CN113766501B - Method and apparatus for wireless communication - Google Patents

Method and apparatus for wireless communication Download PDF

Info

Publication number
CN113766501B
CN113766501B CN202010508580.0A CN202010508580A CN113766501B CN 113766501 B CN113766501 B CN 113766501B CN 202010508580 A CN202010508580 A CN 202010508580A CN 113766501 B CN113766501 B CN 113766501B
Authority
CN
China
Prior art keywords
identity
signaling
link
mac pdu
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010508580.0A
Other languages
Chinese (zh)
Other versions
CN113766501A (en
Inventor
张晓博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Langbo Communication Technology Co Ltd
Original Assignee
Shanghai Langbo Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Langbo Communication Technology Co Ltd filed Critical Shanghai Langbo Communication Technology Co Ltd
Priority to CN202311379585.8A priority Critical patent/CN117376913A/en
Priority to CN202010508580.0A priority patent/CN113766501B/en
Priority to PCT/CN2021/096662 priority patent/WO2021244412A1/en
Publication of CN113766501A publication Critical patent/CN113766501A/en
Priority to US17/978,222 priority patent/US20230050029A1/en
Application granted granted Critical
Publication of CN113766501B publication Critical patent/CN113766501B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/22Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a method and a device used for wireless communication, comprising a first receiver, a second receiver and a first communication module, wherein the first receiver receives first signaling, the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; generating a second identity according to the first parameter set; a first transmitter transmitting a second MAC PDU; wherein the second MAC PDU includes at least a portion of the bits in the second identity, and the first set of parameters includes the first set of identities. By reasonably determining the second identity, the application improves the reliability and avoids the risk in communication.

Description

Method and apparatus for wireless communication
Technical Field
The present application relates to a transmission method and apparatus in a wireless communication system, and more particularly, to a transmission method and apparatus for improving system efficiency, optimizing resource utilization, reducing service interruption, improving service continuity, enhancing reliability, and better security and privacy protection in wireless communication.
Background
Future wireless communication systems have more and more diversified application scenes, and different application scenes have different performance requirements on the system. To meet the different performance requirements of various application scenarios, a New air interface technology (NR) is decided to be researched in the 3GPP (3 rd Generation Partner Project, third Generation partnership project) RAN (Radio Access Network ) #72 times of the whole meeting, and standardized Work is started on NR by the 3GPP RAN #75 times of the whole meeting through the WI (Work Item) of NR.
In communication, both LTE (Long Term Evolution ) and 5G NR can relate to reliable accurate reception of information, optimized energy efficiency ratio, determination of information validity, flexible resource allocation, scalable system structure, efficient non-access layer information processing, lower service interruption and disconnection rate, higher security and privacy, support for low power consumption, which is significant for normal communication of base stations and user equipments, reasonable scheduling of resources, balancing of system load, can be said to be high throughput, meet communication requirements of various services, improve spectrum utilization, improve basis stone of service quality, whether embbe (ehanced Mobile BroadBand, enhanced mobile broadband), URLLC (Ultra Reliable Low Latency Communication, ultra-high reliability low latency communication) or eMTC (enhanced Machine Type Communication ) is indispensable. Meanwhile, in the internet of things in the field of IIoT (Industrial Internet of Things), in V2X (vehicle to X) communication (Device to Device) in the field of industry, in communication of unlicensed spectrum, in user communication quality monitoring, in network planning optimization, in NTN (Non Territerial Network, non-terrestrial network communication), in TN (Territerial Network, terrestrial network communication), in dual-connection (Dual connectivity) system, in radio resource management and codebook selection of multiple antennas, in main link communication or sidelink communication, in signaling design, neighbor management, service management, in beamforming, information transmission modes are classified into broadcasting and unicast, and both transmission modes are indispensable for 5G system, because they are very helpful to meet the above requirements.
With the increasing of the scene and complexity of the system, the system has higher requirements on reducing the interruption rate, reducing the time delay, enhancing the reliability, enhancing the stability of the system, and the flexibility of the service, and saving the power, and meanwhile, the compatibility among different versions of different systems needs to be considered in the system design.
Disclosure of Invention
In various communication scenarios, reliable link establishment and maintenance are involved in the communication scenario between UEs, address management configuration is involved, coordination between different layers is involved, and security problems are caused by the coordination, and security aspects such as authentication between two UEs are more threatened due to lack of management of a central node in the communication between UEs, especially in the communication outside the coverage of a serving cell. One possible solution is thus to update the parameters of the UE, including the identity information of the UE, the parameters related to the security algorithm of the UE, periodically or at intervals. In updating these parameters, if improperly processed, a listener may infer updated information from previous information, thereby increasing the likelihood of a security threat to the user. For example, a listener needs to track a certain time for violent cracking of an encryption key and performs a large amount of computation, so that the longer the tracking time, the more likely the cracking will occur, if the listener can infer or correlate new information from old information, the more the UE does not perform effective updating, so that after a period of time, the security threat to the user increases dramatically. For communication between UEs with relays, the problem is more serious, because if the identities associated with each link cannot be associated at the same time, the listener is caused to associate an unexpired identity with an updated identity, so as to master a new identity, and coordination among multiple nodes makes the problem more complex. These security issues relate to encryption, authentication, privacy, integrity protection, etc. of data and control information. On the other hand, when the listener knows the communication mode of the user, the security and privacy of the user may be threatened, because parameters such as the address of the user may be exposed, which may lead to illegal tracking of the user, which are all problems faced by communication between UEs, especially related to sidelink communication.
In view of the above problems, the present application provides a solution.
It should be noted that, in the case of no conflict, the embodiments of any node of the present application and the features in the embodiments may be applied to any other node. The embodiments of the application and the features of the embodiments may be combined with each other arbitrarily without conflict.
The application discloses a method used in a first node of wireless communication, comprising the following steps:
receiving first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; generating a second identity according to the first parameter set;
transmitting a second MAC PDU;
wherein the second MAC PDU includes at least a portion of the bits in the second identity, and the first set of parameters includes the first set of identities.
As one embodiment, the problems to be solved by the present application include: when communication is carried out between the UE, in particular to sidelink communication, the identity is required to be updated from time to time between users to ensure the safety, the updating of the identity of the users can occur at any time, and the updating of the identity and the sending of data are independent; the identity updates between each link are also independent. The updating of the identity requires both parties to communicate simultaneously, which can avoid being tracked by listeners. But the identity of the relay node may be used by the listener to correlate the identity of the source destination node with the updated identity of the source destination node with which it is associated, if there is no responsive change, thereby creating a security problem. The application realizes synchronous updating of the identity by generating the second identity by utilizing the first signaling, thereby solving the problems.
As one example, the benefits of the above method include: when the identity between the source node and the destination node is updated, the relay node also needs to be updated correspondingly, and the update of the identity of the relay node is controlled by the source node, so that the safety problem caused by a method that each identity update is controlled by the node in the traditional scheme is avoided.
As one embodiment, the features of the present application include: MAC is Medium Access Control (medium access control).
As one embodiment, the features of the present application include: SDUs are Service Data Unit (service data units).
As one embodiment, the features of the present application include: the PDU is Protocol Data Unit (protocol data unit).
Specifically, according to one aspect of the present application, there is provided: receiving a first MAC PDU;
wherein the first MAC PDU includes at least a portion of bits in a first identity, the first identity being one link layer identity in the first set of identities, the first MAC PDU and the second MAC PDU each including a first data packet.
In particular, according to one aspect of the invention, the second MAC PDU includes at least some bits in a third identity, which is one link layer identity of the first set of identities that is different from the first identity.
Specifically, according to one aspect of the present invention, the first signaling indicates a first link identity, the first link identity is used to determine a first link, the second identity is associated with the first link, and the first MAC PDU belongs to the first link.
Specifically, according to one aspect of the present invention, the first signaling indicates a second link identity, the second link identity is used to determine a second link, the second identity is associated with the second link, and the second MAC PDU belongs to the second link.
Specifically, according to one aspect of the present invention, the first parameter set includes first time information.
Specifically, according to one aspect of the present invention, there is provided: receiving a first physical layer signaling, wherein the first physical layer signaling comprises configuration information of a first channel, and a channel occupied by a first MAC PDU comprises the first channel;
wherein the first physical layer signaling and the first MAC PDU collectively comprise the first identity.
Specifically, according to one aspect of the present application, there is provided: transmitting second physical layer signaling, wherein the second physical layer signaling comprises configuration information of a second channel, and a channel occupied by the second MAC PDU comprises the second channel;
wherein the second physical layer signaling and the second MAC PDU collectively comprise the second identity.
Specifically, according to one aspect of the present application, there is provided: third signaling is sent, the third signaling being used to respond to the first signaling.
In particular, according to one aspect of the application, the first signaling is used to indicate a first logical channel identity, the first MAC PDU comprising the first logical channel identity.
In particular, according to one aspect of the application, the first signaling is used to indicate a second logical channel identity, the second MAC PDU comprising the second logical channel identity.
In particular, according to one aspect of the application, the first node is a user equipment.
Specifically, according to an aspect of the present application, the first node is an internet of things terminal.
In particular, according to one aspect of the application, the first node is a relay.
Specifically, according to one aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the application, the first node is an aircraft.
The application discloses a method used in a second node of wireless communication, comprising the following steps:
transmitting a first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; the first set of parameters is used to generate a second identity;
wherein a second MAC PDU includes at least some bits in the second identity, and the first set of parameters includes the first set of identities.
Specifically, according to one aspect of the present application, there is provided: transmitting a first MAC PDU;
wherein the first MAC PDU includes at least a portion of bits in a first identity, the first identity being one link layer identity in the first set of identities, the first MAC PDU and the second MAC PDU each including a first data packet.
In particular, according to one aspect of the application, the second MAC PDU includes at least some bits in a third identity, which is one link layer identity of the first set of identities that is different from the first identity.
Specifically, according to one aspect of the present application, the first signaling indicates a first link identity, the first link identity is used to determine a first link, the second identity is associated with the first link, and the first MAC PDU belongs to the first link.
Specifically, according to one aspect of the present invention, the first signaling indicates a second link identity, the second link identity is used to determine a second link, the second identity is associated with the second link, and the second MAC PDU belongs to the second link.
Specifically, according to one aspect of the present invention, the first parameter set includes first time information.
Specifically, according to one aspect of the present invention, there is provided: transmitting a first physical layer signaling, wherein the first physical layer signaling comprises configuration information of a first channel, and a channel occupied by a first MAC PDU comprises the first channel;
wherein the first physical layer signaling and the first MAC PDU collectively comprise the first identity.
Specifically, according to one aspect of the present invention, there is provided: third signaling is received, the third signaling being used to respond to the first signaling.
In particular, according to one aspect of the invention, the first signaling is used to indicate a first logical channel identity, the first MAC PDU comprising the first logical channel identity.
In particular, according to one aspect of the invention, the first signaling is used to indicate a second logical channel identity, the second MAC PDU comprising the second logical channel identity.
In particular, according to one aspect of the application, the first node is a user equipment.
Specifically, according to an aspect of the present application, the first node is an internet of things terminal.
In particular, according to one aspect of the application, the first node is a relay.
Specifically, according to one aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the application, the first node is an aircraft.
The application discloses a method used in a third node of wireless communication, comprising the following steps:
receiving a second MAC PDU;
wherein the second MAC PDU includes at least a portion of the bits in a second identity, and the first set of parameters includes the first set of identities; the first signaling is used to indicate a first set of identities including at least one link layer identity therein; the first set of parameters is used to generate a second identity.
Specifically, according to one aspect of the present application, a first MAC PDU is used to generate the second MAC PDU, the first MAC PDU including at least a portion of bits in a first identity, the first identity being one link layer identity in the first set of identities, the first MAC PDU and the second MAC PDU each including a first data packet.
In particular, according to one aspect of the invention, the second MAC PDU includes at least some bits in a third identity, which is one link layer identity of the first set of identities that is different from the first identity.
Specifically, according to one aspect of the present invention, the first signaling indicates a first link identity, the first link identity is used to determine a first link, the second identity is associated with the first link, and the first MAC PDU belongs to the first link.
Specifically, according to one aspect of the present invention, the first signaling indicates a second link identity, the second link identity is used to determine a second link, the second identity is associated with the second link, and the second MAC PDU belongs to the second link.
Specifically, according to one aspect of the present invention, the first parameter set includes first time information.
Specifically, according to one aspect of the present invention, there is provided: receiving second physical layer signaling, wherein the second physical layer signaling comprises configuration information of a second channel, and a channel occupied by the second MAC PDU comprises the second channel;
wherein the second physical layer signaling and the second MAC PDU collectively comprise the second identity.
Specifically, according to one aspect of the present application, there is provided: third signaling is received, the third signaling being used to respond to the first signaling.
In particular, according to one aspect of the application, the first signaling is used to indicate a first logical channel identity, the first MAC PDU comprising the first logical channel identity.
In particular, according to one aspect of the application, the first signaling is used to indicate a second logical channel identity, the second MAC PDU comprising the second logical channel identity.
In particular, according to one aspect of the application, the first node is a user equipment.
Specifically, according to an aspect of the present application, the first node is an internet of things terminal.
In particular, according to one aspect of the application, the first node is a relay.
Specifically, according to one aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the application, the first node is an aircraft.
The application discloses a first node used for wireless communication, comprising:
a first receiver that receives first signaling, the first signaling being used to indicate a first set of identities, the first set of identities including at least one link layer identity therein; generating a second identity according to the first parameter set;
A first transmitter transmitting a second MAC PDU;
wherein the second MAC PDU includes at least a portion of the bits in the second identity, and the first set of parameters includes the first set of identities.
The application discloses a second node used for wireless communication, comprising:
a second transmitter for transmitting a first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; the first set of parameters is used to generate a second identity;
wherein a second MAC PDU includes at least some bits in the second identity, and the first set of parameters includes the first set of identities.
The application discloses a third node used for wireless communication, comprising:
a third receiver that receives a second MAC PDU;
wherein the second MAC PDU includes at least a portion of the bits in a second identity, and the first set of parameters includes the first set of identities; the first signaling is used to indicate a first set of identities including at least one link layer identity therein; the first set of parameters is used to generate a second identity.
As an embodiment, the present application has the following advantages over the conventional scheme:
In the method, in the process of updating the user identity, the user needs to avoid any behavior which is favorable for a listener to correlate new and old user identities so as to continuously track the user, and thus, the safety threat is caused. In the conventional method, the identity of the user between every two nodes is updated independently, which results in that some links already use new identities, while some nodes, such as a relay node, do not update identities, because the data packet includes at least a part of the source identity and the destination identity at the same time, so that a listener can associate an old identity with the updated identity through the unchanged identity as a springboard, thereby causing a series of security problems for tracking the user. On the other hand, in the traditional method, the node updating identity is determined by the node, and when updating, the two nodes update the identity of the node respectively, so that the flow is complex, and the updating speed is slow. The method provided by the application controls the first node to quickly generate the second identity by providing the first identity set by the first signaling, so that the unified and quick identity update among all nodes can be realized, and the security risk is reduced.
As an embodiment, the present application has the following advantages over the conventional scheme:
when layer 2 relay is used, the relay node lacks at least the PDCP layer, and some higher control layers, all functions above the lower layers only exist between the source node and the destination node. Whereas the second identity, the first identity, the third identity, if controlled by a layer above the lower layer, the structure of the layer 2 relay would lead to a loss of this part of the functionality. According to the method provided by the application, the second identity is configured or assisted by other nodes, such as the source node, and can be configured even by using RRC signaling, so that the confusion of a protocol structure is avoided, the complexity of a system is reduced, the development difficulty is simplified, the device cost is reduced, the configuration time is shortened, and the method is more flexible and safer.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings in which:
fig. 1 shows a flow chart of receiving a first signaling, transmitting a second MAC PDU, according to one embodiment of the present application;
FIG. 2 shows a schematic diagram of a network architecture according to one embodiment of the application;
Fig. 3 shows a schematic diagram of an embodiment of a radio protocol architecture of a user plane and a control plane according to an embodiment of the application;
FIG. 4 shows a schematic diagram of a first node, a second node, and a third node according to one embodiment of the application;
FIG. 5 illustrates a flow chart of a transmission according to one embodiment of the application;
FIG. 6 shows a flow chart of a transmission according to one embodiment of the application;
fig. 7 shows a schematic diagram of a MAC PDU according to an embodiment of the present application;
FIG. 8 shows a schematic diagram of node A communicating with node C in accordance with an embodiment of the application;
FIG. 9 shows a schematic diagram of a first set of parameters generating a second identity according to an embodiment of the application;
fig. 10 shows a schematic diagram of a first signaling indicating a first link identity according to an embodiment of the application;
fig. 11 shows a schematic diagram of a first signaling indicating a second link identity according to an embodiment of the application;
FIG. 12 illustrates a schematic diagram of a processing apparatus for use in a first node in accordance with one embodiment of the application;
FIG. 13 illustrates a schematic diagram of a processing device for use in a second node in accordance with one embodiment of the application;
Fig. 14 illustrates a schematic diagram of a processing arrangement for use in a second node according to an embodiment of the application.
Detailed Description
The technical scheme of the present application will be described in further detail with reference to the accompanying drawings, and it should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be arbitrarily combined with each other.
Example 1
Embodiment 1 illustrates a flow chart of receiving a first signaling, transmitting a second MAC PDU, as shown in fig. 1, according to one embodiment of the present application. In fig. 1, each block represents a step, and it is emphasized that the order of the blocks in the drawing does not represent temporal relationships between the represented steps.
In embodiment 1, a first node in the present application receives first signaling in step 101; transmitting a second MAC PDU in step 102;
wherein the first signaling is used to indicate a first set of identities, the first set of identities including at least one link layer identity; a second identity is generated from the first set of parameters.
The second MAC PDU includes at least a portion of the bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the first node is a UE (User Equipment).
As an embodiment, the first signaling indicates the second identity.
As an embodiment, the first signaling does not include the second identity.
As an embodiment, the first signaling comprises higher layer signaling.
As an embodiment, the first signaling comprises RRC (Radio Resource Control ) signaling.
As an embodiment, the first signaling includes a MAC CE.
As an embodiment, the first signaling includes a field within a MAC subheader.
As an embodiment, the first signaling includes a MAC subheader.
As an embodiment, the first MAC PDU carries the first signaling.
As an embodiment, the first signaling comprises PC5-S signaling.
As an embodiment, the first signaling is PC5-S signaling.
As an embodiment, the first signaling comprises application layer signaling.
As an embodiment, the first signaling comprises ProSe signaling.
As an embodiment, the first signaling is sent over a Uu interface.
As an embodiment, the first signaling is sent over a PC5 interface.
As an embodiment, the first signaling is transmitted over a SCCH (Sidelink Control Channel) channel.
As an embodiment, the first signaling is transmitted over a STCH (Sidelink Traffic Channel) channel.
As an embodiment, the first signaling is transmitted over a PSCCH (Physical sidelink control channel) channel.
As an embodiment, the first signaling is transmitted over a PSSCH (Physical sidelink shared channel) channel.
As an embodiment, the first signaling is transmitted over a PSBCH (Physical sidelink broadcast channel) channel.
As an embodiment, the first signaling is transmitted over a SL-SCH channel.
As an embodiment, the first signaling is transmitted through a sidelink (sidelink).
As an embodiment, the first signaling is used to configure a DRB.
As an embodiment, the first signaling is used to configure RBs.
As an embodiment, the first signaling includes rrcrecon configuration sip link.
As an embodiment, the first signaling includes a field (field) in rrcrecon configuration sidelink. As an embodiment, the first signaling comprises rrcrecon configuration.
As one embodiment, the first signaling includes SIB12.
As an embodiment, the first signaling comprises SL-LogicalChannelConfigPC5.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig-r16.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig-r17.
As an embodiment, the first signaling comprises a partial domain in SL-LogicalChannelConfig.
As an embodiment, the first signaling comprises sl-RLC-Config.
As an embodiment, the first signaling comprises sl-RLC-Config-r16.
As an embodiment, the first signaling comprises sl-RLC-Config-r17.
As an embodiment, the first signaling comprises a partial field in sl-RLC-Config.
As an embodiment, the first signaling comprises an sl-LogicalChannelGroup.
As an embodiment, the first signaling includes RRCConnectionReconfigurationSidelink.
As an embodiment, the first signaling includes RRCConnectionReconfiguration.
As an embodiment, the first signaling includes DIRECT LINK MODIFICATION REQUEST.
As an embodiment, the first signaling includes DIRECT LINK MODIFICATION ACCEPT.
As an embodiment, the first signaling includes a DIRECT LINK KEEPALIVE REQUEST.
As an embodiment, the first signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the first signaling comprises a PROXIMITY_REQUEST.
As an embodiment, the first signaling comprises a process_request_response.
As one embodiment, the first signaling includes PROXIMITY_ALERT.
As an embodiment, the first signaling comprises a process_request_valid.
As an embodiment, the first signaling comprises a process_request_valid_response.
As an embodiment, the first signaling comprises discover_update_request.
As an embodiment, the first signaling includes discover_update_response.
As an embodiment, the first signaling includes Direct Security Mode Command.
As an embodiment, the first signaling includes Direct Security Mode Complete.
As an embodiment, the first signaling includes Link Identifier Update Request.
As an embodiment, the first signaling includes Link Identifier Update Response.
As an embodiment, the first signaling includes Link Identifier Update Ack.
As an embodiment, the link Layer comprises Layer 2.
As an embodiment, the link layer comprises a MAC.
As an example, the link Layer identity is Layer-2 ID.
As an embodiment, the link Layer identity is a Layer 2ID.
As one embodiment, the link layer identity is an L2 ID.
As one embodiment, the link Layer identity is Layer 2identity.
As an embodiment, the link Layer identity is Layer 2 identifier.
As an embodiment, the link layer identity is different from the link layer identity.
As an example, the link Layer identity is Layer-2 ID.
As an embodiment, the link Layer identity is a Layer 2ID.
As one embodiment, the link layer identity is an L2 ID.
As one embodiment, the link Layer identity is Layer 2identity.
As an embodiment, the link Layer identity is Layer 2 identifier.
As an embodiment, the link layer identity is Link Layer identitifier.
As an embodiment, the link layer identity is Link Layer identity.
As an embodiment, the second identity is Layer-2 ID.
As an embodiment, the second identity is a Layer 2ID.
As an embodiment, the second identity is an L2 ID.
As an embodiment, the second identity is Layer 2identity.
As an embodiment, the second identity is Layer 2 identifier.
As an embodiment, the second identity is different from the second identity.
As an embodiment, the second identity is Layer-2 ID.
As an embodiment, the second identity is a Layer 2ID.
As an embodiment, the second identity is an L2 ID.
As an embodiment, the second identity is Layer 2identity.
As an embodiment, the second identity is Layer 2 identifier.
As an embodiment, the second identity is Link Layer identitifier.
As an embodiment, the second identity is Link Layer identity.
As an embodiment, the second identity comprises 24 bits.
As an embodiment, the second identity determines the first node.
As an embodiment, the second identity is an identity of the first node.
As one embodiment, the first set of identities includes N identities, where N is an integer greater than or equal to 1.
As an embodiment, the identities comprised by the first set of identities are all link layer identities.
As an embodiment, the first set of identities comprises the second identity.
As an embodiment, the first set of identities comprises only identities other than the second identity.
As an embodiment, the first set of identities comprises a first identity and a third identity.
As an embodiment, the first set of parameters is equal to the first set of identities.
As an embodiment, the first set of parameters is equal to the first set of identities and at least one element other than the first set of identities.
As an embodiment, the first set of identities is a subset of the first set of parameters.
As an embodiment, the first signaling indicates a first generation parameter, and the first set of parameters includes the first generation parameter.
As an embodiment, the first generation parameter is a random number seed.
As an embodiment, the first generation parameter is a bit range of an identity.
As an embodiment, the first generation parameter is an algorithm identification.
As an embodiment, at least one parameter of the first set of parameters is generated locally by the first node.
As an embodiment, at least one parameter of the first set of parameters does not need to be signaled.
As an embodiment, at least one parameter of the first set of parameters is fixed.
As an embodiment, for a given said first set of parameters, said second identity is determined.
As an embodiment, the second identity is generated by a first function taking the first set of parameters as input.
As an embodiment, the first function is fixed.
As an embodiment, the first function is signaling-free.
As an embodiment, the first function is configurable.
As an embodiment, the first function is configured by the first signaling.
As an embodiment, the second MAC PDU includes a second MAC sub-PDU, and the second MAC sub-PDU includes a second MAC sub-header and a first data packet.
As an embodiment, the second MAC subheader of the second MAC PDU comprises at least part of the bits of the second identity.
As an embodiment, the SRC field of the second MAC subheader of the second MAC PDU includes at least a portion of bits of the second identity.
As an embodiment, the sentence said "at least part of the bits of the second identity" is Q bits, wherein Q is an integer greater than 0.
As an embodiment, the sentence said "at least part of the bits of the second identity" is 8 bits.
As an embodiment, the sentence said "at least part of the bits of the second identity" is 16 bits.
As an embodiment, the first signaling explicitly indicates the first set of identities.
As an embodiment, the first signaling implicitly indicates the first set of identities.
As an embodiment, the source identity (SRC) carried by the MAC PDU carrying the first signaling is considered to belong to the first identity set.
As an embodiment, the destination identity (DST) carried by the MAC PDU carrying the first signaling is considered to belong to the first set of identities.
As an embodiment, the destination identity is one of the first set of identities, and the first signaling indicates a changed bit of the destination identity.
As an embodiment, the first set of identities belongs to a zero number set of identities, and the first signaling indicates identities comprised by the first set of identities by means of an index indicating identities in the zero number set.
As an embodiment, the first node determines the first set of identities by a second fixed algorithm.
As a sub-embodiment of this embodiment, the first signaling indicates that the behavior determines the first set of identities.
As a sub-embodiment of this embodiment, the first signaling indicates at least one input parameter of the second fixed algorithm.
As an embodiment, the first signaling is used to indicate a first logical channel identity, the first MAC PDU comprising the first logical channel identity.
As an embodiment, the first signaling is used to indicate a second logical channel identity, the second MAC PDU comprising the second logical channel identity.
As an embodiment, the first logical channel identity is used for a security algorithm of PDCP PDUs carried by the first MAC PDU.
As an embodiment, the first logical channel identity is used for a security algorithm of PDCP SDUs carried by the first MAC PDU.
As an embodiment, the second logical channel identity is used for a security algorithm of PDCP PDUs carried by the second MAC PDU.
As an embodiment, the first logical channel identity is used for a security algorithm of PDCP SDUs carried by the first MAC PDU.
As an embodiment, the security algorithm comprises encryption.
As an embodiment, the security algorithm comprises integrity protection.
As an embodiment, the security algorithm comprises a digital signature.
Example 2
Embodiment 2 illustrates a schematic diagram of a network architecture according to one embodiment of the application, as shown in fig. 2. Fig. 2 illustrates V2X communication architecture under 5G NR (new radio, new air interface), LTE (Long-Term Evolution) and LTE-a (Long-Term Evolution Advanced, enhanced Long-Term Evolution) system architecture. The 5G NR or LTE network architecture may be referred to as 5GS (5 GSystem)/EPS (Evolved Packet System ) some other suitable terminology.
The V2X communication architecture of embodiment 2 includes UE (User Equipment) 201, UE241, ng-RAN (next generation radio access network) 202,5GC (5G Core Network)/EPC (Evolved Packet Core, evolved packet core) 210, hss (Home Subscriber Server )/UDM (Unified Data Management, unified data management) 220, proSe function 250, and ProSe application server 230. The V2X communication architecture may be interconnected with other access networks, but these entities/interfaces are not shown for simplicity. As shown, the V2X communication architecture provides packet-switched services, however, those skilled in the art will readily appreciate that the various concepts presented throughout this disclosure may be extended to networks providing circuit-switched services or other cellular networks. The NG-RAN includes NR node bs (gnbs) 203 and other gnbs 204. The gNB203 provides user and control plane protocol termination towards the UE 201. The gNB203 may be connected to other gnbs 204 via an Xn interface (e.g., backhaul). The gNB203 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a Basic Service Set (BSS), an Extended Service Set (ESS), a TRP (transmit receive node), or some other suitable terminology. The gNB203 provides the UE201 with an access point to the 5GC/EPC210. Examples of UE201 include a cellular telephone, a smart phone, a Session Initiation Protocol (SIP) phone, a laptop, a Personal Digital Assistant (PDA), a satellite radio, a non-terrestrial base station communication, a satellite mobile communication, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, an drone, an aircraft, a narrowband internet of things device, a machine-type communication device, a land-based vehicle, an automobile, a wearable device, or any other similar functional device. Those of skill in the art may also refer to the UE201 as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communication device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. gNB203 is connected to 5GC/EPC210 through an S1/NG interface. The 5GC/EPC210 includes MME (Mobility Management Entity )/AMF (Authentication Management Field, authentication management domain)/SMF (Session Management Function ) 211, other MME/AMF/SMF214, S-GW (Service Gateway)/UPF (userplaneflection) 212, and P-GW (Packet Date Network Gateway, packet data network Gateway)/UPF 213. The MME/AMF/SMF211 is a control node that handles signaling between the UE201 and the 5GC/EPC210. In general, the MME/AMF/SMF211 provides bearer and connection management. All user IP (Internet Protocal, internet protocol) packets are transported through the S-GW/UPF212, which S-GW/UPF212 itself is connected to the P-GW/UPF213. The P-GW provides UE IP address assignment as well as other functions. The P-GW/UPF213 is connected to the internet service 230. Internet services 230 include operator-corresponding internet protocol services, which may include, in particular, the internet, intranets, IMS (IP Multimedia Subsystem ) and packet-switched streaming services. The ProSe function 250 is a logic function for network related behavior required for a ProSe (Proximity-based Service); including DPF (Direct Provisioning Function, direct provision function), direct discovery name management function (Direct Discovery Name Management Function), EPC level discovery ProSe function (EPC-level Discovery ProSe Function), and the like. The ProSe application server 230 has the functions of storing EPC ProSe user identities, mapping between application layer user identities and EPC ProSe user identities, allocating ProSe-restricted code suffix pools, etc.
As an embodiment, the UE201 and the UE241 are connected through a PC5 Reference Point (Reference Point).
As an embodiment, the ProSe function 250 is connected to the UE201 and the UE241 through PC3 reference points, respectively.
As an embodiment, the ProSe function 250 is connected to the ProSe application server 230 via a PC2 reference point.
As an embodiment, the ProSe application server 230 is connected to the ProSe application of the UE201 and the ProSe application of the UE241 via PC1 reference points, respectively.
As an embodiment, the second node, the first node, and the third node in the present application are the NR node B, UE and the UE241, respectively.
As an embodiment, the first node and the second node in the present application are UE201 and UE241, respectively.
As an embodiment, the first node and the third node in the present application are UE201 and UE241, respectively.
As an embodiment, the second node and the third node in the present application are UE201 and UE241, respectively.
As an embodiment, the radio link between the UE201 and the UE241 corresponds to a Sidelink (SL) in the present application.
As an embodiment, the radio link from the UE201 to the NR node B is an uplink.
As an embodiment, the radio link from the NR node B to the UE201 is a downlink.
As an embodiment, the radio link from the UE241 to the NR node B is an uplink.
As one embodiment, the radio link from NR node B to UE241 is a downlink.
As an embodiment, the UE201 supports relay transmission.
As an embodiment, the UE241 supports relay transmission.
As an embodiment, the gNB203 is a macro cell (marcocelluar) base station.
As one example, the gNB203 is a Micro Cell (Micro Cell) base station.
As an embodiment, the gNB203 is a PicoCell (PicoCell) base station.
As an embodiment, the gNB203 is a flying platform device.
As one embodiment, the gNB203 is a satellite device.
Example 3
Embodiment 3 shows a schematic diagram of an embodiment of a radio protocol architecture of a user plane and a control plane according to the application, as shown in fig. 3. Fig. 3 is a schematic diagram illustrating an embodiment of a radio protocol architecture for a user plane 350 and a control plane 300, fig. 3 shows the radio protocol architecture for the control plane 300 for a first node (UE, satellite or aerial in gNB or NTN) and a second node (gNB, satellite or aerial in UE or NTN), or between two UEs, in three layers: layer 1, layer 2 and layer 3. Layer 1 (L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions. The L1 layer will be referred to herein as PHY301. Layer 2 (L2 layer) 305 is above PHY301 and is responsible for the links between the first node and the second node and the two UEs through PHY301. The L2 layer 305 includes a MAC (Medium Access Control ) sublayer 302, an RLC (Radio Link Control, radio link layer control protocol) sublayer 303, and a PDCP (Packet Data Convergence Protocol ) sublayer 304, which terminate at the second node. The PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels. The PDCP sublayer 304 also provides security by ciphering the data packets and handover support for the first node between second nodes. The RLC sublayer 303 provides segmentation and reassembly of upper layer data packets, retransmission of lost data packets, and reordering of data packets to compensate for out of order reception due to HARQ. The MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating the various radio resources (e.g., resource blocks) in one cell among the first nodes. The MAC sublayer 302 is also responsible for HARQ operations. The RRC (Radio Resource Control ) sublayer 306 in layer 3 (L3 layer) in the control plane 300 is responsible for obtaining radio resources (i.e., radio bearers) and configuring the lower layers using RRC signaling between the second node and the first node. The PC5-S (PC 5Signaling Protocol ) sublayer 307 is responsible for the processing of the signaling protocol of the PC5 interface. The radio protocol architecture of the user plane 350 includes layer 1 (L1 layer) and layer 2 (L2 layer), the radio protocol architecture for the first node and the second node in the user plane 350 is substantially the same for the physical layer 351, PDCP sublayer 354 in the L2 layer 355, RLC sublayer 353 in the L2 layer 355 and MAC sublayer 352 in the L2 layer 355 as the corresponding layers and sublayers in the control plane 300, but the PDCP sublayer 354 also provides header compression for upper layer packets to reduce radio transmission overhead. Also included in the L2 layer 355 in the user plane 350 is an SDAP (Service Data Adaptation Protocol ) sublayer 356, the SDAP sublayer 356 being responsible for mapping between QoS flows and data radio bearers (DRBs, data Radio Bearer) to support diversity of traffic. Although not shown, the first node may have several upper layers above the L2 layer 355. Further included are a network layer (e.g., IP layer) terminating at the P-GW on the network side and an application layer terminating at the other end of the connection (e.g., remote UE, server, etc.).
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the first node in the present application.
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the second node in the present application.
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the third node in the present application.
As an embodiment, the first signaling in the present application is generated in the PC5-S307 or RRC306 or MAC302 or MAC352.
As an embodiment, the third signaling in the present application is generated in the PC5-S307 or RRC306.
As an embodiment, the first physical layer signaling in the present application is generated in the PHY351.
As an embodiment, the second physical layer signaling in the present application is generated in the PHY351.
As an embodiment, the first MAC PDU of the present application is generated in the MAC302 or the MAC352.
As an embodiment, the second MAC PDU of the present application is generated in the MAC302 or the MAC352.
Example 4
Embodiment 4 shows a schematic diagram of a first communication device and a second communication device according to the application, as shown in fig. 4. Fig. 4 is a block diagram of a first communication device 450 and a second communication device 410 communicating with each other in an access network.
The first communication device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmit processor 468, a receive processor 456, a multi-antenna transmit processor 457, a multi-antenna receive processor 458, a transmitter/receiver 454, and an antenna 452.
The second communication device 410 includes a controller/processor 475, a memory 476, a receive processor 470, a transmit processor 416, a multi-antenna receive processor 472, a multi-antenna transmit processor 471, a transmitter/receiver 418, and an antenna 420.
In the transmission from the second communication device 410 to the first communication device 450, upper layer data packets from the core network are provided to a controller/processor 475 at the second communication device 410. The controller/processor 475 implements the functionality of the L2 layer. In the transmission from the second communication device 410 to the first communication device 450, a controller/processor 475 provides header compression, encryption, packet segmentation and reordering, multiplexing between logical and transport channels, and radio resource allocation to the first communication device 450 based on various priority metrics. The controller/processor 475 is also responsible for retransmission of lost packets and signaling to the first communication device 450. The transmit processor 416 and the multi-antenna transmit processor 471 implement various signal processing functions for the L1 layer (i.e., physical layer). Transmit processor 416 performs coding and interleaving to facilitate Forward Error Correction (FEC) at the second communication device 410, as well as mapping of signal clusters based on various modulation schemes, e.g., binary Phase Shift Keying (BPSK), quadrature Phase Shift Keying (QPSK), M-phase shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM). The multi-antenna transmit processor 471 digitally space-precodes the coded and modulated symbols, including codebook-based precoding and non-codebook-based precoding, and beamforming processing, to generate one or more spatial streams. A transmit processor 416 then maps each spatial stream to a subcarrier, multiplexes with reference signals (e.g., pilots) in the time and/or frequency domain, and then uses an Inverse Fast Fourier Transform (IFFT) to generate a physical channel carrying the time domain multicarrier symbol stream. The multi-antenna transmit processor 471 then performs transmit analog precoding/beamforming operations on the time domain multi-carrier symbol stream. Each transmitter 418 converts the baseband multicarrier symbol stream provided by the multiple antenna transmit processor 471 to a radio frequency stream and then provides it to a different antenna 420.
In a transmission from the second communication device 410 to the first communication device 450, each receiver 454 receives a signal at the first communication device 450 through its respective antenna 452. Each receiver 454 recovers information modulated onto a radio frequency carrier and converts the radio frequency stream into a baseband multicarrier symbol stream that is provided to a receive processor 456. The receive processor 456 and the multi-antenna receive processor 458 implement various signal processing functions for the L1 layer. A multi-antenna receive processor 458 performs receive analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454. The receive processor 456 converts the baseband multicarrier symbol stream after receiving the analog precoding/beamforming operation from the time domain to the frequency domain using a Fast Fourier Transform (FFT). In the frequency domain, the physical layer data signal and the reference signal are demultiplexed by the receive processor 456, wherein the reference signal is to be used for channel estimation, and the data signal is subjected to multi-antenna detection in the multi-antenna receive processor 458 to recover any spatial stream destined for the first communication device 450. The symbols on each spatial stream are demodulated and recovered in a receive processor 456 and soft decisions are generated. The receive processor 456 then decodes and deinterleaves the soft decisions to recover the upper layer data and control signals that were transmitted by the second communication device 410 on the physical channel. The upper layer data and control signals are then provided to the controller/processor 459. The controller/processor 459 implements the functions of the L2 layer. The controller/processor 459 may be associated with a memory 460 that stores program codes and data. Memory 460 may be referred to as a computer-readable medium. In the transmission from the second communication device 410 to the second communication device 450, the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression, control signal processing to recover upper layer data packets from the core network. The upper layer packets are then provided to all protocol layers above the L2 layer. Various control signals may also be provided to L3 for L3 processing.
In the transmission from the first communication device 450 to the second communication device 410, a data source 467 is used at the first communication device 450 to provide upper layer data packets to a controller/processor 459. Data source 467 represents all protocol layers above the L2 layer. Similar to the transmit functions at the second communication device 410 described in the transmission from the second communication device 410 to the first communication device 450, the controller/processor 459 implements header compression, encryption, packet segmentation and reordering, and multiplexing between logical and transport channels based on radio resource allocations, implementing L2 layer functions for the user and control planes. The controller/processor 459 is also responsible for retransmission of lost packets and signaling to the second communication device 410. The transmit processor 468 performs modulation mapping, channel coding, and digital multi-antenna spatial precoding, including codebook-based precoding and non-codebook-based precoding, and beamforming, with the multi-antenna transmit processor 457 performing digital multi-antenna spatial precoding, after which the transmit processor 468 modulates the resulting spatial stream into a multi-carrier/single-carrier symbol stream, which is analog precoded/beamformed in the multi-antenna transmit processor 457 before being provided to the different antennas 452 via the transmitter 454. Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmit processor 457 into a radio frequency symbol stream and provides it to an antenna 452.
In the transmission from the first communication device 450 to the second communication device 410, the function at the second communication device 410 is similar to the receiving function at the first communication device 450 described in the transmission from the second communication device 410 to the first communication device 450. Each receiver 418 receives radio frequency signals through its corresponding antenna 420, converts the received radio frequency signals to baseband signals, and provides the baseband signals to a multi-antenna receive processor 472 and a receive processor 470. The receive processor 470 and the multi-antenna receive processor 472 collectively implement the functions of the L1 layer. The controller/processor 475 implements L2 layer functions. The controller/processor 475 may be associated with a memory 476 that stores program codes and data. Memory 476 may be referred to as a computer-readable medium. In the transmission from the first communication device 450 to the second communication device 410, a controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression, control signal processing to recover upper layer data packets from the UE 450. Upper layer packets from the controller/processor 475 may be provided to the core network.
As an embodiment, the first communication device 450 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus of the first communication device 450 to at least: receiving first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; generating a second identity according to the first parameter set; transmitting a second MAC PDU; wherein the second MAC PDU includes at least a portion of the bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the first communication device 450 includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: receiving first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; generating a second identity according to the first parameter set; transmitting a second MAC PDU; wherein the second MAC PDU includes at least a portion of the bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: transmitting a first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; the first set of parameters is used to generate a second identity; wherein a second MAC PDU includes at least some bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: transmitting a first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; the first set of parameters is used to generate a second identity; wherein a second MAC PDU includes at least some bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: transmitting a first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; the first set of parameters is used to generate a second identity; wherein a second MAC PDU includes at least some bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: transmitting a first signaling, wherein the first signaling is used for indicating a first identity set, and the first identity set comprises at least one link layer identity; the first set of parameters is used to generate a second identity; wherein a second MAC PDU includes at least some bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the first communication device 450 corresponds to a first node in the present application.
As an embodiment, the second communication device 410 corresponds to a second node in the present application.
As an embodiment, the second communication device 410 corresponds to a third node in the present application.
As an embodiment, the first communication device 450 is a UE.
As an embodiment, the first communication device 450 is an in-vehicle terminal.
As an embodiment, the second communication device 410 is a UE.
As an embodiment, the first communication device 410 is an in-vehicle terminal.
As an example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used in the present application to receive the first signaling.
As an example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used in the present application to receive the first MAC PDU.
As an example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used in the present application to receive the first physical layer signaling.
As an example, a transmitter 456 (including an antenna 460), a transmit processor 455 and a controller/processor 490 are used in the present application to transmit the second MAC PDU.
As an example, a transmitter 456 (including an antenna 460), a transmit processor 455 and a controller/processor 490 are used in the present application to transmit the third signaling.
As an example, a transmitter 456 (including an antenna 460), a transmit processor 455 and a controller/processor 490 are used in the present application to send the second physical layer signaling.
As an example, the transmitter 416 (including the antenna 420), the transmit processor 412 and the controller/processor 440 are used in the present application to transmit the first signaling.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used in the present application to send the first physical layer signaling.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used in the present application to transmit the first MAC PDU.
As an example, receiver 416 (including antenna 420), receive processor 412 and controller/processor 440 are used in the present application to receive the third signaling.
As an example, receiver 416 (including antenna 420), receive processor 412 and controller/processor 440 are used in the present application to receive the second MAC PDU.
As an example, receiver 416 (including antenna 420), receive processor 412 and controller/processor 440 are used in the present application to receive the third signaling.
As an example, receiver 416 (including antenna 420), receive processor 412 and controller/processor 440 are used in the present application to receive the second physical layer signaling.
Example 5
Embodiment 5 illustrates a wireless signal transmission flow diagram according to one embodiment of the application, as shown in fig. 5. In fig. 5, U01 corresponds to a first node of the present application, U02 corresponds to a second node of the present application, and U03 corresponds to a third node of the present application, and it is specifically illustrated that the order in this example is not limited to the order of signal transmission and the order of implementation in the present application, where the steps in F51 are optional.
For the followingFirst node U01Receiving a first signaling in step S5101; transmitting a third signaling in step S5102; receiving a first MAC PDU in step S5103; the second MAC PDU is transmitted in step S5104.
For the followingSecond node U02Transmitting the first signaling in step S5201; receiving the third signaling in step S5202; the first MAC PDU is transmitted in step S5203.
For the following Third node U03Receiving the third signaling in step S5301; the second MAC PDU is received in step S5302.
In embodiment 5, the first signaling is used to indicate a first set of identities including at least one link layer identity therein; generating a second identity according to the first parameter set; the second MAC PDU includes at least a portion of the bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the communication interface between the first node U01 and the second node U02 is a PC5.
As an embodiment, the communication interface between the first node U01 and the second node U02 is Uu.
As an embodiment, the communication interface between the first node U01 and the third node U03 is a PC5.
As an embodiment, the communication interface between the first node U01 and the third node U03 is Uu.
As an embodiment, the communication interface between the second node U02 and the third node U03 is a PC5.
As an embodiment, the communication interface between the second node U02 and the third node U03 is Uu.
As an embodiment, the first signaling triggers the third signaling.
As an embodiment, the first signaling instructs the first node U01 to update an identity to the second identity.
As an embodiment, the third signaling comprises at least a portion of bits of the second identity.
As an embodiment, the third signaling comprises the second identity.
As an embodiment, the third signaling indicates that the identity is updated.
As an embodiment, the third signaling is used to indicate that the first signaling does not contradict the current configuration.
As an embodiment, the third signaling comprises higher layer signaling.
As an embodiment, the third signaling comprises PC5-RRC (Radio Resource Control ) signaling.
As an embodiment, the third signaling comprises RRC signaling.
As an embodiment, the third signaling comprises PC5-S signaling.
As an embodiment, the third signaling is PC5-S signaling.
As an embodiment, the third signaling comprises application layer signaling.
As an embodiment, the third signaling comprises ProSe signaling.
As an embodiment, the third signaling is sent over the Uu interface.
As an embodiment, the third signaling is sent over the PC5 interface.
As an embodiment, the third signaling is transmitted over a SCCH (Sidelink Control Channel) channel.
As an embodiment, the third signaling is transmitted over a STCH (Sidelink Traffic Channel) channel.
As an embodiment, the third signaling is transmitted over a PSCCH (Physical sidelink control channel) channel.
As an embodiment, the third signaling is transmitted over a PSSCH (Physical sidelink shared channel) channel.
As an embodiment, the third signaling is transmitted over a PSBCH (Physical sidelink broadcast channel) channel.
As an embodiment, the third signaling is transmitted over a SL-SCH channel.
As an embodiment, the third signaling is transmitted through a sidelink (sidelink).
As an embodiment, the third signaling is used to configure the DRB.
As an embodiment, the third signaling is used to configure RBs.
As an embodiment, the third signaling includes rrcrecon configuration sip link.
As an embodiment, the third signaling includes a field (field) in rrcrecon configuration sidelink.
As an embodiment, the third signaling comprises rrcrecon configuration.
As an embodiment, the third signaling comprises SIB12.
As an embodiment, the third signaling comprises SL-LogicalChannelConfigPC5.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig-r16.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig-r17.
As an embodiment, the third signaling comprises a partial domain in SL-LogicalChannelConfig.
As an embodiment, the third signaling comprises sl-RLC-Config.
As an embodiment, the third signaling comprises sl-RLC-Config-r16.
As an embodiment, the third signaling comprises sl-RLC-Config-r17.
As an embodiment, the third signaling comprises a partial field in sl-RLC-Config.
As an embodiment, the third signaling comprises sl-LogicalChannelGroup.
As an embodiment, the third signaling includes RRCConnectionReconfigurationSidelink.
As an embodiment, the third signaling includes RRCConnectionReconfiguration.
As an embodiment, the third signaling includes DIRECT LINK MODIFICATION REQUEST.
As an embodiment, the third signaling includes DIRECT LINK MODIFICATION ACCEPT.
As an embodiment, the third signaling includes a DIRECT LINK KEEPALIVE REQUEST.
As an embodiment, the third signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the third signaling comprises a PROXIMITY_REQUEST.
As an embodiment, the third signaling comprises a process_request_response.
As an embodiment, the third signaling includes PROXIMITY_ALERT.
As an embodiment, the third signaling includes a process_request_valid.
As an embodiment, the third signaling comprises process_request_valid_response.
As an embodiment, the third signaling comprises discover_update_request.
As an embodiment, the third signaling includes discover_update_response.
As an embodiment, the third signaling includes Direct Security Mode Command.
As an embodiment, the third signaling includes Direct Security Mode Complete.
As an embodiment, the third signaling includes Link Identifier Update Request.
As an embodiment, the third signaling includes Link Identifier Update Response.
As an embodiment, the third signaling includes Link Identifier Update Ack.
As an embodiment, a first signaling is used to instruct the first node U01 to release (release) the RLC entity associated with the second MAC PDU.
As an embodiment, a first signaling is used to instruct the first node U01 to re-establish (re-establishment) the RLC entity associated with the second MAC PDU.
As an embodiment, a first signaling is used to instruct the first node U01 to reset (reset) the RLC entity associated with the second MAC PDU.
As an embodiment, a first signaling is used to instruct the first node U01 to reset (reset) the MAC entity associated with the second MAC PDU.
As an embodiment, a first status report is used to indicate the first node U01 releases (release) the RLC entity associated with the second MAC PDU.
As an embodiment, a first status report is used to indicate the RLC entity with which the first node U01 re-establishes (re-establishment) is associated with the second MAC PDU.
As an embodiment, a first status report is used to indicate the RLC entity with which the first node U01 resets (reset) is associated with the second MAC PDU.
As an embodiment, a first status report is used to indicate the MAC entity with which the first node U01 resets (reset) is associated with the second MAC PDU.
As an embodiment, after the first node U01 receives the first signaling, the first node U01 releases the RLC entity associated with the second MAC PDU.
As an embodiment, after the first node U01 receives the first signaling, the first node U01 re-establishes an RLC entity associated with the second MAC PDU.
As an embodiment, after the first node U01 receives the first signaling, the first node U01 resets the RLC entity associated with the second MAC PDU.
As an embodiment, after the first node U01 receives the first signaling, the first node U01 resets the MAC entity associated with the second MAC PDU.
As an embodiment, the sentence "RLC entity associated with the second MAC PDU" includes RLC used by the second MAC PDU.
As an embodiment, the sentence "RLC entity associated with the second MAC PDU" includes an RLC entity to which the RLC PDU carried by the second MAC PDU belongs.
As an embodiment, the sentence "RLC entity associated with the second MAC PDU" includes an RLC entity associated with an RB used by the second MAC PDU.
As an embodiment, the sentence "RLC entity associated with the second MAC PDU" includes an RLC entity corresponding to the second MAC PDU.
As an embodiment, the sentence "RLC entity associated with the second MAC PDU" includes an RLC entity corresponding to a logical channel of a MAC entity corresponding to the second MAC PDU.
As an embodiment, the first node U01 sends fourth signaling, and the first signaling triggers the fourth signaling.
As a sub-embodiment of this embodiment, the receiver of the fourth signaling is the third node U03.
As a sub-embodiment of this embodiment, the fourth signaling is PC5-S signaling.
As a sub-embodiment of this embodiment, the fourth signaling is PC5-RRC signaling.
As a sub-embodiment of this embodiment, the fourth signaling comprises the second identity.
As a sub-embodiment of this embodiment, the fourth signaling indicates that the first node uses the second identity.
As a sub-embodiment of this embodiment, the fourth signaling indicates that the first node is updated to the second identity.
As an embodiment, the first MAC PDU includes a first MAC sub-PDU, and the first MAC sub-PDU includes a first MAC sub-header and a first data packet.
As an embodiment, the first MAC subheader of the first MAC PDU comprises at least part of the bits of the first identity.
As an embodiment, the SRC field of the first MAC subheader of the first MAC PDU includes at least a portion of the bits of the first identity.
As an embodiment, the sentence said "at least part of the bits of the first identity" is P bits, wherein P is an integer greater than 0.
As an embodiment, the sentence said "at least part of bits of the first identity" is 8 bits.
As an embodiment, the sentence said "at least part of the bits of the first identity" is 16 bits.
As an embodiment, the first MAC PDU includes at least a portion of bits in the first identity, the first identity being one link layer identity in the first set of identities, the first MAC PDU and the second MAC PDU each including a first data packet.
As an embodiment, the second MAC PDU is generated by the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the second MAC PDU includes at least a portion of the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the first data packet included in the second MAC PDU is from the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the source identity included in the second MAC PDU is derived from the destination identity included in the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the second MAC PDU is used for forwarding bits included in the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: at least a part of the MAC SDUs carried by the second MAC PDU comes from the MAC SDUs carried by the first MAC PDU.
As an embodiment, the first data packet belongs to one MAC SDU.
As an embodiment, the first data packet includes a plurality of MAC SDUs.
As an embodiment, the first MAC PDU comprises at least part of the bits of the first identity and at least part of the bits of the second identity.
As an embodiment, the second identity is different from the first identity.
As an embodiment, the first identity is Layer-2 ID.
As an embodiment, the first identity is a Layer 2ID.
As an embodiment, the first identity is an L2 ID.
As an embodiment, the first identity is Layer 2identity.
As an embodiment, the first identity is Layer 2 identifier.
As an embodiment, the first identity is different from the first identity.
As an embodiment, the first identity is Layer-2 ID.
As an embodiment, the first identity is a Layer 2ID.
As an embodiment, the first identity is an L2 ID.
As an embodiment, the first identity is Layer 2identity.
As an embodiment, the first identity is Layer 2 identifier.
As an embodiment, the first identity is Link Layer identitifier.
As an embodiment, the first identity is Link Layer identity.
As an embodiment, the first identity comprises 24 bits.
As an embodiment, the first identity determines the second node.
As an embodiment, the first identity is an identity of the second node.
As an embodiment, the first MAC PDU comprises at least part of the bits of the second identity.
As an embodiment, the DST field of the first MAC subheader of the first MAC PDU comprises at least part of the bits of the second identity.
As an embodiment, the second MAC PDU comprises at least part of the bits in a third identity, which is one link layer identity of the first set of identities that is different from the first identity.
As an embodiment, the second MAC subheader of the second MAC PDU comprises at least a portion of the bits of the third identity.
As an embodiment, the DST field of the second MAC subheader of the second MAC PDU comprises at least a part of the bits of the third identity.
As an embodiment, the third identity is Layer-2 ID.
As an embodiment, the third identity is a Layer 2ID.
As an embodiment, the third identity is an L2 ID.
As an embodiment, the third identity is Layer 2identity.
As an embodiment, the third identity is Layer 2 identifier.
As an embodiment, the third identity is different from the third identity.
As an embodiment, the third identity is Layer-2 ID.
As an embodiment, the third identity is a Layer 2ID.
As an embodiment, the third identity is an L2 ID.
As an embodiment, the third identity is Layer 2identity.
As an embodiment, the third identity is Layer 2 identifier.
As an embodiment, the third identity is Link Layer identitifier.
As an embodiment, the third identity is Link Layer identity.
As an embodiment, the third identity comprises 24 bits.
As an embodiment, the third identity determines the third node.
As an embodiment, the third identity is an identity of the third node.
As an embodiment, the second identity is considered valid when the third signaling is received.
As an embodiment, the second identity is validated when the third signaling indicates that the second identity is validated.
As an embodiment, the first signaling is sent in unicast.
As an embodiment, the first signaling is sent in a non-unicast manner.
As an embodiment, the first signaling is sent in a multicast manner.
As an embodiment, the first signaling is sent in a broadcast manner.
As an embodiment, the third signaling is sent in unicast.
As an embodiment, the third signaling is sent in a non-unicast manner.
As an embodiment, the third signaling is sent in a multicast manner.
As an embodiment, the third signaling is sent in a broadcast manner.
As an embodiment, the first MAC PDU is sent in unicast.
As an embodiment, the second MAC PDU is sent in unicast.
As an embodiment, the first identity, the second identity and the third identity are different.
As an embodiment, the first node generates a fourth logical channel identity, and the third signaling includes the fourth logical channel identity.
As a sub-embodiment of this embodiment, the first MAC PDU includes the fourth logical channel identity.
As a sub-embodiment of this embodiment, the first node randomly generates the fourth logical channel identity.
As a sub-embodiment of this embodiment, the fourth logical channel identity is used for encryption of the first data packet carried by the first MAC PDU.
As a sub-embodiment of this embodiment, an identity other than the fourth logical channel identity is used for encryption of the first data packet carried by the first MAC PDU.
As an embodiment, the first node generates a fifth logical channel identity, and the third signaling includes the fifth logical channel identity.
As a sub-embodiment of this embodiment, the second MAC PDU includes the fifth logical channel identity.
As a sub-embodiment of this embodiment, the first node randomly generates the fifth logical channel identity.
As a sub-embodiment of this embodiment, the fifth logical channel identity is used for encryption of the first data packet carried by the second MAC PDU.
As a sub-embodiment of this embodiment, an identity other than the fifth logical channel identity is used for encryption of the first data packet carried by the first MAC PDU.
Example 6
Embodiment 6 illustrates a wireless signal transmission flow diagram according to one embodiment of the application, as shown in fig. 6. In fig. 6, U11 corresponds to a first node of the present application, U12 corresponds to a second node of the present application, and U13 corresponds to a third node of the present application, and it is specifically illustrated that the order in this example does not limit the order of signal transmission and implementation in the present application. Example 6 is based on example 5, and the parts of example 6 that are needed but not shown can be seen in example 5.
For the followingFirst node U11Receiving first physical layer signaling in step S6101; receiving a first MAC PDU in step S6102; transmitting the second physical layer signaling in step S6103; transmitting a second MAC PDU in step S6104;
for the followingSecond node U12Transmitting the first physical layer signaling in step S6201; transmitting the first MAC PDU in step S6202;
for the followingThird node U13Receiving the second physical layer signaling in step S6301; the second MAC PDU is received in step S6302.
As one embodiment, the first physical layer signaling includes configuration information of a first channel, and a channel occupied by the first MAC PDU includes the first channel; the first physical layer signaling and the first MAC PDU together comprise the first identity.
As an embodiment, the second physical layer signaling includes configuration information of a second channel, and the channel occupied by the second MAC PDU includes the second channel; the second physical layer signaling and the second MAC PDU collectively include the second identity.
As an embodiment, the first physical layer signaling includes DCI (Downlink Control Infomation).
As an embodiment, the first physical layer signaling includes SCI (Sidelink Control Infomation).
As an embodiment, the physical layer channel occupied by the first physical layer signaling includes a PSCCH.
As an embodiment, the physical layer channel occupied by the first physical layer signaling includes a PDCCH.
As an embodiment, the first physical layer signaling includes time-frequency resource information occupied by the first MAC PDU.
As an embodiment, the first physical layer signaling includes scheduling information of the first MAC PDU.
As an embodiment, the first channel includes a PDSCH.
As an embodiment, the first channel comprises a PSSCH.
As an embodiment, the configuration information of the first channel includes time-frequency resource information.
As one embodiment, the configuration information of the first channel includes Redundancy Version (RV) information.
As one embodiment, the configuration information of the first channel includes New Data Indication (NDI) information.
As an embodiment, the configuration information of the first channel includes HARQ information.
As an embodiment, the first channel comprises a PSSCH channel.
As an embodiment, the first channel comprises a PDSCH channel.
As an embodiment, the first channel comprises a PSCCH channel.
As an embodiment, the first physical layer signaling includes a portion of bits of the first identity, and the first MAC PDU includes other bits of the first identity.
As an embodiment, the first physical layer signaling includes N1 Most Significant Bits (MSBs) of the first identity, and the first MAC PDU includes all bits except the N1 most significant bits of the first identity, where N1 is an integer greater than 0.
As an embodiment, the first physical layer signaling includes N2 Least Significant Bits (LSB) bits of the first identity, and the first MAC PDU includes all bits except the N2 least significant bits of the first identity, where N2 is an integer greater than 0.
As an embodiment, the first physical layer signaling includes N3 Most Significant Bits (MSB) bits of the second identity, and the first MAC PDU includes all bits except the N3 most significant bits of the second identity, where N3 is an integer greater than 0.
As an embodiment, the first physical layer signaling includes N4 Least Significant Bits (LSB) bits of the second identity, and the first MAC PDU includes all bits except the N4 least significant bits of the second identity, where N4 is an integer greater than 0.
As one example, N2 is equal to 8 and N4 is equal to 16.
As one example, N1 is equal to 8 and N3 is equal to 16.
As an embodiment, the second physical layer signaling includes DCI (Downlink Control Infomation).
As an embodiment, the second physical layer signaling includes SCI (Sidelink Control Infomation).
As an embodiment, the physical layer channel occupied by the second physical layer signaling includes a PSCCH.
As an embodiment, the physical layer channel occupied by the second physical layer signaling includes PDCCH.
As an embodiment, the second physical layer signaling includes time-frequency resource information occupied by the second MAC PDU.
As an embodiment, the second physical layer signaling includes scheduling information of the second MAC PDU.
As one embodiment, the second channel includes a PDSCH.
As an embodiment, the second channel comprises a PSSCH.
As an embodiment, the configuration information of the second channel includes time-frequency resource information.
As one embodiment, the configuration information of the second channel includes Redundancy Version (RV) information.
As one embodiment, the configuration information of the second channel includes New Data Indication (NDI) information.
As an embodiment, the configuration information of the second channel includes HARQ information.
As an embodiment, the second channel comprises a PSSCH channel.
As an embodiment, the second channel comprises a PDSCH channel.
As an embodiment, the second channel comprises a PSCCH channel.
As an embodiment, the second physical layer signaling includes a portion of bits of the second identity, and the second MAC PDU includes other bits of the second identity.
As an embodiment, the second physical layer signaling includes W1 Most Significant Bits (MSB) bits of the second identity, and the second MAC PDU includes all bits except the W1 most significant bits of the second identity, where W1 is an integer greater than 0.
As an embodiment, the second physical layer signaling includes W2 Least Significant (LSB) bits of the second identity, and the second MAC PDU includes all bits other than the W2 least significant bits of the second identity, wherein W2 is an integer greater than 0.
As an embodiment, the second physical layer signaling includes W3 Most Significant (MSB) bits of the third identity, and the second MAC PDU includes all bits except the W3 most significant bits of the third identity, where W3 is an integer greater than 0.
As an embodiment, the second physical layer signaling includes W4 Least Significant (LSB) bits of the third identity, and the second MAC PDU includes all bits except the W4 least significant bits of the third identity, where W4 is an integer greater than 0.
As one example, W2 is equal to 8 and W4 is equal to 16.
As one example, W1 is equal to 8 and W3 is equal to 16.
Example 7
Embodiment 7 illustrates a schematic diagram of a MAC PDU according to one embodiment of the present invention, as shown in fig. 7.
In embodiment 7, one MAC PDU includes one MAC Header (Header) and at least one MAC sub-PDU (sub-PDU); the MAC header includes a source identity, a destination identity, and other bits.
As an embodiment, the MAC PDU is transmitted on a SL-SCH (SideLink Shared CHannel, secondary link shared channel).
As an embodiment, the number of bits comprised by the MAC header is fixed.
As an embodiment, the number of bits included in the MAC header is 32.
As one embodiment, the MAC header is a SL-SCH MAC subheader (subheader).
As one embodiment, the MAC header is a SL-SCH subheader (sub-header).
As an embodiment, the other bits include 5 fields, V, R, R, R, R, and the number of bits included is 4, 1, respectively.
As an embodiment, the source identity and the destination identity comprise 16 bits and 8 bits, respectively.
As an embodiment, the source identity in the MAC header and the destination identity in the MAC header are an SRC domain and a DST domain, respectively.
As an embodiment, each MAC sub-PDU includes one MAC sub-header and one MAC SDU, and the MAC sub-header in each MAC sub-PDU includes an LCID field (Logical Channel IDentifier, logical channel identity) indicating a channel identity of a logical channel corresponding to the respective MAC SDU.
As an embodiment, the LCID field comprises 5 bits.
As an embodiment, the LCID field comprises 6 bits.
As an embodiment, each MAC PDU is also allowed to include padding bits (padding).
As an embodiment, one MAC sub-PDU includes RLC PDU.
As an embodiment, one MAC sub-PDU includes a MAC CE.
As an embodiment, the MAC PDU of fig. 6 is the first MAC PDU of the present application.
As a sub-embodiment of the above embodiment, the first MAC PDU includes at least a first MAC sub-PDU.
As an embodiment, the MAC PDU of fig. 6 is the second MAC PDU of the present application.
As a sub-embodiment of the above embodiment, the second MAC PDU includes at least a second MAC sub-PDU.
As an embodiment, the MAC PDU of fig. 6 is the third MAC PDU of embodiment 7 of the present application.
As a sub-embodiment of the above embodiment, the third MAC PDU includes at least a third MAC sub-PDU.
Example 8
Embodiment 8 illustrates a schematic diagram of node a in communication with node C according to one embodiment of the application, as shown in fig. 8.
In embodiment 8, node a corresponds to a second node of the present application; node C corresponds to a third node of the present application; the node B corresponds to the first node of the present application.
As an embodiment, the interface between the node a and the node B is a PC5 interface.
As an embodiment, the interface between the node a and the node C is a PC5 interface.
As an embodiment, the interface between the node B and the node C is a PC5 interface.
As an embodiment, the first MAC PDU includes a first MAC sub-PDU, and the first MAC sub-PDU includes a first data packet.
As an embodiment, the second MAC PDU includes a second MAC sub-PDU, and the second MAC sub-PDU includes the first data packet.
As an embodiment, the third MAC PDU includes a third MAC sub-PDU, and the third MAC sub-PDU includes the first data packet.
As an embodiment, the first MAC PDU and the second MAC PDU each carry at least part of bits of the same PDCP SDU.
As an embodiment, the first MAC PDU and the second MAC PDU and the third MAC PDU each carry at least part of bits of the same PDCP SDU.
As an embodiment, the first MAC PDU is used to generate the second MAC PDU.
As an embodiment, at least part of bits in the first data packet carried by the first MAC PDU are carried by the second MAC PDU.
As an embodiment, the source identity carried by the first MAC PDU is different from the source identity carried by the third MAC PDU.
As an embodiment, the destination identity carried by the first MAC PDU is different from the source identity carried by the second MAC PDU.
As an embodiment, the destination identity carried by the second MAC PDU is different from the destination identity carried by the third MAC PDU.
As an embodiment, the source address of different MAC PDUs carrying the same PDCP SDU sent by the node a is different.
As an embodiment, the destination address of different MAC PDUs received by the node C carrying the same PDCP SDU is different.
As an embodiment, the logical channel identities of different MAC PDUs carrying the same PDCP SDU sent by the node a are different.
As an embodiment, the logical channel identities of different MAC PDUs carrying the same PDCP SDU sent by the node a are the same.
As an embodiment, the logical channel identities of different MAC PDUs received by the node C carrying the same PDCP SDU are different.
As an embodiment, the logical channel identities of different MAC PDUs received by the node C carrying the same PDCP SDU are the same.
As an embodiment, the source identity (SRC) of the third MAC PDU comprises at least part of the bits of the fourth identity.
As an embodiment, the source identity (DST) of the third MAC PDU comprises at least part of the bits of the fifth identity.
As an embodiment, the fourth identity is different from the first, second and third identities.
As an embodiment, the fifth identity is different from the first, second and third identities.
As an embodiment, the fourth identity is different from the fifth identity.
As an embodiment, the fourth identity is used to determine the node a.
As an embodiment, the first identity is used to determine the node a.
As an embodiment, the fifth identity is used to determine the node C.
As an embodiment, the third identity is used to determine the node C.
As an embodiment, the first MAC PDU carries the second identity.
As an embodiment, the destination identity (DST) of the first MAC PDU is a sixth identity, which is different from the second identity, which determines the node a.
As one embodiment, the benefits of the method include that when the identity between different nodes is updated, the communication between other nodes is not affected, and the communication between other nodes is not affected by security or privacy.
As an embodiment, the benefits of the above method include that node B, which is a relay node, and the destination node, node C, do not need to maintain a higher-level link, including a secure link.
Example 9
Embodiment 9 illustrates a schematic diagram of a first set of parameters generating a second identity according to an embodiment of the application, as shown in fig. 9.
As an embodiment, the first node generates the second identity from the first set of parameters.
As an embodiment, the first set of identities is a subset of the first set of parameters.
As an embodiment, the first signaling indicates the first set of parameters.
As an embodiment, at least one parameter of the first set of parameters is locally generated by the first node.
As an embodiment, at least one parameter of the first set of parameters is present without signalling.
As an embodiment, at least one parameter of the first set of parameters is fixed.
As an embodiment, the first signaling indicates a first generation parameter, and the first set of parameters includes the first generation parameter.
As an embodiment, the first generation parameter is a random number seed.
As an embodiment, the first generation parameter is a bit range of an identity.
As an embodiment, the first generation parameter is an identification of an algorithm used to generate the second identity.
As an embodiment, for a given said first set of parameters, said second identity is determined.
As an embodiment, the second identity is generated by a first function taking the first set of parameters as input.
As an embodiment, the first function is fixed.
As an embodiment, the first function is signaling-free.
As an embodiment, the first function is configurable.
As an embodiment, the first function is configured by the first signaling.
As an embodiment, the first set of parameters comprises the first set of identities.
As an embodiment, the first set of identities comprises a first source identity and a third destination identity.
As an embodiment, the first source identity determines a sender of the first signaling and the third destination identity determines a receiver of the second MAC PDU.
As an embodiment, the first source identity is the first identity.
As an embodiment, the third destination identity is the third identity.
As an embodiment, the first MAC PDU carries the first source identity.
As an embodiment, the second MAC PDU carries the third destination identity.
As an embodiment, the second identity is a combination of the first source identity and the third destination identity.
As an embodiment, the V1 most significant bits of the second identity are from the V1 most significant bits of the first source identity, and the V2 least significant bits of the second identity are from the V2 least significant bits of the third destination identity, wherein V1 and V2 are positive integers.
As an embodiment, the V1 most significant bits of the second identity are from the V1 least significant bits of the first source identity, and the V2 least significant bits of the second identity are from the V2 most significant bits of the third destination identity, wherein V1 and V2 are positive integers.
As an embodiment, the V1 most significant bits of the second identity are from the V1 most significant bits of the third destination identity, and the V2 least significant bits of the second identity are from the V2 least significant bits of the first source identity, wherein V1 and V2 are positive integers.
As an embodiment, the V1 most significant bits of the second identity are from the V1 least significant bits of the third destination identity, and the V2 least significant bits of the second identity are from the V2 most significant bits of the first source identity, wherein V1 and V2 are positive integers.
As an embodiment, the second identity is a combination of Z1 most significant bits of the first source identity and Z-Z1 least significant bits of the third destination identity, wherein Z is the number of bits comprised by the second identity, Z1 is a positive integer and Z1 is less than Z.
As one example, Z is equal to 24 and Z1 is equal to 8.
As one example, Z is equal to 24 and Z1 is equal to 16.
As an embodiment, the second identity is a combination of Z2 least significant bits of the first source identity and Z-Z2 most significant bits of the third destination identity, wherein Z is the number of bits comprised by the second identity, Z2 is a positive integer and Z2 is less than Z.
As one example, Z is equal to 24 and Z2 is equal to 8.
As one example, Z is equal to 24 and Z2 is equal to 16.
As an embodiment, at least E bits in the second identity are obtained by modulo-2 addition of E bits of the first source identity and E bits of the third destination identity, where E is a positive integer greater than 0.
As a sub-embodiment of this embodiment, E is equal to 24.
As a sub-embodiment of this embodiment, E is equal to 8.
As a sub-embodiment of this embodiment, E is equal to 16.
As a sub-embodiment of this embodiment, the E-th bit of the E-bits in the second identity is modulo-2 added by the E-th bit of the E-bits of the first source identity and the E-th bit of the E-bits of the third destination identity.
As a sub-embodiment of the above embodiment, the E-th bit is any one of the E bits.
As a sub-embodiment of the above embodiment, the E-th bit is an E-th MSB bit of the E-th bits.
As an embodiment, at least E bits in the second identity are obtained by modulo-2 addition of E bits of the first source identity and E bits and E random bits of the third destination identity, where E is a positive integer greater than 0.
As a sub-embodiment of this embodiment, E is equal to 24.
As a sub-embodiment of this embodiment, E is equal to 8.
As a sub-embodiment of this embodiment, E is equal to 16.
As a sub-embodiment of this embodiment, the E random bits are determined by the first generation parameter.
As a sub-embodiment of this embodiment, the E-th bit of the E-bits in the second identity is modulo-2 added by the E-th bit of the E-bits of the first source identity and the E-th bit of the E-bits of the third destination identity.
As a sub-embodiment of the above embodiment, the E-th bit is any one of the E bits.
As a sub-embodiment of the above embodiment, the E-th bit is an E-th MSB bit of the E-th bits.
As an embodiment, the second identity is obtained by performing modulo-2 addition after the first source identity is subjected to a first cyclic shift by C1 bits and the third destination identity is subjected to a second cyclic shift by C2 bits.
As a sub-embodiment of this embodiment, C1 is an integer of 0 or more.
As a sub-embodiment of this embodiment, C2 is an integer of 0 or more.
As a sub-embodiment of this embodiment, at least one of C1 and C2 is greater than 0.
As a sub-embodiment of this embodiment, the first cyclic shift is either a left cyclic shift or a right cyclic shift.
As a sub-embodiment of this embodiment, the second cyclic shift is either a left cyclic shift or a right cyclic shift.
As an embodiment, the second identity is obtained by interleaving the I1 bits of the first source identity and the I2 bits of the third destination identity, where I1 and I2 are positive integers greater than 0 and i1+i2 is equal to the length of the second identity.
As a sub-embodiment of this embodiment, i1=i2, the nth 1 bit in the second identity is from the first source identity, and the (n 1+ 1) th bit is from the third destination identity; the nth 2 bits in the second identity are from the third destination identity, and the nth 2+1th bits are from the first source identity; where n1 and n2 are both positive integers greater than 0.
As a sub-embodiment of this embodiment, i1=a1×i2, the nth 1 to nth 1+a1-1 bits in the second identity are from the first source identity, and the nth 1+a1 bit is from the third destination identity; the nth 2 bits in the second identity are from the third destination identity, and the nth 2+1 to nth 2+a1 bits are from the first source identity; wherein n1 and n2 are both positive integers greater than 0, wherein A1 is a positive integer.
As a sub-embodiment of this embodiment, i2=a2×i1, where the nth 1 bit in the second identity is from the first source identity, and the nth 1+1 to n1+a2 bits are from the third destination identity; the nth 2 and n2+a2-1 bits in the second identity are from the third destination identity, and the nth 2+a2 bits are from the first source identity; wherein n1 and n2 are both positive integers greater than 0, and A2 is a positive integer.
As a sub-embodiment of this embodiment, the values of I1 and I2 are related to the first time information.
As a sub-embodiment of this embodiment, the proportional relation of I1 and I2 is related to the first time information.
As a sub-embodiment of this embodiment, the value of I1 is a modulus of DFN and T1 determined by the first time information, where T1 is a positive integer.
As a sub-embodiment of this embodiment, T1 is equal to 8.
As a sub-embodiment of this embodiment, T1 is equal to 12.
As a sub-embodiment of this embodiment, T1 is equal to 16.
As a sub-embodiment of this embodiment, T1 is equal to 24.
As a sub-embodiment of this embodiment, the ratio of I1 to I2 is a modulus of DFN to T2 determined by the first time information, where T2 is a positive integer.
As a sub-embodiment of this embodiment, the ratio of I2 to I1 is a modulus of DFN to T2 determined by the first time information, where T2 is a positive integer.
As a sub-embodiment of this embodiment, T2 is equal to 1.
As a sub-embodiment of this embodiment, T2 is equal to 2.
As a sub-embodiment of this embodiment, T2 is equal to 3.
As a sub-embodiment of this embodiment, T2 is equal to 4.
As a sub-embodiment of this embodiment, T2 is equal to 6.
As an embodiment, the first time information determines a first bit sequence, the length of which is equal to the length of the second identity.
As an embodiment, the first time information comprises a DFN, and the first bit sequence comprises at least part of bits of the DFN.
As a sub-embodiment of this embodiment, KK1 least significant bits of the first bit sequence are derived from DFN, and the other bits of the first bit sequence have values of all 0 s or all 1 s, where KK1 is the length of DFN.
As an embodiment, the first time information comprises an SFN and the first bit sequence comprises at least part of the bits of the SFN.
As a sub-embodiment of this embodiment, KK2 least significant bits of the first bit sequence are from the SFN and the other bits of the first bit sequence have values of all 0 or all 1, where KK2 is the length of the SFN.
As an embodiment, the value of the bit in the first bit sequence is used to determine whether the corresponding bit in the second identity is from the first source identity or the third destination identity.
As a sub-embodiment of this embodiment, the value of the bx bit in the first bit sequence is 0, and then the value of the bx bit in the second identity is from the first source identity; and if the value of the bx bit in the first bit sequence is 1, the value of the bx bit in the second identity is from the third destination identity, wherein the bx bit is any bit in the first bit sequence.
As a sub-embodiment of this embodiment, the value of the bx bit in the first bit sequence is 1, and then the value of the bx bit in the second identity is from the first source identity; and if the value of the bx bit in the first bit sequence is 0, the value of the bx bit in the second identity is from the third destination identity, wherein the bx bit is any bit in the first bit sequence.
As an embodiment, the first parameter is input as an input parameter to a register of RE bits, and the second identity is determined by the output of the register of RE bits, wherein RE is a positive integer.
As a sub-embodiment of this embodiment, the first parameter comprises the first generation parameter.
As a sub-embodiment of this embodiment, the first parameter comprises the first time information.
As a sub-embodiment of this embodiment, the first parameter includes a DFN determined by the first time information.
As a sub-embodiment of this embodiment, the first parameter comprises an SFN determined by the first time information.
As a sub-embodiment of this embodiment, the first parameter comprises at least part of the bits in the first source identity.
As a sub-embodiment of this embodiment, the first parameter comprises at least part of the bits in the third destination identity.
As a sub-embodiment of this embodiment, RE is equal to the length of the second identity.
As a sub-embodiment of this embodiment, RE equals 23.
As a sub-embodiment of this embodiment, RE equals 24.
As a sub-embodiment of this embodiment, RE equals 25.
As a sub-embodiment of this embodiment, at least part of the bits of the second identity are equal to the value output by the RE bit register.
As a sub-embodiment of this embodiment, all bits of the second identity are the value output by the RE bit register.
As an embodiment, the first generation parameter is a cyclic shift value.
As a sub-embodiment of this embodiment, the cyclic shift value is 0.
As a sub-embodiment of this embodiment, the cyclic shift value is an integer.
As an embodiment, the second identity, L2, is determined by the following function:
L2=L1 XOR C(L3,O1)
wherein L2 is the second identity, L1 is the first source identity, L3 is the third destination identity, C () is a cyclic shift function, O1 is a cyclic shift value determined by the first generation parameter, and XOR is an exclusive-or calculation.
As one embodiment, C () is a left cyclic shift function or a right cyclic function.
As an embodiment, for a bit sequence [ b1 b2 b3 b4 b5] including 5 bits, when the displacement value is 2, the result of the cyclic displacement function C () processing is:
C([b1 b2 b3 b4 b5],2)=>[b3 b4 b5 b1 b2]
as an embodiment, the first set of identities comprises only one of the first source identity and the third destination identity.
As an embodiment, the second identity, L2, is determined by the following relationship:
L2=C(Lx,O2)
wherein L2 is the second identity, C () is a cyclic shift function, and O2 is a cyclic shift value determined by the first generation parameter.
As a sub-embodiment of this embodiment Lx is the first source identity.
As a sub-embodiment of this embodiment Lx is said third destination identity.
As an embodiment, the second identity, L2, is determined by the following relationship:
L2=D(Lx)
wherein D is a second function.
As a sub-embodiment of this embodiment, D is a decryption function.
As a sub-embodiment of this embodiment, the second function is configurable.
As a sub-embodiment of this embodiment, the second function is fixed.
As a sub-embodiment of this embodiment Lx is the first source identity.
As a sub-embodiment of this embodiment Lx is said third destination identity.
As a sub-embodiment of this embodiment Lx is the fourth identity, which is the identity used before the first signaling transmission.
As a sub-embodiment of this embodiment, lx is the fourth identity, and the first signaling indicates that the fourth identity is updated to the second identity.
As a sub-embodiment of this embodiment, the first signaling implicitly indicates the first set of identities.
As a sub-embodiment of this embodiment, the first signaling indicates that the second identity is valid.
As a sub-embodiment of this embodiment, the first node detects a MAC PDU carrying the second identity.
As a sub-embodiment of this embodiment, the first node detects MAC PDUs carrying the fourth identity and the second identity simultaneously.
As a sub-embodiment of this embodiment, D is determined by the first node negotiating with the sender of the first signaling.
As a sub-embodiment of this embodiment, D is determined by the sender of said first signaling.
As an embodiment, the above method has the advantage that the determination of the second identity from the pre-update identity ensures a fast update of the identity and facilitates verification.
As an embodiment, the second identity, L2, is determined by the following relationship:
L2=F1(Ly,R1)
wherein F1 is a fixed function and R1 is determined by the first generation parameter.
As a sub-embodiment of this embodiment, F1 is an exclusive or function.
As a sub-embodiment of this embodiment, R1 is a random bit sequence.
As a sub-embodiment of this embodiment Ly is the first source identity.
As a sub-embodiment of this embodiment Ly is said third destination identity.
As a sub-embodiment of this embodiment Ly is the fourth identity, which is the identity used before the first signalling.
As a sub-embodiment of this embodiment, ly is the fourth identity, and the first signaling indicates that the fourth identity is updated to the second identity.
As an embodiment, the second identity, L2, is determined by the following relationship:
L2=F2(Lz1,Lz2,R2)
wherein F2 is a fixed function, R2 being determined by said first generation parameter.
As a sub-embodiment of this embodiment, F2 is a truncating function that truncates the first R2 bits of Lz1 and concatenates the last 24-R2 bits of Lz2, where R2 is a positive integer greater than 0 and less than 24.
As a sub-embodiment of this embodiment, F2 is an exclusive or function.
As a sub-embodiment of this embodiment, R2 is a random bit sequence.
As a sub-embodiment of this embodiment, the first generation parameter indicates R2.
As a sub-embodiment of this embodiment, the first generation parameter indicates a seed for generating R2.
As a sub-embodiment of this embodiment, lz1 is the first source identity.
As a sub-embodiment of this embodiment Lz2 is said third destination identity.
As a sub-embodiment of this embodiment, one of Lz1 and Lz2 is the fourth identity, which is the identity used before the first signaling is sent.
As a sub-embodiment of this embodiment, one of Lz1 and Lz2 is the fourth identity, and the first signaling indicates that the fourth identity is updated to the second identity.
As a sub-embodiment of this embodiment, F2 is an interleaving function for interleaving Lz1 and Lz2 under the control of parameter R2.
As a sub-embodiment of this embodiment, R2 is the depth of interleaving.
As a sub-embodiment of this embodiment, R2 is the type identification of the interlace.
As an embodiment, the first set of parameters comprises first time information.
As an embodiment, the first time information includes SFN (System Frame Number).
As an embodiment, the first time information includes DFN (Direct Frame Number).
As an embodiment, the first time information includes DFN of a transmission time of the first signaling.
As an embodiment, the first time information includes an SFN of a transmission time of the first signaling.
As an embodiment, the first time information includes DFN of a reception time of the first signaling.
As an embodiment, the first time information includes an SFN of a reception time of the first signaling.
As one embodiment, the first time information includes DFN of a transmission time of the second MAC PDU.
As an embodiment, the first time information includes an SFN of a transmission time of the second MAC PDU.
As one embodiment, the first time information includes DFN of a reception time of the second MAC PDU.
As an embodiment, the first time information includes an SFN of a reception time of the second MAC PDU.
As an embodiment, the second identity, L2, is determined by the following relationship:
L2=F3(Lz3,Lz4,t1)
wherein F3 is a fixed function, t1 is determined by the first generation parameter.
As a sub-embodiment of this embodiment, F3 is a truncating function that truncates the first t1 bits of Lz3 and concatenates 24-t1 bits after Lz4, where t1 is the modulus of DFN and 24.
As a sub-embodiment of this embodiment, F3 is an exclusive or function.
As a sub-embodiment of this embodiment, t1 is a random bit sequence.
As a sub-embodiment of this embodiment, lz3 is the first source identity.
As a sub-embodiment of this embodiment Lz4 is said third destination identity.
As a sub-embodiment of this embodiment, one of Lz3 and Lz4 is the fourth identity, which is the identity used before the first signaling is sent.
As a sub-embodiment of this embodiment, one of Lz3 and Lz4 is the fourth identity, and the first signaling indicates that the fourth identity is updated to the second identity.
As a sub-embodiment of this embodiment, F3 is an interleaving function for interleaving Lz3 and Lz4 under the control of parameter t 1.
As a sub-embodiment of this embodiment, t1 is the depth of interleaving.
As a sub-embodiment of this embodiment, t1 is the type identification of the interlace.
As an embodiment, the above method has the advantage that the generation of the second identity is time dependent, more secure; further, the second identity carried by the MAC PDU may be time-varying and more secure.
As an embodiment, the first signaling indicates a second identity and a fifth identity.
As an embodiment, the first node monitors the physical channel comprising the second identity and the fifth identity simultaneously.
As an embodiment, the first node monitors MAC PDUs comprising the second identity and the fifth identity simultaneously.
As an embodiment, the first node monitors both the MAC PDU including the second identity and the fifth identity and the SCI.
As an embodiment, when a MAC PDU carrying the second identity is detected, the fifth identity immediately fails and the second identity immediately takes effect.
As an embodiment, when the second identity is detected, the fifth identity is immediately deactivated and the second identity is immediately validated.
As an embodiment, the first set of parameters comprises the first link identity.
As an embodiment, the first set of parameters comprises the second link identity.
As an embodiment, the second identity comprises at least part of the bits of the first link identity.
As an embodiment, the second identity comprises at least part of the bits of the second link identity.
Example 10
Embodiment 10 illustrates a schematic diagram of a first signaling indicating a first link identity according to one embodiment of the present application, as shown in fig. 10.
As an embodiment, the first signaling explicitly indicates the first link identity.
As an embodiment, the first link identity comprises a link layer identity.
As an embodiment, the first link identity comprises a physical layer identity.
As an embodiment, the first link identity comprises an application layer identity.
As an embodiment, the first link identity comprises a PC5 link identity.
As an embodiment, the first link identity is a service related identity.
As an embodiment, the first link identity is an identity related to a transceiving node.
As an embodiment, the first link identity is related to the transceiving node and the service.
As an embodiment, the first link identity comprises an RB identity.
As an embodiment, the first link identity comprises a flow identity.
As an embodiment, the first link identity comprises a traffic identity.
As an embodiment, the first link identity comprises a session identity.
As an embodiment, the first link identity comprises a logical channel identity.
As an embodiment, the first link identity comprises a link identity.
As an embodiment, the first link identity comprises a unicast link identity.
As an embodiment, the first link identity comprises SLRB-PC5-ConfigIndex.
As an embodiment, the first link identity determines the first link.
As an embodiment, the first link identity uniquely determines the first link.
As an embodiment, the first link identity is an identity of the first link.
As an embodiment, the first link includes an RB.
As an embodiment, the first link comprises flow.
As an embodiment, the first link comprises traffic.
As an embodiment, the first link comprises a session.
As an embodiment, the first link comprises a logical channel.
As an embodiment, the first link comprises a unicast link (unicasting link).
As one embodiment, the first link comprises SLRB-PC5-ConfigIndex.
As an embodiment, the first link comprises a physical channel.
As an embodiment, the first link comprises a transmission channel.
As an embodiment, the first link comprises a logical channel.
As an embodiment, the first MAC PDU belongs to the first link.
As an embodiment, the first MAC PDU belongs to the first link only.
As an embodiment, the first identity corresponds to the first link.
As an embodiment, the first identity is bound to the first link.
As an embodiment, the first identity belongs to the first link.
As an embodiment, the first MAC PDU belongs to the first link.
As an embodiment, the first MAC PDU occupies the first link.
As two embodiments, the first MAC PDU occupies only the first link.
As an embodiment, the first MAC PDU is for the first link.
As an embodiment, the first MAC PDU carries data of the traffic determined by the first link.
As an embodiment, the first MAC PDU uses the bearer determined by the first link.
As one embodiment, the first MAC PDU uses a unicast link determined by the first link.
As an embodiment, the first identity is an identity associated with the first link as the only source identity.
As one embodiment, the first identity is an identity associated with the first link that is unique as a source identity of a MAC PDU sent on the first link.
As an embodiment, the first signaling implicitly indicates the first link identity.
As one embodiment, the first signaling implicitly indicates the first link identity by using a transmission on the first link.
Example 11
Embodiment 11 illustrates a schematic diagram of a first signaling indicating a second link identity according to an embodiment of the present application, as shown in fig. 11.
As two embodiments, the first signaling explicitly indicates the second link identity.
As two embodiments, the second link identity comprises a link layer identity.
For two embodiments, the second link identity comprises a physical layer identity.
As two embodiments, the second link identity comprises an application layer identity.
As two embodiments, the second link identity comprises a PC5 link identity.
As two embodiments, the second link identity is two identities related to traffic.
As two embodiments, the second link identity is an identity related to the transceiving node.
As two embodiments, the second link identity is related to the transceiving node and the service related identity.
As two embodiments, the second link identity comprises an RB identity.
As two embodiments, the second link identity includes a flow identity.
As two embodiments, the second link identity comprises a traffic identity.
As two embodiments, the second link identity comprises a session identity.
As two embodiments, the second link identity comprises a logical channel identity.
As two embodiments, the second link identity comprises a link identity.
As two embodiments, the second link identity comprises a unicast link identity.
As two embodiments, the second link identity comprises SLRB-PC5-ConfigIndex.
As two embodiments, the second link identity determines the second link.
As two embodiments, the second link identity uniquely determines the second link.
As two embodiments, the second link identity is an identity of the second link.
As two embodiments, the second link includes an RB.
As two embodiments, the second link includes flow.
As two embodiments, the second link comprises traffic.
As two embodiments, the second link comprises a session.
As two embodiments, the second link comprises a logical channel.
As two embodiments, the second link includes a unicast link (unicasting link).
As two embodiments, the second link comprises SLRB-PC5-ConfigIndex.
As two embodiments, the second link comprises a physical channel.
As two embodiments, the second link comprises a transmission channel.
As two embodiments, the second link comprises a logical channel.
As two embodiments, the second MAC PDU belongs to the second link.
As two embodiments, the second MAC PDU belongs to the second link only.
As two embodiments, the second identity corresponds to the second link.
As two embodiments, the second identity is bound to the second link.
As two embodiments, the second identity belongs to the second link.
As two embodiments, the second MAC PDU belongs to the second link.
As two embodiments, the second MAC PDU occupies the second link.
As two embodiments, the second MAC PDU is for the second link.
As two embodiments, the second MAC PDU carries data of the service determined by the second link.
As two embodiments, the second MAC PDU uses the bearer determined by the second link.
As two embodiments, the second MAC PDU uses the unicast link determined by the second link.
As two embodiments, the second MAC PDU occupies only the second link.
As two embodiments, the second identity is the only identity associated with the second link as the source identity.
As two embodiments, the second identity is the only identity associated with the second link as the source identity of the MAC PDU sent on the second link.
As an embodiment, the first signaling implicitly indicates the second link identity.
As one embodiment, the first signaling implicitly indicates the second link identity by using a transmission on the second link.
As an embodiment, the second link is different from the first link.
As an embodiment, the second link identity is different from the first link identity.
Example 12
Embodiment 12 illustrates a block diagram of a processing apparatus for use in a first node according to one embodiment of the application; as shown in fig. 12. In fig. 12, the processing means 1200 in the first node comprises a first receiver 1201 and a first transmitter 1202. In the case of the embodiment of the present application in which the sample is a sample,
a first receiver 1201 receiving first signaling, the first signaling being used to indicate a first set of identities, the first set of identities comprising at least one link layer identity; generating a second identity according to the first parameter set;
a first transmitter 1202 that transmits a second MAC PDU;
wherein the second MAC PDU includes at least a portion of the bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the first receiver 1201 receives a first MAC PDU;
wherein the first MAC PDU includes at least a portion of bits in a first identity, the first identity being one link layer identity in the first set of identities, the first MAC PDU and the second MAC PDU each including a first data packet.
As an embodiment, the second MAC PDU comprises at least part of the bits in a third identity, which is one link layer identity of the first set of identities that is different from the first identity.
As an embodiment, the first signaling indicates a second link identity, the second link identity being used to determine a second link, the second identity being associated with the second link, the second MAC PDU belonging to the second link.
As an embodiment, the first set of parameters comprises first time information.
As an embodiment, the first receiver 1201 receives first physical layer signaling, where the first physical layer signaling includes configuration information of a first channel, and a channel occupied by the first MAC PDU includes the first channel;
wherein the first physical layer signaling and the first MAC PDU collectively comprise the first identity.
As an embodiment, the first transmitter 1202 sends second physical layer signaling, where the second physical layer signaling includes configuration information of a second channel, and a channel occupied by the second MAC PDU includes the second channel;
wherein the second physical layer signaling and the second MAC PDU collectively comprise the second identity.
As an embodiment, the first transmitter 1202 sends third signaling, which is used to respond to the first signaling.
As an embodiment, the first signaling is used to indicate a first logical channel identity, the first MAC PDU comprising the first logical channel identity.
As an embodiment, the first signaling is used to indicate a second logical channel identity, the second MAC PDU comprising the second logical channel identity.
As an embodiment, the first node is a User Equipment (UE).
As an embodiment, the first node is a terminal supporting a large delay difference.
As an embodiment, the first node is a terminal supporting NTN.
As an embodiment, the first node is an aircraft.
As an embodiment, the first node is an in-vehicle terminal.
As an embodiment, the first node is a relay.
As an embodiment, the first node is a ship.
As an embodiment, the first node is an internet of things terminal.
As an embodiment, the first node is a terminal of an industrial internet of things.
As an embodiment, the first node is a device supporting low latency and high reliability transmissions.
As an example, the first receiver 1201 includes at least one of the antenna 452, the receiver 454, the receive processor 456, the multi-antenna receive processor 458, the controller/processor 459, the memory 460, or the data source 467 of example 4.
As an example, the first transmitter 1202 may include at least one of the antenna 452, the transmitter 454, the transmit processor 468, the multi-antenna transmit processor 457, the controller/processor 459, the memory 460, or the data source 467 of example 4.
Example 13
Embodiment 13 illustrates a block diagram of a processing arrangement for use in a second node according to one embodiment of the application; as shown in fig. 13. In fig. 13, the processing means 1300 in the second node comprises a second receiver 1302 and a second transmitter 1301. In the case of the embodiment of the present application in which the sample is a solid,
a second transmitter 1301 that transmits first signaling, the first signaling being used to indicate a first set of identities, the first set of identities including at least one link layer identity; the first set of parameters is used to generate a second identity;
wherein a second MAC PDU includes at least some bits in the second identity, and the first set of parameters includes the first set of identities.
As an embodiment, the second transmitter 1301 transmits a first MAC PDU;
wherein the first MAC PDU includes at least a portion of bits in a first identity, the first identity being one link layer identity in the first set of identities, the first MAC PDU and the second MAC PDU each including a first data packet.
As an embodiment, the second MAC PDU comprises at least part of the bits in a third identity, which is one link layer identity of the first set of identities that is different from the first identity.
As an embodiment, the first signaling indicates a first link identity, the first link identity being used to determine a first link, the second identity being associated with the first link, the first MAC PDU belonging to the first link.
As an embodiment, the first signaling indicates a second link identity, the second link identity being used to determine a second link, the second identity being associated with the second link, the second MAC PDU belonging to the second link.
As an embodiment, the first set of parameters comprises first time information.
As an embodiment, the second transmitter 1301 sends first physical layer signaling, where the first physical layer signaling includes configuration information of a first channel, and a channel occupied by the first MAC PDU includes the first channel;
wherein the first physical layer signaling and the first MAC PDU collectively comprise the first identity.
As an embodiment, the second receiver 1302 receives third signaling, which is used to respond to the first signaling.
As an embodiment, the first signaling is used to indicate a first logical channel identity, the first MAC PDU comprising the first logical channel identity.
As an embodiment, the first signaling is used to indicate a second logical channel identity, the second MAC PDU comprising the second logical channel identity.
As an embodiment, the second node is a User Equipment (UE).
As an embodiment, the second node is a terminal supporting a large delay difference.
As an embodiment, the second node is a terminal supporting NTN.
As an embodiment, the second node is an aircraft.
As an embodiment, the second node is an in-vehicle terminal.
As an embodiment, the second node is a relay.
As an embodiment, the second node is a ship.
As an embodiment, the second node is an internet of things terminal.
As an embodiment, the second node is a terminal of an industrial internet of things.
As an embodiment, the second node is a device supporting low latency and high reliability transmissions.
As an example, the second transmitter 1301 includes at least one of the antenna 420, the transmitter 418, the transmission processor 416, the multi-antenna transmission processor 471, the controller/processor 475, and the memory 476 in example 4.
As an example, the second receiver 1302 includes at least one of the antenna 420, the receiver 418, the receive processor 470, the multi-antenna receive processor 472, the controller/processor 475, and the memory 476 of example 4.
Example 14
Embodiment 14 illustrates a block diagram of a processing apparatus for use in a third node according to one embodiment of the application; as shown in fig. 14. In fig. 14, the processing means 1400 in the third node comprises a third receiver 1402. In the case of the embodiment of the present application in which the sample is a solid,
a third receiver 1402 that receives a second MAC PDU;
wherein the second MAC PDU includes at least a portion of the bits in a second identity, and the first set of parameters includes the first set of identities; the first signaling is used to indicate a first set of identities including at least one link layer identity therein; the first set of parameters is used to generate a second identity.
As an embodiment, a first MAC PDU is used to generate the second MAC PDU, the first MAC PDU comprising at least part of the bits in a first identity, the first identity being one link layer identity of the first set of identities, the first MAC PDU and the second MAC PDU each comprising a first data packet.
As an embodiment, the second MAC PDU comprises at least part of the bits in a third identity, which is one link layer identity of the first set of identities that is different from the first identity.
As an embodiment, the first signaling indicates a first link identity, the first link identity being used to determine a first link, the second identity being associated with the first link, the first MAC PDU belonging to the first link.
As an embodiment, the first signaling indicates a second link identity, the second link identity being used to determine a second link, the second identity being associated with the second link, the second MAC PDU belonging to the second link.
As an embodiment, the first set of parameters comprises first time information.
As an embodiment, the third receiver 1402 receives second physical layer signaling, where the second physical layer signaling includes configuration information of a second channel, and a channel occupied by the second MAC PDU includes the second channel;
wherein the second physical layer signaling and the second MAC PDU collectively comprise the second identity.
As an embodiment, the third receiver 1402 receives third signaling, which is used to respond to the first signaling.
As an embodiment, the first signaling is used to indicate a first logical channel identity, the first MAC PDU comprising the first logical channel identity.
As an embodiment, the first signaling is used to indicate a second logical channel identity, the second MAC PDU comprising the second logical channel identity.
As an embodiment, the second node is a User Equipment (UE).
As an embodiment, the second node is a terminal supporting a large delay difference.
As an embodiment, the second node is a terminal supporting NTN.
As an embodiment, the second node is an aircraft.
As an embodiment, the second node is an in-vehicle terminal.
As an embodiment, the second node is a relay.
As an embodiment, the second node is a ship.
As an embodiment, the second node is an internet of things terminal.
As an embodiment, the second node is a terminal of an industrial internet of things.
As an embodiment, the second node is a device supporting low latency and high reliability transmissions.
As an example, the third receiver 1402 may include at least one of the antenna 420, the receiver 418, the receive processor 470, the multi-antenna receive processor 472, the controller/processor 475, and the memory 476 of example 4.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described methods may be implemented by a program that instructs associated hardware, and the program may be stored on a computer readable storage medium, such as a read-only memory, a hard disk or an optical disk. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module unit in the above embodiment may be implemented in a hardware form or may be implemented in a software functional module form, and the present application is not limited to any specific combination of software and hardware. The user equipment, the terminal and the UE in the present application include, but are not limited to, unmanned aerial vehicles, communication modules on unmanned aerial vehicles, remote control airplanes, aircrafts, mini-planes, mobile phones, tablet computers, notebooks, vehicle-mounted communication devices, wireless sensors, network cards, internet of things terminals, RFID terminals, NB-IoT terminals, MTC (Machine Type Communication ) terminals, eMTC (enhanced MTC) terminals, data cards, network cards, vehicle-mounted communication devices, low-cost mobile phones, low-cost tablet computers, satellite communication devices, ship communication devices, NTN user devices and other wireless communication devices. The base station or system equipment in the present application includes, but is not limited to, wireless communication equipment such as macro cell base stations, micro cell base stations, home base stations, relay base stations, gNB (NR node B) NR node B, TRP (Transmitter Receiver Point, transmitting and receiving node), NTN base stations, satellite equipment, flight platform equipment, and the like.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (13)

1. A first node for wireless communication, comprising:
a first receiver that receives first signaling, the first signaling being used to indicate a first set of identities, the first set of identities including at least one link layer identity therein; generating a second identity according to the first parameter set; the second identity determining the first node; the first identity set comprises a first source identity and a third destination identity; the first signaling indicates a first generation parameter, the first set of parameters including the first generation parameter;
a first transmitter transmitting a second MAC PDU;
wherein the second MAC PDU includes a portion of bits in the second identity, and the first set of parameters includes the first set of identities; the second MAC PDU is transmitted in unicast; the first source identity determining a sender of the first signaling and the third destination identity determining a receiver of the second MAC PDU; the first source identity is used to generate the second identity.
2. The first node of claim 1, comprising:
the first receiver receives a first MAC PDU;
wherein the first MAC PDU includes at least a portion of bits in a first identity, the first identity being a link layer identity in the first set of identities, the first MAC PDU and the second MAC PDU each including a first data packet; the first identity determining a second node; the second identity determining the first node; the second node is the sender of the first signaling.
3. The first node of claim 2, wherein the second MAC PDU comprises at least a portion of bits in a third identity, the third identity being one of the first set of identities that is different from the first identity.
4. A first node according to any one of the claims 1 to 3, characterized in that,
the first signaling indicates a second link identity, the second link identity being used to determine a second link with which the second identity is associated, the second MAC PDU belonging to the second link; the first signaling indicates a first link identity, the first link identity being used to determine a first link, the second identity being associated with the first link, the first MAC PDU belonging to the first link.
5. The first node according to any of claims 1-4, wherein the first set of parameters comprises first time information; the first time information is an SFN or a DFN; the second identity is obtained by interleaving I1 bits of the first source identity and I2 bits of the third destination identity, wherein I1 and I2 are positive integers greater than 0, and I1+I2 is equal to the length of the second identity; the values or proportional relationships of I1 and I2 are related to the first time information.
6. The first node according to any of claims 1 to 5, comprising:
the first transmitter transmits second physical layer signaling, wherein the second physical layer signaling comprises configuration information of a second channel, and a channel occupied by the second MAC PDU comprises the second channel;
wherein the second physical layer signaling includes a portion of bits of the second identity, and the second MAC PDU includes other bits of the second identity.
7. A first node according to claim 2 or 3, characterized in that,
the first signaling indicates a first link identity, the first link identity being used to determine a first link, the second identity being associated with the first link, the first MAC PDU belonging to the first link.
8. The first node according to any of the claims 1 to 7, characterized in that,
the first signaling indicates a first generation parameter, the first set of parameters including the first generation parameter.
9. The first node according to any of the claims 1 to 8, characterized in that,
the second identity, L2, is determined by the following relationship:
L2=F1(Ly,R1)
wherein F1 is a fixed function, R1 is determined by a first generation parameter, and R1 is a random bit sequence; ly is the first source identity.
10. The first node according to any of the claims 1 to 8, characterized in that,
the first set of identities includes a first source identity and a third destination identity, and the second identity, L2, is determined by the following function:
L2=L1 XOR C(L3,O1)
wherein L2 is the second identity, L1 is the first source identity, L3 is the third destination identity, C () is a cyclic shift function, O1 is a cyclic shift value determined by the first generation parameter, and XOR is an exclusive-or calculation; c () is a left cyclic shift function or a right cyclic function.
11. The first node according to any of the claims 1 to 8, characterized in that,
the second identity, L2, is determined by the following relationship:
L2=D(Lx)
Wherein D is a second function and D is a decryption function; lx is the first source identity.
12. The first node according to any of the claims 1 to 8, characterized in that,
the second identity, L2, is determined by the following relationship:
L3=F2(Lz1,Lz2,R2)
wherein F2 is a fixed function, R2 being determined by a first generation parameter; f2 is an interleaving function for interleaving Lz1 and Lz2 under the control of parameter R2; r2 is the interleaving depth; lz1 is the first source identity; lz2 is the third destination identity.
13. The first node according to any of the claims 1 to 8, characterized in that,
the second identity, L2, is determined by the following relationship:
L2=F3(Lz3,Lz4,t1)
wherein F3 is a fixed function, t1 is determined by the first generation parameter; f3 is a clipping function for clipping the first t1 bits of Lz3 and concatenating 24-t1 bits after Lz4, where t1 is the modulus of DFN and 24; lz3 is the first source identity; lz4 is said third destination identity.
CN202010508580.0A 2020-05-30 2020-06-06 Method and apparatus for wireless communication Active CN113766501B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN202311379585.8A CN117376913A (en) 2020-06-06 2020-06-06 Method and apparatus for wireless communication
CN202010508580.0A CN113766501B (en) 2020-06-06 2020-06-06 Method and apparatus for wireless communication
PCT/CN2021/096662 WO2021244412A1 (en) 2020-05-30 2021-05-28 Method and device used for wireless communication
US17/978,222 US20230050029A1 (en) 2020-05-30 2022-11-01 Method and device used for wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010508580.0A CN113766501B (en) 2020-06-06 2020-06-06 Method and apparatus for wireless communication

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202311379585.8A Division CN117376913A (en) 2020-06-06 2020-06-06 Method and apparatus for wireless communication

Publications (2)

Publication Number Publication Date
CN113766501A CN113766501A (en) 2021-12-07
CN113766501B true CN113766501B (en) 2023-11-10

Family

ID=78785333

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010508580.0A Active CN113766501B (en) 2020-05-30 2020-06-06 Method and apparatus for wireless communication
CN202311379585.8A Pending CN117376913A (en) 2020-06-06 2020-06-06 Method and apparatus for wireless communication

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202311379585.8A Pending CN117376913A (en) 2020-06-06 2020-06-06 Method and apparatus for wireless communication

Country Status (1)

Country Link
CN (2) CN113766501B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117858160A (en) * 2022-09-30 2024-04-09 上海朗帛通信技术有限公司 Method and apparatus in a communication node for wireless communication

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016122533A1 (en) * 2015-01-29 2016-08-04 Nokia Soluton And Networks Oy Handling of proximity services device to device related identities at radio access network level

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016122533A1 (en) * 2015-01-29 2016-08-04 Nokia Soluton And Networks Oy Handling of proximity services device to device related identities at radio access network level

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"23280_cr0295r1_(rel-17)_s6-211728 was s6-211697rev3 table 10.9.2.3".《3GPP tsg_sa\wg6_missioncritical》.2021, *
R2-2001507 "Discussion on PDCP status report";LG Electronics Inc.;《3GPP tsg_ran\wg2_rl2》;20200214;全文 *
R3-142641.《3GPP tsg_ran\WG3_Iu》.2014, *
R5-201642 "Corrections to NR5G PDCP TC 7.1.3.4.1 and 7.1.3.4.2";Qualcomm CDMA Technologies;《3GPP tsg_ran\wg5_test_ex-t1》;20200509;全文 *

Also Published As

Publication number Publication date
CN113766501A (en) 2021-12-07
CN117376913A (en) 2024-01-09

Similar Documents

Publication Publication Date Title
CN115225239B (en) Method and apparatus for wireless communication
CN113556687B (en) Method and equipment used for wireless communication
CN112713972B (en) Method and apparatus in a node used for wireless communication
CN113766501B (en) Method and apparatus for wireless communication
CN114979966B (en) Method and apparatus in a communication node for wireless communication
CN113727343B (en) Method and apparatus for wireless communication
CN114666416B (en) Method and apparatus for wireless communication
CN114095873B (en) Method and apparatus in a node for wireless communication
CN112399581B (en) Method and apparatus in a node used for wireless communication
CN115278929A (en) Method and equipment used for wireless communication
CN113853030A (en) Method and equipment used for wireless communication
CN114205774A (en) Method and device for relay transmission
CN116017442B (en) Method and apparatus for wireless communication
CN114158040B (en) Method and apparatus for wireless communication
CN114640723B (en) Method and apparatus for wireless communication
CN113825115B (en) Method and device for relay transmission
CN114339614B (en) Method and apparatus for wireless communication
CN112398593B (en) Method and apparatus in a node for wireless communication
CN115134056B (en) Method and apparatus for wireless communication
CN115396980B (en) Method and apparatus for wireless communication
US20230345293A1 (en) Method and device for wireless communication
CN117915398A (en) Method and apparatus in a communication node for wireless communication
CN117835226A (en) Method and apparatus for wireless communication
CN117835319A (en) Method and apparatus in a communication node for wireless communication
CN117858160A (en) Method and apparatus in a communication node for wireless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant