WO2018171738A1 - 切换的方法和设备 - Google Patents

切换的方法和设备 Download PDF

Info

Publication number
WO2018171738A1
WO2018171738A1 PCT/CN2018/080279 CN2018080279W WO2018171738A1 WO 2018171738 A1 WO2018171738 A1 WO 2018171738A1 CN 2018080279 W CN2018080279 W CN 2018080279W WO 2018171738 A1 WO2018171738 A1 WO 2018171738A1
Authority
WO
WIPO (PCT)
Prior art keywords
network device
encryption
data
function
decryption function
Prior art date
Application number
PCT/CN2018/080279
Other languages
English (en)
French (fr)
Inventor
王宏
权威
张戬
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP18772456.2A priority Critical patent/EP3592037B1/en
Priority to PL18772456T priority patent/PL3592037T3/pl
Priority to EP21171708.7A priority patent/EP3923632A1/en
Publication of WO2018171738A1 publication Critical patent/WO2018171738A1/zh
Priority to US16/579,550 priority patent/US10986549B2/en
Priority to US17/201,776 priority patent/US11751112B2/en
Priority to US18/216,827 priority patent/US20230422121A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0058Transmission of hand-off measurement information, e.g. measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0069Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink
    • H04W36/00695Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink using split of the control plane or user plane
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/22Performing reselection for specific purposes for handling the traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Definitions

  • the present application relates to the field of communications and, more particularly, to methods and apparatus for handover.
  • Handover refers to the process of switching a link carrying communication data from one cell (or network device) to another cell (or network device) in order to ensure uninterrupted communication during the process of mobile communication.
  • the embodiment of the present application provides a method and a device for switching, which can reduce or avoid interruption of a service when switching.
  • a method of switching comprising:
  • the first network device sends a first configuration message to the terminal device, where the first configuration message is used to instruct the terminal device to configure a second encryption/decryption function associated with the second network device, and share the first data packet number/sort function.
  • the terminal device is configured with a first encryption/decryption function associated with the first network device and the first data packet number/sort function;
  • the first network device receives a first configuration complete message sent by the terminal device.
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the first encryption/decryption function configured by the terminal device in the embodiment of the present application can perform encryption processing on the data, and can also perform decryption processing on the data.
  • the “/” indicates that the first encryption/decryption function can only selectively select the corresponding processing for the same data.
  • the first encryption/decryption function can perform encryption processing on the uplink data, and the first encryption/decryption function can be performed.
  • the downlink data is decrypted.
  • the first packet number/sort function can process the data and sort the data; wherein "/" indicates that the first packet number/sort function can only select one of the same data.
  • the first data packet numbering/sorting function may perform number processing on the uplink data, and the first data packet numbering/sorting function may perform sorting processing on the downlink data.
  • other functions in this document are similar to this, and to avoid repetition, it will not be repeated here.
  • the method before the first network device sends the first configuration message to the terminal device, the method further includes:
  • the first network device sends a first request message to the second network device, where the first request message is used to request to switch the terminal device to the second network device or the first request message is used to request to add the terminal device
  • the second network device is an auxiliary service device, where the first request message includes at least one of the following:
  • the first network device allocates a first security key associated with the terminal device to the second network device
  • a third indication information indicating whether the data forwarded by the first network device to the second network device is a duplicate version or a non-repeated version
  • the second network device configures configuration parameters of a Packet Data Convergence Protocol (PDCP) entity of the terminal device,
  • PDCP Packet Data Convergence Protocol
  • the second network device configures the terminal device to establish configuration parameters corresponding to the second header add/remove function and/or the second encryption/decryption function and/or the second header compression/decompression function of the second network device,
  • the terminal device establishes an RRC connection with the first network device (for example, the SeNB), and the terminal device sends a measurement report to the first network device, where the measurement report includes the first network device (or the first cell). Measurement results of neighboring network devices (or neighboring cells) of the first network device.
  • the measurement report includes Reference Signal Received Power (RSRP) and/or Reference Signal Received Quality (RSRQ) and/or Signal Interference Noisesy Ratio (SINR).
  • RSRP Reference Signal Received Power
  • RSRQ Reference Signal Received Quality
  • SINR Signal Interference Noisesy Ratio
  • the manner or timing at which the terminal device sends the measurement report may be configured by the first network device, which is not limited in this embodiment of the present application.
  • the first network device starts the handover procedure when the terminal device determines that the terminal device meets the handover condition according to the measurement report. For example, when the signal of the first network device becomes weak, the handover procedure is initiated. Specifically, the network device may decide to add a secondary base station (Secondary eNB) to the secondary base station, and the secondary base station may also be referred to as the target base station TeNB.
  • a secondary base station Secondary eNB
  • the first network device sends a first request message to the second network device (eg, the TeNB).
  • the second network device eg, the TeNB
  • the first security key is allocated by the first network device to the second network device for data transmission between the second network device and the terminal device, wherein the second network device can directly use the key and The terminal device performs data transmission, or the second network device generates another new security key according to the first security key, and then uses the new security key to perform data transmission with the terminal device.
  • the second security key is a key for data transmission between the first network device and the terminal device, and the first network device may send the key to the second network device for use between the second network device and the terminal device.
  • Data transmission wherein the second network device can directly use the key to perform data transmission with the terminal device, or the second network device generates another new security key according to the second security key, and then uses the new security key To data transmission with the terminal device.
  • the first indication information is used to indicate that the terminal device has a multi-connected handover capability, wherein the multi-connection handover can be understood as that the UE can establish a connection with two or more base stations in advance during the handover, and then release the connection.
  • Source base station can be understood as that the UE can establish a connection with two or more base stations in advance during the handover, and then release the connection.
  • the second indication information is used to indicate that the terminal device has the capability of multi-connection communication, wherein the multi-connection communication can be understood as the UE can communicate with two or more base stations.
  • the third indication information is used to indicate whether the data forwarded by the first network device to the second network device is a duplicate version or a non-repeated version.
  • the repeated version may be understood as a copy of the first network device for one data packet, sent to the first Two network devices.
  • a non-repeating version can be understood as being either for a data packet, either on the first network device or on the second network device. The UE does not receive duplicate data when receiving data transmitted by the first network device and the second network device.
  • the first network device and the second network device may send the same data to the terminal device through two links, thereby improving data transmission. Reliability; for example, for the downlink data packet 1, 2, 3, the first network device sends the data packet 1, 2, 3 to the terminal device, and the first network device forwards the data packet 1, 2, 3 to the second network device Then, the second network device sends a data packet 1, 2, 3 to the terminal device again.
  • the third indication information indicates that the data forwarded by the first network device to the second network device is a non-repeating version, that is, downlink data from the core network
  • a part is sent to the terminal device by using the first network device, and a part is sent by the second network device.
  • the terminal device for example, for the downlink data packet 1, 2, 3, 4, the first network device sends the data packet 1, 3 to the terminal device, and the first network device forwards the data packet 2, 4 to the second network device, by The second network device transmits the data packets 2, 4 to the terminal device.
  • the fourth indication information is used to indicate that the first data packet number/sort function is used, and can be understood as uplink data that is numbered by the first data packet number/sort function, and can be sent to the first header compression/decompression function for compression processing, and It can be sent to the second header compression/decompression function for processing, and then processed by the corresponding encryption/decryption function and header addition/removal function of the respective (head compression/decompression function).
  • the uplink data that is the same as the first packet number/sort function number is sent to the first header compression/decompression function for compression processing, and then can be sent to the first encryption/decryption function for encryption, and can also be sent. Encryption is performed to the second encryption/decryption function. For downstream data, the reverse process can be used.
  • the second network device may learn the second security key that is associated with the terminal device by the first network device, and the second network device may indicate the terminal device by using the fifth indication information.
  • the second security device is used to communicate with the second network device. Since it is not necessary to transmit a specific security key, only one indication information, that is, the fifth indication information is sent, because the amount of data of the indication information is small, for example, the indication information may be 1 or 0, and the signaling overhead can be reduced. , saving network resources.
  • the first request message may further include at least one of the following,
  • the identifier of the first network device for example, the eNB ID
  • the serving PLMN of the first network device for example, the identifier of the Serving Gateway (S-GW) of the first network device
  • the identifier of the second network device the SeNB and the S- Between the GWs (interface S1)
  • a tunnel identifier for transmitting data for example, a quality of service (QoS) parameter of the terminal device, (X2 interface) between the first network device and the second network device,
  • QoS quality of service
  • the second network device is configured with a third encryption/decryption function, where the third encryption/decryption function corresponds to the second encryption/decryption function, and the first network device is configured with a fourth An encryption/decryption function corresponding to the first encryption/decryption function.
  • the terminal device before the first network device sends the first request message to the second network device, the terminal device is configured with a first PDCP entity corresponding to the first network device, and as shown in FIG. 4, the first PDCP entity includes the first Head add/remove function, first header compression/decompression function, first encryption/decryption function, first packet number/sort function.
  • the security key in the embodiment of the present application can be used for encryption/decryption of the PDCP layer.
  • the third security key may be the same as the first security key or the second security key.
  • the third security key indicates that the second network device communicates with the terminal device by using the key allocated by the first network device for the second network device.
  • the third security key is the same as the second security key, indicating that the second network device communicates with the terminal device using the same key as the first network device, so that the terminal device can avoid encrypting the data with the new key. Or decryption processing, thus improving data processing speed and improving system performance.
  • the second network device configures a configuration parameter of the PDCP entity of the terminal device, where the configuration parameter is used to configure a function of the PDCP entity of the terminal device,
  • the method further includes:
  • the first network device configures a fifth encryption/decryption function, the fifth encryption/decryption function corresponding to the second encryption/decryption function.
  • the first network device can simultaneously configure a fourth encryption/decryption function corresponding to the first encryption/decryption function communicated with the terminal device, and a fifth encryption/decryption function corresponding to the second encryption/decryption function communicated with the terminal device.
  • the terminal device is configured with a second packet data convergence protocol PDCP entity and a first PDCP entity, where the second PDCP entity includes the second encryption/decryption function and the second data packet number/sorting Function, the first PDCP entity includes the first encryption/decryption function and the first packet number/sort function,
  • the first packet number/sort function in the first PDCP entity sorts the data decrypted by the second encryption/decryption function in the second PDCP entity,
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function in the second PDCP entity performs encryption processing;
  • the terminal device is established with a second encryption/decryption function and a first PDCP entity, the first PDCP entity including the first encryption/decryption function and the first packet number/sort function,
  • the first packet number/sort function in the first PDCP entity sorts the data decrypted by the second encryption/decryption function
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function performs encryption processing.
  • the method further includes:
  • the first network device sends unencrypted first data to the second network device, so that the second network device encrypts the first data by using a third encryption/decryption function, where the first data is the first network Part or all of all data received by the PDCP layer of the device from the upper layer of the PDCP layer;
  • the first network device receives the second data that is sent by the second network device and decrypted by using a third encryption/decryption function.
  • the method further includes:
  • the first network device decrypts the fourth data using a fifth encryption/decryption function.
  • the terminal device internally establishes a first PDCP entity that communicates with the first network device, where the first PDCP entity includes the first encryption/decryption function and the first data packet number/sort function, the first PDCP entity A first header add/remove function and a first header compression/decompression function may also be included.
  • the terminal device may configure a corresponding function for communicating with the second network device, or configure a second PDCP entity that is the same as the second network device, where the second PDCP entity includes the second encryption/decryption function.
  • the second PDCP entity may further include a second header add/remove function and a second header compression/decompression function.
  • the terminal device Since the terminal device shares the first data packet number/sort function, when processing the downlink data, the terminal device decrypts the downlink data processed by the second encryption/decryption function in the second PDCP entity by the first The first packet number/sort function in a PDCP entity performs sorting processing.
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function in the second PDCP entity performs an encryption process.
  • the terminal device since the terminal device shares the first data packet number/sort function, the terminal device configures the second data packet number/sort function in the PDCP, but the second data packet number/sort function is not used in the actual application. .
  • the terminal device After the terminal device receives the first configuration information, it is not necessary to configure the entire second PDCP entity, and only the second encryption/decryption function that is in communication with the second network device may be configured, and other functions inherit the first PDCP entity. Functions such as sharing the first packet number/sort function, the first header add/remove function, and the first header compression/decompression function.
  • the first packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted through the second encryption/decryption function
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function performs encryption processing.
  • the terminal device when the terminal device communicates with the second network device, by sharing the first data packet number/sort function, only the second encryption/decryption function for communicating with the second network device can be configured, without configuring the complete
  • the PDCP entity reduces configuration time and improves handover performance.
  • the terminal device After the terminal device receives the first configuration information, it is not necessary to configure the entire second PDCP entity, for example, only the second encryption/decryption function and the second header addition/removal function that are in communication with the second network device may be configured.
  • Other functions follow the functionality of the first PDCP entity, for example, sharing the first packet number/sort function and the first header compression/decompression function.
  • the first packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted through the second encryption/decryption function
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function performs encryption processing.
  • the terminal device when the terminal device communicates with the second network device, by sharing the first data packet number/sort function, only the second encryption/decryption function and the second header that are in communication with the second network device may be configured.
  • the add/remove function eliminates the need to configure a complete PDCP entity, reducing configuration time and improving handover performance.
  • the second network device is configured with a third encryption/decryption function in communication with the terminal device, the third encryption/decryption function corresponding to the second encryption/decryption function.
  • the first network device is configured with a fourth encryption/decryption function in communication with the terminal device, the fourth encryption/decryption function corresponding to the first encryption/decryption function.
  • two encryption/decryption functions correspond to each other, indicating that an encryption/decryption function uses one key to encrypt data, and the second encryption/decryption function can use the same key to perform the opposite.
  • the process decrypts the data.
  • the fourth encryption/decryption function corresponds to the first encryption/decryption function
  • the fourth encryption/decryption function of the network device can decrypt the first Uplink data encrypted by the encryption/decryption function.
  • the first encryption/decryption function of the terminal device can decrypt the downlink data encrypted by the fourth encryption/decryption function.
  • another encryption/decryption function can decrypt the data using the reverse process.
  • the method further includes:
  • the first network device sends a sixth indication information to the second network device, where the sixth indication information is used to indicate that the terminal device has completed RRC connection reconfiguration;
  • the first network device sends a seventh indication information to the terminal device, where the seventh indication information is used to indicate that the terminal device releases an RRC connection with the first network device;
  • the first network device sends an eighth indication information to the terminal device, where the eighth indication information is used to indicate that the terminal device initiates an RRC connection with the second network device.
  • the method further includes:
  • the first network device sends, to the second network device, ninth indication information, where the ninth indication information is used to indicate downlink data that the terminal device has successfully received, so that the second network device discards the downlink that the terminal device has successfully received. data.
  • the method further includes:
  • the first network device sends tenth indication information to the second network device, where the tenth indication information is used to indicate that the first network device has successfully delivered uplink data to the third network device, so that the second network device discards the The first network device has successfully submitted uplink data to the third network device.
  • the present embodiment first establishes a connection between the terminal device and the second network device, and configures RRC configuration information therebetween.
  • the terminal device can interact with the second network device and the first network. Data transmission between devices simultaneously reduces or avoids service interruption time caused by handover.
  • a method of switching comprising:
  • the second network device is an auxiliary service device, where the first request message includes at least one of the following:
  • the first network device allocates a first security key associated with the terminal device to the second network device
  • a third indication information indicating whether the data forwarded by the first network device to the second network device is a duplicate version or a non-repeated version
  • the second network device sends a response message to the first network device, so that the first network device sends a first configuration message to the terminal device, where the first configuration message is used to indicate that the terminal device is configured to be associated with the second network device.
  • the response message is used to indicate that the second network device accepts the first request message of the first network device, where the response message includes at least one of the following:
  • the second network device configures configuration parameters of the packet data convergence protocol PDCP entity of the terminal device,
  • the second network device configures the terminal device to establish configuration parameters corresponding to the second header add/remove function and/or the second encryption/decryption function and/or the second header compression/decompression function of the second network device,
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the executive body of the second aspect is a first network device
  • the execution body in the first aspect may be a second terminal device, and corresponding features of the method on the second network device side
  • the detailed description is omitted as appropriate for the corresponding description of the first network device.
  • the method further includes:
  • the second network device configures a third encryption/decryption function, and the third encryption/decryption function corresponds to the second encryption/decryption function.
  • the first network device is configured with a fourth encryption/decryption function, and the fourth encryption/decryption function corresponds to the first encryption/decryption function.
  • the first network device is configured with a fifth encryption/decryption function, and the fifth encryption/decryption function corresponds to the second encryption/decryption function.
  • the terminal device is configured with a second PDCP entity and a first PDCP entity, where the second PDCP entity includes the second encryption/decryption function and a second data packet number/sort function.
  • a PDCP entity including the first encryption/decryption function and the first packet number/sort function
  • the first data packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted by the second encryption/decryption function in the second PDCP entity;
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function in the second PDCP entity performs encryption processing;
  • the terminal device is established with a second encryption/decryption function and a first PDCP entity, the first PDCP entity including the first encryption/decryption function and the first packet number/sort function,
  • the first packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted by the second encryption/decryption function
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function performs encryption processing.
  • the method further includes:
  • the second network device receives the sixth indication information sent by the first network device, where the sixth indication information is used to indicate that the terminal device has completed RRC connection reconfiguration.
  • the method further includes:
  • the second network device encrypts the first data by using a third encryption/decryption function, where the first data is part or all of all data received by the PDCP layer of the first network device from an upper layer of the PDCP layer;
  • the second network device transmits the second data decrypted using the third encryption/decryption function to the first network device.
  • the method further includes:
  • the second network device receives the third data encrypted by the first network device and encrypted by the fifth encryption/decryption function, where the third data is all data received by the PDCP layer of the first network device from the upper layer of the PDCP layer. Part or all of;
  • the second network device sends the un-decrypted fourth data to the first network device, so that the first network device decrypts the fourth data using a fifth encryption/decryption function.
  • the method further includes:
  • the ninth indication information that is sent by the first network device, where the ninth indication information is used to indicate downlink data that the terminal device has successfully received, so that the second network device discards that the terminal device has successfully received the Downstream data.
  • the method further includes:
  • the method further includes:
  • the second network device After the second network device establishes an RRC connection with the terminal device, the second network device sends an eleventh indication message to the first network device, where the eleventh indication information is used to indicate that the first network device stops The terminal device transmits downlink data.
  • the present embodiment first establishes a connection between the terminal device and the second network device, and configures RRC configuration information therebetween.
  • the terminal device can interact with the second network device and the first network. Data transmission between devices simultaneously reduces or avoids service interruption time caused by handover.
  • a method of switching comprising:
  • the terminal device receives a first configuration message sent by the first network device, where the first configuration message is used to indicate that the terminal device configures a second encryption/decryption function associated with the second network device, and shares the first data packet number/sort function.
  • the terminal device is configured with a first encryption/decryption function associated with the first network device and the first data packet number/sort function;
  • the terminal device sends a first configuration complete message to the first network device.
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the execution subject of the third aspect is a terminal device, and the execution body in the first aspect and the second aspect may be a first network device that interacts with the terminal device.
  • the method on the terminal device side, and the corresponding beneficial effects refer to the corresponding descriptions of the first network device side and the second network device side in the first aspect and the second aspect, and therefore, for the sake of brevity, The detailed description is omitted as appropriate.
  • the second network device is configured with a third encryption/decryption function, where the third encryption/decryption function corresponds to the second encryption/decryption function, and the first network device is configured with a fourth An encryption/decryption function corresponding to the first encryption/decryption function.
  • the first network device is configured with a fifth encryption/decryption function, and the fifth encryption/decryption function corresponds to the second encryption/decryption function.
  • the terminal device is configured with a second packet data convergence protocol PDCP entity and a first PDCP entity, where the second PDCP entity includes the second encryption/decryption function and the second data packet number/sorting Function, the first PDCP entity includes the first encryption/decryption function and the first packet number/sort function,
  • the method also includes:
  • the first data packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted by the second encryption/decryption function in the second PDCP entity;
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function in the second PDCP entity performs encryption processing;
  • the terminal device is established with a second encryption/decryption function and a first PDCP entity, the first PDCP entity including the first encryption/decryption function and the first packet number/sort function,
  • the method also includes:
  • the first packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted by the second encryption/decryption function
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function performs encryption processing.
  • the method further includes:
  • the terminal device Receiving, by the terminal device, the seventh indication information that is sent by the first network device, where the seventh indication information is used to indicate that the terminal device releases an RRC connection with the first network device;
  • the terminal device receives the eighth indication information sent by the first network device, where the eighth indication information is used to indicate that the terminal device initiates an RRC connection with the second network device.
  • the present embodiment first establishes a connection between the terminal device and the second network device, and configures RRC configuration information therebetween.
  • the terminal device can interact with the second network device and the first network. Data transmission between devices simultaneously reduces or avoids service interruption time caused by handover.
  • a first network device for performing the method in any of the foregoing first aspect, the first aspect of the first aspect.
  • the first network device comprises means for performing the above method.
  • a second network device for performing the method in any of the foregoing possible implementation manners of the second aspect and the second aspect.
  • the second network device comprises means for performing the above method.
  • a terminal device for performing the method in any of the foregoing possible implementation manners of the third aspect and the third aspect.
  • the first terminal device includes means for performing the above method.
  • a first network device comprising a processor and a memory, the memory for storing a computer program, the processor for executing a computer program stored in the memory, performing the first aspect
  • a second network device comprising a processor and a memory, the memory for storing a computer program, the processor for executing a computer program stored in the memory, performing the second aspect The method of any of the possible implementations of the second aspect.
  • a terminal device comprising a processor and a memory, the memory for storing a computer program, the processor for executing a computer program stored in the memory, performing the third aspect and the third aspect The method in any of the possible implementations.
  • a computer readable medium having stored thereon a computer program, which when executed by a processor, implements the method of any of the possible implementations of the first aspect or the first aspect.
  • a computer readable medium having stored thereon a computer program, which when executed by a processor, implements the method of any of the possible implementations of the second aspect or the second aspect.
  • a computer readable medium having stored thereon a computer program, which when executed by a processor, implements the method of any one of the possible implementations of the third aspect or the third aspect.
  • FIG. 1 is a scene diagram of a communication system to which an embodiment of the present application is applicable.
  • FIG. 2 is a scene diagram of a communication system to which another embodiment of the present application is applicable.
  • FIG. 3 is a schematic flowchart of a method for handover according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a PDCP entity in accordance with an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a PDCP entity according to another embodiment of the present application.
  • FIG. 6 is a schematic diagram of a PDCP entity according to another embodiment of the present application.
  • FIG. 7 is a schematic diagram of a PDCP entity according to another embodiment of the present application.
  • FIG. 8 is a schematic diagram of a PDCP entity according to another embodiment of the present application.
  • FIG. 9 is a schematic diagram of a data processing procedure in accordance with one embodiment of the present application.
  • FIG. 10 is a schematic diagram of a data processing procedure according to another embodiment of the present application.
  • FIG. 11 is a schematic diagram of a data processing procedure according to another embodiment of the present application.
  • FIG. 12 is a schematic flowchart of a method for handover according to another embodiment of the present application.
  • FIG. 13 is a schematic flowchart of a method for handover according to another embodiment of the present application.
  • FIG. 14 is a schematic flowchart of a method for handover according to another embodiment of the present application.
  • FIG. 15 is a schematic flowchart of a method for handover according to another embodiment of the present application.
  • FIG. 16 is a schematic flowchart of a method for handover according to another embodiment of the present application.
  • FIG. 17 is a schematic flowchart of a method for handover according to another embodiment of the present application.
  • FIG. 18 is a schematic block diagram of a first network device in accordance with an embodiment of the present application.
  • FIG. 19 is a schematic block diagram of a second network device in accordance with an embodiment of the present application.
  • FIG. 20 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 21 is a schematic block diagram of a first network device according to another embodiment of the present application.
  • FIG. 22 is a schematic block diagram of a second network device according to another embodiment of the present application.
  • FIG. 23 is a schematic block diagram of a terminal device according to another embodiment of the present application.
  • FIG. 24 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 25 is still another schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 26 is still another schematic structural diagram of a communication device according to an embodiment of the present application.
  • the embodiments of the present application are applicable to various communication systems, and therefore, the following description is not limited to a specific communication system.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • System General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, LTE Frequency Division Duplex (FDD) system, LTE Time Division Duplex (Time Division Duplex, TDD), Universal Mobile Telecommunication System (UMTS), and the like.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • the terminal device may also be referred to as a user equipment (User Equipment, UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, and a terminal. , a wireless communication device, a user agent, or a user device.
  • the access terminal may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), with wireless communication.
  • the network device may be a device for communicating with the mobile device, such as a network side device, and the network device may be a Global System of Mobile communication (GSM) or a code division multiple access (Code Division Multiple Access).
  • GSM Global System of Mobile communication
  • Code Division Multiple Access Code Division Multiple Access
  • the Base Transceiver Station (BTS) in CDMA) may also be a base station (NodeB, NB) in Wideband Code Division Multiple Access (WCDMA), or may be a Long Term Evolution (Long Term Evolution, An eNB in an LTE or an evolved Node B (eNodeB), or a relay station or an access point, or an in-vehicle device, a wearable device, and a network side device in a future 5G network, such as a gNB, etc. Not limited to this.
  • FIG. 1 is a schematic diagram of a scenario of a communication system applicable to an embodiment of the present application.
  • the communication system can be any of the above communication systems.
  • the communication system 100 includes a first network device 101, a second network device 102, and a terminal device 103.
  • the terminal device is moved by the area covered by the first network device 101 (which may also be referred to as a first cell) to the area covered by the second network device 102 (which may also be referred to as a second cell)
  • the communication data link of the terminal device 103 Switching from the first network device 101 to the second network device 102 is required.
  • first network device 101 and the second network device 102 may be any of the network devices described above.
  • the first network device 101 and the second network device 102 may be the same or different.
  • the first network device 101 and the second network device 102 may each be an eNB in an LTE system; or, the first network device 101 and the second device
  • Each of the network devices 102 may be a gNB in the 5G network; or the first network device 101 is an eNB in the LTE system, and the second network device 102 is a gNB in the 5G network; or the first network device 102 is a gNB in the 5G network.
  • the second network device 101 is an eNB or the like in the LTE system, and the embodiment of the present application is not limited thereto.
  • the gNB may include a distributed unit (DU) and a centralized unit (CU), and multiple DUs. Can be connected to the same CU.
  • DU distributed unit
  • CU centralized unit
  • switching between the first network device and the second network by the terminal device can be understood as switching between different CUs.
  • the first network device in the embodiment of the present application may also be referred to as a source network device, and the second network device may also be referred to as a target network device.
  • the network device is used as an example for the eNB.
  • the first network device is a source base station (SeNB)
  • the second network device is a target base station (TeNB)
  • the terminal device is a UE.
  • the embodiment of the present application is not limited thereto, and the network device and the terminal device may be any one of the devices defined above.
  • the handover procedure of the inter-base station (eNB) adopted by the LTE system is described below.
  • the handover is a handover procedure initiated by the source eNB.
  • the main process is that the source eNB (SeNB) determines the pair according to the measurement report of the UE.
  • the UE performs a handover and initiates a handover request to the target base station (Target eNB, TeNB).
  • the SeNB After the SeNB acquires the affirmative handover response of the TeNB, the SeNB sends a handover command to the UE.
  • the UE stops performing with the SeNB.
  • the UE starts to synchronize with the TeNB and initiates an initial access procedure.
  • the SeNB When transmitting the handover command to the UE, the SeNB stops the uplink or downlink data transmission with the UE, and sends the data stored in the SeNB to the TeNB. After successfully accessing the TeNB, the UE starts to transmit uplink or downlink data with the TeNB.
  • the UE stops uplink or downlink data transmission with the source base station, then starts downlink synchronization with the target base station, and then initiates a random access procedure to the target base station according to the configuration information in the handover command. After the UE completes the random access and sends the RRC connection reconfiguration complete message to the target base station, the uplink or downlink data transmission with the target base station is started. It can be seen that the uplink or uplink data transmission of the UE has experienced an interruption.
  • an improved solution is that after receiving the handover command of the source cell (or the source base station), the UE continues to perform uplink or downlink data transmission with the source base station, and the UE and the target.
  • the base station performs synchronization.
  • the UE stops uplink and downlink transmission with the source base station:
  • the UE when the UE synchronizes the target base station and initiates a random access to the target base station, that is, when the random access code Random access preamble is sent to the target base station, the UE stops the uplink and downlink transmission with the source base station, and sends a preamble to acquire the uplink to the target base station. Timing Advance (TA) or Uplink Resource Allocation (UL Grant), both of which are sent to the UE through a Random Access Response (RAR) message. The UE then transmits an RRC Connection Reconfiguration Complete message indicating "Handover complete" using the TA and UL Grant configured by the target base station.
  • TA Timing Advance
  • UL Grant Uplink Resource Allocation
  • RAR Random Access Response
  • the UE may send a part of the uplink data when transmitting the RRC Connection Reconfiguration Complete message. Or the UE requests the uplink resource from the target base station, and then sends the uplink data.
  • the target base station After receiving the RRC connection reconfiguration complete message sent by the UE, the target base station starts to send downlink data to the UE.
  • the UE starts from transmitting the Preamble, starts the uplink transmission interruption, and after receiving the RAR, and then sends the RRC Connection Reconfiguration Complete to the target base station, the uplink transmission starts. Continued. Therefore, there is an interruption time for the uplink transmission in this scheme.
  • the UE stops receiving the source base station downlink data from the transmission of the preamble, and after the RRC connection reconfiguration complete is completed, the target eNB starts to send the downlink data to the UE. Therefore, there is also an interruption time for the downlink transmission in this scheme.
  • another improved solution proposes that the UE can acquire the TA and the UL Grant in advance, and the UE can directly send the RRC connection reconfiguration complete message to the target base station without performing the random access procedure. Then, uplink or downlink data transmission is performed with the target base station.
  • the UE for the uplink transmission, after the UE stops sending uplink data to the source base station, it starts to use the already acquired TA and UL Grant to send the RRC Connection Reconfiguration Complete to the target base station, if the UL Grant is large enough. A part of the uplink data can be sent to the target base station. In this case, the uplink transmission can be considered as uninterrupted.
  • the UL Grant for the UE to be configured is generally not very large, because the base station does not know how much data the UE has. If there are more resources allocated, the resource will be wasted. If the UE has uplink data, the UE needs to request uplink from the eNB. Resources, which introduce additional uplink transmission interruptions.
  • the embodiment of the present application subtly proposes that the user plane bearer and control plane configuration between the terminal device and the second network device are established in advance in the handover preparation phase, and the handover process is reduced due to path switching and control plane signaling transmission.
  • the two links are simultaneously sent and received to ensure the reliability of data transmission.
  • the terminal device can communicate with the first network device and the second network device at the same time in the process of the handover, which can ensure the continuity of the service and avoid or reduce the service interruption in the handover process.
  • FIG. 3 is a schematic flowchart of a method of handover according to an embodiment of the present application.
  • the method 300 of switching as shown in FIG. 3 includes:
  • the first network device sends a first request message to the second network device.
  • the first request message is used to request that the terminal device be switched to the second network device, or the first request message is used to request that the second network device be added as an auxiliary service device for the terminal device.
  • the terminal device establishes an RRC connection with the first network device (for example, the SeNB), and the terminal device sends a measurement report to the first network device, where the measurement report includes the first network device (or the first cell). Measurement results of neighboring network devices (or neighboring cells) of the first network device.
  • the measurement report includes Reference Signal Received Power (RSRP) and/or Reference Signal Received Quality (RSRQ) and/or Signal Interference Noisesy Ratio (SINR).
  • RSRP Reference Signal Received Power
  • RSRQ Reference Signal Received Quality
  • SINR Signal Interference Noisesy Ratio
  • the manner or timing at which the terminal device sends the measurement report may be configured by the first network device, which is not limited in this embodiment of the present application.
  • the first network device starts the handover procedure when the terminal device determines that the terminal device meets the handover condition according to the measurement report. For example, when the signal of the first network device becomes weak, the handover procedure is initiated. Specifically, the first network device may decide to add a secondary base station (Secondary eNB) to the secondary base station, and the secondary base station may also be referred to as the target base station TeNB.
  • a secondary base station Secondary eNB
  • the first network device sends a first request message to the second network device (eg, the TeNB).
  • the first request message is used to request that the terminal device be handed over to the second network device or the first request message is used to request that the second network device be added as an auxiliary service device for the terminal device.
  • the first request message includes at least one of the following:
  • the first network device allocates a first security key associated with the terminal device to the second network device
  • third indication information indicating whether the data forwarded by the first network device to the second network device is a duplicate version or a non-repeated version.
  • the first security key is allocated by the first network device to the second network device for data transmission between the second network device and the terminal device, wherein the second network device can directly use the key and The terminal device performs data transmission, or the second network device generates another new security key according to the first security key, and then uses the new security key to perform data transmission with the terminal device.
  • the second security key is a key for data transmission between the first network device and the terminal device, and the first network device may send the key to the second network device for use between the second network device and the terminal device.
  • Data transmission wherein the second network device can directly use the key to perform data transmission with the terminal device, or the second network device generates another new security key according to the second security key, and then uses the new security key To data transmission with the terminal device.
  • the first indication information is used to indicate that the terminal device has a multi-connected handover capability, wherein the multi-connection handover can be understood as that the UE can establish a connection with two or more base stations in advance during the handover, and then release the connection.
  • Source base station can be understood as that the UE can establish a connection with two or more base stations in advance during the handover, and then release the connection.
  • the second indication information is used to indicate that the terminal device has the capability of multi-connection communication, wherein the multi-connection communication can be understood as the UE can communicate with two or more base stations.
  • the third indication information is used to indicate whether the data forwarded by the first network device to the second network device is a duplicate version or a non-repeated version.
  • the repeated version may be understood as a copy of the first network device for one data packet, sent to the first Two network devices.
  • a non-repeating version can be understood as being either for a data packet, either on the first network device or on the second network device. The UE does not receive duplicate data when receiving data transmitted by the first network device and the second network device.
  • the first network device and the second network device may send the same data to the terminal device through two links, thereby improving data transmission. Reliability; for example, for the downlink data packet 1, 2, 3, the first network device sends the data packet 1, 2, 3 to the terminal device, and the first network device forwards the data packet 1, 2, 3 to the second network device Then, the second network device sends a data packet 1, 2, 3 to the terminal device again.
  • the third indication information indicates that the data forwarded by the first network device to the second network device is a non-repeating version, that is, downlink data from the core network
  • a part is sent to the terminal device by using the first network device, and a part is sent by the second network device.
  • the terminal device for example, for the downlink data packet 1, 2, 3, 4, the first network device sends the data packet 1, 3 to the terminal device, and the first network device forwards the data packet 2, 4 to the second network device, by The second network device transmits the data packets 2, 4 to the terminal device.
  • the first request message may further include at least one of the following,
  • the identifier of the first network device for example, the eNB ID
  • the serving PLMN of the first network device for example, the eNB ID
  • the identifier of the Serving Gateway (S-GW) of the first network device for example, the identifier of the second network device, the SeNB and the S- An interface S1 between the GWs, a tunnel identifier for transmitting data, a quality of service (QoS) parameter of the terminal device, an X2 interface between the first network device and the second network device, and an uplink data transmission Tunnel identifier
  • context information of the terminal device UE context
  • the second network device sends a response message to the first network device.
  • the response message is used to indicate that the second network device accepts the request of the first request message of the first network device.
  • the second network device determines whether to approve the request of the first network device according to the resource condition and the load situation; and if the request of the first network device is promised, A network device sends a response message, and the response message may include at least one of the following:
  • the second network device configures configuration parameters of the PDCP entity of the terminal device
  • the second network device configures the terminal device to establish a second header add/remove function and/or a second encryption/decryption function and/or a second header compression/decompression function corresponding to the second network device,
  • the terminal device before the first network device sends the first request message to the second network device, the terminal device is configured with a first PDCP entity corresponding to the first network device, and as shown in FIG. 4, the first PDCP entity includes the first Header Adding/Removing, Header(de)Compression, First Encryption/Decryption ((de)Ciphering1), First Packet Number/Sort Function (SN numbering/Reordering).
  • the security key in the embodiment of the present application can be used for encryption/decryption of the PDCP layer.
  • the third security key may be the same as the first security key or the second security key.
  • the third security key indicates that the second network device communicates with the terminal device by using the key allocated by the first network device for the second network device.
  • the third security key is the same as the second security key, indicating that the second network device communicates with the terminal device using the same key as the first network device, so that the terminal device can avoid encrypting the data with the new key. Or decryption processing, thus improving data processing speed and improving system performance.
  • the second network device configures a configuration parameter of the PDCP entity of the terminal device, where the configuration parameter is used to configure the function of the PDCP entity of the terminal device.
  • the configuration parameter can be configured as follows:
  • a second encryption/decryption function is configured, and other functions inherit the first PDCP entity.
  • the UE is configured to use the first encryption/decryption function, but the data can be encrypted using a different key.
  • a second header adding/removing function and a second encrypting/decrypting function are established on the basis of the first PDCP entity.
  • Other functions follow the first PDCP entity.
  • the second PDCP entity is established, and the second packet number/sort function and the second header compression/decompression function in the second PDCP entity are excited. Its data transmission mode is shown in Figure 7.
  • the fourth indication information is used to indicate that the first data packet number/sort function is used, and can be understood as uplink data that is numbered by the first data packet number/sort function, and can be sent to the first header compression/decompression function for compression processing, and It can be sent to the second header compression/decompression function for processing, and then processed by the corresponding encryption/decryption function and header addition/removal function of the respective (head compression/decompression function).
  • the uplink data that is the same as the first packet number/sort function number is sent to the first header compression/decompression function for compression processing, and then can be sent to the first encryption/decryption function for encryption, and can also be sent. Encryption is performed to the second encryption/decryption function. For downstream data, the reverse process can be used.
  • the second network device may learn the second security key that is associated with the terminal device by the first network device, and the second network device may indicate the terminal device by using the fifth indication information.
  • the second security device is used to communicate with the second network device. Since it is not necessary to transmit a specific security key, only one indication information, that is, the fifth indication information is sent, because the amount of data of the indication information is small, for example, the indication information may be 1 or 0, and the signaling overhead can be reduced. , saving network resources.
  • the first network device sends a first configuration message to the terminal device.
  • the first configuration message is used to indicate that the terminal device configures a second encryption/decryption function associated with the second network device, and shares a first data packet number/sort function, wherein the terminal device is configured to be associated with the first network device The first encryption/decryption function and the first packet number/sort function;
  • the first network device after receiving the response message sent by the second network device, the first network device sends a first configuration message (also referred to as an RRC Connection Reconfiguration) message to the terminal device, where the first configuration message is sent.
  • a first configuration message also referred to as an RRC Connection Reconfiguration
  • the first encryption/decryption function configured by the terminal device in the embodiment of the present application can perform encryption processing on the data, and can also perform decryption processing on the data.
  • the “/” indicates that the first encryption/decryption function can only selectively select the corresponding processing for the same data.
  • the first encryption/decryption function can perform encryption processing on the uplink data, and the first encryption/decryption function can be performed.
  • the downlink data is decrypted.
  • the first packet number/sort function can process the data and sort the data; wherein "/" indicates that the first packet number/sort function can only select one of the same data.
  • the first data packet numbering/sorting function may perform number processing on the uplink data, and the first data packet numbering/sorting function may perform sorting processing on the downlink data.
  • other functions in this document are similar to this, and are not repeated here to avoid repetition.
  • the first configuration message may further include at least one of the following:
  • the tunnel identifier used for receiving the downlink or sending the uplink data; the second network device is the uplink resource information configured by the terminal device.
  • the terminal device performs configuration according to the first configuration information.
  • the terminal device configures a second encryption/decryption function associated with the second network device according to the first configuration information, and shares a first data packet number/sort function, where the terminal device is configured to be associated with the first network device.
  • the first encryption/decryption function and the first packet number/sort function are configured to be associated with the first network device.
  • the terminal device can be configured in the manner of FIGS. 5 to 8.
  • the terminal device internally establishes a first PDCP entity that communicates with the first network device.
  • the first PDCP entity includes the first encryption/decryption function and the first packet number/sort function.
  • the first PDCP entity may further include a first header add/remove function and a first header compression/decompression function.
  • the terminal device may configure a corresponding function (as shown in FIG. 5 and FIG. 6) for communicating with the second network device, or configure a second PDCP entity that is the same as the second network device (FIG. 7).
  • the second PDCP entity includes the second encryption/decryption function and the second data packet number/sort function
  • the second PDCP entity may further include a second header addition/removal function and a second header Compression/decompression.
  • the terminal device pair since the terminal device shares the first data packet number/sort function, the terminal device pair performs the second encryption/decryption function in the second PDCP entity when processing the downlink data.
  • the decrypted downlink data is sorted by the first packet number/sort function in the first PDCP entity.
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function in the second PDCP entity performs an encryption process.
  • the terminal device since the terminal device shares the first data packet number/sort function, the terminal device configures the second data packet number/sort function in the PDCP, but the second data packet number/sort function is not used in the actual application. .
  • the entire second PDCP entity does not need to be configured.
  • only the second encryption/decryption function that communicates with the second network device may be configured.
  • the functions of the first PDCP entity are used, for example, sharing the first packet number/sort function, the first header add/remove function, and the first header compression/decompression function.
  • the first packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted through the second encryption/decryption function
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function performs encryption processing.
  • the terminal device when the terminal device communicates with the second network device, by sharing the first data packet number/sort function, only the second encryption/decryption function for communicating with the second network device can be configured, without configuring the complete
  • the PDCP entity reduces configuration time and improves handover performance.
  • the entire second PDCP entity does not need to be configured.
  • the second encryption/decryption function and the second header added to communicate with the second network device may be configured.
  • /Remove function other functions inherit the functions of the first PDCP entity, for example, sharing the first packet number/sort function and the first header compression/decompression function.
  • the first packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted through the second encryption/decryption function
  • the first packet/sort function in the first PDCP entity processes the data number and sends the first encryption/decryption function to the first PDCP entity and/or the The second encryption/decryption function performs encryption processing.
  • the terminal device when the terminal device communicates with the second network device, by sharing the first data packet number/sort function, only the second encryption/decryption function and the second header that are in communication with the second network device may be configured.
  • the add/remove function eliminates the need to configure a complete PDCP entity, reducing configuration time and improving handover performance.
  • the second network device is configured with a third encryption/decryption function that is in communication with the terminal device, and the third encryption/decryption function and the The second encryption/decryption function corresponds.
  • the first network device is configured with a fourth encryption/decryption function in communication with the terminal device, the fourth encryption/decryption function corresponding to the first encryption/decryption function.
  • two encryption/decryption functions correspond to each other, indicating that an encryption/decryption function uses one key to encrypt data, and the second encryption/decryption function can use the same key to perform the opposite.
  • the process decrypts the data.
  • the fourth encryption/decryption function corresponds to the first encryption/decryption function
  • the fourth encryption/decryption function of the network device can decrypt the first Uplink data encrypted by the encryption/decryption function.
  • the first encryption/decryption function of the terminal device can decrypt the downlink data encrypted by the fourth encryption/decryption function.
  • another encryption/decryption function can decrypt the data using the reverse process.
  • the first network device configuration may further configure a fifth encryption/decryption function corresponding to the second encryption/decryption function.
  • the first network device can simultaneously configure a fourth encryption/decryption function corresponding to the first encryption/decryption function communicated with the terminal device, and a fifth encryption/decryption function corresponding to the second encryption/decryption function communicated with the terminal device.
  • the terminal device sends a first configuration complete message.
  • the first configuration completion message (also referred to as an RRC Connection Reconfiguration Complete message) indicates that the terminal device successfully accesses the second network device, or the first configuration completion message indicates that the terminal device completes Connection configuration of the second network device.
  • the first configuration completion message may be sent to the first network device, indicating that the terminal device completes the second network device Connection configuration.
  • the terminal device may initiate random access to the second network device by using a corresponding random access preamble (RAP) and a corresponding uplink resource (UL Grant) to obtain uplink timing. (Timing Advance, TA) and uplink resources.
  • RAP random access preamble
  • UL Grant uplink resource
  • the terminal device receives a random access response message (RAR) sent by the second network device, where the message includes an uplink resource (UL Grant) and an uplink timing (TA).
  • RAR random access response message
  • the terminal device may send a first configuration complete message to the second network device, indicating that the terminal device successfully accesses the second network device.
  • the first network device may send all or part of the downlink data to the second network device in a copy or non-copy manner, so as to send the second network device to the terminal device. Corresponding downlink data.
  • the first network device and the second network device in the embodiment of the present application can simultaneously send downlink data to the terminal device, provide reliability of data transmission, and avoid service interruption caused by handover.
  • the step 310 and the step 320 may be a handover request message and a handover response message, that is, a handover procedure, or a secondary base station addition request message and a secondary base station addition response message, that is, a secondary base station addition procedure.
  • the first network device sends the data from the core network to the terminal device or sends the uplink data sent by the terminal device to the core network.
  • the first network device After step 350, that is, after the first network device receives the first configuration complete message (which may also be referred to as an RRC connection reconfiguration complete message), or after step 320, that is, when the first network device receives the second network device
  • the sent response message (which may also be a request to send a response message)
  • the first network device starts to forward data to the second network device, and the form of the forwarded data may be indicated by the third indication information in the first request message in step 310.
  • the data that the first network device forwards to the second network device is a duplicate version (which may also be referred to as a duplicate version) or a non-repeated version (which may also be referred to as a non-replicated version).
  • the first network device begins to forward the replica version of the data received by the first network device from the core network device (CN) to the second network device.
  • the non-replicated version data is forwarded, then after step 320 or step 350, the first network device begins forwarding non-replicated version data to the second network device.
  • the first network device In the case of forwarding the copy version data, if the downlink data received by the first network device from the CN is PDCP SDU 1...10, wherein the PDCP SDU1, 2, 3 has been sent to the terminal device through the first network device, However, if the feedback of the terminal device is not received, the first network device still needs to forward the PDCP SDU1, 2, 3 to the second network device for retransmission.
  • the first The network device can also send data packets 4...10 to the terminal device.
  • the first network device can also receive the data packet from the CN, and the first network device sends the data packet to the terminal device on the one hand, and can also forward the information to the second network device according to the foregoing copy or non-copy mode.
  • the embodiment of the present application does not affect the data transmission of the terminal service, and can improve the user experience.
  • the first network device may send an address of a Serving GateWay (S-GW) on the core network (CN) side (such as a Tunnel Endpoint Identifier (TEID)) to the second.
  • S-GW Serving GateWay
  • TEID Tunnel Endpoint Identifier
  • the second network device can already send uplink data to the Serving GW, but in step 310, the second network device has not yet received uplink data.
  • the first request message sent by the first network device in step 310 may further carry the data transmission destination address of the first network device, so that after step 310, the second network device may send the user data to the first network device.
  • the second network device transmits the new data transmission destination address to the first network device, such that after step 320, the first network device can forward the user data to the second network device.
  • the first network device may forward the uplink data of the user to the second network device, and then send the second network device to the Serving GW. In this way, regardless of whether the terminal device sends the same data to the first network device or different data, it is finally concentrated to the second network device, and the second network device performs reordering, repeated packet detection, and the like.
  • the first network device will complete the ordering and the data that can be submitted to the S-GW is delivered to the S-GW, and the first network device will not be able to deliver the data to the S-GW in order.
  • the copy version (such as SDU4, 6, 8) is sent to the second network device.
  • the first network device receives the SDU5
  • the first network device can deliver the SDUs 4, 5, and 6 to the S-GW, where the first network
  • the device sends a status report to the second network device, indicating that the SDU 6 and the previous data packet have been sent to the S-GW, and the second network device discards the SDU 4, 6.
  • the terminal device may continue to send uplink data to the first network device and initiate an access procedure to the second network device.
  • the terminal device begins transmitting uplink data to the second network device.
  • the terminal device may send the same data (replicated version) to the first network device and the second network device, that is, ensure the reliability of the transmission, or may be the terminal device to the first network device and the first The two network devices send different data, that is, one part is sent to the first network device, and the remaining data is sent to the second network device.
  • the uplink data at this time may include: uplink data newly generated by the terminal device side, and uplink data sent by the terminal device side to the first network device but not receiving an ACK response, and the ACK response indicates that the data is successfully received.
  • the terminal device receives the NACK of a certain data packet, the NACK indicates that the data is not successfully received, and if the terminal device does not send the data packet to the second network device, retransmit the data packet to the first network device, if The terminal device sends the data packet to the second network device, and the terminal device feeds back an ACK to the first network device, indicating that the data packet has been successfully sent.
  • the first network device may send the data sent from the core network and the data not received by the terminal device ACK to the second network device.
  • the first network device receives the NACK of a certain data packet sent by the terminal device
  • the first network device retransmits the data packet.
  • the first network device receives the NACK of a certain data packet sent by the terminal device, if the data has been forwarded to the second network device, the first network device feeds back an ACK to the terminal device, indicating that the data packet has been successfully sent. .
  • the terminal device When receiving the downlink data on the terminal device side, after the terminal device feeds back the NACK to the first network device, the terminal device receives the retransmission of the first network device (redirecting, indicating whether the data packet is forwarded to the second network device), and successfully receiving When the data packet is sent, if the data packet has been forwarded to the second network device, the terminal device reports an ACK to the second network device, indicating that the data packet has been successfully received.
  • the second network device When the second network device receives the forwarded data from the first network device, if the second network device does not receive the ACK of the terminal device for a certain data packet, the second network device sends the data packet; if the ACK is received; , the packet is discarded. On the terminal device side, if a certain data packet is successfully received from the second network device, the ACK is fed back to the two eNBs, otherwise, the NACK is fed back to the two eNBs.
  • the ACK and the NACK may be feedback information in the HARQ of the MAC layer and the physical layer, or feedback information of the RLC layer (that is, a status report), or feedback information of the PDCP layer (that is, a status report).
  • the embodiments of the present application are not limited thereto.
  • the terminal device is configured with a first PDCP entity
  • the first network device is configured with a fourth PDCP entity
  • the second network device is configured with a third PDCP entity.
  • each PDCP entity has a corresponding function.
  • the terminal device is configured with a first encryption/decryption function, a first packet number/sort function and a second encryption/decryption function;
  • the second network device is configured with a third encryption/decryption function;
  • the first network device is configured with a fourth Encryption/decryption function.
  • the third encryption/decryption function corresponds to the second encryption/decryption function
  • the fourth encryption/decryption function corresponds to the first encryption/decryption function
  • the first network device when the first network device forwards the downlink data to the second network device, the first network device sends the unencrypted first data to the second network device, so that the second network device uses
  • the third encryption/decryption function encrypts the first data, where the first data is part or all of all data received by the PDCP layer of the first network device from an upper layer of the PDCP layer;
  • the first network device When the first network device receives the uplink data sent by the second network device, the first network device receives the second data that is sent by the second network device and decrypted by using the third encryption/decryption function.
  • the fourth encryption/decryption function corresponds to the first encryption/decryption function, and both correspond to encryption mode 1 (Ciphering 1) and decryption mode 1 (deCiphering 1);
  • the third encryption/decryption The function corresponds to the second encryption/decryption function, and both correspond to encryption mode 2 (Ciphering 2) and decryption mode 2 (deCiphering 2).
  • the first network device when processing downlink data, at the PDCP layer, the first network device first numbers the data (SN numbering), and then performs header compression (Header Compression), after which the first network device is in the data. All or part (ie, corresponding copy or non-replicated version) is sent to the second network device, and the first network device encrypts the data by using the encryption method 1 corresponding to the fourth encryption/decryption function, and then performs corresponding headers.
  • header Compression header compression
  • the method 2 performs encryption processing on the data, and then performs header addition processing, and sequentially passes through the RLC layer, the MAC layer, and the PHY layer of the second network device, and sends the data to the terminal device, where the terminal device passes through the corresponding PHY layer, MAC layer, and RLC respectively.
  • the layer in the PDCP layer, undergoes header removal processing, and respectively passes the decryption mode 1 corresponding to the first encryption/decryption function, and the second encryption/decryption function pair Embodiment 2 decryption, decrypts the data, and finally, both using a first header compression / decompression function and a first packet number / sorting function, the data header decompressing and reordering corresponding to the acquired downlink data.
  • the terminal device is configured with a first PDCP entity
  • the first network device is configured with a fourth PDCP entity
  • the second network device is configured with a third PDCP entity.
  • each PDCP entity has a corresponding function.
  • the terminal device is configured with a first encryption/decryption function, a first packet number/sort function and a second encryption/decryption function;
  • the second network device is configured with a third encryption/decryption function;
  • the first network device is configured with a fourth Encryption/decryption function, fifth encryption/decryption function.
  • the third encryption/decryption function corresponds to the second encryption/decryption function
  • the fourth encryption/decryption function corresponds to the first encryption/decryption function
  • the fifth encryption/decryption function corresponds to the second encryption/decryption function.
  • the third encryption/decryption function and the fifth encryption/decryption function both correspond to the second encryption/decryption function.
  • the first network device when the first network device forwards the downlink data to the second network device, the first network device sends the third data encrypted by the fifth encryption/decryption function to the second network device, where The third data is part or all of all data received by the PDCP layer of the first network device from an upper layer of the PDCP layer;
  • the first network device When the first network device receives the uplink data sent by the second network device, the first network device receives the un-decrypted fourth data sent by the second network device; the first network device uses the fifth encryption/decryption function. The fourth data is decrypted.
  • the fourth encryption/decryption function corresponds to the first encryption/decryption function, and both correspond to encryption mode 1 (Ciphering 1) and decryption mode 1 (deCiphering 1); the third encryption/decryption Both the function and the fifth encryption/decryption function correspond to the second encryption/decryption function, and both correspond to encryption mode 2 (Ciphering 2) and decryption mode 2 (deCiphering 2).
  • the first network device when processing downlink data, at the PDCP layer, the first network device first numbers the data (SN numbering), and then performs header compression (Header Compression), and then a part of the data is used by the first network device.
  • the encryption method 1 corresponding to the fourth encryption/decryption function encrypts the data, and then performs corresponding header addition processing, and finally passes through the RLC layer, the MAC layer, and the PHY layer of the first network device, and sends the data to the terminal.
  • the device another part of the data is encrypted by the encryption method 1 corresponding to the fourth encryption/decryption function of the first network device, and then subjected to corresponding header addition processing, and then sent to the second network device, and sequentially
  • the RLC layer, the MAC layer, and the PHY layer of the second network device are sent to the terminal device, and the terminal device passes through the corresponding PHY layer, the MAC layer, and the RLC layer, and is subjected to Header remove processing at the PDCP layer, and Decrypting method 1 corresponding to the first encryption/decryption function and decryption mode 2 corresponding to the second encryption/decryption function respectively decrypt the data.
  • the data header decompressing and reordering corresponding to the acquired downlink data.
  • the data processing procedure shown in FIG. 10 is different from the data processing procedure shown in FIG. 9 in that, in FIG. 9, the downlink data forwarded by the first network device to the second network device is not encrypted, and needs to be performed by the second network device. After the encryption process, it is sent to the terminal device.
  • the downlink data forwarded by the first network device to the second network device has been encrypted, and the second network device is no longer required to perform encryption processing, and then sent to the terminal device.
  • the key used by the second network device may be the same as the key used by the first network device, or may be different, which is not limited by the embodiment of the present application.
  • the terminal device is configured with a first PDCP entity
  • the first network device is configured with a fourth PDCP entity
  • the second network device is configured with a third PDCP entity.
  • each PDCP entity has a corresponding function.
  • FIG. 11 data processing procedure in FIG. 11 is similar to that in FIG. 10. To avoid repetition, only the differences between FIG. 10 and FIG. 11 are described herein, and the rest of the processes in FIGS. 11 and 10 are similar, and are not described herein again.
  • FIG. 10 the difference between FIG. 10 and FIG. 11 is that, in FIG. 10, two header adding/removing functions, that is, a fourth header adding/removing function and a fifth header are configured in the fourth PDCP entity of the first network device.
  • the add/remove function, the first header add/remove function and the second header corresponding to the fourth header add/remove function and the fifth header add/remove function respectively are configured in the first PDCP entity of the terminal device Add/remove features.
  • the data encrypted by the fourth encryption/decryption function is subjected to header addition processing by the fourth header addition/removal function.
  • Head removal processing is performed on the terminal device side by the corresponding first header addition/removal function, and decryption processing is performed by the first encryption/decryption function.
  • the data encrypted by the fifth encryption/decryption function is subjected to header addition processing by the fifth header addition/removal function.
  • Head removal processing is performed on the terminal device side by the corresponding second header addition/removal function, and decryption processing is performed by the second encryption/decryption function.
  • the type of uplink data processing is the reverse of the downstream data processing process and will not be described again.
  • a header adding/removing function that is, a fourth header adding/removing function, is configured in the fourth PDCP entity of the first network device, and the fourth PDCP entity of the terminal device is configured with the fourth The first header add/remove function corresponding to the header add/remove function.
  • the data encrypted by the fourth encryption/decryption function is subjected to header addition processing by the fourth header addition/removal function.
  • Head removal processing is performed on the terminal device side by the corresponding first header addition/removal function, and decryption processing is performed by the first encryption/decryption function.
  • the data encrypted by the fifth encryption/decryption function is also subjected to header addition processing by the fourth header addition/removal function.
  • Head removal processing is performed on the terminal device side by the corresponding first header addition/removal function, and decryption processing is performed by the second encryption/decryption function.
  • the type of uplink data processing is the reverse of the downstream data processing process and will not be described again.
  • FIG. 9, FIG. 10, and FIG. 11 are only for facilitating the understanding of the embodiments of the present application, and the embodiments of the present application are not limited to the specific numerical values or specific scenarios illustrated. A person skilled in the art will be able to make various modifications or changes in accordance with the examples of FIG. 9, FIG. 10 or FIG. 11 which are within the scope of the embodiments of the present application.
  • terminal devices in FIGS. 9, 10, and 11 can be configured in any of the manners of FIGS. 5-8.
  • the embodiments of the present application are not limited thereto.
  • the switching method may further include:
  • the first network device sends, to the second network device, ninth indication information, where the ninth indication information is used to indicate downlink data that the terminal device has successfully received, so that the second network device discards the downlink that the terminal device has successfully received. data.
  • the switching method may further include:
  • the first network device sends tenth indication information to the second network device, where the tenth indication information is used to indicate that the first network device has successfully delivered uplink data to the third network device, so that the second network device discards the The first network device has successfully submitted uplink data to the third network device.
  • the switching method may further include:
  • the first network device sends the indication information.
  • the first network device sends, to the second network device, sixth indication information, where the sixth indication information is used to indicate that the terminal device has completed RRC connection reconfiguration;
  • the first network device sends a seventh indication information to the terminal device, where the seventh indication information is used to indicate that the terminal device releases an RRC connection with the first network device;
  • the first network device sends an eighth indication information to the terminal device, where the eighth indication information is used to indicate that the terminal device initiates an RRC connection with the second network device.
  • the second network device sends an RRC connection activation indication information to the terminal device, where the indication
  • the information is used to indicate that the terminal device enables all functions included in the PDCP entity corresponding to the second network device, that is, the UE directly communicates with the second network device by using the second PDCP entity, and the terminal device starts to use the second network device corresponding to the second network device.
  • the RRC entity performs signaling encapsulation and then performs signaling interaction with the second network device.
  • the RRC connection activation indication information may be sent by using any one of the following methods:
  • MAC Control Unit Control Element, CE
  • RRC message in which the RRC message may be encapsulated into a PDCP PDU sent by the second network device to the terminal device, and the RRC message is identified in the PDCP PDU.
  • the PDCP PDU contains an RRC message or, alternatively, establishes a PDCP entity for an RRC message, such as a Signaling Radio Bearer (SRB).
  • SRB Signaling Radio Bearer
  • the first network device sends seventh indication information to the terminal device, where the seventh indication information is used to indicate that the terminal device releases the RRC connection with the first network device, optionally as another embodiment.
  • the seventh indication information may be included in a MAC PDU sent by the first network device to the terminal device. More specifically, the seventh indication information may be encapsulated into a MAC Control Unit (CE) and then encapsulated into a MAC PDU. Sent to the terminal device. After receiving the seventh indication information, the terminal device releases various configurations of the corresponding first network device saved by the terminal device, for example, configuration of the MAC, the RLC, and the PDCP layer.
  • CE MAC Control Unit
  • the first network device sends an eighth indication information to the terminal device, where the eighth indication information is used to indicate that the terminal device initiates an RRC connection with the second network device.
  • the eighth indication information may be sent by using any one of the following methods:
  • MAC Control Unit Control Element, CE
  • the data sent by the first network device and the second network device to the terminal device may include User Plane Data or Control Plane Signaling.
  • the first network device may continue to send downlink data to the terminal device, and When the first network device does not receive the feedback message sent by the terminal device within the preset time period, the network device stops sending downlink data to the terminal device,
  • the first network device receives the feedback status report that is sent by the terminal device and stops the indication information for stopping the data transmission with the first network device, stopping sending the downlink data to the terminal device;
  • the first network device after the first network device receives the stop indication message of the second network device, stop sending downlink data to the terminal device, where the stop indication information is used to indicate that the first network device stops sending downlink data to the terminal device.
  • the present embodiment first establishes a connection between the terminal device and the second network device, and configures RRC configuration information therebetween.
  • the terminal device can interact with the second network device and the first network. The device simultaneously performs data transmission, reducing or avoiding the service interruption time caused by the handover.
  • FIG. 12 is a schematic flowchart of a method for handover according to another embodiment of the present application. The method shown in FIG. 12 describes a specific handover procedure when downlink data is transmitted.
  • the terminal device in the initial state, establishes an RRC connection with the first network device, and performs data transmission.
  • the following line (Downlink, DL) is taken as an example, and the first network device is from the core network (Core Network, CN).
  • the downlink data such as 10 IP packets, is called a PDCP SDU before the PDCP encapsulation, that is, the network device receives the PDCP SDU1-10.
  • the first network device first sends the PDCP SDU 1, 2, 3 to the terminal device.
  • the switching method 1100 specifically includes:
  • the terminal device sends a measurement report to the first network device.
  • the measurement report includes measurement results of the first network device (or the first cell) and the adjacent network device (or neighboring cell) of the first network device.
  • the measurement report includes Reference Signal Received Power (RSRP) and/or Reference Signal Received Quality (RSRQ) and/or Signal Interference Noisesy Ratio (SINR).
  • RSRP Reference Signal Received Power
  • RSS Reference Signal Received Quality
  • SINR Signal Interference Noisesy Ratio
  • the manner or timing at which the terminal device sends the measurement report may be configured by the first network device, which is not limited in this embodiment of the present application.
  • the first network device sends a first request message to the second network device.
  • the first network device determines, according to the measurement report of the terminal device, that the signal of the first network device is weak, and determines to add a secondary base station (Secondary eNB), that is, the second network device, to the terminal device.
  • the device is a master base station (Master eNB), and the first request message sent by the first network device to the second network device may be a TeNB Addition Request message.
  • the first request message may refer to the description of the first request message in step 310 of FIG. To avoid repetition, we will not repeat them here.
  • the second network device sends a response message to the first network device.
  • the second network device determines whether to approve the request of the first network device according to the resource condition and the load situation; and if the request of the first network device is promised, A network device sends a response message.
  • response message can be referred to the description of the response message in step 320 of FIG. To avoid repetition, we will not repeat them here.
  • the first network device sends a first configuration message to the terminal device.
  • the first configuration message is used to indicate that the terminal device configures a second encryption/decryption function associated with the second network device, and shares a first data packet number/sort function, wherein the terminal device is configured to be associated with the first network device The first encryption/decryption function and the first packet number/sort function;
  • the first network device after receiving the response message sent by the second network device, the first network device sends a first configuration message (also referred to as an RRC Connection Reconfiguration) message to the terminal device, where the first configuration message is sent.
  • a first configuration message also referred to as an RRC Connection Reconfiguration
  • first configuration message may refer to the description of the first configuration message in step 330 in FIG. To avoid repetition, we will not repeat them here.
  • the terminal device sends a random access request to the second network device.
  • the terminal device performs configuration according to the first configuration information.
  • the configuration may be performed according to any one of FIG. 5 to FIG. 8. To avoid repetition, we will not repeat them here.
  • the terminal device is configured according to the first configuration information, and establishes a second set of protocol stacks corresponding to the second network device, and then the terminal device uses the configuration information of the second network device, and uses a corresponding random access code (Random access preamble, The RAP and the corresponding uplink resource (UL Grant) initiate random access to the second network device to obtain the uplink timing (Timing Advance, TA) and the uplink resource.
  • a random access code Random access preamble
  • the RAP and the corresponding uplink resource UL Grant
  • the second network device sends a random access response to the terminal device.
  • the terminal device receives a random access response message (RAR) sent by the second network device, where the message includes an uplink resource (UL Grant) and an uplink timing (TA).
  • RAR random access response message
  • UL Grant uplink resource
  • TA uplink timing
  • the terminal device sends a first configuration completion message.
  • the terminal device may send a first configuration complete message (also referred to as an RRC Connection Reconfiguration Complete message) to the second network device, indicating that the terminal device successfully accesses the second network device.
  • a first configuration complete message also referred to as an RRC Connection Reconfiguration Complete message
  • the step 1107 is further located between the steps 1104 and 1105, so that the first configuration completion message no longer indicates that the terminal device has successfully accessed the second network device, but indicates that the terminal device completes the configuration according to the configuration message.
  • the first network device forwards the data to the second network device, the first network device sends the data from the core network to the terminal device or sends the uplink data sent by the terminal device to the core network.
  • step 1107 that is, after the first network device receives the RRC connection reconfiguration complete message, or after step 1103, that is, after the first network device accesses the second network device add request response message
  • the first network device The data is forwarded to the second network device, and the form of the forwarded data corresponds to the content indicated by the third indication information in the first request message in step 1102.
  • the first network device starts to forward, to the second network device, a replica version of the data received by the first network device from the CN, for example, the first network device goes to the second The network device forwards the PDCP SDU 1-10.
  • the non-replicated version data is forwarded, after step 1103 or step 1107, the first network device starts forwarding PDCP SDUs 1...10 to the second network device, wherein the PDCPSDU1, 2, 3 has been sent to the terminal through the first network device. The device, but if it does not receive feedback from the terminal device, it still needs to forward it to the second network device for retransmission.
  • the data of the data plane is always transmitted, for example, during which the first network device also transmits the data packets 4...10 to the terminal device.
  • the data packet received by the first network device from the CN is then sent to the terminal device on the one hand and forwarded to the second network device on the other hand.
  • the first network device may also receive 5SDUs, ie, PDCP SDUs 11...15, transmitted by the CN.
  • the first network device transmits the PDCP SDUs 11...15 to the terminal device and on the other hand transmits the PDCP SDUs 11...15 to the second network device.
  • the terminal device reports a SN status report to the first network device, indicating which data is successfully received by the first network device and which data has not been successfully received.
  • the SN status report reported by the terminal device to the first network device may be a report that reflects only the data transmission between the first network device and the terminal device, and may also reflect the first network device and the second network device. Reporting of the data transmission situation with the terminal device, that is, if some data is successfully received from the second network device, the terminal device can indicate to the first network device that the data has been successfully received in the status report.
  • the first network device forwards the non-replicated version of the data to the second network device, after receiving the SN status report sent by the terminal device, the first network device further needs to forward the following data to the second network device: The difference between the signal of the device and the data that cannot be sent to the terminal device; the downlink data sent by the core network to the first network device. Under normal circumstances, the first network device needs to send the downlink data to the terminal device. At this time, the first network device will Some or all of the downlink data is forwarded to the second network device.
  • the first network device sends the pre-encapsulated PDCP SDU and the corresponding SN to the second network device, where the second network device uses the corresponding SN and the self-assigned The key encapsulates the PDCP PDU.
  • the first network device may decide to send a handover command (or a first network device release command) to the terminal device according to the terminal device measurement report, where the handover command is generated by the first network device, and may pass The first network device and the second network device are sent to the terminal device. After the first network device sends the handover command, the RRC entity corresponding to the terminal device and the corresponding SRB are deleted.
  • the terminal device After receiving the handover command, the terminal device deletes the SRB corresponding to the first network device, enables the SRB corresponding to the second network device, and enables the disabled SRB configuration. Then, the terminal device sends a handover complete message to the second network device by using the SRB corresponding to the second network device, and indicates that the SRB of the second network device is activated at the MAC layer/RLC layer/PDCP layer.
  • the terminal device sends a status report (SN Status Report) to the second network device and a ratio of successfully receiving data from the first network device and the second network device (Ratio S/T), using the TA and the UL Grant acquired in step 1106. .
  • SN Status Report a status report
  • Ratio S/T a ratio of successfully receiving data from the first network device and the second network device
  • the status report indicates to the second network device which data is successfully received and which is not successfully received.
  • the second network device sends, to the terminal device, a data packet that is not successfully received according to the status report reported by the terminal device.
  • the data amount ratio reflects a comparison between the first network device and the second network device successfully receiving data (the number of data packets or the amount of data, such as the amount of data in units of Bytes or bits), which may be provided by the second network device. Reference to activate the RRC connection on the second network device side.
  • the first network device indicates to the second network device that the terminal device has configured the RRC configuration, and the second network device receives the indication, that is, activates the corresponding corresponding to the second network device. RRC connection.
  • step 1107 may be replaced with a configuration completion message sent by the terminal device to the second network device, and the second network device activates the RRC configuration according to the message.
  • the second network device sends an RRC activation command to the terminal device.
  • the RRC activation signaling may be sent by using an RRC message or a MAC CE.
  • the second network device may also send downlink data while transmitting the RRC activation command.
  • the downlink data may be downlink data that is not successfully received and fed back by the terminal device in step 1108. For example, for PDCP SDU 8,9,14.
  • the first network device may continue to send downlink data to the terminal device for a period of time, and the first network device may determine by itself, when to stop sending downlink data to the terminal device, for example, When the terminal device stably receives the downlink data from the second network device, the terminal device stops feeding back to the first network device, and when the first network device does not detect any feedback from the terminal device, stops sending downlink data to the terminal device.
  • the trigger for the first network device to stop sending data to the terminal device may include:
  • the terminal device When the terminal device sends the last status report to the first network device, it carries the MAC CE, indicating that the first network device can stop sending data to the terminal device.
  • the second network device requests the first network device to forward all data from the CN, and instructs the first network device to stop transmitting data to the terminal device.
  • the first network device decides to stop transmitting data to the terminal device.
  • the data of the data plane is always transmitted.
  • the first network device can also receive the 5SDUs transmitted by the CN, that is, the PDCP SDUs 16...20.
  • the first network device may send the data to the second network device, and the second network device sends the data to the terminal device.
  • the second network device requests a path switch from the core network, and requests the S-GW to forward the downlink data to the second network device.
  • the core network sends a path switch response (Path Switch ACK) to the second network device.
  • Path Switch ACK path switch response
  • the core network e.g., S-GW
  • S-GW will identify the "end" flag on the last packet destined for the first network device.
  • the core network sends 5 SDUs to the terminal device, namely PDCP SDU 21-25, and the last packet is marked with an End Marker (EM).
  • EM End Marker
  • the first network device forwards the tag to the second network device.
  • the second network device Upon receiving the data packet marked with the "end” flag, the second network device begins transmitting downlink data sent by the core network (eg, S-GW) to the terminal device.
  • the core network eg, S-GW
  • the second network device sends the newly acquired 5SDUs, that is, PDCP SDUs 26...30, to the terminal device.
  • the present embodiment first establishes a connection between the terminal device and the second network device, and configures RRC configuration information therebetween.
  • the terminal device can interact with the second network device and the first network. Simultaneous data transfer between devices reduces the interruption time caused by switching.
  • FIG. 12 corresponds to the interaction between the terminal device and the first network device
  • the vertical bar on the left side corresponds to the interaction between the terminal device and the second network device
  • the two vertical bars overlap.
  • the part indicates that the terminal device can interact with the first network device and the second network device at the same time
  • FIG. 13 to FIG. 17 are similar thereto, and are not described herein again to avoid repetition.
  • FIG. 13 is a schematic flowchart of a method for handover according to another embodiment of the present application. The method shown in FIG. 13 describes a specific handover procedure when uplink data is transmitted.
  • the terminal device in the initial state, establishes an RRC connection with the first network device, and performs data transmission.
  • the uplink (UL) is taken as an example, and the first network device receives uplink data, such as PDCP SDU 1 from the terminal device. 8.
  • the first network device may first send the PDCP SDU 1, 2, 3 to the core network device. Then, as shown in FIG. 13, the switching method 1200 specifically includes:
  • the terminal device sends a measurement report to the first network device.
  • the measurement report includes measurement results of the first network device (or the first cell) and the adjacent network device (or neighboring cell) of the first network device.
  • the measurement report includes Reference Signal Received Power (RSRP) and/or Reference Signal Received Quality (RSRQ) and/or Signal Interference Noisesy Ratio (SINR).
  • RSRP Reference Signal Received Power
  • RSS Reference Signal Received Quality
  • SINR Signal Interference Noisesy Ratio
  • the manner or timing at which the terminal device sends the measurement report may be configured by the first network device, which is not limited in this embodiment of the present application.
  • part of the data of the first bit network device is not successfully received, for example, PDCP SDU 5, 7.
  • the first network device may feed back to the terminal device a feedback message that the SDU 5, 7 (NACK SDU 5, 7) is not successfully received.
  • the first network device sends a first request message to the second network device.
  • the first network device determines, according to the measurement report of the terminal device, that the signal of the first network device is weak, and determines to add a secondary base station (Secondary eNB), that is, the second network device, to the terminal device.
  • the device is a master base station (Master eNB), and the first request message sent by the first network device to the second network device may be an add target base station request message (second network device Addition Request).
  • the first request message may refer to the description of the first request message in step 310 of FIG. To avoid repetition, we will not repeat them here.
  • the difference between the step 1202 in the uplink transmission and the step 1102 in the downlink transmission is that, in the step 1202, the first network device has already set the address of the CN side Serving GW (called Tunnel Endpoint Identifier, TEID).
  • the second network device can send the uplink data to the Serving GW.
  • the second network device does not have the uplink data yet.
  • the data transmission destination address of the first network device may also be carried in step 1202, so that after step 2, the second network device may send the user data to the first network device.
  • the second network device sends a response message to the first network device.
  • the second network device determines whether to approve the request of the first network device according to the resource condition and the load situation; and if the request of the first network device is promised, A network device sends a response message.
  • response message can be referred to the description of the response message in step 320 of FIG. To avoid repetition, we will not repeat them here.
  • step 1203 in the uplink transmission differs from the step 1103 in the downlink transmission in that, in step 1203, the second network device sends the data transmission destination address to the first network device, and the first network device can forward the data to the second network device. User data.
  • the first network device can forward the uplink data of the user to the second network device, and then send the second network device to the Serving GW. In this way, regardless of whether the terminal device sends the same data to the first network device or different data, it is finally concentrated to the second network device, and the second network device performs reordering, repeated packet detection, and the like.
  • the first network device will complete the ordering and the data that can be submitted to the S-GW is delivered to the S-GW, and the first network device will not be able to deliver the data to the S-GW in order (such as SDU4).
  • the copied version of 6, 8 and 8) is sent to the second network device.
  • the first network device receives the SDU 5
  • the first network device can deliver the SDUs 4, 5, and 6 to the S-GW
  • the first network device goes to the first network device.
  • the second network device sends a status report indicating that the SDU 6 and the previous data packet have been sent to the S-GW, and the second network device discards the SDU 4 and 6.
  • the first network device sends a first configuration message to the terminal device.
  • the first configuration message is used to indicate that the terminal device configures a second encryption/decryption function associated with the second network device, and shares a first data packet number/sort function, wherein the terminal device is configured to be associated with the first network device The first encryption/decryption function and the first packet number/sort function;
  • the first network device after receiving the response message sent by the second network device, the first network device sends a first configuration message (also referred to as an RRC Connection Reconfiguration) message to the terminal device, where the first configuration message is sent.
  • a first configuration message also referred to as an RRC Connection Reconfiguration
  • first configuration message may refer to the description of the first configuration message in step 330 in FIG. To avoid repetition, we will not repeat them here.
  • the first network device may send a SN Status Transfer to the second network device to indicate an SDU number that was not successfully received.
  • the first network device can feed back to the terminal device a feedback message that the SDU 7 (NACK SDU 7) was not successfully received.
  • the terminal device sends a random access request to the second network device.
  • the terminal device performs configuration according to the first configuration information.
  • the configuration may be performed according to any one of FIG. 5 to FIG. 8. To avoid repetition, we will not repeat them here.
  • the terminal device is configured according to the first configuration information, and establishes a second set of protocol stacks corresponding to the second network device, and then the terminal device uses the configuration information of the second network device, and uses a corresponding random access code (Random access preamble, The RAP and the corresponding uplink resource (UL Grant) initiate random access to the second network device to obtain the uplink timing (Timing Advance, TA) and the uplink resource.
  • a random access code Random access preamble
  • the RAP and the corresponding uplink resource UL Grant
  • the second network device sends a random access response to the terminal device.
  • the terminal device receives a random access response message (RAR) sent by the second network device, where the message includes an uplink resource (UL Grant) and an uplink timing (TA).
  • RAR random access response message
  • UL Grant uplink resource
  • TA uplink timing
  • the terminal device sends a first configuration complete message.
  • the terminal device when the terminal device receives the UL Grant and the TA of the second network device, it indicates that the uplink access is successful. In the non-contention based random access procedure, the uplink access is successful. Then, the terminal device may send a first configuration complete message (also referred to as an RRC Connection Reconfiguration Complete message) to the first network device, indicating that the terminal device successfully accesses the second network device.
  • a first configuration complete message also referred to as an RRC Connection Reconfiguration Complete message
  • the step 1207 is further located between the steps 1204 and 1205, so that the first configuration completion message no longer indicates that the terminal device has successfully accessed the second network device, but indicates that the terminal device completes the configuration according to the configuration message.
  • the data of the data plane is always transmitted.
  • the terminal device also sends the number of PDCP SDUs 9, 10, and also transmits the PDCP that the first network device does not successfully receive.
  • SDU 7 The final PDCP SDU 7, 8, 9, 10 is sent by the second network to the core network.
  • step 1205 and step 1206 the terminal device initiates an access procedure to the second network device while continuing to send uplink data to the first network device. After step 7, the terminal device starts to send uplink data to the second network device.
  • the terminal device may send the same data (replicated version) to the first network device and the second network device, that is, ensure the reliability of the transmission, or may be the terminal device to the first network device and the second network device. Different data is sent, that is, a part is sent to the first network device, and the remaining data is sent to the second network device.
  • the terminal device When the terminal device sends different data to the first network device and the second network device, when the terminal device successfully accesses the second network device, the terminal device starts to send uplink data to the second network device, where the uplink data includes: the terminal The newly generated uplink data (for example, PDCP SDU 9, 10) on the device side, and the uplink data (for example, PDCP SDU 7) sent by the terminal device side to the first network device but not receiving the ACK response.
  • the uplink data includes: the terminal The newly generated uplink data (for example, PDCP SDU 9, 10) on the device side, and the uplink data (for example, PDCP SDU 7) sent by the terminal device side to the first network device but not receiving the ACK response.
  • the terminal device receives the NACK of a certain data packet, the NACK indicates that the data is not successfully received, and if the terminal device does not send the data packet to the second network device, retransmit the data packet to the first network device, if The terminal device sends the data packet to the second network device, and the terminal device may feed back an ACK to the first network device, indicating that the data packet has been successfully sent.
  • the second network device requests a path switch from the core network, and requests the S-GW to forward the downlink data to the second network device.
  • the core network performs a Path Switch ACK to the second network device path.
  • the present embodiment first establishes a connection between the terminal device and the second network device, and configures RRC configuration information therebetween.
  • the terminal device can interact with the second network device and the first network. Simultaneous data transfer between devices reduces the interruption time caused by switching.
  • FIG. 14 is a schematic flowchart of a method for handover according to another embodiment of the present application. The method shown in FIG. 14 describes a specific handover procedure in downlink data transmission.
  • the switching method 1300 shown in FIG. 14 is similar to the switching method 1100 shown in FIG. 12, and a detailed description is omitted as appropriate to avoid repetition.
  • the steps 1301-1308 correspond to the steps 1101-1108, and the description in FIG. 12 can be referred to.
  • Step 1309 The second network device sends corresponding downlink data to the terminal device according to the status report of the terminal device in step 1308. For example, PDCP SDU 8,9,14.
  • Step 1309 differs from step 1109 in that, in 1109, the second network device can also send an RRC activation command to the terminal device. Only the corresponding downlink data is transmitted in 1309, and the RRC activation command is transmitted in steps 1312 and 1313.
  • Steps 1310-1311 correspond to steps 1110-1111, and can be seen in the description in FIG.
  • Steps: 1312, 1313 when the second network device receives the data packet marked with the "end" identifier, the second network device sends an RRC connection activation indication message to the first network device and the terminal device, indicating that the terminal device uses the corresponding second The RRC entity of the network device.
  • the activation indication message may be generated according to any one of the following manners. However, embodiments of the present application are not limited thereto.
  • the RRC entity on the second network device side In the first mode, the RRC entity on the second network device side generates the activation indication information, and then encapsulates the RRC message into the T-PDCP of the second network device.
  • the second network device is the target station
  • the names of the layers are added. ⁇ T, which is distinguished from the corresponding layer of the source station (the source station corresponding layer name is preceded by the front ⁇ S)
  • the RRC message is received by the T-PHY, the T-MAC, the T-RLC, and the T-PDCP of the network device, and is forwarded to the S-PDCP layer corresponding to the first network device, and sent to the S-RRC entity corresponding to the first network device.
  • the message is parsed by the S-RRC entity.
  • the RRC message encapsulating the activation indication information carries the second indication information, indicating that the RRC message is parsed by the T-RRC entity, and then, on the terminal device side, the S-RRC entity forwards the received RRC message to the T-RRC. , parsed by the T-RRC entity.
  • the T-PDCP indicates that the PDCP SDU is delivered to the T-RRC entity, and the terminal device side, when the T-PDCP receives the PDCP PDU, directly submits the RRC message to the T according to the indication information.
  • the RRC entity performs parsing.
  • the T-MAC layer of the second network device directly sends the MAC control signaling to the terminal device side, and activates the RRC connection of the second network device.
  • steps 1312 and 1313 do not represent chronological order. Steps 1312, 1313 may also be located after step 1308 or step 1309. The embodiments of the present application are not limited thereto.
  • FIG. 15 is a schematic flowchart of a method for handover according to another embodiment of the present application. The method shown in FIG. 15 describes a specific handover procedure in downlink data transmission.
  • the switching method 1400 shown in FIG. 15 is similar to the switching method 1400 shown in FIG. 12, and a detailed description is omitted as appropriate to avoid repetition.
  • steps 1401-1408 correspond to the steps 1401-1408, and the description in FIG. 12 can be referred to.
  • Step 1409 The second network device sends corresponding downlink data to the terminal device according to the status report of the terminal device in step 1408. For example, PDCP SDU 8,9,14.
  • Step 1409 differs from step 1109 in that, in 1109, the second network device can send an RRC activation command to the terminal device. Only the corresponding downlink data is transmitted in 1409, and the RRC activation command is transmitted in steps 1412 and 1413.
  • Steps 1410-1411 correspond to steps 1410-1411, and can be seen in the description in FIG.
  • Steps 1412, 1413 when the first network device receives the data packet marked with the "end" identifier, the first network device sends an RRC connection activation indication message to the second network device and the terminal device.
  • FIG. 14 differs from FIG. 15 in that, in FIG. 14, the RRC activation command is issued by the second network device. In Figure 15, the RRC activation command is issued by the first network device.
  • activation RRC may also be sent in other manners in the embodiment of the present application, and is not limited to the activation manners in FIG. 12 and FIG.
  • the RRC process is activated, and after the step 1109, the second network device indicates the RRC activation to the first network device to instruct the first network device to deactivate the original RRC connection.
  • the terminal device after the step 1109, after receiving the RRC activation message, the terminal device sends an RRC-activated notification message to the first network device, to notify the first network device that the terminal device has The RRC connection on the second network device side is activated.
  • FIG. 16 is a schematic flowchart of a method for handover according to another embodiment of the present application. The method shown in FIG. 16 describes a specific handover procedure when downlink data is transmitted.
  • the switching method 1500 shown in FIG. 16 is similar to the switching method 1100 shown in FIG. 12, and a detailed description is omitted as appropriate to avoid repetition.
  • FIG. 16 and FIG. 12 The difference between FIG. 16 and FIG. 12 will be mainly described below, and the detailed description of the same portions of FIG. 12 and FIG. 12 will be omitted.
  • Steps 1501 to 1504 correspond to 1101 to 1104, with the difference that the messages carrying the corresponding content in steps 1502 and 1503 are a handover request message and a handover request response message.
  • the first network device After the step 1503 or the step 1504, the first network device starts to forward the downlink data to the second network device, for example, the PDCP SDU1...10 is transmitted.
  • the downlink data needs to be prepared in advance at the second network device.
  • the first network device forwarding the data to the second network device increases the storage load of the second network device.
  • the first network device may send a status report (SN status Transfer) to the second network device, indicating which data terminal devices have successfully received, so that the second network device may drop the successfully received data packet, and only save the terminal device has not succeeded. Received data.
  • SN status Transfer SN status Transfer
  • part of the data is also backed up in the second network device.
  • Steps 1505, 1506 correspond to steps 1105, 1106, and the terminal device synchronizes to the second network device, and acquires the uplink resource and the TA.
  • Step 1507 The terminal device sends the first configuration completion message, for example, the RRC connection reconfiguration complete message, to the second network device, using the uplink resource and the TA obtained by the step 1506.
  • the message may also carry a status report (SN Status Report).
  • the status report is used by the terminal device to indicate to the second network device which data packets have been successfully received in the previous process, and which data packets were not successfully received. For example, the data packets 8, 9, 14 are not successfully received.
  • the terminal device begins receiving data from the second network device, and the second network device transmits data and new data that were not successfully received to the terminal device.
  • the second network device sends PDCP SDUs 8, 9, 14 to the terminal device.
  • Step 1508 The terminal device sends a status report to the second network device, for example, whether the status report of the PDCP SDU 8, 9, 14 is successfully received.
  • Steps 1510 and 1511 correspond to 1110 and 1111. See the description in Figure 12.
  • FIG. 17 is a schematic flowchart of a method for handover according to another embodiment of the present application. The method shown in FIG. 17 describes a specific handover procedure when uplink data is transmitted.
  • the switching method 1600 shown in FIG. 17 is similar to the switching method 1200 shown in FIG. 13, and a detailed description is omitted as appropriate to avoid repetition.
  • FIG. 17 and FIG. 13 The difference between FIG. 17 and FIG. 13 will be mainly described below, and the detailed description of the same portions of FIG. 17 and FIG. 13 will be omitted.
  • Steps 1601 to 1604 correspond to 1201 to 1204, except that the messages carrying the corresponding content in step 1602 and step 1603 are a handover request message and a handover request response message.
  • the first network device After the step 1603 or the step 1604, the first network device starts to forward the uplink data to the second network device. At this time, the first network device can continue to forward the uplink data to the CN, and the second network device backs up the uplink data.
  • the first network device may send a status report (SN status Transfer) to the second network device, and notify the second network device which data has been delivered to the CN, and the second network device may drop the data and save only the first network device. There are no packets submitted to the CN.
  • SN status Transfer SN status Transfer
  • the first network device is delivered to the CN after being decrypted, sorted, etc., and forwarded to the second network device for the data that is not delivered.
  • Steps 1605, 1606 and 1205 to 1206 correspond to the terminal device synchronization to the second network device, and acquire the uplink resource and the TA.
  • the terminal device sends a first configuration complete message to the second network device.
  • the terminal device may send a first configuration complete message (also referred to as an RRC Connection Reconfiguration Complete message) to the second network device, indicating that the terminal device successfully accesses the second network device.
  • a first configuration complete message also referred to as an RRC Connection Reconfiguration Complete message
  • the terminal device sends the uplink data to the first network device.
  • the terminal device starts to send the uplink data to the second network device, and the terminal device first sends the second network device to the second network device that is not successfully received.
  • a packet for example, PDCP SDU7 is then sent a new packet (for example, PDCP SDU 9, 10).
  • the second network device After receiving the RRC connection reconfiguration complete message and the corresponding data, the second network device starts to deliver uplink data (for example, PDCP SDU 7, 8, 9, 10) to the CN.
  • 1609, 1610 corresponds to 1209, 1210. See the description in Figure 13.
  • FIG. 12 to FIG. 17 are merely for facilitating the understanding of the embodiments of the present application, and the embodiments of the present application are not limited to the specific numerical values or specific scenarios illustrated. A person skilled in the art will be able to make various modifications and changes in the embodiments according to the examples of FIG. 12 to FIG. 17. The modifications or variations are also within the scope of the embodiments of the present application.
  • FIG. 18 shows a schematic block diagram of a first network device 1700 according to an embodiment of the present application.
  • the first network device 1700 includes a processing unit 1710 and a transceiver unit 1720.
  • the processing unit controls the transceiver unit to send a first configuration message to the terminal device, where the first configuration message is used to instruct the terminal device to configure a second encryption/decryption function associated with the second network device, and Sharing a first data packet number/sort function, wherein the terminal device is configured with a first encryption/decryption function associated with the first network device and the first data packet number/sort function;
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the second network device is configured with a third encryption/decryption function, and the third encryption/decryption function corresponds to the second encryption/decryption function, the first network device A fourth encryption/decryption function is configured, the fourth encryption/decryption function corresponding to the first encryption/decryption function.
  • the processing unit is further configured to configure a fifth encryption/decryption function, where the fifth encryption/decryption function corresponds to the second encryption/decryption function.
  • the terminal device is configured with a second packet data convergence protocol PDCP entity and a first PDCP entity, where the second PDCP entity includes the second encryption/decryption function and the second data packet. a numbering/sorting function, the first PDCP entity including the first encryption/decryption function and the first packet number/sort function,
  • the first data packet number/sort function in the first PDCP entity is decrypted by the second encryption/decryption function in the second PDCP entity. Sorting data,
  • the first data packet number is processed by the first data packet number/sort function in the first PDCP entity, and then sent to the first PDCP entity for the first encryption/decryption.
  • the function and/or the second encryption/decryption function in the second PDCP entity performs an encryption process
  • the terminal device is established with a second encryption/decryption function and a first PDCP entity, the first PDCP entity including the first encryption/decryption function and the first packet number/sort function,
  • the first data packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted through the second encryption/decryption function
  • the first data packet number is processed by the first data packet number/sort function in the first PDCP entity, and then sent to the first PDCP entity for the first encryption/decryption.
  • the function and/or the second encryption/decryption function performs an encryption process.
  • the transceiver unit is further configured to: before sending the first configuration message to the terminal device,
  • third indication information indicating whether the data forwarded by the first network device to the second network device is a duplicate version or a non-repeated version
  • the second network device configures configuration parameters of the PDCP entity of the terminal device
  • the second network device configures the terminal device to establish a configuration corresponding to the second header addition/removal function and/or the second encryption/decryption function and/or the second header compression/decompression function of the second network device parameter,
  • the transceiver unit is further configured to: after receiving the first configuration completion message sent by the terminal device,
  • the eighth indication information is sent to the terminal device, where the eighth indication information is used to instruct the terminal device to initiate an RRC connection with the second network device.
  • the transceiver unit is further configured to:
  • the second network device sends unencrypted first data to the second network device, such that the second network device encrypts the first data using a third encryption/decryption function, the first data being the first network Part or all of all data received by the PDCP layer of the device from the upper layer of the PDCP layer;
  • the transceiver unit is further configured to:
  • the first network device decrypts the fourth data using a fifth encryption/decryption function.
  • the transceiver unit is further configured to send, to the second network device, ninth indication information, where the ninth indication information is used to indicate downlink data that the terminal device has successfully received, So that the second network device discards downlink data that the terminal device has successfully received.
  • the transceiver unit is further configured to send tenth indication information to the second network device, where the tenth indication information is used to indicate that the first network device has successfully delivered the first Uplink data of the third network device, so that the second network device discards uplink data that the first network device has successfully delivered to the third network device.
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the first network device 1700 shown in FIG. 18 can implement the processes involved in the first network device in the method embodiments of FIG. 2 to FIG.
  • the operations and/or functions of the various modules in the first network device 1700 are respectively implemented in order to implement the corresponding processes in the method embodiments in FIGS. 2 to 17.
  • the detailed description is omitted here.
  • FIG. 19 shows a schematic block diagram of a second network device 1800 according to an embodiment of the present application.
  • the second network device 1800 includes a processing unit 1810 and a transceiving unit 1820.
  • the processing unit controls the transceiver unit to receive a first request message sent by the first network device, where the first request message is used to request to switch the terminal device to the second network device or the A request message is used to request to add the second network device to the terminal device as a secondary service device, where the first request message includes at least one of the following:
  • third indication information indicating whether the data forwarded by the first network device to the second network device is a duplicate version or a non-repeated version
  • the response message is used to indicate that the second network device accepts the request of the first request message of the first network device, where the response message includes at least one of the following:
  • the second network device configures the terminal device to establish a configuration corresponding to the second header addition/removal function and/or the second encryption/decryption function and/or the second header compression/decompression function of the second network device parameter,
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the processing unit is further configured to configure a third encryption/decryption function, where the third encryption/decryption function corresponds to the second encryption/decryption function,
  • the first network device is configured with a fourth encryption/decryption function, and the fourth encryption/decryption function corresponds to the first encryption/decryption function.
  • the first network device is configured with a fifth encryption/decryption function, and the fifth encryption/decryption function corresponds to the second encryption/decryption function.
  • the terminal device is established with a second PDCP entity and a first PDCP entity, where the second PDCP entity includes the second encryption/decryption function and the second data packet number/sort function
  • the first PDCP entity includes the first encryption/decryption function and the first packet number/sort function
  • the first data packet number/sort function in the first PDCP entity is decrypted by the second encryption/decryption function in the second PDCP entity.
  • Data is sorted;
  • the first data packet number is processed by the first data packet number/sort function in the first PDCP entity, and then sent to the first PDCP entity for the first encryption/decryption.
  • the function and/or the second encryption/decryption function in the second PDCP entity performs an encryption process
  • the terminal device is configured with a second encryption/decryption function and a first PDCP entity, the first PDCP entity including the first encryption/decryption function and the first data packet number/sort function,
  • the first data packet number/sort function in the first PDCP entity performs a sorting process on the data decrypted through the second encryption/decryption function
  • the first data packet number is processed by the first data packet number/sort function in the first PDCP entity, and then sent to the first PDCP entity for the first encryption/decryption.
  • the function and/or the second encryption/decryption function performs an encryption process.
  • the transceiver unit is further configured to receive sixth indication information that is sent by the first network device, where the sixth indication information is used to indicate that the terminal device has completed RRC connection reconfiguration. .
  • the transceiver unit is further configured to receive the unencrypted first data sent by the first network device,
  • the processing unit is further configured to encrypt the first data by using a third encryption/decryption function, where the first data is all data received by a PDCP layer of the first network device from an upper layer of the PDCP layer. Part or all of;
  • the transceiver unit is further configured to send, to the first network device, second data that is decrypted using a third encryption/decryption function.
  • the transceiver unit is further configured to receive, by the first network device, third data encrypted by a fifth encryption/decryption function, where the third data is the first network. Part or all of all data received by the PDCP layer of the device from the upper layer of the PDCP layer;
  • the transceiver unit is further configured to receive ninth indication information that is sent by the first network device, where the ninth indication information is used to indicate downlink data that the terminal device has successfully received. So that the second network device discards downlink data that the terminal device has successfully received.
  • the transceiver unit is further configured to receive the tenth indication information sent by the first network device, where the tenth indication information is used to indicate that the first network device has been successfully delivered to Uplink data of the third network device, so that the second network device discards uplink data that the first network has successfully delivered to the third network device.
  • the transceiver unit is further configured to send an eleventh indication message to the first network device after the second network device establishes an RRC connection with the terminal device, where The eleventh indication information is used to indicate that the first network device stops sending downlink data to the terminal device.
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the second network device 1800 shown in FIG. 19 can implement the processes involved in the second network device in the method embodiments of FIGS. 2-17.
  • the operations and/or functions of the various modules in the second network device 1800 are respectively implemented to implement the respective processes in the method embodiments of FIGS. 2-17.
  • the detailed description is omitted here.
  • FIG. 20 shows a schematic block diagram of a terminal device 1900 according to an embodiment of the present application.
  • the terminal device 1900 includes a processing unit 1910 and a transceiver unit 1920.
  • the processing unit controls the transceiver unit to receive a first configuration message sent by the first network device, where the first configuration message is used to instruct the terminal device to configure a second encryption/decryption function associated with the second network device. And sharing a first data packet number/sort function, wherein the terminal device is configured with a first encryption/decryption function associated with the first network device and the first data packet number/sort function;
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the second network device is configured with a third encryption/decryption function, and the third encryption/decryption function corresponds to the second encryption/decryption function, the first network device A fourth encryption/decryption function is configured, the fourth encryption/decryption function corresponding to the first encryption/decryption function.
  • the first network device is configured with a fifth encryption/decryption function, and the fifth encryption/decryption function corresponds to the second encryption/decryption function.
  • the terminal device is configured with a second packet data convergence protocol PDCP entity and a first PDCP entity, where the second PDCP entity includes the second encryption/decryption function and the second data packet. a numbering/sorting function, the first PDCP entity including the first encryption/decryption function and the first packet number/sort function,
  • the processing unit is further configured to:
  • the control is performed by the first data packet numbering/sorting function in the first PDCP entity, and the first data encryption is sent to the first PDCP entity.
  • Decrypting function and/or said second encryption/decryption function in said second PDCP entity performs encryption processing;
  • the terminal device is configured with a second encryption/decryption function and a first PDCP entity, the first PDCP entity including the first encryption/decryption function and the first data packet number/sort function,
  • the processing unit is further configured to:
  • the first data packet number/sort function in the first PDCP entity is controlled to perform sorting processing on the data decrypted by the second encryption/decryption function;
  • the control is performed by the first data packet numbering/sorting function in the first PDCP entity, and the first data encryption is sent to the first PDCP entity.
  • the decryption function and/or the second encryption/decryption function perform an encryption process.
  • the transceiver unit is further configured to receive, by the first network device, seventh indication information, where the seventh indication information is used to indicate that the terminal device releases the first RRC connection of the network device;
  • processing unit is further configured to release an RRC connection with the first network device
  • the transceiver unit is further configured to receive the eighth indication information that is sent by the first network device, where the eighth indication information is used to instruct the terminal device to initiate an RRC connection with the second network device.
  • processing unit is further configured to initiate an RRC connection with the second network device.
  • the terminal device may configure a function associated with the second network device by using the first configuration information, and then, during the handover, the terminal device may simultaneously perform data transmission with the second network device and the first network device. Reduce or avoid business interruption time caused by handover.
  • the terminal device 1900 shown in FIG. 20 can implement various processes related to the terminal device in the method embodiments of FIGS. 2 to 17.
  • the operations and/or functions of the various modules in the terminal device 1900 are respectively implemented in order to implement the corresponding processes in the method embodiments of FIGS. 2 to 17.
  • the detailed description is omitted here.
  • FIG. 21 shows a schematic block diagram of a first network device 2000 in accordance with an embodiment of the present application.
  • the first network device 2000 includes: a processor 2010 and a transceiver 2020.
  • the processor 2010 is connected to the transceiver 2020.
  • the network device 2000 further includes a memory 2030, and the memory 2030 and The processor 2010 is coupled, wherein the processor 2010, the memory 2030, and the transceiver 2020 communicate with one another via internal connection paths to communicate control and/or data signals.
  • the memory 2030 can be used to store instructions for executing the instructions stored in the memory 2030, control the transceiver 2020 to receive information or signals, and the controller 2010 can execute the instructions in the memory 2030 to complete the above FIG. 2 to FIG.
  • the method of the first network device is involved in the method embodiment. To avoid repetition, we will not repeat them here.
  • FIG. 22 shows a schematic block diagram of a second network device 2100 in accordance with an embodiment of the present application.
  • the second network device 2100 includes a processor 2110 and a transceiver 2120.
  • the processor 2110 is connected to the transceiver 2120.
  • the second network device 2100 further includes a memory 2130.
  • 2130 is coupled to processor 2110, wherein processor 2110, memory 2130, and transceiver 2120 communicate with one another via internal connection paths to communicate control and/or data signals.
  • the memory 2130 can be used to store instructions.
  • the processor 2110 is configured to execute the instructions stored in the memory 2130 to control the transceiver 2120 to receive information or signals.
  • the controller 2110 can execute the instructions in the memory 2130 to complete the above-mentioned FIG. 2 to FIG.
  • Various processes of the second network device are involved in the method embodiments. To avoid repetition, we will not repeat them here.
  • FIG. 23 shows a schematic block diagram of a terminal device 2200 according to an embodiment of the present application.
  • the terminal device 2200 includes a processor 2210 and a transceiver 2220.
  • the processor 2210 is connected to the transceiver 2220.
  • the network device 2200 further includes a memory 2230, a memory 2230 and a processor. 2210 is connected wherein processor 2210, memory 2230 and transceiver 2220 communicate with one another via internal connection paths to communicate control and/or data signals.
  • the memory 2230 can be used to store instructions.
  • the processor 2210 is configured to execute the instructions stored in the memory 2230 to control the transceiver 2220 to transmit information or signals.
  • the controller 2210 can execute the instructions in the memory 2230 to complete the above-mentioned FIG. 2 to FIG.
  • the method embodiments involve various processes of the terminal device. To avoid repetition, we will not repeat them here.
  • the foregoing method embodiments of the present application may be applied to a processor (for example, the processor 2010 in FIG. 21, the processor 2110 in FIG. 22, or the processor 2210 in FIG. 23), or by a processor.
  • the processor may be an integrated circuit chip with signal processing capabilities.
  • each step of the foregoing method embodiment may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software.
  • the processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA), or the like. Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly implemented by the hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory, and the processor reads the information in the memory and combines the hardware to complete the steps of the above method.
  • the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read only memory (PROM), an erasable programmable read only memory (Erasable PROM, EPROM), or an electric Erase programmable read only memory (EEPROM) or flash memory.
  • the volatile memory can be a Random Access Memory (RAM) that acts as an external cache.
  • RAM Random Access Memory
  • many forms of RAM are available, such as static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (Synchronous DRAM).
  • SDRAM Double Data Rate SDRAM
  • DDR SDRAM Double Data Rate SDRAM
  • ESDRAM Enhanced Synchronous Dynamic Random Access Memory
  • SLDRAM Synchronous Connection Dynamic Random Access Memory
  • DR RAM direct memory bus random access memory
  • the communication device in the embodiment of the present application may be a terminal device, or may be another device.
  • the foregoing description is only taking the communication device as a terminal device as an example, but the embodiment of the present application is not limited thereto.
  • Other devices may include other forms of equipment such as circuits.
  • the communication device in the embodiment of the present application may refer to the device shown in FIG. 24, which includes a processor 2301, an application processor, a memory user interface, and other components (including devices such as a power source not shown).
  • the processing unit in the above terminal device may be the processor 2301 and perform the corresponding function.
  • the transceiver unit in the foregoing terminal device may be a wireless transceiver 2303 in the figure, which performs a corresponding function through an antenna. It will be understood that the various elements shown in the figures are merely illustrative and are not essential elements of the embodiments.
  • the communication device in this embodiment can refer to the device shown in FIG. 25.
  • the device can perform functions similar to the processor of Figure 24.
  • the device includes a processor, a transmit data processor, and a processor.
  • the processing unit in the above terminal device may be the processor 2401 and perform the corresponding function.
  • the transceiver unit in the above terminal device may include a transmitting unit and a receiving unit, and the transmitting unit may be the transmitting data processor 2403 in FIG. 25, and the receiving unit may be the receiving data processor 2405 in FIG. 25.
  • a channel coder and a channel decoder are shown in the drawings, it is to be understood that these modules are not intended to be limiting, and are merely illustrative.
  • the processing device 2500 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem.
  • the communication device in this embodiment can be used as a modulation subsystem therein.
  • the modulation subsystem may include a processor 2503, an interface 2504.
  • the processor 2503 performs the functions of the above processing unit, and the interface 2504 performs the functions of the above sending unit and/or receiving unit.
  • the modulation subsystem includes a memory 2506, a processor 2503, and a program stored on the memory and executable on the processor, the processor executing the program to implement one of the first to fifth embodiments method.
  • the memory 2506 may be non-volatile or volatile, and its location may be located inside the modulation subsystem or in the processing device 2500 as long as the memory 2506 can be connected to the The processor 2503 can be.
  • the processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), or a field programmable gate array (FPGA). Or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly implemented by the hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a random access memory (RAM), a flash memory, a read-only memory (ROM), a programmable read only memory or an electrically erasable programmable memory, a register, etc.
  • RAM random access memory
  • ROM read-only memory
  • programmable read only memory programmable read only memory
  • electrically erasable programmable memory a register, etc.
  • the storage medium is located in the memory 2502, and the processor 2501 reads the instructions in the memory 2502 and performs the steps of the above method in combination with its hardware.
  • system and “network” are used interchangeably herein.
  • the term “and/or” in this context is merely an association describing the associated object, indicating that there may be three relationships, for example, A and / or B, which may indicate that A exists separately, and both A and B exist, respectively. B these three situations.
  • the character "/" in this article generally indicates that the contextual object is an "or" relationship.
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B from A does not mean that B is only determined based on A, and that B can also be determined based on A and/or other information.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of cells is only a logical function division.
  • multiple units or components may be combined or integrated. Go to another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, or an electrical, mechanical or other form of connection.
  • the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, i.e., may be located in one place, or may be distributed over multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiments of the present application.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • computer readable media may comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, disk storage media or other magnetic storage device, or can be used for carrying or storing in the form of an instruction or data structure.
  • Any connection may suitably be a computer readable medium.
  • the software is transmitted from a website, server, or other remote source using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave
  • the coaxial cable , fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, wireless, and microwave are included in the fixing of the associated media.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disc, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请实施例提供了一种切换的方法和设备,该包括:第一网络设备向终端设备发送第一配置消息,该第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,该终端设备配置有与该第一网络设备关联的第一加密/解密功能和该第一数据包编号/排序功能;该第一网络设备接收该终端设备发送的第一配置完成消息。本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。

Description

切换的方法和设备
本申请要求于2017年03月24日提交中国专利局、申请号为201710186542.6、申请名称为“切换的方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,并且更具体地,涉及切换的方法和设备。
背景技术
移动通信不仅追求容量的最大化,而且需要更广阔的覆盖范围,即无论终端设备移动到哪里,都要有无线网络信号覆盖。为了解决频率资源限制的问题,并增大系统容量,同时扩展网络覆盖范围,美国贝尔实验室提出蜂窝组网概念。它将一个网络服务区划分成许多以正六边形为基本几何图形的覆盖区域,称为蜂窝小区。一个较低功率的发射机服务一个蜂窝小区,在较小的区域内设置相当数量的终端设备。事实上,不是所有的终端设备都能在一个蜂窝小区内完成全部接续业务的,为了保证业务的连续性,当正在接受服务的终端设备进入相邻小区时,通信网络需要将业务切换到相邻小区,从而不中断通信过程。
切换是指在移动通信的过程中,为保证通信不中断,把承载通信数据的链路由一个小区(或网络设备)切换到另一个小区(或网络设备)的过程。
现有技术中,随着业务类型的增加,业务数据量猛增,加之终端设备移动速度的增加,对切换过程中的业务中断时间要求越来越苛刻。例如,移动办公、移动视频业务、汽车无线控制、列车无线控制等,要求业务零中断。然而,现有技术中在切换时通常业务都会中断,影响用户体验。
因此,如何降低或避免切换时业务的中断,成为亟待解决的问题。
发明内容
本申请实施例提供一种切换的方法和设备,能够降低或避免切换时业务的中断。
第一方面,提供了一种切换的方法,该方法包括:
第一网络设备向终端设备发送第一配置消息,该第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,该终端设备配置有与该第一网络设备关联的第一加密/解密功能和该第一数据包编号/排序功能;
该第一网络设备接收该终端设备发送的第一配置完成消息。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
应理解,本申请实施例中终端设备配置的第一加密/解密功能即能对数据进行加密处理,也能对数据进行解密处理。其中“/”表示该第一加密/解密功能对同一数据只能择一选择相应的处理,例如,该第一加密/解密功能可以对上行数据进行加密处理,该第一加密/解密功能可以对下行数据进行解密处理。类似地,第一数据包编号/排序功能,即能对数据进行编号处理,也能对数据进行排序处理;其中“/”表示该第一数据包编号/排序功能对同一数据只能择一选择相应的处理,例如,该第一数据包编号/排序功能可以对上行数据进行编号处理,该第一数据包编号/排序功能可以对下行数据进行排序处理。类似地,本文中的其他的功能与此类似,为避免重复,此处不再一一赘述。
可选地,作为一种实现方式,在该第一网络设备向终端设备发送第一配置消息之前,该方法还包括:
该第一网络设备向该第二网络设备发送第一请求消息,该第一请求消息用于请求将该终端设备切换至该第二网络设备或者该第一请求消息用于请求为该终端设备添加该第二网络设备为辅助服务设备,其中该第一请求消息中包括以下至少一项:
该第一网络设备为该第二网络设备分配的与该终端设备关联的第一安全密钥、
该第一网络设备使用的与该终端设备关联的第二安全密钥、
指示该终端设备具有多连接式的切换能力的第一指示信息、
指示该终端设备具有多连接通信能力的第二指示信息、
指示该第一网络设备向该第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息;
该第一网络设备接收该第二网络设备发送的应答消息,该应答消息用于指示该第二网络设备接受该第一网络设备的第一请求消息的请求,该应答消息中包括以下至少一项:
该第二网络设备为该终端设备分配的第三安全密钥、
该第二网络设备配置该终端设备的分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)实体的配置参数、
该第二网络设备配置该终端设备建立对应该第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能的配置参数、
指示该终端设备使用该第一数据包编号/排序功能的第四指示信息、
指示该终端设备在与该第二网络设备通信时使用该第一网络设备为该终端设备分配的与该第一网络设备对应的安全密钥的第五指示信息。
具体而言,起始状态,终端设备与第一网络设备(例如,SeNB)建立有RRC连接,终端设备向第一网络设备发送测量报告,测量报告中包括第一网络设备(或第一小区)和第一网络设备的相邻的网络设备(或相邻小区)的测量结果。该测量报告中包括参考信号接收功率(Reference Signal Received Power,RSRP)和/或参考信号接收质量(Reference Signal Received Quality,RSRQ)和/或信号干扰噪声比(Signal Interference Noisy Ratio,SINR)。其中该终端设备发送测量报告的方式或时机可以由第一网络设备配置,本申请实施例并不对此做限定。
第一网络设备根据该测量报告,确定该终端设备满足切换条件时,即启动切换流程。例如,在第一网络设备的信号变弱时,即启动切换流程。具体而言,网络设备可以决定为该终端设备增加一个辅基站(Secondary eNB)之后切换至该辅基站,其中,辅基站也可 以称为目标基站TeNB,
具体的,第一网络设备向第二网络设备(例如,TeNB)发送第一请求消息。
应理解,第一安全密钥是第一网络设备分配给第二网络设备的,以用于第二网络设备与终端设备之间的数据传输,其中,第二网络设备可以直接使用该密钥与终端设备进行数据传输,或第二网络设备根据第一安全密钥生成另一新的安全密钥,然后使用新的安全密钥来与终端设备进行数据传输。
第二安全密钥是第一网络设备与终端设备之间进行数据传输的密钥,第一网络设备可以将该密钥发送给第二网络设备,以用于第二网络设备与终端设备之间的数据传输,其中,第二网络设备可以直接使用该密钥与终端设备进行数据传输,或第二网络设备根据第二安全密钥生成另一新的安全密钥,然后使用新的安全密钥来与终端设备进行数据传输。
第一指示信息用于指示终端设备具有多连接式的切换能力,其中多连接式的切换可以理解为UE在切换的过程中,可以提前与两个或两个以上的基站建立连接,然后释放掉源基站。
第二指示信息用于指示终端设备具有多连接通信的能力,其中多连接通信可以理解为UE可以与两个或两个以上的基站进行通信。
第三指示信息用于指示第一网络设备向该第二网络设备转发的数据是重复版本还是非重复版本,重复版本可以理解为对于一个数据包,第一网络设备会复制一份,发送到第二网络设备。这样第一网络设备和第二网络设备向终端设备发送的这个数据包,其实是重复的,这样可以提高UE接收的可靠性。非重复版本可以理解为对于一个数据包,要么保留在第一网络设备上,要么发送到第二网络设备上。UE在接收第一网络设备和第二网络设备发送的数据时,不会收到重复的数据。
在当第三指示信息指示第一网络设备向第二网络设备转发重复版本时,第一网络设备和第二网络设备可以通过两条链路向终端设备发送相同的数据,这样可以提高数据传输的可靠性;例如,针对下行数据包1,2,3,第一网络设备向终端设备发送一次数据包1,2,3,第一网络设备在向第二网络设备转发数据包1,2,3,然后第二网络设备再向终端设备发一次数据包1,2,3。当第三指示信息指示第一网络设备向第二网络设备转发的数据是非重复版本时,即来自核心网的下行数据数据,一部分通过第一网络设备发送至终端设备,一部分通过第二网络设备发送至终端设备;例如针对下行数据包1,2,3,4,第一网络设备向终端设备发送数据包1,3,第一网络设备将数据包2,4转发给第二网络设备,由第二网络设备将数据包2,4发送给终端设备。
第四指示信息用于指示使用第一数据包编号/排序功能,可以理解为经由第一数据包编号/排序功能编号的上行数据,可以发送至第一头压缩/解压缩功能进行压缩处理,还可以发送至第二头压缩/解压缩功能进行处理,然后再由各自(头压缩/解压缩功能)对应的加密/解密功能和头添加/移除功能进行相应处理。或者,可以理解为经同第一数据包编号/排序功能编号的上行数据,发送至第一头压缩/解压缩功能进行压缩处理,然后可以发送至第一加密/解密功能进行加密,还可以发送至第二加密/解密功能进行加密。对于下行数据,可以使用相反的过程。
还应理解,第二网络设备在接收到第一网络设备发送的请求消息时可以获知第一网络设备与终端设备关联的第二安全密钥,第二网络设备可以通过第五指示信息指示终端设 备使用该第二安全密钥与第二网络设备通信。由于无需传递具体的安全密钥,这里仅通过发送一个指示信息即第五指示信息,由于指示信息的数据量较小,例如该指示信息可以为1或0仅一个比特,能够减小信令开销,节省网络资源。
可选地,该第一请求消息中还可以包括以下中的至少一种,
第一网络设备的标识(例如,eNB ID)、第一网络设备的服务PLMN,第一网络设备的服务网关(Serving Gateway,S-GW)的标识,第二网络设备的标识、SeNB与S-GW之间的(接口S1)、用于发送数据的隧道标识、终端设备的服务质量(Quality of Service,QoS)参数、第一网络设备和第二网络设备之间的(X2接口)、用于发送上行数据的隧道标识;终端设备的上下文信息(UE context)等。
可选地,作为一种实现方式,该第二网络设备配置有第三加密/解密功能,该第三加密/解密功能与该第二加密/解密功能对应,该第一网络设备配置有第四加密/解密功能,该第四加密/解密功能与该第一加密/解密功能对应。
具体地,在第一网络设备向第二网络设备发送第一请求消息前,该终端设备配置有与第一网络设备对应的第一PDCP实体,如图4所示,第一PDCP实体包含第一头添加/移除功能、第一包头压缩/解压缩功能、第一加密/解密功能、第一数据包编号/排序功能。
应理解,本申请实施例中的安全密钥可以用于PDCP层的加密/解密。该第三安全密钥可以与第一安全密钥或第二安全密钥相同。在第三安全密钥与第一安全密钥相同时,表明第二网络设备采用第一网络设备为第二网络设备分配的密钥与终端设备进行通信。在第三安全密钥与第二安全密钥相同时,表明第二网络设备与第一网络设备使用相同的密钥与终端设备进行通信,这样终端设备可以避免采用新的密钥对数据进行加密或解密处理,因此能够提高数据处理速度,提高系统性能。
该第二网络设备配置该终端设备的PDCP实体的配置参数,该配置参数用于配置终端设备的PDCP实体的功能,
可选地,作为一种实现方式,该方法还包括:
该第一网络设备配置第五加密/解密功能,该第五加密/解密功能与该第二加密/解密功能对应。
也就是说第一网络设备可以同时配置与终端设备通信的对应第一加密/解密功能的第四加密/解密功能,和与终端设备通信的对应第二加密/解密功能的第五加密/解密功能。
可选地,作为一种实现方式,该终端设备建立有第二分组数据汇聚协议PDCP实体和第一PDCP实体,该第二PDCP实体包括该第二加密/解密功能和第二数据包编号/排序功能,该第一PDCP实体包括该第一加密/解密功能和该第一数据包编号/排序功能,
在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二PDCP实体中的该第二加密/解密功能解密处理后的数据进行排序处理,
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二PDCP实体中的该第二加密/解密功能进行加密处理;
或者,
该终端设备建立有第二加密/解密功能和第一PDCP实体,该第一PDCP实体包括该第一加密/解密功能和该第一数据包编号/排序功能,
在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二加密/解密功能解密处理后的数据进行排序处理,
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二加密/解密功能进行加密处理。
可选地,作为一种实现方式,该方法还包括:
该第一网络设备向该第二网络设备发送未加密的第一数据,以使得该第二网络设备使用第三加密/解密功能对该第一数据进行加密,该第一数据为该第一网络设备的PDCP层从该PDCP层的上层接收到的全部数据的部分或全部;
或者,
该第一网络设备接收该第二网络设备发送的使用第三加密/解密功能解密后的第二数据。
可选地,作为一种实现方式,该方法还包括:
该第一网络设备将经过第五加密/解密功能加密的第三数据发送至该第二网络设备,该第三数据为该第一网络设备的PDCP层从该PDCP层的上层接收到的全部数据的部分或全部;
或者,
该第一网络设备接收该第二网络设备发送的、未解密的第四数据;
该第一网络设备使用第五加密/解密功能对该第四数据解密。
具体而言,终端设备内部建立有与第一网络设备通信的第一PDCP实体,该第一PDCP实体包括该第一加密/解密功能和该第一数据包编号/排序功能,该第一PDCP实体还可以包括第一头添加/移除功能和第一包头压缩/解压缩功能。在终端设备接收到第一配置信息后,可以配置与第二网络设备通信的相应功能,或配置与第二网络设备同的第二PDCP实体,该第二PDCP实体包括该第二加密/解密功能和第二数据包编号/排序功能,该第二PDCP实体还可以包括第二头添加/移除功能和第二包头压缩/解压缩功能。
由于终端设备共享第一数据包编号/排序功能,因此,在处理下行数据时,该终端设备对经由该第二PDCP实体中的该第二加密/解密功能解密处理后的下行数据,由该第一PDCP实体中的该第一数据包编号/排序功能进行排序处理。
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二PDCP实体中的该第二加密/解密功能进行加密处理。
应理解,由于终端设备共享第一数据包编号/排序功能,终端设备虽然配置了PDCP中的第二数据包编号/排序功能,但是在实际应用中不会使用该第二数据包编号/排序功能。
因此,可替代地,在终端设备接收到第一配置信息后,无需配置整个第二PDCP实体,可以仅配置与第二网络设备通信的第二加密/解密功能,其他功能沿用第一PDCP实体的功能,例如,共享第一数据包编号/排序功能、第一头添加/移除功能和第一包头压缩/解压缩功能。
在这种情况下,在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二加密/解密功能解密处理后的数据进行排序处理;
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二加密/解密功能进行加密处理。
因此,本申请实施例中,终端设备在与第二网络设备通信时,通过共享第一数据包编号/排序功能,可以仅配置与第二网络设备通信的第二加密/解密功能,无需配置完整的PDCP实体,减小配置时间,提高切换性能。
可替代地,在终端设备接收到第一配置信息后,无需配置整个第二PDCP实体,如可以仅配置与第二网络设备通信的第二加密/解密功能和第二头添加/移除功能,其他功能沿用第一PDCP实体的功能,例如,共享第一数据包编号/排序功能和第一包头压缩/解压缩功能。
在这种情况下,在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二加密/解密功能解密处理后的数据进行排序处理;
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二加密/解密功能进行加密处理。
因此,本申请实施例中,终端设备在与第二网络设备通信时,通过共享第一数据包编号/排序功能,可以仅配置与第二网络设备通信的第二加密/解密功能和第二头添加/移除功能,无需配置完整的PDCP实体,减小配置时间,提高切换性能。
可选地,作为另一实施例,第二网络设备配置有与该终端设备通信的第三加密/解密功能,该第三加密/解密功能与该第二加密/解密功能对应。
应理解,第一网络设备配置有与终端设备通信的第四加密/解密功能,该第四加密/解密功能与该第一加密/解密功能对应。
应理解,本申请实施例中两个加密/解密功能对应,表示一个加密/解密功能使用一种密钥对数据进行加密处理后,第二个加密/解密功能能够使用该一种密钥进行相反的过程解密出该数据。
例如,本申请实施例中第四加密/解密功能与第一加密/解密功能对应表示终端设备使用第一加密/解密功能加密上行数据后,网络设备的第四加密/解密功能能够解密出第一加密/解密功能加密后的上行数据。类似地,网络设备使用第四加密/解密功能加密下行数据后,终端设备的第一加密/解密功能能够解密出第四加密/解密功能加密后的下行数据。
也就说,对应的两个加密/解密功能中一个加密/解密功能对数据进行加密处理后,另一个加密/解密功能能够使用相反的过程进行解密获取到该数据。
可选地,作为一种实现方式,在该第一网络设备接收该终端设备发送的第一配置完成消息之后,该方法还包括:
该第一网络设备向该第二网络设备发送第六指示信息,该第六指示信息用于指示该终端设备已完成RRC连接重配置;
或者,
该第一网络设备向该终端设备发送第七指示信息,该第七指示信息用于指示该终端设备释放与该第一网络设备的RRC连接;
或者,
该第一网络设备向该终端设备发送第八指示信息,该第八指示信息用于指示该终端设备启动与该第二网络设备的RRC连接。
可选地,作为一种实现方式,该方法还包括:
该第一网络设备向该第二网络设备发送第九指示信息,该第九指示信息用于指示该终端设备已成功接收的下行数据,以便该第二网络设备丢弃该终端设备已成功接收的下行数据。
可选地,作为一种实现方式,该方法还包括:
该第一网络设备向该第二网络设备发送第十指示信息,该第十指示信息用于指示该第一网络设备已成功递交到第三网络设备的上行数据,以便该第二网络设备丢弃该第一网络设备已成功递交到第三网络设备的上行数据。
因此,本实施例在切换准备阶段,先建立起终端设备与第二网络设备之间的连接,并配置其间的RRC配置信息,在切换执行阶段,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
第二方面,提供了一种切换的方法,该方法包括:
第二网络设备接收第一网络设备发送的第一请求消息,该第一请求消息用于请求将终端设备切换至该第二网络设备或者该第一请求消息用于请求为该终端设备添加该第二网络设备为辅助服务设备,其中该第一请求消息中包括以下至少一项:
该第一网络设备为该第二网络设备分配的与该终端设备关联的第一安全密钥、
该第一网络设备使用的与该终端设备关联的第二安全密钥、
指示该终端设备具有多连接式的切换能力的第一指示信息、
指示该终端设备具有多连接通信能力的第二指示信息、
指示该第一网络设备向该第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息;
第二网络设备向第一网络设备发送应答消息,以使得该第一网络设备向该终端设备发送第一配置消息,该第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,该终端设备配置有与该第一网络设备关联的第一加密/解密功能和该第一数据包编号/排序功能,其中,该应答消息用于指示该第二网络设备接受该第一网络设备的第一请求消息的请求,该应答消息中包含以下至少一项:
该第二网络设备为该终端设备分配的第三安全密钥、
该第二网络设备配置该终端设备的分组数据汇聚协议PDCP实体的配置参数、
该第二网络设备配置该终端设备建立对应该第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能的配置参数、
指示该终端设备使用该第一数据包编号/排序功能的第四指示信息、
指示该终端设备在与该第二网络设备通信时使用该第一网络设备为该终端设备分配的与该第一网络设备对应的安全密钥的第五指示信息。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
应理解,该第二方面与上述第一方面对应,第二方面的执行主体为第一网络设备,第一方面中的执行主体可以为第二终端设备,第二网络设备侧的方法的相应特征以及对应的有益效果可以参见上述第一方面第一网络设备侧的相应描述,因此,为了简洁,适当省略详细描述。
可选地,作为一种实现方式,该方法还包括:
该第二网络设备配置第三加密/解密功能,该第三加密/解密功能与该第二加密/解密功能对应,
其中,该第一网络设备配置有第四加密/解密功能,该第四加密/解密功能与该第一加密/解密功能对应。
可选地,作为一种实现方式,该第一网络设备配置有第五加密/解密功能,该第五加密/解密功能与该第二加密/解密功能对应。
可选地,作为一种实现方式,该终端设备建立有第二PDCP实体和第一PDCP实体,该第二PDCP实体包括该第二加密/解密功能和第二数据包编号/排序功能,该第一PDCP实体包括该第一加密/解密功能和该第一数据包编号/排序功能,
在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二PDCP实体中的该第二加密/解密功能解密处理后的数据进行排序处理;
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二PDCP实体中的该第二加密/解密功能进行加密处理;
或者,
该终端设备建立有第二加密/解密功能和第一PDCP实体,该第一PDCP实体包括该第一加密/解密功能和该第一数据包编号/排序功能,
在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二加密/解密功能解密处理后的数据进行排序处理;
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二加密/解密功能进行加密处理。
可选地,作为一种实现方式,该方法还包括:
该第二网络设备接收该第一网络设备发送的第六指示信息,该第六指示信息用于指示该终端设备已完成RRC连接重配置。
可选地,作为一种实现方式,该方法还包括:
该第二网络设备接收该第一网络设备发送的未加密的第一数据,
该第二网络设备使用第三加密/解密功能对该第一数据进行加密,该第一数据为该第一网络设备的PDCP层从该PDCP层的上层接收到的全部数据的部分或全部;
或者,
该第二网络设备向该第一网络设备发送使用第三加密/解密功能解密后的第二数据。
可选地,作为一种实现方式,该方法还包括:
该第二网络设备接收该第一网络设备发送的经过第五加密/解密功能加密的第三数据,该第三数据为该第一网络设备的PDCP层从该PDCP层的上层接收到的全部数据的部 分或全部;
或者,
该第二网络设备向该第一网络设备发送未解密的第四数据,以便该第一网络设备使用第五加密/解密功能对该第四数据解密。
可选地,作为一种实现方式,该方法还包括:
该第二网络设备接收该第一网络设备发送的第九指示信息,该第九指示信息用于指示该终端设备已成功接收的下行数据,以便该第二网络设备丢弃该终端设备已成功接收的下行数据。
可选地,作为一种实现方式,该方法还包括:
该第二网络设备接收该第一网络设备发送的第十指示信息,该第十指示信息用于指示该第一网络设备已成功递交到第三网络设备的上行数据,以便该第二网络设备丢弃该第一网络已经成功递交到第三网络设备的上行数据。
可选地,作为一种实现方式,该方法还包括:
在该第二网络设备与该终端设备建立RRC连接之后,该第二网络设备向该第一网络设备发送第十一指示消息,该第十一指示信息用于指示该第一网络设备停止向该终端设备发送下行数据。
因此,本实施例在切换准备阶段,先建立起终端设备与第二网络设备之间的连接,并配置其间的RRC配置信息,在切换执行阶段,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
第三方面,提供了一种切换的方法,该方法包括:
终端设备接收第一网络设备发送的第一配置消息,该第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,该终端设备配置有与该第一网络设备关联的第一加密/解密功能和该第一数据包编号/排序功能;
该终端设备向该第一网络设备发送第一配置完成消息。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
应理解,该第三方面与上述第一方面和第二方面对应,第三方面的执行主体为终端设备,第一方面和第二方面中的执行主体可以为与终端设备交互的第一网络设备和第二网络设备,终端设备侧的方法的相应特征以及对应的有益效果可以参见上述第一方面和第二方面中第一网络设备侧和第二网络设备侧的相应描述,因此,为了简洁,适当省略详细描述。
可选地,作为一种实现方式,该第二网络设备配置有第三加密/解密功能,该第三加密/解密功能与该第二加密/解密功能对应,该第一网络设备配置有第四加密/解密功能,该第四加密/解密功能与该第一加密/解密功能对应。
可选地,作为一种实现方式,该第一网络设备配置有第五加密/解密功能,该第五加密/解密功能与该第二加密/解密功能对应。
可选地,作为一种实现方式,该终端设备建立有第二分组数据汇聚协议PDCP实体 和第一PDCP实体,该第二PDCP实体包括该第二加密/解密功能和第二数据包编号/排序功能,该第一PDCP实体包括该第一加密/解密功能和该第一数据包编号/排序功能,
该方法还包括:
在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二PDCP实体中的该第二加密/解密功能解密处理后的数据进行排序处理;
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二PDCP实体中的该第二加密/解密功能进行加密处理;
或者,
该终端设备建立有第二加密/解密功能和第一PDCP实体,该第一PDCP实体包括该第一加密/解密功能和该第一数据包编号/排序功能,
该方法还包括:
在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二加密/解密功能解密处理后的数据进行排序处理;
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二加密/解密功能进行加密处理。
可选地,作为一种实现方式,该方法还包括:
该终端设备接收该第一网络设备发送的第七指示信息,该第七指示信息用于指示该终端设备释放与该第一网络设备的RRC连接;
或者,
该终端设备接收该第一网络设备发送的第八指示信息,该第八指示信息用于指示该终端设备启动与该第二网络设备的RRC连接。
因此,本实施例在切换准备阶段,先建立起终端设备与第二网络设备之间的连接,并配置其间的RRC配置信息,在切换执行阶段,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
第四方面,提供了一种第一网络设备,用于执行上述第一方面、第一方面的任一可能的实现方式中的方法。具体地,该第一网络设备包括用于执行上述方法的单元。
第五方面,提供了一种第二网络设备,用于执行上述第二方面、第二方面的任一可能的实现方式中的方法。具体地,该第二网络设备包括用于执行上述方法的单元。
第六方面,提供了一种第终端设备,用于执行上述第三方面、第三方面的任一可能的实现方式中的方法。具体地,该第终端设备包括用于执行上述方法的单元。
第七方面,提供了一种第一网络设备,该第一网络设备包括处理器和存储器,该存储器用于存储计算机程序,该处理器用于执行该存储器中存储的计算机程序,执行上述第一方面、第一方面的任一可能的实现方式中的方法。
第八方面,提供了一种第二网络设备,该第二网络设备包括处理器和存储器,该存储器用于存储计算机程序,该处理器用于执行该存储器中存储的计算机程序,执行上述第二方面、第二方面的任一可能的实现方式中的方法。
第九方面,提供了一种终端设备,该终端设备包括处理器和存储器,该存储器用于 存储计算机程序,该处理器用于执行该存储器中存储的计算机程序,执行上述第三方面、第三方面的任一可能的实现方式中的方法。
第十方面,提供了一种计算机可读介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现第一方面或第一方面的任一种可能的实现方式中的方法。
第十一方面,提供了一种计算机可读介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现第二方面或第二方面的任一种可能的实现方式中的方法。
第十二方面,提供了一种计算机可读介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现第三方面或第三方面的任一种可能的实现方式中的方法。
附图说明
图1是本申请一个实施例可应用的通信系统的场景图。
图2是本申请另一实施例可应用的通信系统的场景图。
图3是根据本申请一个实施例的切换的方法示意性流程图。
图4是根据本申请一个实施例的PDCP实体示意图。
图5是根据本申请另一实施例的PDCP实体示意图。
图6是根据本申请另一实施例的PDCP实体示意图。
图7是根据本申请另一实施例的PDCP实体示意图。
图8是根据本申请另一实施例的PDCP实体示意图。
图9是根据本申请一个实施例的数据处理过程示意图。
图10是根据本申请另一实施例的数据处理过程示意图。
图11是根据本申请另一实施例的数据处理过程示意图。
图12是根据本申请另一实施例的切换的方法示意性流程图。
图13是根据本申请另一实施例的切换的方法示意性流程图。
图14是根据本申请另一实施例的切换的方法示意性流程图。
图15是根据本申请另一实施例的切换的方法示意性流程图。
图16是根据本申请另一实施例的切换的方法示意性流程图。
图17是根据本申请另一实施例的切换的方法示意性流程图。
图18是根据本申请一个实施例的第一网络设备的示意框图。
图19是根据本申请一个实施例的第二网络设备的示意框图。
图20是根据本申请一个实施例的终端设备的示意框图。
图21是根据本申请另一实施例的第一网络设备的示意框图。
图22是根据本申请另一实施例的第二网络设备的示意框图。
图23是根据本申请另一实施例的终端设备的示意框图。
图24是根据本申请实施例提供的通信设备的一种结构示意图。
图25是根据本申请实施例提供的通信设备的又一种结构示意图。
图26是根据本申请实施例提供的通信设备的又一种结构示意图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例可应用于各种通信系统,因此,下面的描述不限制于特定通信系统。例如,本申请实施例可以应用于全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)等。
本申请实施例中,终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备以及未来5G网络中的终端设备。
本申请实施例中,网络设备可以是网络侧设备等用于与移动设备通信的设备,网络侧设备可以是全球移动通讯(Global System of Mobile communication,GSM)或码分多址(Code Division Multiple Access,CDMA)中的基站(Base Transceiver Station,BTS),也可以是宽带码分多址(Wideband Code Division Multiple Access,WCDMA)中的基站(NodeB,NB),还可以是长期演进(Long Term Evolution,LTE)中的eNB或演进型基站(Evolutional Node B,eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及未来5G网络中的网络侧设备,例如gNB等,本申请实施例并不限于此。
图1是本申请实施例可应用的通信系统的场景示意图。该通信系统可以是上述任意一种通信系统。如图1所示,该通信系统100包括第一网络设备101,第二网络设备102和终端设备103。当终端设备由第一网络设备101覆盖的区域(也可以称为第一小区)移动到第二网络设备102覆盖的区域(也可以称为第二小区)时,终端设备103的通信数据链路需要由第一网络设备101切换至第二网络设备102。
应理解,第一网络设备101和第二网络设备102可以为上述的任一种网络设备。第一网络设备101和第二网络设备102可以相同,也可以不同,例如,第一网络设备101和第二网络设备102均可以为LTE系统中的eNB;或者,第一网络设备101和第二网络设备102均可以为5G网络中的gNB;或者第一网络设备101为LTE系统中的eNB,第二网络设备102为5G网络中的gNB;或者,第一网络设备102为5G网络中的gNB,第二网络设备101为LTE系统中的eNB等,本申请实施例并不限于此。
应注意,在第一网络设备和第二网络设备均为5G网络中的gNB时,该gNB可以包括分布式单元(Distributed Unit,DU)和集中式单元(Centralized Unit,CU)上,多个DU可以连接到相同的CU上。例如,如图2所示,终端设备在第一网络设备和第二网络之间切换可以理解为在不同的CU之间的切换。
应理解,本申请实施例中第一网络设备也可以称为源网络设备,第二网络设备也可以称为目标网络设备。以下为了描述的简便,以网络设备为eNB为例进行描述,第一网络设备为源基站(SeNB),第二网络设备为目标基站(TeNB),终端设备为UE为例进 行描述。但本申请实施例并不限于此,网络设备和终端设备可以为上述定义的任意一种设备。
下面描述一种LTE系统采用的跨基站(eNB)的切换流程,例如,该切换是由源eNB发起的切换过程,其主要过程为,源基站(Source eNB,SeNB)根据UE的测量报告决定对UE进行切换,并向目标基站(Target eNB,TeNB)发起切换请求,在SeNB获取到TeNB的肯定切换应答后,SeNB向UE发送切换命令,当UE接收到切换命令后,UE停止与SeNB进行的上行或下行数据传输,UE开始向TeNB进行同步,并发起初始接入过程。SeNB在向UE发送切换命令时,停止与UE之间的上行或下行数据传输,并将保存在SeNB的数据发往TeNB。UE在成功接入TeNB之后,开始与TeNB进行上行或下行数据的传输。
上述技术中,当UE接收到切换命令后,UE停止与源基站的上行或下行数据传输,然后开始与目标基站进行下行同步,然后根据切换命令中的配置信息向目标基站发起随机接入过程。当UE完成随机接入并向目标基站发送RRC连接重配置完成消息之后,才开始与目标基站进行上行或下行数据传输。可见,UE上行或上行数据传输经历了中断。
针对上述的切换流程中出现的传输中断的问题,一种改进的方案为UE在接收到源小区(或源基站)的切换命令后,继续与源基站进行上行或下行数据传输,同时UE与目标基站进行同步,在以下情况下,UE停止与源基站的上行、下行传输:
即当UE同步上目标基站后,向目标基站发起随机接入时,即向目标基站发送随机接入码Random access preamble时,UE停止与源基站的上下行传输,发送preamble来向目标基站获取上行定时(Timing Advance,TA)或上行资源分配(UL Grant),这两者都是通过随机接入响应(Random access response,RAR)消息发送给UE的。之后UE使用目标基站配置的TA和UL Grant发送指示”切换完成(Handover complete)”的RRC连接重配置完成(RRC Connection Reconfiguration Complete)消息。如果UE此时有上行数据,并且UL Grant足够大,UE可以在发送RRC连接重配置完成消息时发送一部分上行数据。或是UE向目标基站请求上行资源,然后再发送上行数据。对于下行,目标基站在接收到UE发送的RRC连接重配置完成消息后,开始向UE发送下行数据。
可见,在上述改进的方案中,对于上行传输,UE从发送Preamble开始,上行传输中断开始,经过接收RAR,再到向目标基站发送RRC连接重配置完成(RRC Connection Reconfiguration Complete),上行传输才开始接续上。因此该方案中上行传输存在中断时间。对于下行,UE从发送preamble开始停止接收源基站下行数据,到发送完RRC连接重配置完成(RRC Connection Reconfiguration Complete)之后,目标eNB才开始向UE发送下行数据。因此,该方案中下行传输也存在中断时间。
针对上述的切换流程中的问题,另一种改进的方案提出UE能够提前获取到TA和UL Grant,UE可以不进行随机接入过程,直接向目标基站发送RRC连接重配置完成消息。然后与目标基站进行上行或下行数据传输。
在该方案中,对于上行传输,UE停止向源基站发送上行数据后,开始使用已经获取到TA和UL Grant向目标基站发送RRC连接重配置完成(RRC Connection Reconfiguration Complete),如果该UL Grant足够大,可以发送一部分上行数据到目标基站,这时,上行传输可以认为是没有中断的。然而,对于开始配置给UE的UL Grant一般不会很大,因 为基站不知道UE有多少数据,如果分配资源多了,会造成资源浪费,这时如果UE有上行数据,需要UE向eNB请求上行资源,这样会引入额外的上行传输中断。对于下行,UE停止从源基站接收数据后,使用已经获取到的TA和UL Grant,向目标基站发送RRC连接重配置完成(RRC Connection Reconfiguration Complete)之后,目标eNB才开始向UE发送下行数据。并且,在这种方案中,对TA的精度要求很高,目前只支持相等TA,即站内小区切换,或TA=0,即小站之间切换的场景。对于大多数切换的场景并不支持,因而方案受限。
综上所述,上述的切换流程中终端设备的业务都存在中断问题,无法减小或避免业务中断问题。
鉴于上述问题,本申请实施例巧妙地提出了在切换准备阶段提前建立起终端设备与第二网络设备之间的用户面承载和控制面配置,减少切换过程因路径切换和控制面信令传输而引起的中断时间。并且本申请实施例引入切换过程中,由两条链路同时收发数据来保证数据传输的可靠性。换句话说,本申请实施例中终端设备可以在切换的过程中可以同时与第一网络设备与第二网络设备通信,能够保证业务的连续性,避免或降低切换过程中的业务中断。
以下,为了便于理解和说明,作为示例而非限定,以将本申请的切换的方法在通信系统中的执行过程和动作进行说明。
图3是根据本申请一个实施例的切换的方法的示意性流程图。如图3所示的切换的方法300包括:
310,第一网络设备向第二网络设备发送第一请求消息。
其中,该第一请求消息用于请求将该终端设备切换至该第二网络设备或者该第一请求消息用于请求为该终端设备添加该第二网络设备为辅助服务设备,
具体而言,起始状态,终端设备与第一网络设备(例如,SeNB)建立有RRC连接,终端设备向第一网络设备发送测量报告,测量报告中包括第一网络设备(或第一小区)和第一网络设备的相邻的网络设备(或相邻小区)的测量结果。该测量报告中包括参考信号接收功率(Reference Signal Received Power,RSRP)和/或参考信号接收质量(Reference Signal Received Quality,RSRQ)和/或信号干扰噪声比(Signal Interference Noisy Ratio,SINR)。其中该终端设备发送测量报告的方式或时机可以由第一网络设备配置,本申请实施例并不对此做限定。
第一网络设备根据该测量报告,确定该终端设备满足切换条件时,即启动切换流程。例如,在第一网络设备的信号变弱时,即启动切换流程。具体而言,第一网络设备可以决定为该终端设备增加一个辅基站(Secondary eNB)之后切换至该辅基站,其中,辅基站也可以称为目标基站TeNB,
具体的,第一网络设备向第二网络设备(例如,TeNB)发送第一请求消息。该第一请求消息用于请求将该终端设备切换至该第二网络设备或者该第一请求消息用于请求为该终端设备添加该第二网络设备为辅助服务设备。
其中该第一请求消息中包括以下至少一项:
该第一网络设备为该第二网络设备分配的与该终端设备关联的第一安全密钥、
该第一网络设备使用的与该终端设备关联的第二安全密钥、
指示该终端设备具有多连接式的切换能力的第一指示信息、
指示该终端设备具有多连接通信能力的第二指示信息、
指示该第一网络设备向该第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息。
应理解,第一安全密钥是第一网络设备分配给第二网络设备的,以用于第二网络设备与终端设备之间的数据传输,其中,第二网络设备可以直接使用该密钥与终端设备进行数据传输,或第二网络设备根据第一安全密钥生成另一新的安全密钥,然后使用新的安全密钥来与终端设备进行数据传输。
第二安全密钥是第一网络设备与终端设备之间进行数据传输的密钥,第一网络设备可以将该密钥发送给第二网络设备,以用于第二网络设备与终端设备之间的数据传输,其中,第二网络设备可以直接使用该密钥与终端设备进行数据传输,或第二网络设备根据第二安全密钥生成另一新的安全密钥,然后使用新的安全密钥来与终端设备进行数据传输。
第一指示信息用于指示终端设备具有多连接式的切换能力,其中多连接式的切换可以理解为UE在切换的过程中,可以提前与两个或两个以上的基站建立连接,然后释放掉源基站。
第二指示信息用于指示终端设备具有多连接通信的能力,其中多连接通信可以理解为UE可以与两个或两个以上的基站进行通信。
第三指示信息用于指示第一网络设备向该第二网络设备转发的数据是重复版本还是非重复版本,重复版本可以理解为对于一个数据包,第一网络设备会复制一份,发送到第二网络设备。这样第一网络设备和第二网络设备向终端设备发送的这个数据包,其实是重复的,这样可以提高UE接收的可靠性。非重复版本可以理解为对于一个数据包,要么保留在第一网络设备上,要么发送到第二网络设备上。UE在接收第一网络设备和第二网络设备发送的数据时,不会收到重复的数据。
在当第三指示信息指示第一网络设备向第二网络设备转发重复版本时,第一网络设备和第二网络设备可以通过两条链路向终端设备发送相同的数据,这样可以提高数据传输的可靠性;例如,针对下行数据包1,2,3,第一网络设备向终端设备发送一次数据包1,2,3,第一网络设备在向第二网络设备转发数据包1,2,3,然后第二网络设备再向终端设备发一次数据包1,2,3。当第三指示信息指示第一网络设备向第二网络设备转发的数据是非重复版本时,即来自核心网的下行数据数据,一部分通过第一网络设备发送至终端设备,一部分通过第二网络设备发送至终端设备;例如针对下行数据包1,2,3,4,第一网络设备向终端设备发送数据包1,3,第一网络设备将数据包2,4转发给第二网络设备,由第二网络设备将数据包2,4发送给终端设备。
可选地,该第一请求消息中还可以包括以下中的至少一种,
第一网络设备的标识(例如,eNB ID)、第一网络设备的服务PLMN,第一网络设备的服务网关(Serving Gateway,S-GW)的标识,第二网络设备的标识、SeNB与S-GW之间的接口S1、用于发送数据的隧道标识、终端设备的服务质量(Quality of Service,QoS)参数、第一网络设备和第二网络设备之间的X2接口、用于发送上行数据的隧道标识;终端设备的上下文信息(UE context)等。
320,第二网络设备向第一网络设备发送应答消息。
其中,该应答消息用于指示该第二网络设备接受该第一网络设备的第一请求消息的请求。
具体的,第二网络设备接收到第一网络设备发送的请求消息后,根据自身的资源情况和负载情况,决定是否答应第一网络设备的请求;若答应第一网络设备的请求,则向第一网络设备发送应答消息,该应答消息中可以包括一下中的至少一种:
该第二网络设备为该终端设备分配的第三安全密钥、
该第二网络设备配置该终端设备的PDCP实体的配置参数、
该第二网络设备配置该终端设备建立对应该第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能、
指示该终端设备使用该第一数据包编号/排序功能的第四指示信息、
指示该终端设备在与该第二网络设备通信时使用该第一网络设备为该终端设备分配的与该第一网络设备对应的安全密钥的第五指示信息。
具体地,在第一网络设备向第二网络设备发送第一请求消息前,该终端设备配置有与第一网络设备对应的第一PDCP实体,如图4所示,第一PDCP实体包含第一头添加/移除功能(Header Adding/Removing)、第一包头压缩/解压缩功能(Header(de)Compression)、第一加密/解密功能((de)Ciphering1)、第一数据包编号/排序功能(SN numbering/Reordering)。
应理解,本申请实施例中的安全密钥可以用于PDCP层的加密/解密。该第三安全密钥可以与第一安全密钥或第二安全密钥相同。在第三安全密钥与第一安全密钥相同时,表明第二网络设备采用第一网络设备为第二网络设备分配的密钥与终端设备进行通信。在第三安全密钥与第二安全密钥相同时,表明第二网络设备与第一网络设备使用相同的密钥与终端设备进行通信,这样终端设备可以避免采用新的密钥对数据进行加密或解密处理,因此能够提高数据处理速度,提高系统性能。
该第二网络设备配置该终端设备的PDCP实体的配置参数,该配置参数用于配置终端设备的PDCP实体的功能,具体地,该配置参数可以按照以下方式配置终端设备的PDCP实体的功能:
方式一,如图5所示,在第一PDCP实体基础上,配置第二加密/解密功能,其他功能沿用第一PDCP实体的。或者,配置UE使用第一加密/解密功能,但可以使用不同的密钥对数据进行加密。
方式二,如图6所示,在第一PDCP实体基础上,建立第二头添加/移除功能和第二加密/解密功能。其他功能沿用第一PDCP实体的。
方式三,如图7所示,建立第二PDCP实体,并去激动第二PDCP实体中的第二数据包编号/排序功能和第二头压缩/解压缩功能。其数据传输方式如图7所示。
方式四,如图8所述,建立第二PDCP实体,并去激活第二数据包编号/排序功能。其数据传输方式如图8所示。
第四指示信息用于指示使用第一数据包编号/排序功能,可以理解为经由第一数据包编号/排序功能编号的上行数据,可以发送至第一头压缩/解压缩功能进行压缩处理,还可以发送至第二头压缩/解压缩功能进行处理,然后再由各自(头压缩/解压缩功能)对应的 加密/解密功能和头添加/移除功能进行相应处理。或者,可以理解为经同第一数据包编号/排序功能编号的上行数据,发送至第一头压缩/解压缩功能进行压缩处理,然后可以发送至第一加密/解密功能进行加密,还可以发送至第二加密/解密功能进行加密。对于下行数据,可以使用相反的过程。
还应理解,第二网络设备在接收到第一网络设备发送的请求消息时可以获知第一网络设备与终端设备关联的第二安全密钥,第二网络设备可以通过第五指示信息指示终端设备使用该第二安全密钥与第二网络设备通信。由于无需传递具体的安全密钥,这里仅通过发送一个指示信息即第五指示信息,由于指示信息的数据量较小,例如该指示信息可以为1或0仅一个比特,能够减小信令开销,节省网络资源。
330,第一网络设备向终端设备发送第一配置消息。
该第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,该终端设备配置有与该第一网络设备关联的第一加密/解密功能和该第一数据包编号/排序功能;
具体而言,第一网络设备接收到第二网络设备发送的应答消息后,向终端设备发送第一配置消息(也可以称为RRC连接重配置(RRC Connection Reconfiguration))消息,该第一配置消息中包含第二网络设备发送到第一网络设备的应答消息中包括的信息的部分或全部。
应理解,本申请实施例中终端设备配置的第一加密/解密功能即能对数据进行加密处理,也能对数据进行解密处理。其中“/”表示该第一加密/解密功能对同一数据只能择一选择相应的处理,例如,该第一加密/解密功能可以对上行数据进行加密处理,该第一加密/解密功能可以对下行数据进行解密处理。类似地,第一数据包编号/排序功能,即能对数据进行编号处理,也能对数据进行排序处理;其中“/”表示该第一数据包编号/排序功能对同一数据只能择一选择相应的处理,例如,该第一数据包编号/排序功能可以对上行数据进行编号处理,该第一数据包编号/排序功能可以对下行数据进行排序处理。类似地,本文中的其他的功能与此类似,为避免重复,此处不再赘述。
可选地,该第一配置消息中还可以包括以下中的至少一种:
第一网络设备和第二网络设备的标识;第二网络设备与S-GW之间的S1接口;用于接收下行数据的隧道标识;第二网络设备与第一网络设备之间的X2接口、用于接收下行或发送上行数据的隧道标识;第二网络设备为终端设备配置的上行资源信息。
340,终端设备根据第一配置信息进行配置。
具体的,终端设备根据第一配置信息配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,该终端设备配置有与该第一网络设备关联的第一加密/解密功能和该第一数据包编号/排序功能。
具体而言,终端设备可以按照图5至图8的方式进行配置。
具体而言,终端设备内部建立有与第一网络设备通信的第一PDCP实体,如图4所示,该第一PDCP实体包括该第一加密/解密功能和该第一数据包编号/排序功能,该第一PDCP实体还可以包括第一头添加/移除功能和第一包头压缩/解压缩功能。在终端设备接收到第一配置信息后,可以配置与第二网络设备通信的相应功能(如图5和图6所示),或配置与第二网络设备同的第二PDCP实体(如图7和图8所示),该第二PDCP实体包 括该第二加密/解密功能和第二数据包编号/排序功能,该第二PDCP实体还可以包括第二头添加/移除功能和第二包头压缩/解压缩功能。
以图7和图8举例而言,由于终端设备共享第一数据包编号/排序功能,因此,在处理下行数据时,该终端设备对经由该第二PDCP实体中的该第二加密/解密功能解密处理后的下行数据,由该第一PDCP实体中的该第一数据包编号/排序功能进行排序处理。
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二PDCP实体中的该第二加密/解密功能进行加密处理。
应理解,由于终端设备共享第一数据包编号/排序功能,终端设备虽然配置了PDCP中的第二数据包编号/排序功能,但是在实际应用中不会使用该第二数据包编号/排序功能。
因此,可替代地,在终端设备接收到第一配置信息后,无需配置整个第二PDCP实体,如图5所示,可以仅配置与第二网络设备通信的第二加密/解密功能,其他功能沿用第一PDCP实体的功能,例如,共享第一数据包编号/排序功能、第一头添加/移除功能和第一包头压缩/解压缩功能。
在这种情况下,在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二加密/解密功能解密处理后的数据进行排序处理;
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二加密/解密功能进行加密处理。
因此,本申请实施例中,终端设备在与第二网络设备通信时,通过共享第一数据包编号/排序功能,可以仅配置与第二网络设备通信的第二加密/解密功能,无需配置完整的PDCP实体,减小配置时间,提高切换性能。
可替代地,在终端设备接收到第一配置信息后,无需配置整个第二PDCP实体,如图6所示,可以仅配置与第二网络设备通信的第二加密/解密功能和第二头添加/移除功能,其他功能沿用第一PDCP实体的功能,例如,共享第一数据包编号/排序功能和第一包头压缩/解压缩功能。
在这种情况下,在该终端设备处理下行数据时,该第一PDCP实体中的该第一数据包编号/排序功能对经由该第二加密/解密功能解密处理后的数据进行排序处理;
在该终端设备处理上行数据时,由该第一PDCP实体中的该第一数据包编号/排序功能对数据编号处理后发往该第一PDCP实体中该第一加密/解密功能和/或该第二加密/解密功能进行加密处理。
因此,本申请实施例中,终端设备在与第二网络设备通信时,通过共享第一数据包编号/排序功能,可以仅配置与第二网络设备通信的第二加密/解密功能和第二头添加/移除功能,无需配置完整的PDCP实体,减小配置时间,提高切换性能。
可选地,作为另一实施例,如图9、图10和图11所示,第二网络设备配置有与该终端设备通信的第三加密/解密功能,该第三加密/解密功能与该第二加密/解密功能对应。
应理解,第一网络设备配置有与终端设备通信的第四加密/解密功能,该第四加密/解密功能与该第一加密/解密功能对应。
应理解,本申请实施例中两个加密/解密功能对应,表示一个加密/解密功能使用一种 密钥对数据进行加密处理后,第二个加密/解密功能能够使用该一种密钥进行相反的过程解密出该数据。
例如,本申请实施例中第四加密/解密功能与第一加密/解密功能对应表示终端设备使用第一加密/解密功能加密上行数据后,网络设备的第四加密/解密功能能够解密出第一加密/解密功能加密后的上行数据。类似地,网络设备使用第四加密/解密功能加密下行数据后,终端设备的第一加密/解密功能能够解密出第四加密/解密功能加密后的下行数据。
也就说,对应的两个加密/解密功能中一个加密/解密功能对数据进行加密处理后,另一个加密/解密功能能够使用相反的过程进行解密获取到该数据。
可替代地,作为另一实施例,该第一网络设备配置还可以配置第五加密/解密功能,该第五加密/解密功能与该第二加密/解密功能对应。
也就是说第一网络设备可以同时配置与终端设备通信的对应第一加密/解密功能的第四加密/解密功能,和与终端设备通信的对应第二加密/解密功能的第五加密/解密功能。
350,终端设备发送第一配置完成消息。
其中,第一配置完成消息(也可以称为RRC连接重配置完成消息(RRC Connection Reconfiguration Complete))指示该终端设备成功接入该第二网络设备,或者第一配置完成消息指示该终端设备完成与该第二网络设备的连接配置。
具体而言,在该终端设备根据第一配置消息配置完成与该第二网络设备的连接配置后,可以向第一网络设备发送第一配置完成消息,指示该终端设备完成与该第二网络设备的连接配置。
或者,在终端设备配置完成后,该终端设备可以使用相应的随机接入码(Random access preamble,RAP)和相应的上行资源(UL Grant)向第二网络设备发起随机接入,来获取上行定时(Timing Advance,TA)和上行资源。终端设备接收第二网络设备发送的随机接入响应消息(Random Access Response,RAR),该消息中包含上行资源(UL Grant)和上行定时(TA)。当终端设备接收到第二网络设备发送的UL Grant和TA时,在基于非竞争随机接入过程中,表示上行接入成功。之后,该终端设备可以向该第二网络设备发送第一配置完成消息,指示该终端设备成功接入该第二网络设备。
需要说明的是,在步骤350或步骤320之后,第一网络设备即可以采用复制或非复制的方式将全部或部分的下行数据发送至第二网络设备,以便通过第二网络设备向终端设备发送相应的下行数据。
这样本申请实施例中第一网络设备和第二网络设备可以同时向终端设备发送下行数据,提供数据传输的可靠性,并且避免切换带来的业务中断问题。
本文中,步骤310和步骤320可以分别是切换请求消息和切换应答消息,即采用切换的流程;还可以分别是辅基站添加请求消息和辅基站添加应答消息,即采用辅基站添加流程。
具体而言,在第一网络设备向第二网络设备转发数据之前,第一网络设备只是将核心网来的数据发送给终端设备或将终端设备发送的上行数据发送至核心网。在步骤350之后,即当第一网络设备接收到第一配置完成消息(也可以称为RRC连接重配置完成消息)后,或在步骤320之后,即当第一网络设备接收到第二网络设备发送的应答消息(也可以为添加请求响应消息)后,第一网络设备开始向第二网络设备转发数据,至于转发数据的 形式,可以与步骤310中第一请求消息中的第三指示信息指示的内容对应,即该第一网络设备向该第二网络设备转发的数据是重复版本(也可以称为复制版本)或非重复版本(也可以称为非复制版本)。具体而言,若转发复制版本数据,则在步骤320或步骤350之后,第一网络设备开始向第二网络设备转发第一网络设备从核心网设备(CN)接收到的数据的复本版本。若转发非复制版本数据,则在步骤320或步骤350之后,第一网络设备开始向第二网络设备转发非复制版本数据。例如,在转发复制版本数据的情况下,若第一网络设备从CN接收到的下行数据为PDCP SDU 1…10,其中PDCP SDU1,2,3虽然已经通过第一网络设备发送给了终端设备,但若没有收到终端设备的反馈,则第一网络设备还是需要将PDCP SDU1,2,3转发给第二网络设备进行再次发送。
需要说明的是,在本申请实施例中在执行上述步骤310-350的过程中,终端设备的业务在数据面是一直保持传输的,例如,在执行上述步骤310-350的过程中,第一网络设备还可以向终端设备发送了数据包4…10。并且第一网络设备还可以接收到的来自CN的数据包,该第一网络设备一方面向终端设备发送,另一方面也可以按照上述复制或非复制方式向第二网络设备转发。
因此,本申请实施例在切换的准备阶段,不会影响终端业务的数据传输,能够提升用户体验。
下面描述在步骤350或步骤320之后第一网络设备和第二网络设备之间转发数据的具体实现方式:
在步骤310中,第一网络设备可以将核心网(Core Network,CN)侧的服务网关(Serving GateWay,S-GW)的地址(如隧道端口标识(Tunnel Endpoint Identifier,TEID))发送到第二网络设备,在310之后,第二网络设备已经可以向Serving GW发送上行数据,只是在步骤310时,第二网络设备还没有上行数据到来。同时,步骤310中第一网络设备发送的第一请求消息中还可以携带第一网络设备的数据传输目的地址,这样,在步骤310之后,第二网络设备可以向第一网络设备发送用户数据。在步骤320中,第二网络设备将新的数据传输目的地址发送到第一网络设备,这样在步骤320之后,第一网络设备可以向第二网络设备转发用户数据。
以下,将针对上行数据和下行数据,分别描述第一网络设备、第二网络设备和终端设备对数据的具体处理过程。
首先,针对上行数据:
一种可选的方式是在步骤320之后,第一网络设备即可以将用户的上行数据转发到第二网络设备,然后由第二网络设备发往Serving GW。这样,无论终端设备向第一网络设备发送相同的数据,还是不同的数据,最后都集中到第二网络设备,由第二网络设备进行重排序、重复包检测等。
另一种可选的方式是,步骤320之后,第一网络设备将完成排序且可以向S-GW递交的数据递交到S-GW,第一网络设备将不能按序递交到S-GW的数据(比如SDU4、6、8)的复制版本发往第二网络设备,当第一网络设备接收到SDU5时,第一网络设备可以将SDU4、5、6递交到S-GW,这时第一网络设备向第二网络设备发送状态报告,指示SDU6及之前的数据包已经发往S-GW,第二网络设备将SDU4、6丢弃。在具体上行传输时,终端设备可以一边向第一网络设备继续发送上行数据,另一边向第二网络设备发起接入过 程。在步骤350之后,终端设备开始向第二网络设备发送上行数据。
应理解,本申请实施例中,终端设备可以向第一网络设备和第二网络设备发送相同的数据(复制版本),即保证发送的可靠性,也可以是终端设备向第一网络设备和第二网络设备发送不同的数据,即一部分发往第一网络设备,其余数据发往第二网络设备。
在终端设备向第一网络设备和第二网络设备发送不同数据时,终端设备发送上行数据时,当终端设备成功接入到第二网络设备时,终端设备开始向第二网络设备发送上行数据,此时的上行数据可以包括:终端设备侧新生成的上行数据,终端设备侧发往第一网络设备的但没有得到ACK响应的上行数据,ACK响应指示数据成功接收。此时,若终端设备接收到某个数据包的NACK,NACK指示数据没有成功接收,若终端设备没有将该数据包发往第二网络设备,则向第一网络设备重传该数据包,若终端设备将该数据包发往第二网络设备,则终端设备向第一网络设备反馈ACK,指示该数据包已经成功发送。
其次,针对下行数据:
当第一网络设备得知第二网络设备添加成功时,第一网络设备可以将新从核心网发来的数据和没有得到终端设备ACK应答的数据,发往第二网络设备。当第一网络设备接收到终端设备发来的某个数据包的NACK时,第一网络设备重传该数据包。或当第一网络设备接收到终端设备发来的某个数据包的NACK时,若该数据已经转发至第二网络设备,则第一网络设备向终端设备反馈ACK,指示该数据包已经成功发送。
在终端设备侧接收下行数据时,当终端设备向第一网络设备反馈NACK后,接收到第一网络设备的重传(重传时指示该数据包是否转发至第二网络设备),并成功接收到该数据包时,若该数据包已经转发至第二网络设备,则终端设备向第二网络设备上报ACK,指示该数据包已经成功接收。
当第二网络设备从第一网络设备接收到转发的数据时,如果对于某个数据包,第二网络设备没有接收到终端设备的ACK,则第二网络设备发送该数据包;若收到ACK,则丢弃该数据包。终端设备侧,若从第二网络设备先成功收到某个数据包,则向两个eNB反馈ACK,否则,向两个eNB反馈NACK。
应理解,上文针对上行和下行数据传输,分别描述了本申请实施例中第一网络设备、第二网络设备和终端设备间的数据的传输的具体过程。其中,上述ACK、NACK可以是MAC层和物理层中HARQ中的反馈信息,或是RLC层的反馈信息(即状态报告),或是PDCP层的反馈信息(即状态报告)。本申请实施例并不限于此。
下面将结合体图9、图10和图11分情况描述数据转发过程中,第一网络设备、第二网络设备和终端设备在数据链路层(L2)中PDCP层中对数据的具体处理过程。
第一种情况,如图9所示,终端设备配置有第一PDCP实体,第一网络设备配置有第四PDCP实体,第二网络设备配置有第三PDCP实体。并且各个PDCP实体中具有对应的功能。
例如,终端设备配置有第一加密/解密功能、第一数据包编号/排序功能和第二加密/解密功能;第二网络设备配置有第三加密/解密功能;第一网络设备配置有第四加密/解密功能。
其中,该第三加密/解密功能与该第二加密/解密功能对应,该第四加密/解密功能与该第一加密/解密功能对应。
在第一种情况下,在该第一网络设备向第二网络设备转发下行数据时,该第一网络设备向该第二网络设备发送未加密的第一数据,以使得该第二网络设备使用第三加密/解密功能对该第一数据进行加密,该第一数据为该第一网络设备的PDCP层从该PDCP层的上层接收到的全部数据的部分或全部;
该第一网络设备接收该第二网络设备发送的上行数据时,该第一网络设备接收该第二网络设备发送的使用第三加密/解密功能解密后的第二数据。
具体而言,如图9所示,该第四加密/解密功能与该第一加密/解密功能对应,并且均对应加密方式1(Ciphering1)和解密方式1(deCiphering1);该第三加密/解密功能与该第二加密/解密功能对应,并且均对应加密方式2(Ciphering2)和解密方式2(deCiphering2)。
例如,如图9所示,在处理下行数据时,在PDCP层,第一网络设备首先对数据进行编号(SN numbering),之后进行头压缩(Header Compression),之后第一网络设备将该数据中的全部或部分(即对应复制或非复制版本)发送至该第二网络设备,该第一网络设备使用该第四加密/解密功能对应的加密方式1对数据进行加密处理,之后进行相应的头添加(Header adding)处理,最后依次经过该第一网络设备的RLC层、MAC层和PHY层,发送至终端设备;在PDCP层,该第二网络设备使用该第三加密/解密功能对应的加密方式2对数据进行加密处理,之后进行头添加处理,并依次经过该第二网络设备的RLC层、MAC层和PHY层,发送至终端设备,终端设备分别经过相应的PHY层、MAC层和RLC层,在PDCP层,经过头去除(Header remove)处理,并分别经过第一加密/解密功能对应的解密方式1,第二加密/解密功能对应的解密方式2,对数据进行解密处理,最后,均使用第一头压缩/解压缩功能和第一数据包编号/排序功能,对数据进行头解压缩和重排序获取到对应的下行数据。
应理解,在处理上行数据时,可以参照图9所示的下行数据的逆过程进行,为了避免重复,此处不再赘述。
第二种情况,如图10所示,终端设备配置有第一PDCP实体,第一网络设备配置有第四PDCP实体,第二网络设备配置有第三PDCP实体。并且各个PDCP实体中具有对应的功能。
例如,终端设备配置有第一加密/解密功能、第一数据包编号/排序功能和第二加密/解密功能;第二网络设备配置有第三加密/解密功能;第一网络设备配置有第四加密/解密功能、第五加密/解密功能。
其中,该第三加密/解密功能与该第二加密/解密功能对应,该第四加密/解密功能与该第一加密/解密功能对应。该第五加密/解密功能与该第二加密/解密功能对应。
也就是说,该第三加密/解密功能和该第五加密/解密功能均与该第二加密/解密功能对应。
在第二种情况下,在该第一网络设备向第二网络设备转发下行数据时,该第一网络设备将经过第五加密/解密功能加密的第三数据发送至该第二网络设备,该第三数据为该第一网络设备的PDCP层从该PDCP层的上层接收到的全部数据的部分或全部;
该第一网络设备接收该第二网络设备发送的上行数据时,该第一网络设备接收该第二网络设备发送的、未解密的第四数据;该第一网络设备使用第五加密/解密功能对该第四数据进行解密。
具体而言,如图10所示,该第四加密/解密功能与该第一加密/解密功能对应,并且均对应加密方式1(Ciphering1)和解密方式1(deCiphering1);该第三加密/解密功能和第五加密/解密功能均与该第二加密/解密功能对应,并且均对应加密方式2(Ciphering2)和解密方式2(deCiphering2)。
例如,如图10所示,在处理下行数据时,在PDCP层,第一网络设备首先对数据进行编号(SN numbering),之后进行头压缩(Header Compression),之后一部分数据由第一网络设备的第四加密/解密功能对应的加密方式1对数据进行加密处理,之后进行相应的头添加(Header adding)处理,最后依次经过该第一网络设备的RLC层、MAC层和PHY层,发送至终端设备,另一部分数据由第一网络设备的第四加密/解密功能对应的加密方式1对数据进行加密处理,之后进行相应的头添加(Header adding)处理后,发送至第二网络设备,并依次经过该第二网络设备的RLC层、MAC层和PHY层,发送至终端设备,终端设备分别经过相应的PHY层、MAC层和RLC层,在PDCP层,经过头去除(Header remove)处理,并分别经过第一加密/解密功能对应的解密方式1,第二加密/解密功能对应的解密方式2,对数据进行解密处理,最后,均使用第一数据包编号/排序功能,对数据进行头解压缩和重排序获取到对应的下行数据。
应理解,在处理上行数据时,可以参照图10所示的下行数据的逆过程进行,为了避免重复,此处不再赘述。
图10所示的数据处理过程与图9所示的数据处理过程的区别在于,图9中,第一网络设备向第二网络设备转发的下行数据没有经过加密处理,需要由第二网络设备进行加密处理后,发送至终端设备。图10中,第一网络设备向第二网络设备转发的下行数据已经经过加密处理,不再需要第二网络设备进行加密处理,之后发送至终端设备。
应理解,在图9所示的数据处理方式中,第二网络设备使用的密钥可以与第一网络设备使用的密钥相同,也可以不同,本申请实施例并不对此作限定。
第三种情况,如图11所示,终端设备配置有第一PDCP实体,第一网络设备配置有第四PDCP实体,第二网络设备配置有第三PDCP实体。并且各个PDCP实体中具有对应的功能。
应理解,图11中数据处理过程与图10中的类似,为了避免重复,此处仅描述图10与图11的区别,其余过程图11与10中的处理过程类似,此处不再赘述。
具体的,图10与图11中的区别在于,图10中,第一网络设备的第四PDCP实体中配置了两个头添加/移除功能,即第四头添加/移除功能和第五头添加/移除功能,终端设备的第一PDCP实体中配置了与上述第四头添加/移除功能和第五头添加/移除功能分别对应的第一头添加/移除功能和第二头添加/移除功能。
在图10中,在处理下行数据时,第四加密/解密功能加密处理后的数据由第四头添加/移除功能进行头添加处理。在终端设备侧由对应的第一头添加/移除功能进行头移除处理,并由第一加密/解密功能进行解密处理。
第五加密/解密功能加密处理后的数据由第五头添加/移除功能进行头添加处理。在终端设备侧由对应的第二头添加/移除功能进行头移除处理,并由第二加密/解密功能进行解密处理。类型的,上行数据处理过程与下行数据处理过程相反,不再赘述。
而在图11中,第一网络设备的第四PDCP实体中配置了一个头添加/移除功能,即 第四头添加/移除功能,终端设备的第一PDCP实体中配置了与上述第四头添加/移除功能对应的第一头添加/移除功能。
在处理下行数据时,第四加密/解密功能加密处理后的数据由第四头添加/移除功能进行头添加处理。在终端设备侧由对应的第一头添加/移除功能进行头移除处理,并由第一加密/解密功能进行解密处理。
第五加密/解密功能加密处理后的数据同样由第四头添加/移除功能进行头添加处理。在终端设备侧由对应的第一头添加/移除功能进行头移除处理,并由第二加密/解密功能进行解密处理。类型的,上行数据处理过程与下行数据处理过程相反,不再赘述。
应理解,图9、图10和图11的例子仅仅是为了帮助本领域技术人员理解本申请实施例,而非要将本申请实施例限于所例示的具体数值或具体场景。本领域技术人员根据所给出的图9、图10或图11的例子,显然可以进行各种等价的修改或变化,这样的修改或变化也落入本申请实施例的范围内。
例如,图9、图10和图11中的终端设备可以按照图5至图8中任一种方式进行配置。本申请实施例并不限于此。
可选地,作为另一实施例,该切换方法还可以包括:
该第一网络设备向该第二网络设备发送第九指示信息,该第九指示信息用于指示该终端设备已成功接收的下行数据,以便该第二网络设备丢弃该终端设备已成功接收的下行数据。
可选地,作为另一实施例,在第一网络设备将终端设备的上行数据递交到核心网设备(也可以称为第三网络设备)后,该切换方法还可以包括:
该第一网络设备向该第二网络设备发送第十指示信息,该第十指示信息用于指示该第一网络设备已成功递交到第三网络设备的上行数据,以便该第二网络设备丢弃该第一网络设备已成功递交到第三网络设备的上行数据。
可选地,作为另一实施例,在350之后,该切换方法还可以包括:
360,第一网络设备发送指示信息。
具体地,该第一网络设备向该第二网络设备发送第六指示信息,该第六指示信息用于指示该终端设备已完成RRC连接重配置;
或者,
该第一网络设备向该终端设备发送第七指示信息,该第七指示信息用于指示该终端设备释放与该第一网络设备的RRC连接;
或者,
该第一网络设备向该终端设备发送第八指示信息,该第八指示信息用于指示该终端设备启动与该第二网络设备的RRC连接。
更具体地,该第一网络设备向该第二网络设备发送第六指示信息之后,可选地,作为另一实施例,该第二网络设备向该终端设备发送RRC连接激活指示信息,该指示信息用于指示终端设备启用与第二网络设备对应的PDCP实体所包含的全部功能,即UE通过第二PDCP实体直接与第二网络设备进行通信,并且终端设备开始使用与第二网络设备对应的RRC实体进行信令封装,然后来第二网络设备进行信令交互。可选地,作为另一种实施例,该RRC连接激活指示信息可以通过以下任一种方式发送:
(1)MAC控制单元(Control Element,CE);
(2)RLC控制PDU;
(3)PDCP控制PDU;
(4)RRC消息,考虑到终端设备还没有启动与第二网络设备对应的RRC连接,该RRC消息可以封装到第二网络设备向终端设备发送的PDCP PDU中,并在该PDCP PDU中标识该PDCP PDU包含RRC消息,或者,建立针对RRC消息的PDCP实体,如信令无线承载(Signaling Radio Bearer,SRB)。
更具体地,该第一网络设备向该终端设备发送第七指示信息,该第七指示信息用于指示终端设备释放与该第一网络设备的RRC连接,可选地,作为另一种实施例,该第七指示信息可以包含于第一网络设备向终端设备发送的MAC PDU中,更具体地,该第七指示信息可以封装到MAC控制单元(Control Element,CE)中,再封装到MAC PDU中发送到终端设备。终端设备接收到第七指示信息后,释放终端设备保存的对应第一网络设备的各种配置,例如,MAC、RLC、PDCP层的配置等。
更具体地,该第一网络设备向该终端设备发送第八指示信息,该第八指示信息用于指示该终端设备启动与该第二网络设备的RRC连接。可选地,作为另一种实施例,该第八指示信息可以通过以下任一种方式发送:
(1)MAC控制单元(Control Element,CE);
(2)RLC控制PDU;
(3)PDCP控制PDU;
(4)RRC消息。
本文中,第一网络设备和第二网络设备向终端设备发送的数据,可以包含用户面数据(User Plane Data)或控制面信令(Control Plane Signaling)。
可选地,作为另一实施例,在步骤360之后,也即在该第二网络设备与该终端设备建立RRC连接之后,该第一网络设备可以持续向该终端设备发送下行数据,且在该第一网络设备在预设时间段内未收到该终端设备发送的反馈消息时,停止向该终端设备发送下行数据,
或者,在该第一网络设备接收到该终端设备发送的携带指示停止与第一网络设备进行数据传输的指示信息的反馈状态报告时,停止向该终端设备发送下行数据;
或者,在该第一网络设备接收到该第二网络设备的停止指示消息后,停止向该终端设备发送下行数据,该停止指示信息用于指示第一网络设备停止向终端设备发送下行数据。
因此,本实施例在切换准备阶段,先建立起终端设备与第二网络设备之间的连接,并配置其间的RRC配置信息,在切换执行阶段,终端设备可以与第二网络设备与第一网络设备同时进行数据传输,减少或避免了由切换引起的业务中断时间。
上文中结合图1至图11描述了本申请实施例的切换的方法,下面将结合更具体地例子详细描述本申请实施例的切换的方法。
图12是根据本申请另一实施例的切换的方法示意性流程图。如图12所示的方法描述了下行数据传输时的具体切换过程。
如图12所示,起始状态,终端设备与第一网络设备建立有RRC连接,并进行数据 传输,以下行(Downlink,DL)为例,第一网络设备从核心网(Core Network,CN)接收下行数据,如10个IP包(Packet),在进行PDCP封装之前,称为PDCP SDU,即网络设备接收PDCP SDU1-10。第一网络设备先将PDCP SDU 1,2,3发送给终端设备。之后,如图12所示,该切换方法1100具体包括:
1101,终端设备向第一网络设备发送测量报告(Measurement Report)。
测量报告中包括第一网络设备(或第一小区)和第一网络设备的相邻的网络设备(或相邻小区)的测量结果。该测量报告中包括参考信号接收功率(Reference Signal Received Power,RSRP)和/或参考信号接收质量(Reference Signal Received Quality,RSRQ)和/或信号干扰噪声比(Signal Interference Noisy Ratio,SINR)。其中该终端设备发送测量报告的方式或时机可以由第一网络设备配置,本申请实施例并不对此做限定。
1102,第一网络设备向第二网络设备发送第一请求消息。
具体的,第一网络设备根据终端设备的测量报告,如,第一网络设备的信号变弱,决定为终端设备增加一个辅基站(Secondary eNB),即第二网络设备,此时,第一网络设备为主基站(Master eNB),第一网络设备向第二网络设备发送的第一请求消息可以为添加目标基站请求消息(TeNB Addition Request)。
应理解,该第一请求消息可以参见图3中步骤310中对第一请求消息的描述。为避免重复,此处不再赘述。
1103,第二网络设备向第一网络设备发送应答消息。
具体的,第二网络设备接收到第一网络设备发送的请求消息后,根据自身的资源情况和负载情况,决定是否答应第一网络设备的请求;若答应第一网络设备的请求,则向第一网络设备发送应答消息。
应理解,该应答消息可以参见图3中步骤320中对应答消息的描述。为避免重复,此处不再赘述。
1104,第一网络设备向终端设备发送第一配置消息。
该第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,该终端设备配置有与该第一网络设备关联的第一加密/解密功能和该第一数据包编号/排序功能;
具体而言,第一网络设备接收到第二网络设备发送的应答消息后,向终端设备发送第一配置消息(也可以称为RRC连接重配置(RRC Connection Reconfiguration))消息,该第一配置消息中包含第二网络设备发送到第一网络设备的应答消息中包括的信息的部分或全部。
应理解,该第一配置消息可以参见图3中步骤330中对第一配置消息的描述。为避免重复,此处不再赘述。
1105,终端设备向第二网络设备发送随机接入请求。
首先,终端设备根据第一配置信息进行配置。具体的,配置方法可参见图3中步骤340的描述,可以按照图5至图8中任一种方式进行配置。为避免重复,此处不再赘述。
终端设备根据第一配置信息进行配置,并建立起第二套与第二网络设备对应的协议栈,之后终端设备使用第二网络设备的配置信息,使用相应的随机接入码(Random access preamble,RAP)和相应的上行资源(UL Grant)向第二网络设备发起随机接入,来获取上 行定时(Timing Advance,TA)和上行资源。
1106,第二网络设备向终端设备发送随机接入响应。
具体的,终端设备接收第二网络设备发送的随机接入响应消息(Random Access Response,RAR),该消息中包含上行资源(UL Grant)和上行定时(TA)。
1107,终端设备发送第一配置完成消息。
具体的,当终端设备接收到第二网络设备的UL Grant和TA时,在基于非竞争随机接入过程中,表示上行接入成功。之后,该终端设备可以向该第二网络设备发送第一配置完成消息(也可以称为RRC连接重配置完成消息(RRC Connection Reconfiguration Complete)),指示该终端设备成功接入该第二网络设备。
可选地,该步骤1107还可以位于步骤1104和1105之间,这样该第一配置完成消息不再表示终端设备已经成功接入第二网络设备,而是表示终端设备根据配置消息完成了配置。
需要说明的是,在第一网络设备向第二网络设备转发数据之前,第一网络设备只是将核心网来的数据发送给终端设备或将终端设备发送的上行数据发送至核心网。在步骤1107之后,即当第一网络设备接收到RRC连接重配置完成消息后,或在步骤1103之后,即当第一网络设备接入到第二网络设备添加请求响应消息后,第一网络设备开始向第二网络设备转发数据,至于转发数据的形式,与步骤1102中第一请求消息中的第三指示信息指示的内容对应。若转发复制版本数据,则在步骤1103或步骤1107之后,第一网络设备开始向第二网络设备转发第一网络设备从CN接收到的数据的复本版本,例如,第一网络设备向第二网络设备转发PDCP SDU 1-10。若转发非复制版本数据,则在步骤1103或步骤1107之后,第一网络设备开始向第二网络设备转发PDCP SDU 1…10,其中PDCPSDU1,2,3虽然已经通过第一网络设备发送给了终端设备,但若没有收到终端设备的反馈,还是需要转发给第二网络设备进行再次发送。此外,在步骤1101至1107的过程中,数据面的数据是一直在传输的,例如,这期间,第一网络设备还向终端设备发送了数据包4…10。
之后第一网络设备接收到的来自CN的数据包,一方面向终端设备发送,一方面向第二网络设备转发。
例如,如图12所示,在步骤1101至1107期间,第一网络设备还可以接收CN发送的5SDUs,即PDCP SDU 11…15。一方面,第一网络设备向终端设备发送该PDCP SDU 11…15,另一方面向第二网络设备发送该PDCP SDU 11…15。
在切换阶段,终端设备会向第一网络设备上报SN状态报告(SN status Report),指示通过第一网络设备哪些数据被成功接收,哪些数据还没有成功接收。在步骤1106之后,若第二网络设备有下行数据需要发送给终端设备,步骤1106之后就可以向终端设备发送数据了。这样,终端设备向第一网络设备上报的SN状态报告,可以是原来的只反映第一网络设备与终端设备之间的数据传输情况的报告,还可以是反映第一网络设备、第二网络设备与终端设备之间的数据传输情况的报告,即若有些数据从第二网络设备成功接收了,则终端设备可以在状态报告中向第一网络设备指示这些数据已经成功接收了。
若第一网络设备向第二网络设备转发的是非复制版本的数据,则在收到终端设备发送的SN状态报告后,第一网络设备还需要向第二网络设备转发以下数据:由于第一网络 设备的信号差,不能发送到终端设备的数据;核心网络发送给第一网络设备的下行数据,正常情况下,第一网络设备需要将下行数据发送给终端设备,此时,第一网络设备将部分或全部下行数据转发给第二网络设备。
此外,对于第一网络设备转发给第二网络设备的下行数据,第一网络设备将封装前的PDCP SDU及对应的SN发送给第二网络设备,第二网络设备使用相应的SN和自己分配的密钥来封装PDCP PDU。
可选地,作为另一实施例,第一网络设备根据终端设备测量报告,可以决定向终端设备发送切换命令(或第一网络设备释放命令),该切换命令由第一网络设备生成,可以通过第一网络设备和第二网络设备发送至终端设备。第一网络设备发送完该切换命令后,删除对应该终端设备的RRC实体和对应的SRB。
终端设备接收到该切换命令后,删除对应第一网络设备的SRB,启用对应第二网络设备的SRB,并启用去使能的SRB配置。之后,终端设备使用第二网络设备对应的SRB向第二网络设备发送切换完成消息,并在MAC层/RLC层/PDCP层指示激活第二网络设备的SRB。
1108,终端设备使用步骤1106获取的TA和UL Grant,向第二网络设备发送状态报告(SN Status Report)和成功从第一网络设备与第二网络设备接收数据量的比值(Ratio S/T)。
其中状态报告向第二网络设备指示哪些数据接收成功,哪些未接收成功。第二网络设备根据终端设备上报的状态报告,向终端设备发送其未接收成功的数据包。该数据量比值反映终端设备从第一网络设备和第二网络设备成功接收数据(数据包个数或数据量,如以Byte或bit为单位的数据量)的对比,可以提供第二网络设备进行参考,以便激活第二网络设备侧的RRC连接。
可替代地,作为另一实施例,在步骤1107之后,第一网络设备向第二网络设备指示终端设备已经配置完RRC配置,第二网络设备接收到该指示,即激活第二网络设备对应的RRC连接。
可替代地,作为另一实施例,步骤1107可以替换为终端设备向第二网络设备发送的配置完成消息,第二网络设备根据该消息激活RRC配置。
1109,第二网络设备向终端设备发送RRC激活命令。
具体地,该RRC激活信令可以通过RRC消息或MAC CE来发送。
在步骤1109中,第二网络设备也可以在发射RRC激活命令的同时,发送下行数据。该下行数据可以为步骤1108中终端设备反馈的未接收成功的下行数据。例如,为PDCP SDU 8,9,14。
应理解,本申请实施例中,在步骤1109之后,第一网络设备可以保持一段时间继续向终端设备发送下行数据,第一网络设备可以由自身决定什么时候停止向终端设备发送下行数据,例如,当终端设备从第二网络设备稳定地接收下行数据时,终端设备停止向第一网络设备进行反馈,第一网络设备检测不到终端设备的任何反馈时,停止向终端设备发送下行数据。
对于第一网络设备停止向终端设备发送数据的触发,可以包括:
(1)终端设备向第一网络设备发送最后一个状态报告时,携带MAC CE,指示第一网 络设备可以停止向终端设备发送数据。
或,
(2)第二网络设备向第一网络设备请求转发所有来自CN的数据,并指示第一网络设备可以停止向终端设备发送数据。
或,
(3)第一网络设备自己决定停止向终端设备发送数据。
应理解,在步骤1108至1109的过程中,数据面的数据是一直在传输的,例如,这期间,第一网络设备还可以接收CN发送的5SDUs,即PDCP SDU 16…20。
第一网络设备在获取到该5 SDUs后,可以将该数据发送至第二网络设备,由第二网络设备发送至终端设备。
1110,第二网络设备向核心网请求路径转换(Path Switch),请求S-GW将下行数据转发至第二网络设备。
1111,核心网向第二网络设备发送路径转换响应(Path Switch ACK)。
并且,核心网(例如,S-GW)会在最后一个发往第一网络设备的数据包上标识“结束”标记。
例如,核心网向终端设备又发了5个SDU,即PDCP SDU 21-25,并且,最后一个数据包上标识有结束标识(End Marker,EM)。
第一网络设备转发这个标记给第二网络设备。当接收到标记有“结束”标识的数据包时,第二网络设备开始向终端设备发送由核心网(例如,S-GW)发来的下行数据。例如,第二网络设备向终端设备发送新获取到的5SDUs即PDCP SDU 26…30。
因此,本实施例在切换准备阶段,先建立起终端设备与第二网络设备之间的连接,并配置其间的RRC配置信息,在切换执行阶段,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少由切换引起的中断时间。
应理解,图12中左侧靠上的竖条形对应终端设备与第一网络设备的交互,左侧靠下的竖条形对应终端设备与第二网络设备的交互,两个竖条形重叠的部分表明终端设备可以同时和第一网络设备和第二网络设备交互,图13-图17与此类似,为避免重复此处不再赘述。
图13是根据本申请另一实施例的切换的方法示意性流程图。如图13所示的方法描述了上行数据传输时的具体切换过程。
具体地,起始状态,终端设备与第一网络设备建立有RRC连接,并进行数据传输,以上行(Uplink,UL)为例,第一网络设备从终端设备接收上行数据,如PDCP SDU 1…8,第一网络设备可以先将PDCP SDU 1,2,3发送给核心网络设备。之后,如图13所示,该切换方法1200具体包括:
1201,终端设备向第一网络设备发送测量报告(Measurement Report)。
测量报告中包括第一网络设备(或第一小区)和第一网络设备的相邻的网络设备(或相邻小区)的测量结果。该测量报告中包括参考信号接收功率(Reference Signal Received Power,RSRP)和/或参考信号接收质量(Reference Signal Received Quality,RSRQ)和/或信号干扰噪声比(Signal Interference Noisy Ratio,SINR)。其中该终端设备发送测量报告的方式或时机可以由第一网络设备配置,本申请实施例并不对此做限定。
可选地,作为另一实施例,在此过程中,由于网络状态较差,第一位网络设备有部分数据未成功接收,例如,PDCP SDU 5,7。此时,第一网络设备可以向终端设备反馈未成功接收到SDU5,7(NACK SDU 5,7)的反馈消息。
1202,第一网络设备向第二网络设备发送第一请求消息。
具体的,第一网络设备根据终端设备的测量报告,如,第一网络设备的信号变弱,决定为终端设备增加一个辅基站(Secondary eNB),即第二网络设备,此时,第一网络设备为主基站(Master eNB),第一网络设备向第二网络设备发送的第一请求消息可以为添加目标基站请求消息(第二网络设备Addition Request)。
应理解,该第一请求消息可以参见图3中步骤310中对第一请求消息的描述。为避免重复,此处不再赘述。
需要说明的是,上行传输中步骤1202与下行传输中步骤1102的区别在于,在步骤1202中,第一网络设备已经将CN侧Serving GW的地址(称为隧道端口标识,Tunnel Endpoint Identifier,TEID)发送到第二网络设备,第二网络设备已经可以向Serving GW发送上行数据,只是步骤1202时,第二网络设备还没有上行数据到来。同时,步骤1202中还可以携带第一网络设备的数据传输目的地址,这样,在步骤2之后,第二网络设备可以向第一网络设备发送用户数据。
1203,第二网络设备向第一网络设备发送应答消息。
具体的,第二网络设备接收到第一网络设备发送的请求消息后,根据自身的资源情况和负载情况,决定是否答应第一网络设备的请求;若答应第一网络设备的请求,则向第一网络设备发送应答消息。
应理解,该应答消息可以参见图3中步骤320中对应答消息的描述。为避免重复,此处不再赘述。
应理解,上行传输中步骤1203与下行传输中步骤1103的区别在于,在步骤1203中,第二网络设备将数据传输目的地址发送到第一网络设备,第一网络设备可以向第二网络设备转发用户数据。
一种方法是,在步骤1203之后,第一网络设备即可以将用户的上行数据转发到第二网络设备,然后由第二网络设备发往Serving GW。这样,无论终端设备向第一网络设备发送相同的数据,还是不同的数据,最后都集中到第二网络设备,由第二网络设备进行重排序、重复包检测等。
另一种方法是,步骤1203之后,第一网络设备将完成排序且可以向S-GW递交的数据递交到S-GW,第一网络设备将不能按序递交到S-GW的数据(比如SDU4、6、8)的复制版本发往第二网络设备,当第一网络设备接收到SDU5时,第一网络设备可以将SDU4、5、6递交到S-GW,这时第一网络设备向第二网络设备发送状态报告,指示SDU6及之前的数据包已经发往S-GW,第二网络设备将SDU4、6丢弃。
1204,第一网络设备向终端设备发送第一配置消息。
该第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,该终端设备配置有与该第一网络设备关联的第一加密/解密功能和该第一数据包编号/排序功能;
具体而言,第一网络设备接收到第二网络设备发送的应答消息后,向终端设备发送 第一配置消息(也可以称为RRC连接重配置(RRC Connection Reconfiguration))消息,该第一配置消息中包含第二网络设备发送到第一网络设备的应答消息中包括的信息的部分或全部。
应理解,该第一配置消息可以参见图3中步骤330中对第一配置消息的描述。为避免重复,此处不再赘述。
可选地,在步骤1204之后,第一网络设备可以向第二网络设备发送SN状态转移(SN Status Transfer),以指示未成功接收的SDU编号。
在此期间,第一位网络设备可以向终端设备反馈未成功接收到SDU7(NACK SDU 7)的反馈消息。
1205,终端设备向第二网络设备发送随机接入请求。
首先,终端设备根据第一配置信息进行配置。具体的,配置方法可参见图3中步骤340的描述,可以按照图5至图8中任一种方式进行配置。为避免重复,此处不再赘述。
终端设备根据第一配置信息进行配置,并建立起第二套与第二网络设备对应的协议栈,之后终端设备使用第二网络设备的配置信息,使用相应的随机接入码(Random access preamble,RAP)和相应的上行资源(UL Grant)向第二网络设备发起随机接入,来获取上行定时(Timing Advance,TA)和上行资源。
1206,第二网络设备向终端设备发送随机接入响应。
具体的,终端设备接收第二网络设备发送的随机接入响应消息(Random Access Response,RAR),该消息中包含上行资源(UL Grant)和上行定时(TA)。
1207,终端设备发送第一配置完成消息。
具体的,当终端设备接收到第二网络设备的UL Grant和TA时,表示上行接入成功。在基于非竞争随机接入过程中,表示上行接入成功。之后,该终端设备可以向该第一网络设备发送第一配置完成消息(也可以称为RRC连接重配置完成消息(RRC Connection Reconfiguration Complete)),指示该终端设备成功接入该第二网络设备。
可选地,该步骤1207还可以位于步骤1204和1205之间,这样该第一配置完成消息不再表示终端设备已经成功接入第二网络设备,而是表示终端设备根据配置消息完成了配置。
此外,在步骤1201至1207的过程中,数据面的数据是一直在传输的,例如,这期间,终端设备还发送了数PDCP SDU9,10,同时还发送了第一网络设备未成功接收的PDCP SDU 7。最终PDCP SDU 7,8,9,10由第二网络设发送至核心网。
应理解,步骤1205和步骤1206,终端设备一边向第一网络设备继续发送上行数据,一边向第二网络设备发起接入过程,步骤7之后,终端设备开始向第二网络设备发送上行数据。
在发送上述数据时,终端设备可以向第一网络设备和第二网络设备发送相同的数据(复制版本),即保证发送的可靠性,也可以是终端设备向第一网络设备和第二网络设备发送不同的数据,即一部分发往第一网络设备,其余数据发往第二网络设备。
终端设备向第一网络设备和第二网络设备发送不同数据时,当终端设备成功接入到第二网络设备时,终端设备开始向第二网络设备发送上行数据,此时的上行数据包括:终端设备侧新生成的上行数据(例如,PDCP SDU 9,10),终端设备侧发往第一网络设备 的但没有得到ACK响应的上行数据(例如,PDCP SDU 7)。此时,若终端设备接收到某个数据包的NACK,NACK指示数据没有成功接收,若终端设备没有将该数据包发往第二网络设备,则向第一网络设备重传该数据包,若终端设备将该数据包发往第二网络设备,则终端设备可以向第一网络设备反馈ACK,指示该数据包已经成功发送。
1210,第二网络设备向核心网请求路径转换(Path Switch),请求S-GW将下行数据转发至第二网络设备。
1211,核心网向第二网络设备路径转化确认(Path Switch ACK)。
因此,本实施例在切换准备阶段,先建立起终端设备与第二网络设备之间的连接,并配置其间的RRC配置信息,在切换执行阶段,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少由切换引起的中断时间。
图14是根据本申请另一实施例的切换的方法示意性流程图。如图14所示的方法描述了下行数据传输时的具体切换过程。
图14所示的切换方法1300与图12所示的切换方法1100类似,为避免重复此处适当省略详细描述。
具体而言,步骤1301-1308与步骤1101-1108对应,可参见图12中的描述。
步骤1309,第二网络设备根据步骤1308中终端设备的状态报告,向终端设备发送相应的下行数据。例如,PDCP SDU 8,9,14。
步骤1309与步骤1109的区别在于,1109中,第二网络设备还可以向终端设备发送RRC激活命令。在1309中仅发送相应的下行数据,RRC激活命令在步骤1312和1313中发送。
步骤1310-1311与步骤1110-1111对应,可参见图12中的描述。
步骤,1312,1313,当第二网络设备接收到标记有“结束”标识的数据包时,第二网络设备向第一网络设备和终端设备发送RRC连接激活指示消息,指示终端设备使用对应第二网络设备的RRC实体。
应理解,本申请实施例中,可以按照以下方式中的任一种生成该激活指示消息。但本申请实施例并不限于此。
方式一,第二网络设备侧的RRC实体生成该激活指示信息,然后封装成RRC消息,发往第二网络设备的T-PDCP(考虑第二网络设备是目标站,所以各层名称着加前辍T,以与源站的对应层(源站对应层名称前加前辍S)进行区分),经T-RLC、T-MAC、T-PHY发往终端设备,终端设备使用对应于第二网络设备的T-PHY、T-MAC、T-RLC、T-PDCP接收该RRC消息,并转发至第一网络设备对应的S-PDCP层,发往第一网络设备对应的S-RRC实体,由S-RRC实体解析该消息。
方式二,封装激活指示信息的RRC消息,携带第二指示信息,指示该RRC消息由T-RRC实体来解析,然后,终端设备侧,S-RRC实体将接收到的RRC消息转发给T-RRC,由T-RRC实体解析。
方式三,T-PDCP在封装该RRC消息时,指示该PDCP SDU递交到T-RRC实体,终端设备侧,当T-PDCP接收到该PDCP PDU时,根据指示信息,将该RRC消息直接递交T-RRC实体进行解析。
方式四,第二网络设备的T-MAC层直接向终端设备侧发送MAC控制信令,激活第二网络设备的RRC连接。
应理解,本申请实施例中,步骤1312、1313的数字不表示时间顺序。步骤1312、1313还可以位于步骤1308或步骤1309之后。本申请实施例并不限于此。
图15是根据本申请另一实施例的切换的方法示意性流程图。如图15所示的方法描述了下行数据传输时的具体切换过程。
图15所示的切换方法1400与图12所示的切换方法1400类似,为避免重复此处适当省略详细描述。
具体而言,步骤1401-1408与步骤1401-1408对应,可参见图12中的描述。
步骤1409,第二网络设备根据步骤1408中终端设备的状态报告,向终端设备发送相应的下行数据。例如,PDCP SDU 8,9,14。
步骤1409与步骤1109的区别在于,1109中,第二网络设备可以向终端设备发送RRC激活命令。在1409中仅发送相应的下行数据,RRC激活命令在步骤1412和1413中发送。
步骤1410-1411与步骤1410-1411对应,可参见图12中的描述。
步骤,1412,1413,当第一网络设备接收到标记有“结束”标识的数据包时,第一网络设备向第二网络设备和终端设备发送RRC连接激活指示消息。
图14与图15的区别在于,图14中,RRC激活命令由第二网络设备发出。图15中,RRC激活命令由第一网络设备发出。
应理解,本申请实施例中还可以采用其他的方式发送激活RRC,并不限于图12、13图15中的激活方式。
例如,可替代地,本申请实施例中,激活RRC过程,还可以是在步骤1109之后,第二网络设备向第一网络设备指示RRC激活,以指示第一网络设备去激活原始的RRC连接。
可替代地,本申请实施例中,还可以是在步骤1109之后,即终端设备在接收到RRC激活消息后,向第一网络设备发送RRC激活的通知消息,通知第一网络设备,终端设备已经激活了第二网络设备侧的RRC连接。
图16是根据本申请另一实施例的切换的方法示意性流程图。如图16所示的方法描述了下行数据传输时的具体切换过程。
图16所示的切换方法1500与图12所示的切换方法1100类似,为避免重复此处适当省略详细描述。
以下主要描述图16与图12的区别,15与图12的相同部分将省略详细描述。
步骤1501至1504与1101至1104相对应,区别在于步骤1502和步骤1503携带相应内容的消息为切换请求消息和切换请求应答消息。
在步骤1503或步骤1504之后,第一网络设备开始向第二网络设备转发下行数据,例如,发送PDCP SDU1…10,为保证0ms切换中断时间,下行数据需要提前在第二网络设备准备好。但考虑到第二网络设备此时还没有与终端设备建立连接,还不能向终端设备发送下行数据,第一网络设备向第二网络设备转发数据会增加第二网络设备的存储负担,为此,第一网络设备可以向第二网络设备发送状态报告(SN status Transfer),指示哪些 数据终端设备已经成功接收,这样第二网络设备可以将成功接收到的数据包丢掉,只保存终端设备还没有成功接收到的数据。
这样,第一网络设备在向终端设备发送数据的过程中,一部分数据在第二网络设备也进行了备份。
步骤1505,1506与步骤1105,1106对应,终端设备同步到第二网络设备,并获取上行资源和TA。
步骤1507:终端设备使用步骤1506获取到的上行资源和TA向第二网络设备发送第一配置完成消息,例如,RRC连接重配置完成消息,该消息还可以携带状态报告(SN Status Report),该状态报告用于终端设备向第二网络设备指示之前的过程中哪些数据包已经成功接收到,哪些数据包没有成功接收到。例如,数据包8,9,14没有成功接收到,步骤1507之后,终端设备开始从第二网络设备接收数据,第二网络设备向终端设备发送没有成功接收到的数据和新的数据。
例如,第二网络设备向终端设备发送PDCP SDU 8,9,14。
步骤1508,终端设备向第二网络设备发送状态报告,例如,发送是否成功接收PDCP SDU 8,9,14的状态报告。
步骤1510、1511与1110,1111相对应。可参见图12中的描述。
图17是根据本申请另一实施例的切换的方法示意性流程图。如图17所示的方法描述了上行数据传输时的具体切换过程。
图17所示的切换方法1600与图13所示的切换方法1200类似,为避免重复此处适当省略详细描述。
以下主要描述图17与图13的区别,图17与图13的相同部分将省略详细描述。
步骤1601至1604与1201至1204相对应,区别在于步骤1602和步骤1603携带相应内容的消息为切换请求消息和切换请求应答消息。
在步骤1603或步骤1604之后,第一网络设备开始向第二网络设备转发上行数据,此时,第一网络设备可以继续向CN转发上行数据,第二网络设备对上行数据进行备份。
并且,第一网络设备可以向第二网络设备发送状态报告(SN status Transfer),通知第二网络设备哪些数据已经递交到CN,这时第二网络设备可以丢掉这些数据,只保存第一网络设备没有递交到CN的数据包。
这样,从终端设备来的上行数据,到达第一网络设备之后,第一网络设备经过解密,排序等处理后,向CN递交,对于没有递交的数据,转发至第二网络设备。
步骤1605、1606与1205至1206相对应终端设备同步到第二网络设备,并获取上行资源和TA。
1607,终端设备向第二网络设备发送第一配置完成消息。
具体的,当终端设备接收到第二网络设备的UL Grant和TA时,在基于非竞争随机接入过程中,表示上行接入成功。之后,该终端设备可以向该第二网络设备发送第一配置完成消息(也可以称为RRC连接重配置完成消息(RRC Connection Reconfiguration Complete)),指示该终端设备成功接入该第二网络设备。
在步骤1607之前,终端设备向第一网络设备发送上行数据,在步骤1607及之后,终端设备开始向第二网络设备发送上行数据,终端设备首先向第二网络设备发送没有被确 认成功接收到的数据包(例如,PDCP SDU7),然后再发送新的数据包(例如,PDCP SDU 9,10)。第二网络设备在接收到RRC连接重配置完成消息及相应数据后,开始向CN递交上行数据(例如,PDCP SDU 7,8,9,10)。
1609,1610与1209,1210相对应。可参见图13中的描述。
应注意,图12至图17的例子仅仅是为了帮助本领域技术人员理解本申请实施例,而非要将本申请实施例限于所例示的具体数值或具体场景。本领域技术人员根据所给出的图12至图17的例子,显然可以进行各种等价的修改或变化,这样的修改或变化也落入本申请实施例的范围内。
应理解,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
上文中结合图1至图17详细描述了根据本申请实施例的切换的方法,下面将结合图18至22详细描述本申请实施例的设备。
图18示出了根据本申请实施例的第一网络设备1700的示意性框图,具体地,如图18所示,该第一网络设备1700包括:处理单元1710和收发单元1720。
具体地,所述处理单元控制所述收发单元用于向终端设备发送第一配置消息,所述第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述终端设备配置有与所述第一网络设备关联的第一加密/解密功能和所述第一数据包编号/排序功能;
接收所述终端设备发送的第一配置完成消息。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
可选地,作为另一实施例,所述第二网络设备配置有第三加密/解密功能,所述第三加密/解密功能与所述第二加密/解密功能对应,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
可选地,作为另一实施例,所述处理单元还用于配置第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
可选地,作为另一实施例,所述终端设备建立有第二分组数据汇聚协议PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
在所述终端设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理,
在所述终端设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
或者,
所述终端设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包 括所述第一加密/解密功能和所述第一数据包编号/排序功能,
在所述终端设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理,
在所述终端设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
可选地,作为另一实施例,所述收发单元还用于在向终端设备发送第一配置消息之前,
向所述第二网络设备发送第一请求消息,所述第一请求消息用于请求将所述终端设备切换至所述第二网络设备或者所述第一请求消息用于请求为所述终端设备添加所述第二网络设备为辅助服务设备,其中所述第一请求消息中包括以下至少一项:
所述第一网络设备为所述第二网络设备分配的与所述终端设备关联的第一安全密钥、
所述第一网络设备使用的与所述终端设备关联的第二安全密钥、
指示所述终端设备具有多连接式的切换能力的第一指示信息、
指示所述终端设备具有多连接通信能力的第二指示信息、
指示所述第一网络设备向所述第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息;
接收所述第二网络设备发送的应答消息,所述应答消息用于指示所述第二网络设备接受所述第一网络设备的第一请求消息的请求,所述应答消息中包括以下至少一项:
所述第二网络设备为所述终端设备分配的第三安全密钥、
所述第二网络设备配置所述终端设备的PDCP实体的配置参数、
所述第二网络设备配置所述终端设备建立对应所述第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能的配置参数、
指示所述终端设备使用所述第一数据包编号/排序功能的第四指示信息、
指示所述终端设备在与所述第二网络设备通信时使用所述第一网络设备为所述终端设备分配的与所述第一网络设备对应的安全密钥的第五指示信息。
可选地,作为另一实施例,所述收发单元还用于在接收所述终端设备发送的第一配置完成消息之后,
向所述第二网络设备发送第六指示信息,所述第六指示信息用于指示所述终端设备已完成RRC连接重配置;
或者,
向所述终端设备发送第七指示信息,所述第七指示信息用于指示所述终端设备释放与所述第一网络设备的RRC连接;
或者,
向所述终端设备发送第八指示信息,所述第八指示信息用于指示所述终端设备启动与所述第二网络设备的RRC连接。
可选地,作为另一实施例,所述收发单元还用于
向所述第二网络设备发送未加密的第一数据,以使得所述第二网络设备使用第三加密/解密功能对所述第一数据进行加密,所述第一数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
或者,
接收所述第二网络设备发送的使用第三加密/解密功能解密后的第二数据。
可选地,作为另一实施例,所述收发单元还用于
将经过第五加密/解密功能加密的第三数据发送至所述第二网络设备,所述第三数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
或者,
接收所述第二网络设备发送的、未解密的第四数据;
所述第一网络设备使用第五加密/解密功能对所述第四数据解密。
可选地,作为另一实施例,所述收发单元还用于向所述第二网络设备发送第九指示信息,所述第九指示信息用于指示所述终端设备已成功接收的下行数据,以便所述第二网络设备丢弃所述终端设备已成功接收的下行数据。
可选地,作为另一实施例,所述收发单元还用于向所述第二网络设备发送第十指示信息,所述第十指示信息用于指示所述第一网络设备已成功递交到第三网络设备的上行数据,以便所述第二网络设备丢弃所述第一网络设备已成功递交到第三网络设备的上行数据。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
应理解,图18所示的第一网络设备1700能够实现图2至图17方法实施例中涉及第一网络设备的各个过程。第一网络设备1700中的各个模块的操作和/或功能,分别为了实现图2至图17中的方法实施例中的相应流程。具体可参见上述方法实施例中的描述,为避免重复,此处适当省略详述描述。
图19示出了根据本申请实施例的第二网络设备1800的示意性框图,具体地,如图19所示,该第二网络设备1800包括:处理单元1810和收发单元1820。
具体地,所述处理单元控制所述收发单元用于接收第一网络设备发送的第一请求消息,所述第一请求消息用于请求将终端设备切换至所述第二网络设备或者所述第一请求消息用于请求为所述终端设备添加所述第二网络设备为辅助服务设备,其中所述第一请求消息中包括以下至少一项:
所述第一网络设备为所述第二网络设备分配的与所述终端设备关联的第一安全密钥、
所述第一网络设备使用的与所述终端设备关联的第二安全密钥、
指示所述终端设备具有多连接式的切换能力的第一指示信息、
指示所述终端设备具有多连接通信能力的第二指示信息、
指示所述第一网络设备向所述第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息;
向第一网络设备发送应答消息,以使得所述第一网络设备向所述终端设备发送第一配置消息,所述第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述终端设备配置有与所述第一网络设备关联的第一加密/解密功能和所述第一数据包编号/排序功能,其中,所述应答消息用于指示所述第二网络设备接受所述第一网络设备的第一请求消息的请求,所述应答消息中包含以下至少一项:
所述第二网络设备为所述终端设备分配的第三安全密钥、
所述第二网络设备配置所述终端设备的分组数据汇聚协议PDCP实体的配置参数、
所述第二网络设备配置所述终端设备建立对应所述第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能的配置参数、
指示所述终端设备使用所述第一数据包编号/排序功能的第四指示信息、
指示所述终端设备在与所述第二网络设备通信时使用所述第一网络设备为所述终端设备分配的与所述第一网络设备对应的安全密钥的第五指示信息。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
可选地,作为另一实施例,所述处理单元还用于配置第三加密/解密功能,所述第三加密/解密功能与所述第二加密/解密功能对应,
其中,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
可选地,作为另一实施例,所述第一网络设备配置有第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
可选地,作为另一实施例,所述终端设备建立有第二PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
在所述终端设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理;
在所述终端设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
或者,
所述终端设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
在所述终端设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理;
在所述终端设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
可选地,作为另一实施例,所述收发单元还用于接收所述第一网络设备发送的第六指示信息,所述第六指示信息用于指示所述终端设备已完成RRC连接重配置。
可选地,作为另一实施例,所述收发单元还用于接收所述第一网络设备发送的未加密的第一数据,
所述处理单元还用于使用第三加密/解密功能对所述第一数据进行加密,所述第一数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
或者,
所述收发单元还用于向所述第一网络设备发送使用第三加密/解密功能解密后的第二数据。
可选地,作为另一实施例,所述收发单元还用于接收所述第一网络设备发送的经过第五加密/解密功能加密的第三数据,所述第三数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
或者,
向所述第一网络设备发送未解密的第四数据,以便所述第一网络设备使用第五加密/解密功能对所述第四数据解密。
可选地,作为另一实施例,所述收发单元还用于接收所述第一网络设备发送的第九指示信息,所述第九指示信息用于指示所述终端设备已成功接收的下行数据,以便所述第二网络设备丢弃所述终端设备已成功接收的下行数据。
可选地,作为另一实施例,所述收发单元还用于接收所述第一网络设备发送的第十指示信息,所述第十指示信息用于指示所述第一网络设备已成功递交到第三网络设备的上行数据,以便所述第二网络设备丢弃所述第一网络已经成功递交到第三网络设备的上行数据。
可选地,作为另一实施例,所述收发单元还用于在所述第二网络设备与所述终端设备建立RRC连接之后,向所述第一网络设备发送第十一指示消息,所述第十一指示信息用于指示所述第一网络设备停止向所述终端设备发送下行数据。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
应理解,图19所示的第二网络设备1800能够实现图2至图17方法实施例中涉及第二网络设备的各个过程。第二网络设备1800中的各个模块的操作和/或功能,分别为了实现图2至图17中的方法实施例中的相应流程。具体可参见上述方法实施例中的描述,为避免重复,此处适当省略详述描述。
图20示出了根据本申请实施例的终端设备1900的示意性框图,具体地,如图20所示,该终端设备1900包括:处理单元1910和收发单元1920。
具体地所述处理单元控制所述收发单元用于接收第一网络设备发送的第一配置消息,所述第一配置消息用于指示终端设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述终端设备配置有与所述第一网络设备关联 的第一加密/解密功能和所述第一数据包编号/排序功能;
向所述第一网络设备发送第一配置完成消息。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
可选地,作为另一实施例,所述第二网络设备配置有第三加密/解密功能,所述第三加密/解密功能与所述第二加密/解密功能对应,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
可选地,作为另一实施例,所述第一网络设备配置有第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
可选地,作为另一实施例,所述终端设备建立有第二分组数据汇聚协议PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
所述处理单元还用于:
在所述终端设备处理下行数据时,控制所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理;
在所述终端设备处理上行数据时,控制由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
或者,
所述终端设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
所述处理单元还用于:
在所述终端设备处理下行数据时,控制所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理;
在所述终端设备处理上行数据时,控制由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
可选地,作为另一实施例,所述收发单元还用于接收所述第一网络设备发送的第七指示信息,所述第七指示信息用于指示所述终端设备释放与所述第一网络设备的RRC连接;
可选地,所述处理单元还用于释放与所述第一网络设备的RRC连接;
或者,
所述收发单元还用于接收所述第一网络设备发送的第八指示信息,所述第八指示信息用于指示所述终端设备启动与所述第二网络设备的RRC连接;
可选地,所述处理单元还用于启动与所述第二网络设备的RRC连接。
因此,本实施例中通过第一配置信息,终端设备可以配置与第二网络设备关联的功 能,进而在切换时,终端设备可以与第二网络设备与第一网络设备之间同时进行数据传输,减少或避免了由切换引起的业务中断时间。
应理解,图20所示的终端设备1900能够实现图2至图17方法实施例中涉及终端设备的各个过程。终端设备1900中的各个模块的操作和/或功能,分别为了实现图2至图17中的方法实施例中的相应流程。具体可参见上述方法实施例中的描述,为避免重复,此处适当省略详述描述。
图21示出了根据本申请实施例的第一网络设备2000的示意性框图。具体地,如图21所示,该第一网络设备2000包括:处理器2010和收发器2020,处理器2010和收发器2020相连,可选地,该网络设备2000还包括存储器2030,存储器2030与处理器2010相连,其中,处理器2010、存储器2030和收发器2020之间通过内部连接通路互相通信,传递控制和/或数据信号。该存储器2030可以用于存储指令,该处理器2010用于执行该存储器2030存储的指令,控制收发器2020收发送信息或信号,控制器2010在执行存储器2030中的指令能够完成上述图2至图17方法实施例中涉及第一网络设备的各个过程。为避免重复,此处不再赘述。
图22示出了根据本申请实施例的第二网络设备2100的示意性框图。具体地,如图22所示,该第二网络设备2100包括:处理器2110和收发器2120,处理器2110和收发器2120相连,可选地,该第二网络设备2100还包括存储器2130,存储器2130与处理器2110相连,其中,处理器2110、存储器2130和收发器2120之间通过内部连接通路互相通信,传递控制和/或数据信号。该存储器2130可以用于存储指令,该处理器2110用于执行该存储器2130存储的指令控制收发器2120收发送信息或信号,控制器2110在执行存储器2130中的指令能够完成上述图2至图17方法实施例中涉及第二网络设备的各个过程。为避免重复,此处不再赘述。
图23示出了根据本申请实施例的终端设备2200的示意性框图。具体地,如图23所示,该终端设备2200包括:处理器2210和收发器2220,处理器2210和收发器2220相连,可选地,该网络设备2200还包括存储器2230,存储器2230与处理器2210相连,其中,处理器2210、存储器2230和收发器2220之间通过内部连接通路互相通信,传递控制和/或数据信号。该存储器2230可以用于存储指令,该处理器2210用于执行该存储器2230存储的指令控制收发器2220收发送信息或信号,控制器2210在执行存储器2230中的指令能够完成上述图2至图17方法实施例中涉及终端设备的各个过程。为避免重复,此处不再赘述。
应注意,本申请实施例上述的方法实施例可以应用于处理器中(例如,图21中的处理器2010、图22中的处理器2110或图23中的处理器2210),或者由处理器实现。处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方 法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,本申请实施例中的通信设备可以是终端设备,也可以为其他设备,上文中仅以通信设备为终端设备为例进行描述,但本申请实施例并不限于此。其他设备可以包括电路等其他形式的设备。
本申请实施例中的通信设备可以参照图24所示的设备,该设备包括处理器2301,应用处理器,存储器用户接口,以及其他一些元件(包括未示出的电源等设备)。在图24中,上述终端设备中的处理单元可以是所述处理器2301,并完成相应的功能。上述终端设备中的收发单元,可以是图中的无线收发器2303,其通过天线完成相应的功能。可以理解图中所示的各个元件只是示意性的,并不是完成本实施例必须的元件。
本实施例中的通信设备可以参照图25所示的设备。作为一个例子,该设备可以完成类似于图24中处理器的功能。在图25中,该设备包括处理器,发送数据处理器,处理器。在图25中,上述终端设备中的处理单元可以是所述处理器2401,并完成相应的功能。上述终端设备中的收发单元可以包括发送单元和接收单元,所述发送单元可以是图25中发送数据处理器2403,所述接收单元可以是图25中接收数据处理器2405。虽然图中示出了信道编码器、信道解码器,但是可以理解这些模块并不对本实施例构成限制性说明,仅是示意性的。
图26示出本实施例的另一种形式。处理装置2500中包括调制子系统、中央处理子系统、周边子系统等模块。本实施例中的通信设备可以作为其中的调制子系统。具体的,该调制子系统可以包括处理器2503,接口2504。其中处理器2503完成上述处理单元的功能,接口2504完成上述发送单元和/或接收单元的功能。作为另一种变形,该调制子系统包括存储器2506、处理器2503及存储在存储器上并可在处理器上运行的程序,所述处理器执行所述程序时实现实施例一至五之一所述方法。需要注意的是,所述存储器2506可以是非易失性的,也可以是易失性的,其位置可以位于调制子系统内部,也可以位于处理装置2500中,只要该存储器2506可以连接到所述处理器2503即可。
上述各个实施例中处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存取存储器(Random Access Memory,RAM)、闪存、只读存储器(Read-Only Memory,ROM)、可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器2502,处理器2501读取存储器2502中的指令,结合其硬件完成上述方法的步骤。
应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在一实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
另外,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本申请实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口、装置或单元的间接耦合或通信连接,也可以是电的,机械的或其它的形式连接。
作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部 件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本申请实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以是两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本申请可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括RAM、ROM、EEPROM、CD-ROM或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本申请所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。
总之,以上所述仅为本申请技术方案的较佳实施例而已,并非用于限定本申请的保护范围。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (53)

  1. 一种切换的方法,其特征在于,包括:
    第一网络设备向通信设备发送第一配置消息,所述第一配置消息用于指示通信设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述通信设备配置有与所述第一网络设备关联的第一加密/解密功能和所述第一数据包编号/排序功能;
    所述第一网络设备接收所述通信设备发送的第一配置完成消息。
  2. 根据权利要求1所述的方法,其特征在于,
    所述第二网络设备配置有第三加密/解密功能,所述第三加密/解密功能与所述第二加密/解密功能对应,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备配置第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,
    所述通信设备建立有第二分组数据汇聚协议PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理,
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
    或者,
    所述通信设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理,
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,在所述第一网络设备向通信设备发送第一配置消息之前,所述方法还包括:
    所述第一网络设备向所述第二网络设备发送第一请求消息,所述第一请求消息用于请求将所述通信设备切换至所述第二网络设备或者所述第一请求消息用于请求为所述通信设备添加所述第二网络设备为辅助服务设备,其中所述第一请求消息中包括以下至少一 项:
    所述第一网络设备为所述第二网络设备分配的与所述通信设备关联的第一安全密钥、
    所述第一网络设备使用的与所述通信设备关联的第二安全密钥、
    指示所述通信设备具有多连接式的切换能力的第一指示信息、
    指示所述通信设备具有多连接通信能力的第二指示信息、
    指示所述第一网络设备向所述第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息;
    所述第一网络设备接收所述第二网络设备发送的应答消息,所述应答消息用于指示所述第二网络设备接受所述第一网络设备的第一请求消息的请求,所述应答消息中包括以下至少一项:
    所述第二网络设备为所述通信设备分配的第三安全密钥、
    所述第二网络设备配置所述通信设备的PDCP实体的配置参数、
    所述第二网络设备配置所述通信设备建立对应所述第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能的配置参数、
    指示所述通信设备使用所述第一数据包编号/排序功能的第四指示信息、
    指示所述通信设备在与所述第二网络设备通信时使用所述第一网络设备为所述通信设备分配的与所述第一网络设备对应的安全密钥的第五指示信息。
  6. 根据权利要求1至5中任一项所述的方法,其特征在于,在所述第一网络设备接收所述通信设备发送的第一配置完成消息之后,所述方法还包括:
    所述第一网络设备向所述第二网络设备发送第六指示信息,所述第六指示信息用于指示所述通信设备已完成RRC连接重配置;
    或者,
    所述第一网络设备向所述通信设备发送第七指示信息,所述第七指示信息用于指示所述通信设备释放与所述第一网络设备的RRC连接;
    或者,
    所述第一网络设备向所述通信设备发送第八指示信息,所述第八指示信息用于指示所述通信设备启动与所述第二网络设备的RRC连接。
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备向所述第二网络设备发送未加密的第一数据,以使得所述第二网络设备使用第三加密/解密功能对所述第一数据进行加密,所述第一数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
    或者,
    所述第一网络设备接收所述第二网络设备发送的使用第三加密/解密功能解密后的第二数据。
  8. 根据权利要求1至6中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备将经过第五加密/解密功能加密的第三数据发送至所述第二网络设备,所述第三数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
    或者,
    所述第一网络设备接收所述第二网络设备发送的、未解密的第四数据;
    所述第一网络设备使用第五加密/解密功能对所述第四数据解密。
  9. 根据权利要求1至8中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备向所述第二网络设备发送第九指示信息,所述第九指示信息用于指示所述通信设备已成功接收的下行数据,以便所述第二网络设备丢弃所述通信设备已成功接收的下行数据。
  10. 根据权利要求1至8中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备向所述第二网络设备发送第十指示信息,所述第十指示信息用于指示所述第一网络设备已成功递交到第三网络设备的上行数据,以便所述第二网络设备丢弃所述第一网络设备已成功递交到第三网络设备的上行数据。
  11. 一种切换的方法,其特征在于,包括:
    第二网络设备接收第一网络设备发送的第一请求消息,所述第一请求消息用于请求将通信设备切换至所述第二网络设备或者所述第一请求消息用于请求为所述通信设备添加所述第二网络设备为辅助服务设备,其中所述第一请求消息中包括以下至少一项:
    所述第一网络设备为所述第二网络设备分配的与所述通信设备关联的第一安全密钥、
    所述第一网络设备使用的与所述通信设备关联的第二安全密钥、
    指示所述通信设备具有多连接式的切换能力的第一指示信息、
    指示所述通信设备具有多连接通信能力的第二指示信息、
    指示所述第一网络设备向所述第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息;
    第二网络设备向第一网络设备发送应答消息,以使得所述第一网络设备向所述通信设备发送第一配置消息,所述第一配置消息用于指示通信设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述通信设备配置有与所述第一网络设备关联的第一加密/解密功能和所述第一数据包编号/排序功能,其中,所述应答消息用于指示所述第二网络设备接受所述第一网络设备的第一请求消息的请求,所述应答消息中包含以下至少一项:
    所述第二网络设备为所述通信设备分配的第三安全密钥、
    所述第二网络设备配置所述通信设备的分组数据汇聚协议PDCP实体的配置参数、
    所述第二网络设备配置所述通信设备建立对应所述第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能的配置参数、
    指示所述通信设备使用所述第一数据包编号/排序功能的第四指示信息、
    指示所述通信设备在与所述第二网络设备通信时使用所述第一网络设备为所述通信设备分配的与所述第一网络设备对应的安全密钥的第五指示信息。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备配置第三加密/解密功能,所述第三加密/解密功能与所述第二加密/解密功能对应,
    其中,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
  13. 根据权利要求11或12所述的方法,其特征在于,
    所述第一网络设备配置有第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
  14. 根据权利要求11至13中任一项所述的方法,其特征在于,所述通信设备建立有第二PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理;
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
    或者,
    所述通信设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理;
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
  15. 根据权利要求11至14中任一项所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备接收所述第一网络设备发送的第六指示信息,所述第六指示信息用于指示所述通信设备已完成RRC连接重配置。
  16. 根据权利要求11至15中任一项所述的方法,其特征在于所述方法还包括:
    所述第二网络设备接收所述第一网络设备发送的未加密的第一数据,
    所述第二网络设备使用第三加密/解密功能对所述第一数据进行加密,所述第一数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
    或者,
    所述第二网络设备向所述第一网络设备发送使用第三加密/解密功能解密后的第二数据。
  17. 根据权利要求11至16中任一项所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备接收所述第一网络设备发送的经过第五加密/解密功能加密的第三数据,所述第三数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
    或者,
    所述第二网络设备向所述第一网络设备发送未解密的第四数据,以便所述第一网络 设备使用第五加密/解密功能对所述第四数据解密。
  18. 根据权利要求11至17中任一项所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备接收所述第一网络设备发送的第九指示信息,所述第九指示信息用于指示所述通信设备已成功接收的下行数据,以便所述第二网络设备丢弃所述通信设备已成功接收的下行数据。
  19. 根据权利要求11至17中任一项所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备接收所述第一网络设备发送的第十指示信息,所述第十指示信息用于指示所述第一网络设备已成功递交到第三网络设备的上行数据,以便所述第二网络设备丢弃所述第一网络已经成功递交到第三网络设备的上行数据。
  20. 根据权利要求11至19中任一项所述的方法,其特征在于,所述方法还包括:
    在所述第二网络设备与所述通信设备建立RRC连接之后,所述第二网络设备向所述第一网络设备发送第十一指示消息,所述第十一指示信息用于指示所述第一网络设备停止向所述通信设备发送下行数据。
  21. 一种切换的方法,其特征在于,包括:
    通信设备接收第一网络设备发送的第一配置消息,所述第一配置消息用于指示通信设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述通信设备配置有与所述第一网络设备关联的第一加密/解密功能和所述第一数据包编号/排序功能;
    所述通信设备向所述第一网络设备发送第一配置完成消息。
  22. 根据权利要求21所述的方法,其特征在于,
    所述第二网络设备配置有第三加密/解密功能,所述第三加密/解密功能与所述第二加密/解密功能对应,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
  23. 根据权利要求21或22所述的方法,其特征在于,
    所述第一网络设备配置有第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
  24. 根据权利要求21至23中任一项所述的方法,其特征在于,
    所述通信设备建立有第二分组数据汇聚协议PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    所述方法还包括:
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理;
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
    或者,
    所述通信设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    所述方法还包括:
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理;
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
  25. 根据权利要求21至24中任一项所述的方法,其特征在于,所述方法还包括:
    所述通信设备接收所述第一网络设备发送的第七指示信息,所述第七指示信息用于指示所述通信设备释放与所述第一网络设备的RRC连接;
    或者,
    所述通信设备接收所述第一网络设备发送的第八指示信息,所述第八指示信息用于指示所述通信设备启动与所述第二网络设备的RRC连接。
  26. 一种第一网络设备,其特征在于,包括:
    处理单元和收发单元,
    所述处理单元控制所述收发单元用于向通信设备发送第一配置消息,所述第一配置消息用于指示通信设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述通信设备配置有与所述第一网络设备关联的第一加密/解密功能和所述第一数据包编号/排序功能;
    接收所述通信设备发送的第一配置完成消息。
  27. 根据权利要求26所述的第一网络设备,其特征在于,
    所述第二网络设备配置有第三加密/解密功能,所述第三加密/解密功能与所述第二加密/解密功能对应,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
  28. 根据权利要求26或27所述的第一网络设备,其特征在于,
    所述处理单元还用于配置第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
  29. 根据权利要求26至28中任一项所述的第一网络设备,其特征在于,
    所述通信设备建立有第二分组数据汇聚协议PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理,
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
    或者,
    所述通信设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理,
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
  30. 根据权利要求26至29中任一项所述的第一网络设备,其特征在于,
    所述收发单元还用于在向通信设备发送第一配置消息之前,
    向所述第二网络设备发送第一请求消息,所述第一请求消息用于请求将所述通信设备切换至所述第二网络设备或者所述第一请求消息用于请求为所述通信设备添加所述第二网络设备为辅助服务设备,其中所述第一请求消息中包括以下至少一项:
    所述第一网络设备为所述第二网络设备分配的与所述通信设备关联的第一安全密钥、
    所述第一网络设备使用的与所述通信设备关联的第二安全密钥、
    指示所述通信设备具有多连接式的切换能力的第一指示信息、
    指示所述通信设备具有多连接通信能力的第二指示信息、
    指示所述第一网络设备向所述第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息;
    接收所述第二网络设备发送的应答消息,所述应答消息用于指示所述第二网络设备接受所述第一网络设备的第一请求消息的请求,所述应答消息中包括以下至少一项:
    所述第二网络设备为所述通信设备分配的第三安全密钥、
    所述第二网络设备配置所述通信设备的PDCP实体的配置参数、
    所述第二网络设备配置所述通信设备建立对应所述第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能的配置参数、
    指示所述通信设备使用所述第一数据包编号/排序功能的第四指示信息、
    指示所述通信设备在与所述第二网络设备通信时使用所述第一网络设备为所述通信设备分配的与所述第一网络设备对应的安全密钥的第五指示信息。
  31. 根据权利要求26至30中任一项所述的第一网络设备,其特征在于,
    所述收发单元还用于在接收所述通信设备发送的第一配置完成消息之后,
    向所述第二网络设备发送第六指示信息,所述第六指示信息用于指示所述通信设备已完成RRC连接重配置;
    或者,
    向所述通信设备发送第七指示信息,所述第七指示信息用于指示所述通信设备释放与所述第一网络设备的RRC连接;
    或者,
    向所述通信设备发送第八指示信息,所述第八指示信息用于指示所述通信设备启动 与所述第二网络设备的RRC连接。
  32. 根据权利要求26至31中任一项所述的第一网络设备,其特征在于,
    所述收发单元还用于
    向所述第二网络设备发送未加密的第一数据,以使得所述第二网络设备使用第三加密/解密功能对所述第一数据进行加密,所述第一数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
    或者,
    接收所述第二网络设备发送的使用第三加密/解密功能解密后的第二数据。
  33. 根据权利要求26至31中任一项所述的第一网络设备,其特征在于,
    所述收发单元还用于
    将经过第五加密/解密功能加密的第三数据发送至所述第二网络设备,所述第三数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
    或者,
    接收所述第二网络设备发送的、未解密的第四数据;
    所述第一网络设备使用第五加密/解密功能对所述第四数据解密。
  34. 根据权利要求26至33中任一项所述的第一网络设备,其特征在于,
    所述收发单元还用于向所述第二网络设备发送第九指示信息,所述第九指示信息用于指示所述通信设备已成功接收的下行数据,以便所述第二网络设备丢弃所述通信设备已成功接收的下行数据。
  35. 根据权利要求26至33中任一项所述的第一网络设备,其特征在于,
    所述收发单元还用于向所述第二网络设备发送第十指示信息,所述第十指示信息用于指示所述第一网络设备已成功递交到第三网络设备的上行数据,以便所述第二网络设备丢弃所述第一网络设备已成功递交到第三网络设备的上行数据。
  36. 一种第二网络设备,其特征在于,包括:
    处理单元和收发单元,
    所述处理单元控制所述收发单元用于接收第一网络设备发送的第一请求消息,所述第一请求消息用于请求将通信设备切换至所述第二网络设备或者所述第一请求消息用于请求为所述通信设备添加所述第二网络设备为辅助服务设备,其中所述第一请求消息中包括以下至少一项:
    所述第一网络设备为所述第二网络设备分配的与所述通信设备关联的第一安全密钥、
    所述第一网络设备使用的与所述通信设备关联的第二安全密钥、
    指示所述通信设备具有多连接式的切换能力的第一指示信息、
    指示所述通信设备具有多连接通信能力的第二指示信息、
    指示所述第一网络设备向所述第二网络设备转发的数据是重复版本还是非重复版本的第三指示信息;
    向第一网络设备发送应答消息,以使得所述第一网络设备向所述通信设备发送第一 配置消息,所述第一配置消息用于指示通信设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述通信设备配置有与所述第一网络设备关联的第一加密/解密功能和所述第一数据包编号/排序功能,其中,所述应答消息用于指示所述第二网络设备接受所述第一网络设备的第一请求消息的请求,所述应答消息中包含以下至少一项:
    所述第二网络设备为所述通信设备分配的第三安全密钥、
    所述第二网络设备配置所述通信设备的分组数据汇聚协议PDCP实体的配置参数、
    所述第二网络设备配置所述通信设备建立对应所述第二网络设备的第二头添加/移除功能和/或第二加密/解密功能和/或第二头压缩/解压缩功能的配置参数、
    指示所述通信设备使用所述第一数据包编号/排序功能的第四指示信息、
    指示所述通信设备在与所述第二网络设备通信时使用所述第一网络设备为所述通信设备分配的与所述第一网络设备对应的安全密钥的第五指示信息。
  37. 根据权利要求36所述的第二网络设备,其特征在于,
    所述处理单元还用于配置第三加密/解密功能,所述第三加密/解密功能与所述第二加密/解密功能对应,
    其中,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
  38. 根据权利要求36或37所述的第二网络设备,其特征在于,
    所述第一网络设备配置有第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
  39. 根据权利要求36至38中任一项所述的第二网络设备,其特征在于,所述通信设备建立有第二PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理;
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
    或者,
    所述通信设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    在所述通信设备处理下行数据时,所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理;
    在所述通信设备处理上行数据时,由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
  40. 根据权利要求36至39中任一项所述的第二网络设备,其特征在于,
    所述收发单元还用于接收所述第一网络设备发送的第六指示信息,所述第六指示信息用于指示所述通信设备已完成RRC连接重配置。
  41. 根据权利要求36至40中任一项所述的第二网络设备,其特征在于,
    所述收发单元还用于接收所述第一网络设备发送的未加密的第一数据,
    所述处理单元还用于使用第三加密/解密功能对所述第一数据进行加密,所述第一数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
    或者,
    所述收发单元还用于向所述第一网络设备发送使用第三加密/解密功能解密后的第二数据。
  42. 根据权利要求36至41中任一项所述的第二网络设备,其特征在于,所述收发单元还用于接收所述第一网络设备发送的经过第五加密/解密功能加密的第三数据,所述第三数据为所述第一网络设备的PDCP层从所述PDCP层的上层接收到的全部数据的部分或全部;
    或者,
    向所述第一网络设备发送未解密的第四数据,以便所述第一网络设备使用第五加密/解密功能对所述第四数据解密。
  43. 根据权利要求36至42中任一项所述的第二网络设备,其特征在于,
    所述收发单元还用于接收所述第一网络设备发送的第九指示信息,所述第九指示信息用于指示所述通信设备已成功接收的下行数据,以便所述第二网络设备丢弃所述通信设备已成功接收的下行数据。
  44. 根据权利要求36至42中任一项所述的第二网络设备,其特征在于,
    所述收发单元还用于接收所述第一网络设备发送的第十指示信息,所述第十指示信息用于指示所述第一网络设备已成功递交到第三网络设备的上行数据,以便所述第二网络设备丢弃所述第一网络已经成功递交到第三网络设备的上行数据。
  45. 根据权利要求36至44中任一项所述的第二网络设备,其特征在于,
    所述收发单元还用于在所述第二网络设备与所述通信设备建立RRC连接之后,向所述第一网络设备发送第十一指示消息,所述第十一指示信息用于指示所述第一网络设备停止向所述通信设备发送下行数据。
  46. 一种通信设备,其特征在于,包括:
    处理单元和收发单元,
    所述处理单元控制所述收发单元用于接收第一网络设备发送的第一配置消息,所述第一配置消息用于指示通信设备配置与第二网络设备关联的第二加密/解密功能、且共享第一数据包编号/排序功能,其中,所述通信设备配置有与所述第一网络设备关联的第一加密/解密功能和所述第一数据包编号/排序功能;
    向所述第一网络设备发送第一配置完成消息。
  47. 根据权利要求46所述的通信设备,其特征在于,
    所述第二网络设备配置有第三加密/解密功能,所述第三加密/解密功能与所述第二加 密/解密功能对应,所述第一网络设备配置有第四加密/解密功能,所述第四加密/解密功能与所述第一加密/解密功能对应。
  48. 根据权利要求46或47所述的通信设备,其特征在于,
    所述第一网络设备配置有第五加密/解密功能,所述第五加密/解密功能与所述第二加密/解密功能对应。
  49. 根据权利要求46至48中任一项所述的通信设备,其特征在于,
    所述通信设备建立有第二分组数据汇聚协议PDCP实体和第一PDCP实体,所述第二PDCP实体包括所述第二加密/解密功能和第二数据包编号/排序功能,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    所述处理单元还用于:
    在所述通信设备处理下行数据时,控制所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二PDCP实体中的所述第二加密/解密功能解密处理后的数据进行排序处理;
    在所述通信设备处理上行数据时,控制由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二PDCP实体中的所述第二加密/解密功能进行加密处理;
    或者,
    所述通信设备建立有第二加密/解密功能和第一PDCP实体,所述第一PDCP实体包括所述第一加密/解密功能和所述第一数据包编号/排序功能,
    所述处理单元还用于:
    在所述通信设备处理下行数据时,控制所述第一PDCP实体中的所述第一数据包编号/排序功能对经由所述第二加密/解密功能解密处理后的数据进行排序处理;
    在所述通信设备处理上行数据时,控制由所述第一PDCP实体中的所述第一数据包编号/排序功能对数据编号处理后发往所述第一PDCP实体中所述第一加密/解密功能和/或所述第二加密/解密功能进行加密处理。
  50. 根据权利要求46至49中任一项所述的通信设备,其特征在于,
    所述收发单元还用于接收所述第一网络设备发送的第七指示信息,所述第七指示信息用于指示所述通信设备释放与所述第一网络设备的RRC连接;
    或者,
    所述收发单元还用于接收所述第一网络设备发送的第八指示信息,所述第八指示信息用于指示所述通信设备启动与所述第二网络设备的RRC连接。
  51. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至10中任一项所述的方法。
  52. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求11至20中任一项所述的方法。
  53. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求21至25中任一项所述的方法。
PCT/CN2018/080279 2017-03-24 2018-03-23 切换的方法和设备 WO2018171738A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP18772456.2A EP3592037B1 (en) 2017-03-24 2018-03-23 Method and device for switching
PL18772456T PL3592037T3 (pl) 2017-03-24 2018-03-23 Sposób i urządzenie do przełączania
EP21171708.7A EP3923632A1 (en) 2017-03-24 2018-03-23 Handover method and device
US16/579,550 US10986549B2 (en) 2017-03-24 2019-09-23 Handover method and device
US17/201,776 US11751112B2 (en) 2017-03-24 2021-03-15 Handover method and device
US18/216,827 US20230422121A1 (en) 2017-03-24 2023-06-30 Handover method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710186542.6A CN108632934B (zh) 2017-03-24 2017-03-24 切换的方法和设备
CN201710186542.6 2017-03-24

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/579,550 Continuation US10986549B2 (en) 2017-03-24 2019-09-23 Handover method and device

Publications (1)

Publication Number Publication Date
WO2018171738A1 true WO2018171738A1 (zh) 2018-09-27

Family

ID=63585953

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/080279 WO2018171738A1 (zh) 2017-03-24 2018-03-23 切换的方法和设备

Country Status (5)

Country Link
US (3) US10986549B2 (zh)
EP (2) EP3923632A1 (zh)
CN (2) CN108632934B (zh)
PL (1) PL3592037T3 (zh)
WO (1) WO2018171738A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021025523A1 (en) 2019-08-07 2021-02-11 Samsung Electronics Co., Ltd. Method and apparatus for performing handover of terminal in wireless communication system
KR20210066868A (ko) * 2018-09-28 2021-06-07 다탕 모바일 커뮤니케이션즈 이큅먼트 코포레이션 리미티드 링크 스위칭 방법, 네트워크 엔티티 및 단말
KR20210088659A (ko) * 2018-11-09 2021-07-14 비보 모바일 커뮤니케이션 컴퍼니 리미티드 셀 전환 방법, 단말 및 통신 노드
KR20210114994A (ko) * 2019-01-14 2021-09-24 지티이 코포레이션 접속 무선 상태에서의 모빌리티 강화
EP4009699A4 (en) * 2019-08-01 2022-10-05 Vivo Mobile Communication Co., Ltd. DATA SENDING PROCESS AND USER EQUIPMENT

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632934B (zh) * 2017-03-24 2021-01-01 华为技术有限公司 切换的方法和设备
CN110622558A (zh) * 2017-07-25 2019-12-27 Oppo广东移动通信有限公司 切换方法、接入网设备和终端设备
CN109803315B (zh) * 2017-11-17 2022-08-19 中兴通讯股份有限公司 数据传输方法及装置
US11122477B2 (en) * 2018-02-26 2021-09-14 Qualcomm Incorporated User plane function (UPF) duplication based make before break handover
BR112021006164A2 (pt) 2018-10-15 2021-06-29 Guangdong Oppo Mobile Telecommunications Corp., Ltd. método de comunicação sem fio, dispositivo de comunicação, chip e meio de armazenamento legível por computador
CN112544104B (zh) * 2018-11-01 2024-01-09 Oppo广东移动通信有限公司 数据的传输方法及终端
EP3876621B1 (en) * 2018-11-02 2024-01-03 Beijing Xiaomi Mobile Software Co., Ltd. Data transmission methods and apparatuses
CN111200852A (zh) * 2018-11-20 2020-05-26 中兴通讯股份有限公司 一种语音呼叫方法、设备和存储介质
CN111356205B (zh) * 2018-12-21 2021-12-14 华为技术有限公司 公共陆地移动网络的配置信息的处理方法及装置
CN111356189A (zh) * 2018-12-24 2020-06-30 中兴通讯股份有限公司 终端的切换指示、切换转发、切换处理方法及装置
CN115396927A (zh) * 2018-12-29 2022-11-25 华为技术有限公司 通信方法和装置
CN111699649A (zh) * 2019-01-14 2020-09-22 Oppo广东移动通信有限公司 一种数据流处理方法、设备及存储介质
KR20200098339A (ko) * 2019-02-12 2020-08-20 삼성전자주식회사 무선 통신 시스템에서 데이터를 송수신하는 방법 및 장치
WO2020220238A1 (zh) * 2019-04-30 2020-11-05 Oppo广东移动通信有限公司 用于小区切换的方法及设备
CN113348700A (zh) * 2019-05-14 2021-09-03 Oppo广东移动通信有限公司 切换接入网设备的方法、终端设备和网络设备
CN112118608B (zh) * 2019-06-21 2023-01-10 中兴通讯股份有限公司 一种终端切换小区的方法、装置及基站
CN112399489A (zh) * 2019-08-14 2021-02-23 夏普株式会社 小区切换方法以及用户设备
CN112449348B (zh) * 2019-08-16 2022-11-18 华为技术有限公司 通信方法和通信装置
CN113508616A (zh) * 2019-08-22 2021-10-15 Oppo广东移动通信有限公司 一种信息处理方法及终端设备
WO2021068199A1 (zh) * 2019-10-11 2021-04-15 Oppo广东移动通信有限公司 一种切换处理方法、网络设备
CN110856211B (zh) * 2019-11-14 2022-10-11 成都天奥集团有限公司 一种非地面移动通信网络下基于l2内部数据迁移的低时延切换方法
CN111328118B (zh) * 2020-02-25 2021-12-21 展讯通信(上海)有限公司 传输方法及装置
CN114070497B (zh) * 2020-07-30 2023-02-03 上海华为技术有限公司 一种消息发送的方法、设备以及存储介质
WO2022252180A1 (zh) * 2021-06-03 2022-12-08 Oppo广东移动通信有限公司 业务控制方法、装置、设备及存储介质
CN116266937A (zh) * 2021-12-17 2023-06-20 华为技术有限公司 一种小区切换的方法和通信装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123457A (zh) * 2010-01-11 2011-07-13 中兴通讯股份有限公司 切换方法及终端
CN103889009A (zh) * 2012-12-21 2014-06-25 华为技术有限公司 切换方法和设备
US20160262066A1 (en) * 2015-03-04 2016-09-08 Qualcomm Incorporated Dual link handover

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100250323B1 (ko) 1997-10-10 2000-04-01 정몽규 무인 자동차의 화상 처리 장치 및 방법
JP4114292B2 (ja) 1998-12-03 2008-07-09 アイシン・エィ・ダブリュ株式会社 運転支援装置
US20020084894A1 (en) 2001-01-03 2002-07-04 Horng Chun Hsien Traffic condition monitoring system with cameras for vehicle
US9428186B2 (en) 2002-04-09 2016-08-30 Intelligent Technologies International, Inc. Exterior monitoring for vehicles
US20090168724A1 (en) * 2006-06-20 2009-07-02 Ntt Docomo, Inc. User apparatus, base station and method for use in mobile communication system
WO2008054276A1 (en) * 2006-11-02 2008-05-08 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangements for ciphering management in a telecommunication system
KR101488015B1 (ko) * 2008-01-25 2015-01-29 엘지전자 주식회사 핸드오버 수행방법 및 데이터 생성방법
KR101262921B1 (ko) 2009-11-10 2013-05-09 한국전자통신연구원 차량의 차선 유지 및 이탈 방지 장치, 및 그 방법
JP5479956B2 (ja) 2010-03-10 2014-04-23 クラリオン株式会社 車両用周囲監視装置
CN102281535A (zh) 2010-06-10 2011-12-14 华为技术有限公司 一种密钥更新方法与装置
JP5747998B2 (ja) 2011-11-08 2015-07-15 トヨタ自動車株式会社 車両の走行軌跡制御装置
CN103582044B (zh) * 2012-08-10 2018-04-10 华为技术有限公司 一种切换控制方法及装置
CN102833802B (zh) * 2012-08-15 2015-09-23 电信科学技术研究院 一种数据转发方法及设备
EP2713651A1 (en) * 2012-09-28 2014-04-02 Alcatel Lucent Method for handover management within heterogeneous networks
JP6348517B2 (ja) * 2013-02-12 2018-06-27 アルティオスター ネットワークス, インコーポレイテッド ロングタームエボリューション無線アクセスネットワーク
EP2835925B1 (en) 2013-08-09 2018-08-08 Panasonic Intellectual Property Corporation of America Efficient Status Reporting for UEs in dual connectivity during mobility
GB2520923B (en) * 2013-11-01 2017-07-26 Samsung Electronics Co Ltd Bearer reconfiguration
CN104955064B (zh) * 2014-03-28 2019-01-11 上海诺基亚贝尔股份有限公司 一种在双连接系统中处理用户设备端rlc/pdcp实体的方法与设备
EP3142450B1 (en) * 2014-05-07 2019-02-20 Nec Corporation Communication system and communication method
WO2016021820A1 (en) * 2014-08-08 2016-02-11 Lg Electronics Inc. Method for processing a packet data convergence protocol re-ordering function at a user equipment in a dual connectivity system and device therefor
JP6465730B2 (ja) 2015-04-21 2019-02-06 アルパイン株式会社 電子装置、走行車線識別システムおよび走行車線識別方法
EP3081433A1 (en) 2015-10-12 2016-10-19 Continental Automotive GmbH An improved camera module for vehicle
US10322717B2 (en) 2016-01-04 2019-06-18 GM Global Technology Operations LLC Expert mode for vehicles
CN108778879B (zh) 2016-03-15 2021-07-27 本田技研工业株式会社 车辆控制系统、车辆控制方法及存储介质
KR102502279B1 (ko) * 2016-07-08 2023-02-21 삼성전자 주식회사 무선 통신 시스템에 있어서 핸드오버를 수행하는 방법 및 장치
US20180083972A1 (en) * 2016-09-20 2018-03-22 Lg Electronics Inc. Method and apparatus for security configuration in wireless communication system
US10448386B2 (en) * 2017-01-06 2019-10-15 Kt Corporation Method and apparatus for controlling redundant data transmission
CN108632934B (zh) * 2017-03-24 2021-01-01 华为技术有限公司 切换的方法和设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123457A (zh) * 2010-01-11 2011-07-13 中兴通讯股份有限公司 切换方法及终端
CN103889009A (zh) * 2012-12-21 2014-06-25 华为技术有限公司 切换方法和设备
US20160262066A1 (en) * 2015-03-04 2016-09-08 Qualcomm Incorporated Dual link handover

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20210066868A (ko) * 2018-09-28 2021-06-07 다탕 모바일 커뮤니케이션즈 이큅먼트 코포레이션 리미티드 링크 스위칭 방법, 네트워크 엔티티 및 단말
EP3860217A4 (en) * 2018-09-28 2022-03-09 Datang Mobile Communications Equipment Co., Ltd. CONNECTION SWITCHING METHOD, NETWORK UNIT AND TERMINAL
KR102561224B1 (ko) * 2018-09-28 2023-07-27 다탕 모바일 커뮤니케이션즈 이큅먼트 코포레이션 리미티드 링크 스위칭 방법, 네트워크 엔티티 및 단말
KR20210088659A (ko) * 2018-11-09 2021-07-14 비보 모바일 커뮤니케이션 컴퍼니 리미티드 셀 전환 방법, 단말 및 통신 노드
US20210258840A1 (en) * 2018-11-09 2021-08-19 Vivo Mobile Communication Co., Ltd. Cell handover method, terminal, and communication node
KR102593774B1 (ko) * 2018-11-09 2023-10-25 비보 모바일 커뮤니케이션 컴퍼니 리미티드 셀 전환 방법, 단말 및 통신 노드
KR20210114994A (ko) * 2019-01-14 2021-09-24 지티이 코포레이션 접속 무선 상태에서의 모빌리티 강화
KR102572448B1 (ko) * 2019-01-14 2023-08-29 지티이 코포레이션 접속 무선 상태에서의 모빌리티 강화
EP4009699A4 (en) * 2019-08-01 2022-10-05 Vivo Mobile Communication Co., Ltd. DATA SENDING PROCESS AND USER EQUIPMENT
WO2021025523A1 (en) 2019-08-07 2021-02-11 Samsung Electronics Co., Ltd. Method and apparatus for performing handover of terminal in wireless communication system
EP3994916A4 (en) * 2019-08-07 2022-10-12 Samsung Electronics Co., Ltd. METHOD AND DEVICE FOR PERFORMING HANDOVER IN A WIRELESS COMMUNICATION SYSTEM

Also Published As

Publication number Publication date
CN112738858A (zh) 2021-04-30
EP3592037A1 (en) 2020-01-08
EP3592037B1 (en) 2021-05-05
US10986549B2 (en) 2021-04-20
US20210352546A1 (en) 2021-11-11
CN108632934B (zh) 2021-01-01
US20230422121A1 (en) 2023-12-28
US11751112B2 (en) 2023-09-05
US20200022046A1 (en) 2020-01-16
CN112738858B (zh) 2022-05-31
EP3592037A4 (en) 2020-03-25
CN108632934A (zh) 2018-10-09
EP3923632A1 (en) 2021-12-15
PL3592037T3 (pl) 2021-09-27

Similar Documents

Publication Publication Date Title
WO2018171738A1 (zh) 切换的方法和设备
US10512009B2 (en) Method for user equipment to switch base station, base station and user equipment
US9999028B2 (en) Data transmission method, base station, and user equipment
TWI762684B (zh) 切換方法、存取網設備和終端設備
WO2017075824A1 (zh) 锚点更换的方法及设备
JP2013513988A (ja) 中継ハンドオーバ制御
JP2012524496A (ja) 無線通信システムにおけるリレーノード使用方法
WO2016176952A1 (zh) 一种实现蜂窝网络重定位的方法和基站
US20220303840A1 (en) Cell handover method and user equipment
JP2019510445A (ja) モビリティ管理方法、装置、及びシステム
WO2020224631A1 (zh) 处理数据包的方法和装置
WO2018126905A1 (zh) 移动过程中的数据传输的方法、终端和基站
EP3501130B1 (en) Method and apparatus for implementing efficient switching on a split bearer
WO2020082344A1 (zh) 一种区分数据格式的方法及装置、通信设备
WO2020258018A1 (zh) 一种数据包处理方法、设备及存储介质
WO2024000110A1 (zh) 一种小区切换方法及装置、终端设备、网络设备
WO2023066361A1 (zh) 报告发送方法、终端、基站、装置、和存储介质
WO2020061871A1 (zh) 通信方法和通信装置
WO2021051384A1 (zh) 一种切换处理方法、网络设备
WO2020124540A1 (zh) 一种数据包重排序方法、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18772456

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018772456

Country of ref document: EP

Effective date: 20191002