CN106559908A - A kind of method and apparatus for realizing listem-before-talk - Google Patents
A kind of method and apparatus for realizing listem-before-talk Download PDFInfo
- Publication number
- CN106559908A CN106559908A CN201510622254.1A CN201510622254A CN106559908A CN 106559908 A CN106559908 A CN 106559908A CN 201510622254 A CN201510622254 A CN 201510622254A CN 106559908 A CN106559908 A CN 106559908A
- Authority
- CN
- China
- Prior art keywords
- carrier wave
- cca
- idle
- unauthorized carrier
- equal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 142
- 238000001514 detection method Methods 0.000 claims description 142
- 230000005540 biological transmission Effects 0.000 claims description 65
- 238000012360 testing method Methods 0.000 claims description 60
- 230000008569 process Effects 0.000 claims description 51
- 238000009825 accumulation Methods 0.000 claims description 34
- 230000007246 mechanism Effects 0.000 claims description 25
- 238000007689 inspection Methods 0.000 claims description 17
- 229940075591 dalay Drugs 0.000 claims description 15
- 235000013399 edible fruits Nutrition 0.000 claims description 13
- 230000000379 polymerizing effect Effects 0.000 claims description 7
- 241000218158 Clematis Species 0.000 claims description 2
- 230000006870 function Effects 0.000 description 12
- 239000000203 mixture Substances 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 230000001186 cumulative effect Effects 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004904 shortening Methods 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 101100392078 Caenorhabditis elegans cat-4 gene Proteins 0.000 description 1
- 241000083513 Punctum Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
- H04W52/0219—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave where the power saving management affects multiple terminals
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method and apparatus for realizing listem-before-talk, including:Whether website detects unauthorized carrier wave idle in the specified CCA time slots in initial idle channel estimating CCA stages;If it is not, then producing random back value;Then website detects whether unauthorized carrier wave is idle in the first delay cycle, if it is, continuing executing with the step of whether judging random back value equal to 0;Wherein, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n is the integer more than or equal to 1, and k is the integer more than or equal to 0, and when n is equal to 1, k is equal to 1.By the solution of the present invention, website is detecting unauthorized carrier wave free time in the first delay cycle, just performs the step of whether judging random back value equal to 0, as the first delay cycle is 34 μ s when n is equal to 1, this improves the fairness with WiFi system competition.
Description
Technical field
The present invention relates to unauthorized carrier wave field, espespecially one kind realizes listem-before-talk (LBT, Listen Before
Talk method and apparatus).
Background technology
At present, the communication network of Long Term Evolution (LTE, Long Term Evolution) is all portion
Affix one's name to what is runed in carrier wave is authorized, with the development of LTE, some companies propose " suggestion research LTE
The Qualcomm of the problem being deployed in unauthorized carrier wave ", such as U.S. thinks:With data service
Rapid growth, in the near future, authorize carrier wave by can not bear fastext increase bring it is huge
Data volume.Consider, by disposing LTE in unauthorized carrier wave, the data in mandate carrier wave to be shared with this
Flow, can solve business and increase the data volume pressure for bringing.Meanwhile, unauthorized carrier wave has following spy
Point:On the one hand, as unauthorized carrier wave need not be bought, or carrier resource is zero cost, therefore non-
Authorize carrier wave free or low expense;On the other hand, as personal, enterprise can participate in deployment, equipment
The equipment of business can also, therefore the requirements for sale of unauthorized carrier wave is low;Furthermore, unauthorized carrier wave has altogether
Enjoying property, when all being runed wherein by multiple different systems or same system different operators run wherein
When, it may be considered that the mode of some shared resources, to improve carrier wave efficiency.
Although in sum, LTE has obvious advantage in being deployed in unauthorized carrier wave, in portion
During administration, still have problems;Mainly include:Wireless access technology is more (across different communication marks
Standard, cooperation are difficult, and network topology is various) and wireless access website it is many (number of users is big, the difficulty that cooperates greatly,
Centralized management expense is big).As wireless access technology is more, there will be in unauthorized carrier wave various
Wireless system, be difficult to each other coordinate, serious interference.Therefore, it is deployed in for LTE unauthorized
In carrier wave, it is still desirable to support that the control of unauthorized carrier wave, majority state require system in unauthorized carrier wave
During middle deployment, need to support LBT mechanism.Can be avoided between adjacent system by LBT mechanism while
It is the interference for bringing each other using unauthorized carrier wave.And travel further into competition fallback mechanism, i.e., it is adjacent
Near system website (the usually neighbouring transmission node of same system), can after competing fallback mechanism
To avoid the neighbouring transmission node of identical systems while the interference brought during using unauthorized carrier wave.
At present, LTE is being studied and for LTE to be deployed in unauthorized carrier wave (referred to as LAA systems),
Wherein most companies think that LAA system descendings will be adopted and realize awarding for non-based on fallback mechanism is competed
Carrier wave is usufructuary seizes for power.But there is presently no determination and be adapted to LAA systems, especially considering
After the relative fairness of the competition mechanism of WiFi system, the flow process of the presently disclosed method for realizing LBT
Figure is as shown in figure 1, the method is generally comprised:
Step 100, website determine whether that data need to send, if it has, then execution step 101, such as
Fruit does not then continue executing with step 100.
Step 101, website detect specified clear channel assessment (CCA) of the unauthorized carrier wave in the initial CCA stages
It is whether idle in (CCA, Clear Channel Assessment) time slot, if it is, execution step
102, if not then execution step 104.
In this step, the time of the specified CCA time slots in initial CCA stages can be 9 microseconds (μ s).
Step 102, website detect whether unauthorized carrier wave is idle in delay cycle, if it is, holding
Row step 103, if it is not, then return to step 101.
In this step, delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 103, one packet of station transmission, and judge whether to continue transmission, if it is, holding
Row step 104, if it is not, then return to step 100.
Step 100~103 are the initial CCA stages.
Step 104, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 105, website detect whether unauthorized carrier wave is idle in delay cycle, if it is, holding
Row step 106, if it is not, then continuing executing with step 105.
Whether step 106, website judge N equal to 0, if it is, return to step 103, if it is not,
Then execution step 107.
Step 107, website perform N=N-1, or do nothing.
Step 108, do not perceive in extension CCA time slots, and execution step 105, or website inspection
Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 106, if
It is not, then return to step 105.
Step 104~108 are the extension CCA stages.
Wherein, when step 107 and step 108 do not perform the direct return to step 105 of any action,
Realize self-dalay mechanism.
In the existing method for realizing LBT, if in the initial CCA stages, website detects unauthorized
Carrier wave is idle in CCA time slots, then be directly entered the extension CCA stages, if the N values for producing are 0,
And detect that unauthorized carrier wave is idle within the time delay CCA cycles, when the value of n is 1, website is only examined
Measure 25 μ s free time just carry out data transmission, and WiFi system need detect 34 μ s free time just carry out data
Transmission, therefore, it is relatively low with the fairness of WiFi system competition.
The content of the invention
In order to solve the above problems, the present invention proposes a kind of method and apparatus for realizing listem-before-talk, energy
Enough fairness improved with WiFi system competition.
In order to achieve the above object, the present invention proposes a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages
It is whether idle;If it is not, then producing random back value;
Then website detects whether unauthorized carrier wave is idle in the first delay cycle, if it is, continuing
The step of whether execution judges random back value equal to 0;Wherein, the first delay cycle when it is a length of [16+9 ×
(n+k)] μ s, n are the integer more than or equal to 1, and k is the integer more than or equal to 0, and works as n
During equal to 1, k is equal to 1.
Preferably, when the unauthorized carrier wave is detected in the specified CCA in the initial CCA stages
When idle in gap, the method also includes:
The website detects whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then
Continue executing with the unauthorized carrier wave of the detection whether idle in the specified CCA time slots in initial CCA stages
The step of;Wherein, when a length of (16+9n) μ s of second delay cycle.
Preferably, when detecting the unauthorized carrier wave and being idle in second delay cycle, the party
Method also includes:
One packet of the station transmission, and continue executing with the step of judging whether continuation transmission.
Preferably, when the n is more than 1, the k is equal to 0 or 1.
Preferably, the website detects unauthorized carrier wave free time within the first time delay CCA cycles includes:
The website first to unauthorized carrier wave perform the detection of (n+k) secondary CCA time slots successively, such as
Really (n+k) is secondary detects the free time, and it is idle in 16 μ s to detect the unauthorized carrier wave again;
Or, it is idle in the 16 μ s that the website first detects the unauthorized carrier wave, then non-awards to described
Power carrier wave performs the detection of (n+k) secondary CCA time slots successively, if (n+k) is secondary to detect sky
It is not busy.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified clear channel assessment (CCA) CCA time slots in initial CCA stages
It is whether idle;If it is not, then producing random back value;
Then website detects whether unauthorized carrier wave is idle in CCA time slots, if it is, detection is non-
Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, continuing executing with
The step of whether judging random back value equal to 0.
Preferably, when the website detects unauthorized carrier wave in the specified CCA in extension CCA stages
Also include before free time in gap:
The website judges the random back value whether equal to 0, when judging described random back value etc.
When 0.
Preferably, when the website judges that the random back value is not equal to 0, the method also includes:
The website performs the unauthorized carrier wave of the detection whether idle step in the second delay cycle.
Preferably, when a length of (16+9n) μ s of second delay cycle, n is more than or equal to 1
Integer, when a length of [16+9 × (n-1)] μ s of the 3rd delay cycle
The website detects unauthorized carrier wave idle packet in the second delay cycle or the 3rd delay cycle
Include:
The website first performs the inspection of the secondary CCA time slots of n or (n-1) successively to the unauthorized carrier wave
Survey, if n or (n-1) secondary inspection are to the free time, and detect the unauthorized carrier wave again in 16 μ s
It is idle;
Or, it is idle in the 16 μ s that the website first detects the unauthorized carrier wave, then non-awards to described
Power carrier wave performs the detection of the secondary CCA time slots of n or (n-1) successively, if n or (n-1) are secondary
Detect the free time.
Preferably, when the website detects finger of the unauthorized carrier wave in the extension CCA stages
Determine busy in CCA time slots, the method also includes:
The website continues executing with the detection unauthorized carrier wave when the specified CCA in CCA stages is extended
Whether idle step in gap.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified clear channel assessment (CCA) CCA time slots in initial CCA stages
It is whether idle, if it is not, then producing random back value;Wherein, the random back value of generation is more than or waits
In 1, and q is less than or equal to, sizes of the q for contention window;
Then website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing
The step of whether execution judges random back value equal to 0;Wherein, the second delay cycle when it is a length of
(16+9n) μ s, n are the integer more than or equal to 1.
Preferably, when the website judge continue transmission packet when, the random back value be more than or
Equal to 0 and less than or equal to (q-1).
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages
It is whether idle, if it is not, then producing random back value;
Random back value is added 1 by website;
Then website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing
The step of random back value after judging Jia 1 is performed whether equal to 0;Wherein, the second delay cycle when
A length of (16+9n) μ s, n are the integer more than or equal to 1.
Preferably, when the unauthorized carrier wave is detected in the specified CCA in the initial CCA stages
When idle in gap, the method also includes:
The website detects whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then
Continue executing with the unauthorized carrier wave of the detection whether idle in the specified CCA time slots in initial CCA stages
The step of.
Preferably, when detecting the unauthorized carrier wave and being idle in second delay cycle, the party
Method also includes:
One packet of the station transmission, and judge whether to continue transmission, if it is not, then continuing executing with
It is described to determine whether that data need the step of sending.
Preferably, when the website judges to continue transmission packet, the method also includes:
The website produces the random back value, detects the unauthorized carrier wave in second time delay
It is idle in cycle, continue executing with described the step of whether random back value is equal to 0 judged.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages
It is whether idle, if it is, whether the unauthorized carrier wave of detection is idle in the second delay cycle, if not,
Random back value is produced then;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or
Integer equal to 1;
Website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing executing with
The step of whether judging random back value equal to 0.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
First detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages
It is whether idle in specified CCA time slots, if it is not, then sending the first notification message to the first generation module;
Detect whether unauthorized carrier wave is idle in the first delay cycle, if it is, sending out to the first judge module
Second notification message is sent, wherein, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n is big
In or integer equal to 1, k is the integer more than or equal to 0, and when n is equal to 1, k is equal to 1;
First generation module, for receiving the first notification message, produces random back value;
First judge module, for receiving second notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
Preferably, the first detection module is additionally operable to:
It is idle in the specified CCA time slots in the initial CCA stages when the unauthorized carrier wave is detected
When, detect whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing executing with
The unauthorized carrier wave of the detection whether idle step in the specified CCA time slots in initial CCA stages;
Wherein, when a length of (16+9n) μ s of second delay cycle.
Preferably, the first detection module is additionally operable to:
When detecting the unauthorized carrier wave and being idle in second delay cycle, mould is sent to first
Block sends third notice message;
Also include:
First sending module, for receiving the third notice message, transmits a packet;
First judge module is additionally operable to:
Continue executing with and judge whether the step of continuing transmission.
Preferably, the first detection module specifically for:
For detecting whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then second notification message is sent to the first generation module;First the unauthorized carrier wave is performed successively
(n+k) detection of secondary CCA time slots, if (n+k) is secondary to detect the free time, and is detected again
The unauthorized carrier wave is idle in 16 μ s;Or, first detect the unauthorized carrier wave in 16 μ s
Free time, then perform the detection of (n+k) secondary CCA time slots to the unauthorized carrier wave successively, if (n+k)
It is secondary to detect the free time, then third notice message is sent to the first judge module.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
Second detection module, for detecting the unauthorized carrier wave in initial idle channel estimating CCA ranks
It is whether idle in the specified CCA time slots of section, if it is not, then send clematis stem to the second generation module knowing
Message;Detect whether unauthorized carrier wave is idle in the specified CCA time slots in extension CCA stages, if
It is then to detect whether unauthorized carrier wave is idle in the second delay cycle or the 3rd delay cycle, if it is,
Then the 7th notification message is sent to the second judge module;
Second generation module, for receiving the 6th notification message, produces random back value;
Second judge module, for receiving the 7th notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
Preferably, second judge module is additionally operable to:
Whether the random back value is judged equal to 0, if it is, sending out to second detection module
Send the 8th notification message;
Second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then the 6th notification message is sent to the second generation module;The 6th notification message is received, is detected non-
Authorize carrier wave whether idle in the specified CCA time slots in extension CCA stages, if it is, detection is non-
Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, sentencing to second
Disconnected module sends the 5th notification message.
Preferably, second judge module is additionally operable to:
Judge that the random back value is not equal to 0, the 7th is sent to second detection module and notify to disappear
Breath;
Second detection module is additionally operable to:
The 7th notification message is received, the unauthorized carrier wave of the execution detection is in the second delay cycle
Whether idle step.
Preferably, second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then the 4th notification message is sent to the second generation module;Detect unauthorized carrier wave in extension CCA
It is whether idle in the specified CCA time slots in stage, if it is, first being held to the unauthorized carrier wave successively
The detection of row n or (n-1) secondary CCA time slots, if n or (n-1) secondary inspection are to the free time, and
It is idle in 16 μ s that the unauthorized carrier wave is detected again;Or, first detect the unauthorized carrier wave and exist
It is idle in 16 μ s, then the inspection for performing the secondary CCA time slots of n or (n-1) to the unauthorized carrier wave successively
Survey, if n or (n-1) is secondary detects the free time, the 5th is sent to the second judge module and notify to disappear
Breath.
Preferably, second detection module is additionally operable to:
Detect the unauthorized carrier wave to hurry in the specified CCA time slots in the extension CCA stages, after
Whether unauthorized carrier wave described in continuous perform detection is empty in the specified CCA time slots in the extension CCA stages
Not busy step.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
3rd detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages
It is whether idle in specified CCA time slots, if it is not, then sending the 8th notification message to the 3rd generation module;
Detect whether unauthorized carrier wave is idle if it is, sending to the 3rd judge module in the second delay cycle
9th notification message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or equal to
1 integer;
3rd generation module, for receiving the 8th notification message, produces random back value;Wherein, produce
Raw random back value is more than or equal to 1, and is less than or equal to q, sizes of the q for contention window;
3rd judge module, for receiving the 9th notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
4th detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages
It is whether idle in specified CCA time slots, if it is not, then sending the tenth notification message to the 4th generation module;
Detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, sending out to the 4th judge module
Send the 11st notification message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or
Integer equal to 1;
4th generation module, for receiving the tenth notification message, produces random back value;
Computing module, for adding 1 by random back value;
4th judge module, for receiving the 11st notification message, continue executing with judge Jia 1 after with
The step of whether machine fallback value is equal to 0.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
5th detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages
It is whether idle in specified CCA time slots, if it is, the detection unauthorized carrier wave is in the second time delay week
It is whether idle in phase, if it is not, then sending the 12nd notification message to the 5th generation module;Wherein,
When a length of (16+9n) μ s of two delay cycles, n is the integer more than or equal to 1;Detect unauthorized load
Whether ripple is idle in the second delay cycle, if it is, send the 13rd to the 5th judge module notifying
Message;
5th generation module, for receiving the 12nd notification message, produces random back value;
5th judge module, for receiving the 13rd notification message, continues executing with and judges random back value
The step of whether equal to 0.
The invention allows for a kind of method for realizing listem-before-talk, including:
According to the unauthorized carrier wave of detection, in observation window, in each predetermined period, whether idle testing result is calculated
Tolerance amount;
Judge that calculated tolerance amount, more than pre-determined threshold, contention window is tuned up, and using after tuning up
Contention window realize the process of listem-before-talk.
Preferably, when judging that the calculated tolerance amount is less than or equal to the pre-determined threshold,
The method also includes:
The contention window is turned down or the contention window is adjusted to into minima, and using the contention window after turning down
Realize the process of listem-before-talk.
Preferably, it is described according to detecting that whether idle unauthorized carrier wave in each predetermined period in observation window
Testing result computation measure amount includes:
Determine that the tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is CCA
The quantity of time slot, or testing result is busy and the quantity of predetermined period for CCA time slots, or detection knot
Fruit is busy accumulation duration, or testing result is idle accumulation duration;
Or the quantity of the CCA time slots in the quantity and the observation window that testing result is busy predetermined period
Between ratio, or testing result is busy and the quantity of predetermined period for CCA time slots and the observation
Ratio between the quantity of the CCA time slots in window, or testing result is busy accumulation duration and the sight
The ratio surveyed between the duration of window, or the duration that testing result is idle accumulation duration and the observation window
Between ratio.
Preferably, the method also includes:
The priority level of listem-before-talk is determined according to the service quality rating of business, it is preferential using what is determined
The corresponding parameter of rank realizes the process of listem-before-talk;
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not
Unauthorized carrier wave is obtained, or is judged using corresponding continuous parameters k2 of the priority level determined
It is secondary to obtain unauthorized carrier wave in the initial CCA stages, the priority level of listem-before-talk is heightened, wherein,
K1, k2 are the integer more than or equal to 1.
Preferably, the method also includes:
Judge that transmission finds signal DRS, the priority level of listem-before-talk is adjusted to into limit priority
Not.
Preferably, the method also includes:
Judge the different physical channel of simultaneous transmission, the priority level of listem-before-talk is adjusted to into Service Quality
The corresponding priority level of amount grade highest physical channel.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
3rd computing module, for according to detect unauthorized carrier wave in observation window in each predetermined period whether
Idle testing result computation measure amount;
5th judge module, for judging calculated tolerance amount more than pre-determined threshold, to adjustment mould
Block sends the 15th notification message;
Adjusting module, for receiving the 15th notification message, contention window is tuned up, and using after tuning up
Contention window realize the process of listem-before-talk.
Preferably, the 5th judge module is additionally operable to:
The calculated tolerance amount is judged less than or equal to the pre-determined threshold, to the adjustment mould
Block sends the 16th notification message;
The adjusting module is additionally operable to:
The 16th notification message is received, the contention window is turned down or is adjusted to most the contention window
Little value, and the process of listem-before-talk is realized using the contention window after turning down.
Preferably, the 3rd computing module specifically for:
Determine that the tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is CCA
The quantity of time slot, or testing result is busy and the quantity of predetermined period for CCA time slots, or detection knot
Fruit is busy accumulation duration, or testing result is idle accumulation duration;
Or the quantity of the CCA time slots in the quantity and the observation window that testing result is busy predetermined period
Between ratio, or testing result is busy and the quantity of predetermined period for CCA time slots and the observation
Ratio between the quantity of the CCA time slots in window, or testing result is busy accumulation duration and the sight
The ratio surveyed between the duration of window, or the duration that testing result is idle accumulation duration and the observation window
Between ratio.
Preferably, also include:
Determining module, for the priority level of listem-before-talk is determined according to the service quality rating of business, adopts
The process of listem-before-talk is realized with the corresponding parameter of the priority level determined;
5th judge module is additionally operable to:
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not
Unauthorized carrier wave is obtained, or is judged using corresponding continuous parameters k2 of the priority level determined
It is secondary to obtain unauthorized carrier wave in the initial CCA stages, the 17th notification message is sent to the adjusting module;
Wherein, k1, k2 are the integer more than or equal to 1;
The adjusting module is additionally operable to:
The 17th notification message is received, the priority level of listem-before-talk is heightened.
Preferably, the 5th judge module is additionally operable to:
Judge that transmission finds signal DRS, the 18th notification message is sent to the adjusting module;
The adjusting module is additionally operable to:
The 18th notification message is received, the priority level of listem-before-talk is adjusted to into limit priority
Not.
Preferably, the 5th judge module is additionally operable to:
Judge the different physical channel of simultaneous transmission, the 19th notification message is sent to the adjusting module;
The adjusting module is additionally operable to:
The 19th notification message is received, the priority level of listem-before-talk is adjusted to into service quality etc.
The corresponding priority level of level highest physical channel.
The invention allows for a kind of method for realizing listem-before-talk, including:
There are data to be sent in judging buffer area, or in multi-carrier polymerizing or frequency reuse or up multiplex
Family carries out unauthorized carrier wave competition when being multiplexed when, or the random back value for judging to produce is more than or equal to pre-
Gating limit value, or judge that data are reached, or after obtaining the time of the transmission data for determining, it is allowed to perform
Self-dalay mechanism.
Preferably, the number of times for performing self-dalay mechanism is less than or equal to the predetermined threshold value.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
6th judge module, for judging to have data to be sent in buffer area, or in multi-carrier polymerizing or
Frequency reuse or uplink multi-users carry out unauthorized carrier wave competition when being multiplexed when, or judge the random of generation
Fallback value is more than or equal to predetermined threshold value, or judges that data are reached, or obtains the transmission data for determining
Time after, to performing module send the 20th notification message;
Performing module, for receiving the 20th notification message, it is allowed to perform self-dalay mechanism.
Compared with prior art, technical scheme includes:Website detects unauthorized carrier wave first
It is whether idle in the specified CCA time slots in stage beginning CCA;If it is not, then producing random back value;
Website detects whether unauthorized carrier wave is idle in the first delay cycle, if it is, continuing executing with judgement
The step of whether random back value is equal to 0;Wherein, the first delay cycle when a length of [16+9 × (n+k)]
μ s, n are the integer more than or equal to 1, and k is the integer more than or equal to 0, and when n is equal to 1,
K is equal to 1.By the solution of the present invention, website is detecting unauthorized carrier wave sky in the first delay cycle
In the spare time, just perform the step of whether random back value being judged equal to 0, as the first delay cycle is equal in n
It is 34 μ s when 1, this improves the fairness with WiFi system competition.
Description of the drawings
Below the accompanying drawing in the embodiment of the present invention is illustrated, the accompanying drawing in embodiment is for this
Bright further understands, and is used for explaining the present invention together with description, does not constitute to present invention protection model
The restriction enclosed.
Fig. 1 is the flow chart of the existing method for realizing listem-before-talk;
Fig. 2 is the flow chart of the method that the present invention realizes listem-before-talk;
The flow chart that Fig. 3 realizes the method for listem-before-talk for first embodiment of the invention;
The flow chart that Fig. 4 realizes the method for listem-before-talk for second embodiment of the invention;
The flow chart that Fig. 5 realizes the method for listem-before-talk for third embodiment of the invention;
The flow chart that Fig. 6 realizes the method for listem-before-talk for fourth embodiment of the invention;
The flow chart that Fig. 7 realizes the method for listem-before-talk for fifth embodiment of the invention;
The flow chart that Fig. 8 realizes the method for listem-before-talk for sixth embodiment of the invention;
Fig. 9 be the present invention the first realize listem-before-talk device structure composition schematic diagram;
Figure 10 is the structure composition schematic diagram of the device that the present invention realizes listem-before-talk for second;
Figure 11 be the present invention the third realize listem-before-talk device structure composition schematic diagram;
Figure 12 is the structure composition schematic diagram of the device that the 4th kind of the present invention realizes listem-before-talk;
Figure 13 is the structure composition schematic diagram of the device that the 4th kind of the present invention realizes listem-before-talk.
Specific embodiment
For the ease of the understanding of those skilled in the art, below in conjunction with the accompanying drawings the present invention is further retouched
State, can not be used for limiting the scope of the invention.It should be noted that in the case where not conflicting,
The various modes in embodiment and embodiment in the application can be mutually combined.
Referring to Fig. 2, the present invention proposes a kind of method for realizing LBT, including:
Step 200, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages
The no free time;If it is not, then producing random back value.
In this step, website can be using unauthorized carrier wave send data equipment, such as base station, movement
Terminal etc..
In this step, how website detects specified CCA time slot of the unauthorized carrier wave in the initial CCA stages
Inside the free time belongs to the known technology of those skilled in the art, the protection model being not intended to limit the present invention
Enclose, repeat no more here.
It is in this step, empty in the specified CCA time slots in initial CCA stages when unauthorized carrier wave is detected
Idle, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing to hold
The row unauthorized carrier wave of detection whether idle step in the specified CCA time slots in initial CCA stages;Its
In, when a length of (16+9n) μ s of the second delay cycle.
Wherein, when detecting unauthorized carrier wave and being idle in the second delay cycle, one number of station transmission
According to bag, and continue executing with the step of judging whether continuation transmission.
Step 201, and then website detect whether unauthorized carrier wave idle in the first delay cycle, if
It is then to continue executing with the step of whether judging random back value equal to 0.
In this step, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n be more than or equal to
1 integer, k are the integer more than or equal to 0, and when n is equal to 1, k is equal to 1.
Wherein, when n is more than 1, k is equal to 0 or 1.
Wherein, website detects unauthorized carrier wave free time in the first delay cycle includes:
Website first performs the detection of (n+k) secondary CCA time slots successively to unauthorized carrier wave, if (n+k)
It is secondary to detect the free time, and it is idle in 16 μ s to detect unauthorized carrier wave again;
Or, it is idle in the 16 μ s that website first detects unauthorized carrier wave, then unauthorized carrier wave is held successively
The detection of the secondary CCA time slots of row (n+k), if (n+k) is secondary to detect the free time.
That is, website by the duration of [16+9 × (n+k)] μ s be divided into (n+k) individual CCA time slots and
16 μ s are detected respectively, are hurried when unauthorized carrier wave is detected in any one CCA time slot or 16 μ s
When, it is believed that unauthorized carrier wave hurries in the first delay cycle;When detecting unauthorized carrier wave in all CCA
When idle in time slot and 16 μ s, just think that unauthorized carrier wave is idle in the first delay cycle.
Wherein, when website detects unauthorized carrier wave busy in the first delay cycle, website is continued executing with
Detect unauthorized carrier wave whether idle step in the first delay cycle.
In said method, by when a length of [16+9 × (n+k)] the μ s for arranging the first delay cycle, and work as
When n is equal to 1, k is equal to 1, it is ensured that website can carry out the detection of 34 μ s when n is equal to 1, improves
With the fairness of WiFi system competition.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages;Such as
It is really no, then produce random back value;Then website detects finger of the unauthorized carrier wave in the extension CCA stages
Determine whether idle in CCA time slots, if it is, the unauthorized carrier wave of detection is in the second delay cycle or the
It is whether idle in three delay cycles, if it is, continue executing with judging whether random back value is equal to 0
Step.
Wherein, when a length of (16+9n) μ s of the second delay cycle, n is the integer more than or equal to 1,
When a length of [16+9 × (n-1)] μ s of the 3rd delay cycle.
Wherein, detecting unauthorized carrier wave in website also includes before the free time in CCA time slots:
Whether website judges random back value equal to 0, when judging that the random back value is equal to 0.
Wherein, hurry in the specified CCA time slots in extension CCA stages when website detects unauthorized carrier wave
When, whether website continues executing with the unauthorized carrier wave of detection in the specified CCA time slots in extension CCA stages
Idle step.
Wherein, when website judges that random back value is not equal to 0, the unauthorized carrier wave of website perform detection
The whether idle step in the second delay cycle.
Wherein, website detects unauthorized carrier wave idle packet in the second delay cycle or the 3rd delay cycle
Include:
Website first performs the detection of the secondary CCA time slots of n or (n-1) successively to unauthorized carrier wave, if
N or (n-1) secondary inspection are to the free time, and it is idle in 16 μ s to detect unauthorized carrier wave again;
Or, it is idle in the 16 μ s that website first detects unauthorized carrier wave, then unauthorized carrier wave is held successively
The detection of row n or (n-1) secondary CCA time slots, if n or (n-1) is secondary detects the free time.
That is, the duration of (16+9n) μ s or [16+9 × (n-1)] μ s is divided into n or (n-1) by website
Individual CCA time slots and 16 μ s are detected respectively, when detecting unauthorized carrier wave in any one CCA
Busy in time slot or 16 μ s, it is believed that unauthorized carrier wave hurries in the second delay cycle or the 3rd delay cycle;
When detecting unauthorized carrier wave and being idle in all CCA time slots and 16 μ s, unauthorized carrier wave is just thought
It is idle in the second delay cycle or the 3rd delay cycle.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then produce random back value;Wherein, the random back value of generation is more than or equal to 1, and is less than
Or it is equal to q, sizes of the q for contention window;Then website detects that unauthorized carrier wave is in the second delay cycle
The no free time, if it is, continuing executing with the step of whether judging random back value equal to 0.
Wherein, when a length of (16+9n) μ s of the second delay cycle, n is the integer more than or equal to 1.
Wherein, when website judges to continue transmission packet, random back value is more than or equal to 0 and little
In or be equal to (q-1).
After said method, the random back value of generation is necessarily not equal to 0, therefore, website is at least needed
Detect unauthorized carrier wave idle in the second delay cycle and extension CCA time slots, just carry out data
The transmission of bag, so as to improve the fairness with WiFi competitions.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then produce random back value;Random back value is added 1 by website;Then website detects unauthorized load
Whether ripple is idle in the second delay cycle, if it is, continue executing with judging the random back after Jia 1
The step of whether value is equal to 0;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than
Or the integer equal to 1.
Wherein, when detecting unauthorized carrier wave and being idle in the specified CCA time slots in initial CCA stages,
Website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing executing with detection
Unauthorized carrier wave whether idle step in the specified CCA time slots in initial CCA stages.
Wherein, when detecting unauthorized carrier wave and being idle in the second delay cycle, one number of station transmission
According to bag, and judge whether to continue transmission, if it is not, then continue executing with determining whether that data need to send
The step of.
Wherein, when website judges to continue transmission packet, website produces random back value, detects
Unauthorized carrier wave is idle in second delay cycle, continues executing with and judges whether random back value is equal to
0 the step of.
After said method, the random back value of generation is necessarily not equal to 0 after adding 1, therefore, website
At least need unauthorized carrier wave to be detected in the second delay cycle and extend the free time in CCA time slots, just enter
The transmission of row packet, so as to improve the fairness with WiFi competitions.
The invention allows for a kind of method for realizing listem-before-talk, including:
Website detects whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
Fruit is then to detect whether unauthorized carrier wave is idle in the second delay cycle, if it is not, then producing random
Fallback value;Wherein, when a length of (16+9n) μ s of the second delay cycle, n is whole more than or equal to 1
Number;Website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing executing with
The step of whether judging random back value equal to 0.
By said method, website can just enter extension after the detection for performing second delay cycle
In the CCA stages, so as to save flow process, in unauthorized heavier loads, website obtains bigger gain.
The method of the present invention is described in detail below by several specific embodiments.
First embodiment, referring to Fig. 3, the method includes:
Step 300, website determine whether that data need to send, if it has, then execution step 301, such as
Fruit does not then continue executing with step 300.
Step 301, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages
The no free time, if it is, execution step 302, if not then execution step 304.
In this step, the duration of the specified CCA time slots in initial CCA stages can be 9 μ s.
Step 302, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 303, if it is not, then return to step 301.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 303, one packet of station transmission, and judge whether to continue transmission, if it is, holding
Row step 304, if it is not, then return to step 300.
Step 300~303 are the initial CCA stages.
Step 304, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 305, website detect whether unauthorized carrier wave is idle in the first delay cycle, if it is,
Then execution step 306, if it is not, then continuing executing with step 305.
In this step, the duration of the first delay cycle can be [16+9 × (n+k)] μ s, n be more than or
Integer equal to 1, k are the integer more than or equal to 0, and when n is equal to 1, k is equal to 1.
Wherein, when n is more than 1, k is equal to 0 or 1.
Whether step 306, website judge N equal to 0, if it is, return to step 303, if it is not,
Then execution step 307.
Step 307, website perform N=N-1, or do nothing.
Step 308, do not perceive in extension CCA time slots, and execution step 305, or website inspection
Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 306, if
It is not, then return to step 305.
Step 304~308 are the extension CCA stages.
Second embodiment, referring to Fig. 4, the method includes:
Step 400, website determine whether that data need to send, if it has, then execution step 401, such as
Fruit does not then continue executing with step 400.
Step 401, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages
The no free time, if it is, execution step 402, if not then execution step 404.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 402, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 403, if it is not, then return to step 401.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 403, one packet of station transmission, and judge whether to continue transmission, if it is, holding
Row step 404, if it is not, then return to step 400.
Step 400~403 are the initial CCA stages.
Step 404, website produce random back value N.
In this step, (namely enter from step 402 from the initial CCA stages into the extension CCA stages
Enter step 404) when, random back value N of generation in the range of [1, q], from non-initial CCA rank
When section enters extension CCA stages (namely entering step 404 from step 403), the random of generation is returned
Value N is moved back in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 405, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 406, if it is not, then continuing executing with step 405.
Whether step 406, website judge N equal to 0, if it is, return to step 403, if it is not,
Then execution step 407.
Step 407, website perform N=N-1, or do nothing.
Step 408, do not perceive in extension CCA time slots, and execution step 405, or website inspection
Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 406, if
It is not, then return to step 405.
Step 404~408 are the extension CCA stages.
3rd embodiment, referring to Fig. 5, the method includes:
Step 500, website determine whether that data need to send, if it has, then execution step 501, such as
Fruit does not then continue executing with step 500.
Step 501, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages
The no free time, if it is, execution step 502, if not then execution step 504.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 502, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 503, if it is not, then return to step 501.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 503, one packet of station transmission, and judge whether to continue transmission, if it is, holding
Row step 504, if it is not, then return to step 500.
Step 500~105 are the initial CCA stages.
Step 504, website produce random back value N, and add 1 by N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 505, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 506, if it is not, then continuing executing with step 505.
Whether step 506, website judge N equal to 0, if it is, return to step 503, if it is not,
Then execution step 507.
Step 507, website perform N=N-1, or do nothing.
Step 508, do not perceive in extension CCA time slots, and execution step 505, or website inspection
Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 506, if
It is not, then return to step 505.
Step 504~508 are the extension CCA stages.
Fourth embodiment, referring to Fig. 6, the method includes:
Step 600, website determine whether that data need to send, if it has, then execution step 601, such as
Fruit does not then continue executing with step 600.
Step 601, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages
The no free time, if it is, execution step 602, if not then execution step 604.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 602, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 603, if it is not, then execution step 604.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 603, one packet of station transmission, and judge whether to continue transmission, if it is, holding
Row step 604, if it is not, then return to step 600.
Step 600~603 are the initial CCA stages.
Step 604, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 605, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 606, if it is not, then continuing executing with step 605.
Whether step 606, website judge N equal to 0, if it is, return to step 603, if it is not,
Then execution step 607.
Step 607, website perform N=N-1, or do nothing.
Step 608, do not perceive in extension CCA time slots, and execution step 605, or website inspection
Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 606, if
It is not, then return to step 605.
Step 604~608 are the extension CCA stages.
5th embodiment, referring to Fig. 7, the method includes:
Step 700, website determine whether that data need to send, if it has, then execution step 701, such as
Fruit does not then continue executing with step 700.
Step 701, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages
The no free time, if it is, execution step 702, if not then execution step 704.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 702, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 703, if it is not, then return to step 701.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 703, one packet of station transmission, and judge whether to continue transmission, if it is, holding
Row step 711 or step 704, if it is not, then return to step 700.
Step 700~703 are the initial CCA stages.
Step 704, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Whether step 705, website judge N equal to 0, if it is, execution step 706, if it is not,
Then execution step 707.
Step 706, website detect that unauthorized carrier wave is in the specified CCA time slots in extension CCA stages
The no free time, if it is, execution step 707, if it is not, then continuing executing with step 706.
Step 707, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 708, if it is not, then continuing executing with step 707.
Whether step 708, website judge N equal to 0, if it is, return to step 703, if it is not,
Then execution step 709.
Step 709, website perform N=N-1, or do nothing.
Step 710, do not perceive in extension CCA time slots, and execution step 707, or website inspection
Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 708, if
It is not, then return to step 707.
Step 704~710 are the extension CCA stages.
Step 711, website produce random back value N, and continue executing with step 707.
Sixth embodiment, referring to Fig. 8, the method includes:
Step 800, website determine whether that data need to send, if it has, then execution step 801, such as
Fruit does not then continue executing with step 800.
Step 801, website detect that unauthorized carrier wave is in the specified CCA time slots in initial CCA stages
The no free time, if it is, execution step 802, if not then execution step 804.
In this step, the time of the specified CCA time slots in CCA stages can be 9 microseconds (μ s).
Step 802, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 803, if it is not, then return to step 801.
In this step, the second delay cycle can be (16+9n) μ s, and n is the integer more than or equal to 1.
Step 803, one packet of station transmission, and judge whether to continue transmission, if it is, holding
Row step 810 or step 804, if it is not, then execution step 700.
Step 800~803 are the initial CCA stages.
Step 804, website produce random back value N.
In this step, random back value N of generation is in the range of [0, q-1].
Wherein, length of the q for contention window.
Wherein, q can be adjusted by dynamic or semi-static mode.
Step 805, website detect that unauthorized carrier wave is in the specified CCA time slots in extension CCA stages
The no free time, if it is, execution step 806, if it is not, then continuing executing with step 805.
Step 806, website detect whether unauthorized carrier wave is idle in the second delay cycle, if it is,
Then execution step 807, if it is not, then continuing executing with step 806.
Whether step 807, website judge N equal to 0, if it is, return to step 803, if it is not,
Then execution step 808.
Step 808, website perform N=N-1, or do nothing.
Step 809, do not perceive in extension CCA time slots, and execution step 806, or website inspection
Survey unauthorized carrier wave whether idle in extension CCA time slots, if it is, return to step 807, if
It is not, then return to step 806.
Step 804~809 are the extension CCA stages.
Step 810, website produce random back value N, and continue executing with step 806.
First embodiment can be used in combination between sixth embodiment.
Referring to Fig. 9, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
First detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages
It is inside whether idle, if it is not, then sending the first notification message to the first generation module;Detect unauthorized load
Whether ripple is idle in the first delay cycle, if it is, send second to the first judge module to notify to disappear
Breath, wherein, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n is more than or equal to 1
Integer, k are the integer more than or equal to 0, and when n is equal to 1, k is equal to 1;
First generation module, for receiving the first notification message, produces random back value;
First judge module, for receiving second notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
Wherein, the function of the first judge module, first detection module and the first generation module can be passed through
Computing device storage program/instruction realization in memory, can also pass through firmware/logic circuit/collection
Into circuit realiration.
In the device of the present invention, first detection module is additionally operable to:
Detect whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing executing with
The unauthorized carrier wave of the detection whether idle step in the specified CCA time slots in initial CCA stages;
Wherein, when a length of (16+9n) μ s of second delay cycle.
In the device of the present invention, first detection module is additionally operable to:
When detecting the unauthorized carrier wave and being idle in second delay cycle, mould is sent to first
Block sends third notice message;
Also include:
First sending module, for receiving the third notice message, transmits a packet;
First judge module is additionally operable to:
Continue executing with and judge whether the step of continuing transmission.
The present invention device in, first detection module specifically for:
For detecting whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then second notification message is sent to the first generation module;(n+k) is performed successively to unauthorized carrier wave first
The detection of secondary CCA time slots, if (n+k) is secondary to detect the free time, and detects described non-award again
Power carrier wave is idle in 16 μ s;Or, it is idle in the 16 μ s first to detect the unauthorized carrier wave, then
Perform the detection of (n+k) secondary CCA time slots to unauthorized carrier wave successively, if (n+k) is secondary examined
The free time is measured, then third notice message is sent to the first judge module.
Referring to Figure 10, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
Second detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages
It is inside whether idle, if it is not, then sending the 4th notification message to the second generation module;Detect unauthorized load
Whether ripple is idle in extension CCA time slots, if it is, the unauthorized carrier wave of detection is in the second time delay week
It is whether idle in phase or the 3rd delay cycle, if it is, send the 5th to the second judge module to notify to disappear
Breath;
Second generation module, for receiving the 4th notification message, produces random back value;
Second judge module, for receiving the 5th notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
Wherein, the function of the second judge module, the second detection module and the second generation module can be passed through
Computing device storage program/instruction realization in memory, can also pass through firmware/logic circuit/collection
Into circuit realiration.
In the device of the present invention, the second judge module is additionally operable to:
Whether the random back value is judged equal to 0, if it is, sending out to second detection module
Send the 8th notification message;
Second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then the 6th notification message is sent to the second generation module;The 6th notification message is received, is detected non-
Authorize carrier wave whether idle in the specified CCA time slots in extension CCA stages, if it is, detection is non-
Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, sentencing to second
Disconnected module sends the 5th notification message.
In the device of the present invention, the second judge module is additionally operable to:
Judge that the random back value is not equal to 0, the 7th is sent to second detection module and notify to disappear
Breath;
Second detection module is additionally operable to:
The 7th notification message is received, the unauthorized carrier wave of the execution detection is in the second delay cycle
Whether idle step.
The present invention device in, the second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then the 4th notification message is sent to the second generation module;Detect unauthorized carrier wave in extension CCA
It is whether idle in the specified CCA time slots in stage, if it is, first performing n successively to unauthorized carrier wave
Or the detection of (n-1) secondary CCA time slots, if n or (n-1) secondary inspection are to the free time, and examine again
Measure the unauthorized carrier wave idle in 16 μ s;Or, the unauthorized carrier wave is first detected in 16 μ s
The interior free time, then perform the detection of the secondary CCA time slots of n or (n-1) to unauthorized carrier wave successively, if
N or (n-1) is secondary detects the free time, then send the 5th notification message to the second judge module.
In the device of the present invention, the second detection module is additionally operable to:
Detect the unauthorized carrier wave to hurry in the specified CCA time slots in the extension CCA stages, after
Whether unauthorized carrier wave described in continuous perform detection is empty in the specified CCA time slots in the extension CCA stages
Not busy step.
Referring to Figure 11, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
3rd detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages
It is inside whether idle, if it is not, then sending the 8th notification message to the 3rd generation module;Detect unauthorized load
Whether ripple is idle if it is, sending the 9th notification message to the 3rd judge module in the second delay cycle;
Wherein, when a length of (16+9n) μ s of the second delay cycle, n is the integer more than or equal to 1;
3rd generation module, for receiving the 8th notification message, produces random back value;Wherein, produce
Raw random back value is more than or equal to 1, and is less than or equal to q, sizes of the q for contention window;
3rd judge module, for receiving the 9th notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
Wherein, the function of the 3rd judge module, the 3rd detection module and the 3rd generation module can be passed through
Computing device storage program/instruction realization in memory, can also pass through firmware/logic circuit/collection
Into circuit realiration.
Referring to Figure 12, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
4th detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages
It is inside whether idle, if it is not, then sending the tenth notification message to the 4th generation module;Detect unauthorized load
Whether ripple is idle in the second delay cycle, if it is, send the 11st to the 4th judge module notifying
Message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n is the integer more than or equal to 1;
4th generation module, for receiving the tenth notification message, produces random back value;
Computing module, for adding 1 by random back value;
4th judge module, for receiving the 11st notification message, continue executing with judge Jia 1 after with
The step of whether machine fallback value is equal to 0.
Wherein, the function of the 4th judge module, the 4th detection module, the 4th generation module and computing module
Can store program/instruction in memory by computing device to realize, can also by firmware/
Logic circuit/integrated circuit is realized.
Referring to Figure 13, the invention allows for a kind of device for realizing listem-before-talk, at least includes:
5th detection module, for detecting specified CCA time slot of the unauthorized carrier wave in the initial CCA stages
It is inside whether idle, if it is, whether the detection unauthorized carrier wave is idle in the second delay cycle,
If it is not, then sending the 12nd notification message to the 5th generation module;Wherein, the second delay cycle when
A length of (16+9n) μ s, n are the integer more than or equal to 1;Detect unauthorized carrier wave in the second time delay week
It is whether idle in phase, if it is, sending the 13rd notification message to the 5th judge module;
5th generation module, for receiving the 12nd notification message, produces random back value;
5th judge module, for receiving the 13rd notification message, continues executing with and judges random back value
The step of whether equal to 0.
Wherein, the function of the 5th judge module, the 5th detection module and the 5th generation module can be passed through
Computing device storage program/instruction realization in memory, can also pass through firmware/logic circuit/collection
Into circuit realiration.
The present invention proposes the process that eight kinds of modes realize listem-before-talk, under specific descriptions.
1 thinking of mode is described
Based on the flow chart that Fig. 1 illustrates, arrange delay cycle in initial CCA stages when it is a length of
(16+n*9) during us, then arrange extension CCA in delay cycle when a length of (16+ (n+k) * 9)
Us (is merely representative of duration, before and after not differentiating between the CCA slot and 16usCCA detection of n 9us here
Sequentially).Wherein n is positive integer, and k is 0 or positive integer.
When being equal to 1 for n, during the duration of the delay cycle in setting extension CCA, configuration k is only 1.
In Fig. 1 being overcome thus, before website sends data for the first time (or the unauthorized carrier wave of acquisition makes
Before with power), the free time length in unauthorized carrier wave is not less than the demand of 34us.If be not arranged such,
So below in the case of, it may appear that website is unsatisfactory for the situation of above-mentioned condition.For example, delay cycle
N is configured to 1, then when website performs initial CCA, the CCA of a time slot is detected as hurrying, then stand
Point enters the extension CCA stages, randomly generates fallback value N, and then lucky N=0 performs delay cycle
CCA detection, if now the CCA of delay period is detected as the free time, website will obtain non-awarding
The right to use of power carrier wave.Now the idle total duration of the unauthorized carrier wave of website experience is that delay cycle is idle
Duration, be (16+1*9) us (i.e. 25us).After using above-mentioned parameter configuration, then website
Flow process is not changed in, but due to extending when a length of (16+ (1+1) of the delay cycle in CCA stages
* 9) us (i.e. 34us), so now the idle total duration of the unauthorized carrier wave of website experience is time delay week
The duration of free time phase, is (16+ (1+1) * 9) us (i.e. 34us).Meet above-mentioned requirements, so as to protect
The fairness of LAA systems and wifi system competitions is demonstrate,proved.
Above-mentioned setting can be constantly present, no matter whether n is 1.
Or above-mentioned setting can also be arranged only for the situation that n is 1.Thus, when n is more than 1
When, it is 0 or 1 that website allows the k arranged in the delay cycle in extension CCA.
2 thinking of mode is described
Description in problem square formula 1 to be solved.
Based on flow process Fig. 1, when website performs extension CCA stage, the generation scope for limiting N is [1~q].
So avoid N and be randomly generated the situation for 1, it is also possible to overcome the problems referred to above.In order to not affect
The impact in extension CCA stages, Ke Yishi, when website is entered from non-initial CCA are entered from other entrances
During extension CCA stages, it is [0~q-1] that website randomly generates the scope of N, enters from initial CCA and extends
The generation scope of the restriction N in CCA stages is [1~q].It is of course also possible to being directed to all entrance extends CCA
Stage, the span for all limiting N are [1~q].
3 thinking of mode is described
It is still based on flow process Fig. 1.After random back N value is produced for website, website is performed
N=N+1, then using new N values as random back N values.Likewise, website is also allowed to,
When website enters extension CCA stages from non-initial CCA, website limits the generation scope of N and is
[0~q-1], and do not perform N=N+1.Likewise, when website enters extension CCA from the initial CCA stages
During the stage, it is [0~q-1] that website limits the generation scope of N values, and performs N=N+1.
The thinking description of mode 4
With reference to Fig. 6, based on Fig. 1, mode 4 for Fig. 1 in the initial CCA stages be modified.
From the beginning of whether data cell is sent, if necessary to send data, website performs a CCA to website
The detection of time slot,
When the free time is detected as, then detect into delay cycle CCA, if delay cycle CCA is detected as
Free time, then website start send data;If delay cycle CCA is detected as hurrying, website is entered and is expanded
The exhibition CCA stages.
When being detected as doing, then website enters the extension CCA stages.
Other flow processs may be referred to Fig. 1.
Relative to the existing procedure of Fig. 1, when a CCA slot in initial CCA stages is detected as the free time
When, in mode 4, website only needs to perform a delay cycle CCA detection again and can just enter extend
The CCA stages, and in Fig. 1, after website performs a delay cycle CCA detection, in addition it is also necessary to perform again
One CCA slot detection can just judge whether to enter the extension CCA stages.Obviously, mode 4
Faster, the situation in unauthorized heavier loads can be obtained more large gain to speed by this characteristic.
5 thinking of mode is described
The flow process for being still based on Fig. 1 is modified, and is primarily directed to extend CCA stages, the side of overcoming
The problem mentioned in formula 1.
With reference to Fig. 7, based on flow process Fig. 1, the extension CCA stages are entered in website, website produces random returning
The N values moved back, judge whether N is 0,
As N=0, website performs CCA time slots (slot) detection, when the free time is detected as, stands
Point is detected into delay cycle CCA;When busy is detected as, website continues executing with one time slot
CCA is detected.
When N is non-zero, website is detected into delay cycle CCA.
Aforesaid way enters extension CCA stage from initial CCA for website.Can certainly be applied to
Other modes enter the extension CCA stages.But for other modes enter extension CCA stages, this Shen
Please give one preferably, when website was entered from the non-initial CCA stage extends CCA, website is produced
Delay cycle CCA detections are directly entered after the N values of raw random back, and (flow process is not illustrated in FIG. 3
Go out).
Other flow processs may be referred to Fig. 1.
After using the flow process, the problem mentioned during mode 1 can be overcome.
6 thinking of mode is described
With reference to Fig. 8, based on flow process Fig. 1, website enters the extension CCA stages, and website produces random back
N values, website perform a CCA time slot detection, when the free time is detected as, website enters time delay
Cycle CCA is detected.When busy is detected as, website repeats the detection of one CCA time slots.
Aforesaid way enters extension CCA stage from initial CCA for website.Can certainly be applied to
Other modes enter the extension CCA stages.But for other modes enter extension CCA stages, this Shen
Please give one preferably, when website was entered from the non-initial CCA stage extends CCA, website is produced
Delay cycle CCA detections are directly entered after the N values of raw random back, and (flow process is not illustrated in FIG. 4
Go out).
Other flow processs may be referred to Fig. 1.
In mode 6, relative to mode 1, the detection time of website can be shortened.For example, in Fig. 1,
Website performs delay cycle CCA detections, a delay cycle after the generation of random back N value, directly
Shi Changwei (16+n*9) us, website can just draw after needing most long (16+n*9) us of detection it is whether idle,
Or at least need the detection for performing 16us just draw the free time, so as to decide whether into next ring
Section.In mode 6, it is only necessary to perform a CCA slot (9us) detection can just draw it is whether idle,
So as to decide whether to carry out next link.Obviously, mode 6 can draw whether enter the next one in advance
The conclusion of link, it is possible to shorten the time of whole detection, so as to lift indirectly spectrum efficiency.
The problem that mode 6 is mentioned in can also overcoming mode 1.
7 thinking of mode is described
It is existing according to flow process Fig. 1, when extending the delay cycle CCA in CCA a length of (16+n*9)
us.In for mode 7, during flowage structure (Fig. 4) based on mode 6, site configuration in mode 7
Delay cycle CCA durations are reduced into the CCA slot, the CCA of now reduce a 9us of a 9us
Slot may be considered a CCA slot before being placed on delay cycle and instead of.
The characteristics of there is mode 7 mode 6 to shorten detection time.
Other flow processs may be referred to Fig. 1.
8 thinking of mode is described
Delay cycle in extension CCA is defined as by (n*9+16) us, wherein 9 represent a CCA
Slot, 16 represent the CCA detections of a 16us.So, extend the delay cycle CCA in CCA
Detection is just changed into:N CCA slot is first carried out, if it is all idle, then the CCA for performing a 16us
Detection, if idle, then whole delay cycle CCA is detected as the free time.If any one CCA slot
It is detected as hurrying, then it is considered that this delay cycle CCA is detected as hurrying.
Mode 8 is directly using the flow process of Fig. 1.This sample loading mode 8 can also realize the effect for shortening detection time
Rate.
In the case where not conflicting, aforementioned manner 1~8 can be used in combination..
Embodiment 1
A kind of structure of delay cycle.CCA slot of the structure by n continuous 9us, is one afterwards
The CCA detection compositions of individual 16us.
When the CCA detections that website n slot of detection is idle and 16us are idle, delay cycle CCA
It is detected as the free time.When website detects that any one CCA slot is busy, then website thinks this time delay week
Phase CCA is detected as hurrying.Now website can immediately begin to next CCA slot detections.That is,
When website can interpolate that out the CCA slot for detecting for busy, website will be immediately performed next CCA
Slot is detected, so as to shorten the time.
Embodiment 2
Based on existing flow process Fig. 1, the delay cycle in CCA stages and prolonging for initial CCA stages are extended
When the cycle in configure carried out according to the structure of 16us+n*9us.In the present embodiment, it is proposed that for
Modify inside the delay cycle in extension CCA stages.The configuration in delay cycle for example now is pressed
Carry out according to the structure of n*9us+16us.Remaining is not use up flow process and still uses flow process Fig. 1.Wherein, n*9us
Indicate the CCA slot of n 9us, 16us represent perform one when a length of 16us CCA detection.
Above-mentioned mode 8 is so achieved that, is conducive to shortening the detection time of whole listem-before-talk, saved
Time about can be used to transmission data, so as to lift spectrum efficiency.
Embodiment 3
Based on existing flow process Fig. 1, when the delay cycle duration in site configuration/selection initial CCA stages
When detecting for the CCA of 16us+9us, then the corresponding configuration of website/selections extends prolonging for CCA stages
When cycle duration for 16us+9us+9us CCA detection duration.And can randomly generate only for website
N values be 0 when use (other N values can also be used, and during N=0, efficiency is best).Remaining the step of
Still continue to use flow process Fig. 1.
If a length of 16us+9us+9us during the delay cycle in site configuration/selection initial CCA stages, that
The delay cycle in the corresponding configuration of website/selection extension CCA stages be 16us+9us+9us (this by
In n be non-1, it is possible to configuration equal to the initial CCA stages delay cycle duration) or
16us+9us+9us+9us (this is always to maintain 9us longer than the delay cycle in initial CCA stages).
Thus can be with the purpose of implementation 1.
The application also provides the counting rule that is self-adaptative adjustment LBT contention window sizes.
Basic ideas are, during website performs LBT, when a time slot is not observed, website for
The time slot is busy (hurrying) according to unauthorized carrier wave in time slot.
Wherein, when website calculate adjustment LBT contention window sizes parameter when, the time slot be busy state not
As the foundation of parameter increase and decrease.
Wherein, the parameter is:The quantity of busy time slot, or the quantity in busy cycle.
Further, the definition in busy cycle is:Between two free timeslots and unauthorized carrier wave is tested
Survey time total amount (the The total amount of time between two idle slots during to do
Which the medium is determined to be busy), or an equivalent definition is:One group of company
Continue the CCA time slots to do.
Further, when website calculates the parameter of adjustment LBT contention window sizes, the time slot is busy shape
The foundation that state increases and decreases not as the parameter, specifically includes:During for the quantity that parameter is busy time slot,
The time slot is not calculated as busy time slot, and the quantity of busy time slot does not increase or do not reduce.For parameter is busy
Cycle quantity when, the time slot is not calculated as the part in busy cycle or busy cycle.
Further, the time slot is present as a CCA time slot in website observation window, calculates in CCA
In the quantity of time slot.Or the time slot is not calculated in CCA not as a CCA time slot in observation window
In the quantity of time slot.Or the duration of the time slot is not as a part of duration of observation window.
Further, the computing formula for calculating competition rollback window size includes:
Mode 1:The quantity in the cycle of tolerance amount=busy;
Mode 2:The quantity of the quantity/CCA time slots in the cycle of tolerance amount=busy;
Mode 3:The quantity of the time slot of tolerance amount=busy;
Mode 4:The quantity of the quantity/CCA time slots of the time slot of tolerance amount=busy.
Mode 5:The quantity of tolerance amount=time slot.
Mode 6:The accumulation duration of tolerance amount=busy;
Mode 7:The duration of the accumulation duration/observation window of tolerance amount=busy;
Mode 8:The accumulation duration in tolerance amount=spare time;
Mode 9:The duration of the accumulation duration/observation window in tolerance amount=spare time.
Busy accumulation duration includes specifying in the time period, and unauthorized carrier wave is the cumulative of busy time.Now
Above-mentioned is not observed and is considered that busy time slot is not cumulatively added.
Not busy accumulation duration includes performing in the time period, and unauthorized carrier wave is the cumulative of not busy time.
Tolerance amount is a predetermined threshold value, is constant, or be it is related to random back N value, or
Person is related to current competitive window window length.When tolerance amount is more than threshold value, contention window is tuned up.Degree of working as
When amount amount is less than threshold value, initial contention window size is turned or returned to contention window down.
After website determines the corresponding priority of LBT according to the QoS grades of business, if website is used
The corresponding parameter of the priority, such as minimum competition rollback window do not obtain unauthorized carrier wave for continuous k time and use
Power, then website unauthorized carrier wave next time can be competed using more higher leveled LBT priority parameters
The right to use.The value of preferred k is 3.
After website determines the corresponding priority of LBT according to the QoS grades of business, if website is used
The priority obtains the unauthorized carrier wave right to use for continuous k time, and the acquisition right to use is all direct each time
Initial CCA stages (being based on cat4 types) get the right to use of unauthorized carrier wave.Then website can be with
The right to use of unauthorized carrier wave next time is competed using more higher leveled LBT priority parameters.Preferably
The value of k is 2.
When station transmission finds signal (DRS), and during simultaneous transmission PDSCH, website should be selected
In data burst (burst), the corresponding parameter of priority of highest LBT is performing listem-before-talk mechanism.
For example, the burst of website planned transmission includes DRS and PDSCH, then in both website selections most
The corresponding LBT priority of high QoS is seizing unauthorized carrier wave.For example, in the subframe that DRS is located
When also needing to hop control information or PDSCH, website selects therein, corresponding with highest
LBT priority parameter performing LBT.
When transmission burst being included different physical channels for one, website selects highest QoS
The corresponding LBT priority of physical channel parameter performing LBT;Or website selects different physics
In channel, the parameter of corresponding highest LBT priority is performing LBT.
Self-dalay treatment mechanism in a kind of LBT flow processs, for improving existing flow process.
In flow process Fig. 1, in the extension CCA stages, there is " doing nothing " (do nothing)
Process, with reference to flow process Fig. 1, it is found which is mainly characterized by website and performs CCA slot detections, when
Testing result is the free time, but the N values of random back are not successively decreased.This mode there may be following wind
Danger or problem.
Often keep in website Jing the flow process for performing Fig. 1 to be the unauthorized carrier wave of competition, but always returning at random
When moving back value N and being decremented to less a certain numerical value, such as N=1 performs do nothing, Zhi Daoyou always
Data reach to continue executing with successively decreasing for N, so as to realize the unauthorized carrier wave of acquisition of quick, high probability
The right to use, and send data purpose.But can be to think about it, if do nothing are processed not in addition
Limit and use, all of website all obtains the right to use of unauthorized carrier wave in a manner mentioned above.So must
The competition conflict between website, i.e., multiple adjacent bus stations is so caused to obtain the right to use simultaneously, formation is done each other
Disturb.This has some to conflict with the purpose of the introducing listem-before-talk of random back mechanism.In order to overcome or alleviated by
The appearance of the problems referred to above, it is possible to use method below.
Mode 1:When having data to be sent in the buffer area (buffer) of website, website performs Fig. 1 flow processs
When, website allows to perform self-dalay mechanism.
Mode 2:LBT mechanism of the website in single execution flow chart 1 is used for the unauthorized carrier wave of competition
Temporary, self-dalay number of processing is performed no more than predetermined threshold.Predetermined threshold for perform LBT when with
The N values that machine is produced;Or the function of N values, such as N/2, N/3 (rounding during non-integer) etc.;
Or when performing LBT contention window size L, or the function of L-value, such as L/2, L/3 (non-integer
When round) etc..
Mode 3:From delay process only when website is multi-carrier polymerizing, it is frequency reuse purpose, up many
Unauthorized carrier wave when user is multiplexed is used when competing.
Mode 4:When website performs LBT, the random back N value of generation is allowed more than predetermined threshold value
Using from delay process.Pre-determined threshold is constant value, or predetermined threshold is the big of contention window when performing LBT
Function of little L-value, such as L/2, L/3 (rounding during non-integer) etc..
Mode 5:(in buffer, there are data) when website only has data to reach, website can be performed first to be listened
After say that mechanism competes unauthorized carrier wave.Further, website has the behavior of data to be in judging buffer:Mac
Layer notifies/triggering physical layer, has data to reach, and time point is t0.Physical layer from t0 or t0+t1 when
Punctum starts to perform LBT flow processs for starting point.With reference to Fig. 1, such as starting point is t0, then first CCA
The time location of slot is t0+9us (t0 is starting point, and duration is 9us), if detection is idle,
The time location of delay cycle is that (t0+9us is starting point to t0+9us+ (16+n*9) us, (16+n*9)
Us is the persistent period).No matter, testing result is busy or spare time, each CCA slot or delay cycle
Time location all can be predetermined.CCA slot afterwards or the time location of delay cycle are by that analogy.
Mode 6:When website (UE sides) is obtained determines the plan transmission time, website can perform stream
Journey Fig. 1 is the unauthorized carrier wave of competition.For example, after UE receives the uplink authorization information of base station, can be with
The delivery time point of upstream data is determined according to reception uplink authorization information, then UE can received
Listem-before-talk mechanism is performed after uplink authorization information, and allows the execution before data is activation moment point to prolong certainly
Shi Gongneng.
The invention allows for a kind of method for realizing listem-before-talk, including:
According to the unauthorized carrier wave of detection, in observation window, in each predetermined period, whether idle testing result is calculated
Tolerance amount;Judge that calculated tolerance amount, more than pre-determined threshold, contention window is tuned up, and using tune
Contention window after big realizes the process of listem-before-talk.
Wherein, contention window is tuned up can be, but not limited to be it is double tune up, it is or exponentially-increased, or linear
Increase etc..
Wherein, when judging that calculated tolerance amount is less than or equal to pre-determined threshold, contention window is adjusted
It is little or contention window is adjusted to into minima, and the process of listem-before-talk is realized using the contention window after turning down.
Wherein, contention window is turned down can be, but not limited to be it is double turn down, or reduce by index, it is or linear
Reduce etc..
Wherein, according to the unauthorized carrier wave of detection, in observation window, in each predetermined period, whether idle detection is tied
Fruit computation measure amount includes:
It is determined that tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is when being CCA
The quantity of gap, or testing result is busy and the quantity of predetermined period for CCA time slots, or testing result
For the accumulation duration for hurrying, or testing result is idle accumulation duration;
Or between the quantity of the CCA time slots in the quantity and observation window that testing result is busy predetermined period
Ratio, or testing result is busy and for the CCA in the quantity and observation window of the predetermined period of CCA time slots
Ratio between the quantity of time slot, or testing result is between busy accumulation duration and the duration of observation window
Ratio between ratio, or the accumulation duration and the duration of observation window that testing result is the free time.
Wherein, testing result be busy predetermined period can be testing result be busy adjacent each CCA
The time of time slot and/or 16 μ s.
Wherein, testing result is that busy accumulation duration refers to that testing result is busy accumulation duration in observation window,
Testing result is that idle accumulation duration refers to that testing result is idle accumulation duration in observation window.
Wherein, observation window refers to that website starts the time experienced to unauthorized carrier wave by competition to competition.
Further, can so that the priority level of listem-before-talk is determined according to the service quality rating of business,
The process of listem-before-talk is realized using the corresponding parameter of the priority level determined;Judge to adopt and determine
The corresponding parameter of priority level in minimum competition window do not obtain unauthorized carrier wave for continuous k1 time, or judge
Go out and obtain unauthorized in the initial CCA stages k2 time using the priority level corresponding continuous parameters determined
Carrier wave, the priority level of listem-before-talk is heightened, wherein, k1, k2 are the integer more than or equal to 1.
Wherein it is possible to but be not limited to the priority level of listem-before-talk is defined as the service quality rating of business.
Wherein, the priority level of listem-before-talk corresponding parameter includes the maximum of contention window, contention window
Minima and n.
Further, can also judge that transmission finds signal DRS, the priority level of listem-before-talk is adjusted
It is whole for limit priority it is other.
Further, the different physical channel of simultaneous transmission can also be judged, by the preferential of listem-before-talk
Rank adjusting is the corresponding priority level of service quality rating highest physical channel.
The invention allows for a kind of device for realizing listem-before-talk, it is characterised in that at least include:
3rd computing module, for according to detect unauthorized carrier wave in observation window in each predetermined period whether
Idle testing result computation measure amount;
5th judge module, for judging calculated tolerance amount more than pre-determined threshold, to adjustment mould
Block sends the 15th notification message;
Adjusting module, for receiving the 15th notification message, contention window is tuned up, and using after tuning up
Contention window realize the process of listem-before-talk.
Wherein, the function of the 3rd computing module, the 5th judge module and adjusting module can be by processing
Device performs storage program/instruction in memory and realizes, can also pass through firmware/logic circuit/integrated electricity
Realize on road.
In the device of the present invention, the 5th judge module is additionally operable to:
Judge that calculated tolerance amount, less than or equal to pre-determined threshold, sends the 16th to adjusting module
Notification message;
Adjusting module is additionally operable to:
The 16th notification message is received, contention window is turned down or contention window is adjusted to into minima, and adopted
Contention window after turning down realizes the process of listem-before-talk.
The present invention device in, the 3rd computing module specifically for:
It is determined that tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is when being CCA
The quantity of gap, or testing result is busy and the quantity of predetermined period for CCA time slots, or testing result
For the accumulation duration for hurrying, or testing result is idle accumulation duration;
Or between the quantity of the CCA time slots in the quantity and observation window that testing result is busy predetermined period
Ratio, or testing result is busy and for the CCA in the quantity and observation window of the predetermined period of CCA time slots
Ratio between the quantity of time slot, or testing result is between busy accumulation duration and the duration of observation window
Ratio between ratio, or the accumulation duration and the duration of observation window that testing result is the free time.
In the device of the present invention, also include:
Determining module, for the priority level of listem-before-talk is determined according to the service quality rating of business, adopts
The process of listem-before-talk is realized with the corresponding parameter of the priority level determined;
5th judge module is additionally operable to:
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not
Obtain unauthorized carrier wave, or judge using priority level corresponding continuous parameters determined k2 time first
Stage beginning CCA obtains unauthorized carrier wave, sends the 17th notification message to adjusting module;Wherein, k1,
K2 is the integer more than or equal to 1;
Adjusting module is additionally operable to:
The 17th notification message is received, the priority level of listem-before-talk is heightened.
Wherein it is determined that the function of module can be by computing device store program in memory/
Instruction is realized, can also be realized by firmware/logic circuit/integrated circuit.
In the device of the present invention, the 5th judge module is additionally operable to:
Judge that transmission finds signal DRS, the 18th notification message is sent to adjusting module;
Adjusting module is additionally operable to:
The 18th notification message is received, the priority level of listem-before-talk limit priority is adjusted to into other.
In the device of the present invention, the 5th judge module is additionally operable to:
Judge the different physical channel of simultaneous transmission, the 19th notification message is sent to adjusting module;
Adjusting module is additionally operable to:
The 19th notification message is received, the priority level of listem-before-talk is adjusted to into service quality rating most
The corresponding priority level of high physical channel.
The invention allows for a kind of method for realizing listem-before-talk, including:
There are data to be sent in judging buffer area, or in multi-carrier polymerizing or frequency reuse or up multiplex
Family carries out unauthorized carrier wave competition when being multiplexed when, or the random back value for judging to produce is more than or equal to pre-
Gating limit value, or judge that data are reached, or after obtaining the time of the transmission data for determining, it is allowed to perform
Self-dalay mechanism.
Wherein, whether have in how judging buffer area that data are to be sent to belong to the known of those skilled in the art
Technology, the protection domain being not intended to limit the present invention, is repeated no more here.
Wherein it is possible to pass through media access control (MAC, Media Access Control) layer to physics
The mode that sends a notification message of layer judging whether data reach, when physical layer receives notification message,
Judge that data are reached, when physical layer does not receive notification message, judge that data are not reached.
Wherein, base station can pass through the delivery time that uplink authorization information sends data to terminal.
Wherein, the number of times for performing self-dalay mechanism can also be limited less than or equal to predetermined threshold value.
Wherein, predetermined threshold value can be the random back value for producing, or the function of random back value is (such as
N/2, N/3 etc.), or size q of contention window, or the function (such as q/2, q/3 etc.) of the size of contention window.
Wherein, self-dalay mechanism is referred in Fig. 1 in step 107 and step 108 after N is equal to 1 no longer
The value of N is deducted into 1, is not also detected, that is, done nothing.
The number of times of self-dalay mechanism by said method, is performed by limiting each website, reduce website it
Between competition conflict probability.
The invention allows for a kind of device for realizing listem-before-talk, at least includes:
6th judge module, for judging to have data to be sent in buffer area, or in multi-carrier polymerizing or
Frequency reuse or uplink multi-users carry out unauthorized carrier wave competition when being multiplexed when, or judge the random of generation
Fallback value is more than or equal to predetermined threshold value, or judges that data are reached, or obtains the transmission data for determining
Time after, to performing module send the 20th notification message;
Performing module, for receiving the 20th notification message, it is allowed to perform self-dalay mechanism.
Wherein, the function of the 6th judge module and performing module can be stored in by computing device
Program/instruction in reservoir is realized, can also be realized by firmware/logic circuit/integrated circuit.
It should be noted that embodiment described above is for only for ease of those skilled in the art's understanding
, protection scope of the present invention is not limited to, in the premise of the inventive concept without departing from the present invention
Under, those skilled in the art are to any obvious replacement made of the invention and improvement etc. at this
Within the protection domain of invention.
Claims (44)
1. a kind of method for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages
It is whether idle;If it is not, then producing random back value;
Then website detects whether unauthorized carrier wave is idle in the first delay cycle, if it is, continuing
The step of whether execution judges random back value equal to 0;Wherein, the first delay cycle when it is a length of [16+9 ×
(n+k)] μ s, n are the integer more than or equal to 1, and k is the integer more than or equal to 0, and works as n
During equal to 1, k is equal to 1.
2. method according to claim 1, it is characterised in that when detecting the unauthorized carrier wave
When idle in the specified CCA time slots in the initial CCA stages, the method also includes:
The website detects whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then
Continue executing with the unauthorized carrier wave of the detection whether idle in the specified CCA time slots in initial CCA stages
The step of;Wherein, when a length of (16+9n) μ s of second delay cycle.
3. method according to claim 2, it is characterised in that when detecting the unauthorized carrier wave
When idle in second delay cycle, the method also includes:
One packet of the station transmission, and continue executing with the step of judging whether continuation transmission.
4. method according to claim 1, it is characterised in that when the n is more than 1, described
K is equal to 0 or 1.
5. method according to claim 1, it is characterised in that the website detects unauthorized load
Ripple free time within the first time delay CCA cycles includes:
The website first to unauthorized carrier wave perform the detection of (n+k) secondary CCA time slots successively, such as
Really (n+k) is secondary detects the free time, and it is idle in 16 μ s to detect the unauthorized carrier wave again;
Or, it is idle in the 16 μ s that the website first detects the unauthorized carrier wave, then non-awards to described
Power carrier wave performs the detection of (n+k) secondary CCA time slots successively, if (n+k) is secondary to detect sky
It is not busy.
6. a kind of method for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified clear channel assessment (CCA) CCA time slots in initial CCA stages
It is whether idle;If it is not, then producing random back value;
Then website detects whether unauthorized carrier wave is idle in CCA time slots, if it is, detection is non-
Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, continuing executing with
The step of whether judging random back value equal to 0.
7. method according to claim 6, it is characterised in that detect in the website unauthorized
Carrier wave also included before the free time in the specified CCA time slots in extension CCA stages:
The website judges the random back value whether equal to 0, when judging described random back value etc.
When 0.
8. method according to claim 7, it is characterised in that when the website judge it is described with
When machine fallback value is not equal to 0, the method also includes:
The website performs the unauthorized carrier wave of the detection whether idle step in the second delay cycle.
9. the method according to claim 6 or 7, it is characterised in that second delay cycle
Shi Changwei (16+9n) μ s, n are the integer more than or equal to 1, the 3rd delay cycle when it is a length of
[16+9×(n-1)]μs
The website detects unauthorized carrier wave idle packet in the second delay cycle or the 3rd delay cycle
Include:
The website first performs the inspection of the secondary CCA time slots of n or (n-1) successively to the unauthorized carrier wave
Survey, if n or (n-1) secondary inspection are to the free time, and detect the unauthorized carrier wave again in 16 μ s
It is idle;
Or, it is idle in the 16 μ s that the website first detects the unauthorized carrier wave, then non-awards to described
Power carrier wave performs the detection of the secondary CCA time slots of n or (n-1) successively, if n or (n-1) are secondary
Detect the free time.
10. method according to claim 6, it is characterised in that when the website detect it is described
Unauthorized carrier wave busy in the specified CCA time slots in the extension CCA stages, the method also include:
The website continues executing with the detection unauthorized carrier wave when the specified CCA in CCA stages is extended
Whether idle step in gap.
A kind of 11. methods for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified clear channel assessment (CCA) CCA time slots in initial CCA stages
It is whether idle, if it is not, then producing random back value;Wherein, the random back value of generation is more than or waits
In 1, and q is less than or equal to, sizes of the q for contention window;
Then website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing
The step of whether execution judges random back value equal to 0;Wherein, the second delay cycle when it is a length of
(16+9n) μ s, n are the integer more than or equal to 1.
12. methods according to claim 11, it is characterised in that when the website is judged to continue
During transmission packet, the random back value is more than or equal to 0 and is less than or equal to (q-1).
A kind of 13. methods for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages
It is whether idle, if it is not, then producing random back value;
Random back value is added 1 by website;
Then website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing
The step of random back value after judging Jia 1 is performed whether equal to 0;Wherein, the second delay cycle when
A length of (16+9n) μ s, n are the integer more than or equal to 1.
14. methods according to claim 6 or 11 or 13, it is characterised in that when detecting
State unauthorized carrier wave it is idle in the specified CCA time slots in the initial CCA stages when, the method is also wrapped
Include:
The website detects whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then
Continue executing with the unauthorized carrier wave of the detection whether idle in the specified CCA time slots in initial CCA stages
The step of.
15. methods according to claim 14, it is characterised in that when detecting the unauthorized load
When ripple is idle in second delay cycle, the method also includes:
One packet of the station transmission, and judge whether to continue transmission, if it is not, then continuing executing with
It is described to determine whether that data need the step of sending.
16. methods according to claim 15, it is characterised in that when the website is judged to continue
During transmission packet, the method also includes:
The website produces the random back value, detects the unauthorized carrier wave in second time delay
It is idle in cycle, continue executing with described the step of whether random back value is equal to 0 judged.
A kind of 17. methods for realizing listem-before-talk, it is characterised in that include:
Website detects unauthorized carrier wave in the specified CCA time slots in initial idle channel estimating CCA stages
It is whether idle, if it is, whether the unauthorized carrier wave of detection is idle in the second delay cycle, if not,
Random back value is produced then;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or
Integer equal to 1;
Website detects whether unauthorized carrier wave is idle in the second delay cycle, if it is, continuing executing with
The step of whether judging random back value equal to 0.
18. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
First detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages
It is whether idle in specified CCA time slots, if it is not, then sending the first notification message to the first generation module;
Detect whether unauthorized carrier wave is idle in the first delay cycle, if it is, sending out to the first judge module
Second notification message is sent, wherein, when a length of [16+9 × (n+k)] μ s of the first delay cycle, n is big
In or integer equal to 1, k is the integer more than or equal to 0, and when n is equal to 1, k is equal to 1;
First generation module, for receiving the first notification message, produces random back value;
First judge module, for receiving second notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
19. devices according to claim 18, it is characterised in that the first detection module is also used
In:
It is idle in the specified CCA time slots in the initial CCA stages when the unauthorized carrier wave is detected
When, detect whether the unauthorized carrier wave is idle in the second delay cycle, if it is not, then continuing executing with
The unauthorized carrier wave of the detection whether idle step in the specified CCA time slots in initial CCA stages;
Wherein, when a length of (16+9n) μ s of second delay cycle.
20. devices according to claim 19, it is characterised in that the first detection module is also used
In:
When detecting the unauthorized carrier wave and being idle in second delay cycle, mould is sent to first
Block sends third notice message;
Also include:
First sending module, for receiving the third notice message, transmits a packet;
First judge module is additionally operable to:
Continue executing with and judge whether the step of continuing transmission.
21. devices according to claim 18, it is characterised in that the first detection module is concrete
For:
For detecting whether unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then second notification message is sent to the first generation module;First the unauthorized carrier wave is performed successively
(n+k) detection of secondary CCA time slots, if (n+k) is secondary to detect the free time, and is detected again
The unauthorized carrier wave is idle in 16 μ s;Or, first detect the unauthorized carrier wave in 16 μ s
Free time, then perform the detection of (n+k) secondary CCA time slots to the unauthorized carrier wave successively, if (n+k)
It is secondary to detect the free time, then third notice message is sent to the first judge module.
22. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
Second detection module, for detecting the unauthorized carrier wave in initial idle channel estimating CCA ranks
It is whether idle in the specified CCA time slots of section, if it is not, then send clematis stem to the second generation module knowing
Message;Detect whether unauthorized carrier wave is idle in the specified CCA time slots in extension CCA stages, if
It is then to detect whether unauthorized carrier wave is idle in the second delay cycle or the 3rd delay cycle, if it is,
Then the 7th notification message is sent to the second judge module;
Second generation module, for receiving the 6th notification message, produces random back value;
Second judge module, for receiving the 7th notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
23. devices according to claim 22, it is characterised in that second judge module is also used
In:
Whether the random back value is judged equal to 0, if it is, sending out to second detection module
Send the 8th notification message;
Second detection module specifically for:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then the 6th notification message is sent to the second generation module;The 6th notification message is received, is detected non-
Authorize carrier wave whether idle in the specified CCA time slots in extension CCA stages, if it is, detection is non-
Authorize carrier wave whether idle in the second delay cycle or the 3rd delay cycle, if it is, sentencing to second
Disconnected module sends the 5th notification message.
24. devices according to claim 23, it is characterised in that second judge module is also used
In:
Judge that the random back value is not equal to 0, the 7th is sent to second detection module and notify to disappear
Breath;
Second detection module is additionally operable to:
The 7th notification message is received, the unauthorized carrier wave of the execution detection is in the second delay cycle
Whether idle step.
25. devices according to claim 22, it is characterised in that second detection module is concrete
For:
Detect whether the unauthorized carrier wave is idle in the specified CCA time slots in initial CCA stages, such as
It is really no, then the 4th notification message is sent to the second generation module;Detect unauthorized carrier wave in extension CCA
It is whether idle in the specified CCA time slots in stage, if it is, first being held to the unauthorized carrier wave successively
The detection of row n or (n-1) secondary CCA time slots, if n or (n-1) secondary inspection are to the free time, and
It is idle in 16 μ s that the unauthorized carrier wave is detected again;Or, first detect the unauthorized carrier wave and exist
It is idle in 16 μ s, then the inspection for performing the secondary CCA time slots of n or (n-1) to the unauthorized carrier wave successively
Survey, if n or (n-1) is secondary detects the free time, the 5th is sent to the second judge module and notify to disappear
Breath.
26. devices according to claim 22, it is characterised in that second detection module is also used
In:
Detect the unauthorized carrier wave to hurry in the specified CCA time slots in the extension CCA stages, after
Whether unauthorized carrier wave described in continuous perform detection is empty in the specified CCA time slots in the extension CCA stages
Not busy step.
27. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
3rd detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages
It is whether idle in specified CCA time slots, if it is not, then sending the 8th notification message to the 3rd generation module;
Detect whether unauthorized carrier wave is idle if it is, sending to the 3rd judge module in the second delay cycle
9th notification message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or equal to
1 integer;
3rd generation module, for receiving the 8th notification message, produces random back value;Wherein, produce
Raw random back value is more than or equal to 1, and is less than or equal to q, sizes of the q for contention window;
3rd judge module, for receiving the 9th notification message, continues executing with and judges that random back value is
It is not no the step of be equal to 0.
28. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
4th detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages
It is whether idle in specified CCA time slots, if it is not, then sending the tenth notification message to the 4th generation module;
Detect whether unauthorized carrier wave is idle in the second delay cycle, if it is, sending out to the 4th judge module
Send the 11st notification message;Wherein, when a length of (16+9n) μ s of the second delay cycle, n be more than or
Integer equal to 1;
4th generation module, for receiving the tenth notification message, produces random back value;
Computing module, for adding 1 by random back value;
4th judge module, for receiving the 11st notification message, continue executing with judge Jia 1 after with
The step of whether machine fallback value is equal to 0.
29. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
5th detection module, for detecting unauthorized carrier wave in the initial idle channel estimating CCA stages
It is whether idle in specified CCA time slots, if it is, the detection unauthorized carrier wave is in the second time delay week
It is whether idle in phase, if it is not, then sending the 12nd notification message to the 5th generation module;Wherein,
When a length of (16+9n) μ s of two delay cycles, n is the integer more than or equal to 1;Detect unauthorized load
Whether ripple is idle in the second delay cycle, if it is, send the 13rd to the 5th judge module notifying
Message;
5th generation module, for receiving the 12nd notification message, produces random back value;
5th judge module, for receiving the 13rd notification message, continues executing with and judges random back value
The step of whether equal to 0.
A kind of 30. methods for realizing listem-before-talk, it is characterised in that include:
According to the unauthorized carrier wave of detection, in observation window, in each predetermined period, whether idle testing result is calculated
Tolerance amount;
Judge that calculated tolerance amount, more than pre-determined threshold, contention window is tuned up, and using after tuning up
Contention window realize the process of listem-before-talk.
31. methods according to claim 30, it is characterised in that when judging described being calculated
Tolerance amount be less than or equal to the pre-determined threshold when, the method also includes:
The contention window is turned down or the contention window is adjusted to into minima, and using the contention window after turning down
Realize the process of listem-before-talk.
32. methods according to claim 30 or 31, it is characterised in that described non-according to detecting
In each predetermined period, whether idle testing result computation measure amount includes in observation window to authorize carrier wave:
Determine that the tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is CCA
The quantity of time slot, or testing result is busy and the quantity of predetermined period for CCA time slots, or detection knot
Fruit is busy accumulation duration, or testing result is idle accumulation duration;
Or the quantity of the CCA time slots in the quantity and the observation window that testing result is busy predetermined period
Between ratio, or testing result is busy and the quantity of predetermined period for CCA time slots and the observation
Ratio between the quantity of the CCA time slots in window, or testing result is busy accumulation duration and the sight
The ratio surveyed between the duration of window, or the duration that testing result is idle accumulation duration and the observation window
Between ratio.
33. methods according to claim 30, it is characterised in that the method also includes:
The priority level of listem-before-talk is determined according to the service quality rating of business, it is preferential using what is determined
The corresponding parameter of rank realizes the process of listem-before-talk;
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not
Unauthorized carrier wave is obtained, or is judged using corresponding continuous parameters k2 of the priority level determined
It is secondary to obtain unauthorized carrier wave in the initial CCA stages, the priority level of listem-before-talk is heightened, wherein,
K1, k2 are the integer more than or equal to 1.
34. methods according to claim 30, it is characterised in that the method also includes:
Judge that transmission finds signal DRS, the priority level of listem-before-talk is adjusted to into limit priority
Not.
35. methods according to claim 30, it is characterised in that the method also includes:
Judge the different physical channel of simultaneous transmission, the priority level of listem-before-talk is adjusted to into Service Quality
The corresponding priority level of amount grade highest physical channel.
36. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
3rd computing module, for according to detect unauthorized carrier wave in observation window in each predetermined period whether
Idle testing result computation measure amount;
5th judge module, for judging calculated tolerance amount more than pre-determined threshold, to adjustment mould
Block sends the 15th notification message;
Adjusting module, for receiving the 15th notification message, contention window is tuned up, and using after tuning up
Contention window realize the process of listem-before-talk.
37. devices according to claim 36, it is characterised in that the 5th judge module is also used
In:
The calculated tolerance amount is judged less than or equal to the pre-determined threshold, to the adjustment mould
Block sends the 16th notification message;
The adjusting module is additionally operable to:
The 16th notification message is received, the contention window is turned down or is adjusted to most the contention window
Little value, and the process of listem-before-talk is realized using the contention window after turning down.
38. devices according to claim 36 or 37, it is characterised in that the described 3rd calculates mould
Block specifically for:
Determine that the tolerance amount is the quantity that testing result is busy predetermined period, or predetermined period is CCA
The quantity of time slot, or testing result is busy and the quantity of predetermined period for CCA time slots, or detection knot
Fruit is busy accumulation duration, or testing result is idle accumulation duration;
Or the quantity of the CCA time slots in the quantity and the observation window that testing result is busy predetermined period
Between ratio, or testing result is busy and the quantity of predetermined period for CCA time slots and the observation
Ratio between the quantity of the CCA time slots in window, or testing result is busy accumulation duration and the sight
The ratio surveyed between the duration of window, or the duration that testing result is idle accumulation duration and the observation window
Between ratio.
39. devices according to claim 36, it is characterised in that also include:
Determining module, for the priority level of listem-before-talk is determined according to the service quality rating of business, adopts
The process of listem-before-talk is realized with the corresponding parameter of the priority level determined;
5th judge module is additionally operable to:
Judge using minimum competition window in the corresponding parameter of priority level determined it is continuous k1 time not
Unauthorized carrier wave is obtained, or is judged using corresponding continuous parameters k2 of the priority level determined
It is secondary to obtain unauthorized carrier wave in the initial CCA stages, the 17th notification message is sent to the adjusting module;
Wherein, k1, k2 are the integer more than or equal to 1;
The adjusting module is additionally operable to:
The 17th notification message is received, the priority level of listem-before-talk is heightened.
40. devices according to claim 36, it is characterised in that the 5th judge module is also used
In:
Judge that transmission finds signal DRS, the 18th notification message is sent to the adjusting module;
The adjusting module is additionally operable to:
The 18th notification message is received, the priority level of listem-before-talk is adjusted to into limit priority
Not.
41. devices according to claim 36, it is characterised in that the 5th judge module is also used
In:
Judge the different physical channel of simultaneous transmission, the 19th notification message is sent to the adjusting module;
The adjusting module is additionally operable to:
The 19th notification message is received, the priority level of listem-before-talk is adjusted to into service quality etc.
The corresponding priority level of level highest physical channel.
A kind of 42. methods for realizing listem-before-talk, it is characterised in that include:
There are data to be sent in judging buffer area, or in multi-carrier polymerizing or frequency reuse or up multiplex
Family carries out unauthorized carrier wave competition when being multiplexed when, or the random back value for judging to produce is more than or equal to pre-
Gating limit value, or judge that data are reached, or after obtaining the time of the transmission data for determining, it is allowed to perform
Self-dalay mechanism.
43. methods according to claim 42, it is characterised in that the execution self-dalay mechanism
Number of times is less than or equal to the predetermined threshold value.
44. a kind of devices for realizing listem-before-talk, it is characterised in that at least include:
6th judge module, for judging to have data to be sent in buffer area, or in multi-carrier polymerizing or
Frequency reuse or uplink multi-users carry out unauthorized carrier wave competition when being multiplexed when, or judge the random of generation
Fallback value is more than or equal to predetermined threshold value, or judges that data are reached, or obtains the transmission data for determining
Time after, to performing module send the 20th notification message;
Performing module, for receiving the 20th notification message, it is allowed to perform self-dalay mechanism.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510622254.1A CN106559908B (en) | 2015-09-25 | 2015-09-25 | Method and device for realizing listen before talk |
CN202011298719.XA CN112584359A (en) | 2015-09-25 | 2016-08-11 | Communication method, device and equipment |
PCT/CN2016/094962 WO2017050060A1 (en) | 2015-09-25 | 2016-08-12 | Method and device for implementing listen-before-talk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510622254.1A CN106559908B (en) | 2015-09-25 | 2015-09-25 | Method and device for realizing listen before talk |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106559908A true CN106559908A (en) | 2017-04-05 |
CN106559908B CN106559908B (en) | 2021-11-09 |
Family
ID=58385819
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510622254.1A Active CN106559908B (en) | 2015-09-25 | 2015-09-25 | Method and device for realizing listen before talk |
CN202011298719.XA Pending CN112584359A (en) | 2015-09-25 | 2016-08-11 | Communication method, device and equipment |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011298719.XA Pending CN112584359A (en) | 2015-09-25 | 2016-08-11 | Communication method, device and equipment |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN106559908B (en) |
WO (1) | WO2017050060A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109314998A (en) * | 2017-04-25 | 2019-02-05 | 华为技术有限公司 | A kind of accidental access method and device |
WO2019036909A1 (en) * | 2017-08-22 | 2019-02-28 | Nokia Technologies Oy | Method, computer program and apparatus |
CN112601233A (en) * | 2020-11-03 | 2021-04-02 | 浙江华云信息科技有限公司 | Authorization-free frequency band channel access method applied to smart power grid |
WO2022077466A1 (en) * | 2020-10-16 | 2022-04-21 | Apple Inc. | Semi-static channel access for traffic with different priorities |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019183938A1 (en) * | 2018-03-30 | 2019-10-03 | 北京小米移动软件有限公司 | Data transmission method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101258686A (en) * | 2005-11-24 | 2008-09-03 | 诺基亚公司 | Method, equipment and system for supporting measurement of 'fist hearing then talking' recognizing one or more non-occupied RF sub tape |
CN104363657A (en) * | 2014-11-06 | 2015-02-18 | 东莞宇龙通信科技有限公司 | Device with base station function and method and system for data transmission |
CN104469914A (en) * | 2014-12-10 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Channel detection method and system, base station and terminal |
CN104539405A (en) * | 2015-01-28 | 2015-04-22 | 深圳酷派技术有限公司 | Channel detection method, channel detection system, base station and terminal |
CN104717686A (en) * | 2015-03-31 | 2015-06-17 | 深圳酷派技术有限公司 | Channel detection method of unauthorized frequency band and network cell equipment |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101820690A (en) * | 2009-02-26 | 2010-09-01 | ***通信集团公司 | Random access control method, system and equipment |
CN102238722B (en) * | 2010-04-30 | 2015-03-11 | 华为技术有限公司 | Method for processing Un subframe configuration, base station and relay station |
US20120238208A1 (en) * | 2011-03-17 | 2012-09-20 | Maik Bienas | Mobile radio communication devices and servers |
CN103428768B (en) * | 2012-05-16 | 2016-12-14 | 华为技术有限公司 | A kind of cut-in method, base station, access point and subscriber equipment |
EP2862398B1 (en) * | 2012-06-13 | 2017-09-06 | Telefonaktiebolaget LM Ericsson (publ) | A method and node for paging in a radio access network |
-
2015
- 2015-09-25 CN CN201510622254.1A patent/CN106559908B/en active Active
-
2016
- 2016-08-11 CN CN202011298719.XA patent/CN112584359A/en active Pending
- 2016-08-12 WO PCT/CN2016/094962 patent/WO2017050060A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101258686A (en) * | 2005-11-24 | 2008-09-03 | 诺基亚公司 | Method, equipment and system for supporting measurement of 'fist hearing then talking' recognizing one or more non-occupied RF sub tape |
CN104363657A (en) * | 2014-11-06 | 2015-02-18 | 东莞宇龙通信科技有限公司 | Device with base station function and method and system for data transmission |
CN104469914A (en) * | 2014-12-10 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Channel detection method and system, base station and terminal |
CN104539405A (en) * | 2015-01-28 | 2015-04-22 | 深圳酷派技术有限公司 | Channel detection method, channel detection system, base station and terminal |
CN104717686A (en) * | 2015-03-31 | 2015-06-17 | 深圳酷派技术有限公司 | Channel detection method of unauthorized frequency band and network cell equipment |
Non-Patent Citations (3)
Title |
---|
BROADCOM CORPORATION: "《R1-150584 3GPP TSG RAN WG1 Meeting #80》", 13 February 2015 * |
PAUL NIKOLICH: "《RP-150543_IEEE802_LMSC》", 13 March 2015 * |
ZTE: "《R1-151809 3GPP TSG RAN WG1 Meeting #80bis》", 24 April 2015 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109314998A (en) * | 2017-04-25 | 2019-02-05 | 华为技术有限公司 | A kind of accidental access method and device |
CN109314998B (en) * | 2017-04-25 | 2020-12-15 | 华为技术有限公司 | Random access method and device |
US10999875B2 (en) | 2017-04-25 | 2021-05-04 | Huawei Technologies Co., Ltd. | Random access method and apparatus |
WO2019036909A1 (en) * | 2017-08-22 | 2019-02-28 | Nokia Technologies Oy | Method, computer program and apparatus |
WO2022077466A1 (en) * | 2020-10-16 | 2022-04-21 | Apple Inc. | Semi-static channel access for traffic with different priorities |
US11979911B2 (en) | 2020-10-16 | 2024-05-07 | Apple Inc. | Semi-static channel access for traffic with different priorities |
CN112601233A (en) * | 2020-11-03 | 2021-04-02 | 浙江华云信息科技有限公司 | Authorization-free frequency band channel access method applied to smart power grid |
CN112601233B (en) * | 2020-11-03 | 2023-10-20 | 浙江华云信息科技有限公司 | Unlicensed frequency band channel access method applied to smart grid |
Also Published As
Publication number | Publication date |
---|---|
WO2017050060A1 (en) | 2017-03-30 |
CN112584359A (en) | 2021-03-30 |
CN106559908B (en) | 2021-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104994591B (en) | Method of adjustment, adjustment system and the base station of channel occupancy probabilities | |
CN106559908A (en) | A kind of method and apparatus for realizing listem-before-talk | |
CN105636231B (en) | A kind of channel-monitoring method and apparatus | |
CN104363657B (en) | Data transmission method, system and the equipment with base station functions | |
CN101801000B (en) | Secondary user access method for maximization of capacity of dynamic spectrum sharing system | |
CN108633106B (en) | Random access and indicating means, device after a kind of random access backoff | |
EP3030035B1 (en) | Station and access point for managing contention in a wireless communications system | |
CN106452701A (en) | Unauthorized multi-carrier listen before talk (LBT) execution method and device | |
CN106162917B (en) | Method and equipment for preempting transmission resources on unauthorized carrier waves | |
CN105393608B (en) | A kind of method of user equipment and power distribution | |
CN105517181B (en) | Carrier resource processing method and device of unauthorized carrier and transmission node | |
EP3163932B1 (en) | Interference coordination method and device | |
CN103517278B (en) | Access the competing method of public frequency band | |
CN107006015A (en) | The method and communication equipment communicated using frequency spectrum resource | |
CN103580792B (en) | Resource allocation method and device | |
Khairy et al. | A hybrid-LBT MAC with adaptive sleep for LTE LAA coexisting with Wi-Fi over unlicensed band | |
CN108243498A (en) | A kind of method and apparatus of satellite system resource allocation | |
JP6587259B2 (en) | Unlicensed carrier competition method and apparatus | |
CN105634859B (en) | LBT channel detection method and system, base station and terminal based on load | |
CN101959246B (en) | Method for reporting scheduling information | |
CN104219772B (en) | A kind of channel access method and channel access device | |
CN107318150A (en) | A kind of user of LTE U autonomous systems is resident flow | |
CN106031286B (en) | Base station, user equipment and the method for LBT are realized based on mobile communication system | |
CN109565692A (en) | Use the ascending transmission method of unlicensed spectrum, resource allocation methods, user equipment and base station | |
CN106171007B (en) | A kind of method, apparatus and terminal of determining reselection target cell |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |