Unauthorized carrier based data transmission method and device and resource seizing method and device

A data transmission method and data transmission technology are applied in the field of unlicensed carrier applications and can solve problems such as interference and difficulty in coordination.

Inactive Publication Date: 2017-03-01
ZTE CORP
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, there will be a variety of wireless systems in the unlicensed spectrum, which are difficult to coordinate with each other and cause serious interference

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized carrier based data transmission method and device and resource seizing method and device
  • Unauthorized carrier based data transmission method and device and resource seizing method and device
  • Unauthorized carrier based data transmission method and device and resource seizing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present invention.

[0114] Such as figure 1 As shown, the subframe structure in the embodiment of the present invention, in chronological order, specifically includes:

[0115] It includes the part that allows the execution of clear channel detection CCA_1 or eCCA_1 (the following "1" is to distinguish different CCA or eCAA (Enhanced Clear Channel Assessment)).

[0116] Wherein, the base station executes CCA or eCCA within this time period. The actual duration of CCA_1 or eCCA_1 is fixed or may vary. The duration of CCA_1 or eCCA_1 can be less than 9us / 34us / 40us. At this time, the base sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an unauthorized carrier based data transmission method and device. The unauthorized carrier based data transmission method comprises the steps that a site performs idle channel detection on an unauthorized carrier according a subframe structure of the unauthorized carrier, the right to use the unauthorized carrier is acquired according to a result of idle channel detection, and data transmission is performed by using the unauthorized carrier with the right to use. The embodiment of the invention further discloses a resource seizing method and device.

Description

technical field [0001] The present invention relates to an unlicensed carrier application technology, in particular to a data transmission method and device based on an unlicensed carrier, and a resource preemption method and device. Background technique [0002] The Long Term Evolution (LTE, Long Term Evolution) system is deployed on licensed carriers. With the evolution of LTE and the rapid growth of data services, the licensed spectrum will no longer be able to bear such a huge amount of data in the near future. Therefore, Deploying LTE in unlicensed spectrum can be considered to share the data traffic in licensed carriers through unlicensed spectrum. For the unlicensed spectrum, the communication cost is lower, and the requirements for access conditions are also low. Therefore, using the unlicensed spectrum may be an important evolution direction of the wireless communication system. [0003] There are also problems with using unlicensed spectrum for communication. For...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W16/14H04W74/08
CPCH04W16/14H04W74/0808
Inventor 苟伟赵亚军彭佛才
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products