CN113055198B - Application identifier set configuration method, device, apparatus and medium - Google Patents

Application identifier set configuration method, device, apparatus and medium Download PDF

Info

Publication number
CN113055198B
CN113055198B CN201911365129.1A CN201911365129A CN113055198B CN 113055198 B CN113055198 B CN 113055198B CN 201911365129 A CN201911365129 A CN 201911365129A CN 113055198 B CN113055198 B CN 113055198B
Authority
CN
China
Prior art keywords
aid
mib
service
dst
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911365129.1A
Other languages
Chinese (zh)
Other versions
CN113055198A (en
Inventor
冯媛
王世良
李丹阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Gaohong Zhilian Technology Chongqing Co ltd
Original Assignee
Datang Gaohong Zhilian Technology Chongqing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Gaohong Zhilian Technology Chongqing Co ltd filed Critical Datang Gaohong Zhilian Technology Chongqing Co ltd
Priority to CN201911365129.1A priority Critical patent/CN113055198B/en
Publication of CN113055198A publication Critical patent/CN113055198A/en
Application granted granted Critical
Publication of CN113055198B publication Critical patent/CN113055198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Abstract

The invention discloses an application identifier set configuration method, equipment, a device and a medium, comprising the following steps: determining an interested management information base application identification set and an authorized destination address service set; configuring the set of management information base application identifications and the authorized destination address service set into: the management information base application identification set is equal to the application identification set corresponding to the authorized destination address service set, or the management information base application identification set is a subset of the application identification set corresponding to the authorized destination address service set. By adopting the invention, the management information base can not maintain an invalid application identification entity, and the network layer and the application layer can not maintain useless entities. Further, the protocol behavior, interface configuration goals and implementation schemes are also specified for this problem.

Description

Application identifier set configuration method, device, apparatus and medium
Technical Field
The present invention relates to the field of wireless communications technologies, and in particular, to a method, a device, and a medium for configuring an application identifier set.
Background
Currently, an MIB AID (management information base Application Identifier; MIB: management information base, master information block; AID: Application Identifier) set interested in a network layer is completely independent from a DST (Destination address) service set authorized by an air interface, and in this case, although the configuration is completely flexible, the configuration is not sufficient:
the network layer behavior description is unclear, there is some inefficient protocol maintenance and processing complexity is increased.
Disclosure of Invention
The invention provides a method, equipment, a device and a medium for configuring an application identifier set, which are used for solving the problem of invalid protocol maintenance in MIB AID.
The embodiment of the invention provides an AID set configuration method, which comprises the following steps:
determining an interested MIB AID set and an authorized DST service set;
configuring the MIB AID set and the authorized DST service set to: the MIB AID set is equal to or a subset of the AID set corresponding to the authorized DST service set.
In an implementation, configuring the MIB AID set and the authorized DST service set is configured by an MO configuration entity, or an application layer, or a network layer.
In an implementation, when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface to: the configuration is effective at the same time and the configuration is completely synchronous; and/or the presence of a gas in the gas,
when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface to: the MIB AID sets with the configuration simultaneously effective and the configuration on the V6 interface are subsets of AID sets corresponding to authorized DST service sets configured on the V3 interface.
In implementation, when the application layer is configured, after the application layer obtains a corresponding AID set by querying an authorized DST service set for demapping, the application layer is configured to configure the MIB AID set to be equal to the AID set corresponding to the authorized DST service set, or to configure the MIB AID set to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, the configuration of the AID in the MIB AID set is performed through a dedicated management entity-dedicated short message service request DME-dsmservice.request and a dedicated management entity-dedicated short message service acknowledgement DME-dsmservice.confirm procedure.
In an implementation, the method further comprises the following steps:
if the DSMService.request is dynamically added with the AID, when the AID belongs to the elements in the reflection set, the DSMService.request is continuously sent; when the AID does not belong to an element in the demapping set, then no dsmservice.
In implementation, when the network layer performs configuration, after the network layer obtains a corresponding AID set by querying an authorized DST service set through inverse mapping, the network layer is configured to configure the MIB AID set to be equal to the AID set corresponding to the authorized DST service set, or configure the MIB AID set to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, the configuration of the AID in the MIB AID set is performed through dedicated management entity-dedicated short message service request DME-dsmservice.request and dedicated management entity-dedicated short message service acknowledgement DME-dsmservice.confirm procedures.
In an implementation, the method further comprises the following steps:
if the DSMService.request is dynamically added with AID, when the AID belongs to an element in a reflection set, filling receiving in ResultCode in DME-DSMService.confirm; when the AID does not belong to an element in the demapping set, then ResultCode fill-in rejection in DME-dsmservice.
In implementation, when the network layer is configured, the MIB AID set is configured to be equal to an AID set corresponding to an authorized DST service set, and the network layer distributes a service package to each AID service entity in the MIB AID set according to the AID; or the like, or, alternatively,
and the network layer directly filters the service pack network layer of which the AID does not belong to the MIB AID set by distributing a service pack to each AID service entity in the MIB AID set according to the AID.
An embodiment of the present invention provides a communication device, including:
a processor for reading the program in the memory, performing the following processes:
determining an interested MIB AID set and an authorized DST service set;
configuring the MIB AID set and the authorized DST service set to: the MIB AID set is equal to an AID set corresponding to the authorized DST service set, or the MIB AID set is a subset of the AID set corresponding to the authorized DST service set;
a transceiver for receiving and transmitting data under the control of the processor.
In an implementation, configuring the MIB AID set and the authorized DST service set is configured at a processor of an MO configuration entity, or a processor of an application layer, or a processor of a network layer.
In an implementation, when the processor of the MO configuration entity performs configuration, the processor of the MO configuration entity configures the V3 interface and the V6 interface to: the configuration is effective at the same time and the configuration is completely synchronous; and/or the presence of a gas in the gas,
when the processor of the MO configuration entity is configured, the processor of the MO configuration entity configures the V3 interface and the V6 interface to: the MIB AID sets with the configuration simultaneously effective and the configuration on the V6 interface are subsets of AID sets corresponding to authorized DST service sets configured on the V3 interface.
In implementation, when the processor of the application layer is configured, after the processor of the application layer obtains a corresponding AID set by querying an authorized DST service set for demapping, the MIB AID set is configured to be equal to the AID set corresponding to the authorized DST service set, or the MIB AID set is configured to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, configuring the AID in the MIB AID set is performed through DME-dsmservice.request and DME-dsmservice.confirm procedures.
In an implementation, the method further comprises the following steps:
if the DSMService.request is dynamically added with the AID, when the AID belongs to the elements in the reflection set, the DSMService.request is continuously sent; when the AID does not belong to an element in the demapping set, then no dsmservice.
In implementation, when the processor of the network layer is configured, after the processor of the network layer obtains a corresponding AID set by querying an authorized DST service set for demapping, the MIB AID set is configured to be equal to the AID set corresponding to the authorized DST service set, or the MIB AID set is configured to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, configuring the AID in the MIB AID set is performed through DME-dsmservice.request and DME-dsmservice.confirm procedures.
In an implementation, the method further comprises the following steps:
if the DSMService.request is dynamically added with AID, when the AID belongs to an element in a reflection set, filling receiving in ResultCode in DME-DSMService.confirm; when the AID does not belong to an element in the demapping set, then ResultCode fill-in rejection in DME-dsmservice.
In implementation, when a processor of a network layer is configured, the MIB AID set is configured to be equal to an AID set corresponding to an authorized DST service set, and the processor of the network layer distributes a service package to each AID service entity in the MIB AID set according to the AID; or the like, or, alternatively,
and the MIB AID set is configured into a subset of AID sets corresponding to authorized DST service sets, and the processor of the network layer directly filters the service pack network layer of which the AID does not belong to the MIB AID set by distributing the service pack to each AID service entity in the MIB AID set according to the AID.
An embodiment of the present invention provides an AID set configuration apparatus, including:
the system comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining an interested MIB AID set and an authorized DST service set;
a configuration module configured to configure the MIB AID set and the authorized DST service set to: the MIB AID set is equal to or a subset of the AID set corresponding to the authorized DST service set.
The embodiment of the invention provides a computer readable storage medium, which stores a computer program for executing the AID set configuration method.
The invention has the following beneficial effects:
in the technical solution provided in the embodiment of the present invention, after determining an interested MIB AID set and an authorized DST service set, configuring the MIB AID set and the authorized DST service set to: the MIB AID set is equal to or a subset of the AID set corresponding to the authorized DST service set. Therefore, the interested MIB AID set and the idle port authorized DST service set can keep consistent, and after the MIB AID set is kept consistent, the MIB AID set does not contain AID elements corresponding to unauthorized DST sets any more, which means that the MIB does not maintain an invalid AID entity, and the network layer and the application layer do not perform useless entity maintenance.
Further, the protocol behavior, interface configuration goals and implementation schemes are also specified for this problem.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram illustrating a MIB dynamic update maintenance process according to an embodiment of the present invention;
FIG. 2 shows V2XoverPC 5/AuthorazedV 2XServiceList/< X >/V2XServiceIdentifier and
schematic configuration of < X >/V2XoverPC 5/AuthorazedV 2XServiceList/< X >/DestinationLayer2 ID;
fig. 3 is a schematic flow chart illustrating an implementation of an AID set configuration method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a communication device in an embodiment of the present invention.
Detailed Description
The inventor notices in the process of invention that:
for MIB configuration, the application layer determines and is dynamically maintained by the network layer DME (dedicated management Entity) a receiving service aggregate MIB of interest, which is a collection of AID service IDs (identities).
Fig. 1 is a schematic diagram of MIB dynamic update maintenance flow, and as shown in the figure, the application layer determines a set of AIDs (interesting AIDs) to be received and sends a DME-dsmservice. request to the DME, indicating that an upper-layer entity wants to receive a DSM (Dedicated Short Message) specifying an AID.
The DME confirms that a DME-DSMService-request corresponding to an upper layer is received by sending DME-DSMService-confirm (DME-DSM service confirmation), characterizes that the DME receives the short message service request and generates a corresponding short message service request table entry in the MIB, and delivers any received DSM with a matched AID to the requested upper layer entity.
And dynamically updating and maintaining the MIB.
The specific contents of the DME-dsmservice.request and DME-dsmservice.confirm messages are described below.
1、DME-DSMService.request。
Request indicates that an upper layer requests a short message service.
Service primitive parameters:
DME-DSMService.request(
Local ApplicationIndex,
Action,
ApplicationIdentifier,
)
the DME-dsmservice. request service primitive parameters are shown in table 1.
Table 1: request service primitive parameter:
Figure BDA0002338198230000061
Figure BDA0002338198230000071
2、DME-DSMService.confirm。
and confirming that the upper layer corresponding request is received by the DME-DSMService.
Service primitive parameters:
DME-DSMService.confirm(
Local ApplicationIndex,
ResultCode,
)
DME-dsmservice. confirm service primitive parameters are shown in table 2.
Table 2: DME-dsmservice. confirm service primitive parameter:
Figure BDA0002338198230000072
the following describes a service list set authorized by the V3 interface pre-configuration or factory configuration.
per UE (per UE; UE: User Equipment, User Equipment) is independently configured:
v2XoverPC 5/AuthorazedV 2XServiceList/< X >/V2XServiceIdentifier and
< X >/V2XoverPC5/AuthorizedV2XServiceList/< X >/Destination layer2ID, where the AID has a definite mapping relationship with Destination layer2ID (Destination layer2 identification);
table 3: AID to DST (Destination address) ID mapping table:
Figure BDA0002338198230000073
Figure BDA0002338198230000081
additionally, the default DST is an optional configuration.
FIG. 2 is a schematic diagram of the configurations of V2XoverPC 5/AuthorazedV 2XServiceList/< X >/V2XServiceIdentifier and < X >/V2XoverPC 5/AuthorazedV 2XServiceList/< X >/DestinationLayer2ID, the specific configurations are shown in FIG. 2. Wherein, the element in the authorized service list is DST L2 ID.
The transmit-side adaptation layer mapping is described below.
For a packet from a higher layer (where the primitive carries the AID), the adaptation layer will obtain the corresponding DST layer2ID according to the authorized service list set configuration information. Specifically, the method comprises the following steps: if the AID belongs to an element in an authorized service list set, mapping the AID to be a corresponding DST; if the DST does not belong to the element belonging to the authorized service list set, checking whether a default DST is configured; if the default DST is configured, mapping to be the default DST, and if the default DST is not configured, not sending, which is equivalent to that the sending end performs filtering and packet loss processing.
That is, the default DST is equivalent to opening a port, and when the default DST is configured, the sender maps to the default DST regardless of whether an AID service is an authorized V2X (intelligent internet Vehicle technology) service set configured for the specific node.
The MAC (Media Access Control) filtering at the receiving end is described below.
Analyzing a packet header of an MAC PDU (Protocol Data Unit) to obtain a DST L2 ID, and then performing corresponding judgment according to a configured DST set of an authorization service list; two understandings are possible here:
1. the MAC does not filter the default DST, namely, whether the default DST is configured or not is irrelevant, namely, if the default DST is configured, the MAC does not filter any; if no default DST is configured, then if the DST L2 ID is an element in the V3 interface/preconfigured set of authorized DSTs, then further receive processing is done and submitted up, otherwise, it is directly discarded.
2. The MAC filters the default DST, i.e. the MAC filters out directly whether the default DST is configured or not, and further receives, processes and submits upward only if the DST L2 ID is an element in the V3 interface/preconfigured authorized DST set, otherwise, discards directly.
Without limitation from the standard description, the process is followed by 2.
The following describes the receiving end network layer service distribution.
The service filtered by the DST of the MAC layer is delivered upwards to an adaptation layer and a network layer; and resolving the network layer header to obtain an AID, and performing distribution processing according to the AID and the maintained MIB list, namely submitting DSM corresponding to the AID to a corresponding application entity.
From a configuration point of view, the MIB service set configuration of interest and the authorized DST service set are configured independently from a protocol point of view, which may result in the following inconsistencies:
1. the MIB AID set comprises AID elements corresponding to some unauthorized DST sets.
The AID entity maintained by the MIB is equivalent to an invalid AID entity, and the network layer and the application layer perform useless entity maintenance.
2. The MIB AID set is a subset of the AID set corresponding to the authorized DST set.
For the network layer, secondary filtering like MAC filtering is needed, and the description of this function is not referred to in the current standards. Specifically, after the header is analyzed to obtain the AID, it needs to determine whether the AID belongs to an element in the MIB set, and if so, the DSM corresponding to the AID is submitted to the corresponding application entity; if not, directly discarding.
Namely, the prior art is deficient in that: under the condition that the MIB AID set and the authorized DST service set are completely configured independently, except that the description of the network layer behavior is unclear, invalid protocol maintenance and processing complexity are increased.
In summary, the MIB AID set interested in the network layer in the current standard is completely independent from the DST service set authorized by the air interface, so that although the configuration is completely flexible, the description of the network layer behavior is unclear, some invalid protocol maintenance and processing complexity are added, and no gain is provided for actual reception. In the embodiment of the invention, besides the definite protocol behavior, the definite interface configuration target and the realization scheme are also provided for solving the problem. The following describes embodiments of the present invention with reference to the drawings.
In the process of description, the MO configures entities, such as an entity, an application layer, a network layer, etc., and examples of their cooperative implementation are also given to better understand the implementation of the scheme given in the embodiment of the present invention. Such descriptions do not imply that they must be implemented in conjunction or separately.
Fig. 3 is a schematic flow chart of an implementation of an AID set configuration method, as shown in the figure, including:
step 301, determining an interested MIB AID set and an authorized DST service set;
step 302, configuring the MIB AID set and the authorized DST service set to: the MIB AID set is equal to or a subset of the AID set corresponding to the authorized DST service set.
In an implementation, configuring the MIB AID set and the authorized DST service set is configured by an MO configuration entity, or an application layer, or a network layer.
In specific implementation, the synchronous configuration can be realized through different interfaces, the integrated configuration can be realized for the same interface, or the interactive configuration can be realized in different interfaces. Specifically, the MIB AID set configuration that is interested can be implemented through MO (Management operator) configuration entity additional configuration and/or some interactions of the MO configuration entity, the application layer, and the network layer, so that it is equal to the AID set corresponding to the authorized DST service set; or the MIB AID set is made a subset of the AID set corresponding to the authorized DST service set.
The application layer and the MO are configured by interaction, and query judgment is carried out before sending DME-DSMService. The network layer interacts with the MO to configure, and query and judge before sending DME-DSMService. MO configures two interfaces, MIB and an authorized DST set; the specific modes such as an internal query interface, a network layer distribution authorization DST set and the like are adopted for explanation.
The following description also provides a specific implementation flow of the network layer, for example, besides AID distribution, it needs to determine whether secondary filtering processing is needed according to configurations of DST and MIB.
1. When the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface to: the configuration takes effect simultaneously and the configuration is completely synchronous; and/or the presence of a gas in the gas,
when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface to: the MIB AID sets with the configuration simultaneously effective and the configuration on the V6 interface are subsets of AID sets corresponding to authorized DST service sets configured on the V3 interface.
Example 1
In this example, when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface to: the configuration is in effect at the same time and the configuration is fully synchronized.
Under the mode of adopting two interfaces of V3 and V6, the MIB configuration and the authorized DST set configuration are completely synchronous, and the implementation can adopt protocol configuration.
The execution entity in the example is an MO configuration entity.
The MO configuration entity configures MIB and MO simultaneously, only one occurs in the carrier MIB and one occurs in the carrier MO, i.e. the occurring carriers are different. One is to configure the MO by using the existing protocol process, and the other is to configure the MIB in the application management entity, and specifically, the MIB may be implemented by determining the content of the DME-dsmservice.
In specific implementation, an application layer configuration interface can be reserved; for example, a VX interface is reserved, where VX represents an interface that is not available in the existing protocol, in this example, an interface is newly added, a specific interface is used to configure the MIB, and X represents any value that does not conflict with the naming of the existing interface. The simultaneous configuration of the V3 interface/factory pre-configuration and the V6 interface are effective and completely synchronous at the same time, namely, the application layer configuration ensures that the specific configuration is consistent with the V3 interface, and the specific configuration is consistent when the specific configuration is initially configured or dynamically updated. Pre-provisioning the V3 interface/factory may be accomplished using existing protocol procedures.
I.e. it is completely consistent to specify the MIB service set configuration of interest and the authorized DST service set by the protocol.
In this example, the network layer only needs to perform corresponding AID distribution processing, and does not need to perform secondary filtering. The application layer and the MIB do not have some invalid entity maintenance either.
Example 2
In this example, when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface to: the MIB AID sets with the configuration simultaneously effective and the configuration on the V6 interface are subsets of AID sets corresponding to authorized DST service sets configured on the V3 interface.
In the mode of adopting two interfaces of V3 and V6, MIB configuration and authorized DST set configuration are synchronously configured, and the former is a subset of the latter.
The execution entity in the example is an MO configuration entity.
The MO configuration entity configures MIB and MO simultaneously, only one occurs in the carrier MO, and one occurs in the carrier application management entity, namely, the generated carriers are different. One is to adopt the existing protocol process to configure the MO, and the other is to realize the MIB configuration by determining the content of DME-DSMService.
In this example, the network layer needs to perform secondary filtering in addition to AID distribution.
As in embodiment 1, except that the MIB service set of interest is a subset of the AID set corresponding to the authorized DST service set. In this way, the network layer needs to perform filtering and discarding processing on the received and analyzed AID that does not belong to the MIB set, and does not submit the AID to the corresponding entity of the application layer.
That is, although the network layer needs to perform secondary filtering, some invalid entity maintenance will not be performed on the application layer and the MIB.
2. When the application layer is configured, after the application layer obtains a corresponding AID set by querying the inverse mapping of the authorized DST service set, the application layer is configured to configure the MIB AID set to be equal to the AID set corresponding to the authorized DST service set, or to configure the MIB AID set to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, the configuration of the AID in the MIB AID set is performed through DME-dsmservice.request and DME-dsmservice.confirm procedures.
In the implementation, the method can further comprise the following steps:
if the DSMService.request is dynamically added with the AID, when the AID belongs to the elements in the reflection set, continuing to send the DSMService.request; when the AID does not belong to an element in the demapping set, then no dsmservice.
Example 3
In this example, the application layer actively queries the DST configuration before the MIB configuration is completed.
The execution entity in the example is the application layer.
And (4) performing query judgment before the application layer sends the DME-DSMService. The current protocol has no specific behavior process and principle, namely, AID service requests can be sent according to the requirements; in some scenarios, secondary filtering needs to be performed in addition to AID distribution.
In specific implementation, when the application layer sends a DME-dsmservice. request message, it actively queries, and if the AID desired to be received belongs to an element of an authorized V2xover pc 5/authored V2XServiceList/< X >/V2XServiceIdentifier set, it sends the DME-dsmservice. request, otherwise, it abandons the request, and through this interaction, it can ensure that the AID set maintained by the MIB is equal to or a subset of the authorized DST service set.
In a specific implementation, because the DST set is configured in the current protocol process, the interested AID set is dynamically generated, and the interested AID is generated after the confirmation of DME-dsmservice. I.e., each element in the AID needs to be determined. Embodiments 3 and 4 here are to select each element of the AID by the two messages so that the AID set and the DST set coincide.
If the configuration is a complete set, the network layer only needs to do AID distribution work; if a subset is configured, the network layer needs further filtering in addition to AID distribution. If the AID aggregate service is not interested, discarding is needed, and no invalid entity maintenance exists.
3. After the network layer obtains the corresponding AID set by querying the reverse mapping of the authorized DST service set, the network layer is used for configuring the MIB AID set to be equal to the AID set corresponding to the authorized DST service set, or is used for configuring the MIB AID set to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, the configuration of the AID in the MIB AID set is performed through DME-dsmservice.request and DME-dsmservice.confirm procedures.
In the implementation, the method can further comprise the following steps:
if the DSMService.request is dynamically added with AID, when the AID belongs to an element in a reflection set, filling receiving in ResultCode in DME-DSMService.confirm; when the AID does not belong to an element in the demapping set, then ResultCode fill-in rejection in DME-dsmservice.
Example 4
In this example, the network layer actively queries the DST configuration before the MIB configuration is completed.
The execution entity in the example is the network layer.
Before sending DME-DSMService.confirm, the network layer needs to inquire a default DST set and determine whether result code assignment in DME-DSMService.confirm is rejected or not according to secondary information. In specific implementation, since the current protocol has no specific behavioral process guidance and basis, appropriate modification can be performed as required.
In this example, some scenarios perform secondary filtering in addition to AID distribution.
Before sending DME-dsmservice.confirm, corresponding processing needs to be performed according to a real-time latest V2XoverPC 5/audiolyzelist/< X >/V2XServiceIdentifier set, if a service ID contained in DME-dsmservice.request belongs to an authorization set element, an acknowledgement message can be sent from the service perspective, and if the service ID does not belong to the authorization set element, a rejection message is sent. By this interaction, it can be guaranteed that the AID set maintained by the MIB is equal to the authorized DST service set or is a subset of the DST service set.
If the configuration is a complete set, the network layer only needs to do AID distribution work; if a subset is configured, the network layer may need to perform further filtering in addition to AID distribution. If the AID aggregate service is not interested, discarding is needed. There is also no invalid entity maintenance in the example.
4. When the network layer is configured, configuring an MIB AID set into an AID set corresponding to an authorized DST service set, and distributing a service packet to each AID service entity in the MIB AID set by the network layer according to the AID; or the like, or, alternatively,
and the network layer directly filters the service pack network layer of which the AID does not belong to the MIB AID set by distributing a service pack to each AID service entity in the MIB AID set according to the AID.
Example 5
In this example, where the MIB is configured with a subset of DST set configurations or is completely identical, the behavior may be specified using network layer protocols.
The execution entity in the example is the network layer.
And the network layer performs AID distribution or performs secondary filtering besides AID distribution.
Specifically, the network layer distributes the services to the applications, and distributes the services to different application entities according to AIDs (each element in the AID set, that is, each AID corresponds to one entity), that is, distributes different services to different service entities according to the AID of the services.
If the configuration is a complete set, the network layer only needs to do AID distribution work; if a subset is configured, the network layer may need to perform further filtering in addition to AID distribution. If the AID aggregate service is not interested, discarding is needed. There is no invalid entity maintenance.
Specifically, only elements in the AID set have corresponding AID entities, and if the elements do not belong to the AID set, the corresponding entities do not exist. If one AID belongs to the AID obtained by the DST set reverse mapping, the MAC does not filter the upward submission; at the network layer, the upper layer entities do not have corresponding sets and therefore cannot be delivered upwards, and therefore need to be filtered out at the network layer.
Specifically, if the service ID belongs to an element in two set intersection of { query interface ^ MIB }, the network layer only needs to do corresponding AID distribution work; and a query interface in the set, namely a corresponding set obtained by inverse mapping of the DST set, and the MIB, namely the interested AID set.
If the service ID is not an element in the two aggregate intersection of { query interface ^ client configuration MIB }, the network layer needs to perform further filtering besides AID distribution, that is, the service ID is not an MIB element, although the corresponding AID establishes a corresponding entity, secondary filtering and discarding processing at MAC and network layers is needed. Specifically, a determination may be made as to the service ID, which is included in the packet-following primitive, and the discarded packet corresponds to the service packet.
Based on the same inventive concept, embodiments of the present invention further provide a communication device, an AID aggregate configuration apparatus, and a computer-readable storage medium, where the principles of these devices to solve the problem are similar to the AID aggregate configuration method, so that the implementation of these devices may refer to the implementation of the method, and repeated details are not repeated.
When the technical scheme provided by the embodiment of the invention is implemented, the implementation can be carried out as follows.
Fig. 4 is a schematic structural diagram of a communication device, as shown in the figure, a base station includes:
the processor 400, which is used to read the program in the memory 420, executes the following processes:
determining an interested MIB AID set and an authorized DST service set;
configuring the MIB AID set and the authorized DST service set to: the MIB AID set is equal to an AID set corresponding to the authorized DST service set, or the MIB AID set is a subset of the AID set corresponding to the authorized DST service set;
a transceiver 410 for receiving and transmitting data under the control of the processor 400.
In an implementation, configuring the MIB AID set and the authorized DST service set is configured at a processor of an MO configuration entity, or a processor of an application layer, or a processor of a network layer.
In an implementation, when the processor of the MO configuration entity performs configuration, the processor of the MO configuration entity configures the V3 interface and the V6 interface to: the configuration takes effect simultaneously and the configuration is completely synchronous; and/or the presence of a gas in the gas,
when the processor of the MO configuration entity is configured, the processor of the MO configuration entity configures the V3 interface and the V6 interface to: the MIB AID sets with the configuration simultaneously effective and the configuration on the V6 interface are subsets of AID sets corresponding to authorized DST service sets configured on the V3 interface.
In implementation, when the processor of the application layer is configured, after the processor of the application layer obtains a corresponding AID set by querying an authorized DST service set for demapping, the MIB AID set is configured to be equal to the AID set corresponding to the authorized DST service set, or the MIB AID set is configured to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, when the processor of the network layer is configured, after the processor of the network layer obtains a corresponding AID set by querying an authorized DST service set for demapping, the MIB AID set is configured to be equal to the AID set corresponding to the authorized DST service set, or the MIB AID set is configured to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, the configuration of the AID in the MIB AID set is performed through DME-dsmservice.request and DME-dsmservice.confirm procedures.
In an implementation, the method further comprises the following steps:
if the DSMService.request is dynamically added with the AID, when the AID belongs to the elements in the reflection set, the DSMService.request is continuously sent; when the AID does not belong to an element in the demapping set, then no dsmservice.
In implementation, when the processor of the network layer is configured, after the processor of the network layer obtains a corresponding AID set by querying an authorized DST service set for demapping, the MIB AID set is configured to be equal to the AID set corresponding to the authorized DST service set, or the MIB AID set is configured to be a subset of the AID set corresponding to the authorized DST service set.
In implementation, the configuration of the AID in the MIB AID set is performed through DME-dsmservice.request and DME-dsmservice.confirm procedures.
In an implementation, the method further comprises the following steps:
if the DSMService.request is dynamically added with AID, when the AID belongs to an element in a reflection set, filling receiving in ResultCode in DME-DSMService.confirm; when the AID does not belong to an element in the demapping set, then ResultCode fill-in rejection in DME-dsmservice.
In implementation, when a processor of a network layer is configured, the MIB AID set is configured to be equal to an AID set corresponding to an authorized DST service set, and the processor of the network layer distributes a service package to each AID service entity in the MIB AID set according to the AID; or the like, or, alternatively,
and the MIB AID set is configured into a subset of AID sets corresponding to authorized DST service sets, and the processor of the network layer directly filters the service pack network layer of which the AID does not belong to the MIB AID set by distributing the service pack to each AID service entity in the MIB AID set according to the AID.
Where in fig. 4, the bus architecture may include any number of interconnected buses and bridges, with various circuits of one or more processors, represented by processor 400, and memory, represented by memory 420, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 410 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The processor 400 is responsible for managing the bus architecture and general processing, and the memory 420 may store data used by the processor 400 in performing operations.
An embodiment of the present invention provides an AID set configuration apparatus, including:
the system comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining an interested MIB AID set and an authorized DST service set;
a configuration module configured to configure the MIB AID set and the authorized DST service set to: the MIB AID set is equal to or a subset of the AID set corresponding to the authorized DST service set.
For convenience of description, each part of the above-described apparatus is separately described as being functionally divided into various modules or units. Of course, the functionality of the various modules or units may be implemented in the same one or more pieces of software or hardware in practicing the invention.
For specific implementation, refer to implementation of the AID set configuration method.
The embodiment of the invention provides a computer readable storage medium, which stores a computer program for executing the AID set configuration method.
In specific implementation, refer to implementation of the AID set configuration method.
In summary, in the technical solution provided in the embodiment of the present invention, the MIB service set configuration of interest is completely consistent with the authorized DST service set; the consistency here means that the MIB AID set should be equal to the AID set corresponding to the authorized DST service set or at least the MIB AID set can be guaranteed to be a subset of the AID set corresponding to the authorized DST service set.
The above configuration target can be specifically achieved by the following several ways: the MIB configuration and the authorized DST set configuration are completely synchronous and consistent or integrally configured; the MIB configuration and the authorized DST set configuration are completely synchronous and the former is a subset of the latter; and in the MIB configuration process, the configuration target is achieved through internal interaction.
An explicit description of the network layer protocol behavior is also given.
Due to the fact that the configuration target and the protocol processing flow description are given, invalid protocol maintenance and some processing complexity are reduced, and meanwhile, the clear protocol processing flow description under the optimized configuration mode is given.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (22)

1. An Application Identification (AID) set configuration method, comprising:
determining an interested management information base application identifier MIB AID set and an authorized destination address DST service set;
configuring the MIB AID set and the authorized DST service set to: the MIB AID set is equal to or a subset of the AID set corresponding to the authorized DST service set.
2. The method of claim 1, wherein configuring the MIB AID set and the authorized DST service set is configured by an management operator MO configuration entity, or an application layer, or a network layer.
3. The method of claim 2, wherein when the MO configuration entity configures the V3 interface and the V6 interface, the MO configuration entity configures the V3 interface to: the configuration is effective at the same time and the configuration is completely synchronous; and/or the presence of a gas in the gas,
when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface to: the MIB AID sets configured to be simultaneously effective and on the V6 interface are subsets of AID sets corresponding to authorized DST service sets configured on the V3 interface.
4. The method of claim 2, wherein when the application layer performs the configuring, after the application layer obtains the corresponding AID aggregate by querying the inverse mapping of the authorized DST service aggregate, the method is configured to configure the MIB AID aggregate to be equal to the AID aggregate corresponding to the authorized DST service aggregate, or to configure the MIB AID aggregate to be a subset of the AID aggregate corresponding to the authorized DST service aggregate.
5. The method of claim 4, wherein configuring AIDs in the MIB AID set is performed through a dedicated management entity-dedicated short message service request (DME-DSMService. request) and a dedicated management entity-dedicated short message service acknowledgement (DME-DSMService. confirm) procedure.
6. The method of claim 5, further comprising:
if the DSMService.request is dynamically added with the AID, when the AID belongs to the elements in the reflection set, the DSMService.request is continuously sent; when the AID does not belong to an element in the demapping set, then no dsmservice.
7. The method of claim 2, wherein when the network layer performs the configuration, after the network layer obtains the corresponding AID set by querying the inverse mapping of the authorized DST service set, the network layer is configured to configure the MIB AID set to be equal to the AID set corresponding to the authorized DST service set, or to configure the MIB AID set to be a subset of the AID set corresponding to the authorized DST service set.
8. The method of claim 7, wherein configuring the AID in the MIB AID set is performed by DME-DSMService.Request and DME-DSMService.confirm procedures.
9. The method of claim 8, further comprising:
if the DSMService.request is dynamically added with AID, when the AID belongs to an element in a reflection set, filling receiving in ResultCode in DME-DSMService.confirm; when the AID does not belong to an element in the demapping set, then ResultCode fill-in rejection in DME-dsmservice.
10. The method of claim 2, wherein the MIB AID set is configured to be equal to an AID set corresponding to the authorized DST service set at the time of the network layer configuration by distributing service packages to each AID serving entity in the MIB AID set according to the AID; or the like, or, alternatively,
and the network layer directly filters the service pack network layer of which the AID does not belong to the MIB AID set by distributing a service pack to each AID service entity in the MIB AID set according to the AID.
11. A communication device, comprising:
a processor for reading the program in the memory, performing the following processes:
determining an interested MIB AID set and an authorized DST service set;
configuring the MIB AID set and the authorized DST service set to: the MIB AID set is equal to an AID set corresponding to the authorized DST service set, or the MIB AID set is a subset of the AID set corresponding to the authorized DST service set;
a transceiver for receiving and transmitting data under the control of the processor.
12. The apparatus of claim 11, wherein configuring the MIB AID set and the authorized DST service set is configured at a processor of a MO configuration entity, or a processor of an application layer, or a processor of a network layer.
13. The apparatus of claim 12, wherein when the processor of the MO configuration entity is configured, the processor of the MO configuration entity configures the V3 interface and the V6 interface to: the configuration is effective at the same time and the configuration is completely synchronous; and/or the presence of a gas in the gas,
when the processor of the MO configuration entity is configured, the processor of the MO configuration entity configures the V3 interface and the V6 interface to: the MIB AID sets configured to be simultaneously effective and on the V6 interface are subsets of AID sets corresponding to authorized DST service sets configured on the V3 interface.
14. The apparatus of claim 12, wherein when the processor of the application layer performs the configuration, after the processor of the application layer obtains the corresponding AID set by querying an inverse mapping of the authorized DST service set, the processor of the application layer is configured to configure the MIB AID set to be equal to the AID set corresponding to the authorized DST service set, or to configure the MIB AID set to be a subset of the AID set corresponding to the authorized DST service set.
15. The apparatus of claim 14, wherein configuring the AID in the MIB AID set is performed via DME-dsmservice.request and DME-dsmservice.confirm procedures.
16. The apparatus as recited in claim 15, further comprising:
if the DSMService.request is dynamically added with the AID, when the AID belongs to the elements in the reflection set, the DSMService.request is continuously sent; when the AID does not belong to an element in the demapping set, then no dsmservice.
17. The apparatus of claim 12, wherein when the processor of the network layer performs the configuring, after the processor of the network layer obtains the corresponding AID set by querying for an inverse mapping of the authorized DST service set, to configure the MIB AID set to be equal to or a subset of the AID set corresponding to the authorized DST service set.
18. The apparatus of claim 17, wherein configuring the AID in the MIB AID set is performed via DME-dsmservice.request and DME-dsmservice.confirm procedures.
19. The apparatus as recited in claim 18, further comprising:
if the DSMService.request is dynamically added with AID, when the AID belongs to an element in a reflection set, filling receiving in ResultCode in DME-DSMService.confirm; when the AID does not belong to an element in the demapping set, then ResultCode fill-in rejection in DME-dsmservice.
20. The apparatus of claim 12, wherein the MIB AID set is configured to be equal to an AID set corresponding to the authorized DST service set when the processor of the network layer is configured, the processor of the network layer to distribute the service package to each AID serving entity in the MIB AID set by AID; or the like, or, alternatively,
and the MIB AID set is configured into a subset of AID sets corresponding to authorized DST service sets, and the processor of the network layer directly filters the service pack network layer of which the AID does not belong to the MIB AID set by distributing the service pack to each AID service entity in the MIB AID set according to the AID.
21. An AID set configuration apparatus, comprising:
the system comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining an interested MIB AID set and an authorized DST service set;
a configuration module configured to configure the MIB AID set and the authorized DST service set to: the MIB AID set is equal to or a subset of the AID set corresponding to the authorized DST service set.
22. A computer-readable storage medium, characterized in that it stores a computer program for executing the method of any one of claims 1 to 10.
CN201911365129.1A 2019-12-26 2019-12-26 Application identifier set configuration method, device, apparatus and medium Active CN113055198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911365129.1A CN113055198B (en) 2019-12-26 2019-12-26 Application identifier set configuration method, device, apparatus and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911365129.1A CN113055198B (en) 2019-12-26 2019-12-26 Application identifier set configuration method, device, apparatus and medium

Publications (2)

Publication Number Publication Date
CN113055198A CN113055198A (en) 2021-06-29
CN113055198B true CN113055198B (en) 2022-05-31

Family

ID=76506508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911365129.1A Active CN113055198B (en) 2019-12-26 2019-12-26 Application identifier set configuration method, device, apparatus and medium

Country Status (1)

Country Link
CN (1) CN113055198B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938858B (en) * 2021-12-17 2022-04-12 高新兴智联科技有限公司 Communication method of V2X protocol stack

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5608720A (en) * 1993-03-09 1997-03-04 Hubbell Incorporated Control system and operations system interface for a network element in an access system
CN101309299A (en) * 2007-03-27 2008-11-19 捷讯研究有限公司 Methods and systems to allow multiple SIP applications
WO2013025195A1 (en) * 2011-08-15 2013-02-21 Hewlett-Packard Development Company, L.P. Systems, devices, and methods for traffic management
CN106304099A (en) * 2015-06-04 2017-01-04 索尼公司 Device for wireless communications, spectrum management apparatus and subscriber equipment
CN108632200A (en) * 2017-03-16 2018-10-09 北京京东尚科信息技术有限公司 Data transmission method and device
CN110166452A (en) * 2019-05-21 2019-08-23 东信和平科技股份有限公司 A kind of access control method and system based on JavaCard shared interface
CN110574322A (en) * 2017-02-06 2019-12-13 摩托罗拉移动有限责任公司 Transmitting and receiving synchronization signal blocks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5608720A (en) * 1993-03-09 1997-03-04 Hubbell Incorporated Control system and operations system interface for a network element in an access system
CN101309299A (en) * 2007-03-27 2008-11-19 捷讯研究有限公司 Methods and systems to allow multiple SIP applications
WO2013025195A1 (en) * 2011-08-15 2013-02-21 Hewlett-Packard Development Company, L.P. Systems, devices, and methods for traffic management
CN106304099A (en) * 2015-06-04 2017-01-04 索尼公司 Device for wireless communications, spectrum management apparatus and subscriber equipment
CN110574322A (en) * 2017-02-06 2019-12-13 摩托罗拉移动有限责任公司 Transmitting and receiving synchronization signal blocks
CN108632200A (en) * 2017-03-16 2018-10-09 北京京东尚科信息技术有限公司 Data transmission method and device
CN110166452A (en) * 2019-05-21 2019-08-23 东信和平科技股份有限公司 A kind of access control method and system based on JavaCard shared interface

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"23285-020-rm".《3GPP tsg_sa\WG2_Arch》.2016, *
"C1-170341-was-C1-170010-v03".《3GPP tsg_ct\WG1_mm-cc-sm_ex-CN1》.2017, *
"R2-1804506_Report of email discussion 101#73 Destination address enhancements".《3GPP tsg_ran\WG2_RL2》.2018, *
"tdoc_list_meeting_sa3#97".《3GPP tsg_sa\wg3_security》.2019, *
Dave Partridge."REDUCING CLOUD MIGRATION CUTOVER TIME USING THE ORACLE DATA INTEGRATION PLATFORM CLOUD SERVICE".《https://www.mythics.com/about/blog/reducing-cloud-migration-cutover-time-using-oracle-dipc》.2019, *

Also Published As

Publication number Publication date
CN113055198A (en) 2021-06-29

Similar Documents

Publication Publication Date Title
US8767607B2 (en) Method and apparatus for performing multicast in communications network
EP2981107B1 (en) Group communication method and apparatus for group communication
CN113411215B (en) Time-sensitive network centralized user configuration method and system based on OPC UA
CN111918237B (en) Communication method and device
US10455641B2 (en) Protocol data unit management
JP2021510274A (en) Default quality of service (QoS) control methods and equipment
CN111866760A (en) Method for supporting device-to-device communication by broadcast and multicast based on QoS flow in wireless communication system
CN114501469A (en) Method, device and system for configuring network slice
CN104184663A (en) Communication method and device based on software-defined network and integrated identification network
WO2020103863A1 (en) Method and device for transmitting v2x message and system
CN112788544B (en) Communication method, device and equipment
CN110650168A (en) Communication method and device thereof
CN111385746A (en) Communication method and communication equipment
CN113055198B (en) Application identifier set configuration method, device, apparatus and medium
CN105281941B (en) A kind of data transmission method, the first CSE, centre CSE and the 2nd CSE
CN107623752A (en) Network management and device based on link layer
CN114205282B (en) SRv6 Policy scheduling method, system, router and controller
WO2018119592A1 (en) Network slice determination method and apparatus
CN106102022B (en) Transfer control method and system based on bottom-layer network characteristic
CN103812672A (en) Method for discovering newly-added network element device, correlative device, and system
CN112217653A (en) Strategy issuing method, device and system
US20120300776A1 (en) Method for creating virtual link, communication network element, and ethernet network system
WO2013185696A2 (en) Data processing method and device
CN116760822A (en) Method, system and device for transmitting files of Internet of things equipment
WO2021035652A1 (en) Communication method, communication apparatus, and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211224

Address after: 400040 No. 35, Jinghe Road, Huxi street, high tech Zone, Shapingba District, Chongqing

Applicant after: Datang Gaohong Zhilian Technology (Chongqing) Co.,Ltd.

Address before: 550025 Leihua road crossing, Huaxi District, Guiyang City, Guizhou Province

Applicant before: DATANG GAOHONG DATA NETWORK TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant