WO2019056666A1 - 数据处理方法及相关设备 - Google Patents

数据处理方法及相关设备 Download PDF

Info

Publication number
WO2019056666A1
WO2019056666A1 PCT/CN2018/072248 CN2018072248W WO2019056666A1 WO 2019056666 A1 WO2019056666 A1 WO 2019056666A1 CN 2018072248 W CN2018072248 W CN 2018072248W WO 2019056666 A1 WO2019056666 A1 WO 2019056666A1
Authority
WO
WIPO (PCT)
Prior art keywords
bit
user equipment
control information
network node
value
Prior art date
Application number
PCT/CN2018/072248
Other languages
English (en)
French (fr)
Inventor
唐海
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to JP2020509046A priority Critical patent/JP2020534722A/ja
Priority to KR1020207004883A priority patent/KR20200054947A/ko
Priority to CN201880060987.2A priority patent/CN111133781B/zh
Priority to EP18858937.8A priority patent/EP3641364A4/en
Priority to US16/630,637 priority patent/US11083006B2/en
Publication of WO2019056666A1 publication Critical patent/WO2019056666A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/08Arrangements for detecting or preventing errors in the information received by repeating transmission, e.g. Verdan system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/24Multipath
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0091Signaling for the administration of the divided path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/02Data link layer protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0003Two-dimensional division
    • H04L5/0005Time-frequency
    • H04L5/0007Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT
    • H04L5/001Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT the frequencies being arranged in component carriers

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a data processing method and related devices.
  • the replication data transmission method uses a split bearer protocol architecture.
  • the Packet Data Convergence Protocol (PDCP) layer is located at a certain one.
  • a Cell Cell Group, CG
  • MCG Master Cell Group
  • SCG Secondary Cell Group
  • the PDCP layer of the sender device copies the PDCP Protocol Data Unit (PDU) into the same two copies, for example, one PDCP PDU and one Duplicated PDCP PDU.
  • the two PDCP PDUs are controlled by different CG radio link layers.
  • the Radio Link Control (RLC) layer and the Media Access Control (MAC) layer reach the corresponding MAC layer and RLC layer of the receiving end device through the air interface, and finally converge to the PDCP layer.
  • the PDCP layer detects that two PDCP PDUs are the same PDU, the PDCP layer discards one of the PDUs at this time, and delivers another PDU to the upper layer.
  • the embodiment of the present application provides a data processing method and related device, which are used to determine a data replication behavior of a user equipment.
  • an embodiment of the present application provides a data processing method, including:
  • the user equipment receives control information from the first network node
  • the user equipment determines a data replication behavior of the user equipment according to control information and a setting rule of the first network node.
  • an embodiment of the present application provides a data processing method, including:
  • the network node sends control information to the user equipment, where the control information is used by the user equipment to determine a data replication behavior of the user equipment in conjunction with a setting rule.
  • an embodiment of the present application provides a user equipment, including a processing unit and a communication unit, where:
  • the processing unit is configured to receive, by using the communication unit, control information from the first network node, and determine, according to the control information and the setting rule of the first network node, a data replication behavior of the user equipment.
  • an embodiment of the present application provides a network node, including a processing unit and a communication unit, where:
  • the processing unit is configured to send control information to the user equipment by using the communication unit, where the control information is used by the user equipment to determine a data replication behavior of the user equipment according to a setting rule.
  • an embodiment of the present application provides a user equipment, including one or more processors, one or more memories, one or more transceivers, and one or more programs, where the one or more programs are Stored in the memory and configured to be executed by the one or more processors, the program comprising instructions for performing the steps in the method of the first aspect.
  • an embodiment of the present application provides a network node, including one or more processors, one or more memories, one or more transceivers, and one or more programs, where the one or more programs are Stored in the memory and configured to be executed by the one or more processors, the program comprising instructions for performing the steps in the method of the second aspect.
  • an embodiment of the present application provides a computer readable storage medium storing a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method as described in the first aspect.
  • an embodiment of the present application provides a computer readable storage medium storing a computer program for electronic data exchange, wherein the computer program causes the computer to perform the method as described in the second aspect.
  • the embodiment of the present application provides a computer program product, comprising: a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the first aspect The method described.
  • embodiments of the present application provide a computer program product, comprising: a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the second aspect The method described.
  • FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an overall structure of a MAC PDU according to an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a user equipment according to an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a network node according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of another user equipment according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of another network node according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of another user equipment according to an embodiment of the present application.
  • references to "an embodiment” herein mean that a particular feature, structure, or characteristic described in connection with the embodiments can be included in at least one embodiment of the present application.
  • the appearances of the phrases in various places in the specification are not necessarily referring to the same embodiments, and are not exclusive or alternative embodiments that are mutually exclusive. Those skilled in the art will understand and implicitly understand that the embodiments described herein can be combined with other embodiments.
  • FIG. 1 is a schematic diagram of a network architecture disclosed in an embodiment of the present application.
  • the network architecture includes a master node (MN) 110 and at least one slave node (SN).
  • MN master node
  • SN slave node
  • the primary network node 110 provides a basic network coverage 130.
  • At least one secondary network node 120 provides a relatively small network coverage 140.
  • the User Equipment (UE) in the common coverage of the primary network node 110 and the secondary network node 120 will be able to establish a communication connection with the primary network node 110 and the secondary network node 120 at the same time.
  • UE User Equipment
  • the case where one user equipment 150 is simultaneously connected to one primary network node 110 and at least one secondary network node 120 is referred to as a dual connection.
  • the user equipment is a device that provides voice and/or data connectivity to the user, for example, a handheld device with a wireless connection function, an in-vehicle device, and the like.
  • Common user devices include, for example, mobile phones, tablets, notebook computers, PDAs, mobile internet devices (MIDs), wearable devices such as smart watches, smart bracelets, pedometers, and the like.
  • a network node refers to a computer or other device connected to a network that has a separate address and has the function of transmitting or receiving data.
  • Network nodes can be workstations, customers, network users, or personal computers, but can also be servers, printers, and other network-connected devices.
  • Each workstation, server, user equipment, network device refers to the node device on the network side, including but not limited to: evolved Node B (eNB), radio network controller (RNC), node B) (Node B, NB), Base Station Controller (BSC), Base Transceiver Station (BTS), Home Base Station (for example, Home evolved NodeB, or Home Node B, HNB), Baseband Unit (BaseBand) Unit, BBU), Mobility Management Entity (MME), etc., that is, devices with their own unique network addresses are network nodes.
  • eNB evolved Node B
  • RNC radio network controller
  • node B) Node B
  • BSC Base Station Controller
  • BTS Base Transceiver Station
  • HNB Home evolved NodeB, or Home Node B, HNB
  • MME Mobility Management Entity
  • NR New Radio
  • a radio bearer configured with a duplicate data transmission function
  • CE MAC control element
  • the primary network node and the secondary network node may respectively send a MAC CE to activate or deactivate the data replication transmission function of one of the split bearers of the user equipment.
  • the current NR discussion has agreed that the MAC CE contains a bitmap and the bitmap is 1 byte. The different locations in the bitmap correspond to different bearer IDs of the user equipment. The bearer indicated by these bearer IDs is the bearer configured with the data replication transmission function.
  • the bearer ID of the user equipment is 0, 2, 3, 7, 8, 10 and the correspondence between the bitmap and the bearer ID included in the MAC CE is: the first bit in the bitmap corresponds to the bearer ID 0, and the second bit corresponds to the bearer ID 2
  • the third bit corresponds to the bearer ID 3
  • the fourth bit corresponds to the bearer ID 7
  • the fifth bit corresponds to the bearer ID 8
  • the sixth bit corresponds to the bearer ID 10
  • the seventh bit and the eighth bit are invalid bits
  • the MAC CE contains the bitmap.
  • the correspondence with the bearer ID is an ascending correspondence.
  • the correspondence between the bitmap and the bearer ID included in the MAC CE may also be a descending correspondence.
  • the MAC CE received by the user equipment may be delivered by the primary network node, or may be sent by the secondary network node. Therefore, in the NR, the protocol may require the user equipment to use the MAC CE and the secondary network node delivered by the primary network node.
  • the MAC CE is sent together to define the data replication behavior of the user equipment. After the user equipment receives Radio Resource Control (RRC) signaling, the user equipment should have an initial state. When the user equipment receives the MAC CE delivered by one network node but does not receive the MAC CE delivered by another network node, the user equipment cannot define the user equipment according to the MAC CE delivered by the two network nodes. Data replication behavior.
  • RRC Radio Resource Control
  • FIG. 2 is a schematic flowchart of a data processing method according to an embodiment of the present application, including the following steps:
  • S201 The first network node sends control information to the user equipment.
  • the first network node sends the control information to the user equipment, where the first network node sends a MAC CE to the user equipment, where the MAC CE includes control information.
  • One MAC PDU is composed of a MAC header and a MAC payload.
  • the MAC load consists of a MAC sub-PDU (MAC sub-PDU), a MAC CE, and an optional padding.
  • MAC sub-PDU MAC sub-PDU
  • MAC CE MAC sub-PDU
  • an optional padding MAC sub-PDU
  • the remaining bits in the MAC PDU need to be padded bits for padding.
  • the MAC CE in this application is used to transmit the data replication transmission function of the control user equipment.
  • the first network node sends the MAC CE to the user equipment.
  • the PDCP layer of the first network node encapsulates the data to be sent into a PDCP PDU, and then encapsulates the data.
  • the PDCP PDU is sent to the RLC layer, and then the RLC layer sends the RLC PDU to the MAC layer.
  • the MAC layer encapsulates the control information to be sent in the MAC CE and the data sent by the RLC layer into a MAC PDU, and then the MAC layer of the first network node.
  • the encapsulated MAC PDU is sent to the user equipment through the interface.
  • S202 The user equipment receives control information from the first network node.
  • the user equipment determines the data replication behavior of the user equipment according to the control information and the setting rule of the first network node.
  • the first network node may be a primary network node or a secondary network node.
  • the second network node may be a primary network node or a secondary network node.
  • the specific embodiment of the user equipment receiving the control information from the first network node is: the user equipment receives the MAC CE from the first network node, and the MAC CE includes control information.
  • the MAC layer of the user equipment receives the MAC PDU delivered by the MAC layer of the first network node, and the MAC layer of the user equipment demultiplexes the received MAC PDU to obtain the MAC CE included in the MAC PDU. Get the control information included in the MAC CE.
  • the primary network node and the secondary network node may respectively send a MAC CE to activate or deactivate the data replication function of a split bearer of the user equipment, and because the MAC address received by the user equipment
  • the CE may be delivered by the primary network node or by the secondary network node. Therefore, in the NR, the protocol may require the user equipment to be defined according to the MAC CE delivered by the primary network node and the MAC CE issued by the secondary network node.
  • the data replication behavior of the user device has agreed that the MAC CE contains a bitmap and the bitmap is 1 byte. If the MAC CE includes control information, the control information may be the 1 byte information included in the MAC CE.
  • the first network node transmits control information to the user equipment through the MAC CE. If the user equipment only receives the MAC CE sent by one of the primary network node and the secondary network node, the user equipment cannot be based on the MAC CE sent by another network node.
  • the MAC CEs delivered by the network nodes jointly define the data replication behavior of the user equipment.
  • the specific implementation of the present application includes: the MAC CE includes control information, the MAC CE includes a bitmap, the bitmap is 1 byte, and the control information includes at least one bit, and the user equipment is configured according to the
  • the specific implementation manners of determining the data replication behavior of the user equipment by the control information and setting rules of a network node are:
  • the user equipment assumes a value of a bit i, which is one of at least one bit included in the control information assumed by the user equipment from the second network node;
  • the bit j is the control information of the first network node includes One of at least one bit, the bit i and the bit j satisfying at least one of the following: the bit i and the bit j are in the same position in the control information; the bit The position of the bit i and the bit j in the control information is different; the bit i and the bit j correspond to the same data bearer.
  • control information from the second network node includes 8 bits
  • bit i is the 4th of the 8 bits
  • control information from the first network node is assumed to include 8 bits, bits.
  • Bit j is also the 4th bit of the 8 bits, then bit i and bit j are in the same position in the control information.
  • the position of the bit i and the bit j in the control information are different, for example, it is assumed that the control information from the second network node includes 8 bits, and the bit i is in the 8 bits.
  • Bit 4 assuming that the control information from the first network node includes 8 bits, the bit j is also the 5th of the 8 bits, then the bit i and the bit j are in the control information. The location is different.
  • the set mapping relationship is a value of one of the bits included in the control information of the first network node, and a mapping relationship between the value of one of the bits included in the control information of the second network node and the data replication behavior.
  • the mapping relationship of the setting is as shown in Table 1.
  • the Operation in Table 1 may be a data replication behavior of the data bearer, or may be a data replication behavior of the user equipment.
  • Operation1, Operation2 and Operation3 are the same, for data replication behavior, Operation4 is data non-replication behavior; or, Operation2, Operation3 and Operation4 are the same, for data non-replication behavior, Operation1 is data replication behavior.
  • the control information of the first network node includes 8 bits. Also, if the 8 bits of the control information of the first network node are xx001101. If the first bit corresponds to the bearer ID of the user equipment, the second bit corresponds to the bearer ID of the user equipment, the third bit corresponds to the bearer ID of the user equipment, and the fourth bit corresponds to the user equipment.
  • the bearer ID 7 and the fifth bit correspond to the bearer ID 8 of the user equipment, and the sixth bit corresponds to the bearer ID 10, the 7th bit, and the 8th bit of the user equipment are invalid bits.
  • the user equipment assumes that the value of the bit corresponding to bearer ID 3 and bearer ID 10 in the bit included in the control information of the second network node, for example, the user equipment assumes that the value of the bit corresponding to bearer ID 3 is 1, then
  • the user equipment according to Table 1 can obtain the behavior of the user equipment for bearer ID 3 as a data replication behavior, and the user equipment assumes that the value of the bit corresponding to bearer ID 10 is 0, then the user equipment can obtain the user equipment for bearer ID 10 according to Table 1.
  • the behavior is that the data does not replicate behavior.
  • the MAC CE sent by the first network node includes 1 byte information, and the 1 byte information is xx001101.
  • Each bit corresponds to one data bearer, if the first bit corresponds to the bearer ID0 of the user equipment, the second bit corresponds to the bearer ID of the user equipment, and the third bit corresponds to the bearer ID of the user equipment.
  • the bit bit corresponds to the bearer ID of the user equipment, the fifth bit corresponds to the bearer ID 8 of the user equipment, the sixth bit corresponds to the bearer ID 10, the 7th bit and the 8th bit of the user equipment are invalid bits.
  • the user equipment assumes that the value of the bit for bearer ID 0 in the 1 byte information included in the MAC CE from the second network node is 1. If Table 1, Operation1, Operation2, and Operation3 are data replication behaviors, Operation4 is data replication behavior. Then, the user equipment can know that the data replication behavior for bearer ID 0 is data replication according to Table 1, the MAC CE sent by the first network node, and the value of the bit for bearer ID 0 assumed by the user equipment. The user equipment determines the data replication behavior of other data bearers in the same way as bearer ID 0, and will not be described here.
  • the user equipment in the case of dual connectivity, when the user equipment only receives the MAC CE of one network node, the user equipment assumes the value of the bit included in the MAC CE sent by another network node, and then the user equipment receives the The value of the bit included in the MAC CE of one of the network nodes to be combined with the value of the bit included in the assumed MAC CE of another network node and a mapping relationship set in advance to define the data copying behavior of the user equipment, so that It can avoid receiving only the MAC CE of one network node, and the user equipment cannot determine the data replication behavior.
  • the value of the bit i is based on the assumption of the value of the bit j.
  • bit j the user equipment assumes that the value of bit i is 1, or, assuming that the value of bit j is 0, the user equipment assumes that the value of bit i is zero.
  • the user equipment assumes that the value of bit j is 1, the user equipment assumes that the value of bit i is 0, or, assuming that the value of bit j is 0, the user equipment assumes that the value of bit i is 1.
  • the value of the bit i is based on the assumption that the RRC signaling is configured for the initial state of data replication.
  • the user equipment assumes that the value of the bit i is 0. Also, if the configuration of the RRC signaling for the initial state of data replication is active, the user equipment assumes that the value of bit i is 1, and so on.
  • the method before the determining, by the user equipment, the data replication behavior of the user equipment according to the control information and the setting rule of the first network node, the method further includes:
  • the user equipment receives control information from the second network node
  • Determining, by the user equipment, the data replication behavior of the user equipment according to the control information and the setting rule of the first network node including:
  • the control information of the node includes one of at least one bit, the bit y being one of at least one bit included in control information of the first network node, the bit x and the bit.
  • the bit y satisfies at least one of the following cases: the bit x and the bit y are in the same position in the control information; the bit x and the bit y are not in the same position in the control information, The bit x and the bit y correspond to the same data bearer.
  • bit x and the position of the bit y in the control information are the same, refer to the implementation manner of whether the bit x and the position of the bit y in the control information are the same, and will not be described here.
  • the user equipment when the user equipment currently receives the MAC CE of one network node and does not receive the MAC CE of another network node, for this case, the user equipment practices that the user equipment maintains the RRC letter.
  • the default state of the indication is changed until the arrival of the MAC CE of another network node, and then the user equipment further defines the data replication behavior of the user equipment according to the MAC CEs from the two network nodes.
  • the MAC CE sent by the first network node includes 1 byte information, and the 1 byte information is xx001101
  • the second The MAC CE sent by the network node includes 1 byte information, and the 1 byte information is xx100101.
  • the first bit corresponds to the bearer ID 0 of the user equipment
  • the second bit corresponds to the bearer ID of the user equipment
  • the third bit corresponds to the bearer ID of the user equipment.
  • the four-bit bit corresponds to the bearer ID 7 of the user equipment
  • the fifth-bit bit corresponds to the bearer ID 8 of the user equipment
  • the sixth-bit bit corresponds to the bearer ID 10
  • the seventh bit and the eighth bit of the user equipment are invalid bits.
  • the first bit corresponds to the bearer ID 0 of the user equipment
  • the second bit corresponds to the bearer ID of the user equipment
  • the third bit corresponds to the bearer ID of the user equipment.
  • the four-bit bit corresponds to the bearer ID 7 of the user equipment
  • the fifth-bit bit corresponds to the bearer ID 8 of the user equipment
  • the sixth-bit bit corresponds to the bearer ID 10
  • the seventh bit and the eighth bit of the user equipment are invalid bits.
  • Operation1, Operation2, and Operation3 in Table 1 are both data replication behaviors, and Operation4 is a data non-replication behavior
  • the user equipment according to the value of the first bit of 1 byte in the MAC CE sent by the first network node, the second network node.
  • the value of the first bit of 1 byte in the transmitted MAC CE and Table 1 it can be known that the data copying behavior for bearer ID 0 is data copying.
  • the user equipment determines the data replication behavior of other data bearers in the same way as bearer ID 0, and will not be described here.
  • FIG. 4 is a user equipment 400 provided by an embodiment of the present application, including: one or more processors, one or more memories, one or more transceivers, and one or more programs;
  • the one or more programs are stored in the memory and configured to be executed by the one or more processors;
  • the program includes instructions for performing the following steps:
  • control information includes at least one bit
  • program includes specifically performing the following steps in determining data copying behavior of the user equipment according to control information and a setting rule of the first network node.
  • bit i Assuming a value of a bit i, the bit i being one of at least one bit included in the control information assumed by the user equipment from the second network node;
  • the bit j being at least one bit included in the control information of the first network node
  • One of the bits, the bit i and the bit j satisfy at least one of the following: the bit i and the bit j are in the same position in the control information; the bit i and the The position of the bit j in the control information is different; the bit i and the bit j correspond to the same data bearer.
  • the value of the bit i is based on the assumption of the value of the bit j.
  • the value of the bit i is based on the assumption that the RRC signaling is configured for the initial state of data replication.
  • control information includes at least one bit
  • program is further configured to perform the following steps before determining the data copying behavior of the user equipment according to the control information and the setting rule of the first network node.
  • the program includes instructions specifically for performing the following steps:
  • the bit x being the control information received by the user equipment from the second network node
  • the bit y being one of at least one bit included in control information of the first network node, the bit x and the bit y satisfying At least one case: the bit x and the bit y are in the same position in the control information; the bit x and the bit y are not in the same position in the control information; the bit x and The bit y corresponds to the same data bearer.
  • the set mapping relationship is a value of one of the bits included in the control information of the first network node, and a value of one of the bits included in the control information of the second network node.
  • the set mapping relationship is a value of one of the bits included in the control information of the first network node, and a value of one of the bits included in the control information of the second network node.
  • the program in receiving control information from the first network node, includes instructions specifically for performing the following steps:
  • the MAC CE including control information.
  • FIG. 5 is a network device 500 according to an embodiment of the present application, including: one or more processors, one or more memories, one or more transceivers, and one or more programs;
  • the one or more programs are stored in the memory and configured to be executed by the one or more processors;
  • the program includes instructions for performing the following steps:
  • control information is used by the user equipment to determine a data replication behavior of the user equipment in conjunction with a setting rule.
  • the program in transmitting control information to the user equipment, includes instructions specifically for performing the following steps:
  • FIG. 6 is a schematic structural diagram of a user equipment 600 according to this embodiment.
  • the user equipment 600 includes a processing unit 601, a communication unit 602, and a storage unit 603, where:
  • the processing unit 601 is configured to receive, by using the communication unit 602, control information from the first network node, and determine, according to the control information and the setting rule of the first network node, a data replication behavior of the user equipment.
  • control information includes at least one bit
  • processing unit 601 is specifically configured to: in the determining, according to the control information and the setting rule of the first network node, the data replication behavior of the user equipment:
  • bit i Assuming a value of a bit i, the bit i being one of at least one bit included in the control information assumed by the user equipment from the second network node;
  • the bit j being at least one bit included in the control information of the first network node
  • One of the bits, the bit i and the bit j satisfy at least one of the following: the bit i and the bit j are in the same position in the control information; the bit i and the The position of the bit j in the control information is different; the bit i and the bit j correspond to the same data bearer.
  • the value of the bit i is based on the assumption of the value of the bit j.
  • the value of the bit i is based on the assumption that the RRC signaling is configured for the initial state of data replication.
  • control information includes at least one bit
  • the processing unit 601 is further configured to receive, by using the communications unit, control information from the second network node;
  • the bit x being the control information received by the user equipment from the second network node
  • the bit y being one of at least one bit included in control information of the first network node, the bit x and the bit y satisfying At least one case: the bit x and the bit y are in the same position in the control information; the bit x and the bit y are not in the same position in the control information; the bit x and The bit y corresponds to the same data bearer.
  • the set mapping relationship is a value of one of the bits included in the control information of the first network node, and a value of one of the bits included in the control information of the second network node.
  • the mapping relationship of data replication behavior is a value of one of the bits included in the control information of the first network node, and a value of one of the bits included in the control information of the second network node.
  • the processing unit 601 is specifically configured to:
  • the MAC CE including control information.
  • the processing unit 601 may be a processor or a controller, and may be, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application specific integrated circuit (Application- Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof, which may be implemented or executed in conjunction with the present disclosure.
  • CPU central processing unit
  • DSP digital signal processor
  • ASIC Application- Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication unit 602 can be a transceiver, a transceiver circuit, a radio frequency chip, a communication interface, etc.
  • the storage unit 603 can be a memory.
  • the processing unit 601 is a processor
  • the communication unit 602 is a communication interface
  • the storage unit 603 is a memory
  • the user equipment involved in the embodiment of the present application may be the user equipment shown in FIG.
  • FIG. 7 is a schematic structural diagram of a network node 700 according to this embodiment.
  • the network node 700 includes a processing unit 701, a communication unit 702, and a storage unit 703, where:
  • the processing unit 701 is configured to send, by using the communication unit 702, control information to the user equipment, where the control information is used by the user equipment to determine a data replication behavior of the user equipment according to a setting rule.
  • the processing unit 701 is specifically configured to:
  • the processing unit 701 may be a processor or a controller, and may be, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application specific integrated circuit (Application- Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof, which may be implemented or executed in conjunction with the present disclosure.
  • CPU central processing unit
  • DSP digital signal processor
  • ASIC Application- Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication unit 702 can be a transceiver, a transceiver circuit, a radio frequency chip, a communication interface, etc.
  • the storage unit 703 can be a memory.
  • the network node involved in the embodiment of the present application may be the network node shown in FIG. 5.
  • the embodiment of the present application further provides a user equipment. As shown in FIG. 8 , for the convenience of description, only parts related to the embodiment of the present application are shown. For details that are not disclosed, refer to the method part of the embodiment of the present application. .
  • the user equipment is a mobile phone as an example:
  • FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a user equipment provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 10 , a memory 20 , an input unit 30 , a display unit 40 , a sensor 50 , an audio circuit 60 , a wireless fidelity (WiFi) module 70 , and a processor 80 .
  • RF radio frequency
  • the structure of the handset shown in FIG. 8 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements.
  • the RF circuit 10 can be used for receiving and transmitting information.
  • RF circuit 10 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuit 10 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • E-mail Short Messaging Service
  • the memory 20 can be used to store software programs and modules, and the processor 80 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 20.
  • the memory 20 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function, and the like; the storage data area may store data created according to usage of the mobile phone, and the like.
  • the memory 20 may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 30 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 30 may include a fingerprint recognition module and other input devices.
  • the fingerprint identification module can collect fingerprint data of the user on it.
  • Other input devices may include, but are not limited to, one or more of a touch screen, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 40 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 40 can include a display screen 41.
  • the display screen 41 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the handset may also include at least one type of sensor 50, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display screen 41 according to the brightness of the ambient light, and the proximity sensor may turn off the display screen 41 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the audio circuit 60, the speaker 61, and the microphone 62 provide an audio interface between the user and the handset.
  • the audio circuit 60 can transmit the converted electrical data of the received audio data to the speaker 61 for conversion to the sound signal by the speaker 61.
  • the microphone 62 converts the collected sound signal into an electrical signal by the audio circuit 60. After receiving, it is converted into audio data, processed by the audio data playback processor 80, sent to the other mobile phone via the RF circuit 10, or played to the memory 20 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone can help users to send and receive emails, browse web pages and access streaming media through the WiFi module 70. It provides users with wireless broadband Internet access.
  • FIG. 8 shows the WiFi module 70, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 80 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 20, and invoking data stored in the memory 20, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 80 may include one or more processing units; preferably, the processor 80 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 80.
  • the handset also includes a power source 90 (such as a battery) that supplies power to the various components.
  • a power source 90 such as a battery
  • the power source can be logically coupled to the processor 80 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the flow of the user equipment in each step method may be implemented based on the structure of the mobile phone.
  • each unit function can be implemented based on the structure of the mobile phone.
  • the embodiment of the present application further provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program for electronic data exchange, wherein the computer program causes the computer to execute a user in the method embodiment as described above Some or all of the steps described by the device.
  • the embodiment of the present application further provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program for electronic data exchange, wherein the computer program causes the computer to execute a network in the method embodiment as described above Some or all of the steps described by the node.
  • the embodiment of the present application further provides a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to execute a user as in the above method Some or all of the steps described by the device.
  • the computer program product can be a software installation package.
  • the embodiment of the present application further provides a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the method embodiment as described above Some or all of the steps described in the network node.
  • the computer program product can be a software installation package.
  • the steps of the method or algorithm described in the embodiments of the present application may be implemented in a hardware manner, or may be implemented by a processor executing software instructions.
  • the software instructions may be composed of corresponding software modules, which may be stored in a random access memory (RAM), a flash memory, a read only memory (ROM), an erasable programmable read only memory ( Erasable Programmable ROM (EPROM), electrically erasable programmable read only memory (EEPROM), registers, hard disk, removable hard disk, compact disk read only (CD-ROM) or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor to enable the processor to read information from, and write information to, the storage medium.
  • the storage medium can also be an integral part of the processor.
  • the processor and the storage medium can be located in an ASIC. Additionally, the ASIC can be located in an access network device, a target network device, or a core network device. Of course, the processor and the storage medium may also exist as discrete components in the access network device, the target network device, or the core network device.
  • the functions described in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the processes or functions described in accordance with embodiments of the present application are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a digital video disc (DVD)), or a semiconductor medium (for example, a solid state disk (SSD)). )Wait.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a digital video disc (DVD)
  • DVD digital video disc
  • SSD solid state disk

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种数据处理方法及相关设备,方法包括用户设备接收来自第一网络节点的控制信息;所述用户设备根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为。采用本申请实施例可以确定用户设备的数据复制行为。

Description

数据处理方法及相关设备 技术领域
本申请涉及通信技术领域,具体涉及一种数据处理方法及相关设备。
背景技术
双连接(Dual connectivity,DC)下,复制数据传输方式采用的是分叉承载(split bearer)的协议架构,对于上下行来说,分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层位于某一个小区(Cell Group,CG),如主小区(Master Cell Group,MCG)或者辅小区(Secondary Cell Group,SCG),该CG即为锚点小区(anchor CG)。发送端设备的PDCP层将PDCP协议数据单元(Protocol Data Unit,PDU)复制为相同的两份,比如一个是PDCP PDU,一个是Duplicated PDCP PDU,两个PDCP PDU经过不同CG的无线链路层控制协议(Radio Link Control,RLC)层和媒体访问控制(Media Access control,MAC)层,在经过空口到达接收端设备相应的MAC层和RLC层,最后再汇聚到PDCP层。在PDCP层监测到两个PDCP PDU为相同的PDU的情况下,此时PDCP层丢弃其中一个PDU,将另外一个PDU递交到高层。
发明内容
本申请实施例提供了一种数据处理方法及相关设备,用于确定用户设备的数据复制行为。
第一方面,本申请实施例提供一种数据处理方法,包括:
用户设备接收来自第一网络节点的控制信息;
所述用户设备根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为。
第二方面,本申请实施例提供一种数据处理方法,包括:
网络节点向用户设备发送控制信息,所述控制信息用于所述用户设备结合设定规则确定所述用户设备的数据复制行为。
第三方面,本申请实施例提供一种用户设备,包括处理单元和通信单元,其中:
所述处理单元,用于通过所述通信单元接收来自第一网络节点的控制信息;根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为。
第四方面,本申请实施例提供一种网络节点,包括处理单元和通信单元,其中:
所述处理单元,用于通过所述通信单元向用户设备发送控制信息,所述控制信息用于所述用户设备结合设定规则确定所述用户设备的数据复制行为。
第五方面,本申请实施例提供一种用户设备,包括一个或多个处理器、一个或多个存储器、一个或多个收发器,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行,所述程序包括用于执行如第一方面所述的方法中的步骤的指令。
第六方面,本申请实施例提供一种网络节点,包括一个或多个处理器、一个或多个存储器、一个或多个收发器,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行,所述程序包括用于执行如第二方面所述的方法中的步骤的指令。
第七方面,本申请实施例提供一种计算机可读存储介质,其存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如第一方面所述的方法。
第八方面,本申请实施例提供一种计算机可读存储介质,其存储用于电子数据交换的 计算机程序,其中,所述计算机程序使得计算机执行如第二方面所述的方法。
第九方面,本申请实施例提供一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如第一方面所述的方法。
第十方面,本申请实施例提供一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如第二方面所述的方法。
本申请的这些方面或其他方面在以下实施例的描述中会更加简明易懂。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种网络构架示意图;
图2是本申请实施例提供的一种数据处理方法;
图3是本申请实施例提供的一种MAC PDU的总体结构示意图;
图4是本申请实施例提供的一种用户设备的结构示意图;
图5是本申请实施例提供的一种网络节点的结构示意图;
图6是本申请实施例提供的另一种用户设备的结构示意图;
图7是本申请实施例提供的另一种网络节点的结构示意图;
图8是本申请实施例提供的另一种用户设备的结构示意图。
具体实施方式
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本申请保护的范围。
以下分别进行详细说明。
本申请的说明书和权利要求书及所述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
下面结合附图对本申请的实施例进行描述。
请参阅图1,图1是本申请实施例公开的一种网络构架的示意图。如图1所示,该网络构架包括主网络节点(master node,MN)110和至少一个辅网络节点120(slave node,SN)。其中,主网络节点110提供基本的网络覆盖130。至少一个辅网络节点120提供相对较小的网络覆盖140。处于主网络节点110和辅网络节点120的共同覆盖范围内的用户设备150(User Equipment,UE)将能够同时与主网络节点110和辅网络节点120建立通信连接。此处,将一个用户设备150与一个主网络节点110和至少一个辅网络节点120之间同时具有相连的情况称之为双连接。在以下描述中,以一个用户设备150与一个主网络 节点110和一个辅网络节点120之间具有双连接的情况为例对本申请的各个实例方式进行描述。然而,本领域技术人员可以理解,以下描述的方案也完全适用于一个用户设备与一个主网络节点和多个辅网络节点之间具有双连接的情况。
其中,用户设备是一种向用户提供语音和/或数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。常见的用户设备例如包括:手机、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,例如智能手表、智能手环、计步器等。
其中,网络节点是指一台电脑或其他设备与一个有独立地址和具有传送或接收数据功能的网络相连。网络节点可以是工作站、客户、网络用户或个人计算机,还可以是服务器、打印机和其他网络连接的设备。每一个工作站﹑服务器、用户设备、网络设备(指网络侧的节点设备,包括但不限于:演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(Base Station Controller,BSC)、基站收发台(Base Transceiver Station,BTS)、家庭基站(例如,Home evolved NodeB,或Home Node B,HNB)、基带单元(BaseBand Unit,BBU)、管理实体(Mobility Management Entity,MME)等等),即拥有自己唯一网络地址的设备都是网络节点。
下面结合图1所示的网络构架对本申请实施例提供的数据处理方法进行详细说明。
在新空口(New radio,NR)现有的讨论中,对于配置了复制数据传输功能的无线承载,可以通过MAC控制元素(control element,CE)动态的激活(activate)或者去激活(de-activate)某一个无线承载的数据复制传输功能。
对于双连接的情况,主网络节点和辅网络节点可以分别发送MAC CE来激活或者去激活用户设备的某一个split bearer的数据复制传输功能。现在的NR讨论已经同意MAC CE包含一个bitmap,且该bitmap为1byte。bitmap中的不同位置分别对应用户设备不同bearer ID,这些bearer ID标示的bearer是配置了数据复制传输功能的bearer。比如用户设备的bearer ID为0,2,3,7,8,10,MAC CE包含的bitmap与bearer ID的对应关系有:bitmap中的第一位对应bearer ID 0,第二位对应bearer ID 2,第三位对应bearer ID 3,第四位对应bearer ID 7,第五位对应bearer ID 8,第六位对应bearer ID 10,第7位和第8为无效位,这种MAC CE包含的bitmap与bearer ID的对应关系为升序对应关系。当然MAC CE包含的bitmap与bearer ID的对应关系也可以为降序对应关系。
由于用户设备接收到的MAC CE可以是主网络节点下发的,也可以是辅网络节点下发的,因此在NR中有可能协议需要用户设备根据主网络节点下发的MAC CE和辅网络节点下发MAC CE共同来定义用户设备的数据复制行为。当用户设备接收到无线资源控制(Radio Resource Control,RRC)信令之后,用户设备应该有一个初始状态。当用户设备接收到一个网络节点下发的MAC CE,但未接收到另一个网络节点下发的MAC CE时,此时用户设备无法根据两个网络节点下发的MAC CE共同来定义用户设备的数据复制行为。
针对上述问题,请参见图2,图2为本申请实施例提供的一种数据处理方法的流程示意图,包括以下步骤:
S201:第一网络节点向用户设备发送控制信息。
在一实施例中,第一网络节点向用户设备发送控制信息的具体实施方式有:第一网络节点向用户设备发送MAC CE,所述MAC CE包括控制信息。
具体地,MAC PDU的总体结构如图3所示,一个MAC PDU由MAC头(MAC header)和MAC负荷(MAC payload)组成。MAC负荷由MAC子业务数据单元(MAC sub-PDU)、MAC CE和可选的填充位(padding)组成。当MAC头、MAC PDU和MAC CE不能填满整个MAC PDU时,MAC PDU中的剩余比特需要有填充比特(padding bit)来进行填充。MAC CE有多种类型,用于传输各种MAC层的控制信息,比如用于功率空间报告(Power Headroom Report)的MAC CE;用于缓存空间报告(Buffer Status Report)的MAC CE; 用于发送定时提前命令(Timing Advance Command)的MAC CE。
本申请中的MAC CE用于传输控制用户设备的数据复制传输功能。第一网络节点向用户设备发送MAC CE的做法有:在第一网络节点有向用户设备下发的数据时,第一网络节点的PDCP层将需要发送的数据封装成PDCP PDU,然后将封装好的PDCP PDU发送给RLC层,然后RLC层将RLC PDU发送给MAC层,MAC层将要发送的控制信息放在MAC CE中与RLC层发送的数据封装成MAC PDU,然后第一网络节点的MAC层将封装好的MAC PDU通过接口下发给用户设备。
S202:用户设备接收来自第一网络节点的控制信息;用户设备根据第一网络节点的控制信息和设定规则确定用户设备的数据复制行为。
在本申请中,第一网络节点可以是主网络节点,也可以是辅网络节点。第二网络节点可以是主网络节点,也可以是辅网络节点。
在一实施例中,用户设备接收来自第一网络节点的控制信息的具体实施方式有:用户设备接收来自第一网络节点的MAC CE,所述MAC CE包括控制信息。
具体地,用户设备的MAC层接收到来自第一网络节点的MAC层下发的MAC PDU,用户设备的MAC层将接收到的MAC PDU进行解复用可得到MAC PDU包括的MAC CE,即可得到MAC CE中包括的控制信息。
由于现在的NR讨论中,对于双连接的情况,主网络节点和辅网络节点可以分别发送MAC CE来激活或者去激活用户设备的某一个split bearer的数据复制功能,且由于用户设备接收到的MAC CE可以是主网络节点下发的,也可以是辅网络节点下发的,因此在NR中有可能协议需要用户设备根据主网络节点下发的MAC CE和辅网络节点下发MAC CE共同来定义用户设备的数据复制行为。另外,现在的NR讨论已经同意MAC CE包含一个bitmap,且该bitmap为1byte。假如MAC CE包括控制信息,那么控制信息可以是MAC CE包括的这1byte的信息。
基于上述的情况,假设第一网络节点是通过MAC CE给用户设备传输控制信息的。假如用户设备当前仅仅只是接收到主网络节点和辅网络节点中的其中一个网络节点发送的MAC CE时,此时由于用户设备没有接收到另一个网络节点发送的MAC CE,用户设备是无法根据两个网络节点下发的MAC CE共同来定义用户设备的数据复制行为。
针对该问题,在一实施例中,本申请的具体做法有:MAC CE包括控制信息,MAC CE包括一个bitmap,该bitmap为1byte,控制信息包括至少一个比特位,所述用户设备根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为的具体实施方式有:
所述用户设备假设比特位i的值,所述比特位i是所述用户设备假设来自第二网络节点的控制信息包括的至少一个比特位中的其中一个;
所述用户设备根据所述比特位i的值、比特位j的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位j是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位i和所述比特位j满足以下至少一种情况:所述比特位i和所述比特位j在控制信息中的位置相同;所述比特位i和所述比特位j在控制信息中的位置不相同;所述比特位i和所述比特位j对应同一个数据承载。
具体地,假设来自第二网络节点的控制信息包括8个比特位,比特位i在这8个比特位中的第4位,又假设来自第一网络节点的控制信息包括8个比特位,比特位j也在这8个比特位中的第4位,那么比特位i和比特位j在控制信息中的位置相同。
具体地,比特位i和所述比特位j在控制信息中的位置不相同,举例来说,假设来自第二网络节点的控制信息包括8个比特位,比特位i在这8个比特位中的第4位,又假设来自第一网络节点的控制信息包括8个比特位,比特位j也在这8个比特位中的第5位,那么比特位i和比特位j在控制信息中的位置不相同。
在一实施例中,设定的映射关系是第一网络节点的控制信息包括的其中一个比特位的值、第二网络节点的控制信息包括的其中一个比特位的值与数据复制行为的映射关系。
其中,该设定的映射关系如表1所示,表1中的Operation可以是数据承载的数据复制行为,也可以是用户设备的数据复制行为。
表1
第一网络节点bit 第二网络节点bit Operation
1 1 Operation1
1 0 Operation2
0 1 Operation3
0 0 Operation4
其中,Operation1、Operation2和Operation3是相同的,为数据复制行为,Operation4为数据不复制行为;或者,Operation2、Operation3和Operation4是相同的,为数据不复制行为,Operation1为数据复制行为。
举例来说,假设第一网络节点的控制信息包括8个比特位。又假如第一网络节点的控制信息的这个8个比特位为xx001101。又假如第一位比特位对应用户设备的bearer ID 0、第二位比特位对应用户设备的bearer ID 2、第三位比特位对应用户设备的bearer ID 3、第四位比特位对应用户设备的bearer ID 7、第五位比特位对应用户设备的bearer ID 8、第六位比特位对应用户设备的bearer ID 10、第7位和第8比特位为无效位。又假如用户设备已经知道第二网络节点对bearer ID 0、bearer ID 2、bearer ID 7和bearer ID 8的控制信息,该种情况下,用户设备只是不知道第二网络节点对bearer ID 3和bearer ID 10的控制信息。此时,用户设备假设来自第二网络节点的控制信息包括的比特位中bearer ID 3和bearer ID10对应的比特位的值,比如,用户设备假设bearer ID 3对应的比特位的值为1,那么用户设备根据表1可得到用户设备针对bearer ID 3的行为为数据复制行为,用户设备假设bearer ID 10对应的比特位的值为0,那么用户设备根据表1可得到用户设备针对bearer ID 10的行为为数据不复制行为。
又举例来说,假如用户设备接收到第一网络节点发送的MAC CE,而没有接收到第二网络节点发送的MAC CE,第一网络节点发送的MAC CE包括1byte信息,这1byte信息为xx001101。每个比特位对应一个数据承载,假如第一位比特位对应用户设备的bearer ID0、第二位比特位对应用户设备的bearer ID 2、第三位比特位对应用户设备的bearer ID 3、第四位比特位对应用户设备的bearer ID 7、第五位比特位对应用户设备的bearer ID 8、第六位比特位对应用户设备的bearer ID 10、第7位和第8比特位为无效位。对于bearer ID 0的数据承载,用户设备假设来自第二网络节点的MAC CE包括的1byte信息中针对bearer ID 0的比特位的值为1。假如表1中Operation1、Operation2和Operation3均为数据复制行为,Operation4为数据不复制行为。那么用户设备根据表1、第一网络节点发送的MAC CE以及用户设备假设的针对bearer ID 0的比特位的值,可以得知针对bearer ID 0的数据复制行为为数据复制。用户设备确定其他数据承载的数据复制行为的做法与bearer ID 0的做法相同,在此不再叙述。
可见,在本申请中,在双连接情况下,用户设备只是接收到一个网络节点的MAC CE时,用户设备假设另个网络节点发送的MAC CE包括的比特位的值,然后用户设备再根据接收到的一个网络节点的MAC CE包括的比特位的值与假设的另一网络节点的MAC CE包括的比特位的值以及事先设定好的一个映射关系共同定义用户设备的数据复制行为,这样既可避免只接收到一个网络节点的MAC CE,用户设备无法确定数据复制行为的情况。
在一实施例中,所述比特位i的值是以所述比特位j的值为依据假设的。
具体地,假设比特位j的值为1,用户设备假设比特位i的值为1,或者,假设比特位j的值为0,用户设备假设比特位i的值为0。或者,假设比特位j的值为1,用户设备假设 比特位i的值为0,或者,假设比特位j的值为0,用户设备假设比特位i的值为1。
在一实施例中,所述比特位i的值是以RRC信令对于数据复制初始状态的配置为依据假设的。
具体地,假如RRC信令对于数据复制初始状态的配置为去激活,用户设备假设比特位i的值为0。又假如RRC信令对于数据复制初始状态的配置为激活,用户设备假设比特位i的值为1,等等。
在一实施例中,控制信息包括至少一个比特位,所述用户设备根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为之前,所述方法还包括:
所述用户设备接收来自所述第二网络节点的控制信息;
所述用户设备根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为,包括:
所述用户设备根据比特位x的值、比特位y的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位x是所述用户设备接收到来自所述第二网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位y是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位x和所述比特位y满足以下至少一种情况:所述比特位x和所述比特位y在控制信息中的位置相同;所述比特位x和所述比特位y在控制信息中的位置不相同,所述比特位x和所述比特位y对应同一个数据承载。
其中,比特位x与比特位y在控制信息中的位置是否相同的具体实现方式可参见上述比特位x与比特位y在控制信息中的位置是否相同的实现方式,在此不再叙述。
具体地,在双连接情况下,当用户设备当前接收到一个网络节点的MAC CE,而未接收到另一个网络节点的MAC CE时,对于该种情况,用户设备的做法是用户设备保持RRC信令指示的默认状态(default state)不变,直到另一网络节点的MAC CE的到来,然后用户设备再根据来自两个网络节点的MAC CE来共同定义用户设备的数据复制行为。
举例来说,假如用户设备接收到第一网络节点发送的MAC CE,以及接收到第二网络节点发送的MAC CE,第一网络节点发送的MAC CE包括1byte信息,这1byte信息为xx001101,第二网络节点发送的MAC CE包括1byte信息,这1byte信息为xx100101。对于第一网络节点发送的MAC CE,第一位比特位对应用户设备的bearer ID 0、第二位比特位对应用户设备的bearer ID 2、第三位比特位对应用户设备的bearer ID 3、第四位比特位对应用户设备的bearer ID 7、第五位比特位对应用户设备的bearer ID 8、第六位比特位对应用户设备的bearer ID 10、第7位和第8比特位为无效位。对于第二网络节点发送的MAC CE,第一位比特位对应用户设备的bearer ID 0、第二位比特位对应用户设备的bearer ID 2、第三位比特位对应用户设备的bearer ID 3、第四位比特位对应用户设备的bearer ID 7、第五位比特位对应用户设备的bearer ID 8、第六位比特位对应用户设备的bearer ID 10、第7位和第8比特位为无效位。假如表1中Operation1、Operation2和Operation3均为数据复制行为,Operation4为数据不复制行为,那么用户设备根据第一网络节点发送的MAC CE中的1byte的第一位比特位的值,第二网络节点发送的MAC CE中的1byte的第一位比特位的值和表1,可以得知针对bearer ID 0的数据复制行为为数据复制。用户设备确定其他数据承载的数据复制行为的做法与bearer ID 0的做法相同,在此不再叙述。
需要说明的,上述示例仅仅用于解释本申请的发明原理,不应构成限定。
请参见图4,图4是本申请实施例提供的一种用户设备400,包括:一个或多个处理器、一个或多个存储器、一个或多个收发器,以及一个或多个程序;
所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行;
所述程序包括用于执行以下步骤的指令:
接收来自第一网络节点的控制信息;
根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为。
在一实施例中,控制信息包括至少一个比特位,在根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为方面,所述程序包括具体用于执行以下步骤的指令:
假设比特位i的值,所述比特位i是所述用户设备假设来自第二网络节点的控制信息包括的至少一个比特位中的其中一个;
根据所述比特位i的值、比特位j的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位j是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位i和所述比特位j满足以下至少一种情况:所述比特位i和所述比特位j在控制信息中的位置相同;所述比特位i和所述比特位j在控制信息中的位置不相同;所述比特位i和所述比特位j对应同一个数据承载。
在一实施例中,所述比特位i的值是以所述比特位j的值为依据假设的。
在一实施例中,所述比特位i的值是以RRC信令对于数据复制初始状态的配置为依据假设的。
在一实施例中,控制信息包括至少一个比特位,在根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为之前,所述程序包括还用于执行以下步骤的指令:
接收来自所述第二网络节点的控制信息;
在根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为方面,所述程序包括具体用于执行以下步骤的指令:
根据比特位x的值、比特位y的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位x是所述用户设备接收到来自所述第二网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位y是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位x和所述比特位y满足以下至少一种情况:所述比特位x和所述比特位y在控制信息中的位置相同;所述比特位x和所述比特位y在控制信息中的位置不相同;所述比特位x和所述比特位y对应同一个数据承载。
在一实施例中,所述设定的映射关系是所述第一网络节点的控制信息包括的其中一个比特位的值、所述第二网络节点的控制信息包括的其中一个比特位的值与用户设备的数据复制行为的映射关系。
在一实施例中,所述设定的映射关系是所述第一网络节点的控制信息包括的其中一个比特位的值、所述第二网络节点的控制信息包括的其中一个比特位的值与数据承载的数据复制行为的映射关系。
在一实施例中,在接收来自第一网络节点的控制信息方面,所述程序包括具体用于执行以下步骤的指令:
接收来自所述第一网络设备的MAC CE,所述MAC CE包括控制信息。
需要说明的是,本实施例所述的内容的具体实现方式可参见上述方法,在此不再叙述。
请参见图5,图5是本申请实施例提供的一种网络设备500,包括:一个或多个处理器、一个或多个存储器、一个或多个收发器,以及一个或多个程序;
所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行;
所述程序包括用于执行以下步骤的指令:
向用户设备发送控制信息,所述控制信息用于所述用户设备结合设定规则确定所述用户设备的数据复制行为。
在一实施例中,在向用户设备发送控制信息方面,所述程序包括具体用于执行以下步骤的指令:
向用户设备发送MAC CE,所述MAC CE包括控制信息。
需要说明的是,本实施例所述的内容的具体实现方式可参见上述方法,在此不再叙述。
请参阅图6,图6是本实施例提供的一种用户设备600的结构示意图。该用户设备600包括处理单元601、通信单元602和存储单元603,其中:
所述处理单元601,用于通过所述通信单元602接收来自第一网络节点的控制信息;根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为。
在一实施例中,控制信息包括至少一个比特位,在根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为方面,所述处理单元601具体用于:
假设比特位i的值,所述比特位i是所述用户设备假设来自第二网络节点的控制信息包括的至少一个比特位中的其中一个;
根据所述比特位i的值、比特位j的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位j是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位i和所述比特位j满足以下至少一种情况:所述比特位i和所述比特位j在控制信息中的位置相同;所述比特位i和所述比特位j在控制信息中的位置不相同;所述比特位i和所述比特位j对应同一个数据承载。
在一实施例中,所述比特位i的值是以所述比特位j的值为依据假设的。
在一实施例中,所述比特位i的值是以RRC信令对于数据复制初始状态的配置为依据假设的。
在一实施例中,控制信息包括至少一个比特位,
所述处理单元601,还用于通过所述通信单元接收来自所述第二网络节点的控制信息;
在根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为方面,所述处理单元601具体用于:
根据比特位x的值、比特位y的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位x是所述用户设备接收到来自所述第二网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位y是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位x和所述比特位y满足以下至少一种情况:所述比特位x和所述比特位y在控制信息中的位置相同;所述比特位x和所述比特位y在控制信息中的位置不相同;所述比特位x和所述比特位y对应同一个数据承载。
在一实施例中,所述设定的映射关系是所述第一网络节点的控制信息包括的其中一个比特位的值、所述第二网络节点的控制信息包括的其中一个比特位的值与数据复制行为的映射关系。
在一实施例中,在接收来自第一网络节点的控制信息方面,所述处理单元601具体用于:
接收来自所述第一网络设备的MAC CE,所述MAC CE包括控制信息。
其中,处理单元601可以是处理器或控制器,(例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC),现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等)。通信单元602可以是收发器、收发电路、射频芯片、通信接口等,存储单元603可以是存储器。
当处理单元601为处理器,通信单元602为通信接口,存储单元603为存储器时,本申请实施例所涉及的用户设备可以为图4所示的用户设备。
请参阅图7,图7是本实施例提供的一种网络节点700的结构示意图。该网络节点700包括处理单元701、通信单元702和存储单元703,其中:
所述处理单元701,用于通过所述通信单元702向用户设备发送控制信息,所述控制信息用于所述用户设备结合设定规则确定所述用户设备的数据复制行为。
在一实施例中,在向用户设备发送控制信息方面,所述处理单元701具体用于:
向用户设备发送MAC CE,所述MAC CE包括控制信息。
其中,处理单元701可以是处理器或控制器,(例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC),现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等)。通信单元702可以是收发器、收发电路、射频芯片、通信接口等,存储单元703可以是存储器。
当处理单元701为处理器,通信单元702为通信接口,存储单元703为存储器时,本申请实施例所涉及的网络节点可以为图5所示的网络节点。
本申请实施例还提供了一种用户设备,如图8所示,为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该用户设备为手机为例:
图8示出的是与本申请实施例提供的用户设备相关的手机的部分结构的框图。参考图8,手机包括:射频(Radio Frequency,RF)电路10、存储器20、输入单元30、显示单元40、传感器50、音频电路60、无线保真(Wireless Fidelity,WiFi)模块70、处理器80、以及电源90等部件。本领域技术人员可以理解,图8中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图8对手机的各个构成部件进行具体的介绍:
RF电路10可用于信息的接收和发送。通常,RF电路10包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路10还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。
存储器20可用于存储软件程序以及模块,处理器80通过运行存储在存储器20的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器20可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序等;存储数据区可存储根据手机的使用所创建的数据等。此外,存储器20可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元30可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元30可包括指纹识别模组以及其他输入设备。 指纹识别模组可采集用户在其上的指纹数据。其他输入设备可以包括但不限于触控屏、物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元40可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元40可包括显示屏41,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示屏41。
手机还可包括至少一种传感器50,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示屏41的亮度,接近传感器可在手机移动到耳边时,关闭显示屏41和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路60、扬声器61,传声器62可提供用户与手机之间的音频接口。音频电路60可将接收到的音频数据转换后的电信号,传输到扬声器61,由扬声器61转换为声音信号播放;另一方面,传声器62将收集的声音信号转换为电信号,由音频电路60接收后转换为音频数据,再将音频数据播放处理器80处理后,经RF电路10以发送给比如另一手机,或者将音频数据播放至存储器20以便进一步处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块70可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图8示出了WiFi模块70,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器80是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器20内的软件程序和/或模块,以及调用存储在存储器20内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器80可包括一个或多个处理单元;优选的,处理器80可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器80中。
手机还包括给各个部件供电的电源90(比如电池),优选的,电源可以通过电源管理系统与处理器80逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。
前述图2所示的实施例中,各步骤方法中用户设备的流程可以基于该手机的结构实现。
前述图6所示的实施例中,各单元功能可以基于该手机的结构实现。
本申请实施例还提供了一种计算机可读存储介质,其中,所述计算机可读存储介质存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如上述方法实施例中用户设备所描述的部分或全部步骤。
本申请实施例还提供了一种计算机可读存储介质,其中,所述计算机可读存储介质存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如上述方法实施例中网络节点所描述的部分或全部步骤。
本申请实施例还提供了一种计算机程序产品,其中,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如上述方法中用户设备所描述的部分或全部步骤。该计算机程序产品可以为一个软件安装包。
本申请实施例还提供了一种计算机程序产品,其中,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如上述方法实施例中网络节点所描述的部分或全部步骤。该计算机程序产品可以为一个软件安装包。
本申请实施例所描述的方法或者算法的步骤可以以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器(Random Access Memory,RAM)、闪存、只读存储器(Read Only Memory,ROM)、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、电可擦可编程只读存储器(Electrically EPROM,EEPROM)、寄存器、硬盘、移动硬盘、只读光盘(CD-ROM)或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于接入网设备、目标网络设备或核心网设备中。当然,处理器和存储介质也可以作为分立组件存在于接入网设备、目标网络设备或核心网设备中。
本领域技术人员应该可以意识到,在上述一个或多个示例中,本申请实施例所描述的功能可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(Digital Subscriber Line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,数字视频光盘(Digital Video Disc,DVD))、或者半导体介质(例如,固态硬盘(Solid State Disk,SSD))等。
以上所述的具体实施方式,对本申请实施例的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本申请实施例的具体实施方式而已,并不用于限定本申请实施例的保护范围,凡在本申请实施例的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本申请实施例的保护范围之内。

Claims (20)

  1. 一种数据处理方法,其特征在于,包括:
    用户设备接收来自第一网络节点的控制信息;
    所述用户设备根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为。
  2. 根据权利要求1所述的方法,其特征在于,所述控制信息包括至少一个比特位,所述用户设备根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为,包括:
    所述用户设备假设比特位i的值,所述比特位i是所述用户设备假设来自第二网络节点的控制信息包括的至少一个比特位中的其中一个;
    所述用户设备根据所述比特位i的值、比特位j的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位j是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位i和所述比特位j满足以下至少一种情况:所述比特位i和所述比特位j在控制信息中的位置相同;所述比特位i和所述比特位j在控制信息中的位置不相同;所述比特位i和所述比特位j对应同一个数据承载。
  3. 根据权利要求2所述的方法,其特征在于,所述比特位i的值是以所述比特位j的值为依据假设的。
  4. 根据权利要求2所述的方法,其特征在于,所述比特位i的值是以无线资源控制协议RRC信令对于数据复制初始状态的配置为依据假设的。
  5. 根据权利要求1所述的方法,其特征在于,所述控制信息包括至少一个比特位,所述方法还包括:
    所述用户设备接收来自所述第二网络节点的控制信息;
    所述用户设备根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为,包括:
    所述用户设备根据比特位x的值、比特位y的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位x是所述用户设备接收到来自所述第二网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位y是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位x和所述比特位y满足以下至少一种情况:所述比特位x和所述比特位y在控制信息中的位置相同;所述比特位x和所述比特位y在控制信息中的位置不相同;所述比特位x和所述比特位y对应同一个数据承载。
  6. 根据权利要求2-5任一项所述的方法,其特征在于,所述设定的映射关系是所述第一网络节点的控制信息包括的其中一个比特位的值、所述第二网络节点的控制信息包括的其中一个比特位的值与用户设备的数据复制行为的映射关系。
  7. 根据权利要求2-5任一项所述的方法,其特征在于,所述设定的映射关系是所述第一网络节点的控制信息包括的其中一个比特位的值、所述第二网络节点的控制信息包括的其中一个比特位的值与数据承载的数据复制行为的映射关系。
  8. 根据权利要求1-6任一项所述的方法,其特征在于,所述用户设备接收来自第一网络节点的控制信息,包括:
    所述用户设备接收来自所述第一网络设备的MAC CE,所述MAC CE包括控制信息。
  9. 一种数据处理方法,其特征在于,包括:
    网络节点向用户设备发送控制信息,所述控制信息用于所述用户设备结合设定规则确定所述用户设备的数据复制行为。
  10. 根据权利要求9所述的方法,其特征在于,所述网络节点向用户设备发送控制信 息,包括:
    所述网络节点向用户设备发送MAC CE,所述MAC CE包括控制信息。
  11. 一种用户设备,其特征在于,包括处理单元和通信单元,其中:
    所述处理单元,用于通过所述通信单元接收来自第一网络节点的控制信息;根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为。
  12. 根据权利要求11所述的用户设备,其特征在于,所述控制信息包括至少一个比特位,所述处理单元具体用于:
    假设比特位i的值,所述比特位i是所述用户设备假设来自第二网络节点的控制信息包括的至少一个比特位中的其中一个;
    根据所述比特位i的值、比特位j的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位j是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位i和所述比特位j满足以下至少一种情况:所述比特位i和所述比特位j在控制信息中的位置相同;所述比特位i和所述比特位j在控制信息中的位置不相同;所述比特位i和所述比特位j对应同一个数据承载。
  13. 根据权利要求12所述的用户设备,其特征在于,所述比特位i的值是以所述比特位j的值为依据假设的。
  14. 根据权利要求13所述的用户设备,其特征在于,所述比特位i的值是以无线资源控制协议RRC信令对于数据复制初始状态的配置为依据假设的。
  15. 根据权利要求11所述的用户设备,其特征在于,所述控制信息包括至少一个比特位,
    所述处理单元,还用于通过所述通信单元接收来自所述第二网络节点的控制信息;
    在根据所述第一网络节点的控制信息和设定规则确定所述用户设备的数据复制行为方面,所述处理单元具体用于:
    根据比特位x的值、比特位y的值以及设定的映射关系确定所述用户设备的数据复制行为,所述比特位x是所述用户设备接收到来自所述第二网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位y是所述第一网络节点的控制信息包括的至少一个比特位中的其中一个,所述比特位x和所述比特位y满足以下至少一种情况:所述比特位x和所述比特位y在控制信息中的位置相同;所述比特位x和所述比特位y在控制信息中的位置不相同;所述比特位x和所述比特位y对应同一个数据承载。
  16. 一种网络节点,其特征在于,包括处理单元和通信单元,其中:
    所述处理单元,用于通过所述通信单元向用户设备发送控制信息,所述控制信息用于所述用户设备结合设定规则确定所述用户设备的数据复制行为。
  17. 一种用户设备,其特征在于,包括一个或多个处理器、一个或多个存储器、一个或多个收发器,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行,所述程序包括用于执行如权利要求1-8任一项所述的方法中的步骤的指令。
  18. 一种网络节点,其特征在于,包括一个或多个处理器、一个或多个存储器、一个或多个收发器,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述一个或多个处理器执行,所述程序包括用于执行如权利要求9或10所述的方法中的步骤的指令。
  19. 一种计算机可读存储介质,其特征在于,其存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如权利要求1-8任一项所述的方法。
  20. 一种计算机可读存储介质,其特征在于,其存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如权利要求9或10所述的方法。
PCT/CN2018/072248 2017-09-22 2018-01-11 数据处理方法及相关设备 WO2019056666A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2020509046A JP2020534722A (ja) 2017-09-22 2018-01-11 データ処理方法及び関連装置
KR1020207004883A KR20200054947A (ko) 2017-09-22 2018-01-11 데이터 처리 방법 및 관련 장치
CN201880060987.2A CN111133781B (zh) 2017-09-22 2018-01-11 数据处理方法及相关设备
EP18858937.8A EP3641364A4 (en) 2017-09-22 2018-01-11 DATA PROCESSING METHOD AND RELATED DEVICE
US16/630,637 US11083006B2 (en) 2017-09-22 2018-01-11 Data processing method and related device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNPCT/CN2017/103022 2017-09-22
PCT/CN2017/103022 WO2019056325A1 (zh) 2017-09-22 2017-09-22 数据处理方法及相关设备

Publications (1)

Publication Number Publication Date
WO2019056666A1 true WO2019056666A1 (zh) 2019-03-28

Family

ID=65809945

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2017/103022 WO2019056325A1 (zh) 2017-09-22 2017-09-22 数据处理方法及相关设备
PCT/CN2018/072248 WO2019056666A1 (zh) 2017-09-22 2018-01-11 数据处理方法及相关设备

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/103022 WO2019056325A1 (zh) 2017-09-22 2017-09-22 数据处理方法及相关设备

Country Status (6)

Country Link
US (2) US11234261B2 (zh)
EP (2) EP3641479A4 (zh)
JP (2) JP2021502008A (zh)
KR (2) KR20200054945A (zh)
CN (2) CN111149418B (zh)
WO (2) WO2019056325A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144484A (zh) * 2013-05-10 2014-11-12 上海贝尔股份有限公司 支持多连接的移动通信上行系统中构建数据单元的方法
CN104602294A (zh) * 2013-11-01 2015-05-06 上海贝尔股份有限公司 双连接通信系统中用于传输rlc状态pdu的方法
CN105323852A (zh) * 2014-07-28 2016-02-10 中兴通讯股份有限公司 上行承载的修改方法及装置
CN105659690A (zh) * 2013-10-21 2016-06-08 Lg电子株式会社 在双连接中发送上行链路数据的方法及其设备
CN107147479A (zh) * 2017-04-27 2017-09-08 电信科学技术研究院 一种进行重复传输控制的方法和设备

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110036479A (ko) * 2009-10-01 2011-04-07 삼성전자주식회사 이동통신 시스템에서 harq 피드백을 처리하는 방법 및 장치
US10004098B2 (en) 2014-01-29 2018-06-19 Samsung Electronics Co., Ltd. Method and apparatus for transmitting and receiving data using a plurality of carriers in mobile communication system
US10045332B2 (en) 2014-05-09 2018-08-07 Qualcomm Incorporated UE autonomous radio resource configuration extension
US9674853B2 (en) 2014-05-16 2017-06-06 Qualcomm Incorporated Techniques for managing wireless network connections for traffic aggregation
CN106470503A (zh) 2015-08-14 2017-03-01 中国电信股份有限公司 连接方法、连接设备、用户设备以及连接系统
CN106817777B (zh) 2015-12-01 2022-01-28 中兴通讯股份有限公司 辅基站SeNB的处理方法及装置
CN105591874B (zh) * 2015-12-22 2020-10-13 新华三技术有限公司 一种数据发送方法及装置
JP6790124B2 (ja) * 2016-05-13 2020-11-25 テレフオンアクチーボラゲット エルエム エリクソン(パブル) アダプティブ送信時間間隔長
US10448408B2 (en) * 2016-08-04 2019-10-15 Samsung Electronics Co., Ltd. Method and apparatus for coordinating multi-point transmission in advanced wireless systems
ES2875769T3 (es) * 2017-03-03 2021-11-11 Guangdong Oppo Mobile Telecommunications Corp Ltd Método y dispositivo de transmisión de datos
WO2018172136A1 (en) * 2017-03-23 2018-09-27 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Reliable data packet transmission among entities of a radio access network of a mobile communication network
CN108924876B (zh) * 2017-03-24 2024-05-10 华为技术有限公司 数据传输方法、接入网设备、终端及通信系统
RU2740161C1 (ru) 2017-06-16 2021-01-12 Гуандун Оппо Мобайл Телекоммьюникейшнс Корп., Лтд. Способ передачи данных, оконечное устройство и сетевое устройство
US10523374B2 (en) * 2017-08-07 2019-12-31 Nokia Technologies Oy Repetition process cycling for grant-less or grant-based transmission
US10461896B2 (en) * 2017-09-08 2019-10-29 At&T Intellectual Property I, L.P. Configuration of repetition factors for transmitting feedback data for 5G or other next generation network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144484A (zh) * 2013-05-10 2014-11-12 上海贝尔股份有限公司 支持多连接的移动通信上行系统中构建数据单元的方法
CN105659690A (zh) * 2013-10-21 2016-06-08 Lg电子株式会社 在双连接中发送上行链路数据的方法及其设备
CN104602294A (zh) * 2013-11-01 2015-05-06 上海贝尔股份有限公司 双连接通信系统中用于传输rlc状态pdu的方法
CN105323852A (zh) * 2014-07-28 2016-02-10 中兴通讯股份有限公司 上行承载的修改方法及装置
CN107147479A (zh) * 2017-04-27 2017-09-08 电信科学技术研究院 一种进行重复传输控制的方法和设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3641364A4 *

Also Published As

Publication number Publication date
CN111149418A (zh) 2020-05-12
EP3641364A1 (en) 2020-04-22
EP3641364A4 (en) 2020-05-27
US20200146043A1 (en) 2020-05-07
KR20200054947A (ko) 2020-05-20
US20200169499A1 (en) 2020-05-28
CN111133781A (zh) 2020-05-08
WO2019056325A1 (zh) 2019-03-28
US11083006B2 (en) 2021-08-03
JP2021502008A (ja) 2021-01-21
CN111133781B (zh) 2024-05-14
EP3641479A4 (en) 2020-07-22
EP3641479A1 (en) 2020-04-22
JP2020534722A (ja) 2020-11-26
KR20200054945A (ko) 2020-05-20
US11234261B2 (en) 2022-01-25
CN111149418B (zh) 2024-02-23

Similar Documents

Publication Publication Date Title
JP7239693B2 (ja) ベアラの制御方法、端末及びネットワーク側機器
JP2022502954A (ja) データ伝送方法及び通信機器
US11895011B2 (en) Data transmission method and related product
TWI680664B (zh) 資料處理方法及設備
WO2018195924A1 (zh) 网络连接配置方法及相关产品
WO2019024076A1 (zh) 数据调度方法及相关设备
WO2019028814A1 (zh) 测量上报控制方法及相关产品
WO2019019123A1 (zh) 重配置方法及相关产品
WO2020192673A1 (zh) 资源配置方法、资源确定方法、网络侧设备和终端
WO2019028866A1 (zh) 数据传输方法及相关产品
WO2019028876A1 (zh) 数据传输方法及相关产品
WO2019056666A1 (zh) 数据处理方法及相关设备
WO2020088578A1 (zh) 分离承载的控制方法及相关设备
CN109716814B (zh) 数据传输方法及相关设备
WO2018152674A1 (zh) 一种数据传输方法、终端、网络侧设备及系统
WO2019028872A1 (zh) 数据传输方法及相关产品
WO2019019124A1 (zh) 重配置方法及相关产品
WO2019028880A1 (zh) 数据处理方法及相关设备
WO2019080092A1 (zh) 多比特信息复用传输方法及相关产品
WO2019028859A1 (zh) 数据处理方法及相关设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18858937

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018858937

Country of ref document: EP

Effective date: 20200116

ENP Entry into the national phase

Ref document number: 2020509046

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE