Uplink data sending method and device

A data transmission method and a technology for transmitting data, which are applied in the field of uplink data transmission methods and devices, and can solve problems such as high transmission failure rate

Active Publication Date: 2018-10-02
ZTE CORP
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Different from the traditional random access process, the unlicensed uplink data may require multiple users to compete, and its power is higher than the existing Physical Uplink Shared Channel (PUSCH). Moreover, the unlicensed uplink However, there is a problem of high failure rate of sending data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Uplink data sending method and device
  • Uplink data sending method and device
  • Uplink data sending method and device

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0207] When the UE sends uplink data using unlicensed resources, it adopts the power control method of increasing power.

[0208] When the UE uses unlicensed resources to send uplink data for the first time, it sends uplink data according to the initial target received power (corresponding to the initial target received power). If it is unsuccessful for the first time, when the UE sends uplink data using the unlicensed resource again, it needs to increase the transmit power again. and so on. Every time the transmission is unsuccessful, the transmission power is increased.

[0209] For example, the initial target received power is InitialReceivedTargetPower, and the received power compensation for each increment is powerRampingStep, then, when sending TRANSMISSION_COUNTER times of unlicensed uplink data, the target received power ReceivedTargetPower is: ReceivedTargetPower=InitialReceivedTargetPower+(TRANSMISSION_COUNTER–1)*powerRampingStep.

[0210] Among them, the initial t...

example 2

[0212] If the UE uses unlicensed resources to send uplink data, the transmission power is not enough, which will cause the base station to fail to monitor the unlicensed uplink data. In this case, the base station may successfully monitor the preamble sequence, but cannot monitor the uplink data. However, the base station can reply a random access response to the preamble sequence, and then the unlicensed uplink sending process can be transformed into a traditional random access process.

[0213] When the UE fails to send unlicensed uplink data, the UE then initiates a traditional random access procedure. Such as Figure 11 shown, including:

[0214] Step S21: UE sends a preamble sequence, and selects resources in unlicensed resources, and sends uplink data;

[0215] Step S22: The eNB parses the preamble sequence, but no unauthorized uplink data is detected, and replies with a random access response carrying an uplink authorization;

[0216] Step S23: The UE retransmits th...

example 3

[0220] If the UE uses unlicensed resources to send uplink data, the transmission power is not enough, which will cause the base station to fail to monitor the unlicensed uplink data. In this case, the base station may not successfully monitor the preamble sequence, and the base station cannot reply a random access response, so the unlicensed uplink transmission process can be converted to a traditional random access process.

[0221] When the UE fails to send unauthorized uplink data for n times, where n times are configured by system information broadcast or RRC signaling, the UE then initiates a traditional random access procedure.

[0222] Or the UE still fails to send unlicensed uplink data up to the maximum transmission power, and then the UE initiates a traditional random access procedure.

[0223] Flowchart such as Figure 12 shown, including:

[0224] Step S31: The UE sends the preamble sequence, selects resources in the unlicensed resources, and sends uplink data; t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention disclose an uplink data sending method and device. The method is applicable to a terminal. The method includes the following steps that: unauthorized resources are utilized to send uplink data; and after the sending of the uplink data by the unauthorized resources fails, authorized resources are adopted to send the uplink data.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to an uplink data transmission method and device. Background technique [0002] The existing medium and long-term evolution system (Long Term Evolution, LTE) is mainly composed of three devices: user equipment (User Equipment, UE), core network (Core Network, CN) and base station (Evolved Node B, eNB), wherein, A Mobility Management Entity (MME) in the core network is mainly responsible for signaling transmission, and a Serving GetWay (SGW) is mainly responsible for data transmission. The interface between the UE and the eNB is Uu, and the interface between the eNB and the core network is S1. [0003] According to the current agreement, if the UE wants to communicate with the eNB, it must first access the eNB, that is, initiate a random access process. Such as figure 2 As shown, random access using authorized resources includes four steps, which are: [0004] Step S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W72/12H04W72/14H04W74/08H04W76/20
CPCH04W72/1221H04W74/0833H04W72/23H04W16/14H04W76/19H04W52/146H04W52/362H04W52/48H04W52/50H04W52/367H04W52/242H04W52/245H04W76/30H04W76/27H04W52/36H04W72/0473
Inventor 牛丽吴昱民
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products