Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signaling configuration method and signaling transmission method based on unauthorized carrier, station, and terminal

A configuration method and an unauthorized technology, applied in the field of communication, can solve problems such as difficulty in collaboration, high overhead in centralized management, and transmission of reference signals that take up time.

Inactive Publication Date: 2017-05-10
ZTE CORP
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In summary, although LTE deployment in unlicensed carriers has obvious advantages, there are still problems in the deployment process: multiple wireless access technologies (across different communication standards, difficult collaboration, and diverse network topologies) and Many wireless access sites (large number of users, difficult collaboration, high centralized management overhead)
[0004] When the unlicensed carrier implements LTE, the listen-before-talk mechanism brings some problems, such as the occupation period of the site during the occupancy period, the location and number of uplink and downlink subframes during the occupancy period, and the transmission of various reference signals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signaling configuration method and signaling transmission method based on unauthorized carrier, station, and terminal
  • Signaling configuration method and signaling transmission method based on unauthorized carrier, station, and terminal
  • Signaling configuration method and signaling transmission method based on unauthorized carrier, station, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0142] In embodiment 1, only parameters A and B are used as examples.

[0143] In the current subframe, the station configures parameter A as 0100 and configures parameter B as 0011, then the actual occupied subframe of the station is: 4+1 subframes after the current subframe (including) are downlink, and there are 3+ 1 uplink subframe or subframe for other purposes. The station may also modify (mainly increase) the number of subsequent subframes expected to be occupied by the value of parameter A sent in each downlink subframe. This is beneficial to use fewer bits to describe more consecutively occupied subframes. For example, when 3 bits are used to describe parameter A, and the occupier wants to claim to occupy 10 subframes, the station sets parameter A to 111 in the first occupied subframe, and sets parameter A to 111 in the second occupied subframe. is 111, set the parameter A to 111 in the third occupied subframe, set the parameter A to 110 in the fourth occupied subfr...

Embodiment 2

[0145] Embodiment 2, an example using parameters A, B, and C.

[0146] In the current subframe, the station configures parameter A as 0100, configures parameter B as 0011, and configures parameter C as 10101 (the number of bits of parameter C is the number of downlink subframes described by parameter A), then the actual occupied subframe of the station is: from 4+1 subframes after the start of the current subframe (including) are downlink, and then there are 3+1 uplink subframes or subframes for other purposes, and the station occupies 4+1 downlink MBSFN subframes and non-MBSFN subframes The position order of the frame is: MBSFN subframe, non-MBSFN subframe, MBSFN subframe, non-MBSFN subframe, MBSFN subframe.

[0147] The terminal receives the above duration signaling in the subframe and analyzes it. According to the signaling agreement, the terminal analyzes the bits of parameter A and parameter B and learns that there are still 5 downlink subframes after the current subframe...

Embodiment 3

[0148] Embodiment 3, an example using parameters A, B, and D.

[0149] The station forwards the MBSFN subframe configuration information in the LAA carrier of the UE through the Pcell for the UE, which may be forwarded through a point-to-point UE RRC dedicated message or through a point-to-multipoint broadcast message. For the LAA unlicensed carrier, when the station occupies it, it needs to determine which subframes in the occupied period are MBSFN subframes according to the subframe timing of the corresponding Pcell. Then, the signal / signaling is sent in the corresponding MBSFN subframe according to the configuration requirements of the MBSFN subframe.

[0150] In the current subframe, the station configures parameter A as 0100 and configures parameter B as 0011, then the actual occupied subframe of the station is: 4+1 subframes after the current subframe (including) are downlink, and there are 3+ 1 uplink subframe or subframe for other purposes, and the station occupies 4+...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signaling configuration method and a signaling transmission method based on an unauthorized carrier, a station, and a terminal. According to the signaling configuration method, a station configures a signaling for each sub-frame and sends the signaling, and configures one or more of the following parameters: a first parameter used to indicate the number of sub-frames continuously occupied from a current sub-frame, a second parameter used to indicate the number of sub-frames after the last downlink sub-frame, a third parameter used to indicate the number of CRS (Cell Reference Signal) symbols in a sub-frame or in a sub-frame in burst transmission or indicate whether a sub-frame is an MBSFN (Multicast Broadcast Single Frequency Network) sub-frame; fourth, fifth and sixth parameters used to indicate whether a sub-frame is configured with CSI-RS (Channel State Information Reference Signal) and / or CSI-IM (Channel State Information Interference Measurement) or indicate the specific CSI-RS and / or CSI-IM configured, a seventh parameter used to indicate the power of CSI / CSI-RS of a sub-frame or a sub-frame in burst transmission, an eighth parameter used to indicate the burst number, a ninth parameter used to indicate whether there is an uplink sub-frame in burst transmission, a tenth parameter used to directly or indirectly indicate the number of OFDM symbols in the last downlink sub-frame, and an eleventh parameter used to indicate whether there is a DRS (Discovery Reference Signal) in a subs-frame.

Description

technical field [0001] The present invention relates to communication technology, and in particular to a signaling configuration, transmission method, station, and terminal based on an unlicensed carrier in a Long Term Evolution (LTE, Long Term Evolution) system. Background technique [0002] At present, LTE communication networks are deployed on licensed carriers. With the development of LTE, some companies have proposed to "suggest research on the issue of deploying LTE on unlicensed carriers". For example, Qualcomm in the United States believes that: With the rapid growth of business, in the near future, authorized carriers will not be able to bear the huge amount of data brought by the rapid business growth. Consider deploying LTE in unlicensed carriers to share the data traffic in licensed carriers, which can solve the pressure on data volume brought about by business growth. At the same time, unlicensed carriers have the following characteristics: on the one hand, bec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W72/04H04W72/08H04W72/12H04W72/54
CPCH04W72/0446H04W72/542H04W72/23H04W72/04H04W72/12H04W72/54
Inventor 苟伟彭佛才杨玲李新彩毕峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products