CN113727298B - Layer two identification determining method, device and terminal - Google Patents

Layer two identification determining method, device and terminal Download PDF

Info

Publication number
CN113727298B
CN113727298B CN202010451736.6A CN202010451736A CN113727298B CN 113727298 B CN113727298 B CN 113727298B CN 202010451736 A CN202010451736 A CN 202010451736A CN 113727298 B CN113727298 B CN 113727298B
Authority
CN
China
Prior art keywords
identifier
layer
group identifier
bits
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010451736.6A
Other languages
Chinese (zh)
Other versions
CN113727298A (en
Inventor
王文
康艳超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010451736.6A priority Critical patent/CN113727298B/en
Priority to PCT/CN2021/095784 priority patent/WO2021238911A1/en
Publication of CN113727298A publication Critical patent/CN113727298A/en
Application granted granted Critical
Publication of CN113727298B publication Critical patent/CN113727298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/40Connection management for selective distribution or broadcast

Abstract

The application discloses a layer two identification determining method, a layer two identification determining device and a layer two identification determining terminal, and belongs to the technical field of communication. The layer two identification determining method comprises the following steps: if the application layer provides the group identifier of the multicast communication, determining the second identifier of the destination layer according to one of the following modes: the layer two identification conversion algorithm is used for presetting a logic operation rule according to a mapping rule of the service identification and the target layer two identification or providing the target layer two identification by an application layer; and receiving or transmitting the multicast communication data according to the destination layer II identifier. The application can determine the destination layer two identification of the multicast communication, thereby realizing the multicast communication.

Description

Layer two identification determining method, device and terminal
Technical Field
The application belongs to the technical field of communication, and particularly relates to a layer two identification determining method, device and terminal.
Background
In the technology of Vehicle-To-evolution (V2X for short) of long term evolution (Long Term Evolution, LTE for short), service data transmission between a user equipment (UE, also called a terminal) and the UE can be directly performed through a PC5 interface (also called a Sidelink).
With further development of internet of vehicles, new application scenarios appear, for example: vehicle formation, advanced driving, sensor information sharing, remote control, and the like. Some of these applications require communication between UEs within a group. The New air interface (NR) needs to introduce multicast services.
In V2X multicast communication, an application layer of the UE may provide a group ID to the V2X layer, and the V2X layer needs to determine a second destination layer identifier of the multicast communication according to the group ID, and how to determine the second layer identifier according to the group ID needs to be solved.
Content of the application
The embodiment of the application aims to provide a layer two identification determining method, a layer two identification determining device and a terminal, which can solve the problem of determining a destination layer two identification of multicast communication according to a group identification if the application layer of UE provides the group identification in the multicast communication.
In order to solve the technical problems, the application is realized as follows:
in a first aspect, a layer two identifier determining method is provided, applied to a terminal, and the method includes:
if the application layer provides the group identifier of the multicast communication, determining the second identifier of the destination layer according to one of the following modes: the layer two identification conversion algorithm is used for presetting a logic operation rule according to a mapping rule of the service identification and the target layer two identification or providing the target layer two identification by an application layer;
and receiving or transmitting the multicast communication data according to the destination layer II identifier.
In a second aspect, a layer two identification determining apparatus is provided, including:
the determining module is configured to determine the destination layer two identifier according to one of the following modes if the application layer provides the group identifier of the multicast communication: the layer two identification conversion algorithm is used for presetting a logic operation rule according to a mapping rule of the service identification and the target layer two identification or providing the target layer two identification by an application layer;
and the transmission module is used for receiving or transmitting the multicast communication data according to the destination layer two identification.
In a third aspect, there is provided a terminal comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, which program or instruction when executed by the processor implements the steps of the layer two identity determination method according to the first aspect.
In a fourth aspect, there is provided a readable storage medium having stored thereon a program or instructions which when executed by a processor, performs the steps of the method according to the first aspect or performs the steps of the layer two identity determination method according to the third aspect.
In a fifth aspect, a chip is provided, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a network side device program or instruction to implement the layer two identifier determining method according to the first aspect.
In the embodiment of the application, the destination layer two identification of the multicast communication can be determined under the condition that the application layer of the terminal provides the group identification, thereby realizing the multicast communication.
Drawings
Fig. 1 is a block diagram of a wireless communication system to which embodiments of the present application are applicable;
FIG. 2 is a flow chart of a layer two identification determination method according to an embodiment of the present application;
FIG. 3 is a block diagram of a layer two identity determination device in accordance with an embodiment of the present application;
fig. 4 is a schematic structural view of a terminal implementing an embodiment of the present application;
fig. 5 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate, such that embodiments of the application may be practiced otherwise than as specifically illustrated and described herein, and that the "first" and "second" distinguishing between objects generally being of the same type, and not necessarily limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/" generally means a relationship in which the associated object is an "or" before and after.
It is noted that the techniques described in the embodiments of the present application are not limited to long term evolution (Long Term Evolution,LTE)/LTE evolution (LTE-Advanced, LTE-a) systems may also be used in other wireless communication systems, such as code division multiple access (Code Division Multiple Access, CDMA), time division multiple access (Time Division Multiple Access, TDMA), frequency division multiple access (Frequency Division Multiple Access, FDMA), orthogonal frequency division multiple access (Orthogonal Frequency Division Multiple Access, OFDMA), single-carrier frequency division multiple access (Single-carrier Frequency-Division Multiple Access, SC-FDMA), and other systems. The terms "system" and "network" in embodiments of the application are often used interchangeably, and the techniques described may be used for both the above-mentioned systems and radio technologies, as well as other systems and radio technologies. However, the following description describes a New air interface (NR) system for purposes of example, and NR terminology is used in much of the following description, although the techniques are also applicable to applications other than NR system applications, such as generation 6 (6 th Generation, 6G) communication system.
Fig. 1 shows a block diagram of a wireless communication system to which an embodiment of the present application is applicable. The wireless communication system includes a network-side device 11 and a terminal 12. The terminal 12 may also be called a terminal Device or a User Equipment (UE), and the terminal 12 may be a terminal-side Device such as a mobile phone, a tablet Computer (Tablet Personal Computer), a Laptop (Laptop Computer) or a notebook (Personal Digital Assistant, PDA), a palm Computer, a netbook, an ultra-mobile personal Computer (ultra-mobile personal Computer, UMPC), a mobile internet Device (Mobile Internet Device, MID), a Wearable Device (or a vehicle-mounted Device (VUE), a pedestrian terminal (PUE), and the Wearable Device includes: a bracelet, earphone, glasses, etc. It should be noted that the specific type of the terminal 12 is not limited in the embodiment of the present application. The network side device 11 may be a base station or a core network, wherein the base station may be called a node B, an evolved node B, an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a node B, an evolved node B (eNB), a home node B, a home evolved node B, a WLAN access point, a WiFi node, a transmission and reception point (Transmitting Receiving Point, TRP), or some other suitable terminology in the field, and the base station is not limited to a specific technical vocabulary so long as the same technical effect is achieved, and it should be noted that in the embodiment of the present application, only the base station in the NR system is taken as an example, but the specific type of the base station is not limited.
The method, the device and the terminal for determining the layer two identifier provided by the embodiment of the application are described in detail through specific embodiments and application scenes thereof with reference to the accompanying drawings.
Fig. 2 is a flow chart of a layer two identification determining method according to an embodiment of the present application. The layer two identification determining method is applied to a terminal and comprises the following steps:
step 21: if the application layer provides a group identification (group ID) for multicast communication, a destination layer two identification (Destination layer 2 ID) is determined according to one of the following ways: the layer two identification conversion algorithm is used for presetting a logic operation rule according to a mapping rule of the service identification and the target layer two identification or providing the target layer two identification by an application layer;
in the embodiment of the present application, the destination layer two identifier is included in a media access control (Media Access Control, MAC) sub-header, and the length and format may be agreed by a protocol, for example, the length may be 24 bits.
Step 22: and receiving or transmitting the multicast communication data according to the destination layer II identifier.
The multicast communication in the embodiment of the application can be V2X multicast communication, short-range multicast communication and the like. If the multicast communication is V2X communication, the application layer of the terminal provides the group identifier of the multicast communication to the V2X layer, and the V2X layer determines the second identifier of the destination layer according to the above manner.
In the embodiment of the present application, if the terminal is one end transmitting the multicast communication data, in step 22, the multicast communication data is transmitted according to the destination layer two identifier, and if the terminal is one end receiving the multicast communication data, in step 22, the multicast communication data is received according to the destination layer two identifier.
The following describes in detail the respective ways of determining the destination layer two identifier.
(1) Determining a target layer two mark according to a layer two mark conversion algorithm
The layer two identity transformation algorithm may alternatively be referred to as a layer two identity transformation mechanism. The layer two identification conversion algorithm is used for converting the group identification of the multicast communication into the destination layer two identification of the multicast communication. And taking the group identifier as an input value of a layer two identifier conversion algorithm, and taking the target layer two identifier as an output value of the layer two identifier conversion algorithm.
Optionally, determining the destination layer two identifier according to the layer two identifier conversion algorithm includes: and inputting the group identifier into a layer two identifier conversion algorithm, and obtaining an output value of the layer two identifier conversion algorithm as the target layer two identifier.
The terminal only needs to input the group identifier provided by the application layer into the one-layer two-identifier conversion algorithm, and obtains the output value of the one-layer two-identifier conversion algorithm as the destination layer two identifier.
Optionally, in some embodiments, the layer two identity transformation algorithm is preconfigured. Pre-configuration refers to pre-storing or configuring the layer two identity transformation algorithm in the memory of the terminal or in the subscriber identity card (Subscriber Identity Module, SIM) card of the terminal.
Optionally, in some embodiments, the layer two identity transformation algorithm is configured by a network side. The network side may be a core network, in particular an access and mobility management function (acess and mobility management function, AMF) or a policy control function (Policy Control Function, PCF), etc.
Optionally, in some embodiments, the layer two identity transformation algorithm is provided by an application layer. Further alternatively, the layer two identity transformation algorithm may be provided by the application layer simultaneously with providing the group identity of the multicast communication.
The logic rules of the layer two label conversion algorithm are described below.
In some embodiments of the application, the logical operation rules of the layer two identity transformation algorithm are related to the length and format of the group identity. I.e. the destination layer two identity is determined according to the length and format of the group identity.
In some embodiments of the present application, the logic rules of the layer two identification conversion algorithm include:
if the length and format of the input group identifier and the second identifier of the destination layer are the same, the group identifier is used as the output value;
if the input group identifier and the destination layer two identifier have the same format and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the output value;
if the input group identifier and the destination layer two identifier are in the same format, and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the output value.
Optionally, the length and format of the destination layer two identifier are agreed by a protocol.
Optionally, the specified number is 24.
In some embodiments of the application, the inputting the group identity into a layer two identity transformation algorithm comprises: the group identification and the specified numerical value are input to the layer two identification conversion algorithm.
The logic operation rule of the layer two identification conversion algorithm comprises:
and carrying out specified operation on the input group identification and the specified numerical value, wherein an operation result is used as the output value.
Optionally, the specified operation is an exclusive-or operation.
Optionally, the specified value is preconfigured, configured at the network side or provided by the application layer.
(2) Determining the second identifier of the destination layer according to the mapping rule of the service identifier and the second identifier of the destination layer
In the embodiment of the application, the destination layer II identifier mapped by the service identifier of the multicast communication is used as the destination layer II identifier.
Optionally, the mapping rule of the service identifier and the second identifier of the destination layer is preconfigured or configured at the network side.
(3) Determining a destination layer two mark according to a preset logic operation rule
In some embodiments of the present application, optionally, the preset logic operation rule is related to a length and a format of the group identifier. I.e. the destination layer two identity is determined according to the length and format of the group identity.
In some embodiments of the present application, optionally, determining the destination layer two identifier according to a preset logic operation rule includes:
if the length and format of the group identifier and the second identifier of the destination layer are the same, the group identifier is used as the second identifier of the destination layer;
if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the destination layer two identifier;
and if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the destination layer two identifier.
Optionally, the length and format of the destination layer two identifier are agreed by a protocol.
Optionally, the specified number is 24.
In other embodiments of the present application, optionally, determining the destination layer two identifier according to the preset logic operation rule includes: and carrying out specified operation on the group identifier and the specified numerical value, wherein an operation result is used as the second identifier of the target layer.
Optionally, the specified operation is an exclusive-or operation.
Optionally, the specified value is preconfigured, configured at the network side or provided by the application layer.
(4) Determining a destination layer two identifier according to the destination layer two identifier provided by the application layer
In the embodiment of the application, the destination layer II identifier provided by the application layer is used as the destination layer II identifier of the multicast communication. The above-described layer two identification determination method of the present application will be exemplified with reference to specific embodiments.
Embodiment one of the application
The terminal is preconfigured or a network side configures a layer two identifier conversion algorithm of multicast communication for the terminal, and the terminal determines a target layer two identifier according to the layer two identifier conversion algorithm.
The layer two identification conversion algorithm is used for converting the group identification of the multicast communication into the destination layer two identification of the multicast communication. And taking the group identifier as an input value of a layer two identifier conversion algorithm, and taking the target layer two identifier as an output value of the layer two identifier conversion algorithm.
The logic operation rule of the layer two identification conversion algorithm can be as follows:
if the length and format of the input group identifier and the second identifier of the destination layer are the same, the group identifier is used as the output value;
if the input group identifier and the destination layer two identifier have the same format and the length of the group identifier is greater than 24 bits, taking the first 24 bits or the last 24 bits of the group identifier as the output value;
if the input group identifier and the destination layer two identifier are in the same format, and the length of the group identifier is smaller than 24 bits, zero is added at the head position or the tail position of the group identifier until the length of the group identifier is equal to 24 bits, and the group identifier after zero addition is used as the output value.
The logic operation rule of the layer two identification conversion algorithm can also be:
and performing exclusive OR operation on the input group identification and the specified numerical value, wherein an operation result is used as the output value.
Optionally, the specified value is preconfigured, configured at the network side or provided by the application layer.
Embodiment II of the application
The application layer provides a layer two identification conversion algorithm of the multicast communication while providing the group identification of the multicast communication, and the terminal determines a target layer two identification according to the layer two identification conversion algorithm.
The layer two identification conversion algorithm is used for converting the group identification of the multicast communication into the destination layer two identification of the multicast communication. And taking the group identifier as an input value of a layer two identifier conversion algorithm, and taking the target layer two identifier as an output value of the layer two identifier conversion algorithm.
The logic operation rule of the layer two identification conversion algorithm can be as follows:
if the length and format of the input group identifier and the second identifier of the destination layer are the same, the group identifier is used as the output value;
if the input group identifier and the destination layer two identifier have the same format and the length of the group identifier is greater than 24 bits, taking the first 24 bits or the last 24 bits of the group identifier as the output value;
if the input group identifier and the destination layer two identifier are in the same format, and the length of the group identifier is smaller than 24 bits, zero is added at the head position or the tail position of the group identifier until the length of the group identifier is equal to 24 bits, and the group identifier after zero addition is used as the output value.
The logic operation rule of the layer two identification conversion algorithm can also be:
and performing exclusive OR operation on the input group identification and the specified numerical value, wherein an operation result is used as the output value.
Optionally, the specified value is preconfigured, configured at the network side or provided by the application layer.
Embodiment III of the application
Even if the application layer provides the group identifier of the multicast communication, the terminal still determines the target layer two identifier according to the mapping rule of the configured V2X service identifier and the target layer two identifier.
The fourth embodiment of the application:
and the terminal determines the second identification of the target layer according to a preset logic operation rule.
The preset logic operation rule may be:
if the length and format of the group identifier and the second identifier of the destination layer are the same, the group identifier is used as the second identifier of the destination layer;
if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is greater than 24 bits, taking the first 24 bits or the last 24 bits of the group identifier as the destination layer two identifier;
and if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is smaller than 24 bits, zero is added at the head position or the tail position of the group identifier until the length of the group identifier is equal to 24 bits, and the group identifier after zero addition is used as the destination layer two identifier.
The preset logic operation rule may also be:
and performing exclusive OR operation on the group identifier and the appointed numerical value, wherein an operation result is used as the second identifier of the target layer.
Optionally, the specified value is preconfigured, configured at the network side or provided by the application layer.
In the embodiment of the application, the second identifier of the destination layer of the multicast communication can be determined under the condition that the application layer of the terminal provides the group identifier, thereby realizing the multicast communication.
It should be noted that, in the layer two identifier determining method provided in the embodiment of the present application, the execution body may be a layer two identifier determining device, or a control module in the layer two identifier determining device for executing the layer two identifier determining method. In the embodiment of the present application, a method of executing a layer two identifier determining method by a layer two identifier determining device is taken as an example, and the layer two identifier determining device provided by the embodiment of the present application is described.
Fig. 3 is a block diagram showing a configuration of a layer two identification determination apparatus according to an embodiment of the present application. The layer two identification determination means 30 comprises:
the determining module 31 is configured to determine the destination layer two identifier according to one of the following manners if the application layer provides the group identifier of the multicast communication: the layer two identification conversion algorithm is used for presetting a logic operation rule according to a mapping rule of the service identification and the target layer two identification or providing the target layer two identification by an application layer;
and the transmission module 32 is used for receiving or transmitting the multicast communication data according to the destination layer two identification.
Optionally, the determining module 32 includes:
the first determining sub-module is used for inputting the group identifier into a layer two identifier conversion algorithm and obtaining an output value of the layer two identifier conversion algorithm as the destination layer two identifier.
Optionally, the layer two identifier conversion algorithm is preconfigured, configured at the network side or provided by the application layer.
Optionally, the logical operation rule of the layer two identifier conversion algorithm is related to the length and format of the group identifier.
Optionally, the logic operation rule of the layer two identifier conversion algorithm includes:
if the length and format of the input group identifier and the second identifier of the destination layer are the same, the group identifier is used as the output value;
if the input group identifier and the destination layer two identifier have the same format and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the output value;
if the input group identifier and the destination layer two identifier are in the same format, and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the output value.
Optionally, the determining module 32 includes:
the first determining submodule is used for inputting the group identifier and the appointed numerical value into the layer two identifier conversion algorithm and obtaining an output value of the layer two identifier conversion algorithm as the target layer two identifier;
the logic operation rule of the layer two identification conversion algorithm comprises:
and carrying out specified operation on the input group identification and the specified numerical value, wherein an operation result is used as the output value.
Optionally, the determining module 32 includes:
and the second determining submodule is used for taking the destination layer II identifier mapped by the service identifier of the multicast communication as the destination layer II identifier.
Optionally, the mapping rule of the service identifier and the second identifier of the destination layer is preconfigured or configured at the network side.
Optionally, the preset logic operation rule is related to the length and format of the group identifier.
Optionally, the determining module 32 includes:
a third determining submodule, configured to use the group identifier as the destination layer two identifier if the group identifier is the same as the destination layer two identifier in length and format; if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the destination layer two identifier; and if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the destination layer two identifier.
Optionally, the determining module 32 includes:
and the fourth determination submodule is used for carrying out specified operation on the group identifier and the specified numerical value, and the operation result is used as the second identifier of the target layer.
Optionally, the specified operation is an exclusive-or operation.
Optionally, the specified value is preconfigured, configured at the network side or provided by the application layer.
Optionally, the determining module 32 includes:
and a fifth determining submodule, configured to use the destination layer two identifier provided by the application layer as the destination layer two identifier of the multicast communication.
In the embodiment of the application, the second identifier of the destination layer of the multicast communication can be determined under the condition that the application layer of the terminal provides the group identifier, thereby realizing the multicast communication.
The layer two identification determining device in the embodiment of the application can be a device, and can also be a component, an integrated circuit or a chip in a terminal. The device may be a mobile terminal or a non-mobile terminal. By way of example, mobile terminals may include, but are not limited to, the types of terminals 12 listed above, and non-mobile terminals may be servers, network attached storage (Network Attached Storage, NAS), personal computers (personal computer, PCs), televisions (TVs), teller machines, self-service machines, etc., and embodiments of the present application are not limited in particular.
The layer two identification determining device in the embodiment of the application can be a device with an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The layer two identifier determining device provided by the embodiment of the present application can implement each process implemented by the method embodiment of fig. 2, and achieve the same technical effects, and in order to avoid repetition, a detailed description is omitted here.
As shown in fig. 4, the embodiment of the present application further provides a terminal 40, which includes a processor 41, a memory 42, and a program or an instruction stored in the memory 42 and capable of running on the processor 41, where the program or the instruction implements each process of the above-mentioned embodiment of the layer two identification determination method when executed by the processor 41, and the same technical effects can be achieved, so that repetition is avoided, and details are not repeated here.
Fig. 5 is a schematic diagram of a hardware structure of a terminal for implementing an embodiment of the present application.
The terminal 50 includes, but is not limited to: radio frequency unit 51, network module 52, audio output unit 53, input unit 54, sensor 55, display unit 56, user input unit 57, interface unit 58, memory 59, and processor 510.
Those skilled in the art will appreciate that the terminal 50 may also include a power source (e.g., a battery) for powering the various components, which may be logically connected to the processor 510 via a power management system so as to perform functions such as managing charging, discharging, and power consumption via the power management system. The terminal structure shown in fig. 5 does not constitute a limitation of the terminal, and the terminal may include more or less components than shown, or may combine certain components, or may be arranged in different components, which will not be described in detail herein.
It should be appreciated that in embodiments of the present application, the input unit 54 may include a graphics processor (Graphics Processing Unit, GPU) 541 and a microphone 542, with the graphics processor 541 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 56 may include a display panel 561, and the display panel 561 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 57 includes a touch panel 571 and other input devices 572. The touch panel 571 is also referred to as a touch screen. The touch panel 571 may include two parts, a touch detection device and a touch controller. Other input devices 572 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not further described herein.
In the embodiment of the present application, after receiving downlink data from a network side device, the radio frequency unit 51 processes the downlink data with the processor 510; in addition, the uplink data is sent to the network side equipment. Typically, the radio frequency unit 51 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
Memory 59 may be used to store software programs or instructions and various data. The memory 59 may mainly include a storage program or instruction area and a storage data area, wherein the storage program or instruction area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. In addition, the Memory 59 may include a high-speed random access Memory, and may also include a nonvolatile Memory, wherein the nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable Programmable ROM (EPROM), an Electrically Erasable Programmable EPROM (EEPROM), or a flash Memory. Such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
Processor 510 may include one or more processing units; alternatively, the processor 510 may integrate an application processor that primarily processes operating systems, user interfaces, and applications or instructions, etc., with a modem processor that primarily processes wireless communications, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 510.
The processor 510 is configured to determine the destination layer two identifier according to one of the following manners if the application layer provides the group identifier of the multicast communication: the layer two identification conversion algorithm is used for presetting a logic operation rule according to a mapping rule of the service identification and the target layer two identification or providing the target layer two identification by an application layer;
and the radio frequency unit 51 is configured to receive or transmit multicast communication data according to the destination layer two identifier.
In the embodiment of the application, the second identifier of the destination layer of the multicast communication can be determined under the condition that the application layer of the terminal provides the group identifier, thereby realizing the multicast communication.
Optionally, the processor 510 is further configured to input the group identifier to a layer two identifier conversion algorithm, and obtain an output value of the layer two identifier conversion algorithm as the destination layer two identifier.
Optionally, the layer two identifier conversion algorithm is preconfigured, configured at the network side or provided by the application layer.
Optionally, the logical operation rule of the layer two identifier conversion algorithm is related to the length and format of the group identifier.
Optionally, the logic operation rule of the layer two identifier conversion algorithm includes:
if the length and format of the input group identifier and the second identifier of the destination layer are the same, the group identifier is used as the output value;
if the input group identifier and the destination layer two identifier have the same format and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the output value;
if the input group identifier and the destination layer two identifier are in the same format, and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the output value.
Optionally, the processor 510 is further configured to input the group identifier and the specified numerical value into the layer two identifier conversion algorithm;
the logic operation rule of the layer two identification conversion algorithm comprises:
and carrying out specified operation on the input group identification and the specified numerical value, wherein an operation result is used as the output value.
Optionally, the processor 510 is further configured to use a destination layer two identifier mapped by the service identifier of the multicast communication as the destination layer two identifier.
Optionally, the mapping rule of the service identifier and the second identifier of the destination layer is preconfigured or configured at the network side.
Optionally, the preset logic operation rule is related to the length and format of the group identifier.
Optionally, the processor 510 is further configured to use the group identifier as the destination layer two identifier if the group identifier is the same as the destination layer two identifier in length and format; if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the destination layer two identifier; and if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the destination layer two identifier.
Optionally, the processor 510 is further configured to perform a specified operation on the group identifier and a specified numerical value, and the operation result is used as the destination layer two identifier.
Optionally, the specified operation is an exclusive-or operation.
Optionally, the specified value is preconfigured, configured at the network side or provided by the application layer.
Optionally, the processor 510 is further configured to use the destination layer two identifier provided by the application layer as the destination layer two identifier of the multicast communication.
The embodiment of the application also provides a readable storage medium, on which a program or an instruction is stored, which when executed by a processor, implements each process of the above-mentioned layer two identification determining method embodiment, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted here.
Wherein the processor is a processor in the terminal described in the above embodiment. The readable storage medium includes a computer readable storage medium such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
The embodiment of the application further provides a chip, the chip comprises a processor and a communication interface, the communication interface is coupled with the processor, the processor is used for running a network side equipment program or instruction, each process of the above layer two identification determining method embodiment can be realized, the same technical effect can be achieved, and in order to avoid repetition, the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (14)

1. The layer two identification determining method is applied to a terminal and is characterized by comprising the following steps:
if the application layer provides the group identifier of the multicast communication, determining the second identifier of the destination layer according to one of the following modes: a layer two identification conversion algorithm or a preset logic operation rule;
receiving or transmitting multicast communication data according to the destination layer II identifier;
wherein, the logic operation rule of the layer two identifier conversion algorithm and the preset logic operation rule are both related to the length and format of the group identifier;
the logic operation rule of the layer two identification conversion algorithm comprises the following steps:
if the length and format of the input group identifier and the second identifier of the destination layer are the same, the group identifier is used as an output value; if the input group identifier and the destination layer two identifier have the same format and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the output value; if the input group identifier and the destination layer two identifier are in the same format, and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the output value;
the determining of the second destination layer identifier according to the preset logic operation rule comprises the following steps:
if the length and format of the group identifier and the second identifier of the destination layer are the same, the group identifier is used as the second identifier of the destination layer; if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the destination layer two identifier; if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the destination layer two identifier;
or, carrying out specified operation on the group identifier and the specified value, and taking an operation result as the second identifier of the destination layer.
2. The method of claim 1, wherein determining the destination layer two identity according to a layer two identity transformation algorithm comprises:
and inputting the group identifier into a layer two identifier conversion algorithm, and obtaining an output value of the layer two identifier conversion algorithm as the target layer two identifier.
3. The method of claim 2, wherein the layer two identity transformation algorithm is pre-configured, network side configured or provided by the application layer.
4. The method of claim 2, wherein the inputting the group identity to a layer two identity transformation algorithm comprises:
inputting the group identifier and the designated numerical value into the layer two identifier conversion algorithm;
the logic operation rule of the layer two identification conversion algorithm comprises:
and carrying out specified operation on the input group identification and the specified numerical value, wherein an operation result is used as the output value.
5. The method of claim 1 or 4, wherein the specified operation is an exclusive-or operation.
6. The method according to claim 1 or 4, wherein the specified value is pre-configured, network-side configured or provided by the application layer.
7. A layer two identification determination apparatus, comprising:
the determining module is configured to determine the destination layer two identifier according to one of the following modes if the application layer provides the group identifier of the multicast communication: a layer two identification conversion algorithm or a preset logic operation rule;
the transmission module is used for receiving or transmitting multicast communication data according to the destination layer II identifier;
wherein, the logic operation rule of the layer two identifier conversion algorithm and the preset logic operation rule are both related to the length and format of the group identifier;
the logic operation rule of the layer two identification conversion algorithm comprises the following steps:
if the length and format of the input group identifier and the second identifier of the destination layer are the same, the group identifier is used as an output value; if the input group identifier and the destination layer two identifier have the same format and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the output value; if the input group identifier and the destination layer two identifier are in the same format, and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the output value;
the determining module includes:
a third determining submodule, configured to use the group identifier as the destination layer two identifier if the group identifier is the same as the destination layer two identifier in length and format; if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is larger than the specified number of bits, taking the front specified number of bits or the rear specified number of bits of the group identifier as the destination layer two identifier; if the formats of the group identifier and the destination layer two identifier are the same and the length of the group identifier is smaller than the specified number of bits, zero padding is performed at the head position or the tail position of the group identifier until the length of the group identifier is equal to the specified number of bits, and the group identifier after zero padding is used as the destination layer two identifier;
or the fourth determining submodule is used for carrying out specified operation on the group identifier and the specified numerical value, and the operation result is used as the second identifier of the destination layer.
8. The apparatus of claim 7, wherein the means for determining comprises:
the first determining sub-module is used for inputting the group identifier into a layer two identifier conversion algorithm and obtaining an output value of the layer two identifier conversion algorithm as the destination layer two identifier.
9. The apparatus of claim 8, wherein the layer two identity transformation algorithm is pre-configured, network side configured, or provided by the application layer.
10. The apparatus of claim 8, wherein the means for determining comprises:
the first determining submodule is used for inputting the group identifier and the appointed numerical value into the layer two identifier conversion algorithm and obtaining an output value of the layer two identifier conversion algorithm as the target layer two identifier;
the logic operation rule of the layer two identification conversion algorithm comprises:
and carrying out specified operation on the input group identification and the specified numerical value, wherein an operation result is used as the output value.
11. The apparatus of claim 7 or 10, wherein the specified operation is an exclusive-or operation.
12. The apparatus according to claim 7 or 10, wherein the specified value is pre-configured, network-side configured or provided by the application layer.
13. A terminal comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, which when executed by the processor implements the steps of the layer two identity determination method of any one of claims 1 to 6.
14. A readable storage medium, wherein a program or instructions is stored on the readable storage medium, which when executed by a processor, implements the layer two identification determination method according to any one of claims 1 to 6.
CN202010451736.6A 2020-05-25 2020-05-25 Layer two identification determining method, device and terminal Active CN113727298B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010451736.6A CN113727298B (en) 2020-05-25 2020-05-25 Layer two identification determining method, device and terminal
PCT/CN2021/095784 WO2021238911A1 (en) 2020-05-25 2021-05-25 Layer-2 id determination method and device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010451736.6A CN113727298B (en) 2020-05-25 2020-05-25 Layer two identification determining method, device and terminal

Publications (2)

Publication Number Publication Date
CN113727298A CN113727298A (en) 2021-11-30
CN113727298B true CN113727298B (en) 2023-10-27

Family

ID=78671176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010451736.6A Active CN113727298B (en) 2020-05-25 2020-05-25 Layer two identification determining method, device and terminal

Country Status (2)

Country Link
CN (1) CN113727298B (en)
WO (1) WO2021238911A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449500B (en) * 2022-02-14 2023-09-08 深圳市汇顶科技股份有限公司 Near field communication method, device and chip
CN116981105A (en) * 2022-04-22 2023-10-31 大唐移动通信设备有限公司 Information processing method, device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110769377A (en) * 2018-07-25 2020-02-07 华为技术有限公司 Communication method and device
CN110972103A (en) * 2018-09-28 2020-04-07 华为技术有限公司 Communication method and device
WO2020091153A1 (en) * 2018-11-02 2020-05-07 엘지전자 주식회사 Method for generating v2x group id in wireless communication system, and apparatus therefor
CN111132073A (en) * 2018-11-13 2020-05-08 维沃移动通信有限公司 Multicast communication link layer identifier updating method and device and terminal equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018000312A1 (en) * 2016-06-30 2018-01-04 华为技术有限公司 Group communication method, device, and system
US10863494B2 (en) * 2018-01-22 2020-12-08 Apple Inc. Control signaling for uplink multiple input multiple output, channel state information reference signal configuration and sounding reference signal configuration
US10986622B2 (en) * 2018-05-10 2021-04-20 Apple Inc. User equipment (UE) downlink transmission configuration indication (TCI)-state selection
US20200100048A1 (en) * 2018-09-26 2020-03-26 Qualcomm Incorporated Transmission with indication of geographic area

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110769377A (en) * 2018-07-25 2020-02-07 华为技术有限公司 Communication method and device
CN110972103A (en) * 2018-09-28 2020-04-07 华为技术有限公司 Communication method and device
WO2020091153A1 (en) * 2018-11-02 2020-05-07 엘지전자 주식회사 Method for generating v2x group id in wireless communication system, and apparatus therefor
CN111132073A (en) * 2018-11-13 2020-05-08 维沃移动通信有限公司 Multicast communication link layer identifier updating method and device and terminal equipment

Also Published As

Publication number Publication date
WO2021238911A1 (en) 2021-12-02
CN113727298A (en) 2021-11-30

Similar Documents

Publication Publication Date Title
CN113727298B (en) Layer two identification determining method, device and terminal
CN113922933A (en) Carrier switching processing method, device and terminal
CN114765863A (en) Transmission processing method and related equipment
CN114501489A (en) Energy-saving indication method, device, equipment and readable storage medium
WO2022148313A1 (en) Direct-current position processing method and related device
CN113972967B (en) Auxiliary information sending method, auxiliary information receiving device, terminal and network side equipment
WO2022083634A1 (en) Resource configuration method and apparatus, device, and readable storage medium
CN111836382B (en) Indication method of end symbol position, terminal and network side equipment
CN114071749A (en) Monitoring method, device and equipment of physical downlink control channel
CN114302492A (en) Slicing request method, terminal and network side equipment
CN113965998A (en) Uplink transmission method, device and related equipment
WO2023005898A1 (en) Multi-terminal joint session management method, network side device and terminal
CN115150945B (en) PDCCH monitoring processing method, monitoring configuration method and related equipment
WO2022143494A1 (en) Method and apparatus for resource configuration of physical downlink shared channel, device and storage medium
WO2023011342A1 (en) Method and apparatus for determining channel transmission parameters, and related device
CN114080043B (en) Resource transmission method and device and communication equipment
WO2022206664A1 (en) Information transmission method and apparatus, and communication device
WO2022253312A1 (en) Uplink data transmission method and apparatus, terminal and medium
WO2022237616A1 (en) Resource pool configuration method and apparatus, and terminal and network side device
CN114765478B (en) Method and device for determining number of code modulation symbols and communication equipment
EP4301068A1 (en) Method and device for indicating scs of initial downlink bwp
CN110381582B (en) Signal transmission method, related equipment and system
EP4319261A1 (en) Communication mode determination method and apparatus, and related device
WO2023078330A1 (en) Information determination method and device, terminal, and readable storage medium
WO2022257877A1 (en) Information processing method, and key material obtaining method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant