Configuration, distribution method, and apparatus of D2D resource

A technology of resource allocation and resource allocation, applied in the field of communication

Active Publication Date: 2015-11-25
ZTE CORP
View PDF7 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Related technologies do not give a systematic and complete

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration, distribution method, and apparatus of D2D resource
  • Configuration, distribution method, and apparatus of D2D resource
  • Configuration, distribution method, and apparatus of D2D resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0208] This embodiment provides the configuration establishment, update and release process of D2D discovery resources. The following examples 1 to 3 are described in detail.

example 1

[0210] In a commercial application scenario, Mary and John hold UE1 and UE2 with the D2D discovery function. UE1 and UE2 are within the D2D discovery range of each other. UE1 wants to perform D2D discovery, so it sends a D2D resource configuration request message to the eNB. The D2D resource configuration request message can include D2D discovery indication, D2D UE priority, D2D UE capability, periodic / one-time indication, duration, etc., such as Image 6 shown.

[0211] The eNB authenticates UE1 according to the saved context information of UE1. Assuming that the D2D UE1 fails to pass the authentication, the eNB sends a D2D configuration failure message to the UE, where the reason for the rejection is that the authentication fails. If the authentication is passed, and the authentication indication or the capability indication of the D2D UE or the current Type overload makes UE1 only able to use Type1 resources, the eNB sends a D2D resource configuration message to UE1, whi...

example 2

[0216] In a commercial application scenario, Mary and John hold UE1 and UE2 with the D2D discovery function. UE1 and UE2 are within the D2D discovery range of each other. The eNB sends an indication of supporting D2D in the SIB broadcast message. UE1 in the idle state wants to perform D2D discovery after obtaining the information, so it first enters the connected state and sends a D2D resource configuration request message to the eNB. The D2D resource configuration request message can include D2D discovery indication, D2D UE capability, D2D UE application type, D2D UE priority, periodic / one-time indication, duration, etc., such as Figure 7 shown.

[0217] After receiving the D2D resource configuration request message, the eNB performs authorization authentication and admission control on the D2D UE. If there are enough Type2 resources, the eNB allocates resources for the D2D UE according to the application type of the D2D UE, the periodic / one-time indication and the duratio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a device-to-device (D2D) resource configuration and allocation method and device. The D2D resource configuration method comprises: a user equipment (UE) receives D2D resource configuration information sent by a D2D control node; and the UE configures D2D resources according to the D2D resource configuration information. The present invention implements D2D resource configuration for D2D UEs.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to a device-to-device (Device-to-Device, D2D for short) resource configuration and allocation method and device. Background technique [0002] With the development of wireless multimedia services, people's demand for high data rate and user experience is increasing, which puts forward higher requirements on the system capacity and coverage of traditional cellular networks. On the other hand, application scenarios such as public security, social networking, short-distance data sharing, and local advertising have gradually increased people's demand for understanding and communicating with nearby people or things (Proximity Services, Proximity Services). The traditional base station-centric cellular network has obvious limitations in terms of high data rate and proximity service support. Against this background of demand, D2D technology, which represents a new direction f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W72/04H04W4/70
CPCH04W4/00H04W72/04H04W4/70H04W76/14H04L67/51H04W72/51H04W72/20H04W72/542H04W72/56Y02D30/70H04W76/11H04W72/02
Inventor 陈琳陈玉芹高音李大鹏黄莹塞尔吉奥帕洛拉里
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products