Disclosure of Invention
The invention mainly aims to provide an unauthorized signal access method, an unauthorized signal access system, a terminal and a storage medium, and aims to solve the technical problem of how to improve the access performance of the terminal under low interference or low load.
In order to achieve the above object, the present invention provides an unlicensed signal access method, which includes the following steps:
transmitting the unlicensed preamble to a base station;
receiving a channel ordering result and an interference threshold value fed back by the base station according to the unlicensed preamble, the licensed preamble of the licensed terminal and the transmission power of the licensed signal;
determining the transmission power of the unlicensed signal according to the power distribution factor and the channel sequencing result;
taking the unlicensed terminal with the unlicensed information transmitting power smaller than the interference threshold value as a target terminal;
coding a signal to be transmitted corresponding to the target terminal to obtain an unauthorized coding signal;
and superposing the authorization code signal and the unauthorized code signal, and accessing the target terminal to the base station based on the superposed code signal.
Optionally, the step of encoding the signal to be transmitted corresponding to the target terminal to obtain an unauthorized encoded signal includes:
dividing a transmitting signal corresponding to the target terminal into a private signal and a public signal according to a rate dividing factor;
and respectively encoding the private signal and the public signal to obtain an unauthorized encoding signal.
Optionally, after the step of superposing the authorized code signal and the unauthorized code signal and accessing the target terminal to the base station based on the superposed code signal, the method further includes:
receiving a private signal drying ratio and a public signal drying ratio sent by the base station;
determining a private signal sending rate according to the private signal data packet length, the private signal drying ratio and the private signal packet loss rate;
determining a public signal sending rate according to the public signal data packet length, the public signal drying ratio and the public signal packet loss rate;
and determining the signal transmission rate of the unauthorized terminal according to the private signal transmission rate and the public signal transmission rate.
Optionally, after the step of determining the signal transmission rate of the unlicensed terminal according to the private signal transmission rate and the public signal transmission rate, the method further includes:
and determining the access time of the unlicensed terminal according to the signal transmission rate of the unlicensed terminal and the channel sequencing result.
In order to achieve the above object, the present invention provides an unlicensed signal access method, which includes the following steps:
receiving an authorization preamble and an authorization signal transmitting power transmitted by an authorized terminal, and receiving an unauthorized preamble transmitted by an unauthorized terminal;
determining channel gain according to the authorized lead code and the unauthorized lead code;
sorting the channel gains, and determining an interference threshold value according to the channel gains and the authorized signal transmission power;
transmitting the channel sequencing result and the interference threshold value to an unlicensed terminal;
and receiving the superposed coded signal sent by the unauthorized terminal so as to access the unauthorized terminal.
Optionally, after the step of receiving the post-superposition coded signal sent by the unlicensed terminal to access the unlicensed terminal, the method further includes:
and decoding according to the sequence of the public signal, the authorized encoding information and the private signal in the superimposed encoding signal.
Optionally, after the step of sequentially decoding according to the order of the public signal, the authorized encoding information and the private signal in the post-superposition coded signal, the method further includes:
determining a public signal drying ratio and a private signal drying ratio, and transmitting the public signal drying ratio and the private signal drying ratio to an unauthorized terminal;
and combining the decoded public signal and the decoded private signal to obtain the transmission signal of the unauthorized terminal.
In addition, in order to achieve the above purpose, the invention also provides an unlicensed signal access system, which comprises an unlicensed terminal and a base station for implementing the above data interaction between the unlicensed terminal and the base station
In addition, to achieve the above object, the present invention also proposes a terminal comprising a memory, a processor and an unlicensed signal access program stored on the memory and executable on the processor, the unlicensed signal access program being configured to implement the unlicensed signal access method as described above.
In addition, in order to achieve the above object, the present invention also proposes a storage medium having stored thereon an unlicensed signal access program, which when executed by a processor, implements an unlicensed signal access method as described above.
The invention discloses an unauthorized signal access method, a system, a terminal and a storage medium, wherein the method comprises the following steps: transmitting the unlicensed preamble to a base station; receiving a channel sequencing result and an interference threshold value fed back by the base station according to the unlicensed preamble, the licensed preamble of the licensed terminal and the transmission power of the licensed signal; determining the transmission power of the unlicensed signal according to the power distribution factor and the channel sequencing result; taking an unlicensed terminal with unlicensed information transmission power smaller than an interference threshold value as a target terminal; coding a signal to be transmitted corresponding to a target terminal to obtain an unauthorized coding signal; the method comprises the steps of superposing an authorized encoding signal and an unauthorized encoding signal, accessing the target terminal into the base station based on the superposed encoding signal, selecting the target terminal smaller than an interference threshold value, encoding and superposing a signal to be transmitted to the base station, and further adopting a time backoff access method combining channel gain and signal rate, so that the base station is not always under the conditions of high load and high interference, and further improving the access performance of the terminal.
Detailed Description
Referring to fig. 1, fig. 1 is a flowchart of a first embodiment of an unlicensed signal access method according to the present invention.
Step S10: the unlicensed preamble is transmitted to the base station.
It should be noted that, the execution body of the embodiment may be an unauthorized terminal with functions of data processing, network communication and program running, or other electronic devices capable of implementing the same or similar functions, which is not limited in this embodiment.
It should be understood that in the current random access research, the semi-unlicensed random access includes semi-unlicensed random access based on NOMA, however, the disadvantage is mainly that the semi-unlicensed random access based on NOMA needs to implement performance advantage of random access under high load and high interference condition.
In order to overcome the above-mentioned drawbacks, the present embodiment sets an interference threshold, and determines an unlicensed terminal that can be accessed according to the interference threshold, so that a large number of unlicensed terminals can be accessed, and a certain number of unlicensed terminals can also be accessed, and meanwhile, after the base station receives the superimposed transmission information sent by the unlicensed terminal, the transmission information is decoded by using serial interference cancellation, so that the access performance of the unlicensed terminal can be maintained without being under high load and high interference all the time.
The semi-unlicensed random access combines partial licensed access and unlicensed access, and under the condition that the licensed terminal occupies a channel, the licensed terminal channel is shared to the unlicensed terminal, so that the licensed terminal and the unlicensed terminal are simultaneously accessed to the base station, thereby effectively improving the access number of the system terminal, ensuring the service quality of specific users and reducing the access cost of the terminal.
It will be appreciated that the present embodiment includes a plurality of unlicensed terminals, and the present embodiment does not make any limitation on the number of unlicensed terminals, and the unlicensed signal access system includes one licensed terminal and one base station. For ease of understanding, referring to fig. 4, fig. 4 is a system for unlicensed signal access, where there is a base station, an authorized terminal, and a plurality of unlicensed terminals, the authorized terminal and the unlicensed terminals are in signal communication with the base station.
It will be appreciated that the unlicensed terminal and the licensed terminal will be derived from the preamble set
And randomly selecting the respective preambles, and transmitting the selected authorized preamble and unlicensed preamble to the base station. And M preambles are orthogonal to each other, i.e. satisfy +.>
And->
It will be appreciated that the start of an ethernet frame is also a sign that the peer network card can ensure synchronization with. The end of the preamble is a field called SFD, the value of which is 11, followed by the body of the ethernet frame. The preamble + SFD together takes up 8 bytes. The preamble is a set of bits at the beginning of the packet from which the receiver can synchronize and prepare to receive the actual data.
Step S20: and receiving a channel sequencing result and an interference threshold value fed back by the base station according to the unlicensed preamble, the licensed preamble of the licensed terminal and the transmission power of the licensed signal.
After receiving the authorized preamble and the authorized signal transmission power sent by the authorized terminal and the unauthorized preamble sent by the unauthorized terminal, the base station determines a channel gain according to the authorized preamble, the authorized signal transmission power and the unauthorized preamble, sorts the channel gains to obtain a channel sorting result, determines an interference threshold value according to the channel sorting result and the authorized signal transmission power, and then sends the channel sorting result, the interference threshold value and the authorized signal transmission power to the unauthorized terminal.
Step S30: and determining the unlicensed signal transmitting power according to the power distribution factor and the channel ordering result.
It should be noted that, according to the transmission power P of the unlicensed terminal
k' Power allocation factor alpha of unlicensed terminal
k' Determining partial signal transmitting power of unauthorized terminal by channel sequencing result
Step S40: and taking the unlicensed terminal with the unlicensed information sending power smaller than the interference threshold value as a target terminal.
When the transmission power of the unlicensed information is greater than the interference threshold, the unlicensed terminal does not transmit useful data on the time-frequency resource, and when the transmission power of the unlicensed information is less than the interference threshold, the unlicensed terminal is used as a target terminal. And the sending rate of the target terminal is calculated, the time of each target terminal accessing to the base station is calculated according to the sending rate of the target terminal, the phenomenon that each target terminal is simultaneously accessed to the base station is prevented, the access performance of the unlicensed terminal is improved, and the signaling overhead is reduced.
Step S50: and encoding the signal to be transmitted corresponding to the target terminal to obtain an unauthorized encoding signal.
It should be noted that, the authorized terminal encodes and transmits the useful signal to the time-frequency resource allocated by the base station, and the signal transmitted by the authorized terminal to the base station may be
P
0 Power s of transmitting useful signal for authorized terminal
0' May be the authorized terminal encoded information. Meanwhile, the target terminal divides the signal to be transmitted into a public signal and a private signal according to the rate division factor, and codes the public signal and the private signal respectively.
Step S60: and superposing the authorization code signal and the unauthorized code signal, and accessing the target terminal to the base station based on the superposed code signal.
It should be understood that the encoded information sent by the authorized terminal to the base station and the encoded information sent by the target terminal to the base station are both sent after being superimposed on the same time-frequency resource allocated by the base station.
It will be appreciated that the superposition may be performed in the order of the encoded public signal and the encoded private signal of the target terminal, which is not limited in this embodiment.
The embodiment transmits an unlicensed preamble to a base station; receiving a channel sequencing result and an interference threshold value fed back by the base station according to the unlicensed preamble, the licensed preamble of the licensed terminal and the transmission power of the licensed signal; determining the transmission power of the unlicensed signal according to the power distribution factor and the channel sequencing result; taking an unlicensed terminal with unlicensed information transmission power smaller than an interference threshold value as a target terminal; coding a signal to be transmitted corresponding to a target terminal to obtain an unauthorized coding signal; the method comprises the steps of superposing an authorized encoding signal and an unauthorized encoding signal, accessing the target terminal into the base station based on the superposed encoding signal, selecting the target terminal smaller than an interference threshold value, encoding and superposing a signal to be transmitted to the base station, and further adopting a time backoff access method combining channel gain and signal rate, so that the base station is not always under the conditions of high load and high interference, and further improving the access performance of the terminal.
Referring to fig. 2, fig. 2 is a flow chart of a second embodiment of the unlicensed signal access method according to the present invention, and the second embodiment of the unlicensed signal access method according to the present invention is proposed based on the first embodiment shown in fig. 1.
In a second embodiment, the step S50 includes:
step S501: and dividing the sending signal corresponding to the target terminal into a private signal and a public signal according to the rate dividing factor.
It should be noted that, in this embodiment, the transmission signal corresponding to the target terminal is divided into the private signal and the public signal by using the rate division multiple access method. Rate division multiple access (Rate-Splitting Multiple Access, RSMA) is a next generation air interface candidate multiple access technology, which divides information of multiple users into public signals and private signals at a transmitting end, combines the public signals of multiple users and overlaps the private signals for transmission, and decodes the public signals and then decodes the private signals by utilizing serial interference cancellation after receiving the overlapped information at a receiving end.
It should be noted that, the unlicensed terminal divides each useful message W according to the rate division factor k' Dividing the common signal W k',1 And private signal W k',2 。
Step S502: and respectively encoding the private signal and the public signal to obtain an unauthorized encoding signal.
The public signal W k',1 And private signal W k',2 Respectively encoded as s k',1 Sum s k',2 And superposing, wherein the superposed coded information can be:
wherein x is k ' represents the post-superposition coded signal, alpha k' Representing the power division factor, P k' Representing the transmission power of an unlicensed terminal s k',1 Representing the encoded public signal s k',2 Representing the encoded private signal.
Further, in order to prevent the overload of the base station, after the step of superposing the authorized code signal and the unauthorized code signal and accessing the target terminal to the base station based on the superposed code signal, the method further includes:
receiving a private signal drying ratio and a public signal drying ratio sent by the base station;
determining a private signal sending rate according to the private signal data packet length, the private signal drying ratio and the private signal packet loss rate;
determining a public signal sending rate according to the public signal data packet length, the public signal drying ratio and the public signal packet loss rate;
and determining the signal transmission rate of the unauthorized terminal according to the private signal transmission rate and the public signal transmission rate.
When decoding the superimposed encoded signals, the base station determines signal-to-interference-and-noise ratios of the encoded public signals, the encoded private signals and the encoded signals of the authorized terminal respectively and sends the signals to the unauthorized terminal.
It should be noted that the private signaling rate and the public signaling rate may be:
R k',1 =R(m k',1 ,ε k',1 ,γ k',1 );
R k',2 =R(m k',2 ,ε k',2 ,γ k',2 );
wherein R is k',1 Represents the common signaling rate, m k',1 Representing the length, epsilon, of the public signal data packet k',1 Indicating the packet loss rate of public signals, gamma k',1 Represents the dry ratio of public signals, R k',2 Representing private signaling rate, m k',2 Representing the packet length, epsilon, of the private signal k',2 Indicating the packet loss rate of private signals, gamma k',2 Indicating the private signal dry ratio.
It can be appreciated that adding the private signaling rate to the public signaling rate obtains the unlicensed terminal signaling rate, i.e., the unlicensed terminal signaling rate can be R k' =R k',1 +R k',2 。
Further, in order to prevent the overload of the base station, the step of determining the signal transmission rate of the unlicensed terminal according to the private signal transmission rate and the public signal transmission rate further includes, after:
and determining the access time of the unlicensed terminal according to the signal transmission rate of the unlicensed terminal and the channel sequencing result.
It will be appreciated that the unlicensed terminals have back-off times, i.e. each unlicensed terminal has access time for it, rather than accessing the base station simultaneously.
It should be noted that, the product of the back-off time and the signal sending rate of the unlicensed terminal and the channel ordering result is in an inverse proportion relationship, and the access time of the unlicensed terminal may be:
where a is a constant coefficient, a=1 and r may be set in general k' Indicating the signal transmission rate of the unauthorized terminal, O k' Representing the channel ordering result.
According to the embodiment, a sending signal corresponding to the target terminal is divided into a private signal and a public signal according to a rate division factor; and respectively encoding the private signal and the public signal to obtain an unauthorized encoding signal. In the embodiment, the sending signal corresponding to the target terminal is divided into the private signal and the public signal, and the private signal and the public signal are encoded and then transmitted, so that the communication requirement of equipment differentiation is met when a large number of terminals are accessed.
Referring to fig. 3, fig. 3 is a flow chart of a third embodiment of the unlicensed signal access method according to the present invention, and the third embodiment of the unlicensed signal access method according to the present invention is provided.
Step S10': and receiving the authorization preamble and the authorization signal transmitting power transmitted by the authorized terminal, and receiving the authorization-free preamble transmitted by the authorization-free terminal.
It should be noted that, the base station may receive the combined authorization preamble and the unlicensed preamble as follows:
in the formula, wherein
Indicating the transmitting power of authorized terminal and unauthorized terminal, h
k Channel coefficients representing authorized and unauthorized terminals to base station,
Representing an authorized preamble and an unauthorized preamble, z
p Representing the noise corresponding to the base station.
Step S20': and determining channel gain according to the authorized lead code and the unlicensed lead code.
It should be noted that, the combined preamble information is projected to the complex conjugate of the preamble
Obtained by the method
Further can obtain h k The MMSE estimate of (i.e., channel gain) is:
step S30': and sequencing the channel gains, and determining an interference threshold value according to the channel gains and the authorized signal transmission power.
It should be noted that, the base station orders the channel gains from small to large according to the channel state information from the terminal to the base station:
and determining the ordering position of the authorized terminals at all terminal channel gains. It should be noted that if n=1, the authorized terminal is the terminal with the weakest channel gain, and if N-1=k, the authorized terminal is the terminal with the strongest channel gain.
It should be noted that, the interference threshold is determined according to the channel gain of the authorized terminal and the transmission power of the authorized signal, and the interference threshold may be:
wherein P is
0 Indicating the power at which the authorized terminal transmits the useful signal,
communication rate requirements indicating that an authorized terminal needs to meet, < >>
Channel, m, representing authorized terminal
0 Indicating the length epsilon of the data packet sent by the authorized terminal
0 Indicating the maximum allowable packet loss rate for authorized terminals.
Step S40': and sending the channel sequencing result and the interference threshold value to an unlicensed terminal.
It can be understood that the base station transmits the channel ordering result and the interference threshold value to the unlicensed terminal, the unlicensed terminal determines the target terminal according to the interference threshold value and estimates the signal transmission rate of the target terminal, and determines the time when the target terminal accesses the base station based on the channel ordering result and the signal transmission rate of the target terminal.
Step S50': and receiving the superposed coded signal sent by the unauthorized terminal so as to access the unauthorized terminal.
After receiving the superimposed encoded information, the base station decodes the encoded information by using the SIC, and may decode the encoded public signal of the target terminal, the encoded information of the authorized terminal, and the encoded private signal of the target terminal.
In order to facilitate understanding, referring to fig. 5, fig. 5 is a signaling diagram of signal access of an unlicensed terminal, in which the unlicensed terminal and an authorized terminal randomly select respective preambles and transmit the preambles to a base station, the base station estimates channel gains according to the preambles, the base station orders the channel gains, the base station transmits parameters such as an interference threshold value to the unlicensed terminal and the authorized terminal through calculation, the unlicensed terminal determines the unlicensed terminal to be accessed according to the interference threshold value, takes the unlicensed terminal to be accessed as a target terminal, encodes a useful signal of the target terminal, and simultaneously encodes the useful signal by the authorized terminal, and superimposes the encoded signal of the target terminal. The target terminal sends the superimposed encoded signal to the base station, the authorized terminal sends the encoded signal to the base station, and the base station receives and decodes the superimposed encoded signal and the encoded signal.
Further, in order to obtain signals transmitted by the unlicensed terminal and the licensed terminal, after step S50' of this embodiment, the method further includes:
and decoding according to the sequence of the public signal, the authorized encoding information and the private signal in the superimposed encoding signal.
It should be noted that, the base station receives the signal from the authorized terminal U 0 Unauthorized terminal U k' Is the superimposed signal of (a)
In the formula, h k' Channel coefficient indicating unauthorized terminal, h 0' Representing the channel coefficients of authorized terminals.
It can be appreciated that the base station follows s k',1 →s 0' →s k',2 The decoding sequence of the target terminal, namely the coded public signal of the target terminal, the coded signal of the authorized terminal and the coded private signal of the target terminal, and sequentially decoding each signal by using SIC.
Further, in order to determine the signal transmission rate of the unlicensed terminal, after the step of sequentially decoding according to the order of the public signal, the licensed encoded information and the private signal in the post-superposition encoded signal, the method further includes:
determining a public signal drying ratio and a private signal drying ratio, and transmitting the public signal drying ratio and the private signal drying ratio to an unauthorized terminal;
and combining the decoded public signal and the decoded private signal to obtain the signal sent by the unauthorized terminal.
It should be noted that, first, at s k',2 Sum s 0' Decoding under interference conditionsUnauthorized terminal U k' S of (2) k',1 Signal, base station decodes s k',1 The signal-to-interference-and-noise ratio of (a) is:
wherein N is 0 Is the noise power of the base station.
The base station will then derive the s from the superimposed encoded signal k',1 Is continued to decode s 0' The base station decodes s 0' The signal-to-interference-and-noise ratio of (a) is:
likewise, the base station will be related to s 0' Is finally decoded s k',2 The signal-to-interference-and-noise ratio of (a) is:
it can be understood that when the base station decodes the encoded information after superposition, the base station determines the signal-to-interference-and-noise ratio of the private signal and the public signal of the unlicensed terminal, and sends the signal-to-interference-and-noise ratio of the private signal and the public signal of the licensed terminal to the unlicensed terminal.
For easy understanding, referring to fig. 6, fig. 6 is a transmission flow chart of terminal signal codes, in which an unauthorized terminal transmits a short packet W k Dividing W k' Dividing the common signal W k',1 And private signal W k',2 Will share the common signal W k',1 And private signal W k',2 Respectively performing channel coding to obtain s k',1 Sum s k',2 For s k',1 Sum s k',2 After power distribution, overlapping and transmitting, authorized terminal transmits short packet W 0 Encoding into s 0 And performing power distribution, and directly transmitting the coded signals to the base station. The base station receives the superposition signal y and codes the signal s after superposition according to SIC k ',1、s 0 Sum s k',2 Decoding to obtain useful signal W of authorized terminal 0 And combining the decoded private signal and public signal to obtain useful signal W of unauthorized terminal k' 。
The embodiment receives the authorization preamble and the authorization signal transmitting power sent by the authorized terminal, and receives the unauthorized preamble sent by the unauthorized terminal; determining channel gain according to the authorized lead code and the unauthorized lead code; sorting the channel gains, and determining an interference threshold value according to the channel gains and the authorized signal transmission power; transmitting the channel sequencing result and the interference threshold value to an unlicensed terminal; and receiving the superposed coded signal sent by the unauthorized terminal so as to access the unauthorized terminal. According to the method, the interference threshold value is determined according to the channel gain and the authorized signal transmission power, and the interference threshold value and the channel sequencing result are sent to the unlicensed terminal, so that the unlicensed terminal selects the target terminal with the signal transmission power smaller than the interference threshold value, and the time backoff access method combining the channel gain and the signal rate is further adopted, so that the base station can keep higher access performance when the accessed target terminal is few, namely, the base station is under low load.
In addition, the embodiment of the invention also provides a storage medium, wherein the storage medium is stored with an unlicensed signal access program, and the unlicensed signal access program realizes the unlicensed signal access method when being executed by a processor.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. read only memory mirror (Read Only Memory image, ROM)/random access memory (Random Access Memory, RAM), magnetic disk, optical disk), comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.