Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unauthorized resource use methods and system, base station, and user equipment

A non-authorized and resource-based technology, applied in wireless communication, electrical components, network planning, etc., can solve problems such as strong interference and collision

Active Publication Date: 2016-08-10
ZTE CORP
View PDF6 Cites 69 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the transmission resources of these channels or signals are shared by multiple cells of multiple operators. If there is no resource coordination between base stations, there will be collisions or strong interference problems caused by multiple cells using the same resource to transmit.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized resource use methods and system, base station, and user equipment
  • Unauthorized resource use methods and system, base station, and user equipment
  • Unauthorized resource use methods and system, base station, and user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0106] In this embodiment, a method for using unauthorized resources is applied to a base station, such as figure 1 As shown, the method includes the following steps:

[0107] Step 101: Obtain the unauthorized resources used by the cell;

[0108] Specifically, obtain the unauthorized resources used by the cell through resource competition; or,

[0109] Coordinate with other base stations in advance, and use the predefined unlicensed resources obtained through coordination as the unlicensed resources used by the cell; or,

[0110] Obtain usage information of unauthorized resources of other cells; obtain unauthorized resources used by this cell according to the unauthorized resources used by other cells.

[0111] Wherein, the non-authorized resources used by the cell are obtained through competition, specifically:

[0112] It itself or triggers subordinate UEs to compete for resources on the set unlicensed carrier to obtain unlicensed resources used by the cell.

[0113]Here...

Embodiment 2

[0201] This embodiment describes the resource coordination and sending method of the PRACH on the unlicensed carrier.

[0202] The unlicensed resources corresponding to the PRACH include time domain resources, frequency domain resources and preamble (preamble) resources, and the resource configuration of each cell can be extended on the basis of the original 64 types stipulated by LTE.

[0203] The PRACH on the unlicensed carrier can be sent in the following ways.

[0204] The first method: sending by LBT

[0205] Cells of different operators may transmit uplink and downlink data on unlicensed carriers, so there will be situations where multiple cells use unlicensed carriers to send PRACH at the same time for timing synchronization. In this case, different cells of different operators can coordinate and use limited unlicensed resources in one of the following ways:

[0206] Method 1: Cells of different operators acquire unlicensed resources of the PRACH in a TDM coordinated ...

Embodiment 3

[0256] In this embodiment, a method for coordinating and sending SRS non-authorized resources of multiple cells of different operators is described.

[0257] SRS unlicensed resources may include time domain resources (OFDM symbols, subframes), frequency domain resources, and code domain resources corresponding to different sequences and cyclic shifts.

[0258] The SRS on the unlicensed carrier can be sent in the following ways.

[0259] The first method: using a non-LBT sending method

[0260]In this way, multiple cells of multiple operators are allowed to directly obtain SRS unlicensed resources without competition, so that UEs under multiple cells of multiple operators can send SRS on unlicensed carriers, but in order to avoid Interference requires multiple operators to coordinate resources. The specific implementation methods of multi-operator multi-cell SRS resource coordination are as follows:

[0261] Method 1: Different operators use different OFDM symbols or time sl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an unauthorized resource use method that is applied to a base station. The method includes the steps of acquiring an unauthorized resource that is used in a cell; and broadcasting configuration information of the unauthorized resource of the cell to other base stations, so as to enable the other base stations to determine configuration of unauthorized resources of the other base stations according to the configuration information of the unauthorized resource of the cell. The present invention further discloses an unauthorized resource use method applied to user equipment (UE), a base station, UE, and an unauthorized resource use system.

Description

technical field [0001] The present invention relates to wireless communication technology, in particular to a method, system, base station and user equipment (UE, User Equipment) for using unauthorized resources. Background technique [0002] Unlicensed carriers have the characteristics of low cost, low access requirements, low cost, ability to coordinate resources, support more wireless access technologies, more wireless access sites, and more applications. Therefore, it has become a research hotspot. [0003] In the evolution process of the Long Term Evolution (LTE, Long Term Evolution), in the research of the LTE Rel-13 version, an important content is that the LTE system uses an unlicensed carrier to work. This technology will enable the LTE system to use existing unlicensed carriers, greatly enhance the potential spectrum resources of the LTE system, and enable the LTE system to obtain lower spectrum costs. [0004] However, the LTE system will face many problems when ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W16/14
CPCH04W16/14
Inventor 李新彩苟伟毕峰彭佛才
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products