WO2019019023A1 - 切换方法、接入网设备和终端设备 - Google Patents

切换方法、接入网设备和终端设备 Download PDF

Info

Publication number
WO2019019023A1
WO2019019023A1 PCT/CN2017/094335 CN2017094335W WO2019019023A1 WO 2019019023 A1 WO2019019023 A1 WO 2019019023A1 CN 2017094335 W CN2017094335 W CN 2017094335W WO 2019019023 A1 WO2019019023 A1 WO 2019019023A1
Authority
WO
WIPO (PCT)
Prior art keywords
network device
access network
terminal device
data packet
data
Prior art date
Application number
PCT/CN2017/094335
Other languages
English (en)
French (fr)
Inventor
杨宁
刘建华
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CA3066655A priority Critical patent/CA3066655A1/en
Priority to AU2017424739A priority patent/AU2017424739B2/en
Priority to CN201780090532.0A priority patent/CN110622558A/zh
Priority to US16/623,853 priority patent/US11265791B2/en
Priority to CN202210369766.1A priority patent/CN114828117B/zh
Priority to RU2019144782A priority patent/RU2741324C1/ru
Priority to SG11201912337TA priority patent/SG11201912337TA/en
Priority to BR112019025745-4A priority patent/BR112019025745A2/pt
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to JP2019567262A priority patent/JP7026144B2/ja
Priority to PCT/CN2017/094335 priority patent/WO2019019023A1/zh
Priority to MX2019015149A priority patent/MX2019015149A/es
Priority to EP17919528.4A priority patent/EP3614733A4/en
Priority to KR1020197035311A priority patent/KR102341420B1/ko
Priority to TW107125711A priority patent/TWI762684B/zh
Publication of WO2019019023A1 publication Critical patent/WO2019019023A1/zh
Priority to ZA2019/08303A priority patent/ZA201908303B/en
Priority to JP2022020368A priority patent/JP2022062239A/ja

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/047Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
    • H04W12/0471Key exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/02Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/02Data link layer protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0027Control or signalling for completing the hand-off for data sessions of end-to-end connection for a plurality of data sessions of end-to-end connections, e.g. multi-call or multi-bearer end-to-end data connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0069Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/18Performing reselection for specific purposes for allowing seamless reselection, e.g. soft reselection

Definitions

  • the embodiments of the present application relate to the field of communications, and in particular, to a handover method, an access network device, and a terminal device.
  • the handover process in the existing Long Term Evolution (LTE) system is: the source access network device sends a handover request to the target access network device according to the measurement report reported by the terminal device, and receives the target access network device pair handover. After the requested response, the handover command is sent to the terminal device, and the terminal device performs reconfiguration according to the handover command and leaves the source cell and synchronizes with the target cell. For data between the terminal device and the source access network device, The source access network device delivers the buffered data to the target access network device until the target access network device and the terminal device complete synchronization, and the data can be processed. For this part of the data, the delay that needs to wait during the handover of the terminal device is relatively long.
  • LTE Long Term Evolution
  • the embodiment of the present application provides a handover method, an access network device, and a terminal device, which are beneficial to reducing the delay of data transmission of the terminal device during the handover process.
  • a handover method comprising: a first access network device triggering a terminal device and/or a second access network device configuring a second protocol stack, the second protocol stack for maintaining the second An order of data packets of the access network device and the terminal device and/or a security key of the second access network device and a data packet of the terminal device; the first access network device triggers the terminal device and/or Before the second access network device uses the second protocol stack to maintain the sequence of data packets of the terminal device, the first access network device uses the first protocol stack to wait for the first access network device and the terminal device Process the data packets for sequential processing.
  • a packet is usually composed of a header and a data portion.
  • the header is a flag for the receiver to recognize, and the data portion is the original data.
  • the data packet in the embodiment of the present application may include, but is not limited to, a Protocol Data Unit (PDU) of the PDCP, and the data part may include, but is not limited to, a Service Data Unit (SDU) of the PDCP.
  • PDU Protocol Data Unit
  • SDU Service Data Unit
  • the first access network device may only trigger the first terminal device.
  • the first access The network device moves to the coverage of the second access network device connected to the second terminal device, and the first terminal device can be connected to the second terminal device through a device-to-device (D2D)
  • D2D device-to-device
  • the first A network device can trigger the first terminal device
  • the first terminal device can trigger the second network device to establish a new protocol stack by using the second terminal device.
  • the first access network device may also trigger only the second access network device.
  • the first network device when the first access network device moves to the coverage of the second access network device connected to the second terminal device, and the first terminal device can be connected to the second terminal device through D2D, the first network device can The second network device is triggered, and the second network device can trigger the first terminal device to establish a new protocol stack by using the second terminal device.
  • the first access network device triggers the terminal device and the second access network device to configure the second protocol stack, where the first access network device sends the first trigger information to the second access network device, The first trigger information is used to request the second access network device to configure the second protocol stack; the first access network device receives the response information of the first trigger information sent by the second access network device; The second trigger information is sent to the terminal device according to the response information, where the second trigger information is used to indicate that the terminal device configures the second protocol stack.
  • the data of the terminal device can be processed in time, thereby Reduce the delay of data transmission during the handover of the terminal device.
  • the to-be-processed data packet includes a first data packet
  • the first access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain Before the sequence of the data packets of the terminal device, the first access network device performs the sequential processing on the first access network device and the to-be-processed data packet of the terminal device by using the first protocol stack, including: Before the access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain the sequence of data packets of the terminal device, the first access network device receives the first a data packet; the first access network device decrypts the first data packet or the data portion in the first data packet by using the first protocol stack; the first access network device uses the first protocol stack pair The decrypted first data packet is processed in order.
  • the to-be-processed data packet includes a second data packet
  • the first access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain Before the sequence of the data packets of the terminal device, the first access network device uses the first protocol stack to perform sequential processing on the first access network device and the to-be-processed data packet of the terminal device, including: Before the access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain the sequence of the data packet of the terminal device, the first access network device receives the a data portion of the second data packet; the first access network device performs the sequential processing on the second data packet by using the first protocol stack; the method further includes: the first access network device uses the first protocol stack pair The second data packet processed in sequence or the data portion in the second data packet is encrypted.
  • the to-be-processed data packet includes a third data packet
  • the first access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain Before the sequence of the data packets of the terminal device
  • the first access network device performs the sequential processing on the first access network device and the to-be-processed data packet of the terminal device by using the first protocol stack, including: Before the access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain the sequence of data packets of the terminal device, the first access network device receives the second access network device Transmitting, by the second access network device, using the second protocol stack to decrypt the data part in the third data packet or the third data packet; the first access network device pair the decrypted third data The package is processed in order.
  • the to-be-processed data packet includes a fourth data packet
  • the first access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain Before the sequence of the data packets of the terminal device, the first access network device performs the sequential processing on the first access network device and the to-be-processed data packet of the terminal device by using the first protocol stack, including: Before the access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain the sequence of the data packet of the terminal device, the first access network device receives the first a data portion of the fourth data packet; the first access network device performs the sequential processing on the fourth data packet by using the first protocol stack; the method further includes: the first access network device to the second access network device The device sends the fourth data packet processed in order, so that the second access network device uses the second protocol stack to perform the second data packet or the data portion in the second data packet that is processed in sequence encryption.
  • the method further includes: if the first access network device determines that the first access network device does not need to process the data packet or data of the terminal device, the first access The network device triggers the sequence in which the terminal device and/or the second access network device maintains the data packets of the terminal device by using the second protocol stack.
  • the first access network device triggers when the first access network device determines that the first access network device does not need to process the data packet or data of the terminal device.
  • the terminal device uses the second protocol stack to maintain the sequence of the data packets of the terminal device, including: determining, by the first access network device, that the first access network device does not need to process the data packet or data of the terminal device.
  • the first access network device sends the first indication information to the terminal device, where the first indication information is used to indicate that the terminal device uses the second protocol stack to maintain the sequence of the data packets of the terminal device.
  • the first indication information is further used to indicate that the terminal device releases the first protocol stack.
  • the first indication information is any one of radio resource control RRC signaling, media access control MAC signaling, downlink control information DCI, and a bit in a data packet.
  • the first access network device triggers the first access network device to determine that the first access network device does not need to process the data packet or data of the terminal device.
  • the second access network device uses the second protocol stack to maintain the sequence of the data packets of the terminal device, including: determining, by the first access network device, that the first access network device does not need to process the data packet of the terminal device.
  • the second access network device sends the second indication information to the second access network device, where the second indication information is used to indicate that the second access network device uses the second protocol stack to maintain the terminal device. The order of the packets.
  • the method further includes: determining, by the first access network device, that the first access network device does not need to process the data packet of the terminal device.
  • the first access network device determines that the first access network device does not need to process the data packet or data of the terminal device, and the first access network device receives the core network device to send.
  • the third indication information is used to indicate that the first access network device does not need to process the data packet of the terminal device; the first access network device determines the first connection according to the third indication information. The network device does not need to process the data packets or data of the terminal device.
  • the third indication information may be an end marker.
  • the method further includes: receiving, by the first access network device, fourth indication information that is sent by the second access network device, where the fourth indication information is used to indicate that the terminal device completes the a configuration of the second protocol stack; the first access network device sends routing switching information to the core network device according to the fourth indication information, where the routing switching information is used to indicate that the core network device is responsible for maintaining the data packet of the terminal device.
  • the sequential access network device switches from the first access network device to the second access network device.
  • the first access network device receives the third indication information sent by the core network device, including: after the first access network device sends the route switching information to the core network device, The first access network device receives the third indication information sent by the core network device.
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device is in a multiple connectivity scenario.
  • the primary access network device, the second access network device being the secondary access network device in the multiple connectivity scenario.
  • a second aspect provides a handover method, where the method includes: receiving, by a second access network device, first trigger information sent by a first access network device, where the first trigger information is used to trigger the second access network device Configuring a second protocol stack, the second protocol stack is configured to maintain a sequence of data packets of the second access network device and the terminal device, and/or a security key of the data packet of the second access network device and the terminal device.
  • the second access network device receives the second trigger information sent by the first access network device, where the second trigger information is used to trigger the second access network device to use the second protocol stack to maintain data of the terminal device. The order of the packages.
  • the method further includes: before the second access network device receives the second trigger information sent by the first access network device, the second access network device sends the first The first data packet that is processed and encrypted by the access network device; the second access network device forwards the first data packet that is processed and encrypted in sequence to the terminal device.
  • the method further includes: before the second access network device receives the second trigger information sent by the first access network device, the second access network device receives the first The second data packet sent by the access network device is processed in sequence; the second access network device uses the second protocol stack to encrypt the data portion of the second data packet or the second data packet; The second access network device sends the encrypted second data packet to the terminal device.
  • the method further includes: before the second access network device receives the second trigger information sent by the first access network device, the second access network device receives the terminal device Transmitting a third data packet; the second access network device forwarding the third data packet to the first access network device, to facilitate the first access network device to the third data packet or the third data packet
  • the data portion of the data is decrypted and processed in order.
  • the method further includes: before the second access network device receives the second trigger information sent by the first access network device, the second access network device receives the terminal device Transmitting a fourth data packet; the second access network device decrypting the fourth data packet or the data portion in the fourth data packet by using the second protocol stack; the second access network device is configured to the first Access The network device sends the decrypted fourth data packet, so that the first access network device performs sequential processing on the decrypted fourth data packet.
  • the method further includes: receiving, by the second access network device, the first indication information sent by the terminal device, where the first indication information is used to indicate that the terminal device completes the second protocol stack
  • the second access network device sends the routing switching information to the core network device according to the first indication information, or the second access network device triggers the first access network device to the core according to the first indication information.
  • the network device sends routing switching information, where the routing switching information is used to indicate that the network device that the core network device provides the maintenance packet sequence for the terminal device is switched from the first access network device to the second access network device.
  • the second trigger information is any one of radio resource control RRC signaling, media access control MAC signaling, downlink control information DCI, and a bit in a data packet.
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device is in a multiple connectivity scenario.
  • the primary access network device, the second access network device being the secondary access network device in the multiple connectivity scenario.
  • the third aspect provides a handover method, where the method includes: configuring, by the terminal device, the second protocol stack according to the first trigger information sent by the first access network device, where the second protocol stack is used to maintain the second access a sequence of data packets of the network device and the terminal device and/or a security key of the second access network device and a data packet of the terminal device; the terminal device receives the first access network device and/or the Before the second trigger information sent by the second access network device, the terminal device uses the first protocol stack to sequentially process the to-be-processed data packet of the terminal device, where the second trigger information is used to trigger the terminal device to use the first The second protocol stack maintains the order of the data packets of the terminal device.
  • the to-be-processed data includes first data, where the terminal device receives the first transmission network device and/or the second access network device Before the second triggering information, the terminal device performs the sequential processing on the to-be-processed data packet or data of the terminal device by using the first protocol stack, where the terminal device uses the first protocol stack to the first data.
  • the method further includes: the terminal device encrypting, by using the first protocol stack, the first data processed or the data packet including the first data; the terminal device Transmitting the encrypted data packet including the first data to the first access network device and/or the second access network device.
  • the to-be-processed data packet includes a first data packet, where Before the terminal device receives the second trigger information sent by the first access network device and/or the second access network device, the terminal device uses the first protocol stack to process the terminal device.
  • the data packet or the data is processed in sequence, including: before the terminal device receives the second trigger information sent by the first access network device and/or the second access network device, the terminal device receives a first data packet sent by the first access network device and/or the second access network device; the terminal device uses the first protocol stack to the first data packet or the first data packet
  • the data portion is decrypted; the terminal device performs the sequential processing on the decrypted first data packet by using the first protocol stack.
  • the to-be-processed data includes second data, where the terminal device receives the first transmission network device and/or the second access network device Before the second trigger information, the terminal device uses the first protocol stack of the terminal device to process the data packet or data to be processed of the terminal device in sequence, including: the terminal device uses the first protocol stack The second data is processed in sequence; the method further includes: the terminal device encrypting the sequentially processed second data or the data packet including the second data by using the second protocol stack The terminal device transmits the encrypted data packet including the second data to the second network device.
  • the to-be-processed data packet includes a second data packet
  • the terminal device receives the first access network device and/or the second access network device sends Before the second trigger information
  • the terminal device uses the first protocol stack of the terminal device to process the data packet or data to be processed of the terminal device in sequence, including: the terminal device receiving the second network device Transmitting the second data packet; the terminal device decrypting the second data packet or the second data packet data portion by using the second protocol stack; the terminal device uses the first protocol stack
  • the decrypted second data packet is processed in order.
  • the method further includes: the terminal device receiving the second trigger information sent by the first access network device and/or the second access network device; the terminal device according to the second Trigger information, using the second protocol stack to maintain the order of the data packets of the terminal device.
  • the second trigger information is further used to indicate that the terminal device releases the first protocol stack
  • the method further includes: the terminal device releasing the first protocol stack according to the second trigger information.
  • the second trigger information is any one of radio resource control RRC signaling, media access control MAC signaling, downlink control information DCI, and a bit in a data packet.
  • RRC radio resource control
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device is in a multiple connectivity scenario.
  • the primary access network device, the second access network device being the secondary access network device in the multiple connectivity scenario.
  • an access network device for performing the method of any of the first aspect or the first aspect of the first aspect.
  • the access network device comprises means for performing the method of any of the above-described first aspect or any of the possible implementations of the first aspect.
  • an access network device for performing the method in any of the above-mentioned second aspect or any possible implementation of the second aspect.
  • the access network device comprises means for performing the method of any of the above-described second or second aspects of the second aspect.
  • a terminal device for performing the method in any of the above possible implementations of the third aspect or the third aspect.
  • the terminal device comprises means for performing the method in any of the possible implementations of the third aspect or the third aspect described above.
  • an access network device comprising: a memory, a processor, an input interface, and an output interface.
  • the memory, the processor, the input interface, and the output interface are connected by a bus system.
  • the memory is for storing instructions for executing the memory stored instructions for performing the method of any of the first aspect or the first aspect of the first aspect.
  • an access network device comprising: a memory, a processor, an input interface, and an output interface.
  • the memory, the processor, the input interface, and the output interface are connected by a bus system.
  • the memory is for storing instructions for executing the memory stored instructions for performing the method of any of the above-described second aspect or any of the possible implementations of the second aspect.
  • a terminal device comprising: a memory, a processor, an input interface, and an output interface.
  • the memory, the processor, the input interface, and the output interface are connected by a bus system.
  • the memory is for storing instructions for executing the memory stored instructions for performing the method of any of the above-described third aspect or any of the possible implementations of the third aspect.
  • a tenth aspect a computer storage medium for storing a method in performing any of the above first aspect or the first aspect, or any possible implementation of the second aspect or the second aspect
  • a computer program product comprising instructions, when executed on a computer, causes the computer to perform the method of any of the above-described first aspect or any of the alternative implementations of the first aspect, or The method of any of the alternative implementations of the second aspect or the second aspect, or the method of any of the foregoing third aspect or the optional implementation of the third aspect.
  • FIG. 1 is a schematic diagram of an application scenario of an embodiment of the present application.
  • FIG. 2 is a schematic diagram of another application scenario of an embodiment of the present application.
  • FIG. 3 shows a schematic flow chart of an LTE handover.
  • FIG. 4 shows a schematic block diagram of a handover method of an embodiment of the present application.
  • FIG. 5 is a block diagram showing an implementation of a protocol stack of a handover method according to an embodiment of the present application.
  • FIG. 6 is a block diagram showing another implementation of a protocol stack of a handover method according to an embodiment of the present application.
  • FIG. 7 is a block diagram showing still another implementation of a protocol stack of a handover method according to an embodiment of the present application.
  • FIG. 8 is a block diagram showing still another implementation of the protocol stack of the handover method in the embodiment of the present application.
  • FIG. 9 is another schematic block diagram of a handover method of an embodiment of the present application.
  • FIG. 10 is still another schematic block diagram of a handover method according to an embodiment of the present application.
  • FIG. 11 is a schematic block diagram of an access network device according to an embodiment of the present application.
  • FIG. 12 is another schematic block diagram of an access network device according to an embodiment of the present application.
  • FIG. 13 is a schematic block diagram of a terminal device of an embodiment of the present application.
  • FIG. 14 shows still another schematic block diagram of an access network device according to an embodiment of the present application.
  • FIG. 15 is still another schematic block diagram of an access network device according to an embodiment of the present application.
  • FIG. 16 shows another schematic block diagram of a terminal device according to an embodiment of the present application.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • the technical solutions of the embodiments of the present application can be applied to various communication systems based on non-orthogonal multiple access technologies, such as a sparse code multiple access (SCMA) system, and a low-density signature (Low). Density Signature (LDS) system, etc., of course, the SCMA system and the LDS system may also be referred to as other names in the communication field; further, the technical solution of the embodiment of the present application can be applied to multi-carrier using non-orthogonal multiple access technology.
  • SCMA sparse code multiple access
  • LDS Density Signature
  • Orthogonal Frequency Division Multiplexing OFDM
  • Filter Bank Multi-Carrier FBMC
  • General Frequency Division Multiplexing Generalized Frequency Division Multiplexing (OFDM)) Frequency Division Multiplexing (GFDM)
  • Filtered Orthogonal Frequency Division Multiplexing Filtered-OFDM, F-OFDM
  • the terminal device in the embodiment of the present application may refer to a user equipment (User Equipment, UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, and a wireless device.
  • Communication device user agent or user device.
  • the access terminal may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), with wireless communication.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the network device in the embodiment of the present application may be a device for communicating with a terminal device, where the network device may be a Base Transceiver Station (BTS) in GSM or CDMA, or may be a base station (NodeB, NB) in a WCDMA system. And may be an evolved base station (eNB or eNodeB) in the LTE system, or may be a wireless controller in a cloud radio access network (CRAN) scenario, or the network device may be The embodiments of the present application are not limited to the relay station, the access point, the in-vehicle device, the wearable device, the network device in the future 5G network, or the network device in the future evolved PLMN network. set.
  • BTS Base Transceiver Station
  • NodeB NodeB
  • NB base station
  • CRAN cloud radio access network
  • FIG. 1 is a schematic diagram of an application scenario of an embodiment of the present application.
  • the communication system in FIG. 1 may include a terminal device 10 and a network device 20.
  • the network device 20 is configured to provide communication services for the terminal device 10 and access the core network.
  • the terminal device 10 accesses the network by searching for synchronization signals, broadcast signals, and the like transmitted by the network device 20, thereby performing communication with the network.
  • the arrows shown in FIG. 1 may represent uplink/downlink transmissions by a cellular link between the terminal device 10 and the network device 20.
  • FIG. 2 is a schematic diagram of another application scenario of an embodiment of the present application.
  • the access network devices around the terminal device 130 in FIG. 2 include a primary access network device 110 and at least one secondary access network device 120.
  • the at least one secondary access network device 120 is respectively connected to the primary access network device 110 to form a multi-connection, and is respectively connected to the terminal device 130 to provide services thereto.
  • the primary access network device 110 can be an LTE network
  • the secondary access network device 120 can be an NR network.
  • the primary access network device 110 may be an NR network
  • the secondary access network device 120 may be an LTE network.
  • both the primary access network device 110 and the secondary access network device 120 are NR networks.
  • the application scenario of the technical solution is not limited in this application.
  • the terminal device 130 can establish a connection at the same time through the primary access network device 110 and the secondary access network device 120.
  • the connection established between the terminal device 130 and the primary access network device 110 is a primary connection
  • the connection established between the terminal device 130 and the secondary access network device 120 is a secondary connection.
  • the control signaling of the terminal device 130 can be transmitted through the primary connection
  • the data of the terminal device can be transmitted simultaneously through the primary connection and the secondary connection, or can be transmitted only through the secondary connection.
  • the primary access network device may be, for example, a macrocell
  • the secondary access network device may be, for example, a microcell, a picocell, or a femtocell.
  • embodiments of the invention are not limited thereto.
  • the primary access network device may be an LTE network device, and the secondary access network device is an NR network device. It should be understood that the embodiment of the present invention is not limited thereto, and the primary access network device may also be a GSM network.
  • the device, the CDMA network device, and the like, the secondary access network device may also be a GSM network device, a CDMA network device, or the like, which is not limited in this embodiment of the present invention.
  • the core network device may be a Mobility Management Entity (MME), or may be a Serving Gateway (S-GW) or a PDN Gateway (P-GW). This application is not limited.
  • MME Mobility Management Entity
  • S-GW Serving Gateway
  • P-GW PDN Gateway
  • the handover procedure in the LTE system will be described in detail below with reference to FIG. 3.
  • the handover process includes some or all of the following steps:
  • Step 1 The source eNB performs measurement configuration on the UE, and the measurement result of the UE is used to assist the source eNB. Make a handover decision.
  • Step 2 The UE performs measurement reporting according to the measurement configuration.
  • Step 3 The source eNB refers to the measurement report result of the UE, and performs a handover decision according to its own handover algorithm.
  • Step 4 The source eNB sends a handover request message to the target eNB, where the message includes information about handover preparation, mainly including X2 and S1 signaling context reference of the UE, target cell identifier, security key, and radio resource control (Radio Resource Control, RRC) Context, Access Stratum (AS) configuration, Evolved-Universal Terrestrial Radio Access (E-UTRAN) radio access bearer (E-UTRAN Radio Access Bearer, E-RAB) context, etc. It also includes the source cell physical layer identifier and the message authentication verification code for the recovery process after a possible handover failure.
  • the X2 and S1 signaling context references of the UE may help the target eNB find the location of the source eNB.
  • the E-RAB context includes necessary Radio Network Layer (RLN) and Transport Network Layrer (TNL) addressing information, and E-RAB Quality of Service (QoS) information.
  • RRC Radio Resource Control
  • TNL Transport Network Layrer
  • QoS
  • Step 5 The target eNB performs admission control according to the received E-RAB QoS information to improve the success rate of the handover. Admission control should consider reserving corresponding resources, Cell Radio Network Temporary Identifier (C-RNTI), and assigning dedicated random access Preamble codes.
  • C-RNTI Cell Radio Network Temporary Identifier
  • the AS configuration used by the target cell may be completely configured independently of the source cell, or may be an incremental configuration based on the source cell. Incremental configuration means that the same part is not configured, and only the signaling is heavy. With different parts, the UE will continue to use the original configuration for configurations that have not been received.
  • Step 6 The target eNB performs handover preparation of L1/L2, and simultaneously sends a handover request ACK message to the source eNB.
  • the message includes an RRC container, and the specific content is a handover command that triggers the UE to perform handover.
  • the source eNB handover command is transmitted to the UE in a transparent manner (without any modification).
  • the handover command includes a new C-RNTI, a case algorithm identifier of the target eNB, and may also carry a random access dedicated Preamble code, access parameters, system information, and the like. If necessary, it is also possible to carry RNL/TNL information in the handover request ACK message for data forwarding. After the source eNB receives the handover request ACK message or forwards the handover command to the UE, the data forwarding can be started.
  • Step 7 The handover command (RRC Connection Reconfiguration Message carrying the mobility control information) is The target eNB generates and transparently transmits it to the UE through the source eNB.
  • the source eNB performs the necessary encryption and integrity protection for this message.
  • the UE receives the message, it initiates the handover process with the relevant parameters in the message.
  • the UE may initiate a handover procedure without waiting for a Hybrid Automatic Repeat reQuest (HARQ)/Automatic Repeat ReQuest (ARQ) response sent by the lower layer to the source eNB.
  • HARQ Hybrid Automatic Repeat reQuest
  • ARQ Automatic Repeat ReQuest
  • Step 8 The source eNB sends a Sequence Number (SN) status transmission message to the target eNB, and transmits an E-RAB Packet Data Convergence Protocol (PDCP) SN reception status and a downlink PDCP SN transmission status.
  • the uplink PDCP SN receiving state includes at least the PDCP SN of the last uplink SDU received in order, and may also include those SNs in the form of bit mappings that cause the received outbound SDUs to be lost (if there is such an SDU, These SDUs may require the UE to retransmit in the target cell).
  • the downlink PDCP SN transmission status indicates the next SDU sequence number that should be allocated at the target eNB. If no E-RAB needs to transmit a status report of the PDCP, the source eNB may omit this message.
  • Step 9 After receiving the handover command, the UE performs synchronization with the target cell. If the random access dedicated Preamble code is configured in the handover command, the non-contention random access procedure is used to access the target cell. If no dedicated Preamble code is configured. Then, the competitive random access procedure is used to access the target cell. The UE calculates the key to be used at the target eNB and configures a network-selected security algorithm used by the target eNB for communication with the target eNB after successful handover.
  • Step 10 The network replies with an uplink resource allocation indication and timing advance.
  • Step 11 After the UE successfully accesses the target cell, the UE sends an RRC Connection Reconfiguration Complete message to confirm to the target eNB that the handover process is complete. This message may also be accompanied by an improvement in the Buffer Status Report (BSR) if resources permit.
  • BSR Buffer Status Report
  • the target eNB confirms that the handover is successful by receiving an RRC Connection Reconfiguration Complete message. So far, the target eNB can start transmitting data to the UE.
  • Step 12 The target eNB sends a path switch request message to the MME to inform the UE that the cell has been replaced. At this time, the switching of the air interface has been successfully completed.
  • Step 13 The MME sends a user plane update request message to the S-GW.
  • Step 14 The S-GW switches the downlink data path to the target eNB side.
  • the S-GW sends one or more "end marker packets" to the source eNB on the old path, and then the user plane resources of the source eNB can be released.
  • Step 15 The S-GW sends a user plane update response message to the MME.
  • Step 16 The MME sends a Path Switch Request ACK message to the target eNB.
  • Steps 12-16 complete the path conversion process, and the purpose of the process is to transfer the data path of the user plane from the source eNB to the target eNB.
  • the S-GW converts the downlink path, the downlink packets of the forward path and the new path may arrive alternately at the target eNB.
  • the target eNB should first pass all forward packets to the UE and then pass the packets received from the new path. Using this method at the target eNB can forcibly guarantee the correct transmission sequence.
  • the S-GW immediately transmits one or more "end marker packets" on the old path after the E-RAB is switched.
  • the "end marker package” does not contain user data and is indicated by the General Data Transfer Platform (GTP) header. After completing the transmission of the packet containing the identifier, the S-GW should not send any packets on the old path. After receiving the "end marker packet”, if the forwarding is active for this bearer, the source eNB shall send this packet to the target eNB. After perceiving the "end marker package", the target eNB should discard the "end marker packet" and initiate any necessary procedures to maintain the user's in-order delivery. These data are forwarded through the X2 port or after the path is converted from the S-GW. Received through the S1 port.
  • GTP General Data Transfer Platform
  • Step 17 The target eNB sends a UE context release message to the source eNB, notifying the source eNB of the success of the handover and triggering the resource release of the source eNB.
  • the target eNB sends this message after receiving the path switch ACK message sent back from the MME.
  • Step 18 After receiving the UE context release message, the source eNB may release the radio bearer and the control plane resource related to the UE context. Any ongoing data forwarding will continue.
  • the UE leaves the source cell and synchronizes with the target cell, that is, the UE disconnects the network connection with the source eNB, for the UE and the source eNB.
  • the source eNB needs to deliver the buffered data to the target eNB until the bearer between the target eNB and the UE is established, and the data can be processed.
  • the delay that needs to wait during the handover of the UE is relatively long.
  • the UE disconnects the network for a long time, and the UE's service cannot be processed in time, so the performance of the network transmission is relatively poor.
  • FIG. 4 shows a schematic block diagram of a handover method 300 of an embodiment of the present application. As shown in FIG. 4, the method 300 includes some or all of the following steps:
  • the first access network device triggers the terminal device and/or the second access network device to configure a second protocol stack, where the second protocol stack is used to maintain data of the second access network device and the terminal device.
  • the order of the packets and/or the security key of the second access network device and the data packets of the terminal device is used to maintain data of the second access network device and the terminal device.
  • the first access network device triggers the terminal device and/or the second access network. Before the device uses the second protocol stack to maintain the sequence of the data packets of the terminal device, the first access network device uses the first protocol stack to process the first access network device and the terminal device to be processed. The packets are processed in order.
  • a data packet is usually composed of a packet header and a data portion, the packet header is a flag for receiving end identification, and the data portion is original data.
  • the data packet in the embodiment of the present application may include, but is not limited to, a PDCP PDU.
  • the PDCP PDU is taken as an example in the data packet in the embodiment of the present application, and the SDU is used as the data part in the data packet in the embodiment of the present application.
  • the embodiments of the present application are not limited thereto.
  • the technical solution of the embodiment of the present application can be applied to the switching scenario under the single connection shown in FIG. 1 , and can also be applied to the role switching scenario in the multiple connections shown in FIG. 2 .
  • the first access network device may trigger the terminal device and/or the second access network device, that is, the target interface, according to some or all of steps 1-7 in the handover process of FIG.
  • the network access device configures a second protocol stack (hereinafter referred to as a new protocol stack), and the new protocol stack includes a PDCP layer/Radio Link Control (RLC) layer/Medium Access Control (MAC). Layer/Physical (PHY) layer.
  • RLC Radio Link Control
  • MAC Medium Access Control
  • PHY Physical
  • the data packet can be transmitted between the terminal device and the second access network device using the new protocol stack.
  • the first access network device triggers the terminal device and/or the second access network device to configure the second protocol stack, and can notify the terminal device and/or the second access network device not to release the first protocol.
  • a stack hereinafter referred to as the old protocol stack
  • the terminal device and/or the second access network device do not disconnect the terminal device and the first time when the first access network device triggers the establishment of a new protocol stack.
  • the first access network device may further trigger the order in which the terminal device and/or the second access network device use the new protocol stack to maintain the PDCP PDU, that is, the first access network device.
  • the triggering terminal device completely switches to the second access network device, or the first access network device triggers the second access network device to notify the core network device to completely switch the downlink path.
  • the first access network device may be cached at the first access network device. The uplink and downlink data continues to maintain the order of the PDCP PDUs using the old protocol stack.
  • the handover method in the embodiment of the present application triggers the terminal device by using the first access network device. And/or the second access network device continues to use the old protocol stack to maintain the sequence of data packets before using the new protocol stack, so that the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the handover process of the terminal device. .
  • the first access network device may only trigger the first terminal device.
  • the first terminal device when the first access network device moves to the coverage of the second access network device connected to the second terminal device, and the first terminal device can communicate with the second terminal device end-to-end (Device-to-Device) , D2D) is connected, then the first network device can trigger the first terminal device, and the first terminal device can trigger the second network device to establish a new protocol stack by using the second terminal device.
  • the first access network device may also trigger only the second access network device.
  • the first network device when the first access network device moves to the coverage of the second access network device connected to the second terminal device, and the first terminal device can be connected to the second terminal device through D2D, the first network device can The second network device is triggered, and the second network device can trigger the first terminal device to establish a new protocol stack by using the second terminal device.
  • the first access network device triggers the terminal device and the second access network device to configure the second protocol stack, including: the first access network device to the second access network The device sends the first trigger information, where the first trigger information is used to request the second access network device to configure the second protocol stack; the first access network device receives the first trigger sent by the second access network device The second access trigger information is sent to the terminal device according to the response information, and the second trigger information is used to indicate that the terminal device configures the second protocol stack.
  • step 4 to step 7 shown in FIG. 3 can be used.
  • the first access network device may send a handover request to the second access network device, and the second access network device may determine to allow the terminal device to switch to the second access network device according to the handover request, and may first connect to the first access network device.
  • the network access device replies to the response of the handover request, and the response may carry various parameters configured by the second access network device to the terminal device, and the first access network device may directly directly access various parameters configured by the second access network device.
  • the terminal device is transmitted to the terminal device, and the terminal device can configure a protocol stack that can communicate with the second access network device according to the parameters.
  • the first access network device may simultaneously notify the terminal device not to disconnect the connection with the first access network device.
  • the handover command sent by the first access network device to the terminal device may carry an indication information, where the indication information may directly indicate that the terminal device does not disconnect from the first access network device. Pick up.
  • the first access network device may separately send an indication message to the terminal device, and tell the terminal device not to disconnect the connection with the first access network device after receiving the handover command sent by the first access network device.
  • the first access network device can simultaneously notify the terminal device to disconnect from the first access network device, that is, release the old Protocol stack.
  • the first access network device may separately send an indication information to the terminal device, where the indication information may directly indicate that the terminal device disconnects from the first access network device.
  • the first access network device may also carry a bit in the last data packet sent to the terminal device to indicate that the terminal device disconnects from the first access network device.
  • the to-be-processed data packet includes a first data packet, where the first access network device triggers the terminal device and/or the second access network device to use the second protocol.
  • the first access network device uses the first protocol stack to sequentially process the first access network device and the to-be-processed data packet of the terminal device, including: Before the first access network device triggers the terminal device and/or the second access network device to use the second protocol stack to maintain the sequence of data packets of the terminal device, the first access network device receives the sent by the terminal device
  • the first data packet device uses the first protocol stack to decrypt the first data packet or the data portion of the first data packet; the first access network device uses the first protocol
  • the stack processes the decrypted first data packet in order.
  • Figure 5 shows the switching scenario under a single connection.
  • the first stage (which can be regarded as before step 7 in FIG. 3) is that the first access network device provides network services for the terminal device, that is, by the first access network device.
  • the PDCP layer serves as an aggregation layer to maintain the data packet transmission/reception sequence (SN in LTE) of the terminal device, and the PDCP of the first access network device also maintains a unified security key for the terminal device.
  • the specific process may be as follows: the terminal device sends the PDCP PDU to the first access network device (the terminal device first needs to sort the SDU of the PDCP PDU, that is, add the SN, and then the terminal device can sort the The PDCP PDU or its SDU is encrypted). After receiving the PDCP PDU from the RLC layer, the PDCP layer of the first access network device first decrypts the PDCP PDU, or may decrypt the SDU in the PDCP PDU. Further, the first access network device may The received PDCP PDUs or SDUs are sorted according to the decrypted SN.
  • the second phase (which can be seen as between step 7 and step 11 in FIG. 3), that is, the so-called execution switching process in FIG. 3, during which the terminal device does not disconnect from the first access network device.
  • the connection between the terminal device and the second access network device does not leave the source cell. If the terminal device has data to transmit, the terminal device can still go to the first access network. The device transmits the data. That is, the first access network device can also receive the PDCP PDU sent by the terminal device (the terminal device first needs to sort the SDU of the PDCP PDU, that is, add the SN, and then the terminal device can sort the PDCP PDU or the like.
  • the SDU is encrypted.
  • the PDCP layer of the first access network device After receiving the PDCP PDU from the RLC layer, the PDCP layer of the first access network device first decrypts the PDCP PDU, or may decrypt the SDU in the PDCP PDU. Further, An access network device may sort the received PDCP PDUs or SDUs according to the decrypted SN. In other words, at this stage, data is still transmitted between the terminal device and the first access network device.
  • the third stage (the flow after step 11 in Fig. 3 can be seen), that is, the handover completion process in Fig. 3.
  • the terminal device since the terminal device has completed reconfiguration with the second access network device, in other words, the terminal device can already communicate with the second access network device, the terminal device can naturally directly The second access network device sends the PDCP PDU.
  • the second access network device after receiving the PDCP PDU sent by the terminal device, the second access network device can use the newly created PDCP layer to decrypt the SDU in the PDCP PDU or the PDCP PDU.
  • These PDCP PDUs or SDUs may be submitted to the upper layer in order according to the acquired SN.
  • Figure 6 shows the role switching scenario under multiple connections.
  • the first phase (which can be regarded as before step 7 in FIG. 3) is that the first access network device and the second access network device jointly provide network services for the terminal device, where the first connection
  • the network access device may be a primary access network device
  • the second access network device may be a secondary access network device
  • the terminal device may send the PDCP PDU to the network device by using the first access network device and the second access network device
  • the PDCP layer of the first access network device serves as an aggregation layer to maintain the data packet transmission/reception sequence (SN in LTE) of the terminal device, and the PDCP of the first access network device is also maintained by the terminal device.
  • SN in LTE data packet transmission/reception sequence
  • the specific process may be as follows: the terminal device sends the PDCP PDU to the first access network device and the second access network device (the terminal device first needs to sort the SDU of the PDCP PDU, that is, add the SN, and then The terminal device can encrypt the sorted PDCP PDU or the SDU therein. The terminal device may further transmit the encrypted PDCP PDU to the network device side through the RLC layer of the first access network device and the RLC layer of the second access network device, respectively.
  • the PDCP layer of the first access network device After receiving the PDCP PDU from the RLC layer of the first access network device and the RLC layer of the second access network device, the PDCP layer of the first access network device first decrypts the PDCP PDU, or may also The SDU in the PDU is decrypted. Further, the first access network device may sort the received PDCP PDUs or SDUs according to the decrypted SN.
  • the second phase (which can be seen as between step 7 and step 11 in FIG. 3), that is, the so-called execution switching process in FIG. 3, during which the terminal device does not disconnect from the first access network device.
  • the connection between the terminal device and the second access network device still uses the PDCP of the first access network device to maintain the data transmission/reception sequence of the terminal device and the secret key of the data.
  • the terminal device may still transmit the data to the first access network device and/or the second access network device transmits the data.
  • the final data will still be processed by the PDCP layer of the first access network device. In other words, during this time, the network device still processes the data through the old protocol stack.
  • the data transmitted in the first phase and the second phase may be transmitted through two links in the dual connection, or may be transmitted using one of the links, but whether it is one link transmission or two links
  • the final data of the transmission will be aggregated into the PDCP layer in the first access network device, that is, in the PDCP layer of the primary access network device in the dual connectivity scenario.
  • the third stage (the flow after step 11 in Fig. 3 can be seen), that is, the handover completion process in Fig. 3.
  • the terminal device can directly follow the The second access network device performs the communication, that is, the network device side can use the PDCP layer of the second access network device to decrypt the PDCP PDU or the SDU sent by the terminal device, and the PDCP layer of the second access network device can be The obtained SNs deliver these PDCP PDUs or SDUs to the upper layer in order.
  • the first access network device may only release the function of the PDCP layer, that is, after the handover, the first access network device may be used as the second access network.
  • a secondary access network device of the device the terminal device can send data to the network device side through two links, but the data on the two links finally converge to the newly established PDCP layer of the second access network device, by the first
  • the PDCP layer established by the access network device decrypts the data and delivers the SN according to the decryption to the upper layer in order.
  • the first access network device may complete the release of the connection with the terminal device, and the terminal device may only pass through the second access network device.
  • This link transmits data.
  • the PDCP layer established by the second access network device decrypts the data and delivers the SN according to the decryption to the upper layer in order.
  • the embodiment of the present application should not be limited thereto, and may be multiple connections, that is, one primary access network device and multiple secondary access network devices jointly provide network services for the terminal device. .
  • the to-be-processed PDCP PDU includes a second PDCP PDU, where the first access network device triggers the terminal device and/or the second access network device to use the second protocol.
  • the first access network device performs the sequential processing on the first access network device and the pending PDCP PDU of the terminal device by using the first protocol stack, including: Before the first access network device triggers the terminal device and/or the second access network device to maintain the sequence of the PDCP PDU of the terminal device by using the second protocol stack, the first access network device receives the core network device and sends the The second PDCP PDU; the first access network device performs the sequential processing on the second PDCP PDU by using the first protocol stack; the method further includes: the first access network device uses the first protocol stack to press The second PDCP PDU processed in sequence or the SDU in the second PDCP PDU is encrypted.
  • the downlink data transmission can refer to the uplink data.
  • I will not repeat them here.
  • the to-be-processed PDCP PDU includes a third PDCP PDU, where the first access network device triggers the terminal device and/or the second access network device to use the second protocol.
  • the first access network device performs the sequential processing on the first access network device and the pending PDCP PDU of the terminal device by using the first protocol stack, including: Before the first access network device triggers the terminal device and/or the second access network device to maintain the sequence of the PDCP PDU of the terminal device by using the second protocol stack, the first access network device receives the second access The second access network device sent by the network device decrypts the SDU in the third PDCP PDU or the third PDCP PDU by using the second protocol stack; the first access network device pair decrypts the third The PDCP PDUs are processed in order.
  • the to-be-processed PDCP PDU includes a fourth PDCP PDU, where the first access network device triggers the terminal device and/or the second access network device uses the second Before the protocol stack maintains the sequence of the PDCP PDUs of the terminal device, the first access network device performs the sequential processing on the first access network device and the pending PDCP PDU of the terminal device by using the first protocol stack, including: Before the first access network device triggers the terminal device and/or the second access network device to maintain the sequence of the PDCP PDU of the terminal device by using the second protocol stack, the first access network device receives the core network device and sends the The fourth PDCP PDU is processed by the first access network device using the first protocol stack; the method further includes: the first access network device to the second access network The device sends the fourth PDCP PDU processed in order, so that the second access network device uses the second protocol stack to encrypt the SDU in the second PDCP PDU or the second PDCP
  • the PDCP PDUs presented herein refer to data packets in some places, and in some places to the data portions of the data packets, which should be distinguished by those skilled in the art.
  • the terminal device processes the data in order, generates a data packet, and then sends the data packet to the network device instead of directly processing the data packet.
  • the access network device obtains data from the core network device, and the access network device performs sequential processing on the received downlink data, generates a data packet, and then sends the data packet to the terminal device.
  • Figure 7 shows the switching scenario under a single connection.
  • the first stage (which can be regarded as before step 7 in FIG. 3) is that the first access network device provides network services for the terminal device, that is, by the first access network device.
  • the PDCP layer serves as an aggregation layer to maintain the data packet transmission/reception sequence (SN in LTE) of the terminal device, and the PDCP of the first access network device also maintains a unified key for the terminal device.
  • the specific process may be as follows: the terminal device sends the PDCP PDU to the first access network device (the terminal device first needs to sort the SDU of the PDCP PDU, that is, add the SN, and then the terminal device can sort the The PDCP PDU or its SDU is encrypted). After receiving the PDCP PDU from the RLC layer, the PDCP layer of the first access network device first decrypts the PDCP PDU, or may decrypt the SDU in the PDCP PDU. Further, the first access network device may The received PDCP PDUs or SDUs are sorted according to the decrypted SN.
  • the second phase (which can be seen as between step 7 and step 11 in FIG. 3), that is, the so-called execution switching process in FIG. 3, during which the terminal device does not disconnect from the first access network device.
  • the connection between the terminals that is to say the terminal device is not synchronized with the second access network device.
  • the second protocol stack that is, the PDCP layer that can be established by the second access network device to maintain the key of the terminal device.
  • the terminal device can transmit the data to the second access network device by using the second protocol stack.
  • the second access network device decrypts the received data first, and sends the data to the first access network device for sorting and delivery after the decryption is completed. That is to say, the received PDCP PDU can be decrypted first by using the PDCP layer of the second access network device, but the final sorting still needs to be performed through the PDCP layer of the first access network device. In other words, at this stage, you can use the new protocol stack to decrypt the data, or use the old protocol stack to sort the data.
  • the third stage (the flow after step 11 in Fig. 3 can be seen), that is, the handover completion process in Fig. 3.
  • the network device can send the PDCP PDU directly to the second access network device.
  • the second access network device can use the newly created PDCP layer to The SDUs in the PDCP PDU or PDCP PDU are decrypted so that these PDCP PDUs or SDUs can be delivered to the upper layer in order according to the acquired SN.
  • Figure 8 shows the role switching scenario under multiple connections.
  • the first phase (which can be regarded as before step 7 in FIG. 3) is that the first access network device and the second access network device jointly provide network services for the terminal device, where the first connection
  • the network access device may be a primary access network device
  • the second access network device may be a secondary access network device
  • the terminal device may send the PDCP PDU to the network device by using the first access network device and the second access network device
  • the PDCP layer of the first access network device serves as an aggregation layer to maintain the data packet transmission/reception sequence (SN in LTE) of the terminal device, and the PDCP of the first access network device is also maintained by the terminal device.
  • SN in LTE data packet transmission/reception sequence
  • the specific process may be as follows: the terminal device sends the PDCP PDU to the first access network device and the second access network device (the terminal device first needs to sort the SDU of the PDCP PDU, that is, add the SN, and then The terminal device may encrypt the sorted PDCP PDU or the SDU therein, and the terminal device may further send the encrypted PDCP PDU to the RLC layer of the first access network device and the RLC layer of the second access network device, respectively. Network device side).
  • the PDCP layer of the first access network device After receiving the PDCP PDU from the RLC layer of the first access network device and the RLC layer of the second access network device, the PDCP layer of the first access network device first decrypts the PDCP PDU, or may also The SDU in the PDU is decrypted, and further, the first access network device can be obtained according to the decryption.
  • the SN sorts the received PDCP PDUs or SDUs.
  • the second phase (which can be seen as between step 7 and step 11 in FIG. 3), that is, the so-called execution switching process in FIG. 3, during which the terminal device does not disconnect from the first access network device.
  • the connection between the terminals that is to say the terminal device synchronizes with the second access network device, still uses the PDCP of the first access network device to maintain the data transmission/reception sequence of the terminal device but uses the newly established
  • the PDCP protocol is used to maintain the secret key of the data. If the terminal device needs to transmit data, the terminal device can still transmit the data to the first access network device and/or the second access network device transmits the data.
  • the final data will be decompressed using the PDCP layer established by the second access network device, or the data will be sorted by the PDCP layer of the first access network device. In other words, during this time, the network device still processes the data through the old protocol stack and the new protocol stack.
  • the data transmitted in the first phase and the second phase may be transmitted through two links in the dual connection, or may be transmitted using one of the links, but whether it is one link transmission or two links
  • the final data of the transmission will be aggregated into the PDCP layer in the first access network device, that is, in the PDCP layer of the primary access network device in the dual connectivity scenario.
  • the third stage (the flow after step 11 in Fig. 3 can be seen), that is, the handover completion process in Fig. 3.
  • the terminal device can directly follow the The second access network device performs the communication, that is, the network device side can use the PDCP layer of the second access network device to decrypt the PDCP PDU or the SDU sent by the terminal device, and the PDCP layer of the second access network device can be The obtained SNs deliver these PDCP PDUs or SDUs to the upper layer in order.
  • the downlink data transmission can refer to the uplink data.
  • I will not repeat them here.
  • the PDCP used to maintain the order of the PDCP PDUs of the terminal device in the second phase of the foregoing embodiments of FIG. 5 to FIG. 8 may be a PDCP entity in the first access network device, or may be a PDCP entity.
  • the PDCP entity uses an aggregation layer external to it.
  • the embodiments of the present application are not limited thereto.
  • the data transmission of the second stage mentioned above can also divide the data into two parts, one part is decrypted by a new protocol stack, and the other part is decrypted by the old protocol stack, or can be separately used.
  • the decryption of the new protocol stack or the use of the old protocol stack for decryption is not limited in this embodiment of the present application.
  • the method further includes: if the first access network device determines that the first access network device does not need to process data or a data packet of the terminal device, the first The access network device triggers the sequence in which the terminal device and/or the second access network device maintains the data packets of the terminal device by using the second protocol stack.
  • an end identifier is sent to the first access network device, and the first access network device may be notified that there is no data subsequently.
  • the first access network device can respectively transmit the situation to the terminal device and/or the second access network device, and simultaneously inform the terminal device and/or the second access.
  • the network device can communicate directly between the two, and the first access network device is no longer needed for transmission.
  • the end identifier may be "end Marker" in the above step 16, or may be other indication information.
  • the terminal device receives the indication information sent by the first access network device, and the terminal device can determine that no data can be transmitted between the first access network device and the first access network device, and the terminal device can directly use the new protocol stack. The transmission of subsequent data. The terminal device may also release the old protocol stack according to the indication information.
  • the indication information that is sent by the first access network device to the terminal device may be radio resource control RRC signaling, media access control MAC signaling, and downlink control information (Download Control Information, DCI). ), any of the bits in the data packet.
  • the method further includes: receiving, by the first access network device, third indication information that is sent by the second access network device, where the third indication information is used to indicate that the terminal device is configured to complete a configuration of the second protocol stack; the first access network device sends routing switching information to the core network device according to the third indication information, where the routing switching information is used to indicate that the core network device is responsible for maintaining data of the terminal device.
  • the access network device of the sequence of packets switches from the first access network device to the second access network device.
  • the second access network device may trigger the first access network device to send routing switching information to the core network device, that is, switch the downlink path. For example, when the second access network device receives the reconfiguration complete message in FIG. 3, the second access network device sends an indication information to the first access network device, that is, the first access network device can be notified. After the terminal device has completed the configuration of the new protocol stack, the first access network device can notify The core network device performs downlink route switching. After receiving the reconfiguration complete message in FIG. 3, the second access network device may directly notify the core network device to perform downlink route switching.
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device is a multiple connection.
  • FIG. 9 shows a schematic block diagram of a handover method 400 of an embodiment of the present application. As shown in FIG. 9, the method 400 includes:
  • the second access network device receives the first trigger information sent by the first access network device, where the first trigger information is used to trigger the second access network device to configure a second protocol stack, where the second protocol stack is used. Maintaining a sequence of data packets of the second access network device and the terminal device and/or a security key of the data packet of the second access network device and the terminal device.
  • the second access network device receives the second trigger information sent by the first access network device, where the second trigger information is used to trigger the second access network device to use the second protocol stack to maintain the terminal device.
  • the order of the packets is used to trigger the second access network device to use the second protocol stack to maintain the terminal device.
  • the handover method of the embodiment of the present application maintains the order of maintaining the data packet by using the old protocol stack before the first access network device triggers the terminal device and/or the second access network device to completely use the new protocol stack.
  • the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the switching process of the terminal device.
  • the method further includes: before the second access network device receives the second trigger information sent by the first access network device, the second access network device sends the The first data packet sent by the first access network device is processed and encrypted in sequence; the second access network device forwards the first data packet processed and encrypted in sequence to the terminal device. .
  • the method further includes: before the second access network device receives the second trigger information sent by the first access network device, the second access network device receives the The second data packet sent by the first access network device is processed in sequence; the second access network device uses the second protocol stack to encrypt the data portion of the second data packet or the second data packet; The second access network device sends the encrypted second data packet to the terminal device.
  • the method further includes: before the second access network device receives the second trigger information sent by the first access network device, the second access network device receives the a third data packet sent by the terminal device; the second access network device forwards the third data packet to the first access network device, so that the first access network device sends the third data packet or the third data packet Number in the packet According to the partial decryption and sequential processing.
  • the method further includes: before the second access network device receives the second trigger information sent by the first access network device, the second access network device receives the a fourth data packet sent by the terminal device; the second access network device uses the second protocol stack to decrypt the data portion of the fourth data packet or the fourth data packet; the second access network device sends the data packet to the second data packet The first access network device sends the decrypted fourth data packet, so that the first access network device performs sequential processing on the decrypted fourth data packet.
  • the method further includes: receiving, by the second access network device, first indication information that is sent by the terminal device, where the first indication information is used to indicate that the terminal device completes the second protocol a configuration of the stack; the second access network device sends routing switching information to the core network device according to the first indication information, or the second access network device triggers the first access network device according to the first indication information And sending, by the core network device, routing switching information, where the routing switching information is used to indicate that the core network device, the access network device that provides the maintenance data packet sequence for the terminal device, switches from the first access network device to the second access Network equipment.
  • the method further includes: after the second access network device sends the routing switch information to the core network device, the second access network device receives the first access network The second indication information sent by the device, where the second indication information is used to indicate that the first access network device needs to process data or data packets of the terminal device.
  • the second trigger information is any one of radio resource control RRC signaling, media access control MAC signaling, downlink control information DCI, and a bit in a data packet.
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device is a multiple connection.
  • FIG. 10 shows a schematic block diagram of a handover method 500 of an embodiment of the present application. As shown in FIG. 10, the method 500 includes:
  • the terminal device configures the second protocol according to the first trigger information sent by the first access network device.
  • a stack the second protocol stack is configured to maintain a sequence of data packets of the second access network device and the terminal device, and/or a data packet security security key of the second access network device and the terminal device;
  • the terminal device Before the terminal device receives the second trigger information sent by the first access network device and/or the second access network device, the terminal device uses the first protocol stack to process the data packet of the terminal device. Or the data is processed in sequence, and the second trigger information is used to trigger the terminal device to maintain the data packet sequence of the terminal device by using the second protocol stack.
  • the handover method of the embodiment of the present application maintains the order of maintaining the data packet by using the old protocol stack before the first access network device triggers the terminal device and/or the second access network device to completely use the new protocol stack.
  • the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the switching process of the terminal device.
  • the to-be-processed data includes first data
  • the terminal device receives the second trigger information sent by the first access network device and/or the second access network device.
  • the terminal device uses the first protocol stack of the terminal device to process the to-be-processed data packets or data of the terminal device in sequence, and the terminal device uses the first protocol stack to perform sequential processing on the first data.
  • the method further includes: the terminal device encrypts the sequentially processed first data or the data packet including the first data by using the first protocol stack; the terminal device is configured to the first access network device and/or The second access network device transmits the encrypted data packet including the first data.
  • the to-be-processed data packet includes a first data packet
  • the terminal device receives the second access network device and/or the second access network device sends the second Before the triggering information
  • the terminal device uses the first protocol stack of the terminal device to perform processing on the data packet or data of the terminal device in sequence, including: receiving, by the terminal device, the first access network device and/or the Before the second trigger information sent by the second access network device, the terminal device receives the first data packet sent by the first access network device and/or the second access network device; the terminal device uses the first protocol stack Decrypting the first data packet or the data portion in the first data packet; the terminal device uses the first protocol stack to perform sequential processing on the decrypted first data packet.
  • the to-be-processed data includes second data, where the terminal device receives the second trigger information sent by the first access network device and/or the second access network device.
  • the terminal device uses the first protocol stack of the terminal device to process the to-be-processed data packets or data of the terminal device in sequence, and the terminal device uses the first protocol stack to perform sequential processing on the second data.
  • the method further includes: the terminal device encrypts the sequentially processed second data or the data packet including the second data by using the second protocol stack; the terminal device is to the second The network device transmits the encrypted data packet including the second data.
  • the to-be-processed data packet includes a second data packet
  • the terminal device receives the second access network device and/or the second access network device sends the second
  • the terminal device uses the first protocol stack of the terminal device to perform processing on the data packet or data of the terminal device in sequence, including: the terminal device receiving the second data packet sent by the second network device;
  • the terminal device decrypts the second data packet or the second data packet data portion by using the second protocol stack; the terminal device uses the first protocol stack to perform sequential processing on the decrypted second data packet.
  • the method further includes: receiving, by the terminal device, the second trigger information sent by the first access network device and/or the second access network device;
  • the second trigger information is used to maintain the order of the data packets of the terminal device by using the second protocol stack.
  • the second trigger information is further used to indicate that the terminal device releases the first protocol stack
  • the method further includes: the terminal device releasing the first protocol according to the second trigger information. Stack.
  • the second trigger information is any one of radio resource control RRC signaling, media access control MAC signaling, downlink control information DCI, and a bit in a data packet.
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device is a multiple connection.
  • system and “network” are used interchangeably herein.
  • the term “and/or” in this context is merely an association describing the associated object, indicating that there may be three relationships, for example, A and/or B, which may indicate that A exists separately, and both A and B exist, respectively. B these three situations.
  • the character "/" in this article generally indicates that the contextual object is an "or" relationship.
  • FIG. 11 shows a schematic block diagram of an access network device 600 in an embodiment of the present application.
  • the access network device 600 is a first access network device. As shown in FIG. 11, the access network device 600 includes:
  • the first triggering unit 610 is configured to trigger the terminal device and/or the second access network device to configure a second protocol stack, where the second protocol stack is used to maintain the grouping of the second access network device and the terminal device The order of the data aggregation protocol PDCP protocol data unit PDU and/or the security key of the second access network device and the data packet of the terminal device.
  • the sequence processing unit 620 is configured to: in the first access network device, trigger the terminal device and/or the second access network device to use the second protocol stack to maintain a sequence of data packets of the terminal device Previously, the first access network device and the to-be-processed data packet of the terminal device are processed in sequence using the first protocol stack.
  • the access network device of the embodiment of the present application continues to use the old protocol stack to maintain the sequence of the data packet before the first access network device triggers the terminal device and/or the second access network device to completely use the new protocol stack. Therefore, the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the switching process of the terminal device.
  • the to-be-processed data packet includes a first data packet
  • the sequential processing unit 620 is specifically configured to: trigger the terminal device and/or in the first access network device And before the second access network device uses the second protocol stack to maintain the sequence of the data packet of the terminal device, receiving the first data packet sent by the terminal device; using the first protocol stack pair Decrypting the first data packet or the data portion of the first data packet; performing sequential processing on the decrypted first data packet by using the first protocol stack.
  • the to-be-processed data packet includes a second data packet
  • the sequential processing unit is specifically configured to: trigger, on the first access network device, the terminal device and/or Receiving, by the second access network device, the second data packet sent by the core network device before using the second protocol stack to maintain the sequence of the data packet of the terminal device; using the first protocol stack to the second The data packet is processed in sequence; the access network device further includes: a first encryption unit, configured to use the first protocol stack to process the second data packet or the second data packet that is processed in sequence The data portion is encrypted.
  • the to-be-processed data packet includes a third data packet
  • the sequential processing unit is specifically configured to: trigger, on the first access network device, the terminal device and/or Before the second access network device uses the second protocol stack to maintain the sequence of the data packets of the terminal device, the second access network device sends the second access network device to use the second access network device to use the Second
  • the protocol stack decrypts the data portion of the third data packet or the third data packet; and performs sequential processing on the decrypted third data packet.
  • the to-be-processed data packet includes a fourth data packet
  • the sequential processing unit is specifically configured to: trigger, on the first access network device, the terminal device and/or Receiving, by the second access network device, the fourth data packet sent by the core network device, before using the second protocol stack to maintain the sequence of the data packet of the terminal device; using the first protocol stack
  • the fourth data packet is processed in sequence
  • the access network device further includes: a second encryption unit, configured to send, to the second access network device, the fourth data packet that is processed in order to make the The second access network device encrypts the data portion in the second data packet or the second data packet that is processed in sequence using the second protocol stack.
  • the access network device further includes: a second triggering unit, configured to determine, at the first access network device, that the first access network device does not have the terminal device If the data packet needs to be processed, triggering the terminal device and/or the second access network device to use the second protocol stack to maintain the order of the data packets of the terminal device.
  • a second triggering unit configured to determine, at the first access network device, that the first access network device does not have the terminal device If the data packet needs to be processed, triggering the terminal device and/or the second access network device to use the second protocol stack to maintain the order of the data packets of the terminal device.
  • the second triggering unit is specifically configured to: when the first access network device determines that the first access network device does not need to process the data packet of the terminal device, In the case, the first indication information is sent to the terminal device, where the first indication information is used to indicate the order in which the terminal device uses the second protocol stack to maintain data packets of the terminal device.
  • the first indication information is further used to instruct the terminal device to release the first protocol stack.
  • the first indication information is any one of radio resource control RRC signaling, media access control MAC signaling, downlink control information DCI, and a bit in a data packet.
  • the second triggering unit is specifically the same as: determining, by the first access network device, that the first access network device does not need to process the data packet of the terminal device.
  • the first access network device sends the second indication information to the second access network device, where the second indication information is used to indicate that the second access network device uses the second protocol stack Maintaining the order of the data packets of the terminal device.
  • the access network device further includes: a determining unit, configured to determine that the first access network device does not need to process the data packet of the terminal device.
  • the determining unit is specifically configured to: receive a core network device. a third indication information, where the third indication information is used to indicate that the first access network device does not need to process the data packet of the terminal device; and according to the third indication information, determine the first access The network device does not need to process the data packet of the terminal device.
  • the access network device further includes: a receiving unit, configured to receive fourth indication information that is sent by the second access network device, where the fourth indication information is used to indicate The terminal device completes the configuration of the second protocol stack; the sending unit is configured to send routing switching information to the core network device according to the fourth indication information, where the routing switching information is used to indicate that the core network device An access network device responsible for maintaining a sequence of data packets of the terminal device switches from the first access network device to the second access network device.
  • the first triggering unit is specifically configured to: send, to the second access network device, first trigger information, where the first trigger information is used to request the second connection
  • the network device configures the second protocol stack; receives response information of the first trigger information sent by the second access network device; and sends second trigger information to the terminal device according to the response information, where The second trigger information is used to instruct the terminal device to configure the second protocol stack.
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device
  • the primary access network device in the multi-connection scenario is the secondary access network device in the multiple connectivity scenario.
  • the access network device 600 may correspond to the first access network device in the method embodiment of the present application, and the foregoing and other operations and/or functions of the respective units in the access network device 600.
  • the corresponding processes of the network device in the method of FIG. 4 and FIG. 8 are respectively implemented, and are not described herein for brevity.
  • FIG. 12 shows a schematic block diagram of an access network device 700 in an embodiment of the present application.
  • the access network device 700 is a second access network device. As shown in FIG. 12, the access network device 700 includes:
  • the first receiving unit 710 is configured to receive first trigger information that is sent by the first access network device, where the first trigger information is used to trigger the second access network device to configure a second protocol stack, where the second protocol stack is used by Maintaining a sequence of data packets of the second access network device and the terminal device and/or a security key of the data packet of the second access network device and the terminal device.
  • the second receiving unit 720 is configured to receive the second trigger information that is sent by the first access network device, where the second trigger information is used to trigger the second access network device to use the second protocol stack to maintain data of the terminal device. The order of the packages.
  • the access network device of the embodiment of the present application continues to use the old protocol stack to maintain the sequence of the data packet before the first access network device triggers the terminal device and/or the second access network device to completely use the new protocol stack. Therefore, the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the switching process of the terminal device.
  • the access network device further includes: a third receiving unit, configured to: before the second access network device receives the second trigger information sent by the first access network device Receiving, by the first access network device, the first data packet that is processed and encrypted in sequence; the first sending unit is configured to forward, to the terminal device, the first data packet that is processed and encrypted in sequence.
  • the access network device further includes: a fourth receiving unit, configured to: before the second access network device receives the second trigger information sent by the first access network device Receiving, by the first access network device, the sequentially processed second data packet; the first encryption unit is configured to use the second protocol stack to use the second data packet or the data portion of the second data packet Encryption is performed; the second sending unit is configured to send the encrypted second data packet to the terminal device.
  • a fourth receiving unit configured to: before the second access network device receives the second trigger information sent by the first access network device Receiving, by the first access network device, the sequentially processed second data packet; the first encryption unit is configured to use the second protocol stack to use the second data packet or the data portion of the second data packet Encryption is performed; the second sending unit is configured to send the encrypted second data packet to the terminal device.
  • the access network device further includes: a fifth receiving unit, configured to: before the second access network device receives the second trigger information sent by the first access network device Receiving a third data packet sent by the terminal device, where the third sending unit is configured to forward the third data packet to the first access network device, so that the first access network device can The data portion of the third data packet is decrypted and processed in sequence.
  • a fifth receiving unit configured to: before the second access network device receives the second trigger information sent by the first access network device Receiving a third data packet sent by the terminal device, where the third sending unit is configured to forward the third data packet to the first access network device, so that the first access network device can The data portion of the third data packet is decrypted and processed in sequence.
  • the access network device further includes: a sixth receiving unit, configured to: before the second access network device receives the second trigger information sent by the first access network device Receiving a fourth data packet sent by the terminal device; the first decrypting unit is configured to decrypt the data portion in the fourth data packet or the fourth data packet by using the second protocol stack; And transmitting the decrypted fourth data packet to the first access network device, so that the first access network device performs sequential processing on the decrypted fourth data packet.
  • a sixth receiving unit configured to: before the second access network device receives the second trigger information sent by the first access network device Receiving a fourth data packet sent by the terminal device
  • the first decrypting unit is configured to decrypt the data portion in the fourth data packet or the fourth data packet by using the second protocol stack; And transmitting the decrypted fourth data packet to the first access network device, so that the first access network device performs sequential processing on the decrypted fourth data packet.
  • the access network device further includes: a seventh receiving unit, configured to receive first indication information that is sent by the terminal device, where the first indication information is used to indicate that the terminal device is complete a configuration of the second protocol stack, where the fifth sending unit is configured to send routing switching information to the core network device according to the first indication information, or trigger the first access network device to the core network according to the first indication information
  • the device sends routing switching information, where the routing switching information is used to indicate that the core network device switches the access network device responsible for maintaining the sequence of the data packets of the terminal device from the first access network device to the second access network device. It should be.
  • the access network device further includes: an eighth receiving unit, configured to send, after the seventh sending unit sends the routing switching information to the core network device, the second access network The device receives the second indication information that is sent by the first access network device, where the second indication information is used to indicate that the first access network device does not need to process the data or the data packet of the terminal device.
  • the second trigger information is any one of radio resource control RRC signaling, media access control MAC signaling, downlink control information DCI, and a bit in a data packet.
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device is a multiple connection.
  • the access network device 700 may correspond to the second access network device in the method embodiment of the present application, and the foregoing and other operations and/or functions of the respective units in the access network device 700.
  • the corresponding processes of the network devices in the methods of FIG. 5 and FIG. 9 are respectively omitted.
  • FIG. 13 shows a schematic block diagram of a terminal device 800 of an embodiment of the present application.
  • the terminal device 800 includes:
  • the configuration unit 810 is configured to configure, according to the first trigger information sent by the first access network device, a second protocol stack, where the second protocol stack is used to maintain the sequence of data packets of the second access network device and the terminal device And/or a security key of the second access network device and the data packet of the terminal device;
  • the first in-sequence processing unit 820 is configured to use the first protocol stack to the terminal device before the terminal device receives the second trigger information sent by the first access network device and/or the second access network device.
  • the to-be-processed data packet or data is processed in sequence, and the second trigger information is used to trigger the terminal device to use the second protocol stack to maintain the sequence of the data packets of the terminal device.
  • the terminal device in the embodiment of the present application maintains the order of maintaining the data packet by using the old protocol stack before the first access network device triggers the terminal device and/or the second access network device to completely use the new protocol stack.
  • the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the switching process of the terminal device.
  • the to-be-processed data packet includes first data, where the first in-sequence processing unit is specifically configured to: sequentially process the first data by using the first protocol stack;
  • the device further includes: a first encryption unit, configured to encrypt, by using the first protocol stack, the first data packet that is processed in sequence or a data packet that includes the first data; and a first sending unit, configured to The first access network device sends the encrypted data packet including the first data.
  • the to-be-processed data packet includes a first data packet
  • the first in-sequence processing unit is specifically configured to: receive, by the terminal device, the first access network device and/or the Receiving, by the second access network device, the first data packet sent by the first access network device, and using the first protocol stack in the first data packet or the first data packet
  • the data portion is decrypted; the decrypted first data packet is processed sequentially using the first protocol stack.
  • the to-be-processed data includes second data
  • the first sequential processing unit is specifically configured to: perform sequential processing on the second data by using the first protocol stack
  • the second encryption unit is configured to encrypt the sequentially processed second data or the data packet including the second data by using the second protocol stack
  • the second sending unit is configured to The network device transmits the encrypted data packet including the second data.
  • the to-be-processed data packet includes a second data packet
  • the first in-sequence processing unit is configured to: receive the second data packet sent by the second network device; use the second The protocol stack decrypts the data portion of the second data packet or the second data packet; and sequentially processes the decrypted second data packet using the first protocol stack.
  • the terminal device further includes: a first receiving unit, configured to receive the second trigger information sent by the first access network device and/or the second access network device;
  • the second sequential processing unit uses the second protocol stack to maintain the order of the data packets of the terminal device according to the second trigger information.
  • the second trigger information is further used to indicate that the terminal device releases the first protocol stack
  • the terminal device further includes: a releasing unit, configured to release the second trigger information according to the second trigger information The first protocol stack.
  • the second trigger information is any one of radio resource control RRC signaling, media access control MAC signaling, downlink control information DCI, and a bit in a data packet.
  • the first access network device is a source access network device, and the second access network device is a target access network device; or the first access network device
  • the primary access network device in the multi-connection scenario is the secondary access network device in the multiple connectivity scenario.
  • terminal device 800 may correspond to the terminal device in the method embodiment of the present application, and the foregoing and other operations and/or functions of the respective units in the terminal device 800.
  • the corresponding processes of the terminal devices in the methods of FIG. 5 to FIG. 8 and FIG. 10 can be implemented separately, and are not described herein for brevity.
  • the embodiment of the present application further provides an access network device 900, which may be the access network device 600 in FIG. 11, which can be used to perform with FIG. 4 to FIG.
  • the method 300 corresponds to the content of the first access network device.
  • the access network device 900 includes an input interface 910, an output interface 920, a processor 930, and a memory 940.
  • the input interface 910, the output interface 920, the processor 930, and the memory 940 can be connected by a bus system.
  • the memory 940 is for storing programs, instructions or code.
  • the processor 930 is configured to execute a program, an instruction or a code in the memory 940 to control the input interface 910 to receive a signal, control the output interface 920 to transmit a signal, and complete the operations in the foregoing method embodiments.
  • the access network device of the embodiment of the present application continues to use the old protocol stack to maintain the sequence of the data packet before the first access network device triggers the terminal device and/or the second access network device to completely use the new protocol stack. Therefore, the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the switching process of the terminal device.
  • the processor 930 may be a central processing unit (CPU), and the processor 930 may also be another general-purpose processor, a digital signal processor (DSP). , Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 940 can include read only memory and random access memory and provides instructions and data to the processor 930. A portion of the memory 940 can also include a non-volatile random access memory. For example, the memory 940 can also store information of the device type.
  • each content of the above method may be completed by an integrated logic circuit of hardware in the processor 930 or an instruction in a form of software.
  • the content of the method disclosed in the embodiments of the present application may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 940, and the processor 930 reads the information in the memory 940 and combines its hardware to complete the contents of the above method. To avoid repetition, it will not be described in detail here.
  • the sending unit of the access network device 600 can be implemented by the output interface 920 in FIG. 14, and the receiving unit of the access network device 600 can be implemented by the input interface 910 in FIG.
  • the first trigger unit, the second trigger unit, the sequential processing unit, the determining unit, the first encrypting unit, and the second decrypting unit of the access network device 600 may be implemented by the processor 930 in FIG.
  • the embodiment of the present application further provides an access network device 1000, which may be the access network device 700 in FIG. 12, which can be used to perform with FIG. 5 to FIG.
  • the method 400 corresponds to the content of the second access network device.
  • the access network device 1000 includes an input interface 1010, an output interface 1020, a processor 1030, and a memory 1040.
  • the input interface 1010, the output interface 1020, the processor 1030, and the memory 1040 can be connected by a bus system.
  • the memory 1040 is for storing programs, instructions or codes.
  • the processor 1030 is configured to execute a program, an instruction or a code in the memory 1040 to control the input interface 1010 to receive a signal, control the output interface 1020 to send a signal, and complete the operations in the foregoing method embodiments.
  • the access network device of the embodiment of the present application continues to use the old protocol stack to maintain the sequence of the data packet before the first access network device triggers the terminal device and/or the second access network device to completely use the new protocol stack. Therefore, the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the switching process of the terminal device.
  • the processor 1030 may be a central processing unit (CPU), and the processor 1030 may also be another general-purpose processor, a digital signal processor (DSP). , Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 1040 can include read only memory and random access memory and provides instructions and data to the processor 1030. A portion of the memory 1040 may also include a non-volatile random access memory. For example, the memory 1040 can also store information of the device type.
  • each content of the foregoing method may be completed by an integrated logic circuit of hardware in the processor 1030 or an instruction in a form of software.
  • the content of the method disclosed in the embodiments of the present application may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the software module can be located in a random access memory, a flash memory, a read only memory, a programmable read only memory or an electrically erasable programmable memory, a register, etc., and a mature storage medium in the field. in.
  • the storage medium is located in the memory 1040, and the processor 1030 reads the information in the memory 1040 and combines the hardware to complete the contents of the above method. To avoid repetition, it will not be described in detail here.
  • the first to sixth sending units of the access network device 700 may be implemented by the output interface 1020 in FIG. 15, and the first to sixth receiving units of the access network device 700 may be configured by The input interface 1010 in Figure 15 is implemented.
  • the first encryption unit and the first decryption unit of the access network device 700 can be implemented by the processor 1030 in FIG.
  • the embodiment of the present application further provides a terminal device 2000, which may be the terminal device 800 in FIG. 13, which can be used to perform the method 500 with FIG. 5 to FIG. 8 and FIG. The content of the corresponding terminal device.
  • the terminal device 2000 includes an input interface 2010, an output interface 2020, a processor 2030, and a memory 2040.
  • the input interface 2010, the output interface 2020, the processor 2030, and the memory 2040 can be connected through a bus system.
  • the memory 2040 is for storing programs, instructions or code.
  • the processor 2030 is configured to execute a program, an instruction or a code in the memory 2040 to control the input interface 2010 to receive a signal, control the output interface 2020 to transmit a signal, and complete the operations in the foregoing method embodiments.
  • the terminal device in the embodiment of the present application maintains the order of maintaining the data packet by using the old protocol stack before the first access network device triggers the terminal device and/or the second access network device to completely use the new protocol stack.
  • the data of the terminal device can be processed in time, thereby reducing the delay of data transmission during the switching process of the terminal device.
  • the processor 2030 may be a central processing unit (CPU), and the processor 2030 may also be another general-purpose processor, a digital signal processor (DSP). , Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 2040 can include read only memory and random access memory and provides instructions and data to the processor 2030. A portion of the memory 2040 may also include a non-volatile random access memory. For example, the memory 2040 can also store information of the device type.
  • each content of the foregoing method may be completed by an integrated logic circuit of hardware in the processor 2030 or an instruction in a form of software.
  • the content of the method disclosed in the embodiment of the present application may be directly embodied by the execution of the hardware processor, or the hardware and software modules in the processor.
  • the combination execution is completed.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 2040, and the processor 2030 reads the information in the memory 2040 and combines the hardware to complete the contents of the above method. To avoid repetition, it will not be described in detail here.
  • the first sending unit and the second sending unit in the terminal device 800 can be implemented by the output interface 2020 in FIG. 16, and the first receiving unit in the terminal device 800 can be input from the input interface 2010 in FIG. achieve.
  • the configuration unit, the first sequential processing unit, the first encryption unit, the first decryption unit, and the second sequential processing unit in the terminal device 800 may be implemented by the processor 2030 in FIG.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • This functionality if implemented as a software functional unit and sold or used as a standalone product, can be stored on a computer readable storage medium.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including The instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)

Abstract

本申请实施例公开了一种切换方法、接入网设备和终端设备,该方法包括:第一接入网设备触发终端设备和/或第二接入网设备配置第二协议栈,该第二协议栈用于维护该第二接入网设备与该终端设备的数据包的顺序和/或该第二接入网设备和该终端设备的数据包的秘钥;在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理数据包进行按序处理。本申请实施例的方法、接入网设备和终端设备,有利于降低终端设备在切换过程中数据传输的时延。

Description

切换方法、接入网设备和终端设备 技术领域
本申请实施例涉及通信领域,并且更具体地,涉及一种切换方法、接入网设备和终端设备。
背景技术
现有长期演进(Long Term Evolution,LTE)系统中的切换流程为:源接入网设备根据终端设备上报的测量报告向目标接入网设备发送切换请求,在接收到目标接入网设备对切换请求的响应之后,再向终端设备发送切换命令,终端设备根据切换命令进行重配置并且会离开源小区并与目标小区进行同步,对于终端设备和源接入网设备之间的数据来说,需要源接入网设备将缓存的数据传递给目标接入网设备,直到目标接入网设备与终端设备完成同步,这些数据才能够得到处理。对于这部分数据来讲,在终端设备进行切换的过程中需要等待的时延比较长。
发明内容
有鉴于此,本申请实施例提供了一种切换方法、接入网设备和终端设备,有利于降低终端设备在切换过程中数据传输的时延。
第一方面,提供了一种切换方法,该方法包括:第一接入网设备触发终端设备和/或第二接入网设备配置第二协议栈,该第二协议栈用于维护该第二接入网设备与该终端设备的数据包的顺序和/或该第二接入网设备和该终端设备的数据包的安全秘钥;在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理数据包进行按序处理。
数据包通常是由包头和数据部分组成的,包头是用于接收端识别的标志,而数据部分则是原始数据。本申请实施例中的数据包可以包括但不限于PDCP的协议数据单元(Protocol Data Unit,PDU),数据部分可以包括但不限于PDCP的服务数据单元(Service Data Unit,SDU)。
可选地,第一接入网设备可以只触发第一终端设备。例如,当第一接入 网设备移动到与第二终端设备连接的第二接入网设备的覆盖范围下,而第一终端设备可以与第二终端设备通过端到端(Device-to-Device,D2D)相连,那么第一网络设备可以触发第一终端设备,而第一终端设备可以通过第二终端设备来触发第二网络设备来建立新的协议栈。
可选地,第一接入网设备也可以只触发第二接入网设备。例如,当第一接入网设备移动到与第二终端设备连接的第二接入网设备的覆盖范围下,而第一终端设备可以与第二终端设备通过D2D相连,那么第一网络设备可以触发第二网络设备,而第二网络设备可以通过第二终端设备来触发第一终端设备来建立新的协议栈。
可选地,该第一接入网设备触发终端设备和第二接入网设备配置第二协议栈,包括:该第一接入网设备向该第二接入网设备发送第一触发信息,该第一触发信息用于请求该第二接入网设备配置该第二协议栈;该第一接入网设备接收该第二接入网设备发送的该第一触发信息的响应信息;该第一接入网设备根据该响应信息,向该终端设备发送第二触发信息,该第二触发信息用于指示该终端设备配置该第二协议栈。
通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
在一种可能的实现方式中,该待处理数据包包括第一数据包,该在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理数据包进行按序处理,包括:在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备接收该终端设备发送的该第一数据包;该第一接入网设备使用该第一协议栈对该第一数据包或该第一数据包中的数据部分进行解密;该第一接入网设备使用该第一协议栈对经过解密后的该第一数据包进行按序处理。
在一种可能的实现方式中,该待处理数据包包括第二数据包,该在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理数据包进行按序处理,包括:在该第 一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备接收核心网设备发送的该第二数据包的数据部分;该第一接入网设备使用第一协议栈对该第二数据包进行按序处理;该方法还包括:该第一接入网设备使用该第一协议栈对经过按序处理的该第二数据包或该第二数据包中的数据部分进行加密。
在一种可能的实现方式中,该待处理数据包包括第三数据包,该在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理数据包进行按序处理,包括:在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备接收该第二接入网设备发送的经过该第二接入网设备使用该第二协议栈对该第三数据包或该第三数据包中的数据部分进行解密;该第一接入网设备对经过解密的该第三数据包进行按序处理。
在一种可能的实现方式中,该待处理数据包包括第四数据包,该在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理数据包进行按序处理,包括:在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备接收核心网设备发送的该第四数据包的数据部分;该第一接入网设备使用该第一协议栈对该第四数据包进行按序处理;该方法还包括:该第一接入网设备向该第二接入网设备发送经过按序处理的该第四数据包,以使得该第二接入网设备使用该第二协议栈对经过按序处理的该第二数据包或该第二数据包中的数据部分进行加密。
在一种可能的实现方式中,该方法还包括:在该第一接入网设备确定该第一接入网设备无该终端设备的数据包或数据需要处理的情况下,该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序。
在一种可能的实现方式中,该在该第一接入网设备确定该第一接入网设备无该终端设备的数据包或数据需要处理的情况下,该第一接入网设备触发 该终端设备使用该第二协议栈维护该终端设备的数据包的顺序,包括:在该第一接入网设备确定该第一接入网设备无该终端设备的数据包或数据需要处理的情况下,该第一接入网设备向该终端设备发送第一指示信息,该第一指示信息用于指示该终端设备使用该第二协议栈维护该终端设备的数据包的顺序。
在一种可能的实现方式中,该第一指示信息还用于指示该终端设备释放该第一协议栈。
在一种可能的实现方式中,该第一指示信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
在一种可能的实现方式中,该在该第一接入网设备确定该第一接入网设备无该终端设备的数据包或数据需要处理的情况下,该第一接入网设备触发该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序,包括:在该第一接入网设备确定该第一接入网设备无该终端设备的数据包需要处理的情况下,该第一接入网设备向该第二接入网设备发送第二指示信息,该第二指示信息用于指示该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序。
在一种可能的实现方式中,该方法还包括:该第一接入网设备确定该第一接入网设备无该终端设备的数据包需要处理。
在一种可能的实现方式中,该第一接入网设备确定该第一接入网设备无该终端设备的数据包或数据需要处理,包括:该第一接入网设备接收核心网设备发送的第三指示信息,该第三指示信息用于指示该第一接入网设备无该终端设备的数据包需要处理;该第一接入网设备根据该第三指示信息,确定该第一接入网设备无该终端设备的数据包或数据需要处理。
该第三指示信息可以是结束标识(end marker)。
在一种可能的实现方式中,该方法还包括:该第一接入网设备接收该第二接入网设备发送的第四指示信息,该第四指示信息用于指示该终端设备完成该第二协议栈的配置;该第一接入网设备根据该第四指示信息,向核心网设备发送路由切换信息,该路由切换信息用于指示该核心网设备将负责维护该终端设备的数据包的顺序的接入网设备从该第一接入网设备切换为该第二接入网设备。
可选地,在一种可能的实现方式中,该第一接入网设备接收核心网设备发送的第三指示信息,包括:在该第一接入网设备向核心网设备发送路由切换信息之后,该第一接入网设备接收该核心网设备发送的该第三指示信息。
在一种可能的实现方式中,该第一接入网设备为源接入网设备,该第二接入网设备为目标接入网设备;或该第一接入网设备为多连接场景中的主接入网设备,该第二接入网设备为该多连接场景中的辅接入网设备。
第二方面,提供了一种切换方法,该方法包括:第二接入网设备接收第一接入网设备发送的第一触发信息,该第一触发信息用于触发该第二接入网设备配置第二协议栈,该第二协议栈用于维护该第二接入网设备与终端设备的数据包的顺序和/或该第二接入网设备与该终端设备的数据包的安全秘钥;该第二接入网设备接收该第一接入网设备发送的第二触发信息,该第二触发信息用于触发该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序。
在一种可能的实现方式中,该方法还包括:在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,该第二接入网设备向该第一接入网设备发送的经过按序处理和加密的第一数据包;该第二接入网设备向该终端设备转发经过按序处理和加密的该第一数据包。
在一种可能的实现方式中,该方法还包括:在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,该第二接入网设备接收该第一接入网设备发送的经过按序处理的第二数据包;该第二接入网设备使用该第二协议栈对该第二数据包或该第二数据包中的数据部分进行加密;该第二接入网设备向该终端设备发送经过加密的该第二数据包。
在一种可能的实现方式中,该方法还包括:在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,该第二接入网设备接收该终端设备发送的第三数据包;该第二接入网设备向该第一接入网设备转发该第三数据包,以便于该第一接入网设备对该第三数据包或该第三数据包中的数据部分进行解密和按序处理。
在一种可能的实现方式中,该方法还包括:在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,该第二接入网设备接收该终端设备发送的第四数据包;该第二接入网设备使用该第二协议栈对该第四数据包或该第四数据包中的数据部分进行解密;该第二接入网设备向该第一接入 网设备发送经过解密的该第四数据包,以便于该第一接入网设备对经过解密的该第四数据包进行按序处理。
在一种可能的实现方式中,该方法还包括:该第二接入网设备接收终端设备发送的第一指示信息,该第一指示信息用于指示该该终端设备完成该第二协议栈的配置;该第二接入网设备根据该第一指示信息,向核心网设备发送路由切换信息,或该第二接入网设备根据该第一指示信息,触发该第一接入网设备向核心网设备发送路由切换信息,该路由切换信息用于指示该核心网设备将为该终端设备提供维护数据包顺序的接入网设备从该第一接入网设备切换为该第二接入网设备。
在一种可能的实现方式中,该第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
在一种可能的实现方式中,该第一接入网设备为源接入网设备,该第二接入网设备为目标接入网设备;或该第一接入网设备为多连接场景中的主接入网设备,该第二接入网设备为该多连接场景中的辅接入网设备。
第三方面,提供了一种切换方法,该方法包括:终端设备根据第一接入网设备发送的第一触发信息,配置第二协议栈,该第二协议栈用于维护该第二接入网设备和该终端设备的数据包的顺序和/或该第二接入网设备和该终端设备的数据包的安全秘钥;在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,该终端设备使用第一协议栈对该终端设备的待处理数据包进行按序处理,该第二触发信息用于触发该终端设备使用该第二协议栈维护该终端设备的数据包的顺序。
在一种可能的实现方式中,所述待处理数据包括第一数据,所述在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,包括:所述终端设备使用所述第一协议栈对所述第一数据进行按序处理;所述方法还包括:所述终端设备使用所述第一协议栈对经过按序处理的所述第一数据或包括所述第一数据的数据包进行加密;所述终端设备向所述第一接入网设备和/或第二接入网设备发送经过加密的包括所述第一数据的数据包。
在一种可能的实现方式中,所述待处理数据包包括第一数据包,所述在 所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,包括:在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备接收所述第一接入网设备和/或第二接入网设备发送的第一数据包;所述终端设备使用所述第一协议栈对所述第一数据包或所述第一数据包中的数据部分进行解密;所述终端设备使用所述第一协议栈对经过解密的所述第一数据包进行按序处理。
在一种可能的实现方式中,所述待处理数据包括第二数据,所述在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用所述终端设备第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,包括:所述终端设备使用所述第一协议栈对所述第二数据进行按序处理;所述方法还包括:所述终端设备使用所述第二协议栈对经过按序处理后的所述第二数据或包括所述第二数据的数据包进行加密;所述终端设备向所述第二网络设备发送经过加密的包括所述第二数据的数据包。
在一种可能的实现方式中,所述待处理数据包包括第二数据包,所述在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用所述终端设备第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,包括:所述终端设备接收所述第二网络设备发送的所述第二数据包;所述终端设备使用所述第二协议栈对所述第二数据包或所述第二数据包数据部分进行解密;所述终端设备使用所述第一协议栈对经过解密的所述第二数据包进行按序处理。
在一种可能的实现方式中,该方法还包括:该终端设备接收该第一接入网设备和/或该第二接入网设备发送的该第二触发信息;该终端设备根据该第二触发信息,使用该第二协议栈维护该终端设备的数据包的顺序。
在一种可能的实现方式中,该第二触发信息还用于指示该终端设备释放该第一协议栈,该方法还包括:该终端设备根据该第二触发信息,释放该第一协议栈。
在一种可能的实现方式中,该第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何 一种。
在一种可能的实现方式中,该第一接入网设备为源接入网设备,该第二接入网设备为目标接入网设备;或该第一接入网设备为多连接场景中的主接入网设备,该第二接入网设备为该多连接场景中的辅接入网设备。
第四方面,提供了一种接入网设备,用于执行上述第一方面或第一方面的任意可能的实现方式中的方法。具体地,该接入网设备包括用于执行上述第一方面或第一方面的任意可能的实现方式中的方法的单元。
第五方面,提供了一种接入网设备,用于执行上述第二方面或第二方面的任意可能的实现方式中的方法。具体地,该接入网设备包括用于执行上述第二方面或第二方面的任意可能的实现方式中的方法的单元。
第六方面,提供了一种终端设备,用于执行上述第三方面或第三方面的任意可能的实现方式中的方法。具体地,该终端设备包括用于执行上述第三方面或第三方面的任意可能的实现方式中的方法的单元。
第七方面,提供了一种接入网设备,该接入网设备包括:存储器、处理器、输入接口和输出接口。其中,存储器、处理器、输入接口和输出接口通过总线系统相连。该存储器用于存储指令,该处理器用于执行该存储器存储的指令,用于执行上述第一方面或第一方面的任意可能的实现方式中的方法。
第八方面,提供了一种接入网设备,该接入网设备包括:存储器、处理器、输入接口和输出接口。其中,存储器、处理器、输入接口和输出接口通过总线系统相连。该存储器用于存储指令,该处理器用于执行该存储器存储的指令,用于执行上述第二方面或第二方面的任意可能的实现方式中的方法。
第九方面,提供了一种终端设备,该终端设备包括:存储器、处理器、输入接口和输出接口。其中,存储器、处理器、输入接口和输出接口通过总线系统相连。该存储器用于存储指令,该处理器用于执行该存储器存储的指令,用于执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第十方面,提供了一种计算机存储介质,用于储存为执行上述第一方面或第一方面的任意可能的实现方式中的方法,或者上述第二方面或第二方面的任意可能的实现方式中的方法,或者上述第三方面或第三方面的任意可能的实现方式中的方法所用的计算机软件指令,其包含用于执行上述方面所设 计的程序。
第十一方面,提供了一种包括指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面或第一方面的任一可选的实现方式中的方法,或者上述第二方面或第二方面的任一可选的实现方式中的方法,或者上述第三方面或第三方面的任一可选的实现方式中的方法。
本申请的这些方面或其他方面在以下实施例的描述中会更加简明易懂。
附图说明
图1示出了本申请实施例一个应用场景的示意图。
图2示出了本申请实施例的另一个应用场景的示意图。
图3示出了LTE切换的示意性流程图。
图4示出了本申请实施例的切换方法的示意性框图。
图5示出了本申请实施例的切换方法的协议栈的实现框图。
图6示出了本申请实施例的切换方法的协议栈的另一实现框图。
图7示出了本申请实施例的切换方法的协议栈的再一实现框图。
图8示出了本申请实施例的切换方法的协议栈的再一实现框图。
图9示出了本申请实施例的切换方法的另一示意性框图。
图10示出了本申请实施例的切换方法的再一示意性框图。
图11示出了本申请实施例的接入网设备的示意性框图。
图12示出了本申请实施例的接入网设备的另一示意性框图。
图13示出了本申请实施例的终端设备的示意性框图。
图14示出了本申请实施例的接入网设备的再一示意性框图。
图15示出了本申请实施例的接入网设备的再一示意性框图。
图16示出了本申请实施例的终端设备的另一示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。
应理解,本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband  Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、LTE系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统、新无线(New Radio,NR)或未来的5G系统等。
特别地,本申请实施例的技术方案可以应用于各种基于非正交多址接入技术的通信系统,例如稀疏码多址接入(Sparse Code Multiple Access,SCMA)系统、低密度签名(Low Density Signature,LDS)系统等,当然SCMA系统和LDS系统在通信领域也可以被称为其他名称;进一步地,本申请实施例的技术方案可以应用于采用非正交多址接入技术的多载波传输系统,例如采用非正交多址接入技术正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)、滤波器组多载波(Filter Bank Multi-Carrier,FBMC)、通用频分复用(Generalized Frequency Division Multiplexing,GFDM)、滤波正交频分复用(Filtered-OFDM,F-OFDM)系统等。
本申请实施例中的终端设备可以指用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(Public Land Mobile Network,PLMN)中的终端设备等,本申请实施例并不限定。
本申请实施例中的网络设备可以是用于与终端设备通信的设备,该网络设备可以是GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional NodeB,eNB或eNodeB),还可以是云无线接入网络(Cloud Radio Access Network,CRAN)场景下的无线控制器,或者该网络设备可以为中继站、接入点、车载设备、可穿戴设备以及未来5G网络中的网络设备或者未来演进的PLMN网络中的网络设备等,本申请实施例并不限 定。
图1是本申请实施例一个应用场景的示意图。图1中的通信系统可以包括终端设备10和网络设备20。网络设备20用于为终端设备10提供通信服务并接入核心网,终端设备10通过搜索网络设备20发送的同步信号、广播信号等而接入网络,从而进行与网络的通信。图1中所示出的箭头可以表示通过终端设备10与网络设备20之间的蜂窝链路进行的上/下行传输。
图2是本申请实施例另一个应用场景的示意图。图2中的终端设备130周围的接入网设备包括主接入网设备110和至少一个辅接入网设备120。该至少一个辅接入网设备120分别与主接入网设备110相连,构成多连接,并分别与终端设备130连接为其提供服务。该主接入网设备110可以为LTE网络,该辅接入网设备120可以为NR网络。或者该主接入网设备110可以为NR网络,该辅接入网设备120可以为LTE网络。或者该主接入网设备110和该辅接入网设备120都为NR网络。本申请对技术方案的应用场景不作限定。终端设备130可以通过主接入网设备110和辅接入网设备120同时建立连接。终端设备130和主接入网设备110建立的连接为主连接,终端设备130与辅接入网设备120建立的连接为辅连接。终端设备130的控制信令可以通过主连接进行传输,而终端设备的数据可以通过主连接和辅连接同时传输,也可以只通过辅连接进行传输。
在本申请实施例中,主接入网设备例如可以是宏基站(Macrocell),辅接入网设备例如可以为微蜂窝基站(Microcell)、微微蜂窝基站(Picocell)、毫微微蜂窝基站(Femtocell),但本发明实施例不限于此。
更具体地,该主接入网设备可以为LTE网络设备,该辅接入网设备为NR网络设备,应理解,本发明实施例并不限于此,该主接入网设备还可以为GSM网络设备,CDMA网络设备等,该辅接入网设备也可以为GSM网络设备,CDMA网络设备等,本发明实施例对此不作限制。
在本申请实施例中,核心网设备可以是移动性管理实体(Mobility Management Entity,MME),还可以是服务网关(Serving Gateway,S-GW)或分组数据网关(PDN Gateway,P-GW),本申请并不限定。
为了便于理解,下面将结合图3详细描述一下LTE系统中的切换流程。如图3所示,该切换流程包括以下部分或全部步骤:
步骤1,源eNB对UE进行测量配置,UE的测量结果将用于辅助源eNB 进行切换判决。
步骤2,UE根据测量配置,进行测量上报。
步骤3,源eNB参考UE的测量上报结果,根据自身的切换算法,进行切换判决。
步骤4,源eNB向目标eNB发送切换请求消息,该消息包含切换准备的相关信息,主要有UE的X2和S1信令上下文参考、目标小区标识、安全秘钥、无线资源控制(Radio Resource Control,RRC)上下文、接入层(Access Stratum,AS)配置、演进的通用移动通信系统陆地无线接入网(Evolved-Universal Terrestrial Radio Access,E-UTRAN)无线接入承载(E-UTRAN Radio Access Bearer,E-RAB)上下文等。同时也包含源小区物理层标识和消息鉴权验证码,用于可能的切换失败后的恢复过程。UE的X2和S1信令上下文参考可以帮助目标eNB找到源eNB的位置。E-RAB上下文包括必要的无线网络层(Radio Network Layer,RLN)和传输层(Transport Network Layrer,TNL)寻址信息以及E-RAB的服务质量(Quality of Service,QoS)信息等。
步骤5:目标eNB根据收到的E-RAB QoS信息进行接纳控制,以提高切换的成功率。接纳控制要考虑预留相应的资源、小区无线网络临时标识(Cell Radio Network Temporary Identifier,C-RNTI)以及分配专用随机接入Preamble码等。目标小区所使用的AS配置可以是完全独立于源小区的完全配置,也可以是在源小区基础之上的增量配置(增量配置是指对相同的部分不进行配置,只通过信令重配不同的部分,UE对于没有收到的配置,将继续使用原配置)。
步骤6:目标eNB进行L1/L2的切换准备,同时向源eNB发送切换请求ACK消息。该消息中包含一个RRC容器,具体内容是触发UE进行切换的切换命令。源eNB切换命令采用透传的方式(不做任何修改),发送给UE。切换命令中包含新的C-RNTI、目标eNB的案例算法标识,有可能还携带随机接入专用Preamble码、接入参数、系统信息等。如果有必要,切换请求ACK消息中还有可能携带RNL/TNL信息,用于数据前转。当源eNB收到切换请求ACK消息或者是向UE转发了切换命令之后,就可以开始数据前转了。
步骤7:切换命令(携带了移动性控制信息的RRC连接重配置消息)是由 目标eNB生成的,通过源eNB将其透传给UE。源eNB对这条消息进行必要的加密和完整性保护。当UE收到该消息之后,就会利用该消息中的相关参数发起切换过程。UE不需要等待低层向源eNB发送的混合自动重传请求(Hybrid Automatic Repeat reQuest,HARQ)/自动重传请求(Automatic Repeat reQuest,ARQ)响应,就可以发起切换过程。
步骤8:源eNB发送序列号(Sequence Number,SN)状态传输消息到目标eNB,传送E-RAB的上行分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)SN接收状态和下行PDCP SN发送状态。上行PDCP SN接收状态至少包含了按序接收的最后一个上行SDU的PDCP SN,也可能包含以比特映射的形式表示的那些造成接收乱序的丢失的上行SDU的SN(如果有这样的SDU的话,这些SDU可能需要UE在目标小区进行重传)。下行PDCP SN发送状态指示了在目标eNB应该分配的下一个SDU序号。如果没有E-RAB需要传送PDCP的状态报告,源eNB可以省略这条消息。
步骤9:UE收到切换命令以后,执行与目标小区的同步,如果在切换命令中配置了随机接入专用Preamble码,则使用非竞争随机接入流程接入目标小区,如果没有配置专用Preamble码,则使用竞争随机接入流程接入目标小区。UE计算在目标eNB所需使用的密钥并配置网络选择好的在目标eNB使用的安全算法,用于切换成功之后与目标eNB进行通信。
步骤10:网络回复上行资源分配指示和定时提前。
步骤11:当UE成功接入目标小区后,UE发送RRC连接重配置完成消息,向目标eNB确认切换过程完成。如果资源允许,该消息也可能伴随着一个上行缓存状态报告(Buffer Status Report,BSR)的改善。目标eNB通过接收RRC连接重配置完成消息,确认切换成功。至此,目标eNB可以开始向UE发送数据。
步骤12:目标eNB向MME发送一个路径转换请求消息来告知UE更换了小区。此时空口的切换已经成功完成。
步骤13:MME向S-GW发送用户平面更新请求消息。
步骤14:S-GW将下行数据路径切换到目标eNB侧。S-GW在旧路径上发送一个或多个“结束标识(end marker)包”到源eNB,然后就可以释放源eNB的用户平面资源。
步骤15:S-GW向MME发送用户平面更新响应消息。
步骤16:MME向目标eNB发送路径转换请求ACK消息。步骤12~16就完成了路径转换过程,该过程的目的是将用户平面的数据路径从源eNB转到目标eNB。在S-GW转换了下行路径以后,前转路径和新路径的下行包在目标eNB可能会交替到达。目标eNB应该首先传递所有的前转数据包给UE,然后再传递从新路径接收的包。在目标eNB使用这一方法可以强制性保证正确的传输顺序。为了辅助在目标eNB的重排功能,S-GW在E-RAB转换路径以后,立即在旧路径发送一个或者多个“end marker包”。“end marker包”内不含用户数据,由通用数据传输平台(General Data Transfer Platform,GTP)头指示。在完成发送含有标志符的包以后,S-GW不应该在旧路径发送任何数据包。在收到“end marker包”以后,如果前转对这个承载是激活的,源eNB应该将此包发送给目标eNB。在察觉了“end marker包”以后,目标eNB应该丢弃“end marker包”并发起任何必要的流程来维持用户的按序递交,这些数据是通过X2口前转的或者路径转换以后从S-GW通过S1口接收的。
步骤17:目标eNB向源eNB发送UE上下文释放消息,通知源eNB切换的成功并触发源eNB的资源释放。目标eNB在收到从MME发回的路径转换ACK消息以后发送这条消息。
步骤18:收到UE上下文释放消息之后,源eNB可以释放无线承载和与UE上下文相关的控制平面资源。任何正在进行的数据前转将继续进行。
由图3可知,在源eNB向UE发送RRC连接重配置消息后,UE会离开源小区并与目标小区进行同步,也就是说UE会断开与源eNB的网络连接,对于UE和源eNB之间的数据来说,需要源eNB将缓存的数据传递给目标eNB,直到目标eNB与UE之间的承载完成建立,这些数据才能够得到处理。对于这部分数据来讲,在UE进行切换的过程中需要等待的时延比较长。对于UE本身来讲,UE断开网络的时间也比较长,UE的业务不能得到及时处理,从而网络传输的性能比较差。
图4示出了本申请实施例的一种切换方法300的示意性框图。如图4所示,该方法300包括以下步骤中的部分或全部内容:
S310,第一接入网设备触发终端设备和/或第二接入网设备配置第二协议栈,所述第二协议栈用于维护所述第二接入网设备与所述终端设备的数据包的顺序和/或所述第二接入网设备和所述终端设备的数据包的安全秘钥。
S320,在所述第一接入网设备触发所述终端设备和/或所述第二接入网 设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备使用第一协议栈对所述第一接入网设备和所述终端设备的待处理数据包进行按序处理。
本领域技术人员理解,数据包通常是由包头和数据部分组成的,包头是用于接收端识别的标志,而数据部分则是原始数据。本申请实施例中的数据包可以包括但不限于PDCP PDU,下文中将以PDCP PDU为例作为本申请实施例中的数据包,以SDU作为本申请实施例中的数据包中的数据部分,本申请实施例应不限于此。
可选地,本申请实施例的技术方案既可以适用于图1所示单连接下的切换场景,也可以适用于图2所示多连接下的角色切换场景。为了描述方面,下面先以单连接下的切换场景为例简单介绍一下方法100的技术方案。
具体地,第一接入网设备也就是源接入网设备可以按照图3切换流程中的步骤1~7中的部分或全部步骤来触发终端设备和/或第二接入网设备即目标接入网设备配置第二协议栈(下文将称为新的协议栈),新的协议栈包括PDCP层/无线链路控制(Radio Link Control,RLC)层/媒体访问控制(Medium Access Control,MAC)层/物理(Physical,PHY)层。其中,新的协议栈的PDCP层具有能够维护PDCP PDU的发送或接收顺序以及PDCP PDU的安全秘钥。也就是说,当终端设备切换到第二接入网设备之后,可以使用新的协议栈在终端设备和第二接入网设备之间传输数据包。在本申请实施例中,第一接入网设备触发终端设备和/或第二接入网设备配置第二协议栈的同时可以告诉终端设备和/或第二接入网设备不要释放第一协议栈(下文将称为旧的协议栈),也就是说,终端设备和/或第二接入网设备在被第一接入网设备触发建立新的协议栈时,不要断开终端设备和第一接入网设备之间的连接。在本申请实施例中,第一接入网设备在后续还可以触发终端设备和/或第二接入网设备使用新的协议栈维护PDCP PDU的顺序,也就是说,第一接入网设备触发终端设备完全切换到第二接入网设备,或者第一接入网设备触发第二接入网设备告知核心网设备完全切换下行路径。而在第一接入网设备触发终端设备和/或第二接入网设备使用所述新协议栈维护PDCP PDU的顺序之前,第一接入网设备可以对缓存在第一接入网设备处的上下行数据使用旧的协议栈继续维护PDCP PDU的顺序。
因此,本申请实施例的切换方法,通过在第一接入网设备触发终端设备 和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
可选地,在本申请实施例中,第一接入网设备可以只触发第一终端设备。例如,当第一接入网设备移动到与第二终端设备连接的第二接入网设备的覆盖范围下,而第一终端设备可以与第二终端设备通过端到端(Device-to-Device,D2D)相连,那么第一网络设备可以触发第一终端设备,而第一终端设备可以通过第二终端设备来触发第二网络设备来建立新的协议栈。
可选地,在本申请实施例中,第一接入网设备也可以只触发第二接入网设备。例如,当第一接入网设备移动到与第二终端设备连接的第二接入网设备的覆盖范围下,而第一终端设备可以与第二终端设备通过D2D相连,那么第一网络设备可以触发第二网络设备,而第二网络设备可以通过第二终端设备来触发第一终端设备来建立新的协议栈。
可选地,在本申请实施例中,该第一接入网设备触发终端设备和第二接入网设备配置第二协议栈,包括:该第一接入网设备向该第二接入网设备发送第一触发信息,该第一触发信息用于请求该第二接入网设备配置该第二协议栈;该第一接入网设备接收该第二接入网设备发送的该第一触发信息的响应信息;该第一接入网设备根据该响应信息,向该终端设备发送第二触发信息,该第二触发信息用于指示该终端设备配置该第二协议栈。
具体地,可以如图3所示的步骤4至步骤7。例如,第一接入网设备可以向第二接入网设备发送切换请求,第二接入网设备根据该切换请求确定允许终端设备切换到该第二接入网设备后,可以向第一接入网设备回复该切换请求的响应,该响应可以携带第二接入网设备对终端设备配置的各种参数,第一接入网设备可以直接将第二接入网设备配置的各种参数透传给终端设备,进而终端设备可以根据这些参数来配置可以与第二接入网设备通信的协议栈。
应理解,第一接入网设备在触发终端设备配置新的协议栈时,第一接入网设备可以同时告知终端设备先不要断开与第一接入网设备之间的连接。例如,可以在第一接入网设备向终端设备发送的切换命令中携带一个指示信息,该指示信息可以直接指示终端设备不要断开与第一接入网设备之间的连 接。或者第一接入网设备可以单独向终端设备发送一个指示信息,告诉终端设备在接收到第一接入网设备发送的切换命令之后不要断开与第一接入网设备之间的连接。
还应理解,第一接入网设备在触发终端设备使用新的协议栈时,第一接入网设备可以同时告知终端设备断开与第一接入网设备之间的连接,也就是释放旧的协议栈。例如,第一接入网设备可以单独给终端设备发送一个指示信息,该指示信息可以直接指示终端设备断开与第一接入网设备之间的连接。或者第一接入网设备也可以在向终端设备发送的最后一个数据包携带比特位来指示终端设备断开与第一接入网设备之间的连接。
可选地,在本申请实施例中,该待处理数据包包括第一数据包,该在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理数据包进行按序处理,包括:在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序之前,该第一接入网设备接收该终端设备发送的该第一数据包;该第一接入网设备使用该第一协议栈对该第一数据包或该第一数据包中的数据部分进行解密;该第一接入网设备使用该第一协议栈对经过解密后的该第一数据包进行按序处理。
下面将结合图5和图6详细描述一下单连接切换场景和多连接角色切换场景下的两个实施例。
图5为单连接下的切换场景。如图5所示,第一阶段(可以看成图3中步骤7之前),是由第一接入网设备为终端设备提供网络服务的,也就是说,是由第一接入网设备的PDCP层作为汇聚层来维护终端设备的数据包发送/接收顺序(LTE中的SN),同时第一接入网设备的PDCP也为终端设备维护统一的安全秘钥。对于上行数据来说,具体流程可以如下:终端设备向第一接入网设备发送PDCP PDU(终端设备首先要对该PDCP PDU的SDU进行排序,也就是添加SN,进而终端设备可以对排序之后的PDCP PDU或其中的SDU进行加密)。第一接入网设备的PDCP层从RLC层接收到该PDCP PDU之后,首先对该PDCP PDU进行解密,或者也可以对该PDCP PDU中的SDU进行解密,进一步地,第一接入网设备可以根据解密得到的SN对接收到的这些PDCP PDU或者SDU进行排序。
第二阶段(可以看成图3中步骤7至步骤11之间),也就是图3中所谓的执行切换过程,终端设备在此期间,终端设备并不会断开与第一接入网设备之间的连接,也就是说终端设备在与第二接入网设备进行同步的过程并不会离开源小区,此时终端设备如果有数据需要传输的话,终端设备可以依旧向第一接入网设备传输该数据。也就是说,第一接入网设备同样可以接收终端设备发送的PDCP PDU(终端设备首先要对该PDCP PDU的SDU进行排序,也就是添加SN,进而终端设备可以对排序之后的PDCP PDU或其中的SDU进行加密),第一接入网设备的PDCP层从RLC层接收到该PDCP PDU之后,首先对该PDCP PDU进行解密,或者也可以对该PDCP PDU中的SDU进行解密,进一步地,第一接入网设备可以根据解密得到的SN对接收到的这些PDCP PDU或者SDU进行排序。换句话说,在该阶段,数据还是在终端设备和第一接入网设备之间进行传输。
第三阶段(可以看出图3中步骤11之后的流程),也就是图3中的切换完成过程。在此期间,由于终端设备已经完成了与第二接入网设备之间的重配置,换句话说,终端设备已经可以与第二接入网设备进行通信了,那么终端设备自然可以直接向第二接入网设备发送PDCP PDU,同样地,第二接入网设备在接收到终端设备发送的PDCP PDU之后,可以使用其新建的PDCP层对该PDCP PDU或PDCP PDU中的SDU进行解密,从而可以根据获取到的SN对这些PDCP PDU或SDU向上层按序递交。
关于PDCP协议的功能以及如何使用PDCP协议的这些功能,这里就不作详细介绍,可以参见LTE协议。
图6为多连接下的角色切换场景。如图6所示,第一阶段(可以看成图3中步骤7之前),是由第一接入网设备和第二接入网设备共同为终端设备提供网络服务的,其中,第一接入网设备可以是主接入网设备,第二接入网设备可以是辅接入网设备,终端设备可以通过第一接入网设备和第二接入网设备向网络设备发送PDCP PDU,而网络设备侧则是由第一接入网设备的PDCP层作为汇聚层来维护终端设备的数据包发送/接收顺序(LTE中的SN),同时第一接入网设备的PDCP也为终端设备维护统一的秘钥。对于上行数据来说,具体流程可以如下:终端设备向第一接入网设备和第二接入网设备发送PDCP PDU(终端设备首先要对该PDCP PDU的SDU进行排序,也就是添加SN,进而终端设备可以对排序之后的PDCP PDU或其中的SDU进行加密, 终端设备进一步地可以将加密后的PDCP PDU分别通过第一接入网设备的RLC层以及第二接入网设备的RLC层发送到网络设备侧)。第一接入网设备的PDCP层从第一接入网设备的RLC层以及第二接入网设备的RLC层接收到该PDCP PDU之后,首先对该PDCP PDU进行解密,或者也可以对该PDCP PDU中的SDU进行解密,进一步地,第一接入网设备可以根据解密得到的SN对接收到的这些PDCP PDU或者SDU进行排序。
第二阶段(可以看成图3中步骤7至步骤11之间),也就是图3中所谓的执行切换过程,终端设备在此期间,终端设备并不会断开与第一接入网设备之间的连接,也就是说终端设备在与第二接入网设备进行同步的过程还是会使用第一接入网设备的PDCP来维护终端设备的数据发送/接收顺序以及这些数据的秘钥,此时终端设备如果有数据需要传输的话,终端设备可以依旧向第一接入网设备传输该数据和/或第二接入网设备传输该数据。但最终数据还是会由第一接入网设备的PDCP层对数据进行处理。换句话说,在此期间,网络设备还是通过旧的协议栈对数据进行处理。
应理解,在第一阶段和第二阶段传输的数据可以是通过双连接中的两条链路传输,也可以是采用其中的一条链路传输,但无论是一条链路传输还是两条链路传输最终数据都将汇聚到第一接入网设备中的PDCP层中,也就是双连接场景中的主接入网设备的PDCP层中。
第三阶段(可以看出图3中步骤11之后的流程),也就是图3中的切换完成过程。在此期间,由于终端设备已经完成了与第二接入网设备之间的重配置,换句话说,第二接入网设备已经完成了PDCP层的配置,那么终端设备也就可以直接跟第二接入网设备进行通信,也就是说网络设备侧可以利用第二接入网设备的PDCP层对终端设备发送的PDCP PDU或其SDU进行解密,进而第二接入网设备的PDCP层可以根据获取到的SN对这些PDCP PDU或SDU向上层按序递交。
可选地,在第三阶段中,即切换完成之后,第一接入网设备可以仅仅释放PDCP层的功能,也就是说在切换之后,可以将第一接入网设备作为第二接入网设备的一个辅接入网设备,终端设备可以通过两条链路向网络设备侧发送数据,但两条链路上的数据最终都汇聚到第二接入网设备新建立的PDCP层,由第二接入网设备建立的PDCP层对数据进行解密以及根据解密得到的SN按序递交到上层。
可选地,在第三阶段,在第三阶段中,即切换完成之后,第一接入网设备可以完成释放与终端设备之间的连接,终端设备可以只通过与第二接入网设备的这一条链路传输数据。并且由第二接入网设备建立的PDCP层对数据进行解密以及根据解密得到的SN按序递交到上层。
虽然全文是以双连接为例进行描述的,但本申请实施例应该不限于此,可以是多连接,也就是一个主接入网设备和多个辅接入网设备共同为终端设备提供网络服务。
上述是以上行数据为例描述了本申请实施例的技术方案在单连接切换场景和多连接角色切换场景的应用。下行数据同样适用。
可选地,在本申请实施例中,该待处理PDCP PDU包括第二PDCP PDU,该在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的PDCP PDU的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理PDCP PDU进行按序处理,包括:在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的PDCP PDU的顺序之前,该第一接入网设备接收核心网设备发送的该第二PDCP PDU;该第一接入网设备使用第一协议栈对该第二PDCP PDU进行按序处理;该方法还包括:该第一接入网设备使用该第一协议栈对经过按序处理的该第二PDCP PDU或该第二PDCP PDU中的SDU进行加密。
下行数据的传输可参考上行数据。为了简洁,在此不再赘述一遍。
可选地,在本申请实施例中,该待处理PDCP PDU包括第三PDCP PDU,该在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的PDCP PDU的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理PDCP PDU进行按序处理,包括:在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的PDCP PDU的顺序之前,该第一接入网设备接收该第二接入网设备发送的经过该第二接入网设备使用该第二协议栈对该第三PDCP PDU或该第三PDCP PDU中的SDU进行解密;该第一接入网设备对经过解密的该第三PDCP PDU进行按序处理。
可选地,在本申请实施例中,该待处理PDCP PDU包括第四PDCP PDU,该在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二 协议栈维护该终端设备的PDCP PDU的顺序之前,该第一接入网设备使用第一协议栈对该第一接入网设备和该终端设备的待处理PDCP PDU进行按序处理,包括:在该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的PDCP PDU的顺序之前,该第一接入网设备接收核心网设备发送的该第四PDCP PDU;该第一接入网设备使用该第一协议栈对该第四PDCP PDU进行按序处理;该方法还包括:该第一接入网设备向该第二接入网设备发送经过按序处理的该第四PDCP PDU,以使得该第二接入网设备使用该第二协议栈对经过按序处理的该第二PDCP PDU或该第二PDCP PDU中的SDU进行加密。
应理解,本文出现的PDCP PDU在有些地方指代数据包,在有些地方指代数据包中的数据部分,本领域技术人员应该有所区分。例如,对于上行数据,终端设备是对数据进行按序处理,生成数据包,然后再向网络设备发送,而并不是直接对数据包进行处理。再例如,对于下行数据,接入网设备从核心网设备处得到的是数据,接入网设备对接收到的下行数据进行按序处理,生成数据包,然后向终端设备发送。
下面将结合图7和图8详细描述一下单连接切换场景和多连接角色切换场景下的另外两个实施例。
图7为单连接下的切换场景。如图5所示,第一阶段(可以看成图3中步骤7之前),是由第一接入网设备为终端设备提供网络服务的,也就是说,是由第一接入网设备的PDCP层作为汇聚层来维护终端设备的数据包发送/接收顺序(LTE中的SN),同时第一接入网设备的PDCP也为终端设备维护统一的秘钥。对于上行数据来说,具体流程可以如下:终端设备向第一接入网设备发送PDCP PDU(终端设备首先要对该PDCP PDU的SDU进行排序,也就是添加SN,进而终端设备可以对排序之后的PDCP PDU或其中的SDU进行加密)。第一接入网设备的PDCP层从RLC层接收到该PDCP PDU之后,首先对该PDCP PDU进行解密,或者也可以对该PDCP PDU中的SDU进行解密,进一步地,第一接入网设备可以根据解密得到的SN对接收到的这些PDCP PDU或者SDU进行排序。
第二阶段(可以看成图3中步骤7至步骤11之间),也就是图3中所谓的执行切换过程,终端设备在此期间,终端设备并不会断开与第一接入网设备之间的连接,也就是说终端设备在与第二接入网设备进行同步的过程并不会 离开源小区,但网络设备的部分PDCP功能可以转移到第二协议栈,也就是可以由第二接入网设备建立的PDCP层来维护终端设备的秘钥。此时终端设备如果有数据需要传输的话,终端设备可以利用第二协议栈向第二接入网设备传输该数据。第二接入网设备对接收到的数据先进行解密,在解密完成之后将数据发到第一接入网设备处进行排序递交。也就是说,可以先利用第二接入网设备的PDCP层对接收到的PDCP PDU进行解密,但最终的排序递交还是得通过第一接入网设备的PDCP层进行。换句话说,在该阶段,可以利用新的协议栈对数据进行解密,还是利用旧的协议栈对数据进行排序处理。
第三阶段(可以看出图3中步骤11之后的流程),也就是图3中的切换完成过程。在此期间,由于终端设备已经完成了与第二接入网设备之间的重配置,换句话说,已经将维护终端设备的数据的排序递交功能从第一接入网设备转移到第二接入网设备,那么终端设备自然可以直接向第二接入网设备发送PDCP PDU,同样地,第二接入网设备在接收到终端设备发送的PDCP PDU之后,可以使用其新建的PDCP层对该PDCP PDU或PDCP PDU中的SDU进行解密,从而可以根据获取到的SN对这些PDCP PDU或SDU向上层按序递交。
图8为多连接下的角色切换场景。如图8所示,第一阶段(可以看成图3中步骤7之前),是由第一接入网设备和第二接入网设备共同为终端设备提供网络服务的,其中,第一接入网设备可以是主接入网设备,第二接入网设备可以是辅接入网设备,终端设备可以通过第一接入网设备和第二接入网设备向网络设备发送PDCP PDU,而网络设备侧则是由第一接入网设备的PDCP层作为汇聚层来维护终端设备的数据包发送/接收顺序(LTE中的SN),同时第一接入网设备的PDCP也为终端设备维护统一的秘钥。对于上行数据来说,具体流程可以如下:终端设备向第一接入网设备和第二接入网设备发送PDCP PDU(终端设备首先要对该PDCP PDU的SDU进行排序,也就是添加SN,进而终端设备可以对排序之后的PDCP PDU或其中的SDU进行加密,终端设备进一步地可以将加密后的PDCP PDU分别通过第一接入网设备的RLC层以及第二接入网设备的RLC层发送到网络设备侧)。第一接入网设备的PDCP层从第一接入网设备的RLC层以及第二接入网设备的RLC层接收到该PDCP PDU之后,首先对该PDCP PDU进行解密,或者也可以对该PDCP PDU中的SDU进行解密,进一步地,第一接入网设备可以根据解密得到的 SN对接收到的这些PDCP PDU或者SDU进行排序。
第二阶段(可以看成图3中步骤7至步骤11之间),也就是图3中所谓的执行切换过程,终端设备在此期间,终端设备并不会断开与第一接入网设备之间的连接,也就是说终端设备在与第二接入网设备进行同步的过程还是会使用第一接入网设备的PDCP来维护终端设备的数据发送/接收顺序但是使用的是新建立的PDCP协议来维护这些数据的秘钥,此时终端设备如果有数据需要传输的话,终端设备可以依旧向第一接入网设备传输该数据和/或第二接入网设备传输该数据。但最终数据会使用第二接入网设备建立的PDCP层对数据进行解压缩,还是会由第一接入网设备的PDCP层对数据进行排序处理。换句话说,在此期间,网络设备还是通过旧的协议栈和新的协议栈共同对数据进行处理。
应理解,在第一阶段和第二阶段传输的数据可以是通过双连接中的两条链路传输,也可以是采用其中的一条链路传输,但无论是一条链路传输还是两条链路传输最终数据都将汇聚到第一接入网设备中的PDCP层中,也就是双连接场景中的主接入网设备的PDCP层中。
第三阶段(可以看出图3中步骤11之后的流程),也就是图3中的切换完成过程。在此期间,由于终端设备已经完成了与第二接入网设备之间的重配置,换句话说,第二接入网设备已经完成了PDCP层的配置,那么终端设备也就可以直接跟第二接入网设备进行通信,也就是说网络设备侧可以利用第二接入网设备的PDCP层对终端设备发送的PDCP PDU或其SDU进行解密,进而第二接入网设备的PDCP层可以根据获取到的SN对这些PDCP PDU或SDU向上层按序递交。
下行数据的传输可参考上行数据。为了简洁,在此不再赘述一遍。
应理解,上述图5至图8的各个实施例在第二阶段用于维护终端设备的PDCP PDU的顺序的PDCP可以是第一接入网设备内的PDCP实体,也可以是PDCP实体外的一个统一的汇聚层,该统一的汇聚层可以分别与第一接入网设备的PDCP实体以及第二接入网设备的PDCP实体相连,也就是说在第二阶段可以不利用第一接入网设备的PDCP实体,而利用其外部的一个汇聚层。本申请实施例并不限于此。
还应理解,上述第二阶段的数据传输也可以将数据分成两部分,一部分采用新的协议栈进行解密,另一部分采用旧的协议栈进行解密,也可以单独 使用新的协议栈进行解密或使用旧的协议栈进行解密,本申请实施例对此不构成限定。
可选地,在本申请实施例中,该方法还包括:在该第一接入网设备确定该第一接入网设备无该终端设备的数据或数据包需要处理的情况下,该第一接入网设备触发该终端设备和/或该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序。
具体地,在图3所示的流程中,在核心网设备进行完下行路径的切换之后,会向第一接入网设备发送一个结束标识,可以告知第一接入网设备后续不会有数据向第一接入网设备发送了,那么第一接入网设备就可以分别向终端设备和/或第二接入网设备转达这一情况,同时也即告诉终端设备和/或第二接入网设备接下来二者之间可以直接进行通信了,不再需要第一接入网设备进行传输了。例如,该结束标识可以是上述步骤16中的“end Marker”,也可以是其他指示信息。
也就是说,终端设备在接收到第一接入网设备发送的指示信息,终端设备可以判断出来与第一接入网设备之间没有数据可以传输了,终端设备可以直接使用新的协议栈进行后续数据的传输。终端设备也可以根据该指示信息,将旧的协议栈进行释放。
可选地,在本申请实施例中,第一接入网设备向终端设备发送的指示信息可以为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息(Download Control Information,DCI)、数据包中的比特位中的任何一种。
可选地,在本申请实施例中,该方法还包括:该第一接入网设备接收该第二接入网设备发送的第三指示信息,该第三指示信息用于指示该终端设备完成该第二协议栈的配置;该第一接入网设备根据该第三指示信息,向核心网设备发送路由切换信息,该路由切换信息用于指示该核心网设备将负责维护该终端设备的数据包的顺序的接入网设备从该第一接入网设备切换为该第二接入网设备。
也就是说,第二接入网设备在确定终端设备配置完成之后,第二接入网设备可以触发第一接入网设备向核心网设备发送路由切换信息,即切换下行路径。例如,第二接入网设备在接收到图3中的重配置完成消息中,第二接入网设备向第一接入网设备发送一个指示信息,也就是说可以告知第一接入网设备终端设备已完成新的协议栈的配置,那么第一接入网设备就可以通知 核心网设备进行下行路由切换。第二接入网设备在接收到图3中的重配置完成消息之后,第二接入网设备可以直接通知核心网设备进行下行路由切换。
可选地,在本申请实施例中,该第一接入网设备为源接入网设备,该第二接入网设备为目标接入网设备;或该第一接入网设备为多连接场景中的主接入网设备,该第二接入网设备为该多连接场景中的辅接入网设备。
图9示出了本申请实施例的切换方法400的示意性框图。如图9所示,该方法400包括:
S410,第二接入网设备接收第一接入网设备发送的第一触发信息,该第一触发信息用于触发该第二接入网设备配置第二协议栈,该第二协议栈用于维护该第二接入网设备与终端设备的数据包的顺序和/或该第二接入网设备与该终端设备的数据包的安全秘钥。
S420,该第二接入网设备接收该第一接入网设备发送的第二触发信息,该第二触发信息用于触发该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序。
因此,本申请实施例的切换方法,通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
可选地,在本申请实施例中,该方法还包括:在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,该第二接入网设备向该第一接入网设备发送的经过按序处理和加密的第一数据包;该第二接入网设备向该终端设备转发经过按序处理和加密的该第一数据包。。
可选地,在本申请实施例中,该方法还包括:在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,该第二接入网设备接收该第一接入网设备发送的经过按序处理的第二数据包;该第二接入网设备使用该第二协议栈对该第二数据包或该第二数据包中的数据部分进行加密;该第二接入网设备向该终端设备发送经过加密的该第二数据包。
可选地,在本申请实施例中,该方法还包括:在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,该第二接入网设备接收该终端设备发送的第三数据包;该第二接入网设备向该第一接入网设备转发该第三数据包,以便于该第一接入网设备对该第三数据包或该第三数据包中的数 据部分进行解密和按序处理。
可选地,在本申请实施例中,该方法还包括:在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,该第二接入网设备接收该终端设备发送的第四数据包;该第二接入网设备使用该第二协议栈对该第四数据包或该第四数据包中的数据部分进行解密;该第二接入网设备向该第一接入网设备发送经过解密的该第四数据包,以便于该第一接入网设备对经过解密的该第四数据包进行按序处理。
可选地,在本申请实施例中,该方法还包括:该第二接入网设备接收终端设备发送的第一指示信息,该第一指示信息用于指示该该终端设备完成该第二协议栈的配置;该第二接入网设备根据该第一指示信息,向核心网设备发送路由切换信息,或该第二接入网设备根据该第一指示信息,触发该第一接入网设备向核心网设备发送路由切换信息,该路由切换信息用于指示该核心网设备将为该终端设备提供维护数据包顺序的接入网设备从该第一接入网设备切换为该第二接入网设备。
可选地,在本申请实施例中,该方法还包括:在该第二接入网设备向该核心网设备发送该路由切换信息之后,该第二接入网设备接收该第一接入网设备发送的第二指示信息,该第二指示信息用于指示该第一接入网设备为该终端设备的数据或数据包需要处理。
可选地,在本申请实施例中,该第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
可选地,在本申请实施例中,该第一接入网设备为源接入网设备,该第二接入网设备为目标接入网设备;或该第一接入网设备为多连接场景中的主接入网设备,该第二接入网设备为该多连接场景中的辅接入网设备。
应理解,第二接入网设备描述的第二接入网设备与第一接入网设备以及终端设备之间的交互及相关特性、功能等与第一接入网设备的相关特性、功能相应。并且相关内容在上述方法300中已经作了详尽描述,为了简洁,在此不再赘述。
图10示出了本申请实施例的切换方法500的示意性框图。如图10所示,该方法500包括:
S510,终端设备根据第一接入网设备发送的第一触发信息,配置第二协 议栈,该第二协议栈用于维护该第二接入网设备和该终端设备的数据包的顺序和/或该第二接入网设备和该终端设备的数据包安全安全秘钥;
S520,在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,该终端设备使用第一协议栈对该终端设备的待处理数据包或数据进行按序处理,该第二触发信息用于触发该终端设备使用该第二协议栈维护该终端设备的数据包顺序。
因此,本申请实施例的切换方法,通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
可选地,在本申请实施例中,该待处理数据包括第一数据,该在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,该终端设备使用该终端设备第一协议栈对该终端设备的待处理数据包或数据进行按序处理,包括:该终端设备使用该第一协议栈对该第一数据进行按序处理;该方法还包括:该终端设备使用该第一协议栈对经过按序处理的该第一数据或包括该第一数据的数据包进行加密;该终端设备向该第一接入网设备和/或第二接入网设备发送经过加密的包括该第一数据的数据包。
可选地,在本申请实施例中,该待处理数据包包括第一数据包,该在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,该终端设备使用该终端设备第一协议栈对该终端设备的待处理数据包或数据进行按序处理,包括:在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,该终端设备接收该第一接入网设备和/或第二接入网设备发送的第一数据包;该终端设备使用该第一协议栈对该第一数据包或该第一数据包中的数据部分进行解密;该终端设备使用该第一协议栈对经过解密的该第一数据包进行按序处理。
可选地,在本申请实施例中,该待处理数据包括第二数据,该在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,该终端设备使用该终端设备第一协议栈对该终端设备的待处理数据包或数据进行按序处理,包括:该终端设备使用该第一协议栈对该第二数据进行按序处理;该方法还包括:该终端设备使用该第二协议栈对经过按序处理后的该第二数据或包括该第二数据的数据包进行加密;该终端设备向该第二 网络设备发送经过加密的包括该第二数据的数据包。
可选地,在本申请实施例中,该待处理数据包包括第二数据包,该在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,该终端设备使用该终端设备第一协议栈对该终端设备的待处理数据包或数据进行按序处理,包括:该终端设备接收该第二网络设备发送的该第二数据包;该终端设备使用该第二协议栈对该第二数据包或该第二数据包数据部分进行解密;该终端设备使用该第一协议栈对经过解密的该第二数据包进行按序处理。
可选地,在本申请实施例中,该方法还包括:该终端设备接收该第一接入网设备和/或该第二接入网设备发送的该第二触发信息;该终端设备根据该第二触发信息,使用该第二协议栈维护该终端设备的数据包的顺序。
可选地,在本申请实施例中,该第二触发信息还用于指示该终端设备释放该第一协议栈,该方法还包括:该终端设备根据该第二触发信息,释放该第一协议栈。
可选地,在本申请实施例中,该第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
可选地,在本申请实施例中,该第一接入网设备为源接入网设备,该第二接入网设备为目标接入网设备;或该第一接入网设备为多连接场景中的主接入网设备,该第二接入网设备为该多连接场景中的辅接入网设备。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,终端设备描述的终端设备与网络设备之间的交互及相关特性、功能等与网络设备的相关特性、功能相应。并且相关内容在上述方法300中已经作了详尽描述,为了简洁,在此不再赘述。
上文中详细描述了根据本申请实施例的切换方法,下面将结合图11至图16,描述根据本申请实施例的装置,方法实施例所描述的技术特征适用于以下装置实施例。
图11示出了本申请实施例的接入网设备600的示意性框图。该接入网设备600为第一接入网设备,如图11所示,该接入网设备600包括:
第一触发单元610,用于触发终端设备和/或第二接入网设备配置第二协议栈,所述第二协议栈用于维护所述第二接入网设备与所述终端设备的分组数据汇聚协议PDCP协议数据单元PDU的顺序和/或所述第二接入网设备和所述终端设备的数据包的安全秘钥。
按序处理单元620,用于在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,使用第一协议栈对所述第一接入网设备和所述终端设备的待处理数据包进行按序处理。
因此,本申请实施例的接入网设备,通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
可选地,在本申请实施例中,所述待处理数据包包括第一数据包,所述按序处理单元620具体用于:在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,接收所述终端设备发送的所述第一数据包;使用所述第一协议栈对所述第一数据包或所述第一数据包中的数据部分进行解密;使用所述第一协议栈对经过解密后的所述第一数据包进行按序处理。
可选地,在本申请实施例中,所述待处理数据包包括第二数据包,所述按序处理单元具体用于:在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,接收核心网设备发送的所述第二数据包;使用第一协议栈对所述第二数据包进行按序处理;所述接入网设备还包括:第一加密单元,用于使用所述第一协议栈对经过按序处理的所述第二数据包或所述第二数据包中的数据部分进行加密。
可选地,在本申请实施例中,所述待处理数据包包括第三数据包,所述按序处理单元具体用于:在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,接收所述第二接入网设备发送的经过所述第二接入网设备使用所述第二 协议栈对所述第三数据包或所述第三数据包中的数据部分进行解密;对经过解密的所述第三数据包进行按序处理。
可选地,在本申请实施例中,所述待处理数据包包括第四数据包,所述按序处理单元具体用于:在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,接收核心网设备发送的所述第四数据包;使用所述第一协议栈对所述第四数据包进行按序处理;所述接入网设备还包括:第二加密单元,用于向所述第二接入网设备发送经过按序处理的所述第四数据包,以使得所述第二接入网设备使用所述第二协议栈对经过按序处理的所述第二数据包或所述第二数据包中的数据部分进行加密。
可选地,在本申请实施例中,所述接入网设备还包括:第二触发单元,用于在所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据包需要处理的情况下,触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
可选地,在本申请实施例中,所述第二触发单元具体用于:在所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据包需要处理的情况下,向所述终端设备发送第一指示信息,所述第一指示信息用于指示所述终端设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
可选地,在本申请实施例中,所述第一指示信息还用于指示所述终端设备释放所述第一协议栈。
可选地,在本申请实施例中,所述第一指示信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
可选地,在本申请实施例中,所述第二触发单元具体同于:在所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据包需要处理的情况下,所述第一接入网设备向所述第二接入网设备发送第二指示信息,所述第二指示信息用于指示所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
可选地,在本申请实施例中,所述接入网设备还包括:确定单元,用于确定所述第一接入网设备无所述终端设备的数据包需要处理。
可选地,在本申请实施例中,所述确定单元具体用于:接收核心网设备 发送的第三指示信息,所述第三指示信息用于指示所述第一接入网设备无所述终端设备的数据包需要处理;根据所述第三指示信息,确定所述第一接入网设备无所述终端设备的数据包需要处理。
可选地,在本申请实施例中,所述接入网设备还包括:接收单元,用于接收所述第二接入网设备发送的第四指示信息,所述第四指示信息用于指示所述终端设备完成所述第二协议栈的配置;发送单元,用于根据所述第四指示信息,向核心网设备发送路由切换信息,所述路由切换信息用于指示所述核心网设备将负责维护所述终端设备的数据包的顺序的接入网设备从所述第一接入网设备切换为所述第二接入网设备。
可选地,在本申请实施例中,所述第一触发单元具体用于:向所述第二接入网设备发送第一触发信息,所述第一触发信息用于请求所述第二接入网设备配置所述第二协议栈;接收所述第二接入网设备发送的所述第一触发信息的响应信息;根据所述响应信息,向所述终端设备发送第二触发信息,所述第二触发信息用于指示所述终端设备配置所述第二协议栈。
可选地,在本申请实施例中,所述第一接入网设备为源接入网设备,所述第二接入网设备为目标接入网设备;或所述第一接入网设备为多连接场景中的主接入网设备,所述第二接入网设备为所述多连接场景中的辅接入网设备。
应理解,根据本申请实施例的接入网设备600可对应于本申请方法实施例中的第一接入网设备,并且接入网设备600中的各个单元的上述和其它操作和/或功能分别为了实现图4和图8方法中网络设备的相应流程,为了简洁,在此不再赘述。
图12示出了本申请实施例的接入网设备700的示意性框图。该接入网设备700为第二接入网设备,如图12所示,该接入网设备700包括:
第一接收单元710,用于接收第一接入网设备发送的第一触发信息,该第一触发信息用于触发该第二接入网设备配置第二协议栈,该第二协议栈用于维护该第二接入网设备与终端设备的数据包的顺序和/或该第二接入网设备与该终端设备的数据包的安全秘钥。
第二接收单元720,用于接收该第一接入网设备发送的第二触发信息,该第二触发信息用于触发该第二接入网设备使用该第二协议栈维护该终端设备的数据包的顺序。
因此,本申请实施例的接入网设备,通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
可选地,在本申请实施例中,该接入网设备还包括:第三接收单元,用于在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,接收该第一接入网设备发送的经过按序处理和加密的第一数据包;该;第一发送单元,用于向该终端设备转发经过按序处理和加密的该第一数据包。
可选地,在本申请实施例中,该接入网设备还包括:第四接收单元,用于在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,接收该第一接入网设备发送的经过按序处理的第二数据包;第一加密单元,用于使用该第二协议栈对该第二数据包或该第二数据包中的数据部分进行加密;第二发送单元,用于向该终端设备发送经过加密的该第二数据包。
可选地,在本申请实施例中,该接入网设备还包括:第五接收单元,用于在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,接收该终端设备发送的第三数据包;第三发送单元,用于向该第一接入网设备转发该第三数据包,以便于该第一接入网设备对该第三数据包或该第三数据包中的数据部分进行解密和按序处理。
可选地,在本申请实施例中,该接入网设备还包括:第六接收单元,用于在该第二接入网设备接收该第一接入网设备发送的该第二触发信息之前,接收该终端设备发送的第四数据包;第一解密单元,用于使用该第二协议栈对该第四数据包或该第四数据包中的数据部分进行解密;第四发送单元,用于向该第一接入网设备发送经过解密的该第四数据包,以便于该第一接入网设备对经过解密的该第四数据包进行按序处理。
可选地,在本申请实施例中,该接入网设备还包括:第七接收单元,用于接收终端设备发送的第一指示信息,该第一指示信息用于指示该该终端设备已完成该第二协议栈的配置;第五发送单元,用于根据该第一指示信息,向核心网设备发送路由切换信息,或根据该第一指示信息,触发该第一接入网设备向核心网设备发送路由切换信息,该路由切换信息用于指示该核心网设备将负责维护该终端设备的数据包的顺序的接入网设备从该第一接入网设备切换为该第二接入网设备该该该。
可选地,在本申请实施例中,该接入网设备还包括:第八接收单元,用于在该第七发送单元向该核心网设备发送该路由切换信息之后,该第二接入网设备接收该第一接入网设备发送的第二指示信息,该第二指示信息用于指示该第一接入网设备无该终端设备的数据或数据包需要处理。
可选地,在本申请实施例中,该第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
可选地,在本申请实施例中,该第一接入网设备为源接入网设备,该第二接入网设备为目标接入网设备;或该第一接入网设备为多连接场景中的主接入网设备,该第二接入网设备为该多连接场景中的辅接入网设备。
应理解,根据本申请实施例的接入网设备700可对应于本申请方法实施例中的第二接入网设备,并且接入网设备700中的各个单元的上述和其它操作和/或功能分别为了实现图5和图9方法中网络设备的相应流程,为了简洁,在此不再赘述。
图13示出了本申请实施例的终端设备800的示意性框图。如图13所示,该终端设备800包括:
配置单元810,用于根据第一接入网设备发送的第一触发信息,配置第二协议栈,该第二协议栈用于维护该第二接入网设备和该终端设备的数据包的顺序和/或该第二接入网设备和该终端设备的数据包的安全秘钥;
第一按序处理单元820,用于在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,使用第一协议栈对该终端设备的待处理数据包或数据进行按序处理,该第二触发信息用于触发该终端设备使用该第二协议栈维护该终端设备的数据包的顺序。
因此,本申请实施例的终端设备,通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
可选地,在本申请实施例中,该待处理数据包包括第一数据,该第一按序处理单元具体用于:使用该第一协议栈对该第一数据进行按序处理;该终端设备还包括:第一加密单元,用于使用该第一协议栈对经过按序处理的该第一数据包或包括该第一数据的数据包进行加密;第一发送单元,用于向该 第一接入网设备发送经过加密的包括该第一数据的数据包。
可选地,在本申请实施例中,该待处理数据包包括第一数据包,该第一按序处理单元具体用于:在该终端设备接收到该第一接入网设备和/或该第二接入网设备发送的第二触发信息之前,接收该第一接入网设备发送的该第一数据包;使用该第一协议栈对该第一数据包或该第一数据包中的数据部分进行解密;使用该第一协议栈对经过解密的该第一数据包进行按序处理。
可选地,在本申请实施例中,该待处理数据包括第二数据,该第一按序处理单元具体用于:使用该第一协议栈对该第二数据进行按序处理;该终端设备还包括:第二加密单元,用于使用该第二协议栈对经过按序处理后的该第二数据或包括该第二数据的数据包进行加密;第二发送单元,用于向该第二网络设备发送经过加密的包括该第二数据的数据包。
可选地,在本申请实施例中,该待处理数据包包括第二数据包,该第一按序处理单元用于:接收该第二网络设备发送的该第二数据包;使用该第二协议栈对该第二数据包或该第二数据包中的数据部分进行解密;使用该第一协议栈对经过解密的该第二数据包进行按序处理。
可选地,在本申请实施例中,该终端设备还包括:第一接收单元,用于接收该第一接入网设备和/或该第二接入网设备发送的该第二触发信息;第二按序处理单元,根据该第二触发信息,使用该第二协议栈维护该终端设备的数据包的顺序。
可选地,在本申请实施例中,该第二触发信息还用于指示该终端设备释放该第一协议栈,该终端设备还包括:释放单元,用于根据该第二触发信息,释放该第一协议栈。
可选地,在本申请实施例中,该第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
可选地,在本申请实施例中,所述第一接入网设备为源接入网设备,所述第二接入网设备为目标接入网设备;或所述第一接入网设备为多连接场景中的主接入网设备,所述第二接入网设备为所述多连接场景中的辅接入网设备。
应理解,根据本申请实施例的终端设备800可对应于本申请方法实施例中的终端设备,并且终端设备800中的各个单元的上述和其它操作和/或功 能分别为了实现图5至图8以及图10方法中终端设备的相应流程,为了简洁,在此不再赘述。
如图14所示,本申请实施例还提供了一种接入网设备900,该接入网设备900可以是图11中的接入网设备600,其能够用于执行与图4至图8方法300对应的第一接入网设备的内容。该接入网设备900包括:输入接口910、输出接口920、处理器930以及存储器940,该输入接口910、输出接口920、处理器930和存储器940可以通过总线系统相连。该存储器940用于存储包括程序、指令或代码。该处理器930,用于执行该存储器940中的程序、指令或代码,以控制输入接口910接收信号、控制输出接口920发送信号以及完成前述方法实施例中的操作。
因此,本申请实施例的接入网设备,通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
应理解,在本申请实施例中,该处理器930可以是中央处理单元(Central Processing Unit,CPU),该处理器930还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
该存储器940可以包括只读存储器和随机存取存储器,并向处理器930提供指令和数据。存储器940的一部分还可以包括非易失性随机存取存储器。例如,存储器940还可以存储设备类型的信息。
在实现过程中,上述方法的各内容可以通过处理器930中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的内容可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器940,处理器930读取存储器940中的信息,结合其硬件完成上述方法的内容。为避免重复,这里不再详细描述。
一个具体的实施方式中,接入网设备600的发送单元可以由图14中的输出接口920实现,接入网设备600的接收单元可以由图14中的输入接口910实现。接入网设备600的第一触发单元、第二触发单元、按序处理单元、确定单元、第一加密单元和第二解密单元可以由图14中的处理器930实现。
如图15所示,本申请实施例还提供了一种接入网设备1000,该接入网设备1000可以是图12中的接入网设备700,其能够用于执行与图5至图9方法400对应的第二接入网设备的内容。该接入网设备1000包括:输入接口1010、输出接口1020、处理器1030以及存储器1040,该输入接口1010、输出接口1020、处理器1030和存储器1040可以通过总线系统相连。该存储器1040用于存储包括程序、指令或代码。该处理器1030,用于执行该存储器1040中的程序、指令或代码,以控制输入接口1010接收信号、控制输出接口1020发送信号以及完成前述方法实施例中的操作。
因此,本申请实施例的接入网设备,通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
应理解,在本申请实施例中,该处理器1030可以是中央处理单元(Central Processing Unit,CPU),该处理器1030还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
该存储器1040可以包括只读存储器和随机存取存储器,并向处理器1030提供指令和数据。存储器1040的一部分还可以包括非易失性随机存取存储器。例如,存储器1040还可以存储设备类型的信息。
在实现过程中,上述方法的各内容可以通过处理器1030中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的内容可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质 中。该存储介质位于存储器1040,处理器1030读取存储器1040中的信息,结合其硬件完成上述方法的内容。为避免重复,这里不再详细描述。
一个具体的实施方式中,接入网设备700的第一发送单元至第六发送单元可以由图15中的输出接口1020实现,接入网设备700的第一接收单元至第六接收单元可以由图15中的输入接口1010实现。接入网设备700的第一加密单元和第一解密单元可以由图15中的处理器1030实现。
如图16所示,本申请实施例还提供了一种终端设备2000,该终端设备2000可以是图13中的终端设备800,其能够用于执行与图5至图8以及图10中方法500对应的终端设备的内容。该终端设备2000包括:输入接口2010、输出接口2020、处理器2030以及存储器2040,该输入接口2010、输出接口2020、处理器2030和存储器2040可以通过总线系统相连。该存储器2040用于存储包括程序、指令或代码。该处理器2030,用于执行该存储器2040中的程序、指令或代码,以控制输入接口2010接收信号、控制输出接口2020发送信号以及完成前述方法实施例中的操作。
因此,本申请实施例的终端设备,通过在第一接入网设备触发终端设备和/或第二接入网设备完全使用新的协议栈之前继续使用旧的协议栈维护数据包的顺序,使得终端设备的数据能够得以及时处理,从而降低终端设备切换过程中数据传输的时延。
应理解,在本申请实施例中,该处理器2030可以是中央处理单元(Central Processing Unit,CPU),该处理器2030还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
该存储器2040可以包括只读存储器和随机存取存储器,并向处理器2030提供指令和数据。存储器2040的一部分还可以包括非易失性随机存取存储器。例如,存储器2040还可以存储设备类型的信息。
在实现过程中,上述方法的各内容可以通过处理器2030中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的内容可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块 组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器2040,处理器2030读取存储器2040中的信息,结合其硬件完成上述方法的内容。为避免重复,这里不再详细描述。
一个具体的实施方式中,终端设备800中的第一发送单元和第二发送单元可以由图16中的输出接口2020实现,终端设备800中的第一接收单元可以由图16中的输入接口2010实现。终端设备800中的配置单元、第一按序处理单元、第一加密单元、第一解密单元以及第二按序处理单元可以由图16中的处理器2030实现。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,该单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
该作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
该功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应该以权利要求的保护范围为准。

Claims (66)

  1. 一种切换方法,其特征在于,包括:
    第一接入网设备触发终端设备和/或第二接入网设备配置第二协议栈,所述第二协议栈用于维护所述第二接入网设备与所述终端设备的数据包的顺序和/或所述第二接入网设备和所述终端设备的数据包的安全秘钥;
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备使用第一协议栈对所述终端设备的待处理数据包进行按序处理。
  2. 根据权利要求1所述的方法,其特征在于,所述待处理数据包包括第一数据包,所述在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备使用第一协议栈对所述终端设备的待处理数据包进行按序处理,包括:
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备接收所述终端设备发送的所述第一数据包;
    所述第一接入网设备使用所述第一协议栈对所述第一数据包或所述第一数据包中的数据部分进行解密;
    所述第一接入网设备使用所述第一协议栈对经过解密后的所述第一数据包进行按序处理。
  3. 根据权利要求1所述的方法,其特征在于,所述待处理数据包包括第二数据包,所述在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备使用第一协议栈对所述终端设备的待处理数据包进行按序处理,包括:
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备接收核心网设备发送的所述第二数据包中的数据部分;
    所述第一接入网设备使用第一协议栈对所述第二数据包进行按序处理;
    所述方法还包括:
    所述第一接入网设备使用所述第一协议栈对经过按序处理的所述第二 数据包或所述第二数据包中的数据部分进行加密。
  4. 根据权利要求1或2所述的方法,其特征在于,所述待处理数据包包括第三数据包,所述在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备使用第一协议栈对所述终端设备的待处理数据包进行按序处理,包括:
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备接收所述第二接入网设备发送的经过所述第二接入网设备使用所述第二协议栈解密后的所述第三数据包;
    所述第一接入网设备对经过解密的所述第三数据包进行按序处理。
  5. 根据权利要求1或3所述的方法,其特征在于,所述待处理数据包包括第四数据包,所述在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备使用第一协议栈对所述第一接入网设备和所述终端设备的待处理数据包进行按序处理,包括:
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,所述第一接入网设备接收核心网设备发送的所述第四数据包中的数据部分;
    所述第一接入网设备使用所述第一协议栈对所述第四数据包进行按序处理;
    所述方法还包括:
    所述第一接入网设备向所述第二接入网设备发送经过按序处理的所述第四数据包,以使得所述第二接入网设备使用所述第二协议栈对经过按序处理的所述第四数据包或所述第四数据包中的数据部分进行加密。
  6. 根据权利要求1至5中任一项所述的方法,其特征在于,所述方法还包括:
    在所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据或数据包需要处理的情况下,所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
  7. 根据权利要求6所述的方法,其特征在于,所述在所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据或数据包需要处理的情况下,所述第一接入网设备触发所述终端设备使用所述第二协议栈维护所述终端设备的数据包的顺序,包括:
    在所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据或数据包需要处理的情况下,所述第一接入网设备向所述终端设备和/或所述第二接入网设备发送第一指示信息,所述第一指示信息用于指示所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
  8. 根据权利要求6或7所述的方法,其特征在于,所述方法还包括:
    所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据或数据包需要处理。
  9. 根据权利要求8所述的方法,其特征在于,所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据或数据包需要处理,包括:
    所述第一接入网设备接收核心网设备发送的第二指示信息,所述第二指示信息用于指示所述第一接入网设备无所述终端设备的数据或数据包需要处理;
    所述第一接入网设备根据所述第二指示信息,确定所述第一接入网设备无所述终端设备的数据或数据包需要处理。
  10. 根据权利要求9所述的方法,其特征在于,所述第一接入网设备接收核心网设备发送的第二指示信息,包括:
    在所述第一接入网设备向核心网设备发送路由切换信息之后,所述第一接入网设备接收所述核心网设备发送的所述第二指示信息,所述路由切换信息用于指示所述核心网设备将负责维护所述终端设备的数据包的顺序的接入网设备从所述第一接入网设备切换为所述第二接入网设备。
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:
    所述第一接入网设备接收所述第二接入网设备发送的第三指示信息,所述第三指示信息用于指示所述终端设备完成所述第二协议栈的配置;
    所述第一接入网设备根据所述第三指示信息,向核心网设备发送所述路由切换信息。
  12. 根据权利要求7至11中任一项所述的方法,其特征在于,所述第 一指示信息还用于指示所述终端设备释放所述第一协议栈。
  13. 根据权利要求7至12中任一项所述的方法,其特征在于,所述第一指示信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
  14. 根据权利要求1至13中任一项所述的方法,其特征在于,所述第一接入网设备触发终端设备和第二接入网设备配置第二协议栈,包括:
    所述第一接入网设备向所述第二接入网设备发送第一触发信息,所述第一触发信息用于请求所述第二接入网设备配置所述第二协议栈;
    所述第一接入网设备接收所述第二接入网设备发送的所述第一触发信息的响应信息;
    所述第一接入网设备根据所述响应信息,向所述终端设备发送第二触发信息,所述第二触发信息用于指示所述终端设备配置所述第二协议栈。
  15. 根据权利要求1至14中任一项所述的方法,其特征在于,所述第一接入网设备为源接入网设备,所述第二接入网设备为目标接入网设备;或所述第一接入网设备为多连接场景中的主接入网设备,所述第二接入网设备为所述多连接场景中的辅接入网设备。
  16. 一种切换方法,其特征在于,包括:
    第二接入网设备接收第一接入网设备发送的第一触发信息,所述第一触发信息用于触发所述第二接入网设备配置第二协议栈,所述第二协议栈用于维护所述第二接入网设备与终端设备的数据包的顺序和/或所述第二接入网设备与所述终端设备的数据包的安全秘钥;
    所述第二接入网设备接收所述第一接入网设备发送的第二触发信息,所述第二触发信息用于触发所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
  17. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    在所述第二接入网设备接收所述第一接入网设备发送的所述第二触发信息之前,所述第二接入网设备接收所述第一接入网设备发送的经过按序处理和加密的第一数据包;
    所述第二接入网设备向所述终端设备转发经过按序处理和加密的所述第一数据包。
  18. 根据权利要求16或17所述的方法,其特征在于,所述方法还包括:
    在所述第二接入网设备接收所述第一接入网设备发送的所述第二触发信息之前,所述第二接入网设备接收所述第一接入网设备发送的经过按序处理的第二数据包;
    所述第二接入网设备使用所述第二协议栈对所述第二数据包或所述第二数据包中的数据部分进行加密;
    所述第二接入网设备向所述终端设备发送经过加密的所述第二数据包。
  19. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    在所述第二接入网设备接收所述第一接入网设备发送的所述第二触发信息之前,所述第二接入网设备接收所述终端设备发送的第三数据包;
    所述第二接入网设备向所述第一接入网设备转发所述第三数据包,以便于所述第一接入网设备对所述第三数据包或所述第三数据包中的数据部分进行解密和按序处理。
  20. 根据权利要求16或19所述的方法,其特征在于,所述方法还包括:
    在所述第二接入网设备接收所述第一接入网设备发送的所述第二触发信息之前,所述第二接入网设备接收所述终端设备发送的第四数据包;
    所述第二接入网设备使用所述第二协议栈对所述第四数据包或所述第四数据包中的数据部分进行解密;
    所述第二接入网设备向所述第一接入网设备发送经过解密的所述第四数据包,以便于所述第一接入网设备对经过解密的所述第四数据包进行按序处理。
  21. 根据权利要求16至20所述的方法,其特征在于,所述方法还包括:
    所述第二接入网设备接收终端设备发送的第一指示信息,所述第一指示信息用于指示所述终端设备已完成所述第二协议栈的配置;
    所述第二接入网设备根据所述第一指示信息,向核心网设备发送路由切换信息,或
    所述第二接入网设备根据所述第一指示信息,触发所述第一接入网设备向核心网设备发送路由切换信息,所述路由切换信息用于指示所述核心网设备将负责维护所述终端设备的数据包的顺序的接入网设备从所述第一接入网设备切换为所述第二接入网设备。
  22. 根据权利要求21所述的方法,其特征在于,所述方法还包括:
    在所述第二接入网设备向所述核心网设备发送所述路由切换信息之后, 所述第二接入网设备接收所述第一接入网设备发送的第二指示信息,所述第二指示信息用于指示所述第一接入网设备无所述终端设备的数据或数据包需要处理。
  23. 根据权利要求16至22中任一项所述的方法,其特征在于,所述第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
  24. 根据权利要求16至23中任一项所述的方法,其特征在于,所述第一接入网设备为源接入网设备,所述第二接入网设备为目标接入网设备;或所述第一接入网设备为多连接场景中的主接入网设备,所述第二接入网设备为所述多连接场景中的辅接入网设备。
  25. 一种切换方法,其特征在于,包括:
    终端设备根据第一接入网设备发送的第一触发信息,配置第二协议栈,所述第二协议栈用于维护所述第二接入网设备和所述终端设备的数据包的顺序和/或所述第二接入网设备和所述终端设备的数据包的安全秘钥;
    在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,所述第二触发信息用于触发所述终端设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
  26. 根据权利要求25所述的方法,其特征在于,所述待处理数据包括第一数据,所述在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,包括:
    所述终端设备使用所述第一协议栈对所述第一数据进行按序处理;
    所述方法还包括:
    所述终端设备使用所述第一协议栈对经过按序处理的所述第一数据或包括所述第一数据的数据包进行加密;
    所述终端设备向所述第一接入网设备和/或第二接入网设备发送经过加密的包括所述第一数据的数据包。
  27. 根据权利要求25所述的方法,其特征在于,所述待处理数据包包括第一数据包,所述在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用第一协议栈对所 述终端设备的待处理数据包或数据进行按序处理,包括:
    在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备接收所述第一接入网设备和/或第二接入网设备发送的第一数据包;
    所述终端设备使用所述第一协议栈对所述第一数据包或所述第一数据包中的数据部分进行解密;
    所述终端设备使用所述第一协议栈对经过解密的所述第一数据包进行按序处理。
  28. 根据权利要求25或26所述的方法,其特征在于,所述待处理数据包括第二数据,所述在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用所述终端设备第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,包括:
    所述终端设备使用所述第一协议栈对所述第二数据进行按序处理;
    所述方法还包括:
    所述终端设备使用所述第二协议栈对经过按序处理后的所述第二数据或包括所述第二数据的数据包进行加密;
    所述终端设备向所述第二网络设备发送经过加密的包括所述第二数据的数据包。
  29. 根据权利要求25或27所述的方法,其特征在于,所述待处理数据包包括第二数据包,所述在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,所述终端设备使用所述终端设备第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,包括:
    所述终端设备接收所述第二网络设备发送的所述第二数据包;
    所述终端设备使用所述第二协议栈对所述第二数据包或所述第二数据包数据部分进行解密;
    所述终端设备使用所述第一协议栈对经过解密的所述第二数据包进行按序处理。
  30. 根据权利要求25至29中任一项所述的方法,其特征在于,所述方法还包括:
    所述终端设备接收所述第一接入网设备和/或所述第二接入网设备发送的所述第二触发信息;
    所述终端设备根据所述第二触发信息,使用所述第二协议栈维护所述终端设备的数据包的顺序。
  31. 根据权利要求30所述的方法,其特征在于,所述第二触发信息还用于指示所述终端设备释放所述第一协议栈,所述方法还包括:
    所述终端设备根据所述第二触发信息,释放所述第一协议栈。
  32. 根据权利要求25至31中任一项所述的方法,其特征在于,所述第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
  33. 根据权利要求25至32中任一项所述的方法,所述第一接入网设备为源接入网设备,所述第二接入网设备为目标接入网设备;或所述第一接入网设备为多连接场景中的主接入网设备,所述第二接入网设备为所述多连接场景中的辅接入网设备。
  34. 一种接入网设备,其特征在于,所述接入网设备为第一接入网设备,包括:
    第一触发单元,用于触发终端设备和/或第二接入网设备配置第二协议栈,所述第二协议栈用于维护所述第二接入网设备与所述终端设备的数据包的顺序和/或所述第二接入网设备和所述终端设备的数据包的安全秘钥;
    按序处理单元,用于在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,使用第一协议栈对所述终端设备的待处理数据包进行按序处理。
  35. 根据权利要求34所述的接入网设备,其特征在于,所述待处理数据包包括第一数据包,所述按序处理单元具体用于:
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,接收所述终端设备发送的所述第一数据包;
    使用所述第一协议栈对所述第一数据包或所述第一数据包中的数据部分进行解密;
    使用所述第一协议栈对经过解密后的所述第一数据包进行按序处理。
  36. 根据权利要求34所述的接入网设备,其特征在于,所述待处理数据包包括第二数据包,所述按序处理单元具体用于:
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使 用所述第二协议栈维护所述终端设备的数据包的顺序之前,接收核心网设备发送的所述第二数据包中的数据部分;
    使用所述第一协议栈对所述第二数据包进行按序处理;
    所述接入网设备还包括:
    第一加密单元,用于使用所述第一协议栈对经过按序处理的所述第二数据包或所述第二数据包中的数据部分进行加密。
  37. 根据权利要求34或35所述的接入网设备,其特征在于,所述待处理数据包包括第三数据包,所述按序处理单元具体用于:
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,接收所述第二接入网设备发送的经过所述第二接入网设备使用所述第二协议栈解密后的所述第三数据包;
    对经过解密的所述第三数据包进行按序处理。
  38. 根据权利要求34或36所述的接入网设备,其特征在于,所述待处理数据包包括第四数据包,所述按序处理单元具体用于:
    在所述第一接入网设备触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序之前,接收核心网设备发送的所述第四数据包中的数据部分;
    使用所述第一协议栈对所述第四数据包进行按序处理;
    所述接入网设备还包括:
    第二加密单元,用于向所述第二接入网设备发送经过按序处理的所述第四数据包,以使得所述第二接入网设备使用所述第二协议栈对经过按序处理的所述第四数据包或所述第四数据包中的数据部分进行加密。
  39. 根据权利要求34至38中任一项所述的接入网设备,所述接入网设备还包括:
    第二触发单元,用于在所述第一接入网设备确定所述第一接入网设备无所述终端设备的数据包或数据需要处理的情况下,触发所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
  40. 根据权利要求39所述的接入网设备,其特征在于,所述第二触发单元具体用于:
    在所述第一接入网设备确定所述第一接入网设备无所述终端设备的数 据包或数据需要处理的情况下,向所述终端设备和/或所述第二接入网设备发送第一指示信息,所述第一指示信息用于指示所述终端设备和/或所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
  41. 根据权利要求39或40所述的接入网设备,其特征在于,所述接入网设备还包括:
    确定单元,用于确定所述第一接入网设备无所述终端设备的数据包或数据需要处理。
  42. 根据权利要求41所述的接入网设备,其特征在于,所述确定单元具体用于:
    接收核心网设备发送的第二指示信息,所述第二指示信息用于指示所述第一接入网设备无所述终端设备的数据包或数据需要处理;
    根据所述第二指示信息,确定所述第一接入网设备无所述终端设备的数据包或数据需要处理。
  43. 根据权利要求42所述的接入网设备,其特征在于,所述确定单元具体用于:
    在所述第一接入网设备向核心网设备发送路由切换信息之后,接收所述核心网设备发送的所述第二指示信息,所述路由切换信息用于指示所述核心网设备将负责维护所述终端设备的数据包的顺序的接入网设备从所述第一接入网设备切换为所述第二接入网设备。
  44. 根据权利要求43所述的接入网设备,其特征在于,所述接入网设备还包括:
    接收单元,用于接收所述第二接入网设备发送的第三指示信息,所述第三指示信息用于指示所述终端设备完成所述第二协议栈的配置;
    发送单元,用于根据所述第三指示信息,向所述核心网设备发送所述路由切换信息。
  45. 根据权利要求40至44中任一项所述的接入网设备,其特征在于,所述第一指示信息还用于指示所述终端设备释放所述第一协议栈。
  46. 根据权利要求40至45中任一项所述的接入网设备,其特征在于,为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
  47. 根据权利要求34至46中任一项所述的接入网设备,其特征在于, 所述第一触发单元具体用于:
    向所述第二接入网设备发送第一触发信息,所述第一触发信息用于请求所述第二接入网设备配置所述第二协议栈;
    接收所述第二接入网设备发送的所述第一触发信息的响应信息;
    根据所述响应信息,向所述终端设备发送第二触发信息,所述第二触发信息用于指示所述终端设备配置所述第二协议栈。
  48. 根据权利要求34至47中任一项所述的接入网设备,所述第一接入网设备为源接入网设备,所述第二接入网设备为目标接入网设备;或所述第一接入网设备为多连接场景中的主接入网设备,所述第二接入网设备为所述多连接场景中的辅接入网设备。
  49. 一种接入网设备,其特征在于,所述接入网设备为第二接入网设备,包括:
    第一接收单元,用于接收第一接入网设备发送的第一触发信息,所述第一触发信息用于触发所述第二接入网设备配置第二协议栈,所述第二协议栈用于维护所述第二接入网设备与终端设备的数据包的顺序和/或所述第二接入网设备与所述终端设备的数据包的安全秘钥;
    第二接收单元,用于接收所述第一接入网设备发送的第二触发信息,所述第二触发信息用于触发所述第二接入网设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
  50. 根据权利要求49所述的接入网设备,其特征在于,所述接入网设备还包括:
    第三接收单元,用于在所述第二接入网设备接收所述第一接入网设备发送的所述第二触发信息之前,接收所述第一接入网设备发送的经过按序处理和加密的第一数据包;;
    第一发送单元,用于向所述终端设备转发经过按序处理和加密的所述第一数据包。
  51. 根据权利要求49或50所述的接入网设备,其特征在于,所述接入网设备还包括:
    第四接收单元,用于在所述第二接入网设备接收所述第一接入网设备发送的所述第二触发信息之前,接收所述第一接入网设备发送的经过按序处理的第二数据包;
    第一加密单元,用于使用所述第二协议栈对所述第二数据包或所述第二数据包中的数据部分进行加密;
    第二发送单元,用于向所述终端设备发送经过加密的所述第二数据包。
  52. 根据权利要求49所述的接入网设备,其特征在于,所述接入网设备还包括:
    第五接收单元,用于在所述第二接入网设备接收所述第一接入网设备发送的所述第二触发信息之前,接收所述终端设备发送的第三数据包;
    第三发送单元,用于向所述第一接入网设备转发所述第三数据包,以便于所述第一接入网设备对所述第三数据包或所述第三数据包中的数据部分进行解密和按序处理。
  53. 根据权利要求49或52所述的接入网设备,其特征在于,所述接入网设备还包括:
    第六接收单元,用于在所述第二接入网设备接收所述第一接入网设备发送的所述第二触发信息之前,接收所述终端设备发送的第四数据包;
    第一解密单元,用于使用所述第二协议栈对所述第四数据包或所述第四数据包中的数据部分进行解密;
    第四发送单元,用于向所述第一接入网设备发送经过解密的所述第四数据包,以便于所述第一接入网设备对经过解密的所述第四数据包进行按序处理。
  54. 根据权利要求49至53中任一项所述的接入网设备,其特征在于,所述接入网设备还包括:
    第七接收单元,用于接收终端设备发送的第一指示信息,所述第一指示信息用于指示所述所述终端设备已完成所述第二协议栈的配置;
    第五发送单元,用于根据所述第一指示信息,向核心网设备发送路由切换信息,或
    根据所述第一指示信息,触发所述第一接入网设备向核心网设备发送路由切换信息,所述路由切换信息用于指示所述核心网设备将负责维护所述终端设备的数据包的顺序的接入网设备从所述第一接入网设备切换为所述第二接入网设备。
  55. 根据权利要求54所述的接入网设备,其特征在于,所述接入网设备还包括:
    第八接收单元,用于在所述第七发送单元向所述核心网设备发送所述路由切换信息之后,所述第二接入网设备接收所述第一接入网设备发送的第二指示信息,所述第二指示信息用于指示所述第一接入网设备无所述终端设备的数据或数据包需要处理。
  56. 根据权利要求49至55中任一项所述的接入网设备,其特征在于,所述第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
  57. 根据权利要求49至56中任一项所述的接入网设备,其特征在于,所述第一接入网设备为源接入网设备,所述第二接入网设备为目标接入网设备;或所述第一接入网设备为多连接场景中的主接入网设备,所述第二接入网设备为所述多连接场景中的辅接入网设备。
  58. 一种终端设备,其特征在于,包括:
    配置单元,用于根据第一接入网设备发送的第一触发信息,配置第二协议栈,所述第二协议栈用于维护所述第二接入网设备和所述终端设备的数据包的顺序和/或所述第二接入网设备和所述终端设备的数据包的安全秘钥;
    第一按序处理单元,用于在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,使用第一协议栈对所述终端设备的待处理数据包或数据进行按序处理,所述第二触发信息用于触发所述终端设备使用所述第二协议栈维护所述终端设备的数据包的顺序。
  59. 根据权利要求58所述的终端设备,其特征在于,所述待处理数据包括第一数据,所述第一按序处理单元具体用于:
    使用所述第一协议栈对所述第一数据进行按序处理;
    所述终端设备还包括:
    第一加密单元,用于使用所述第一协议栈对经过按序处理的所述第一数据或包括所述第一数据的数据包进行加密;
    第一发送单元,用于向所述第一接入网设备发送经过加密的包括所述第一数据的数据包。
  60. 根据权利要求58所述的终端设备,其特征在于,所述待处理数据包包括第一数据包,所述第一按序处理单元具体用于:
    在所述终端设备接收到所述第一接入网设备和/或所述第二接入网设备发送的第二触发信息之前,接收所述第一接入网设备发送的所述第二数据 包;
    使用所述第一协议栈对所述第一数据包或所述第一数据包中的数据部分进行解密;
    使用所述第一协议栈对经过解密的所述第一数据包进行按序处理。
  61. 根据权利要求58或59所述的终端设备,其特征在于,所述待处理数据包括第二数据,所述第一按序处理单元具体用于:
    使用所述第一协议栈对所述第二数据进行按序处理;
    所述终端设备还包括:
    第二加密单元,用于使用所述第二协议栈对经过按序处理后的所述第二数据或包括所述第二数据的数据包进行加密;
    第二发送单元,用于向所述第二网络设备发送经过加密的包括所述第二数据的数据包。
  62. 根据权利要求58或60所述的终端设备,其特征在于,所述待处理数据包包括第二数据包,所述第一按序处理单元用于:
    接收所述第二网络设备发送的所述第二数据包;
    使用所述第二协议栈对所述第二数据包或所述第二数据包中的数据部分进行解密;
    使用所述第一协议栈对经过解密的所述第二数据包进行按序处理。
  63. 根据权利要求58至62中任一项所述的终端设备,其特征在于,所述终端设备还包括:
    第一接收单元,用于接收所述第一接入网设备和/或所述第二接入网设备发送的所述第二触发信息;
    第二按序处理单元,根据所述第二触发信息,使用所述第二协议栈维护所述终端设备的数据包的顺序。
  64. 根据权利要求63所述的终端设备,其特征在于,所述第二触发信息还用于指示所述终端设备释放所述第一协议栈,所述终端设备还包括:
    释放单元,用于根据所述第二触发信息,释放所述第一协议栈。
  65. 根据权利要求58至64中任一项所述的终端设备,其特征在于,所述第二触发信息为无线资源控制RRC信令、媒体接入控制MAC信令、下行控制信息DCI、数据包中的比特位中的任何一种。
  66. 根据权利要求58至65中任一项所述的终端设备,所述第一接入网 设备为源接入网设备,所述第二接入网设备为目标接入网设备;或所述第一接入网设备为多连接场景中的主接入网设备,所述第二接入网设备为所述多连接场景中的辅接入网设备。
PCT/CN2017/094335 2017-07-25 2017-07-25 切换方法、接入网设备和终端设备 WO2019019023A1 (zh)

Priority Applications (16)

Application Number Priority Date Filing Date Title
JP2019567262A JP7026144B2 (ja) 2017-07-25 2017-07-25 ハンドオーバー方法、アクセスネットワーク装置と端末装置
AU2017424739A AU2017424739B2 (en) 2017-07-25 2017-07-25 Switching method, access network device and terminal device
PCT/CN2017/094335 WO2019019023A1 (zh) 2017-07-25 2017-07-25 切换方法、接入网设备和终端设备
CN202210369766.1A CN114828117B (zh) 2017-07-25 2017-07-25 切换方法、接入网设备和终端设备
RU2019144782A RU2741324C1 (ru) 2017-07-25 2017-07-25 Способ переключения, устройство доступа к сети и оконечное устройство
SG11201912337TA SG11201912337TA (en) 2017-07-25 2017-07-25 Switching method, access network device and terminal device
BR112019025745-4A BR112019025745A2 (pt) 2017-07-25 2017-07-25 Método de entrega e dispositivo terminal
CA3066655A CA3066655A1 (en) 2017-07-25 2017-07-25 Switching method, access network device and terminal device
CN201780090532.0A CN110622558A (zh) 2017-07-25 2017-07-25 切换方法、接入网设备和终端设备
US16/623,853 US11265791B2 (en) 2017-07-25 2017-07-25 Reducing a data transmission delay of a terminal device in a handover process
MX2019015149A MX2019015149A (es) 2017-07-25 2017-07-25 Metodo de conmutacion, dispositivo de red de acceso y dispositivo de terminal.
EP17919528.4A EP3614733A4 (en) 2017-07-25 2017-07-25 SWITCHING METHOD, ACCESS NETWORK DEVICE AND TERMINAL DEVICE
KR1020197035311A KR102341420B1 (ko) 2017-07-25 2017-07-25 스위칭 방법, 액세스 네트워크 장치 및 단말 장치
TW107125711A TWI762684B (zh) 2017-07-25 2018-07-25 切換方法、存取網設備和終端設備
ZA2019/08303A ZA201908303B (en) 2017-07-25 2019-12-12 Switching method, access network device and terminal device
JP2022020368A JP2022062239A (ja) 2017-07-25 2022-02-14 ハンドオーバー方法、アクセスネットワーク装置と端末装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/094335 WO2019019023A1 (zh) 2017-07-25 2017-07-25 切换方法、接入网设备和终端设备

Publications (1)

Publication Number Publication Date
WO2019019023A1 true WO2019019023A1 (zh) 2019-01-31

Family

ID=65041011

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/094335 WO2019019023A1 (zh) 2017-07-25 2017-07-25 切换方法、接入网设备和终端设备

Country Status (14)

Country Link
US (1) US11265791B2 (zh)
EP (1) EP3614733A4 (zh)
JP (2) JP7026144B2 (zh)
KR (1) KR102341420B1 (zh)
CN (2) CN114828117B (zh)
AU (1) AU2017424739B2 (zh)
BR (1) BR112019025745A2 (zh)
CA (1) CA3066655A1 (zh)
MX (1) MX2019015149A (zh)
RU (1) RU2741324C1 (zh)
SG (1) SG11201912337TA (zh)
TW (1) TWI762684B (zh)
WO (1) WO2019019023A1 (zh)
ZA (1) ZA201908303B (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112449348A (zh) * 2019-08-16 2021-03-05 华为技术有限公司 通信方法和通信装置
WO2021213305A1 (zh) * 2020-04-24 2021-10-28 华为技术有限公司 通信方法及装置

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019019023A1 (zh) 2017-07-25 2019-01-31 Oppo广东移动通信有限公司 切换方法、接入网设备和终端设备
WO2019237364A1 (zh) * 2018-06-15 2019-12-19 Oppo广东移动通信有限公司 数据按序递交的方法、网络设备及终端设备
WO2020041966A1 (en) * 2018-08-28 2020-03-05 Apple Inc. Mobility enhancements for cellular communications
EP3874821A1 (en) * 2018-11-01 2021-09-08 Telefonaktiebolaget Lm Ericsson (Publ) User equipment, source access node, target access node, and methods in a wireless communications network for handling data packets in a handover
CN111479335A (zh) * 2019-01-24 2020-07-31 华为技术有限公司 一种数据传输的方法和通信装置
MX2022009981A (es) * 2020-02-13 2022-09-12 Guangdong Oppo Mobile Telecommunications Corp Ltd Metodo de procesamiento de conmutacion y dispositivo terminal.
CN115190547A (zh) * 2021-04-01 2022-10-14 展讯通信(上海)有限公司 一种通信方法及装置
CN115278654A (zh) * 2021-04-30 2022-11-01 维沃移动通信有限公司 Rrc连接维护方法、相关设备及可读存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101048001A (zh) * 2006-06-22 2007-10-03 华为技术有限公司 切换控制方法
CN102123457A (zh) * 2010-01-11 2011-07-13 中兴通讯股份有限公司 切换方法及终端
WO2013016797A1 (en) * 2011-08-04 2013-02-07 Research In Motion Limited Methods to enable efficient use of multiple radio access technologies
CN104661270A (zh) * 2013-03-18 2015-05-27 开曼群岛威睿电通股份有限公司 多模式无线通信装置和系统
CN105101164A (zh) * 2015-07-23 2015-11-25 努比亚技术有限公司 双卡双待终端及数据通信方法
CN105144784A (zh) * 2013-03-15 2015-12-09 高通股份有限公司 用于支持ieee 802.11快速会话转移的多协议驱动器
CN105407461A (zh) * 2015-11-24 2016-03-16 广东欧珀移动通信有限公司 网络通信功能异常的处理方法、应用处理器和移动终端

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1748615A1 (en) 2005-07-27 2007-01-31 Sun Microsystems France S.A. Method and system for providing public key encryption security in insecure networks
MX2009011088A (es) * 2007-04-25 2009-11-02 Ericsson Telefon Ab L M Un metodo y aparato para traspaso fluido en una red de comunicacion inalambrica.
US8032746B2 (en) 2007-06-19 2011-10-04 The University Of Texas At San Antonio Tamper-resistant communication layer for attack mitigation and reliable intrusion detection
CN101227504A (zh) * 2008-02-18 2008-07-23 华为技术有限公司 一种实现协议栈之间切换的方法及装置
US8274938B2 (en) 2009-05-28 2012-09-25 Mediatek Inc. Method and system for coordinating protocol stack entities to share single radio resource
CN104780576B (zh) * 2009-12-15 2018-10-23 无线未来科技公司 从源基站切换至目标基站的方法及用户设备
US8737354B2 (en) 2011-01-10 2014-05-27 Alcatel Lucent Method of data path switching during inter-radio access technology handover
CN102333352B (zh) * 2011-09-19 2014-03-19 新邮通信设备有限公司 一种长期演进lte系统中减少切换时延的方法
CN103096303B (zh) 2011-10-31 2016-04-20 华为技术有限公司 传输数据包的方法及设备
JP5437422B2 (ja) * 2012-03-13 2014-03-12 株式会社Nttドコモ 無線基地局及び移動局
EP2944108B1 (en) 2013-01-11 2020-03-04 LG Electronics Inc. Method and apparatus for applying security information in wireless communication system
KR102078866B1 (ko) 2013-08-09 2020-02-19 삼성전자주식회사 듀얼 커넥티비티 지원을 위한 pdcp 분산 구조의 보안 키 생성 및 관리 방안
CN104811431B (zh) 2014-01-29 2018-01-16 华为技术有限公司 基于并行协议栈实例的数据包处理方法和装置
EP3013096B1 (en) * 2014-10-20 2016-10-19 Fujitsu Limited Improving mobile user experience in patchy coverage networks
US10244444B2 (en) 2015-03-04 2019-03-26 Qualcomm Incorporated Dual link handover
KR20170128540A (ko) * 2015-03-27 2017-11-22 후아웨이 테크놀러지 컴퍼니 리미티드 데이터 전송 방법, 액세스 네트워크 장치, 및 통신 시스템
US10750410B2 (en) 2016-09-30 2020-08-18 Huawei Technologies Co., Ltd. Ultra reliable low latency connection support in radio access networks
EP3516922B1 (en) * 2016-09-30 2021-07-14 Samsung Electronics Co., Ltd. Method and apparatus for establishing dual-connectivity to transmit data in new radio communication architecture
CN108632934B (zh) * 2017-03-24 2021-01-01 华为技术有限公司 切换的方法和设备
US10448289B2 (en) * 2017-05-05 2019-10-15 Futurewei Technologies, Inc. System and method for handovers in a dual connectivity communications system
WO2019019023A1 (zh) 2017-07-25 2019-01-31 Oppo广东移动通信有限公司 切换方法、接入网设备和终端设备
US10708968B2 (en) * 2017-08-25 2020-07-07 Kt Corporation Method of controlling mobility of UE and apparatus therefor
US11190989B2 (en) * 2018-05-22 2021-11-30 Apple Inc. Mobility management for inter-gNB (next generation node-b) handover in new radio (NR) systems
WO2020041966A1 (en) 2018-08-28 2020-03-05 Apple Inc. Mobility enhancements for cellular communications
CN112203362A (zh) * 2019-07-08 2021-01-08 联发科技(新加坡)私人有限公司 减少移动中断的方法和用户设备
US11477820B2 (en) * 2019-07-10 2022-10-18 Ofinno, Llc Cell resource status information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101048001A (zh) * 2006-06-22 2007-10-03 华为技术有限公司 切换控制方法
CN102123457A (zh) * 2010-01-11 2011-07-13 中兴通讯股份有限公司 切换方法及终端
WO2013016797A1 (en) * 2011-08-04 2013-02-07 Research In Motion Limited Methods to enable efficient use of multiple radio access technologies
CN105144784A (zh) * 2013-03-15 2015-12-09 高通股份有限公司 用于支持ieee 802.11快速会话转移的多协议驱动器
CN104661270A (zh) * 2013-03-18 2015-05-27 开曼群岛威睿电通股份有限公司 多模式无线通信装置和系统
CN105101164A (zh) * 2015-07-23 2015-11-25 努比亚技术有限公司 双卡双待终端及数据通信方法
CN105407461A (zh) * 2015-11-24 2016-03-16 广东欧珀移动通信有限公司 网络通信功能异常的处理方法、应用处理器和移动终端

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112449348A (zh) * 2019-08-16 2021-03-05 华为技术有限公司 通信方法和通信装置
CN112449348B (zh) * 2019-08-16 2022-11-18 华为技术有限公司 通信方法和通信装置
WO2021213305A1 (zh) * 2020-04-24 2021-10-28 华为技术有限公司 通信方法及装置

Also Published As

Publication number Publication date
JP7026144B2 (ja) 2022-02-25
CN114828117B (zh) 2023-09-26
AU2017424739A1 (en) 2020-01-16
TW201918093A (zh) 2019-05-01
AU2017424739B2 (en) 2023-02-02
US20200154331A1 (en) 2020-05-14
BR112019025745A2 (pt) 2020-06-23
SG11201912337TA (en) 2020-01-30
RU2741324C1 (ru) 2021-01-25
MX2019015149A (es) 2020-02-19
EP3614733A4 (en) 2020-06-10
EP3614733A1 (en) 2020-02-26
KR102341420B1 (ko) 2021-12-20
KR20200029389A (ko) 2020-03-18
JP2020532887A (ja) 2020-11-12
CA3066655A1 (en) 2019-01-31
US11265791B2 (en) 2022-03-01
CN114828117A (zh) 2022-07-29
TWI762684B (zh) 2022-05-01
JP2022062239A (ja) 2022-04-19
CN110622558A (zh) 2019-12-27
ZA201908303B (en) 2020-11-25

Similar Documents

Publication Publication Date Title
TWI762684B (zh) 切換方法、存取網設備和終端設備
CN112738858B (zh) 切换的方法和设备
US11395365B2 (en) Method and system for handling PDCP operation in wireless communication system
CN109982360B (zh) 通信方法和装置
JP6436436B2 (ja) スモールセル配備時の効率的な破棄メカニズム
US9999028B2 (en) Data transmission method, base station, and user equipment
US10660008B2 (en) Data transmission system, method, and apparatus
CN108366369B (zh) 一种数据安全传输的方法及接入网、终端、核心网设备
US20190075487A1 (en) Communication control method
CN111742577B (zh) 用于移动性增强的方法及其用户设备
CN104429109B (zh) 一种通信方法及装置
WO2018059148A1 (zh) 一种数据转发的方法及其设备
WO2018186782A1 (en) Transport of rrc messages in dual connectivity communication
KR20230040361A (ko) 데이터 전송 방법 및 관련 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17919528

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2017919528

Country of ref document: EP

Effective date: 20191114

ENP Entry into the national phase

Ref document number: 2019567262

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 3066655

Country of ref document: CA

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112019025745

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 2017424739

Country of ref document: AU

Date of ref document: 20170725

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 112019025745

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20191205