CN112995960A - Data transmission method for straight-through communication of chained networking terminals - Google Patents

Data transmission method for straight-through communication of chained networking terminals Download PDF

Info

Publication number
CN112995960A
CN112995960A CN202110252849.8A CN202110252849A CN112995960A CN 112995960 A CN112995960 A CN 112995960A CN 202110252849 A CN202110252849 A CN 202110252849A CN 112995960 A CN112995960 A CN 112995960A
Authority
CN
China
Prior art keywords
terminal
data
rxmac
message
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110252849.8A
Other languages
Chinese (zh)
Other versions
CN112995960B (en
Inventor
张永生
王重阳
郭梯云
李建东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baoding Trillion Micro Software Technology Co ltd
Original Assignee
Beijing Guozhi Zhonghe Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guozhi Zhonghe Technology Co ltd filed Critical Beijing Guozhi Zhonghe Technology Co ltd
Priority to CN202110252849.8A priority Critical patent/CN112995960B/en
Publication of CN112995960A publication Critical patent/CN112995960A/en
Application granted granted Critical
Publication of CN112995960B publication Critical patent/CN112995960B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • H04W56/001Synchronization between nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a data receiving method of direct communication of a chain type networking terminal based on a broadband technology, which comprises the following steps: the RXMAC of terminal UE2 receives a message that data needs to be received; the RXMAC of the terminal UE2 sends a message to the L1C that buffers the data to be received into the upstream buffer; L1C of the terminal UE2 requests reception of data to RXMAC at a prescribed timing according to the RESOURCE _ MAP message; the RXMAC of the terminal UE2 determines whether the message is a signaling packet according to the MAC header, and if so, the RXMAC of the terminal UE2 sends the signaling packet to the AC of the second terminal UE 2; if not, the RXMAC of the terminal UE2 determines whether the message is a data packet of the UE according to the MAC header; if so, the RXMAC of the second terminal UE2 sends the packet to the IPRELAY of the second terminal UE 2; if not, the RXMAC of terminal UE2 sends the packet to the second terminal UE2 uplink buffer and informs the TXMAC of terminal UE 2. The invention expands the coverage of network access with D2D multi-hop ad hoc network with low cost while retaining the advantages of cellular network.

Description

Data transmission method for straight-through communication of chained networking terminals
Technical Field
The invention relates to a data transmission method of direct communication of a chained networking terminal, in particular to a data transmission method of direct communication of a chained networking terminal based on a broadband technology.
Background
The description of the background of the invention pertaining to the related art to which this invention pertains is given for the purpose of illustration and understanding only of the summary of the invention and is not to be construed as an admission that the applicant is explicitly or implicitly admitted to be prior art to the date of filing this application as first filed with this invention.
In some application scenarios based on the LTE technology, for example, data acquisition of a smart grid of a power system, downlink transmission of acquisition instructions, and uplink transmission of acquired various types of data, some smart meters may be arranged in places with large path loss and weak coverage, and the signal-to-noise ratio of uplink reception is very low. In the existing general LTE network, in the border area of a cell or some special places, the transmission power of the existing cell is difficult to cover all users, and a user cannot access the existing place.
Device to Device (D2D) refers to direct communication between two or more mobile stations without being relayed through a base station or network. Namely, the UE in the signal coverage is selected as the relay UE, and data transmission is performed between the relay UE and the UE outside the signal coverage, so that the UE outside the signal coverage accesses the network through the relay UE, and therefore, in an area where the network coverage cannot be reached, the D2D mode can support effective communication between mobile stations. To realize direct communication of terminals, a plurality of key technologies need to be broken through. For example, an inter-terminal synchronization technique, an inter-terminal discovery technique, an inter-terminal data transmission technique, an inter-terminal time domain and frequency domain resource coordination technique, and the like.
At present, the communication protocols of terminal direct connection include zigbee, lora, wifi and the like. Although Zigbee and lora have the characteristics of wide coverage and flexible networking, they are narrowband communication and have a low transmission rate. Wifi provides broadband communication, but is limited by the close range of communication.
4/5G broadband network is a network with base stations as the center, and terminals communicate with each other through the relay of the base stations (and core network). If the terminal cannot contact the base station, the terminal cannot communicate. Therefore, how to avoid the above-mentioned drawbacks and perform channel allocation reasonably so that UEs out of signal coverage can access the network through the relay UE becomes a problem to be solved urgently.
The invention combines the basic channel waveforms of PSS/SSS, PRACH, SC-OFDM and the like in 4G/5G communication, provides a novel broadband terminal direct connection protocol, and the terminal automatically establishes a chain network to carry out broadband direct connection communication and submits as a series of applications, comprising the following steps: the method comprises a channel configuration method, an inter-terminal synchronization method, a terminal access method, an inter-terminal data transmission method and an inter-terminal time domain and frequency domain resource coordination method. The method is expected to provide a long-distance high-reliability broadband terminal direct communication protocol.
The invention relates to a data transmission method of chain type networking terminal direct communication D2D based on broadband technology, aiming at enabling UE outside signal coverage to access a network through relay UE based on a newly-proposed terminal direct communication protocol technology, thereby realizing terminal data transmission in a non-base station coverage area, being widely applied to a terminal relay scene, and effectively expanding the coverage range of network access and remote data return in a low-cost manner.
Disclosure of Invention
The invention provides a novel data transmission method of terminal direct communication D2D based on broadband technology based on a novel terminal direct communication protocol proposed by the applicant.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
In one aspect of the invention, a data transceiving method for direct communication of a chain type networking terminal based on a broadband technology is provided.
According to another aspect of the present invention, there is provided a terminal access system for direct communication of a chain-type networking terminal based on broadband technology, which is characterized in that the system includes a memory and a processor, the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to execute the above data transceiving method for direct communication of a chain-type networking terminal based on broadband technology.
According to yet another aspect of the present invention, there is provided a storage medium having stored thereon computer program instructions executable by a processor to implement the data transceiving method for direct communication of a chain networking terminal based on broadband technology as described above.
Under the condition of keeping the advantages of the cellular network, the invention uses the D2D multi-hop self-organizing network to expand the coverage range of network access with low cost, thereby supporting high bandwidth flexible configuration of 1.4M-100M, high speed and video service, and simultaneously compared with a WIFI communication mode, the communication distance is longer, the frequency range is more flexible, and the safety is higher.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 shows a first application scenario of the terminal access method of the direct communication D2D for chain-type networking terminals based on broadband technology according to the present invention;
fig. 2 shows a second application scenario of the terminal access method of the chain-type networking terminal direct communication D2D based on the broadband technology;
fig. 3 shows a chain networking manner between UEs adopted by the terminal access method of the chain networking terminal direct communication D2D based on the broadband technology;
fig. 4 is a system frame structure diagram of D2D adopted in the terminal access method of the chain-type networking terminal direct communication D2D based on the broadband technology;
FIG. 5 shows the sub-frame allocation map of a 40ms system superframe of D2D as employed by the present invention;
FIG. 6 is a diagram illustrating a 40ms superframe 5 user subframe allocation schedule of the synchronization channel of D2D according to the present invention;
fig. 7 and 8 show parameter configuration diagrams of the PSS, and the SSS, respectively;
figure 9 shows a time-frequency location diagram of the PUCCH & USS channel;
fig. 10 shows a RE mapping diagram of PUCCH;
fig. 11 and 12 show parameter configuration tables for DMRS and PRACH, respectively;
fig. 13 shows determined reference symbol positions in a PUSCH channel;
fig. 14(a) shows a specific format of a header of a RAR packet, and fig. 14(B) and 14(C) show a specific format of a header of a non-RAR packet.
Fig. 15 shows a diagram of MAC scheduling information;
fig. 16 is a schematic time-frequency location diagram of a synchronization channel in the terminal synchronization method for broadband technology-based terminal direct communication according to the present technology;
fig. 17(a) and 17(B) show parameters of messages MSG2 and MSG4, respectively.
Fig. 18(a) shows a transmitting-side data transfer flow in the data transceiving method for terminal through communication based on the broadband technology of the present invention;
fig. 18(B) shows a receiving side signaling data transfer flow in the data transceiving method for terminal through communication based on broadband technology of the present invention;
fig. 18(C) shows a receiving-side service data transfer flow in the data transceiving method for terminal direct communication based on broadband technology according to the present invention;
fig. 18(D) shows a receiving-side forwarding data flow in the data transceiving method for terminal direct communication based on broadband technology according to the present invention;
fig. 19 is a schematic structural diagram of an electronic device entity provided in an embodiment of the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a first application scenario of the terminal access method of the chain networking terminal direct communication D2D based on the broadband technology. As shown in fig. 1, a D2D multi-hop ad hoc network mode is added on the basis of a standard cellular network, and coverage extension is realized by using terminal relay. A terminal which is not in the coverage range of the base station network can communicate with other terminals through D2D, and is finally connected with a base station or a control console through multi-hop relay of a plurality of terminals, so that network access is realized. This effectively extends the coverage of network access in a cost-effective manner. The coverage area of the base station is used for communication between the terminal and the base station, and the coverage area of the base station is not used for direct communication between the terminal and the base station.
The communication terminals are denoted as T1, T2, T3, … … in the drawing. Within the coverage of the base station eNB1, e.g., terminal T1/T2, transmits data back directly over the wireless network. Within the coverage of base station eNB2, terminal T5 transmits data back directly over the wireless network. Outside the coverage of the base station, for example, T3 and T4 terminals pass through a D2D multi-hop network, and after multi-stage relaying, for example, data can be transmitted to other terminals, such as T1 through T2 relaying, and finally backhaul is implemented through the base station network.
Fig. 2 shows a second application scenario of the data transmission method of the chain-type networking terminal direct communication D2D based on the broadband technology. As shown in fig. 2, in the second application scenario of the present application, wireless access all employs a D2D multi-hop ad hoc network. The entire communication terminal is denoted as T1, T2, T3, … … in the drawing. T1 is connected to the router through wired Ethernet to realize external network connection. And a multi-hop self-organizing network is formed among the T1-T5 terminal nodes. The data of the T5 is relayed by terminal nodes such as T4, T3, T2, T1 and the like in sequence, and finally reaches a router, so that the connection of an external network is realized.
Thus, the wireless network is entirely composed of terminals with D2D functionality, and no base station is required. And realizing a high-availability network by terminal self-organization. Terminals within a certain distance can mutually discover to form an ad hoc network. When a certain terminal node fails, other nodes can be automatically adjusted to realize network self-healing to a certain degree. This results in a considerable increase in the availability and reliability of the network and, on the other hand, simplifies the maintenance work of the network.
Fig. 3 shows a chained networking manner among UEs adopted by the terminal access method of the broadband technology-based terminal direct communication D2D of the present invention. As shown in fig. 3, after receiving the link establishment request from the head node UE1, the head node UE1 starts sending synchronization signals, the surrounding nodes search for synchronization signals and request access to the UE1, the UE1 selects a UE2 with the closest distance from the received requests for access connection, after the access is successful, the UE1 and the UE2 establish a communication link, the UE1 stops sending synchronization signals, the UE2 starts sending synchronization signals, the surrounding nodes receive signals and request connection to the UE2, the UE2 selects the closest UE3 to establish a communication link, and so on. The head node communicates only with the lower node, the tail node communicates only with the upper node, and the middle node communicates with the upper and lower UEs.
In the prior art, resource scheduling of an LTE system is a fast time-frequency resource allocation, an eNodeB allocates radio resources every 1ms, and a time-frequency resource diagram of the LTE system is shown in the figure. This way it is possible for D2D to use unallocated time-frequency resources or to partially multiplex already allocated resources.
In the LTE system, as shown in fig. 4, the basic unit of the time domain radio resource is TTI (transmission time interval), and each TTI value is 1 ms. Each TTI, in turn, consists of 2 slots of 0.5ms, i.e., 14 OFDM symbols in a typical configuration. The 10 TTIs constitute one LTE radio frame.
In the frequency domain, the whole bandwidth is divided into 20khz sub-channels, which correspond to 12 consecutive 15khz sub-carriers. The size of the sub-channel is fixed, and the number of sub-channels corresponding to different bandwidths is different.
In the time-frequency domain, the time domain corresponds to 0.5ms, and the unit corresponding to 1 subchannel in the frequency domain is called rb (resourceblock).
D2D communication typically has 4 modes: an uplink multiplexing mode, a downlink multiplexing mode, a dedicated resource mode, and a relay mode.
The multiplexing mode D2D user multiplexes the cellular user resource to generate co-channel interference, the base station adopts reasonable resource allocation and power control, multi-antenna technology and advanced coding technology to control the interference between links.
Dedicated resource mode D2D users occupy a portion of the independent resources for end-to-end direct communication and the remaining resources are used for cellular communication. Because the resources of the parts are mutually orthogonal, no interference is generated between the D2D communication and the cellular communication.
Relay mode (conceptually the same as conventional cellular mode) D2D users relay communications through the base station, and all communication links allocate independent orthogonal channel resources without interfering with each other.
The selection of the mode depends on a variety of factors and also determines the different data synchronization and transmission modes.
The D2D mode selection strategy depends not only on the link quality between D2D devices and between D2D devices and the base station, but also on the specific interference environment and location information. For example, the mode selection based on path loss is simple and easy but has poor performance, and only considers the channel condition between D2D devices. For another example, when the D2D device is far away from the base station, the effect of using the uplink frequency band is better than that of the downlink frequency band; when the D2D device is closer to the base station, it is better to use the downlink frequency band than the uplink frequency band. However, good mode selection algorithms need to take into account a number of factors and have higher requirements for channel measurements.
The application selects a downlink frequency band.
Fig. 5 shows a system frame structure diagram of D2D adopted by the terminal UE downlink synchronization method of the broadband technology-based terminal direct communication D2D of the present invention. Fig. 5 is a schematic diagram of a system frame structure of D2D adopted in the terminal UE downlink synchronization method of the broadband technology-based terminal direct communication D2D according to the present invention. The system frame structure of D2D of the present invention is composed of a system superframe, a system half frame, a system subframe (synchronization subframe/scheduling measurement subframe), and a data subframe. As described in turn below.
1) System superframe
The system superframe length is N, the system superframe is composed of two system half-frames with the same length, and the length of each system half-frame is N/2. Wherein the system superframe length N can be configured to be 4, 8, 16, i.e. corresponding to 40ms/80ms/160 ms.
2) System half-frame
A system superframe is composed of two system fields.
The system half frame is composed of a system subframe (synchronous subframe/scheduling measurement subframe) and a data subframe, and the length of the system half frame is N/2. When the system superframe N is configured to be 4, 8, 16(40ms/80ms/160ms), the system field length corresponds to 2, 4, 8(20ms/40ms/80 ms).
In order to solve the problem of data frame resource preemption, a first system half frame (also called a system first half frame) starts to schedule and preempt data subframe resources in a scheduling subframe from a first node of a user, and a second system half frame (also called a system second half frame) starts to schedule and preempt the data subframe resources in the scheduling subframe from a last node of the user.
Fig. 6 shows the subframe allocation map of a 40ms system superframe of D2D employed by the present invention. Assume that users corresponding to the communication terminals T1-T5 of fig. 1-2 are UEs 1-5. As shown in fig. 6, a 40ms system superframe is a scheduling diagram for allocating subframes to 5 users UE 1-UE 5. The system has 5 users, the system frame is set as 40ms, wherein, the first half frame of users arranges the scheduling subframes from UE1 to UE5 in sequence, so that the data subframes are preempted from the sequence of users UE1 to UE5, and the second half frame of the system is opposite, and the scheduling subframes and the data subframe resources are preempted from the sequence of users UE5 to UE 1.
3) System subframe
The system subframe includes: a synchronization subframe, a scheduling measurement subframe, and a data subframe.
3.1) synchronization subframes
The synchronization subframe contains 2 symbols, which are PSS and SSS, respectively. Transmission is performed at regular intervals starting at one subframe 0 of the system superframe. When the system superframe length is 40ms, 80ms and 160ms respectively, the fixed period corresponding to the synchronous subframe is 20ms, 40ms and 80 ms. And transmitting a PSS sequence of one symbol and an SSS sequence of one symbol after 624Ts at the boundary of the synchronous subframe.
And the tail node transmits the synchronization subframe for synchronizing other surrounding nodes only when the system is networked.
3.2) scheduling measurement subframes
The scheduling measurement subframe uses 1 subframe as a unit, and finds the corresponding position of the user system measurement subframe in the system superframe according to the current node number obtained after user synchronization, and the scheduling measurement subframe in the first system field carries out time domain resource allocation in the system field in sequence from the head node (as shown in fig. 6, UE1- > UE 5). For example, subframe 2 of user UE2 is a scheduled measurement subframe sent to user UE1, subframe 3 is a scheduled measurement subframe sent to user UE3, and so on. The scheduled measurement sub-frames in the second system half-frame are allocated resources sequentially from the end node (e.g., UE5- > UE 1).
Before a user establishes a connection after synchronization, the first system half frame is used for access and system information transmission, and after the access, the whole system rearranges the position of the user scheduling measurement subframe corresponding to the second half system half frame, for example, once the user UE6 wants to access the system, subframe 1 of the second half system half frame becomes the scheduling measurement subframe sent by the user 6 to the user 1.
The scheduling measurement subframe configures the USS channel and the PUCCH channel or the RACH channel.
The USS channel: for the UE to perform channel time domain resource idle measurement, such as the subframe indicated in fig. 6. If the USS signals in the measurement scheduling subframes transmitted by user UE1 and user UE2 are not measured by user UE4, user UE4 may consider subframe 123 of frame 0 as available for reception, informing user UE5 that user UE5 may borrow these subframes to transmit data information to user UE 4. The same applies to subframes in the dark gray frame, taking the latter half system half frame user UE1 as an example, the user UE1 does not detect the USS signal in the measurement scheduling subframe from the user UE5, although the data subframes are already occupied by the data transmitted by the user UE5, the user UE1 may notify the user UE2 that there is no collision on the subframes, and the user UE2 determines according to the own data subframe occupancy, and may transmit data to the user UE1 on the subframes.
A PUCCH channel:
for the transmission of system information at access (MSG2/MSG3/MSG4/MSG5 …);
for indicating time-frequency scheduling information and corresponding MCS of data subframes, length of target UE data, etc. during connection, for example, in fig. 3, UE1 applies for data subframes 0-3 from UE2 for data transmission;
time-frequency domain scheduling information (the next system superframe takes effect) that indicates other users to schedule the measurement subframe as a data subframe when connected. For example, user 5 utilizes the scheduled measurement subframe time domain resources of users 1 and 2 for transmitting data to user 4. But this is limited to the case where user 4 does not detect the USS signals of user 1 and user 2 at the corresponding time domain locations during the channel idle measurement.
For feeding back ACK information in HARQ;
the relevant measurements for UE measurements include time frequency offset, link quality.
RACH channel:
the method is used for the lower node to initiate a random access signal to the upper node for uplink synchronization. And the time domain resource of the RACH is transmitted in the first symbol of the scheduling measurement subframe corresponding to the user.
3.3) data subframes
The data sub-frame is used for transmitting data among users, and the scheduling coding information of the data sub-frame is indicated by the scheduling measurement sub-frame. If the data subframe occupies time domain resources except the scheduling measurement subframe, the information in the scheduling subframe takes effect in the current half frame; and if the data subframe occupies the time domain resource of the scheduling subframe of other users, the information in the scheduling subframe takes effect in the next system superframe. The last sub-frame of the continuously transmitted data sub-frame should be reserved with GAP of N symbols on the scheduling, and the number of N is determined by the measurement result of USS between users.
The channel adopted by the transmission protocol of the terminal direct communication based on the broadband technology comprises the following steps: 1) synchronization channel, PSS channel and SSS channel; 2) control channels, PUCCH channels and USS channels; 3) a random access channel, PRACH channel; 4) data channel: a PUSCH channel.
1) Synchronization channel, PSS channel and SSS channel
The synchronization channel consists of a PSS channel and a SSS channel, occupying the middle 6 RBs of the entire transmission bandwidth. When the superframe length of the system is 40ms, the fixed period corresponding to the synchronization subframe is 20ms, and the period of the synchronization channel is 20 ms. One SSS symbol sequence and one SSS sequence are transmitted at the subframe boundary back 624 Ts. As shown in fig. 6, the time-frequency location of the synchronization channel is shown. The PSS channel consists of a PSS sequence of one symbol. The PSS sequence occupies the first 0FDM signal of the synchronization subframe. The PSS sequence is generated using the PSS sequence in 4G LTE. See the standard [ 3GPP TS 36.2116.11.1 ], generated using Root index u ═ 38.
The SSS channel is composed of SSS sequences of one symbol, and the SSS sequences occupy the second 0FDM symbol, occupying the middle 6 RBs of the entire transmission bandwidth. The SSS sequence is generated by adopting an SSS sequence in 4G LTE. Please refer to the standard [ 3GPP TS 36.2116.11.2 ], which is not repeated for the prior art.
The SSS sequence 0bit represents the front and back system field, the first system field SSS sequence minimum bit is 0, the second system field SSS sequence minimum is 1, 1-6bit represents the node number when accessing.
And the tail node transmits the synchronization information used for synchronizing other surrounding nodes and acquiring the order of the chain in the system to calculate the corresponding user information subframe resource only when the system is networked.
The parameter configuration of the PSS is shown as fig. 7.
Fig. 8 shows parameter configuration of the SSS.
2) Control channel, PUCCH & USS channel
Fig. 9 is a time-frequency position of the PUCCH & USS channel. The PUCCH and USS channels are transmitted in the first two symbols in the scheduling measurement subframe, and the PUCCH occupies the middle 6 RBs occupied by the USS in the whole system of the first two symbols.
Fig. 10 is RE mapping of PUCCH. The PUCCH channel consists of data and reference symbols, where the reference signals occupy fixed positions in one RB, i.e., the positions of REs 1, 5, 9, i.e., 1/4 intervals, as shown in the dark squares in fig. 10. Data occupies the remaining REs in 1 RB.
The DMRS sequences are generated by adopting uplink DMRS sequences in 4G LTE. See [ 3GPP TS 36.2115.5.2.1 ], for prior art, which is not described in detail. Wherein n iscsMOD (N,12), where N is the node index corresponding to the current user starting from the root node. Fig. 11 shows DMRS parameter configuration.
For PUCCH coding using the POLAR coding scheme of 5G NR, see [ 3GPP TS 38.2125.3.1 ], which is not described in detail for the prior art. After CRC is cancelled, 16 bits of mask to RNTI is adjusted by QPSK. Wherein Cellid used for generating scrambling codes is the node index of the user, and CRNTI is distributed by the upper node.
The sequence generation of the USS is the same as the PSS sequence generation formula generated by the PSS channel, and is generated using Root indexu 25.
3) Random access channel, PRACH channel
Fig. 12 shows a PRACH parameter configuration table. The PRACH channel is sent on a scheduling measurement subframe of a first half system frame sent to a superior node by a user, and is used for accessing the same superior node after downlink synchronization of the user. The PRACH starts transmission from the first symbol of the scheduled measurement subframe, occupying the middle 6 RBs of the system bandwidth. The RACH sequence formula [ 3GPP TS 36.2116.11.2 ] of LTE is applied, and is not described again for the prior art.
4) Data channel: PUSCH channel
Fig. 13 shows the determined reference symbol position in the PUSCH channel, which is determined according to the length of the transmission symbol and DMRS-add-pos (DMRS-additive position) configured in the scheduling information, as shown in fig. 13. The PUSCH channel is transmitted on a data subframe, consisting of data and reference symbols. And scheduling the time-frequency domain position and MCS of the PUSCH in the data subframe by the MAC information in the scheduling measurement subframe. The PUSCH channel may start to be transmitted at any position of 14 symbols of one subframe, with a transmitted symbol length of 1-14. The reference symbol position of the PUSCH is determined according to the length of the transmission symbol and the DMRS-add-pos configured in the scheduling information, as shown in FIG. 13, where l0For the first symbol DMRS symbol starting on PUSCH, the reference symbol occupies the entire PUSCH scheduled RB. The DMRS sequence generation formula is referred to as 3GPP TS 36.2116.11.2, which is not described in detail for the prior art.
And the channel coding of the PUSCH data adopts the LDPC coding standard of 5G. See [ 3GPP TS 38.2125.3.2 ], which is not described in detail for prior art. Wherein Cellid used for generating scrambling codes is the node index of the user, and CRNTI is distributed by the upper node.
The protocol high layer of the invention consists of an Access Control (AC), a data delivery layer (IPrealy) and an L2 layer. The following are described separately:
1) access control model layer (AC)
The access control mode layer (AC) is used to process system related information, as well as the establishment of RBs.
The access control mode (AC) layer is divided into two parts, transmission and reception. And sending a function mainly processing the cell established by the UE, and receiving a function mainly processing the cell to be accessed.
1.1) function of the transmitting part
Establishing a cell, namely reading NV content, acquiring basic information (superframe length, system frequency point, system bandwidth and the like) of the cell, and determining a cell ID number to be established according to whether the current UE has access to a certain cell and the accessed cell ID.
And establishing new RBs, namely three RBs are required to be established, one for communication between the UE and the UE at the upper stage, one for communication between the UE and the UE at the lower stage, and one for receiving downlink data sent to the UE.
1.2) function of the receiving part
Terminal access
Processing received system information
2) IPrealay layer
The IPrealay layer is responsible for delivering data between an upper layer and a lower layer; the setting mode is as follows:
2.1) configuring the native IP Address
According to the node position of the UE in the chain, the fixed front IP address is 192.168.13, and the last 8 bits is the current node position. For example, if the UE is the 5 th UE in the chain, the IP address is 192.168.13.5;
the last digit of the destination address IP of the data to be transmitted is regarded as the IP of the machine which transmits the data to the chain in the uplink direction, and so on.
2.2) establishment of bearers
The sending end at least establishes a bearer without a bearer ID and only has a direction;
the receiving end establishes a bearer and processes the IP data sent to the local machine;
the last byte value of the destination IP is passed to L2.
3) Layer L2
The L2 layer is responsible for handling non-signaling data. The L2 layer is divided into a PDCP layer, an RLC layer, and a MAC layer. An uplink buffer function is added, newly added cells of D2D can be processed, and a part of random access functions are added, wherein L1C is merged into L2 to be responsible for processing flows related to physical layer resource scheduling and time sequence, and a part of random access functions are added.
3.1) transmitting part
And (4) respectively grouping the uplink RB and the downlink RB, having no logical channel, and replacing the last byte value of the IP address in the MAC subheader.
There are three types of data: A) traffic data from IPRELAY (data delivery layer), B) signaling data from AC, C) data generated by L2 itself (system information, MAC CE, etc.).
3.2) receiving part
If the data is the data for the UE, the data is unpacked and then delivered to an upper layer;
if the data is forwarded, after the uplink and the downlink are judged, the data is put into a corresponding bearing cache, and the sending part carries out subsequent processing;
and if the system information is the system information, performing subsequent scheduling according to the content.
In the protocol, the MAC mainly includes RAR packets and non-RAR packets according to the packet format. Fig. 14(a) shows a specific format of a header of a RAR packet, and fig. 14(B) and 14(C) show a specific format of a header of a non-RAR packet.
As shown in fig. 14(a), the RAR packet is transmitted and received with a fixed timing, and the RAPID in the header is preambeindex in msg1, and is a generated random number.
As shown in fig. 14(B), the non-RAR packet is distinguished by the LCID. In the non-RAR message header, E: 1, followed by at least one prefix; e: 0, which is the last header.
Fig. 14(C) shows a specific definition of the non-RAR packet LCID.
On the basis of the RAR packet and the non-RAR packet shown in fig. 14(a) (B) (C), the predetermined rule of the MAC layer packet is as follows:
(1) the head is front and the data is back, the head may comprise more than one header;
(2) system information is before (if any), data is after;
(3) if the length of the packed packet does not reach the maximum length allowed by the MAC PDU, adding a Padding sub-header at the end of the MAC header;
(4) the last subhead has no length;
(5) if the length of the packed packet +2 is the maximum length allowed by the MAC PDU, the MAC PDU starts two bytes filled with 0xff and then is the subheader;
(6) if the length of the packed packet +1 is the maximum length allowed by the MAC PDU, the MAC PDU starts a byte to fill 0xff, and then is the subheader;
(7) if the length of the packed packet is the maximum length allowed by the MAC PDU, the MAC PDU does not contain 0xff and is directly the subheader.
The preset rule of the MAC layer unpacking is as follows:
when the data packet to be sent is very large and is larger than the sending length provided by the MAC, the IP packet needs to be split, which needs to add one byte of information to complete the function, and this byte is called an unpacking information byte. The MAC packs the packet by placing the unpack information byte in front of the data, i.e., as part of the data. The unpacking information byte consists of two parts: the rightmost 6bits represent the node number, the purpose is to tell the destination node to whom the ip packet is destined, and the leftmost two bits represent the position where the fragment sits in the ip packet:
00: no subpackage is carried out;
01: the beginning of an IP packet;
10: a middle packet of the IP packet;
11: the last part of the IP packet.
There may be three cases depending on the size of the IP packet: A) this IP packet is not split; B) this IP packet is split into two parts: a beginning and a last portion; C) this IP packet is split into three parts: beginning, middle and last portions.
The generation of the MAC scheduling information, namely the MAC is responsible for the generation of the scheduling information in the system measurement subframe, and the functions comprise:
(1) and the system is responsible for generating data subframe time-frequency information of the user to the upper node and the lower node according to the occupation condition of the current data subframe and the result of channel idle measurement.
(2) And the data subframe occupation condition of the whole superframe is updated.
(3) And the MCS is responsible for generating the data sub-frame according to the reported channel quality of the L1 layer.
(4) Responsible for the lower node TA value measured according to layer L1.
Specifically, fig. 15 shows a diagram of MAC scheduling information.
Based on the above definitions, the terminal synchronization method of terminal direct communication according to the present application searches for the PSS synchronization channel, then searches for the SSS synchronization channel, and finally performs RSRP calculation according to the DMRS to confirm the final synchronization through the downlink synchronization flow UE.
The terminal UE downlink synchronization method for the terminal direct communication comprises the following steps:
s10: the UE searches for the PSS synchronization channel, including in particular,
s101: the UE carries out PSS search in a period corresponding to the system superframe configuration length;
as described above, the system superframe is composed of N subframes (e.g., subframes having a length of 1 ms), and the length of the system superframe is denoted as N. A system superframe is divided into two system fields. The length of each system field is N/2. Where N may be configured to be 4, 8, 16, i.e., the system superframe corresponding period is 40ms/80ms/160 ms.
In this step, the UE configures a period corresponding to the length in the system superframe, i.e., 40ms/80ms @
The PSS search is performed for 160 ms.
In the invention technology related to the protocol, except that synchronous information is triggered and sent according to a command, the UE initially searches for a synchronous state for the PSS.
S102: the PSS synchronization channel is transmitted with said period starting at subframe 0 of the first frame of the system half frame, followed by a fixed period T2 (e.g., 624Ts) at the subframe boundary, one symbol PSS sequence and one symbol SSS sequence.
As shown in fig. 6, a 40ms system superframe, 5 user subframe allocation map. In order to solve the problem of data frame resource preemption, a first system field starts to schedule and preempt data subframe resources from a first node of a user in a scheduling frame, and a second system field starts to schedule and preempt the data subframe resources from a last node of the user in the scheduling frame. As shown in fig. 3, the system consists of 5 users, the system frame is set to 40ms, wherein the first half frame of users arranges the scheduling subframes from 1 to 5 in sequence, so that the data subframes are preempted from the sequence of users 1 to 5, and the second half frame of systems occupies the scheduling subframes and preempts the data subframe resources from the sequence of users 5 to 1.
Furthermore, the tail node transmits the PSS subframe only when the system is networked. In this manner, to synchronize with other surrounding nodes.
S11: it is determined whether the peak value of the PSS exceeds the threshold, and if so, step S12 is performed.
S12: the UE searches for the SSS synchronization channel.
S13: and judging whether the peak value of the SSS exceeds a threshold, if so, executing the step S14.
S14: and the UE acquires an SSS sequence corresponding to the SSS exceeding a judgment threshold, sets the current user node of the first system field to be 0bit and the current user node of the SSS sequence of the second system field to be 1bit, and determines a system information subframe in a scheduling measurement subframe occupied by the UE.
As described above, before the user establishes a connection after synchronization, the first system half frame (i.e. the first system half frame) is used for access and system information transmission, and after the access, the whole system rearranges the position of the user scheduled measurement subframe corresponding to the second half frame, for example, once the user UE6 wants to access the system, subframe 1 of the second half frame becomes the scheduled measurement subframe sent by the user 6 to the user 1.
The scheduling measurement subframe uses 1 subframe as a unit, and finds the corresponding position of the user system measurement subframe in the system superframe according to the current node number obtained after user synchronization, and the scheduling measurement subframe in the first system field carries out time domain resource allocation in the system field in sequence from the head node (as shown in fig. 6, UE1- > UE 5). For example, subframe 2 of user UE2 is a scheduled measurement subframe sent to user UE1, subframe 3 is a scheduled measurement subframe sent to user UE3, and so on. The scheduled measurement sub-frames in the second system half-frame are allocated resources sequentially from the end node (e.g., UE5- > UE 1).
The scheduling measurement subframe configures the USS channel and the PUCCH channel or the RACH channel.
In S14, when the SSS exceeds the judgment threshold, the current user node number of the first system half frame of the corresponding SSS sequence is 0bit, and the current user node number of the SSS sequence of the second system half frame is 1 bit;
the corresponding SSS sequence 0bit represents the front and back system field, the first system field SSS sequence minimum bit is 0, the second system field SSS sequence minimum 1, wherein, 1-6 represents the current user node number.
See fig. 16 for a schematic time-frequency location diagram of the synchronization channel. As shown in fig. 16, SSS is at the latter symbol position of PSS.
S15: according to PSS and SSS synchronous channels, calculating TCA and FCA of frequency domain, adjusting time sequence and AFC to correct time frequency offset;
s16: calculating RSRP according to the PSS and SSS synchronous signals which are periodically grabbed, determining whether to access the UE according to the strength of PRSP, and if so, executing a step S15;
s17: and synchronously adjusting DL _ Timing according to the PSS and the SSS to perform downlink synchronization, and calculating the starting position of the superframe of the system and the current subframe position.
After the RSRP is judged to decide to access the UE, DL _ Timing is synchronously adjusted according to the PSS and the SSS to carry out downlink synchronization, and the starting position of a superframe and the position of a subframe where the superframe is located at present are calculated.
Therefore, the terminal synchronization method of the terminal direct communication searches the PSS synchronization channel and the SSS synchronization channel through the downlink synchronization process UE, and finally calculates the RSRP according to the DMRS to confirm the final synchronization position and complete synchronization. In this way, the UE completes synchronization with other user nodes around.
The broadband technology-based terminal direct communication technology of the present invention can perform the step of UE access after the UE synchronization, and the technology adopts a random access process, and the following description is continued.
In the terminal access method of the broadband-based terminal direct communication D2D, as described above, the protocol high layer of the invention is composed of an Access Control (AC), a data delivery layer (IPrealy) and an L2 layer. The terminal access method of the terminal direct communication D2D based on the broadband technology is completed by the protocol high layer.
MSG1
After synchronization, the MSG1 is sent on the scheduling measurement subframe of the user calculated by the node index before the point in the first half frame, the information of the MSG1 such as Preamble Format, NCS, U, High-speed-flag is all defined by initialization, and the sent frequency domain position is 6 RBs in the middle.
S20: the AC (access control layer) informs the MAC (medium access control layer) to search the cell;
s21: the MAC sends the cell search result to the AC;
MAC sends terminal access request, the request message carries detected lead code, concretely, MAC calculates frame structure according to information (upper and lower half frame indication, existing node number) in SSS, and sends information in SSS to AC;
optionally, in step S211, when the MAC sends the cell search result to the AC, if multiple cells are searched, the MAC selects one cell according to a predetermined rule to report, so as to avoid performing cell search again when camping (camp on).
S22: the AC confirms that the cell can be accessed;
s23: the AC informs the MAC to initiate competition access and sends MSG3 carrying the ID number;
specifically, the AC selects which terminal's RACH request message to receive and informs the MAC to reply to MSG 2.
And (3) contention access, namely after the access node sends the PRACH, the access node judges that the PRACH is the same as the Preamble-idx of the access node after receiving the MSG2, and sends MSG3 to perform a contention access process in the nearest corresponding information subframe. If contention access is not considered, MSG3 completes for random access. And after receiving the access completion, the root node stops sending the synchronization information and sends MSG4 to inform the next node of completing the establishment. And the established node starts to send the synchronous signal.
The parameters of the MSG2 and MSG4 are shown in fig. 17(a) and 17(B), respectively.
MSG2
The sending node of the synchronization information searches RACH in corresponding resources, selects a nearest UE from the RACH, and receives MSG2 containing TA, Preamble-idx, RNTI and other system information on a scheduling subframe of a receiving upper node corresponding to the user in a first system half frame of a next system super frame.
S24: the MAC reports the MSG4 carried in the transmission message.
The parameter settings of MSG4 are shown in fig. 17 (B).
S25: and the AC judges that the access request of the UE of the cell is received, selects whether to approve the access of the UE according to the link condition and sends the MSG4 carrying the unique identification number of the accessed UE to the MAC.
Optionally, the step S25 further includes:
s251: judging whether the UE to be accessed is an initial node;
s252: if yes, executing the following access steps;
s253: if not, determine whether the UE initial state is a synchronization state?
S254: if yes, a random access process is carried out.
S26: the MAC finishes the UE access, transmits a message MSG5 to the AC and informs the lower-level UE of successful access;
s27: and the AC judges whether the access is successful, and if the access is successful, the MSG5 is sent to reply ACK to confirm that the cell access is successful.
Optionally, the terminal access method for terminal direct communication based on the broadband technology further includes the following steps, so as to facilitate subsequent data communication.
S28: the AC informs the MAC to establish a new RB.
As described above, establish RBs — there are three RBs to establish: one for communication between the UE and the UE of the previous stage, one for communication between the UE and the UE of the next stage, and one for receiving downlink data sent to the UE.
Optionally, the AC notifies L1C to stop sending the synchronization signal;
s29: MAC indicates that the new RB is established successfully;
s30: the AC reports the current access status to the ATMT and IPRELAY (data delivery layer).
As mentioned above, IPRELAY (data delivery layer) is part of the protocol upper layer.
Optionally, the terminal access method for terminal direct communication based on broadband technology further includes the following steps,
s31: the AC judges whether the current UE is the first node in the link or not, if so, the AC informs the DHCP to configure the IP;
s32: the AC judges whether the current UE is the last node in the link, if not, the AC informs L1C to establish a new cell.
As described above, the specific way for the AC to establish a new cell is to read NV content, obtain basic cell information (superframe length, system frequency point, system bandwidth, etc.), and determine a cell ID number to be established according to whether the current UE has accessed a certain cell and the accessed cell ID.
The invention aims to provide a data receiving and transmitting method of terminal direct communication based on a broadband technology. As shown in FIGS. 18(A) to (D). Fig. 18(a) shows a transmitting-side data transfer flow; fig. 18(B) shows a reception-side signaling data transfer flow; fig. 18(C) shows a reception-side traffic data transfer flow; fig. 18(D) shows a reception-side data forwarding flow.
The data receiving and transmitting method of the terminal direct communication based on the broadband technology comprises the following steps:
s511: IPRELAY of the first terminal UE1 sends a packet to TXMAC;
as described above, the IPRELAY layer is responsible for the delivery of data between the upper and lower layers.
S512: the TXMAC of the first terminal UE1 receives the data packet and stores the data packet in an uplink buffer of the L2;
as described above, the L2 layer is responsible for handling non-signaling data. The L2 layer is divided into a PDCP layer, an RLC layer, and a MAC layer. An uplink buffer function is added, newly added cells of D2D can be processed, and a part of random access functions are added, wherein L1C is merged into L2 to be responsible for processing flows related to physical layer resource scheduling and time sequence, and a part of random access functions are added.
The sending part of the L2 layer has three types of data: A) traffic data from IPRELAY (data delivery layer), B) signaling data from AC, C) data generated by L2 itself (system information, MAC CE, etc.).
Processing mode of the receiving part of the L2 layer: if the data is the data for the UE, the data is unpacked and then delivered to an upper layer; if the data is forwarded, after the uplink and the downlink are judged, the data is put into a corresponding bearing cache, and the sending part carries out subsequent processing; and if the system information is the system information, performing subsequent scheduling according to the content.
S513: L1C of the first terminal UE1 requests transmission of data to TXMAC at a prescribed time according to the RESOURCE _ MAP message;
s514: the TXMAC of the first terminal UE1 sends a signaling message in a system message to the RXMAC of the second terminal UE 2;
s521: the RXMAC of the second terminal UE2 receives a message that data needs to be received;
s522: the RXMAC of the second terminal UE2 sends a message to the L1C that buffers the data to be received into the upstream buffer;
s523: L1C of the second terminal UE2 requests reception of data to the RXMAC at a prescribed timing according to the RESOURCE _ MAP message;
s524: the RXMAC of the second terminal UE2 determines whether the message is a signaling packet according to the MAC header, if so, performs S525, and if not, performs step S526;
in this step, it is determined whether the packet is a signaling packet or a data packet.
S525: the RXMAC of the second terminal UE2 sends the signaling packet to the AC of the second terminal UE 2;
s526: the RXMAC of the second terminal UE2 determines whether the message is a packet of the UE according to the MAC header, if so, performs S527, and if not, performs S528.
In this step, the data packet to be processed is judged whether belongs to the UE terminal, and if so, the data is received and judged in this step.
If not, the data packet belongs to the forwarding among the UE, and the next UE is forwarded continuously, so that the data packet is forwarded until the data packet is received by the UE to which the data packet belongs, and the multi-hop forwarding is completed.
S527: the RXMAC of the second terminal UE2 sends the data packet to IPRELAY of the second terminal UE 2;
s528: the RXMAC of the second terminal UE2 transmits the data packet to the second terminal UE2 uplink buffer and informs the TXMAC of the second terminal UE.
In this way, the multiple chained networking terminals (UE1, UE2, UE3, … …, UEn) based on the broadband technology of the present technology implement a data transmission method of direct communication, and in this way, chained multi-hop is implemented. The UE outside signal coverage can be accessed into the network through the relay UE based on the newly proposed terminal direct communication protocol technology, so that the method can be widely applied to a terminal relay scene, and effectively expands the coverage range of network access and long-distance data return in a low-cost mode.
In the data transmission method, it should be particularly noted that the UE1 and the UE2 are generic, rather than specific, and in particular, the UE1 and the UE2 are not limited to two terminals closest to each other. In the invention, the terminals within a certain distance can mutually discover to form the self-organizing network. Therefore, when a certain terminal node fails, other nodes can automatically adjust, and the network self-healing to a certain degree is realized.
Therefore, the availability and reliability of the network are greatly improved, and on the other hand, the maintenance work of the network is simplified. Therefore, the terminal of the present invention self-organizes to realize a high availability network.
The greatest difference between the D2D communication technology is that it uses the licensed band of the telecom operator, the interference environment is controllable, and the data transmission has higher reliability.
In addition, bluetooth requires manual pairing when transferring files, and also requires user configuration when accessing a WLAN connection point, and D2D communication can be automatically connected; meanwhile, the similar technologies work in an unlicensed frequency band, and compared with the D2D communication connection working in the licensed frequency band, the communication connection is not stable and reliable enough. In addition, the direct communication in the short distance can also effectively reduce the burden of the base station, reduce the transmitting power of the terminal equipment and reduce the transmission time delay.
Under the condition of keeping the advantages of the cellular network, the D2D multi-hop self-organizing network is used for expanding the coverage range of network access with low cost, thereby supporting high-bandwidth flexible configuration of 1.4M-100M, high speed and video service, and simultaneously having longer communication distance, more flexible frequency band and higher safety compared with a WIFI communication mode.
Fig. 19 is a schematic structural diagram of an electronic device entity of a terminal access system for terminal direct communication based on broadband technology according to an embodiment of the present invention, and as shown in fig. 19, the electronic system includes: a processor (processor)101, a memory (memory)102, and a bus 103; the processor 101 and the memory 102 complete communication with each other through the bus 103.
The processor 101 is configured to call program instructions in the memory 102 to perform the methods provided by the above-described method embodiments.
The present embodiments disclose a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the methods provided by the above-described method embodiments. The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the methods provided by the method embodiments described above.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
The above-described embodiments of the electronic device and the like are merely illustrative, where the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may also be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the embodiments of the present invention, and are not limited thereto; although embodiments of the present invention have been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (7)

1. A data receiving and transmitting method of direct communication of a chain type networking terminal based on a broadband technology comprises the following steps:
s511: IPRELAY of the first terminal UE1 sends a packet to TXMAC;
s512: the TXMAC of the first terminal UE1 receives the data packet and stores the data packet in an uplink buffer of the L2;
s513: L1C of the first terminal UE1 requests transmission of data to TXMAC at a prescribed time according to the RESOURCE _ MAP message;
s514: the TXMAC of the first terminal UE1 sends a signaling message in a system message to the RXMAC of the second terminal UE 2;
s521: the RXMAC of the second terminal UE2 receives a message that data needs to be received;
s522: the RXMAC of the second terminal UE2 sends a message to the L1C that buffers the data to be received into the upstream buffer;
s523: L1C of the second terminal UE2 requests reception of data to the RXMAC at a prescribed timing according to the RESOURCE _ MAP message;
s524: the RXMAC of the second terminal UE2 determines whether the message is a signaling packet according to the MAC header, if so, performs S525, and if not, performs step S526;
s525: the RXMAC of the second terminal UE2 sends the signaling packet to the AC of the second terminal UE 2;
s526: the RXMAC of the second terminal UE2 determines whether the message is a data packet of the UE according to the MAC header, if yes, then performs S527, and if no, then performs S528;
s527: the RXMAC of the second terminal UE2 sends the data packet to IPRELAY of the second terminal UE 2;
s528: the RXMAC of the second terminal UE2 transmits the data packet to the second terminal UE2 uplink buffer and informs the TXMAC of the second terminal UE.
2. A data transmission method of chain type networking terminal direct communication based on broadband technology comprises the following steps:
s511: IPRELAY of the terminal UE1 sends the data packet to TXMAC;
s512: the TXMAC of the terminal UE1 receives the data packet and stores the data packet in an uplink buffer of the L2;
s513: L1C of terminal UE1 requests transmission of data to TXMAC at a predetermined timing according to the RESOURCE _ MAP message;
s514: the TXMAC of the terminal UE1 sends a signaling message to the RXMAC of the second terminal UE2 in a system message.
3. A data receiving method of chain type networking terminal direct communication based on broadband technology comprises the following steps:
s521: the RXMAC of the second terminal UE2 receives a message that data needs to be received;
s522: the RXMAC of the second terminal UE2 sends a message to the L1C that buffers the data to be received into the upstream buffer;
s523: L1C of the second terminal UE2 requests reception of data to the RXMAC at a prescribed timing according to the RESOURCE _ MAP message;
s524: the RXMAC of the second terminal UE2 determines whether the message is a signaling packet according to the MAC header, if so, performs S525, and if not, performs step S526;
s525: the RXMAC of the second terminal UE2 sends the signaling packet to the AC of the second terminal UE 2;
s526: the RXMAC of the second terminal UE2 determines whether the message is a data packet of the UE according to the MAC header, if yes, then performs S527, and if no, then performs S528;
s527: the RXMAC of the second terminal UE2 sends the data packet to IPRELAY of the second terminal UE 2;
s528: the RXMAC of the second terminal UE2 sends the data packet to the second terminal UE2 uplink buffer and informs the TXMAC of the second terminal UE 2.
4. A data transceiving system for direct-through communication of a chain-type networking terminal based on broadband technology, the system comprising a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to execute the data transceiving method for direct-through communication of a chain-type networking terminal based on broadband technology according to claim 1.
5. A data transmission system for direct-through communication of chain-type networking terminals based on broadband technology, characterized in that the system comprises a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to execute the data transmission method for direct-through communication of chain-type networking terminals based on broadband technology according to claim 2.
6. A data receiving system for direct communication of chain-type networking terminals based on broadband technology, characterized in that the system comprises a memory and a processor, the memory stores a computer program, and the computer program is executed by the processor, so that the processor executes the data receiving method for direct communication of chain-type networking terminals based on broadband technology according to claim 3.
7. A storage medium having stored thereon computer program instructions executable by a processor to implement a data processing method for direct communication for broadband technology based chain networking terminals as claimed in any one of claims 1 to 3.
CN202110252849.8A 2021-03-09 2021-03-09 Data transmission method for direct communication of chained networking terminal Active CN112995960B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110252849.8A CN112995960B (en) 2021-03-09 2021-03-09 Data transmission method for direct communication of chained networking terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110252849.8A CN112995960B (en) 2021-03-09 2021-03-09 Data transmission method for direct communication of chained networking terminal

Publications (2)

Publication Number Publication Date
CN112995960A true CN112995960A (en) 2021-06-18
CN112995960B CN112995960B (en) 2023-10-31

Family

ID=76335292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110252849.8A Active CN112995960B (en) 2021-03-09 2021-03-09 Data transmission method for direct communication of chained networking terminal

Country Status (1)

Country Link
CN (1) CN112995960B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217177A1 (en) * 2002-05-15 2003-11-20 Manu Gulati Smart routing between peers in a point-to-point link based system
CN101043302A (en) * 2006-03-22 2007-09-26 华为技术有限公司 Wireless network communication apparatus
CN101043301A (en) * 2006-03-22 2007-09-26 华为技术有限公司 Data rearrangement and recombination method in wireless communication system and its base station
CN101809948A (en) * 2007-09-18 2010-08-18 Lg电子株式会社 A method for QoS guarantees in a multilayer structure
CN203165188U (en) * 2013-03-26 2013-08-28 江门市第一职业高级中学 Wireless meter reading system based on wireless ad hoc network
CN106031107A (en) * 2014-02-28 2016-10-12 凯为公司 Packet scheduling in a network processor
CN106233697A (en) * 2014-04-22 2016-12-14 Lg电子株式会社 Process method and the equipment thereof of the RLC PDU received for D2D communication system
US20180212714A1 (en) * 2015-08-11 2018-07-26 Sony Corporation Information processing apparatus, information processing method, and program
CN108496330A (en) * 2016-03-30 2018-09-04 Oppo广东移动通信有限公司 The method and apparatus of relay transmission
CN109890014A (en) * 2019-04-03 2019-06-14 成都中科微信息技术研究院有限公司 A kind of relay transmission method of the electric power wireless private network based on terminal direct communication
CN110140408A (en) * 2016-11-02 2019-08-16 Lg电子株式会社 The method and device thereof sent for executing secondary link in a wireless communication system
CN110401971A (en) * 2019-07-24 2019-11-01 浙江华云信息科技有限公司 A kind of communication means based on the proprietary frequency range intelligence ad hoc network of 230MHz electric power
CN111542024A (en) * 2014-11-05 2020-08-14 英特尔公司 Device-to-device (D2D) transfer behavior
CN111937486A (en) * 2018-03-08 2020-11-13 高通股份有限公司 System and method for uplink data scheduling in a wireless communication system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217177A1 (en) * 2002-05-15 2003-11-20 Manu Gulati Smart routing between peers in a point-to-point link based system
CN101043302A (en) * 2006-03-22 2007-09-26 华为技术有限公司 Wireless network communication apparatus
CN101043301A (en) * 2006-03-22 2007-09-26 华为技术有限公司 Data rearrangement and recombination method in wireless communication system and its base station
CN101809948A (en) * 2007-09-18 2010-08-18 Lg电子株式会社 A method for QoS guarantees in a multilayer structure
CN203165188U (en) * 2013-03-26 2013-08-28 江门市第一职业高级中学 Wireless meter reading system based on wireless ad hoc network
CN106031107A (en) * 2014-02-28 2016-10-12 凯为公司 Packet scheduling in a network processor
CN106233697A (en) * 2014-04-22 2016-12-14 Lg电子株式会社 Process method and the equipment thereof of the RLC PDU received for D2D communication system
CN111542024A (en) * 2014-11-05 2020-08-14 英特尔公司 Device-to-device (D2D) transfer behavior
US20180212714A1 (en) * 2015-08-11 2018-07-26 Sony Corporation Information processing apparatus, information processing method, and program
CN108496330A (en) * 2016-03-30 2018-09-04 Oppo广东移动通信有限公司 The method and apparatus of relay transmission
CN110140408A (en) * 2016-11-02 2019-08-16 Lg电子株式会社 The method and device thereof sent for executing secondary link in a wireless communication system
CN111937486A (en) * 2018-03-08 2020-11-13 高通股份有限公司 System and method for uplink data scheduling in a wireless communication system
CN109890014A (en) * 2019-04-03 2019-06-14 成都中科微信息技术研究院有限公司 A kind of relay transmission method of the electric power wireless private network based on terminal direct communication
CN110401971A (en) * 2019-07-24 2019-11-01 浙江华云信息科技有限公司 A kind of communication means based on the proprietary frequency range intelligence ad hoc network of 230MHz electric power

Also Published As

Publication number Publication date
CN112995960B (en) 2023-10-31

Similar Documents

Publication Publication Date Title
US11849445B2 (en) Method and apparatus for transmitting data in RRC deactivated or activated state
US11690096B2 (en) Method for controlling access of terminal in communication system
KR102380612B1 (en) Method and apparatus for transmitting data in rrc inactive state or rrc active state
US11057940B2 (en) Apparatus and method of transmitting and receiving message 3 protocol data unit
CN110447289B (en) V2X communication method of terminal in wireless communication system and terminal using the same
CN110612688B (en) Method for transmitting signal by terminal for V2X communication in wireless communication system and terminal using the same
CN113303020A (en) Method and apparatus for handling MSG A retransmission in two-step random access procedure in wireless communication system
KR102258653B1 (en) A method of allocating power of a terminal configured with a plurality of carriers and a terminal using the method
JP2020519166A (en) Method of D2D operation of terminal in wireless communication system and terminal using the method
KR20220050896A (en) Methods and devices for reporting information, methods and devices for receiving messages
KR102251134B1 (en) A method of performing blind decoding of a physical sidelink control channel of a terminal in a wireless communication system, and a terminal using the method
CN112106401B (en) System and method for transmitting and receiving paging and system information
CN110583038A (en) V2X communication execution method performed by V2X terminal in wireless communication system, and terminal using the same
JP7440426B2 (en) How to control terminal connections in a communication system
TWI640215B (en) Methods and apparatus for cell access via anchor carrier
CN111201816B (en) Method and apparatus for a terminal to set transmission power for multiple CCs during carrier aggregation in a wireless communication system
CN112995959B (en) Channel configuration method for terminal direct communication based on broadband technology
CN112995960B (en) Data transmission method for direct communication of chained networking terminal
CN112995961B (en) Terminal access method for terminal through communication based on broadband technology
CN112996100B (en) Terminal downlink synchronization method for terminal through communication based on broadband technology
US20230284162A1 (en) Communication system and receiver
JP2023023409A (en) User equipment and communication control method
JP2023023408A (en) User equipment, base station, and communication method
JP2023023407A (en) User equipment, base station, and communication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231007

Address after: 071000 the power park of Fang Shun Qiao Town, Mancheng District, Baoding, Hebei

Applicant after: Baoding trillion Micro Software Technology Co.,Ltd.

Address before: 101400 room 1124, 80 Huanzhen Road, Bohai Town, Huairou District, Beijing

Applicant before: Beijing Guozhi Zhonghe Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant