634859B (en) LBT channel detection method and system, base station and terminal based on load
CN101959246B (en) Method for reporting scheduling information
CN104219772B (en) A kind of channel access method and channel access device
CN107318150A (en) A kind of user of LTE U autonomous systems is resident flow
CN106031286B (en) Base station, user equipment and the method for LBT are realized based on mobile communication system
CN109565692A (en) Use the ascending transmission method of unlicensed spectrum, resource allocation methods, user equipment and base station
CN106171007B (en) A kind of method, apparatus and terminal of determining reselection target cell

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant