CN113727343A - Method and equipment used for wireless communication - Google Patents

Method and equipment used for wireless communication Download PDF

Info

Publication number
CN113727343A
CN113727343A CN202010446477.8A CN202010446477A CN113727343A CN 113727343 A CN113727343 A CN 113727343A CN 202010446477 A CN202010446477 A CN 202010446477A CN 113727343 A CN113727343 A CN 113727343A
Authority
CN
China
Prior art keywords
logical channel
signaling
channel identity
mac
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010446477.8A
Other languages
Chinese (zh)
Other versions
CN113727343B (en
Inventor
张晓博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Langbo Communication Technology Co Ltd
Original Assignee
Shanghai Langbo Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Langbo Communication Technology Co Ltd filed Critical Shanghai Langbo Communication Technology Co Ltd
Priority to CN202310258167.7A priority Critical patent/CN116347441A/en
Priority to CN202010446477.8A priority patent/CN113727343B/en
Priority to PCT/CN2021/095032 priority patent/WO2021238779A1/en
Publication of CN113727343A publication Critical patent/CN113727343A/en
Priority to US17/992,854 priority patent/US20230083122A1/en
Application granted granted Critical
Publication of CN113727343B publication Critical patent/CN113727343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/22Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and apparatus for wireless communication includes a first transmitter to transmit first signaling indicating a second candidate logical channel identity; a first receiver receiving a second MAC PDU; wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet. The method and the device improve the reliability and reduce the time delay by reasonably determining the logical channel identity.

Description

Method and equipment used for wireless communication
Technical Field
The present invention relates to a transmission method and apparatus in a wireless communication system, and more particularly, to a transmission method and apparatus for improving system efficiency, optimizing resource utilization, reducing service interruption, improving service continuity, and enhancing reliability in wireless communication.
Background
In the future, the application scenes of the wireless communication system are more and more diversified, and different application scenes put different performance requirements on the system. In order to meet different performance requirements of various application scenarios, research on New Radio interface (NR) technology (or fine Generation, 5G) is decided over 72 sessions of 3GPP (3rd Generation Partner Project) RAN (Radio Access Network), and standardization Work on NR is started over WI (Work Item) where NR passes through 75 sessions of 3GPP RAN.
In communication, both LTE (Long Term Evolution) and 5G NR relate to accurate reception of reliable information, optimized energy efficiency ratio, determination of information validity, flexible resource allocation, the scalable system structure, high-efficiency non-access stratum information processing, low service interruption and disconnection rate, for low power consumption support, which is for normal communication of base stations and user equipments, for reasonable scheduling of resources, the method has important significance for balancing system load, can be said to be high throughput rate, meets Communication requirements of various services, improves spectrum utilization rate, and improves the quality of service, and is essential for eMBBs (enhanced Mobile BroadBand), URLLC (Ultra Reliable Low Latency Communication) or eMTCs (enhanced Machine Type Communication). Meanwhile, in the Internet of Things in the field of the IIoT (Industrial Internet of Things), in V2X (Vehicular to X), in communication between devices (Device to Device), in communication of unlicensed spectrum, in user communication quality monitoring, in Network planning optimization, in NTN (Non terrestrial Network communication), in TN (terrestrial Network communication), in Dual connectivity (Dual connectivity) system, in wireless resource management and codebook selection of multiple antennas, there are wide requirements in signaling design, neighborhood management, traffic management, and beamforming, and the transmission mode of information is divided into broadcast and unicast, and both transmission modes are indispensable for the 5G system, because they are helpful to meet the above requirements.
With the continuous increase of the scenes and the complexity of the system, higher requirements are put forward on the reduction of the interruption rate, the reduction of the time delay, the enhancement of the reliability, the enhancement of the stability of the system, the flexibility of the service and the saving of the power, and meanwhile, the compatibility among different versions of different systems needs to be considered when the system is designed.
Disclosure of Invention
In a plurality of communication scenarios, in a communication scenario from UE to UE, control and link establishment, parameter configuration and resource allocation may be involved, and due to lack of a central control node such as a serving cell, a distributed control problem may occur in communication between UEs, especially in communication between UEs involving a relay node, and if the configuration is not proper, different links may cause mismatch, thereby resulting in that end-to-end communication cannot be performed. In many configurations, specific issues involved include: how to configure a relay node so that the relay node can properly identify different links, especially data from different source nodes and destination nodes; how to configure the relay node, how to identify which data packets need to be forwarded, and which data packets do not need to be forwarded; how to configure all nodes so that links between the nodes can be established quickly; how to configure the logical channels of different links so that the data can be effectively identified and forwarded; how to effectively configure the logical channel of the last hop so that the identity of the logical channel can be used for carrying out a security algorithm; how to provide enough information for the configuration initiating node to configure, how to organically associate different links so that they can be conveniently established; and how to configure logical channels so that they can meet multiple functional requirements; but also how to simplify the design of the receiving UE.
In view of the above, the present application provides a solution.
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments in any node of the present application may be applied to any other node. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
The application discloses a method in a first node used for wireless communication, comprising:
sending a first signaling, the first signaling indicating a second candidate logical channel identity;
receiving a second MAC PDU;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the problem to be solved by the present application includes: when the UE communicates with each other, for example, by using the sidelink technology, especially when a relay node exists between the UEs and the relay node is also the UE, the communication process becomes very complicated, especially when a layer 2 relay architecture is used, which data is data of the relay node and needs to be relayed and forwarded is highlighted by how to associate an incoming link and an outgoing link for one relay node; on the other hand, when the configuration-initiated node needs to configure a remote link, for example, when configuring a remote logical channel, the remote logical channel may already be occupied, and a collision may occur during configuration, resulting in interruption of communication; while distributed coordination is more desirable if there are multiple forwarding links to a destination node, especially if these logical channels are also used for the security algorithm at the same time. The target node feeds back the identity of the second candidate logical channel by sending the first signaling, and determines the second logical channel by using the second candidate logical channel, thereby avoiding possible collision.
As an example, the benefits of the above method include: the first node sends a first signaling to indicate the identity of the second candidate logical channel, so that the control problem in the communication between the distributed UE and the UE can be solved, and the establishment of a communication link with lower complexity is facilitated; in the sidelink communication discussed in 3GPP at present, a link is generally configured by a sending node, which may cause that an original node cannot know information of all links, especially information of a remote link, such as an available logical channel, due to information asymmetry in a relay scenario, and this logical channel may also be a parameter for performing a security algorithm on data sent by the sending node; the method proposed by the present application can solve the above problems. On the other hand, the method and the device are beneficial for the relay node to properly process the data of different links.
As an example, the peculiarities of the present application include: the MAC is Medium Access Control (MAC).
As an example, the peculiarities of the present application include: the PDU is a Protocol Data Unit (Protocol Data Unit).
Specifically, according to an aspect of the present invention, the second candidate logical channel identity is the same as at least 5 least significant bits of the second logical channel identity.
In particular, according to an aspect of the invention, the second candidate logical channel identity is used for determining the first logical channel identity.
In particular, according to an aspect of the invention, the second logical channel identity is used to determine the first logical channel identity.
In particular, according to an aspect of the invention, the first logical channel identity is used to determine a second logical channel identity.
Specifically, according to an aspect of the present invention, the first signaling indicates a first candidate logical channel identity, the 5 least significant bits of the first candidate logical channel identity are the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined as the second logical channel identity, the other is determined as the first logical channel identity.
Specifically, according to one aspect of the present invention, the method comprises: receiving a second signaling;
wherein the second signaling is RRC signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
Specifically, according to one aspect of the present invention, the method comprises: sending a third signaling;
wherein the third signaling is sent as a response that the second signaling does not contradict a current configuration; the third signaling indicates that configuration of the second signaling is complete; the first signaling comprises a first set of candidate logical channel identities; the first set of candidate logical channel identities comprises at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling conflicts with a current configuration.
Specifically, according to an aspect of the present application, the first node is a user equipment.
Specifically, according to an aspect of the present application, the first node is an internet of things terminal.
Specifically, according to an aspect of the present application, the first node is a relay.
Specifically, according to an aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the application, the first node is an aircraft.
The application discloses a method in a second node used for wireless communication, comprising:
receiving a target MAC PDU;
the target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, a second MAC PDU is sent; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
Specifically, according to one aspect of the present invention, the method comprises: and when the target MAC subheader comprises the second logical channel identity, abandoning to send the second MAC PDU.
Specifically, according to one aspect of the present invention, the method comprises: receiving a target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
Specifically, according to one aspect of the present invention, the method comprises: and sending a first feedback signaling as a response that the target signaling does not conflict with the current configuration.
Wherein the first feedback signaling indicates that configuration of the target signaling is completed.
Specifically, according to one aspect of the present invention, the method comprises: receiving a first signaling indicating a second candidate logical channel identity; the second candidate logical channel identity is used to determine the second logical channel.
Specifically, according to one aspect of the present invention, the method comprises: sending a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
Specifically, according to one aspect of the present invention, the method comprises: receiving a third signaling;
wherein the third signaling is sent as a response that the second signaling does not contradict a current configuration; the third signaling indicates that configuration of the second signaling is complete; the first signaling comprises a first set of candidate logical channel identities; the first set of candidate logical channel identities comprises at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling conflicts with a current configuration.
Specifically, according to an aspect of the present invention, the second candidate logical channel identity is the same as at least 5 least significant bits of the second logical channel identity.
In particular, according to an aspect of the invention, the second candidate logical channel identity is used for determining the first logical channel identity.
In particular, according to an aspect of the invention, the second logical channel identity is used to determine the first logical channel identity.
In particular, according to an aspect of the invention, the first logical channel identity is used to determine a second logical channel identity.
Specifically, according to an aspect of the present invention, the first signaling indicates a first candidate logical channel identity, the 5 least significant bits of the first candidate logical channel identity are the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined as the second logical channel identity, the other is determined as the first logical channel identity.
Specifically, according to an aspect of the present application, the first node is a user equipment.
Specifically, according to an aspect of the present application, the first node is an internet of things terminal.
Specifically, according to an aspect of the present application, the first node is a relay.
Specifically, according to an aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the application, the first node is an aircraft.
The application discloses a method in a third node used for wireless communication, comprising:
receiving a first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
transmitting a first MAC PDU;
wherein the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the first logical channel identity is different from the second logical channel identity.
Specifically, according to one aspect of the present invention, the method comprises: sending a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
Specifically, according to one aspect of the present invention, the method comprises: sending a target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
Specifically, according to an aspect of the present invention, the second candidate logical channel identity is the same as at least 5 least significant bits of the second logical channel identity.
In particular, according to an aspect of the invention, the second candidate logical channel identity is used for determining the first logical channel identity.
In particular, according to an aspect of the invention, the second logical channel identity is used to determine the first logical channel identity.
In particular, according to an aspect of the invention, the first logical channel identity is used to determine a second logical channel identity.
Specifically, according to an aspect of the present invention, the first signaling indicates a first candidate logical channel identity, the 5 least significant bits of the first candidate logical channel identity are the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined as the second logical channel identity, the other is determined as the first logical channel identity.
Specifically, according to an aspect of the present application, the first node is a user equipment.
Specifically, according to an aspect of the present application, the first node is an internet of things terminal.
Specifically, according to an aspect of the present application, the first node is a relay.
Specifically, according to an aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the application, the first node is an aircraft.
The application discloses a first node used for wireless communication, comprising:
a first transmitter to transmit a first signaling, the first signaling indicating a second candidate logical channel identity;
a first receiver receiving a second MAC PDU;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
The application discloses a second node used for wireless communication, comprising:
a second receiver receiving a target MAC PDU;
wherein the target MAC PDU comprises a target MAC sub-PDU comprising a target MAC sub-header and a target data packet, and the second transmitter transmits a second MAC PDU when the target MAC sub-header comprises a first logical channel identity; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
The application discloses a third node used for wireless communication, including:
a third receiver to receive a first signaling, the first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
a third transmitter to transmit the first MAC PDU;
wherein the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the first logical channel identity is different from the second logical channel identity.
As an example, compared with the conventional scheme, the method has the following advantages:
according to the method provided by the application, the second candidate logical channel identity is sent by the first node to determine the second logical channel identity, so that the signaling overhead can be greatly simplified when the communication between the nodes, particularly the relay is involved, and particularly when a plurality of links reaching the first node exist simultaneously, the link configuration which is simply carried out by an initiating node, such as a third node, and comprises the configuration of the second logical channel in the traditional method is avoided; when all logical channels arriving at the first node are the same, this is beneficial to reducing the complexity of the first node as a receiving node; at the moment, the first node only needs to process the same logical channel; the problem of configuration conflict caused by different available logical channels of different links due to insufficient coordination among a plurality of paths is avoided; meanwhile, the simplification of the signaling flow is facilitated; more importantly, when the security algorithm of the data transmitted by the transmitting end needs to use the logical channel identity, the unified logical channel of the receiving end can avoid the processing ambiguity of the receiving end and the transmitting end.
As an example, compared with the conventional scheme, the method has the following advantages:
when the second node is used as a relay node, one of the problems to be solved comprises how to distinguish data for the second node from data to be forwarded; one approach is to differentiate with different logical channel identities; however, if the logical channel identity is also used for a security algorithm of data, a new challenge is brought, that is, how to ensure that the sending end and the receiving end have the same understanding, for example, the logical channel identity used by the encryption algorithm of the sending end and the logical channel identity used by the receiving end during decryption need to be consistent to some extent, otherwise, the logical channel identity cannot be detected by the security algorithm; meanwhile, for the foregoing reasons, the logical channel identities from the sending end to the relay and from the relay to the receiving end may need to be distinguished, that is, it is difficult to achieve consistency; this becomes a dilemma; the method has the advantages that different logical channel identities are used, unified security algorithm input is guaranteed, sending and receiving can be unaffected, even a special signaling is not needed to assign the logical channel identity needed to be used by a receiving end for decryption, and the receiving end can also detect the security through defaulting the logical channel identity corresponding to the received data, so that the two problems are well solved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof with reference to the accompanying drawings in which:
fig. 1 shows a flow diagram for transmitting first signaling and receiving second MAC PDUs according to one embodiment of the present application;
FIG. 2 shows a schematic diagram of a network architecture according to an embodiment of the present application;
figure 3 shows a schematic diagram of an embodiment of a radio protocol architecture for the user plane and the control plane according to an embodiment of the present application;
FIG. 4 shows a schematic diagram of a first node, a second node and a third node according to an embodiment of the application;
FIG. 5 shows a flow diagram of a transmission according to an embodiment of the present application;
FIG. 6 shows a flow diagram of a transmission according to an embodiment of the present application;
FIG. 7 shows a flow diagram of a transmission according to an embodiment of the present application;
FIG. 8 shows a diagram of a MAC PDU in accordance with one embodiment of the present application;
FIG. 9 shows a schematic diagram of node A communicating with node C according to one embodiment of the present application;
fig. 10 shows a schematic diagram of a second candidate logical channel identity being used for determining a second logical channel identity according to an embodiment of the application;
figure 11 illustrates a schematic diagram of a processing apparatus for use in a first node according to one embodiment of the present application;
figure 12 illustrates a schematic diagram of a processing arrangement for use in a second node according to an embodiment of the present application;
fig. 13 illustrates a schematic diagram of a processing device for use in a third node according to an embodiment of the present application.
Detailed Description
The technical solutions of the present application will be further described in detail with reference to the accompanying drawings, and it should be noted that the embodiments and features of the embodiments in the present application can be arbitrarily combined with each other without conflict.
Example 1
Embodiment 1 illustrates a flowchart of transmitting first signaling and receiving second MAC PDU according to an embodiment of the present application, as shown in fig. 1. In fig. 1, each block represents a step, and it is particularly emphasized that the sequence of the blocks in the figure does not represent a chronological relationship between the represented steps.
In embodiment 1, a first node in the present application transmits a first signaling in step 101; receiving a second MAC PDU in step 102;
wherein the first signaling indicates a second candidate logical channel identity; the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the first node is a UE (User Equipment).
As one embodiment, the first signaling comprises higher layer signaling.
As an embodiment, the first signaling includes RRC (Radio Resource Control) signaling.
For one embodiment, the first signaling comprises PC5-S signaling.
As one embodiment, the first signaling comprises application layer signaling.
As one embodiment, the first signaling comprises ProSe signaling.
As an embodiment, the first signaling is sent on a Uu interface.
As an embodiment, the first signaling is sent over a PC5 interface.
As an embodiment, the first signaling is transmitted through an scch (sidelink Control channel) channel.
As an embodiment, the first signaling is transmitted through an stch (sidelink Traffic channel) channel.
As an embodiment, the first signaling is transmitted through a pscch (physical sidelink control channel) channel.
As an embodiment, the first signaling is transmitted through a pssch (physical sidelink shared channel) channel.
As an embodiment, the first signaling is transmitted through a psbch (physical sidelink broadcast channel) channel.
As an embodiment, the first signaling is transmitted over a SL-SCH channel.
As an embodiment, the first signaling is transmitted through a sidelink.
As an embodiment, the first signaling is used to configure a DRB.
As one embodiment, the first signaling is used to configure an RB.
As an embodiment, the first signaling comprises rrcreconconfigurationsildelink.
As an embodiment, the first signaling includes a partial field (field) in RRCReconfigurationSidelink.
As an embodiment, the first signaling comprises rrcreeconfiguration.
For one embodiment, the first signaling includes SIB 12.
As an embodiment, the first signaling comprises SL-LogicalChannelConfigPC 5.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig-r 16.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig-r 17.
As an embodiment, the first signaling comprises a part of a field in SL-logical channelconfig.
For one embodiment, the first signaling comprises sl-RLC-Config.
For one embodiment, the first signaling comprises sl-RLC-Config-r 16.
For one embodiment, the first signaling comprises sl-RLC-Config-r 17.
As one embodiment, the first signaling comprises a partial field in an sl-RLC-Config.
As one embodiment, the first signaling comprises an sl-logical channelgroup.
As an embodiment, the first signaling comprises rrcconnectionreconfiguration sildelink.
As an embodiment, the first signaling comprises RRCConnectionReconfiguration.
For one embodiment, the first signaling includes DIRECT LINK an establish REQUEST.
For one embodiment, the first signaling includes DIRECT LINK establis opportunity ACCEPT.
As one embodiment, the first signaling includes DIRECT LINK MODIFICATION REQUEST.
For one embodiment, the first signaling includes DIRECT LINK MODIFICATION ACCEPT.
For one embodiment, the first signaling includes DIRECT LINK KEEPALIVE REQUEST.
For one embodiment, the first signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the first signaling comprises a discover REQUEST.
As an embodiment, the first signaling comprises discover _ RESPONSE.
As an embodiment, the first signaling comprises a MATCH _ REPORT.
For one embodiment, the first signaling includes MATCH _ REPORT _ ACK.
As an embodiment, the first signaling comprises a program REQUEST.
As an embodiment, the first signaling includes program REQUEST RESPONSE.
As an embodiment, the first signaling includes program _ ALERT.
As an embodiment, the first signaling includes program REQUEST valid.
As an embodiment, the first signaling includes program REQUEST valid RESPONSE.
As an embodiment, the first signaling comprises a discover UPDATE REQUEST.
As an embodiment, the first signaling comprises discover UPDATE RESPONSE.
As one embodiment, the first signaling includes an announce REQUEST.
For one embodiment, the first signaling includes ANNOUNCING _ ALERT _ RESPONSE.
For one embodiment, the first signaling includes a Direct Security Mode Command.
As an embodiment, the first signaling includes Direct Security Mode Complete.
As an embodiment, the first Logical Channel identity is indicated by an LCID (Logical Channel identity) field included in the first MAC subheader.
For one embodiment, the second logical channel identity is indicated by an LCID field included in the second MAC subheader.
As an embodiment, the second candidate logical channel identity is indicated by an LCID.
For one embodiment, the second candidate logical channel identity is indicated by the 5 least significant bits of the LCID field.
As an embodiment, the second candidate logical channel identity comprises only 5 bits.
As an embodiment, the first packet is a MAC CE (Control Element).
As an embodiment, the first Data packet is a MAC SDU (Service Data Unit).
As an embodiment, the first packet is an RLC (Radio Link Layer) PDU.
As an embodiment, of the first and second logical channel identities, only the 5 Least Significant Bits (LSBs) of the second logical channel identity are used as 5-bit inputs of a security algorithm for the first packet.
As an embodiment, of the first logical channel identity and the second logical channel identity, only the second logical channel identity is used for a security algorithm for the first data packet.
As an embodiment, the security algorithm of the first Packet includes a security algorithm of a PDCP (Packet Data Convergence Protocol) entity.
As one embodiment, the security algorithm of the first data packet includes an encryption algorithm.
As one embodiment, the security algorithm of the first data packet includes an integrity protection algorithm.
As one embodiment, 5 bits in the second logical channel identity are used as inputs to BEARER [0] to BEARER [5] of the security algorithm.
As one embodiment, the 5 least significant bits in the second logical channel identity are used as inputs to BEARER [0] to BEARER [5] of the security algorithm.
As one example, the security algorithm for the first packet includes 128-NEA1 and 128-NIA 1.
As one example, the security algorithm for the first packet includes 128-NEA2 and 128-NIA 2.
As one example, the security algorithm for the first packet includes 128-NEA3 and 128-NIA 3.
As one example, the security algorithm for the first packet includes 128-EEA1 and 128-EIA 1.
As one example, the security algorithm for the first packet includes 128-EEA2 and 128-EIA 2.
As one example, the security algorithm for the first packet includes 128-EEA3 and 128-EIA 3.
As an embodiment, the security algorithm of the first packet comprises SNOW.
As one embodiment, the security algorithm of the first data packet includes AES.
As an embodiment, the security algorithm of the first packet comprises ZUC.
For one embodiment, the second logical channel identity is a field in the second MAC subheader.
For one embodiment, the first logical channel identity is a field in the first MAC subheader.
For one embodiment, the first node forwards the first packet.
In one embodiment, the first logical channel identity is different from the second logical channel identity by at least one bit.
As an embodiment, the first signaling explicitly indicates the second candidate logical channel identity.
As an embodiment, the second candidate logical channel identity is a field in the first signaling.
As an embodiment, the first signaling carries the 5 least significant bits of the second candidate logical channel identity.
As an embodiment, the first signaling comprises the second candidate logical channel identity.
As an embodiment, the first signaling indicates a first set of candidate logical channel identities, the first set of candidate logical channel identities including the second candidate logical channel identity.
For one embodiment, the first MAC PDU is transmitted over a sidelink.
As an embodiment, the second MAC PDU is transmitted over a sidelink.
For one embodiment, the first MAC PDU is transmitted over the PC5 interface.
For one embodiment, the second MAC PDU is transmitted over the PC5 interface.
As an embodiment, the first MAC PDU is transmitted over a Uu interface.
As an embodiment, the second MAC PDU is transmitted over a Uu interface.
As an embodiment, the first MAC PDU is transmitted over a pscch channel.
As an embodiment, the second MAC PDU is transmitted over a pscch channel.
As an embodiment, the first MAC PDU is transmitted over a DTCH channel.
As an embodiment, the second MAC PDU is transmitted over a DTCH channel.
Example 2
Embodiment 2 illustrates a schematic diagram of a network architecture according to an embodiment of the present application, as shown in fig. 2. Fig. 2 illustrates a V2X communication architecture under a 5G NR (new radio, new air interface), LTE (Long-Term Evolution), and LTE-a (Long-Term Evolution Advanced, enhanced Long-Term Evolution) system architecture. The 5G NR or LTE network architecture may be referred to as 5GS (5GSystem)/EPS (Evolved Packet System) or some other suitable terminology.
The V2X communication architecture of embodiment 2 includes UE (User Equipment) 201, UE241, NG-RAN (next generation radio access Network) 202, 5GC (5G Core Network )/EPC (Evolved Packet Core) 210, HSS (Home Subscriber Server )/UDM (Unified Data Management) 220, ProSe function 250, and ProSe application Server 230. The V2X communication architecture may interconnect with other access networks, but these entities/interfaces are not shown for simplicity. As shown, the V2X communication architecture provides packet-switched services, however, those skilled in the art will readily appreciate that the various concepts presented throughout this application may be extended to networks providing circuit-switched services or other cellular networks. The NG-RAN includes NR node b (gNB)203 and other gnbs 204. The gNB203 provides user and control plane protocol termination towards the UE 201. The gnbs 203 may be connected to other gnbs 204 via an Xn interface (e.g., backhaul). The gNB203 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a Basic Service Set (BSS), an Extended Service Set (ESS), a TRP (transmitting receiving node), or some other suitable terminology. The gNB203 provides the UE201 with an access point to the 5GC/EPC 210. Examples of the UE201 include a cellular phone, a smart phone, a Session Initiation Protocol (SIP) phone, a laptop, a Personal Digital Assistant (PDA), a satellite radio, non-terrestrial base station communications, satellite mobile communications, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, a drone, an aircraft, a narrowband internet of things device, a machine type communication device, a terrestrial vehicle, an automobile, a wearable device, or any other similar functioning device. Those skilled in the art may also refer to UE201 as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communication device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. The gNB203 is connected to the 5GC/EPC210 through an S1/NG interface. The 5GC/EPC210 includes MME (Mobility Management Entity)/AMF (Authentication Management domain)/SMF (Session Management Function) 211, other MME/AMF/SMF214, S-GW (serving Gateway)/UPF (user plane Function) 212, and P-GW (Packet data Network Gateway)/UPF 213. The MME/AMF/SMF211 is a control node that handles signaling between the UE201 and the 5GC/EPC 210. In general, the MME/AMF/SMF211 provides bearer and connection management. All user IP (Internet protocol) packets are transported through the S-GW/UPF212, which S-GW/UPF212 itself is connected to the P-GW/UPF 213. The P-GW provides UE IP address allocation as well as other functions. The P-GW/UPF213 is connected to the internet service 230. The internet service 230 includes an operator-corresponding internet protocol service, and may specifically include the internet, an intranet, an IMS (IP Multimedia Subsystem), and a packet-switched streaming service. The ProSe function 250 is a logical function for network-related behavior required for location-based services (ProSe); including a DPF (Direct Provisioning Function), a Direct Discovery Name Management Function (Direct Discovery Name Management Function), an EPC-level Discovery ProSe Function (EPC-level Discovery ProSe Function), and the like. The ProSe application server 230 has the functions of storing EPC ProSe subscriber identities, mapping between application layer subscriber identities and EPC ProSe subscriber identities, allocating ProSe restricted code suffix pools, etc.
As an embodiment, the UE201 and the UE241 are connected through a Reference Point (Reference Point) of the PC 5.
As an embodiment, the ProSe function 250 is connected with the UE201 and the UE241 through PC3 reference points, respectively.
As an embodiment, the ProSe function 250 is connected with the ProSe application server 230 through a PC2 reference point.
As an embodiment, the ProSe application server 230 is connected with the ProSe application of the UE201 and the ProSe application of the UE241 through a PC1 reference point, respectively.
As an embodiment, the second, first and third nodes in this application are NR node B, UE201 and UE241, respectively.
As an embodiment, the first node and the second node in the present application are UE201 and UE241, respectively.
As an embodiment, the first node and the third node in the present application are UE201 and UE241, respectively.
As an embodiment, the second node and the third node in the present application are UE201 and UE241, respectively.
As an embodiment, the wireless link between the UE201 and the UE241 corresponds to a Sidelink (SL) in the present application.
As an embodiment, the radio link from the UE201 to the NR node B is an uplink.
As an embodiment, the radio link from the NR node B to the UE201 is the downlink.
As an embodiment, the UE201 supports relay transmission.
As an embodiment, the UE241 supports relay transmission.
As an example, the gNB203 is a macro cellular (MarcoCellular) base station.
As an embodiment, the gNB203 is a Micro Cell (Micro Cell) base station.
As an embodiment, the gNB203 is a pico cell (PicoCell) base station.
As an example, the gNB203 is a flight platform device.
As an embodiment, the gNB203 is a satellite device.
Example 3
Embodiment 3 shows a schematic diagram of an embodiment of a radio protocol architecture for the user plane and the control plane according to the present application, as shown in fig. 3. Fig. 3 is a schematic diagram illustrating an embodiment of a radio protocol architecture for a user plane 350 and a control plane 300, fig. 3 showing the radio protocol architecture for the control plane 300 between a first node (UE, satellite or aircraft in a gNB or NTN) and a second node (gNB, satellite or aircraft in a UE or NTN), or two UEs, in three layers: layer 1, layer 2 and layer 3. Layer 1(L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions. The L1 layer will be referred to herein as PHY 301. Layer 2(L2 layer) 305 is above PHY301 and is responsible for the link between the first and second nodes and the two UEs through PHY 301. The L2 layer 305 includes a MAC (Medium Access Control) sublayer 302, an RLC (Radio Link Control) sublayer 303, and a PDCP (Packet Data Convergence Protocol) sublayer 304, which terminate at the second node. The PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels. The PDCP sublayer 304 also provides security by ciphering data packets and provides handoff support between second nodes to the first node. The RLC sublayer 303 provides segmentation and reassembly of upper layer packets, retransmission of lost packets, and reordering of packets to compensate for out-of-order reception due to HARQ. The MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating the various radio resources (e.g., resource blocks) in one cell between the first nodes. The MAC sublayer 302 is also responsible for HARQ operations. The RRC (Radio Resource Control) sublayer 306 in layer 3 (layer L3) in the Control plane 300 is responsible for obtaining Radio resources (i.e., Radio bearers) and configuring the lower layers using RRC signaling between the second node and the first node. The PC5-S (PC5Signaling Protocol ) sublayer 307 is responsible for processing the Signaling Protocol of the PC5 interface. The radio protocol architecture of the user plane 350 includes layer 1(L1 layer) and layer 2(L2 layer), the radio protocol architecture in the user plane 350 for the first and second nodes is substantially the same for the physical layer 351, the PDCP sublayer 354 in the L2 layer 355, the RLC sublayer 353 in the L2 layer 355, and the MAC sublayer 352 in the L2 layer 355 as the corresponding layers and sublayers in the control plane 300, but the PDCP sublayer 354 also provides header compression for upper layer packets to reduce radio transmission overhead. The L2 layer 355 in the user plane 350 further includes an SDAP (Service Data Adaptation Protocol) sublayer 356, and the SDAP sublayer 356 is responsible for mapping between QoS streams and Data Radio Bearers (DRBs) to support diversity of services. Although not shown, the first node may have several upper layers above the L2 layer 355. Also included are a network layer (e.g., IP layer) that terminates at the P-GW on the network side and an application layer that terminates at the other end of the connection (e.g., far end UE, server, etc.).
As an example, the wireless protocol architecture in fig. 3 is applicable to the first node in this application.
As an example, the radio protocol architecture in fig. 3 is applicable to the second node in this application.
As an example, the radio protocol architecture in fig. 3 is applicable to the third node in the present application.
As an embodiment, the first signaling in this application is generated in the RRC306 or the PC 5-S307.
As an embodiment, the second signaling in this application is generated in the RRC306 or the PC 5-S307.
As an embodiment, the third signaling in this application is generated in the RRC306 or the PC 5-S307.
As an embodiment, the first target signaling in the present application is generated in the RRC306 or the PC 5-S307.
As an embodiment, the first feedback signaling in this application is generated in the RRC306 or the PC 5-S307.
As an embodiment, the first MAC PDU in the present application is generated in the MAC302 or the MAC 352.
As an embodiment, the second MAC PDU in the present application is generated in the MAC302 or the MAC 352.
As an embodiment, the target MAC PDU in the present application is generated in the MAC302 or the MAC 352.
Example 4
Embodiment 4 shows a schematic diagram of a first communication device and a second communication device according to the present application, as shown in fig. 4. Fig. 4 is a block diagram of a first communication device 450 and a second communication device 410 communicating with each other in an access network.
The first communications device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmit processor 468, a receive processor 456, a multi-antenna transmit processor 457, a multi-antenna receive processor 458, a transmitter/receiver 454, and an antenna 452.
The second communication device 410 includes a controller/processor 475, a memory 476, a receive processor 470, a transmit processor 416, a multiple antenna receive processor 472, a multiple antenna transmit processor 471, a transmitter/receiver 418, and an antenna 420.
In the transmission from the second communication device 410 to the first communication device 450, at the second communication device 410, upper layer data packets from the core network are provided to the controller/processor 475. The controller/processor 475 implements the functionality of layer L2. In transmissions from the second communications device 410 to the first communications device 450, the controller/processor 475 provides header compression, encryption, packet segmentation and reordering, multiplexing between logical and transport channels, and radio resource allocation to the first communications device 450 based on various priority metrics. The controller/processor 475 is also responsible for retransmission of lost packets, and signaling to the first communication device 450. The transmit processor 416 and the multi-antenna transmit processor 471 implement various signal processing functions for the L1 layer (i.e., the physical layer). The transmit processor 416 implements coding and interleaving to facilitate Forward Error Correction (FEC) at the second communication device 410, as well as mapping of signal constellation based on various modulation schemes (e.g., Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK), M-phase shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM)). The multi-antenna transmit processor 471 performs digital spatial precoding, including codebook-based precoding and non-codebook based precoding, and beamforming processing on the coded and modulated symbols to generate one or more spatial streams. Transmit processor 416 then maps each spatial stream to subcarriers, multiplexes with reference signals (e.g., pilots) in the time and/or frequency domain, and then uses an Inverse Fast Fourier Transform (IFFT) to generate the physical channels carrying the time-domain multicarrier symbol streams. The multi-antenna transmit processor 471 then performs transmit analog precoding/beamforming operations on the time domain multi-carrier symbol stream. Each transmitter 418 converts the baseband multicarrier symbol stream provided by the multi-antenna transmit processor 471 into a radio frequency stream that is then provided to a different antenna 420.
In a transmission from the second communications apparatus 410 to the first communications apparatus 450, each receiver 454 receives a signal through its respective antenna 452 at the first communications apparatus 450. Each receiver 454 recovers information modulated onto a radio frequency carrier and converts the radio frequency stream into a baseband multi-carrier symbol stream that is provided to a receive processor 456. Receive processor 456 and multi-antenna receive processor 458 implement the various signal processing functions of the L1 layer. A multi-antenna receive processor 458 performs receive analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454. Receive processor 456 converts the baseband multicarrier symbol stream after the receive analog precoding/beamforming operation from the time domain to the frequency domain using a Fast Fourier Transform (FFT). In the frequency domain, the physical layer data signals and the reference signals to be used for channel estimation are demultiplexed by the receive processor 456, and the data signals are subjected to multi-antenna detection in the multi-antenna receive processor 458 to recover any spatial streams destined for the first communication device 450. The symbols on each spatial stream are demodulated and recovered at a receive processor 456 and soft decisions are generated. The receive processor 456 then decodes and deinterleaves the soft decisions to recover the upper layer data and control signals transmitted by the second communications device 410 on the physical channel. The upper layer data and control signals are then provided to a controller/processor 459. The controller/processor 459 implements the functionality of the L2 layer. The controller/processor 459 may be associated with a memory 460 that stores program codes and data. Memory 460 may be referred to as a computer-readable medium. In transmissions from the second communications device 410 to the second communications device 450, the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, deciphering, header decompression, control signal processing to recover upper layer packets from the core network. The upper layer packet is then provided to all protocol layers above the L2 layer. Various control signals may also be provided to L3 for L3 processing.
In a transmission from the first communications device 450 to the second communications device 410, a data source 467 is used at the first communications device 450 to provide upper layer data packets to a controller/processor 459. Data source 467 represents all protocol layers above the L2 layer. Similar to the send function at the second communications apparatus 410 described in the transmission from the second communications apparatus 410 to the first communications apparatus 450, the controller/processor 459 implements header compression, encryption, packet segmentation and reordering, and multiplexing between logical and transport channels based on radio resource allocation, implementing L2 layer functions for the user plane and control plane. The controller/processor 459 is also responsible for retransmission of lost packets and signaling to said second communications device 410. A transmit processor 468 performs modulation mapping, channel coding, and digital multi-antenna spatial precoding by a multi-antenna transmit processor 457 including codebook-based precoding and non-codebook based precoding, and beamforming, and the transmit processor 468 then modulates the resulting spatial streams into multi-carrier/single-carrier symbol streams, which are provided to different antennas 452 via a transmitter 454 after analog precoding/beamforming in the multi-antenna transmit processor 457. Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmit processor 457 into a radio frequency symbol stream and provides the radio frequency symbol stream to the antenna 452.
In a transmission from the first communication device 450 to the second communication device 410, the functionality at the second communication device 410 is similar to the receiving functionality at the first communication device 450 described in the transmission from the second communication device 410 to the first communication device 450. Each receiver 418 receives an rf signal through its respective antenna 420, converts the received rf signal to a baseband signal, and provides the baseband signal to a multi-antenna receive processor 472 and a receive processor 470. The receive processor 470 and the multiple antenna receive processor 472 collectively implement the functionality of the L1 layer. Controller/processor 475 implements the L2 layer functions. The controller/processor 475 can be associated with a memory 476 that stores program codes and data. Memory 476 may be referred to as a computer-readable medium. In transmission from the first communications device 450 to the second communications device 410, the controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, deciphering, header decompression, control signal processing to recover upper layer packets from the UE 450. Upper layer data packets from the controller/processor 475 may be provided to a core network.
As an embodiment, the first communication device 450 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code configured to, for use with the at least one processor, the first communication device 450 apparatus at least: sending a first signaling, the first signaling indicating a second candidate logical channel identity; receiving a second MAC PDU; wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the first communication device 450 includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: sending a first signaling, the first signaling indicating a second candidate logical channel identity; receiving a second MAC PDU; wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: receiving a target MAC PDU; the target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, a second MAC PDU is sent; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: receiving a target MAC PDU; the target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, a second MAC PDU is sent; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: receiving a first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity; transmitting a first MAC PDU; wherein the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the first logical channel identity is different from the second logical channel identity.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer readable instructions that when executed by at least one processor result in actions comprising: receiving a first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity; transmitting a first MAC PDU; wherein the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the first logical channel identity is different from the second logical channel identity.
As an embodiment, the first communication device 450 corresponds to a first node in the present application.
As an embodiment, the second communication device 410 corresponds to a second node in the present application.
As an embodiment, the second communication device 410 corresponds to a third node in the present application.
For one embodiment, the first communication device 450 is a UE.
As an embodiment, the first communication device 450 is a vehicle-mounted terminal.
For one embodiment, the second communication device 410 is a UE.
As an example, the first communication device 4100 is a vehicle-mounted terminal.
For one embodiment, receiver 456 (including antenna 460), receive processor 452, and controller/processor 490 are used to receive the second MAC PDU.
For one embodiment, receiver 456 (including antenna 460), receive processor 452, and controller/processor 490 are used to receive the second signaling.
For one embodiment, a transmitter 456 (including an antenna 460), a transmit processor 455, and a controller/processor 490 are used to transmit the first signaling.
For one embodiment, a transmitter 456 (including an antenna 460), a transmit processor 455, and a controller/processor 490 are used to transmit the third signaling.
For one embodiment, the transmitter 416 (including antenna 420), transmit processor 412, and controller/processor 440 are used to transmit the second MAC PDU in this application.
For one embodiment, transmitter 416 (including antenna 420), transmit processor 412, and controller/processor 440 are used to send the first feedback signaling in this application.
For one embodiment, receiver 416 (including antenna 420), receive processor 412, and controller/processor 440 are used to receive the target MAC PDU in this application.
For one embodiment, receiver 416 (including antenna 420), receive processor 412, and controller/processor 440 are used to receive the targeted signaling in this application.
For one embodiment, receiver 416 (including antenna 420), receive processor 412, and controller/processor 440 are used to receive the first signaling in this application.
For one embodiment, a transmitter 416 (including antenna 420), a transmit processor 412, and a controller/processor 440 are used to transmit the first MAC PDU in this application.
For one embodiment, transmitter 416 (including antenna 420), transmit processor 412, and controller/processor 440 are used to send the second signaling in this application.
For one embodiment, transmitter 416 (including antenna 420), transmit processor 412, and controller/processor 440 are used to transmit the targeted signaling in this application.
For one embodiment, receiver 416 (including antenna 420), receive processor 412, and controller/processor 440 are used to receive the first feedback signaling in this application.
For one embodiment, receiver 416 (including antenna 420), receive processor 412, and controller/processor 440 are used to receive the third signaling.
Example 5
Embodiment 5 illustrates a wireless signal transmission flow chart according to an embodiment of the present application, as shown in fig. 5. In fig. 5, U01 corresponds to the first node of the present application, U02 corresponds to the second node of the present application, and U03 corresponds to the third node of the present application, and it is specifically noted that the sequence in the present example does not limit the sequence of signal transmission and the sequence of implementation in the present application, and the steps in F51 are optional.
For theFirst node U01Transmitting a first signaling in step S5101; receiving a second signaling in step S5102; transmitting third signaling in step S5103; a second MAC PDU is received in step S5104.
For theSecond node U02Receiving a target signaling in step S5201; sending a first feedback signaling in step S5202; receiving a first MAC PDU in step S5203; the second MAC PDU is transmitted in step S5204.
For theThird node U03Receiving the first signaling in step S5301; transmitting the target signaling in step S5302; receiving the first feedback signaling in step S5303; transmitting the second signaling in step S5304; receiving the third signaling in step S5305; the first MAC PDU is transmitted in S5306.
In embodiment 5, the first signaling indicates a second candidate logical channel identity; the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
For one embodiment, the communication interface between the first node U01 and the second node U02 is a PC 5.
For one embodiment, the communication interface between the first node U01 and the third node U03 is a PC 5.
For one embodiment, the communication interface between the third node U03 and the second node U02 is a PC 5.
For one embodiment, the communication interface between the first node U01 and the second node U02 is Uu.
For one embodiment, the communication interface between the first node U01 and the third node U03 is Uu.
For one embodiment, the communication interface between the third node U03 and the second node U02 is Uu.
For one embodiment, the second node U02 is a relay node between the first node U01 and the third node U03.
For one embodiment, the second candidate logical channel identity is the same as at least the 5 least significant bits of the second logical channel identity.
For one embodiment, the second candidate logical channel identity comprises at least 5 bits.
For one embodiment, the second candidate logical channel identity includes 5 least significant bits and a mask indicating that the bits other than the 5 least significant bits may be any bits.
For one embodiment, the second candidate logical channel identity comprises 6 bits.
For one embodiment, the second candidate logical channel identity comprises Q bits, where Q is a positive integer greater than 6.
As an embodiment, the second logical channel identity comprises 5 bits.
For one embodiment, the second logical channel identity comprises 6 bits.
For one embodiment, the second logical channel identity comprises P bits, where P is greater than 6.
As an embodiment, the first logical channel identity comprises 5 bits.
For one embodiment, the first logical channel identity comprises 6 bits.
For one embodiment, the first logical channel identity comprises P bits, where P is greater than 6.
As an embodiment, the 5 least significant bits of the second logical channel identity are set to the value of the 5 least significant bits of the second candidate logical channel identity.
As an embodiment, the second candidate logical channel identity is used for determining the first logical channel identity.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second candidate logical channel.
As an embodiment, the second candidate logical channel identity is set to the first logical channel identity.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel candidate, and the value of the bits other than the 5 least significant bits of the first logical channel identity is set to the exclusive or of the value of the corresponding bits other than the 5 least significant bits of the second logical channel candidate with 1.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel candidate, and the value of the bits other than the 5 least significant bits of the first logical channel identity is set to the 0/1 inverted value of the corresponding bits other than the 5 least significant bits of the second logical channel candidate.
As an embodiment, a value of the 5 least significant bits of the first logical channel identity is set to a value of the 5 least significant bits of the second logical channel candidate, and a value of a most significant bit of the 6 least significant bits of the first logical channel identity is set to an exclusive or of a most significant bit of the 6 least significant bits of the second logical channel candidate with 1.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel candidate, and the value of the most significant bit of the 6 least significant bits of the first logical channel identity is set to the 0/1 inverted value of the most significant bit of the 6 least significant bits of the second logical channel candidate.
As an embodiment, the second candidate logical channel identity is used for determining a second logical channel identity, which is used for determining the first logical channel identity.
As a sub-embodiment of this embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel identity, and the value of the other bits than the 5 least significant bits of the first logical channel identity is the 0/1 inverted value of the corresponding bits than the 5 least significant bits of the second logical channel identity.
As a sub-embodiment of this embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel identity, and the value of the other bits than the 5 least significant bits of the first logical channel identity is the exclusive or of the value of the corresponding bits than the 5 least significant bits of the second logical channel identity with 1.
As a sub-embodiment of this embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel identity, and the value of the most significant bit of the 6 least significant bits of the first logical channel identity is the exclusive or of the value of the most significant bit of the 6 least significant bits of the second logical channel identity and 1.
For one embodiment, the first logical channel identity is used to determine the second logical channel identity.
As one embodiment, the first logical channel identity is different from the second logical channel identity, and the 5 least significant bits of the first logical channel identity are the same as the second logical channel identity.
As an embodiment, the first signaling indicates a first candidate logical channel identity, the first candidate logical channel identity is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
For one embodiment, the first candidate logical channel identity and the second candidate logical channel identity occur in pairs.
As an embodiment, the first candidate logical channel identity is different from the second candidate logical channel identity by at least one bit, and the 5 least significant bits of the first candidate logical channel identity are the same as the second candidate logical channel identity.
As an embodiment, the first signaling explicitly indicates one of the first candidate logical channel identity and the second candidate logical channel identity, and implicitly derives the other.
As an embodiment, when the first candidate logical channel identity is determined to be the second logical channel identity, the second post-candidate logical channel identity is determined to be the first logical channel identity.
As an embodiment, when the first candidate logical channel identity is determined to be the first logical channel identity, the second post-candidate logical channel identity is determined to be the second logical channel identity.
For one embodiment, the first node U01, receives a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
As an embodiment, the second signaling comprises higher layer signaling.
As an embodiment, the second signaling includes RRC (Radio Resource Control) signaling.
For one embodiment, the second signaling comprises PC5-S signaling.
As one embodiment, the second signaling comprises application layer signaling.
As an embodiment, the second signaling comprises ProSe signaling.
As an embodiment, the second signaling is sent on a Uu interface.
As an embodiment, the second signaling is sent over a PC5 interface.
As an embodiment, the second signaling is transmitted through an scch (sidelink Control channel) channel.
As an embodiment, the second signaling is transmitted through an stch (sidelink Traffic channel) channel.
As an embodiment, the second signaling is transmitted through a pscch (physical sidelink control channel) channel.
As an embodiment, the second signaling is transmitted through a pssch (physical sidelink shared channel) channel.
As an embodiment, the second signaling is transmitted through a psbch (physical sidelink broadcast channel) channel.
As an embodiment, the second signaling is transmitted over a SL-SCH channel.
As an embodiment, the second signaling is transmitted through a sidelink.
As an embodiment, the second signaling is used to configure a DRB.
As an embodiment, the second signaling is used to configure RBs.
As an embodiment, the second signaling comprises rrcreconconfigurationsildenk.
As an embodiment, the second signaling includes a partial field (field) in RRCReconfigurationSidelink.
As an embodiment, the second signaling comprises rrcreeconfiguration.
For one embodiment, the second signaling includes SIB 12.
As an embodiment, the second signaling comprises SL-LogicalChannelConfigPC 5.
As an embodiment, the second signaling comprises SL-LogicalChannelConfig.
For one embodiment, the second signaling comprises SL-LogicalChannelConfig-r 16.
For one embodiment, the second signaling comprises SL-LogicalChannelConfig-r 17.
As an embodiment, the second signaling comprises part of the field in SL-logical channelconfig.
For one embodiment, the second signaling comprises sl-RLC-Config.
For one embodiment, the second signaling comprises sl-RLC-Config-r 16.
For one embodiment, the second signaling comprises sl-RLC-Config-r 17.
As an embodiment, the second signaling comprises a part of a field in the sl-RLC-Config.
As one embodiment, the second signaling comprises an sl-logical channelgroup.
As an embodiment, the second signaling comprises rrcconnectionreconfiguration sildelink.
As an embodiment, the second signaling comprises RRCConnectionReconfiguration.
For one embodiment, the second signaling includes DIRECT LINK an establish REQUEST.
For one embodiment, the second signaling includes DIRECT LINK establis opportunity ACCEPT.
As one example, the second signaling includes DIRECT LINK MODIFICATION REQUEST.
For one embodiment, the second signaling includes DIRECT LINK MODIFICATION ACCEPT.
For one embodiment, the second signaling includes DIRECT LINK KEEPALIVE REQUEST.
For one embodiment, the second signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the second signaling comprises a discover REQUEST.
As an embodiment, the second signaling comprises discover _ RESPONSE.
As an embodiment, the second signaling comprises a MATCH _ REPORT.
As an embodiment, the second signaling comprises MATCH _ REPORT _ ACK.
As an embodiment, the second signaling comprises a program REQUEST.
As an embodiment, the second signaling includes program REQUEST RESPONSE.
As an embodiment, the second signaling includes program _ ALERT.
As an embodiment, the second signaling includes program REQUEST valid.
As an embodiment, the second signaling includes program REQUEST valid RESPONSE.
As an embodiment, the second signaling comprises a discover UPDATE REQUEST.
As an embodiment, the second signaling comprises discover UPDATE RESPONSE.
As an embodiment, the second signaling comprises an announce REQUEST.
For one embodiment, the second signaling includes ANNOUNCING _ ALERT _ RESPONSE.
For one embodiment, the second signaling includes a Direct Security Mode Command.
As an embodiment, the second signaling includes Direct Security Mode Complete.
As an embodiment, the second signaling explicitly indicates the second logical channel identity.
As an embodiment, the second signaling carries the second logical channel identity.
As an embodiment, the second signaling indicates that the second candidate logical channel identity is determined to be the second logical channel identity.
As an embodiment, the first signaling comprises a first set of candidate logical channel identities, and the second signaling indicates which one of the first set of candidate logical channel identities is determined to be the second logical channel identity.
As an embodiment, the first logical channel identity and the second logical channel identity are both associated with the first identity.
As one embodiment, the first identity includes an RB identity.
As one embodiment, the first identity comprises a DRB identity.
As one embodiment, the first identity includes a link identity.
As one embodiment, the first identity comprises a sidelink identity.
As an embodiment, the first identity comprises a session identity.
As an embodiment, the first identity comprises an identity of the first node U01.
As an embodiment, the first Identity includes an RNTI (Radio Network temporary Identity) of the first node U01.
As an embodiment, the first identity is a link layer identity.
As one embodiment, the first identity is a layer 2 identity.
As an embodiment, the first identity includes an IP address of the first node U01.
As an embodiment, the first identity comprises an IP address of the third node U01.
As an embodiment, the first identity comprises an RNTI of the first node U01.
As an example, the first identity comprises the Layer 2ID of the first node U01.
As one embodiment, the first identity includes an L2 ID of the first node U01.
As an example, the first identity comprises the Layer 2ID of the third node U03.
As one embodiment, the first identity includes an L2 ID of the third node U03.
As one example, the first identity includes slrb-PC 5-ConfigIndex.
As an embodiment, the first identity comprises part of the fields indicated by SLRB-Config.
As an embodiment, the first logical channel identity and the first identity occur in the same message.
As an embodiment, the second logical channel identity is present in the same message as the first identity.
As one embodiment, the first logical channel identity is for the first identity.
As one embodiment, the second logical channel identity is for the first identity.
As an embodiment, the first identity is used to identify the link between the third node U03 to the first node U01 as determined by the first logical channel identity and the second logical channel identity.
As an embodiment, the second signaling indicates all bits of the first identity.
As an embodiment, the second signaling indicates 8 bits of the first identity.
As an embodiment, the second signaling indicates 16 bits of the first identity.
As an embodiment, the second signaling indicates 12 bits of the first identity.
For one embodiment, the first node U01, sends a third signaling;
wherein the third signaling is sent as a response that the second signaling does not contradict a current configuration; the third signaling indicates that configuration of the second signaling is complete; the first signaling comprises a first set of candidate logical channel identities; the first set of candidate logical channel identities comprises at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling conflicts with a current configuration.
As an embodiment, when the second logical channel identity included in the second signaling is the same as the second candidate logical channel identity, the second signaling is determined to not contradict the current configuration.
As an embodiment, when the second signaling includes the second logical channel identity that is the same as the 5 least significant bits of the second candidate logical channel identity, the second signaling is determined to not contradict the current configuration.
As an embodiment, when the second logical channel identity included in the second signaling belongs to the first candidate logical channel identity set, the second signaling is determined to not contradict a current configuration.
As an embodiment, the second signaling includes the first logical channel identity, and the second signaling is determined to not contradict the current configuration when the first logical channel identity and the second logical channel identity included in the second signaling both belong to the first candidate logical channel identity set.
As an embodiment, the second candidate logical channel identity belongs to the first candidate logical channel identity set, and when the second logical channel identity included in the second signaling is the same as the second candidate logical channel identity, the second signaling is determined to not conflict with the current configuration.
As an embodiment, the second signaling includes the first logical channel identity.
As an embodiment, the first set of candidate logical channel identities includes the first candidate logical channel identity and the second candidate logical channel identity, and the second signaling is determined to not contradict the current configuration when the second logical channel identity is the same as the second candidate logical channel identity and the first logical channel identity is the same as the first candidate logical channel identity.
As an embodiment, the first set of candidate logical channel identities includes the first candidate logical channel identity and the second candidate logical channel identity, and the second signaling is determined to not contradict the current configuration when the second logical channel identity is the same as the first candidate logical channel identity and the first logical channel identity is the same as the second candidate logical channel identity.
As an embodiment, the third signaling comprises higher layer signaling.
As an embodiment, the third signaling includes RRC (Radio Resource Control) signaling.
For one embodiment, the third signaling comprises PC5-S signaling.
As an embodiment, the third signaling comprises application layer signaling.
As an embodiment, the third signaling comprises ProSe signaling.
As an embodiment, the third signaling is sent on a Uu interface.
As an embodiment, the third signaling is sent over a PC5 interface.
As an embodiment, the third signaling is transmitted through an scch (sidelink Control channel) channel.
As an embodiment, the third signaling is transmitted through an stch (sidelink Traffic channel) channel.
As an embodiment, the third signaling is transmitted through a pscch (physical sidelink control channel) channel.
As an embodiment, the third signaling is transmitted through a pssch (physical sidelink shared channel) channel.
As an embodiment, the third signaling is transmitted through a psbch (physical sidelink broadcast channel) channel.
As an embodiment, the third signaling is transmitted over a SL-SCH channel.
As an embodiment, the third signaling is transmitted through a sidelink.
As an embodiment, the third signaling is used to configure a DRB.
As an embodiment, the third signaling is used to configure an RB.
As an embodiment, the third signaling comprises RRCReconfigurationSidelink.
As an embodiment, the third signaling includes a partial field (field) in RRCReconfigurationSidelink.
As an embodiment, the third signaling comprises rrcreeconfiguration.
As an embodiment, the third signaling includes SIB 12.
As an embodiment, the third signaling comprises SL-LogicalChannelConfigPC 5.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig-r 16.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig-r 17.
As an embodiment, the third signaling comprises a part of the field in SL-logical channelconfig.
For one embodiment, the third signaling comprises sl-RLC-Config.
For one embodiment, the third signaling comprises sl-RLC-Config-r 16.
For one embodiment, the third signaling comprises sl-RLC-Config-r 17.
As an embodiment, the third signaling comprises a part of a field in the sl-RLC-Config.
As an embodiment, the third signaling comprises an sl-logical channelgroup.
As an embodiment, the third signaling comprises rrcconnectionreconfiguration sildelink.
As an embodiment, the third signaling comprises RRCConnectionReconfiguration.
For one embodiment, the third signaling includes DIRECT LINK an establish REQUEST.
For one embodiment, the third signaling includes DIRECT LINK establis opportunity ACCEPT.
As an example, the third signaling includes DIRECT LINK MODIFICATION REQUEST.
As an embodiment, the third signaling includes DIRECT LINK MODIFICATION ACCEPT.
For one embodiment, the third signaling includes DIRECT LINK KEEPALIVE REQUEST.
For one embodiment, the third signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the third signaling comprises a discover REQUEST.
As an embodiment, the third signaling comprises discover _ RESPONSE.
As an embodiment, the third signaling comprises a MATCH _ REPORT.
As an embodiment, the third signaling comprises MATCH _ REPORT _ ACK.
As an embodiment, the third signaling comprises a program REQUEST.
As an embodiment, the third signaling includes program REQUEST RESPONSE.
As an embodiment, the third signaling includes program _ ALERT.
As an embodiment, the third signaling includes program REQUEST valid.
As an embodiment, the third signaling includes program REQUEST valid RESPONSE.
As an embodiment, the third signaling comprises discover UPDATE REQUEST.
As an embodiment, the third signaling comprises discover UPDATE RESPONSE.
As an embodiment, the third signaling comprises an announce REQUEST.
As an embodiment, the third signaling includes ANNOUNCING _ ALERT _ RESPONSE.
As an embodiment, the third signaling includes a Direct Security Mode Command.
As an embodiment, the third signaling includes Direct Security Mode Complete.
As an embodiment, the third signaling explicitly indicates the second logical channel identity.
As an embodiment, the third signaling carries the second logical channel identity.
As an embodiment, the third signaling indicates that a receiver of the second signaling is configured according to the configuration indicated by the second signaling.
As an embodiment, the target signaling is higher layer signaling.
As an embodiment, the target signaling comprises RRC signaling.
For one embodiment, the target signaling comprises PC5-S signaling.
As an embodiment, the first feedback signaling is higher layer signaling.
As one embodiment, the first feedback signaling comprises RRC signaling.
For one embodiment, the first feedback signaling comprises PC5-S signaling.
As an embodiment, when the 5 least significant bits of the first logical channel identity field and the second logical channel identity are the same, the target signaling is considered not to conflict with the current configuration.
As an embodiment, the target signaling is considered to not conflict with the current configuration when the second logical channel identity is not occupied.
As an embodiment, when the second logical channel identity is available, the target signaling is considered not to conflict with the current configuration.
As an embodiment, the first feedback signaling indicates that a receiver of the target signaling performs configuration according to the configuration indicated by the target signaling.
As an embodiment, the target signaling comprises higher layer signaling.
As an embodiment, the target signaling includes RRC (Radio Resource Control) signaling.
For one embodiment, the target signaling comprises PC5-S signaling.
As one embodiment, the target signaling includes application layer signaling.
As one embodiment, the target signaling includes ProSe signaling.
As an embodiment, the target signaling is sent on a Uu interface.
As an embodiment, the target signaling is sent over the PC5 interface.
As an embodiment, the target signaling is transmitted through an scch (sidelink Control channel) channel.
As an embodiment, the target signaling is transmitted through an stch (sidelink Traffic channel) channel.
As an embodiment, the target signaling is transmitted through a pscch (physical sidelink control channel) channel.
As an embodiment, the target signaling is transmitted through a psch (physical sidelink shared channel) channel.
As an embodiment, the target signaling is transmitted through a psbch (physical sidelink broadcast channel) channel.
As an embodiment, the target signaling is transmitted over a SL-SCH channel.
As an embodiment, the target signaling is transmitted over a sidelink.
As an embodiment, the target signaling is used to configure DRBs.
As an embodiment, the target signaling is used to configure RBs.
As an embodiment, the target signaling includes RRCReconfigurationSidelink.
As an embodiment, the target signaling includes a partial field (field) in rrcreeconfiguration sildelink.
As an embodiment, the target signaling includes rrcreeconfiguration.
For one embodiment, the target signaling includes SIB 12.
As an embodiment, the target signaling comprises SL-logic channelconfigpc 5.
As an embodiment, the target signaling comprises SL-LogicalChannelConfig.
For one embodiment, the target signaling comprises SL-LogicalChannelConfig-r 16.
For one embodiment, the target signaling comprises SL-LogicalChannelConfig-r 17.
As an embodiment, the target signaling comprises part of the field in SL-logical channelconfig.
For one embodiment, the target signaling comprises sl-RLC-Config.
For one embodiment, the target signaling comprises sl-RLC-Config-r 16.
For one embodiment, the target signaling comprises sl-RLC-Config-r 17.
For one embodiment, the target signaling comprises a portion of a field in an sl-RLC-Config.
As an embodiment, the target signaling comprises an sl-logical channelgroup.
As an embodiment, the target signaling comprises rrcconnectionreconfiguration sidelink.
As an embodiment, the target signaling comprises RRCConnectionReconfiguration.
For one embodiment, the target signaling includes DIRECT LINK an establish REQUEST.
For one embodiment, the target signaling includes DIRECT LINK establish ACCEPT.
As one embodiment, the target signaling includes DIRECT LINK MODIFICATION REQUEST.
For one embodiment, the target signaling includes DIRECT LINK MODIFICATION ACCEPT.
For one embodiment, the target signaling includes DIRECT LINK KEEPALIVE REQUEST.
For one embodiment, the target signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the target signaling comprises a discover REQUEST.
As an embodiment, the target signaling includes discover _ RESPONSE.
As an embodiment, the target signaling comprises MATCH _ REPORT.
For one embodiment, the target signaling includes a MATCH _ REPORT _ ACK.
As one embodiment, the target signaling includes a program REQUEST.
As one embodiment, the target signaling includes program REQUEST RESPONSE.
As one embodiment, the target signaling includes program _ ALERT.
As one embodiment, the target signaling includes program REQUEST valid.
As one embodiment, the target signaling includes program REQUEST valid RESPONSE.
As an embodiment, the target signaling comprises discover UPDATE REQUEST.
As an embodiment, the target signaling includes discover UPDATE RESPONSE.
As one embodiment, the target signaling includes announce ALERT REQUEST.
For one embodiment, the target signaling comprises ANNOUNCING _ ALERT _ RESPONSE.
As an embodiment, the target signaling includes a Direct Security Mode Command.
As an embodiment, the target signaling includes Direct Security Mode Complete.
As an embodiment, the target signaling explicitly indicates the second logical channel identity.
As an embodiment, the target signaling carries the second logical channel identity.
As one embodiment, the first feedback signaling comprises higher layer signaling.
As an embodiment, the first feedback signaling includes RRC (Radio Resource Control) signaling.
For one embodiment, the first feedback signaling comprises PC5-S signaling.
As one embodiment, the first feedback signaling includes application layer signaling.
As one embodiment, the first feedback signaling comprises ProSe signaling.
As an embodiment, the first feedback signaling is sent on a Uu interface.
As an embodiment, the first feedback signaling is sent on a PC5 interface.
As an embodiment, the first feedback signaling is transmitted through an scch (sidelink Control channel) channel.
As an embodiment, the first feedback signaling is transmitted through an stch (sidelink Traffic channel) channel.
As an embodiment, the first feedback signaling is transmitted through a pscch (physical sidelink control channel) channel.
As an embodiment, the first feedback signaling is transmitted through a pssch (physical sidelink shared channel) channel.
As an embodiment, the first feedback signaling is transmitted through a psbch (physical sidelink broadcast channel) channel.
As an embodiment, the first feedback signaling is transmitted over a SL-SCH channel.
As an embodiment, the first feedback signaling is transmitted through a secondary link.
As an embodiment, the first feedback signaling is used to configure a DRB.
As one embodiment, the first feedback signaling is used to configure RBs.
As an embodiment, the first feedback signaling comprises RRCReconfigurationSidelink.
As an embodiment, the first feedback signaling comprises a partial field (field) in rrcreconfigurable sidelink.
As an embodiment, the first feedback signaling comprises rrcreeconfiguration.
For one embodiment, the first feedback signaling includes SIB 12.
As an embodiment, the first feedback signaling comprises SL-LogicalChannelConfigPC 5.
As an embodiment, the first feedback signaling comprises SL-LogicalChannelConfig.
As an embodiment, the first feedback signaling comprises SL-LogicalChannelConfig-r 16.
As an embodiment, the first feedback signaling comprises SL-LogicalChannelConfig-r 17.
As an embodiment, the first feedback signaling comprises a part of the field in SL-logical channelconfig.
For one embodiment, the first feedback signaling comprises sl-RLC-Config.
For one embodiment, the first feedback signaling comprises sl-RLC-Config-r 16.
For one embodiment, the first feedback signaling comprises sl-RLC-Config-r 17.
As one embodiment, the first feedback signaling comprises a partial field in the sl-RLC-Config.
As one embodiment, the first feedback signaling comprises an sl-logical channelgroup.
As an embodiment, the first feedback signaling comprises rrcconnectionreconfiguration sildelink.
As an embodiment, the first feedback signaling comprises RRCConnectionReconfiguration.
For one embodiment, the first feedback signaling comprises DIRECT LINK an establish REQUEST.
For one embodiment, the first feedback signaling comprises DIRECT LINK establis request ACCEPT.
For one embodiment, the first feedback signaling includes DIRECT LINK MODIFICATION REQUEST.
For one embodiment, the first feedback signaling includes DIRECT LINK MODIFICATION ACCEPT.
For one embodiment, the first feedback signaling comprises DIRECT LINK KEEPALIVE REQUEST.
For one embodiment, the first feedback signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the first feedback signaling comprises a discover REQUEST.
As an embodiment, the first feedback signaling comprises discover _ RESPONSE.
As an embodiment, the first feedback signaling comprises a MATCH _ REPORT.
For one embodiment, the first feedback signaling comprises a MATCH _ REPORT _ ACK.
As an embodiment, the first feedback signaling comprises a program REQUEST.
As an embodiment, the first feedback signaling comprises program REQUEST RESPONSE.
As one embodiment, the first feedback signaling includes program _ ALERT.
As an embodiment, the first feedback signaling comprises program REQUEST valid.
As an embodiment, the first feedback signaling includes program REQUEST valid RESPONSE.
As an embodiment, the first feedback signaling comprises a discover UPDATE REQUEST.
As an embodiment, the first feedback signaling comprises discover UPDATE RESPONSE.
As one embodiment, the first feedback signaling comprises an announce ALERT REQUEST.
For one embodiment, the first feedback signaling comprises ANNOUNCING _ ALERT _ RESPONSE.
For one embodiment, the first feedback signaling includes a Direct Security Mode Command.
As an embodiment, the first feedback signaling includes Direct Security Mode Complete.
As an embodiment, the first feedback signaling explicitly indicates the second logical channel identity.
As an embodiment, the first feedback signaling carries the second logical channel identity.
As an example, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the second MAC PDU includes at least a portion of the first MAC PDU.
As an example, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the first data packet included in the second MAC PDU is from the first MAC PDU.
As an example, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the source identity included in the second MAC PDU is derived from the destination identity included in the first MAC PDU.
As an example, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the second MAC PDU is used to forward bits included in the first MAC PDU.
As an example, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: at least a part of the MAC SDUs carried by the second MAC PDU come from the MAC SDUs carried by the first MAC PDU.
Example 6
Embodiment 6 illustrates a wireless signal transmission flow chart according to an embodiment of the present application, as shown in fig. 6. In fig. 6, U11 corresponds to the first node of the present application, U12 corresponds to the second node of the present application, and U13 corresponds to the third node of the present application, and it is specifically noted that the sequence in the present example does not limit the sequence of signal transmission and the sequence of implementation in the present application, and the steps in F61 and F62 are optional.
For theFirst node U11In step S6101, a first signaling is sent; receiving a second signaling in step S6102; transmitting a third signaling in step S6103; a second MAC PDU is received in step S6104.
For theSecond node U12Receiving a first signaling in step S6201; transmitting a second signaling in step S6202; receiving a third signaling in step S6203; receiving a target signaling in step S6204; transmitting a first feedback signaling in step S6205; receiving a first MAC PDU in step S6206; the second MAC PDU is transmitted in step S6207.
For theThird node U13Receiving the first signaling in step S6301; transmitting the target signaling in step S6302; receiving the first feedback signaling in step S6303; and S6304, transmitting the first MAC PDU.
In embodiment 6, the first signaling indicates a second candidate logical channel identity; the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
Example 6 is based on example 5, and the parts of example 6 that are involved but not described in detail can be referred to in example 5.
As an embodiment, the second node U12 is a relay node for the third node U13 to communicate to the first node U11.
As an embodiment, the recipient of the first signaling is the second node U12.
As an embodiment, the receiver of the first signaling comprises the second node U12 and the third node U13.
As an embodiment, the first signaling is sent by means of unicast.
As an embodiment, the first signaling is sent in a non-unicast manner.
As an embodiment, the first signaling is transmitted by broadcasting.
As an embodiment, the first signaling is sent by means of multicast.
As an embodiment, the first signaling includes a second candidate logical channel identity, where the second candidate logical channel identity is a logical channel identity available in all wireless links occupied by the first data packet and carrying the identity of the first node U11 in the MAC PDU carrying the first data packet.
As an embodiment, the first signaling includes a first candidate logical channel identity set, where logical channel identities in the first candidate logical channel identity set are logical channel identities available in all wireless links occupied by the first data packet and carrying the identity of the first node U11 in a MAC PDU carrying the first data packet.
As an embodiment, the first signaling includes a first set of candidate logical channel identities, a candidate logical channel identity of the first set of candidate logical channel identities being an available logical channel identity.
As an embodiment, the first signaling includes a first set of candidate logical channel identities, and at least two candidate logical channel identities in the first set of logical channel identities have the same 5 least significant bits.
As an embodiment, when the second logical channel identity indicated by the target signaling is an available logical channel identity, the target signaling is considered not to conflict with the current configuration.
As an embodiment, when the second logical channel identity indicated by the target signaling is the same as the second candidate logical channel identity, the target signaling is considered not to conflict with the current configuration.
As an embodiment, when the second logical channel identity indicated by the target signaling belongs to the first set of candidate logical channel identities, the target signaling is considered not to conflict with the current configuration.
As an embodiment, when the second logical channel identity indicated by the target signaling is the same as the 5 least significant bits of the second candidate logical channel identity, the target signaling is considered not to conflict with the current configuration.
As an embodiment, the target signaling only carries logical channel identities other than the second logical channel identity.
As an embodiment, the first signaling is PC5-S signaling, and the target signaling and the second signaling are RRC signaling.
For one embodiment, the second node U12 generates the fourth signaling according to the first signaling, and the target identity of the fourth signaling determines the third node U13; the fourth signaling indicates the second candidate logical channel identity.
As an embodiment, the second node U12 generates the fourth signaling from the first signaling, a target identity of the fourth signaling being used to determine the third node U13; the fourth signaling indicates the second candidate logical channel identity.
As one embodiment, the fourth signaling indicates the first set of candidate logical channel identities.
For one embodiment, the first MAC PDU carries at least a portion of a first identity, which is used to determine the first node U11.
As an embodiment, the first MAC PDU carries only at least part of a second identity used to determine the second node U12 and at least part of a third identity used to determine the third node U13.
As an embodiment, the first MAC PDU carries at least a portion of a first identity and at least a portion of a second identity, the second identity being used to determine the second node U12, the first identity being used to determine the third node U11.
As an embodiment, the first MAC PDU carries at least a portion of a second identity used to determine the second node U12 and at least a portion of a third identity used to determine the third node U13.
For one embodiment, the second node U12 forwards the target signaling to the first node U11, the target signaling indicating that the second logical channel identity is used for a security algorithm for the first packet within the second MAC PDU.
For one embodiment, the second node U12 indicates to the third node that the second logical channel identity is used for communication between the second node U12 to the first node U11.
For one embodiment, the second node U12 indicates to the third node that the second logical channel identity is used for a security algorithm for data between the third node U13 to the first node U11.
As an embodiment, the above method has a benefit that the link between the third node U13 to the second node U12 and the link configuration between the second node U12 to the second node U11 may be relatively independent, and it may still be ensured that the first node U11 correctly detects data originating from the third node U13 through a security algorithm.
Example 7
Embodiment 7 illustrates a wireless signal transmission flow chart according to an embodiment of the present application, as shown in fig. 7. In fig. 7, U22 corresponds to the second node of the present application, U23 corresponds to the third node of the present application, and it is specifically illustrated that the sequence in the present example does not limit the signal transmission sequence and the implemented sequence in the present application, wherein the steps in F71 are optional.
For theSecond node U22Receiving a target MAC PDU in step S7201; in step S7202, determining whether the target MAC PDU subheader includes a first logical channel identity; transmitting a second MAC PDU in step S7203; the transmission of the second MAC PDU is abandoned in step S7204.
For theThird node U23The target MAC PDU is transmitted in step S7301.
Wherein the target MAC PDU comprises a target MAC sub-PDU comprising a target MAC sub-header and a target data packet, and the second transmitter transmits a second MAC PDU when the target MAC sub-header comprises a first logical channel identity; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
As an embodiment, when the target MAC PDU carries the first logical channel identity and does not carry the second logical channel identity, the second node U22 generates the second MAC PDU according to the target MAC PDU.
As a sub-embodiment of this embodiment, the second MAC PDU includes at least a portion of the target MAC PDU.
As a sub-embodiment of this embodiment, the target data packet included in the second MAC PDU is from the target data packet carried in the target MAC PDU.
As a sub-embodiment of this embodiment, the second MAC PDU comprises the second logical channel identity, which is determined by the first logical channel identity.
As a sub-embodiment of this embodiment, the source identity carried by the target MAC PDU is the identity of the third node U23.
As a sub-embodiment of this embodiment, the target identity carried by the target MAC PDU is an identity other than the third node U23.
As an embodiment, when the target MAC PDU carries the first logical channel identity and does not carry the second logical channel identity, the target MAC PDU is the first MAC PDU.
As an embodiment, the target identity carried by the target MAC PDU is the identity of the second node U22.
As an embodiment, the source identity carried by the target MAC PDU is the identity of the third node U23.
For one embodiment, the second node U22 abandons sending the second MAC PDU when the target MAC subheader includes the second logical channel identity.
As a sub-embodiment of this embodiment, the target MAC subheader does not include the first logical channel identity.
As a sub-embodiment of this embodiment, the target MAC subheader includes the second logical channel identity.
As a sub-embodiment of this embodiment, the sentence "the second node U22 abandons sending the second MAC PDU" includes the following meanings: the second point of presence U22 forwards the target MAC PDU to its own higher layer processing.
As a sub-embodiment of this embodiment, the sentence "the second node U22 abandons sending the second MAC PDU" includes the following meanings: the second point of presence U22 forwards the target MAC PDU to its PDCP layer for processing.
As a sub-embodiment of this embodiment, the sentence "the second node U22 abandons sending the second MAC PDU" includes the following meanings: the second point of presence U22 attempts to decrypt the target MAC PDU.
As a sub-embodiment of this embodiment, the sentence "the second node U22 abandons sending the second MAC PDU" includes the following meanings: the target MAC PDU is processed by the application layer of the second node U22.
As a sub-embodiment of this embodiment, the sentence "the second node U22 abandons sending the second MAC PDU" includes the following meanings: the second MAC PDU is generated from data other than the target MAC PDU.
As a sub-embodiment of this embodiment, the sentence "the second node U22 abandons sending the second MAC PDU" includes the following meanings: the target data carried in the target MAC PDU is not forwarded by the second node U22.
As an embodiment, when the target MAC PDU includes only logical channel identities other than the first logical channel identity and the second logical channel identity, the target MAC PDU is discarded.
Example 8
Embodiment 8 illustrates a schematic diagram of a MAC PDU according to an embodiment of the present invention, as shown in fig. 8.
In embodiment 8, one MAC PDU includes one MAC Header and at least one MAC sub PDU (sub PDU); the MAC header includes a source identity, a destination identity, and other bits.
As an embodiment, the MAC PDU is transmitted on SL-SCH (SideLink Shared CHannel).
As an embodiment, the number of bits included in the MAC header is fixed.
As an embodiment, the number of bits included in the MAC header is 32.
For one embodiment, the MAC header is a SL-SCH MAC subheader (subheader).
As an embodiment, the further bits comprise 5 fields, V, R, R, R, R, the number of bits comprised being 4, 1, respectively.
As an embodiment, the source identity and the destination identity comprise 16 bits and 8 bits, respectively.
As an embodiment, the source identity in the MAC header and the destination identity in the MAC header are the SRC domain and the DST domain, respectively.
As an embodiment, each MAC sub-PDU includes one MAC sub-header and one MAC SDU, and the MAC sub-header in each MAC sub-PDU includes an LCID field (Logical Channel IDentifier), where the LCID field indicates a Channel identity of a Logical Channel corresponding to the corresponding MAC SDU.
For one embodiment, the LCID field includes 5 bits.
For one embodiment, the LCID field includes 6 bits.
As an example, the MAC PDU in fig. 8 is the first MAC PDU in this application.
As a sub-embodiment of the above embodiment, the first MAC PDU includes at least a first MAC sub-PDU.
As an example, the MAC PDU in fig. 8 is the second MAC PDU in this application.
As a sub-embodiment of the above embodiment, the second MAC PDU includes at least a second MAC sub-PDU.
As an example, the MAC PDU in fig. 8 is the target MAC PDU in this application.
As a sub-embodiment of the above embodiment, the target MAC PDU includes at least a target MAC sub-PDU.
As an embodiment, the MAC PDU in fig. 8 is the third MAC PDU in embodiment 9 of the present application.
As a sub-embodiment of the above embodiment, the third MAC PDU includes at least a third MAC sub-PDU.
As an embodiment, the MAC PDU in fig. 8 is a fourth MAC PDU in embodiment 9 of the present application.
As a sub-embodiment of the above embodiment, the fourth MAC PDU includes at least a fourth MAC sub-PDU.
Example 9
Embodiment 9 illustrates a schematic diagram of communication between a node a and a node C according to an embodiment of the present invention, as shown in fig. 9.
In embodiment 9, the node a corresponds to a third node of the present application; the node C corresponds to a first node of the application; the node B corresponds to a second node of the application; node D corresponds to the second node of the present application.
For one embodiment, the interface between the node a and the node B is a PC5 interface.
As an embodiment, the interface between the node a and the node D is a PC5 interface.
For one embodiment, the interface between the node B and the node C is a PC5 interface.
As an embodiment, the interface between the node D and the node C is a PC5 interface.
As an embodiment, the node B and the node D are relay nodes for node a to node C communication.
For one embodiment, the node a sends a first MAC PDU to the node D; the first MAC PDU comprises a first MAC sub-PDU, and the first MAC sub-PDU comprises a first MAC sub-header and a first data packet; the node D transmitting a second MAC PDU to the node C, the first MAC PDU being used to generate the second MAC PDU; the second MAC PDU includes a second MAC sub-PDU including a second MAC sub-header and a first data packet.
For one embodiment, the first packet included in the second MAC PDU is from the first MAC PDU.
As an embodiment, the first data packet included in the second MAC PDU is directly copied to the first data packet carried in the first MAC PDU.
As an embodiment, the first data packet included in the second MAC PDU is from the first data packet carried in the first MAC PDU, and the first data packet included in the second MAC PDU is not decrypted by the node D.
As an embodiment, the source identity included in the second MAC PDU is the same as the destination identity included in the first MAC PDU.
As an embodiment, the second MAC PDU is used for forwarding data carried by the first MAC PDU.
For one embodiment, the node A sends a third MAC PDU to the node B; the third MAC PDU comprises a third MAC sub-PDU, and the third MAC sub-PDU comprises a third MAC sub-header and a first data packet; the node B transmitting a fourth MAC PDU to the node C, the third MAC PDU being used to generate the fourth MAC PDU; the fourth MAC PDU includes a fourth MAC sub-PDU including a fourth MAC sub-header and a first data packet.
As an embodiment, the first packet included in the fourth MAC PDU is from the third MAC PDU.
As an embodiment, the first data packet included in the fourth MAC PDU is directly copied to the first data packet carried in the third MAC PDU.
As an embodiment, the first data packet included in the fourth MAC PDU is from the first data packet carried in the third MAC PDU, and the first data packet included in the fourth MAC PDU is not decrypted by the node B.
As an embodiment, the source identity included in the fourth MAC PDU is the same as the destination identity included in the third MAC PDU.
As an embodiment, the fourth MAC PDU is used for forwarding data carried by the third MAC PDU.
As an embodiment, the node C sends a first signaling indicating a second candidate logical channel identity.
As an embodiment, the first set is a set of unoccupied logical channel identities of said node D to said node C; the second set is a set of unoccupied logical channel identities of the node B to the node C; the intersection of the first set and the second set includes the second candidate logical channel identity.
For one embodiment, the first signaling comprises a first set of candidate logical channel identities; the first set of candidate logical channel identities comprises at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities; the intersection of the first set and the second set comprises the first set of candidate logical channel identities.
As an example, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identities comprised by the first set are unoccupied.
As an example, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identity comprised by the first set is not occupied by any communication with said node C as destination node.
As an example, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identity comprised by the first set is not occupied by any MAC PDU destined for said node C.
As an example, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the first set comprises 5 least significant bits of the logical channel identity which are different from the 5 least significant bits of the logical channel identity comprised in any MAC PDU destined for said node C.
As an example, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identity comprised by the first set is not occupied by any communication having a destination identity of the identity of said node C.
As an example, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identity comprised by the first set is not occupied by any MAC PDU addressed to the identity of said node C.
As an example, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the first set comprises 5 least significant bits of a logical channel identity different from the 5 least significant bits of a logical channel identity comprised by any MAC PDU whose destination is the identity of said node C.
As an embodiment, the first set of candidate logical channel identities comprises a first candidate logical channel identity, the first candidate logical channel identity being different from the 5 least significant bits of the second candidate logical channel identity.
As an embodiment, the node C receives a second signaling, the second signaling indicating the second logical channel identity.
As an embodiment, the logical channel identity carried by the second MAC PDU and the fourth MAC PDU is the same.
As an embodiment, the logical channel identities included in the second MAC PDU and the fourth MAC PDU are configured to be the same.
As a sub-embodiment of this embodiment, the node a configures logical channel identities included in the second MAC PDU and the fourth MAC PDU.
As a sub-embodiment of this embodiment, the node B configures a logical channel identity included in the fourth MAC PDU; the node D configures a logical channel identity included in the second MAC PDU.
As an embodiment, the receiver of the first signaling is the node a.
As an embodiment, the recipients of the first signaling are the node B and the node D.
As an embodiment, the recipients of the first signaling are the node B and the node D and the node a.
As an embodiment, the second logical channel identity is used to determine the logical channel identity that the second MAC PDU and the fourth MAC PDU should include.
As an embodiment, the first set of candidate logical channel identities is used to determine the logical channel identities that the second MAC PDU and the fourth MAC PDU should include.
Example 10
Embodiment 10 illustrates a schematic diagram in which a second candidate logical channel identity is used to determine a second logical channel identity according to an embodiment of the present application, as shown in fig. 10.
As an embodiment, the second candidate logical channel identity is determined as the second logical channel identity.
As an embodiment, the value of the 5 least significant bits of the second candidate logical channel identity is determined as the value of the 5 least significant bits of the second logical channel identity.
As an embodiment, the second candidate logical channel identity is determined as the first logical channel identity, which is used to determine the second logical channel identity.
As a sub-embodiment of this embodiment, the value of the 5 least significant bits of the first logical channel identity is determined as the value of the 5 least significant bits of the second logical channel identity.
As a sub-embodiment of this embodiment, the value of a bit other than the 5 least significant bits of the first logical channel identity is inverted and determined as the value of the corresponding bit in the second logical channel identity; the first logical channel identity and the second logical channel identity have the same number of bits.
As a sub-embodiment of this embodiment, the value of the most significant bit of the 6 least significant bits of the first logical channel identity is determined as the value of the most significant bit of the 6 least significant bits of the second logical channel identity after exclusive-or with 1.
As a sub-embodiment of this embodiment, the value randomly set by bits other than the 5 least significant bits of the first logical channel identity is determined as the value of the corresponding bit in the second logical channel identity by inverting 0/1; the first logical channel identity and the second logical channel identity have the same number of bits.
As an embodiment, the first logical channel identity and the second logical channel identity both have K1 bits, and a value of 5 least significant bits of the K1 bits is equal to a value of 5 least significant bits of the second candidate logical channel identity; at least an lth bit is present from among the 1 st bit to the kth bit 1-5 of the first logical channel identity, wherein 1< ═ L < ═ K1-5, and the lth bit of the first logical channel identity is different from the lth bit of the second logical channel identity.
As a sub-embodiment of this embodiment, an exclusive or of the lth bit of the first logical channel identity and the lth bit of the second logical channel identity is 1.
As a sub-embodiment of this embodiment, bits 1 to K1-5 of the first logical channel identity are randomly generated; generating bits other than the L-th bit of the second logical channel identity randomly; the lth bit of the second logical channel is obtained by performing exclusive or between the value of the lth bit of the first logical channel identity and 1.
Example 11
Embodiment 11 illustrates a block diagram of a processing apparatus for use in a first node according to an embodiment of the present application; as shown in fig. 11. In fig. 11, a processing means 1100 in a first node comprises a first receiver 1101 and a first transmitter 1102. In the case of the embodiment 11, however,
a first transmitter 1102, which transmits a first signaling indicating a second candidate logical channel identity;
a first receiver 1101 receiving a second MAC PDU;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
For one embodiment, the second candidate logical channel identity is the same as at least the 5 least significant bits of the second logical channel identity.
As an embodiment, the second candidate logical channel identity is used for determining the first logical channel identity.
As an embodiment, the first signaling indicates a first candidate logical channel identity, the first candidate logical channel identity is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
For one embodiment, the first receiver 1101 receives a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
For an embodiment, the first transmitter 1102 transmits a third signaling;
wherein the third signaling is sent as a response that the second signaling does not contradict a current configuration; the third signaling indicates that configuration of the second signaling is complete; the first signaling comprises a first set of candidate logical channel identities; the first set of candidate logical channel identities comprises at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling conflicts with a current configuration.
As an embodiment, the first node is a User Equipment (UE).
As an embodiment, the first node is a terminal supporting a large delay difference.
As an embodiment, the first node is a terminal supporting NTN.
As an embodiment, the first node is an aircraft.
As an embodiment, the first node is a vehicle-mounted terminal.
As an embodiment, the first node is a relay.
As an embodiment, the first node is a ship.
As an embodiment, the first node is an internet of things terminal.
As an embodiment, the first node is a terminal of an industrial internet of things.
As an embodiment, the first node is a device supporting low-latency high-reliability transmission.
For one embodiment, the first receiver 1101 includes at least one of the antenna 452, the receiver 454, the receive processor 456, the multiple antenna receive processor 458, the controller/processor 459, the memory 460, or the data source 467 of embodiment 4.
For one embodiment, the first transmitter 1102 includes at least one of the antenna 452, the transmitter 454, the transmit processor 468, the multi-antenna transmit processor 457, the controller/processor 459, the memory 460, or the data source 467 of embodiment 4.
Example 12
Embodiment 12 illustrates a block diagram of a processing apparatus for use in a second node according to an embodiment of the present application; as shown in fig. 12. In fig. 12, the processing means 1200 in the first node comprises a second receiver 1202 and a second transmitter 1201. In the case of the embodiment 12, however,
a second receiver 1202 receiving a target MAC PDU;
wherein the target MAC PDU comprises a target MAC sub-PDU comprising a target MAC sub-header and a target data packet, and the second transmitter 1201 transmits a second MAC PDU when the target MAC sub-header comprises a first logical channel identity; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
For one embodiment, the second transmitter 1201 abstains from sending the second MAC PDU when the target MAC subheader includes the second logical channel identity.
For one embodiment, the second receiver 1202 receives target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
As an embodiment, the second transmitter 1201 sends the first feedback signaling as a response that the target signaling does not conflict with the current configuration.
Wherein the first feedback signaling indicates that configuration of the target signaling is completed.
As an embodiment, the second node is a User Equipment (UE).
As an embodiment, the second node is a terminal supporting a large delay difference.
As an embodiment, the second node is a terminal supporting NTN.
As an embodiment, the second node is an aircraft.
As an embodiment, the second node is a vehicle-mounted terminal.
As an embodiment, the second node is a relay.
As an embodiment, the second node is a ship.
As an embodiment, the second node is an internet of things terminal.
As an embodiment, the second node is a terminal of an industrial internet of things.
As an embodiment, the second node is a device supporting low-latency high-reliability transmission.
For one embodiment, the second transmitter 1201 includes at least one of the antenna 420, the transmitter 418, the transmit processor 416, the multi-antenna transmit processor 471, the controller/processor 475, and the memory 476 of embodiment 4.
For one embodiment, the second receiver 1202 includes at least one of the antenna 420, the receiver 418, the receive processor 470, the multiple antenna receive processor 472, the controller/processor 475, and the memory 476 of embodiment 4.
Example 13
Embodiment 13 illustrates a block diagram of a processing apparatus for use in a third node according to an embodiment of the present application; as shown in fig. 13. In fig. 13, the processing means 1300 in the first node comprises a third receiver 1302 and a third transmitter 1301. In the case of the embodiment 13, however,
a third receiver 1302, receiving a first signaling, the first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
a third transmitter 1301 transmitting the first MAC PDU;
wherein the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the first logical channel identity is different from the second logical channel identity.
As an embodiment, the third transmitter 1301, sends a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
As an embodiment, the third transmitter 1301, sends target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
Wherein the first feedback signaling indicates that configuration of the target signaling is completed.
As an embodiment, the third node is a User Equipment (UE).
As an embodiment, the third node is a terminal supporting a large delay difference.
As an embodiment, the third node is a terminal supporting NTN.
As an embodiment, the third node is an aircraft.
As an embodiment, the third node is a vehicle-mounted terminal.
As an embodiment, the third node is a relay.
As an embodiment, the third node is a ship.
As an embodiment, the third node is an internet of things terminal.
As an embodiment, the third node is a terminal of an industrial internet of things.
As an embodiment, the third node is a device supporting low-latency high-reliability transmission.
For one embodiment, the third transmitter 1301 includes at least one of the antenna 420, the transmitter 418, the transmit processor 416, the multi-antenna transmit processor 471, the controller/processor 475, and the memory 476 of embodiment 4.
For one embodiment, the third receiver 1302 includes at least one of the antenna 420, the receiver 418, the receive processor 470, the multiple antenna receive processor 472, the controller/processor 475, and the memory 476 of embodiment 4.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a hard disk or an optical disk. Alternatively, all or part of the steps of the above embodiments may be implemented by using one or more integrated circuits. Accordingly, the module units in the above embodiments may be implemented in a hardware form, or may be implemented in a form of software functional modules, and the present application is not limited to any specific form of combination of software and hardware. User equipment, terminal and UE in this application include but not limited to unmanned aerial vehicle, Communication module on the unmanned aerial vehicle, remote control aircraft, the aircraft, small aircraft, the cell-phone, the panel computer, the notebook, vehicle Communication equipment, wireless sensor, network card, thing networking terminal, the RFID terminal, NB-IoT terminal, MTC (Machine Type Communication) terminal, eMTC (enhanced MTC) terminal, the data card, network card, vehicle Communication equipment, low-cost cell-phone, low-cost panel computer, satellite Communication equipment, ship Communication equipment, wireless Communication equipment such as NTN user equipment. The base station or the system device in the present application includes, but is not limited to, a macro cell base station, a micro cell base station, a home base station, a relay base station, a gNB (NR node B) NR node B, a TRP (Transmitter Receiver Point), an NTN base station, a satellite device, a flight platform device, and other wireless communication devices.
The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (16)

1. A first node for wireless communication, comprising:
a first transmitter to transmit a first signaling, the first signaling indicating a second candidate logical channel identity;
a first receiver receiving a second MAC PDU;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
2. The first node of claim 1, wherein:
the second candidate logical channel identity is the same as at least the 5 least significant bits of the second logical channel identity.
3. The first node according to claim 1 or 2, characterized by:
the second candidate logical channel identity is used to determine a first logical channel identity.
4. The first node according to claim 1 or 2, characterized by:
the first signaling indicates a first candidate logical channel identity, the first candidate logical channel identity being the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
5. The first node according to any of claims 1 to 4, comprising:
the first receiver receives a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
6. The first node of claim 5, comprising:
the first transmitter transmits a third signaling;
wherein the third signaling is sent as a response that the second signaling does not contradict a current configuration; the third signaling indicates that configuration of the second signaling is complete; the first signaling comprises a first set of candidate logical channel identities; the first set of candidate logical channel identities comprises at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling conflicts with a current configuration.
7. A second node for wireless communication, comprising:
a second receiver receiving a target MAC PDU;
wherein the target MAC PDU comprises a target MAC sub-PDU comprising a target MAC sub-header and a target data packet, and the second transmitter transmits a second MAC PDU when the target MAC sub-header comprises a first logical channel identity; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
8. The second node of claim 7, comprising:
the second transmitter abandons sending the second MAC PDU when the target MAC subheader includes the second logical channel identity.
9. The second node according to claim 7 or 8, comprising:
the second receiver receives target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
10. The second node of claim 9, comprising:
the second transmitter is used for sending a first feedback signaling as a response that the target signaling does not conflict with the current configuration;
wherein the first feedback signaling indicates that configuration of the target signaling is completed.
11. A third node for wireless communication, comprising:
a third receiver to receive a first signaling, the first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
a third transmitter to transmit the first MAC PDU;
wherein the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the first logical channel identity is different from the second logical channel identity.
12. The third node of claim 11, comprising:
the third transmitter, send the second signalling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
13. The third node according to claim 11 or 12, comprising:
the third transmitter is used for transmitting a target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
14. A method in a first node for wireless communication, comprising:
sending a first signaling, the first signaling indicating a second candidate logical channel identity;
receiving a second MAC PDU;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the second MAC PDU is generated from the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
15. A method in a second node for wireless communication, comprising:
receiving a target MAC PDU;
the target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, a second MAC PDU is sent; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logical channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
16. A method in a third node for wireless communication, comprising:
receiving a first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
transmitting a first MAC PDU;
wherein the first MAC PDU comprises a first MAC sub-PDU comprising a first MAC sub-header and a first data packet, the first MAC sub-header comprising a first logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU comprising a second MAC sub-header and a first data packet, the second MAC sub-header comprising a second logical channel identity; the first logical channel identity is different from the second logical channel identity.
CN202010446477.8A 2020-05-25 2020-05-25 Method and apparatus for wireless communication Active CN113727343B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN202310258167.7A CN116347441A (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication
CN202010446477.8A CN113727343B (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication
PCT/CN2021/095032 WO2021238779A1 (en) 2020-05-25 2021-05-21 Method and device for wireless communication
US17/992,854 US20230083122A1 (en) 2020-05-25 2022-11-22 Method and device for wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010446477.8A CN113727343B (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310258167.7A Division CN116347441A (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication

Publications (2)

Publication Number Publication Date
CN113727343A true CN113727343A (en) 2021-11-30
CN113727343B CN113727343B (en) 2023-04-25

Family

ID=78671491

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010446477.8A Active CN113727343B (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication
CN202310258167.7A Pending CN116347441A (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202310258167.7A Pending CN116347441A (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication

Country Status (1)

Country Link
CN (2) CN113727343B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023186162A1 (en) * 2022-04-01 2023-10-05 上海朗帛通信技术有限公司 Method and device used for wireless communication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016122533A1 (en) * 2015-01-29 2016-08-04 Nokia Soluton And Networks Oy Handling of proximity services device to device related identities at radio access network level
US20180316610A1 (en) * 2015-11-16 2018-11-01 Lg Electronics Inc. Method for transmitting or receiving a mac pdu in a wireless communication system and a device therefor
US20190297529A1 (en) * 2018-03-23 2019-09-26 Qualcomm Incorporated Extension of logical channel number in cellular radio access technologies
CN110312226A (en) * 2018-03-20 2019-10-08 华为技术有限公司 Transmit the method and communication device of data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016122533A1 (en) * 2015-01-29 2016-08-04 Nokia Soluton And Networks Oy Handling of proximity services device to device related identities at radio access network level
US20180316610A1 (en) * 2015-11-16 2018-11-01 Lg Electronics Inc. Method for transmitting or receiving a mac pdu in a wireless communication system and a device therefor
CN110312226A (en) * 2018-03-20 2019-10-08 华为技术有限公司 Transmit the method and communication device of data
US20190297529A1 (en) * 2018-03-23 2019-09-26 Qualcomm Incorporated Extension of logical channel number in cellular radio access technologies

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
OPPO: "R2-2002649 "Discussion on PDCP open issues"", 《3GPP TSG_RAN\WG2_RL2》, 10 April 2020 (2020-04-10), pages 1 - 4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023186162A1 (en) * 2022-04-01 2023-10-05 上海朗帛通信技术有限公司 Method and device used for wireless communication

Also Published As

Publication number Publication date
CN113727343B (en) 2023-04-25
CN116347441A (en) 2023-06-27

Similar Documents

Publication Publication Date Title
CN114007196A (en) Method and equipment used for wireless communication
CN113395716B (en) Method and arrangement in a communication node used for wireless communication
US20230300936A1 (en) Method and device for wireless communication
CN113347648B (en) Method and equipment used for wireless communication
CN114499790A (en) Method and equipment used for wireless communication
CN113727343B (en) Method and apparatus for wireless communication
CN114979966B (en) Method and apparatus in a communication node for wireless communication
CN113766501B (en) Method and apparatus for wireless communication
CN112399581B (en) Method and apparatus in a node used for wireless communication
CN113853030A (en) Method and equipment used for wireless communication
CN115484691A (en) Method and equipment used for wireless communication
CN114666416A (en) Method and equipment used for wireless communication
CN114765745A (en) Method and equipment used for wireless communication
CN114205774A (en) Method and device for relay transmission
CN114640723B (en) Method and apparatus for wireless communication
CN115134056B (en) Method and apparatus for wireless communication
CN112423259A (en) Method and apparatus in a node used for wireless communication
CN116017442B (en) Method and apparatus for wireless communication
WO2024120139A1 (en) Method and apparatus used in communication node for wireless communication
CN113873464A (en) Method and equipment used for wireless communication
CN117835226A (en) Method and apparatus for wireless communication
CN115278929A (en) Method and equipment used for wireless communication
CN115396980A (en) Method and equipment used for wireless communication
CN117835319A (en) Method and apparatus in a communication node for wireless communication
CN116938405A (en) Method and apparatus for wireless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant