WO2019075665A1 - 无线回传的实现方法、装置及基站 - Google Patents

无线回传的实现方法、装置及基站 Download PDF

Info

Publication number
WO2019075665A1
WO2019075665A1 PCT/CN2017/106713 CN2017106713W WO2019075665A1 WO 2019075665 A1 WO2019075665 A1 WO 2019075665A1 CN 2017106713 W CN2017106713 W CN 2017106713W WO 2019075665 A1 WO2019075665 A1 WO 2019075665A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
access
backhaul
wired
request message
Prior art date
Application number
PCT/CN2017/106713
Other languages
English (en)
French (fr)
Inventor
洪伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to EP17929241.2A priority Critical patent/EP3687240B1/en
Priority to PCT/CN2017/106713 priority patent/WO2019075665A1/zh
Priority to CN201780001686.8A priority patent/CN108370497B/zh
Publication of WO2019075665A1 publication Critical patent/WO2019075665A1/zh
Priority to US16/849,440 priority patent/US11330643B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/12Interfaces between hierarchically different network devices between access points and access point controllers

Definitions

  • the present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, and a base station for implementing wireless backhaul.
  • the base station transmitting in the high frequency band is generally a small cell. If a traditional wired backhaul link, such as a fiber link, is configured for each small base station, the cost is high, and the backhaul link is deployed. complex.
  • a scheme of integrated backhaul and backhaul that is, data transmission between the base station and the user equipment (User Equipment, UE for short) and the base station are proposed.
  • the data transmission between the core network and the core network is transmitted over the wireless link using the same wireless communication system protocol.
  • a new wireless backhaul implementation scheme is required for the 5G system to ensure that only The base station with wireless backhaul capability can also implement backhaul through the base station with wired backhaul capability.
  • the embodiments of the present disclosure provide a method, an apparatus, and a base station for implementing wireless backhaul, to implement a wireless connection between a base station having only wireless backhaul capability and a base station having wired backhaul capability. , to achieve wireless backhaul.
  • a method for implementing a wireless backhaul is provided, which is applied to a second base station having a wired backhaul capability, where the method includes:
  • the available wired bandwidth based on the wired backhaul link with the core network is determined to be Whether the first base station is allowed to access, including:
  • the access request message further carries a minimum backhaul bandwidth
  • Determining whether the first base station is allowed to access based on the available wired bandwidth of the wired backhaul link with the core network includes:
  • a method for implementing a wireless backhaul is applied to a first base station that has only wireless backhaul capability, and the method includes:
  • the second base station When the second base station with the wired backhaul capability is searched, the second base station sends an access request message, where the access request message carries the identity identification information;
  • a wireless connection with the second base station is established when the response message for allowing access is monitored, and the wireless connection is used to implement wireless backhaul of the first base station.
  • the access request message further carries a minimum backhaul bandwidth.
  • the method further includes:
  • a broadcast message is sent, the broadcast message being used for access by a user equipment having access requirements.
  • the method further includes:
  • an apparatus for implementing wireless backhaul is provided, which is applied to a second base station having wired backhaul capability, where the apparatus includes:
  • the receiving module is configured to receive an access request message, where the access request message carries identity identification information;
  • a determining module configured to determine, based on the identity identification information carried in the receiving request message received by the receiving module, that the device requesting access is a first base station having only wireless backhaul capability, based on the core
  • the available wired bandwidth of the wired backhaul link between the networks determines whether the first base station is allowed to access
  • the first sending module is configured to return a response message to the first base station, where the response message is used to indicate whether the first base station is allowed to access.
  • the determining module comprises:
  • the first determining submodule is configured to determine that the first base station is allowed to access if the available wired bandwidth is higher than a preset threshold
  • the second determining submodule is configured to determine to reject the first base station access if the available wired bandwidth is not higher than a preset threshold.
  • the access request message further carries a minimum backhaul bandwidth
  • the determining module includes:
  • a third determining submodule configured to determine that the first base station is allowed to access if the available wired bandwidth is higher than the minimum backhaul bandwidth
  • a fourth determining submodule configured to determine to reject the first base station access if the available wired bandwidth is not higher than the minimum backhaul bandwidth.
  • a device for implementing wireless backhaul which is applied to a first base station having only wireless backhaul capability, the device comprising:
  • the second sending module is configured to: when the second base station with the wired backhaul capability is searched, send an access request message to the second base station, where the access request message carries the identity identification information;
  • the monitoring module is configured to listen to the response message returned by the second base station based on the identity identification information carried in the access request message sent by the second sending module;
  • Establishing a module configured to establish a wireless connection with the second base station when the listening module listens to a response message for allowing access, the wireless connection is used to implement wireless backhaul of the first base station .
  • the access request message further carries a minimum backhaul bandwidth.
  • the apparatus further includes:
  • the third sending module is configured to send a broadcast message after the wireless connection with the second base station is established, where the broadcast message is used for user equipment with access requirements.
  • the apparatus further includes:
  • the search module is configured to continue to search for other base stations having wired backhaul capability when listening to the response message rejecting the access.
  • a base station including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a base station including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the second base station When the second base station with the wired backhaul capability is searched, the second base station sends an access request message, where the access request message carries the identity identification information;
  • a wireless connection with the second base station is established when the response message for allowing access is monitored, and the wireless connection is used to implement wireless backhaul of the first base station.
  • a non-transitory computer readable storage medium having stored thereon computer instructions that, when executed by a processor, implement the following steps:
  • a non-transitory computer readable storage medium having stored thereon computer instructions that, when executed by a processor, implement the following steps:
  • the second base station When the second base station with the wired backhaul capability is searched, the second base station sends an access request message, where the access request message carries the identity identification information;
  • a wireless connection with the second base station is established when the response message for allowing access is monitored, and the wireless connection is used to implement wireless backhaul of the first base station.
  • the second base station having the wired backhaul capability may determine, based on the identity identification information in the access request message, that the device requesting access is the first base station with wireless backhaul capability,
  • the available wired bandwidth of the wired backhaul link with the core network determines whether the first base station is allowed to access, and returns a corresponding response message based on the judgment result, thereby implementing the first base station having only the wireless backhaul capability and having the A wireless connection is established between the second base stations of the wired backhaul capability to implement wireless backhaul.
  • FIG. 1A is a flowchart of a method for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 1B is a first application scenario diagram of a method for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 1C is a second application scenario diagram of a method for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 2 is a flowchart of still another implementation method of wireless backhaul according to an exemplary embodiment.
  • FIG. 3 is a flowchart of still another method for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 4 is a flowchart of a method for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 5 is a flowchart of still another implementation method of wireless backhaul according to an exemplary embodiment.
  • FIG. 6 is a block diagram of an apparatus for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 7 is a block diagram of another apparatus for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 8 is a block diagram of an apparatus for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 9 is a block diagram of another apparatus for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. 10 is a block diagram of an implementation apparatus suitable for wireless backhaul, according to an exemplary embodiment.
  • the base network coverage area in FIG. 1B has a base station with wired backhaul capability, such as the base station indicated by reference numeral 11.
  • a wired backhaul link is deployed between the base station having the wired backhaul capability and the core network; and the base station has a base station with wireless backhaul capability, and the base station indicated by the flag 12 is a base station with wireless backhaul capability.
  • FIG. 1A is a flowchart of a method for implementing wireless backhaul according to an exemplary embodiment
  • FIG. 1B is a first application scenario of a method for implementing wireless backhaul according to an exemplary embodiment.
  • FIG. FIG. 2 is an application scenario diagram of a method for implementing wireless backhaul according to an exemplary embodiment.
  • the method for implementing the wireless backhaul can be applied to a base station with wired backhaul capability, as shown in FIG. 1A.
  • the implementation of the passback includes the following steps 101-103:
  • step 101 an access request message is received, and the access request message carries identity identification information.
  • the access request message may be the first message MSG1 of the random access procedure in the related art or the third message MSG3 of the random access procedure, and may carry the identity of the device in the access request message.
  • the information, the identity information is used to indicate the device type of the device that requests the access; in an embodiment, the device type may be a base station with wireless backhaul capability or a user equipment. In an embodiment, if the device requesting access is a base station with wireless backhaul capability, the identity request information may be carried in the access request message, and if the device requesting access is an ordinary user equipment, the device may not be connected.
  • the incoming request message carries the identity information.
  • the access request message may also be a newly defined one-only message, and is used by a base station with wireless backhaul capability when requesting to establish a wireless connection with a base station having wired backhaul capability, and accessing
  • the request message may also carry identity information, indicating that the requesting access is a base station with wireless backhaul capability.
  • step 102 when determining, based on the identity information, that the device requesting access is the first base station having only the wireless backhaul capability, determining whether to allow the first based on the available wired bandwidth of the wired backhaul link with the core network. Base station access.
  • the second base station having the wired backhaul capability may be based on the available wired bandwidth of the wired backhaul link with the core network device based on the total wired bandwidth and the used bandwidth of the wired backhaul link. The difference is obtained.
  • the total bandwidth of the wired backhaul link is 6.4 GB/s
  • the used bandwidth is 3.2 GB/s
  • the remaining available wired bandwidth is 3.2 GB/s.
  • the implementation manner of determining whether to allow access by the first base station based on the available wired bandwidth of the wired backhaul link between the core network can be referred to the description of the embodiment shown in FIG. 2 and FIG. Detailed.
  • step 103 a response message is returned to the first base station, where the response message is used to indicate whether the first base station is allowed to access.
  • the response message is corresponding to the second message MSG2, where the indication information of whether the first base station is allowed to be accessed is carried in the In an embodiment, if the access request message is the third message MSG3 in the random access procedure, the response message may be Considering the fourth message MSG4 of the random access procedure, carrying indication information of whether to allow access by the first base station, based on the fourth message MSG4, establishing a wireless connection between the first base station and the second base station, That is, data and signaling connections.
  • the response message may also be a new response message corresponding to the dedicated message.
  • the first base station can establish a wireless connection with the second base station, and the first base station can use the wireless connection.
  • the backhaul data is sent to the second base station, and the second base station is further transmitted to the core network device through a wired backhaul link, such as a fiber link, thereby implementing wireless backhaul of the first base station.
  • the device 30 has a wired backhaul link
  • the second base station 20 can receive the access request message, and based on the identity information in the access request message, determine that the device requesting access is the first one with wireless backhaul capability.
  • the second base station 20 can allow the first base station 10 to access based on its current state, such as the current available wired bandwidth determination.
  • the first base station 10 passes and The wireless connection between the second base stations 20 of the wired backhaul capability enables wireless backhaul.
  • the second base station having the wired backhaul capability determines, according to the identity identification information in the access request message, that the device requesting access is wireless.
  • the first base station of the backhaul capability may determine whether to allow the first base station to access based on the available wired bandwidth of the wired backhaul link with the core network, and return a corresponding response message based on the judgment result, thereby achieving only A wireless connection is established between the first base station having the wireless backhaul capability and the second base station having the wired backhaul capability to implement wireless backhaul.
  • FIG. 2 is a flowchart of still another method for implementing wireless backhaul according to an exemplary embodiment.
  • This embodiment uses the foregoing method provided by the embodiment of the present disclosure to determine whether a base station having wired backhaul capability is allowed to be provided.
  • the base station access of the wireless backhaul capability is exemplified as an example. As shown in FIG. 2, the following steps are included:
  • step 201 an access request message is received, where the access request message carries identity identification information.
  • step 202 when determining, based on the identity information, that the device requesting access is the first base station having only the wireless backhaul capability, determining whether to allow the first based on the available wired bandwidth of the wired backhaul link with the core network.
  • the base station accesses, and step 203 or step 205 is performed.
  • step 201 and step 202 can be referred to the description of step 101 and step 102 of the embodiment shown in FIG. 1A, and details are not described herein.
  • step 203 if the available wired bandwidth is higher than the preset threshold, it is determined that the first base station is allowed to access, and step 204 is performed.
  • the preset threshold may be a fixed value, pre-configured by the system or set by the base station itself.
  • the second base station with the wired backhaul capability also needs to serve the user equipment.
  • the second base station In order to serve the user equipment that has been accessed or to be accessed, the second base station needs to reserve a wired bandwidth that is not lower than the preset threshold. For example, if the available wired bandwidth of the wired backhaul link of the second base station is 3.2 GB/s and the preset threshold is 1.6 GB/s, the second base station may determine to allow the first base station to access.
  • the preset threshold may be a dynamically changing value
  • the second base station determines the user equipment to be accessed based on the number of user equipments currently accessed by the second base station and/or based on historical access information.
  • the determined number of wired bandwidths for serving the user equipment For example, the second base station determines the wired bandwidth of the serving user equipment based on the number of accessed user equipments and/or the number of user equipments to be accessed. 3.2GB/s, while the wired bandwidth currently used for serving user equipment is 1.8GB/s, the preset threshold can be set to 1.4GB/s, and the current available wired bandwidth is 3.2GB/s, which is higher than 1.4. GB/s, so the second base station can determine to allow access by the first base station.
  • step 204 a response message is returned to the first base station, and the response message indicates that the first base station is allowed to access, and the process ends.
  • step 204 can be referred to the description of step 103 of the embodiment shown in FIG. 1A, and will not be described in detail herein.
  • step 205 if the available wired bandwidth is not higher than the preset threshold, it is determined to reject the first base station access.
  • step 203 for the description of the preset threshold, refer to the description of step 203, which will not be described in detail herein.
  • step 206 a response message is returned to the first base station, and the response message is used to indicate that the first base station is not allowed to access.
  • the first base station having the wired backhaul capability may determine whether to allow the comparison based on the comparison between the available wired bandwidth and the preset threshold.
  • the first base station is connected, and the preset threshold value may be a fixed value or a dynamically changed value, and the second base station reserves the reserved for the user equipment that is accessed or to be accessed, thereby implementing the
  • the second base station determines whether to allow access by the first base station on the premise that it does not affect the serving user equipment, so as to prevent the second base station from accessing the first base station caused by the first base station when the first base station is not allowed to access the first base station and The second base station cannot serve the user normally. Prepared questions.
  • FIG. 3 is a flowchart of a method for implementing wireless backhaul according to an exemplary embodiment of the present disclosure.
  • the present embodiment uses the foregoing method provided by an embodiment of the present disclosure to determine whether a base station with wired backhaul capability is allowed to have wireless.
  • the base station access of the backhaul capability is exemplified as an example. As shown in FIG. 3, the following steps are included:
  • step 301 an access request message is received, where the access request message carries identity identification information.
  • step 302 when determining, based on the identity information, that the device requesting access is the first base station having only the wireless backhaul capability, determining whether to allow the first based on the available wired bandwidth of the wired backhaul link with the core network.
  • the base station accesses, and step 303 or step 305 is performed.
  • step 301 and step 302 can be referred to the description of step 101 and step 102 of the embodiment shown in FIG. 1A, and details are not described herein.
  • step 303 if the available wired bandwidth is higher than the minimum backhaul bandwidth, it is determined that the first base station is allowed to access, and step 304 is performed.
  • the access request message may further carry a minimum backhaul bandwidth required by the first base station, such as a minimum backhaul bandwidth required by the first base station is 0.8 GB/s, and the remaining remaining information of the second base station is available.
  • the wired bandwidth is 1.6 GB/s, and the second base station can determine to allow the first base station to access.
  • step 304 a response message is returned to the first base station, and the response message indicates that the first base station is allowed to access, and the process ends.
  • step 204 can be referred to the description of step 103 of the embodiment shown in FIG. 1A, and will not be described in detail herein.
  • step 305 if the available wired bandwidth is not higher than the minimum backhaul bandwidth, it is determined to reject the first base station access.
  • step 306 a response message is returned to the first base station, and the response message is used to indicate that the first base station is not allowed to access.
  • the second base station may determine whether to allow the first base station to access based on the minimum backhaul bandwidth and the available wired bandwidth of the first base station that is requested to access, so as to enable the first base station after allowing the first base station to access.
  • the backhaul bandwidth is not lower than the minimum backhaul bandwidth, and the first base station can implement normal wireless backhaul after accessing the second base station, thereby ensuring data transmission efficiency.
  • FIG. 4 is a flowchart of a method for implementing wireless backhaul according to an exemplary embodiment.
  • the method for implementing wireless backhaul in this embodiment may be applied to a base station with wireless backhaul capability, as shown in FIG. , including the following steps 401-403:
  • step 401 when the second base station with the wired backhaul capability is searched, the second base station sends an access request message, where the access request message carries the identity identification information.
  • the identity information is used to indicate that the second base station itself is a base station with wireless backhaul capability, rather than an ordinary user equipment.
  • the access request message may be the first message MSG1 of the random access procedure in the related art or the third message MSG3 of the random access procedure.
  • the access request message may also be a newly defined one-only message, and is used by a base station with wireless backhaul capability when requesting to establish a wireless connection with a base station having wired backhaul capability, and accessing
  • the request message may also carry identity information, indicating that the requesting access is a base station with wireless backhaul capability.
  • step 402 the response message returned by the second base station based on the identity information is monitored.
  • the response message may be the second message MSG2 in the random access procedure; in an embodiment, if the access is The request message is the third message MSG3 in the random access procedure, and the response message may be the fourth message MSG4 of the random access procedure.
  • the response message may also be a new response message corresponding to the dedicated message.
  • step 403 when the response message for allowing access is monitored, a wireless connection with the second base station is established, and the wireless connection is used to implement wireless backhaul of the first base station.
  • the second base station with wired backhaul capability has a wired transmission link with the core network, such as a fiber link; and the first base station with wireless backhaul capability does not have a relationship with the core network.
  • a wired transmission link that enables wireless backhaul of the base station by means of a wireless connection with a second base station having wired backhaul capability.
  • the first base station 10 with wireless backhaul capability, the second base station 20 with wired backhaul capability, and the core network device 30 are included, where the first base station 10 can be powered on.
  • the second base station 20 having the wired backhaul capability is searched for, and after the second base station 20 is searched, an access request message is sent to the second base station 20, and the second base station 20 is instructed to have the wireless back in the access request message.
  • the transmitting base station establishes a wireless connection with the second base station when the second base station 20 listens to the response message for allowing access based on the access request message, and implements wireless backhaul through the wireless connection.
  • the base station with the wireless backhaul capability can establish a wireless connection with the base station having the wired backhaul capability, thereby implementing wireless backhaul.
  • FIG. 5 is a flowchart of still another method for implementing wireless backhaul according to an exemplary embodiment.
  • This embodiment uses the foregoing method provided by the embodiment of the present disclosure to implement wireless implementation of a first base station with wireless backhaul capability.
  • the backhaul is exemplified for example. As shown in FIG. 5, the following steps are included:
  • step 501 when the second base station with wired backhaul capability is searched, the second base station is sent to the second base station.
  • the incoming request message carries the identity identification information.
  • step 502 the second base station is monitored to perform a step 503 or a step 504 based on the response message returned by the identity information.
  • steps 501 to 502 can be referred to the description of steps 401 to 402 of the embodiment shown in FIG. 4, and details are not described herein.
  • step 503 when listening to the response message rejecting the access, continue to search for other base stations having the wired backhaul capability, and step 501 is performed.
  • the first base station when listening to the response message rejecting the access, may continue to search for the base station with the wired backhaul capability, and when searching for other base stations with wired backhaul capability, the other searched The base station sends an access request message and attempts to access other base stations with wired backhaul capability.
  • the first base station cannot send and send a broadcast message before successfully accessing the base station with the wired backhaul capability, so as to prevent the user equipment with the access requirement from accessing and not providing the service.
  • step 504 when listening to the response message allowing access, a wireless connection with the second base station is established, and the wireless connection is used to implement wireless backhaul of the first base station.
  • step 505 after establishing a wireless connection with the second base station, a broadcast message is sent, the broadcast message being used for user equipment access with access requirements.
  • how the first base station with wireless backhaul capability attempts to establish a wireless connection with a base station having wired backhaul capability to implement wireless backhaul, and prohibits the first base station from successfully establishing and having a wired backhaul.
  • a broadcast message is sent before the wireless connection between the transmitting base stations to prevent the user equipment with access requirements from accessing and not providing services.
  • FIG. 6 is a block diagram of an apparatus for implementing wireless backhaul, which is applied to a second base station with wired backhaul capability, as shown in FIG. 6.
  • the apparatus for implementing wireless backhaul includes:
  • the receiving module 61 is configured to receive an access request message, where the access request message carries the identity identification information;
  • the determining module 62 is configured to determine, based on the identity identification information carried in the receiving request message received by the receiving module 61, that the device requesting access is the first base station having only wireless backhaul capability, based on the relationship with the core network The available wired bandwidth of the wired backhaul link determines whether the first base station is allowed to access;
  • the first sending module 63 is configured to return a response message to the first base station, where the response message is used to indicate whether the first base station is allowed to access.
  • FIG. 7 is a block diagram of another apparatus for implementing wireless backhaul according to an exemplary embodiment. As shown in FIG. 7, on the basis of the foregoing embodiment shown in FIG. 6, in an embodiment, the determining module 62 is shown. Includes:
  • the first determining sub-module 621 is configured to determine that the first base station is allowed to access if the available wired bandwidth is higher than a preset threshold;
  • the second determining sub-module 622 is configured to determine to reject the first base station access if the available wired bandwidth is not higher than a preset threshold.
  • the access request message further carries a minimum backhaul bandwidth
  • the determining module 62 includes:
  • the third determining sub-module 623 is configured to determine that the first base station is allowed to access if the available wired bandwidth is higher than the minimum backhaul bandwidth;
  • the fourth determining sub-module 624 is configured to determine to reject the first base station access if the available wired bandwidth is not higher than the minimum backhaul bandwidth.
  • FIG. 8 is a block diagram of an apparatus for implementing wireless backhaul, which is applied to a first base station with wireless backhaul capability, as shown in FIG.
  • the second sending module 81 is configured to: when the second base station with the wired backhaul capability is searched, send an access request message to the second base station, where the access request message carries the identity identification information;
  • the monitoring module 82 is configured to listen to the response message returned by the second base station based on the identity identification information carried in the access request message sent by the second sending module 81;
  • the establishing module 83 is configured to establish a wireless connection with the second base station when the listening module 82 listens to the response message for allowing access, and the wireless connection is used to implement wireless backhaul of the first base station.
  • FIG. 9 is a block diagram of another wireless backhaul implementation apparatus according to an exemplary embodiment.
  • an access request is performed.
  • the message also carries the minimum backhaul bandwidth.
  • the apparatus further includes:
  • the third sending module 84 is configured to send a broadcast message after the wireless connection with the second base station is established, and the broadcast message is used for access by the user equipment with access requirements.
  • the apparatus further includes:
  • the search module 85 is configured to continue to search for other base stations having wired backhaul capability when listening to the response message rejecting the access.
  • FIG. 10 is a block diagram suitable for a data transmitting apparatus, according to an exemplary embodiment.
  • Apparatus 1000 can be provided as a base station.
  • apparatus 1000 includes a processing component 1022, a wireless transmit/receive component 1024, an antenna component 1026, and a signal processing portion specific to the wireless interface.
  • the processing component 1022 can further include one or more processors.
  • one of the processing components 1022 can be configured to perform the method of implementing the wireless backhaul described in the second aspect above.
  • one of the processing components 1022 can be configured to perform the method of implementing the wireless backhaul described in the first aspect above.
  • non-transitory computer readable storage medium comprising instructions executable by processing component 1022 of apparatus 1000 to perform the methods described above in the first and second aspects.
  • the non-transitory computer readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.

Abstract

本公开是关于一种无线回传的实现方法、装置及基站。无线回传的实现方法包括:接收接入请求消息,所述接入请求消息中携带有身份标识信息;在基于所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。本公开技术方案可以实现只具备无线回传能力的第一基站与具备有线回传能力的第二基站之间的建立无线连接,实现无线回传。

Description

无线回传的实现方法、装置及基站 技术领域
本公开涉及通信技术领域,尤其涉及一种无线回传的实现方法、装置及基站。
背景技术
在第五代移动通信技术(5th Generation,简称为5G)项目的研究讨论中,为了满足业务更加多样化、速率更高、连接数量更大等要求,5G网络需要大幅度提高频谱效率,由于高频段的传输特性,使用高频段传输的基站一般为小基站(small cell),如果为每一个小基站都配置传统的有线回传链路,如光纤链路,则成本高,回传链路部署复杂。
为了降低回传链路的部署复杂性,在5G项目的研究讨论中,提出了前传回传一体化的方案,也即基站和用户设备(User Equipment,简称为UE)之间的数据传输与基站和核心网之间的数据传输都采用相同的无线通信系统协议通过无线链路进行传输,为了实现前传回传一体化,针对5G系统需要提出一种新的无线回传实现方案,来确保只具备无线回传能力的基站也可以通过具备有线回传能力的基站实现回传。
发明内容
为克服相关技术中存在的问题,本公开实施例提供一种无线回传的实现方法、装置及基站,用以实现只具备无线回传能力的基站通过与具备有线回传能力的基站建立无线连接,实现无线回传。
根据本公开实施例的第一方面,提供一种无线回传的实现方法,应用在具备有线回传能力的第二基站上,所述方法包括:
接收接入请求消息,所述接入请求消息中携带有身份标识信息;
在基于所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;
向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。
在一实施例中,所述基于与核心网之间的有线回传链路的可用有线带宽确定是 否允许所述第一基站接入,包括:
若所述可用有线带宽高于预设门限值,确定允许所述第一基站接入;
若所述可用有线带宽不高于预设门限值,确定拒绝所述第一基站接入。
在一实施例中,所述接入请求消息中还携带有最小回传带宽;
所述基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入,包括:
若所述可用有线带宽高于所述最小回传带宽,确定允许所述第一基站接入;
若所述可用有线带宽不高于所述最小回传带宽,确定拒绝所述第一基站接入。
根据本公开实施例的第二方面,提供一种无线回传的实现方法,应用在只具备无线回传能力的第一基站上,所述方法包括:
在搜寻到具备有线回传能力的第二基站时,向所述第二基站发送接入请求消息,所述接入请求消息中携带身份标识信息;
监听所述第二基站基于所述身份标识信息返回的响应消息;
在监听到允许接入的响应消息时,建立与所述第二基站之间的无线连接,所述无线连接用于实现所述第一基站的无线回传。
在一实施例中,所述接入请求消息中还携带有最小回传带宽。
在一实施例中,所述方法还包括:
在建立与所述第二基站之间的无线连接之后,发送广播消息,所述广播消息用于有接入需求的用户设备接入。
在一实施例中,所述方法还包括:
在监听到拒绝接入的响应消息时,继续搜寻具备有线回传能力的其他基站。
根据本公开实施例的第三方面,提供一种无线回传的实现装置,应用在具备有线回传能力的第二基站上,所述装置包括:
接收模块,被配置为接收接入请求消息,所述接入请求消息中携带有身份标识信息;
确定模块,被配置为在基于所述接收模块接收到的所述接收请求消息中携带的所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;
第一发送模块,被配置为向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。
在一实施例中,所述确定模块包括:
第一确定子模块,被配置为若所述可用有线带宽高于预设门限值,确定允许所述第一基站接入;
第二确定子模块,被配置为若所述可用有线带宽不高于预设门限值,确定拒绝所述第一基站接入。
在一实施例中,所述接入请求消息中还携带有最小回传带宽;
所述确定模块包括:
第三确定子模块,被配置为若所述可用有线带宽高于所述最小回传带宽,确定允许所述第一基站接入;
第四确定子模块,被配置为若所述可用有线带宽不高于所述最小回传带宽,确定拒绝所述第一基站接入。
根据本公开实施例的第四方面,提供一种无线回传的实现装置,应用在只具备无线回传能力的第一基站上,所述装置包括:
第二发送模块,被配置为在搜寻到具备有线回传能力的第二基站时,向所述第二基站发送接入请求消息,所述接入请求消息中携带身份标识信息;
监听模块,被配置为监听所述第二基站基于所述第二发送模块发送的所述接入请求消息中携带的所述身份标识信息返回的响应消息;
建立模块,被配置为在所述监听模块监听到允许接入的响应消息时,建立与所述第二基站之间的无线连接,所述无线连接用于实现所述第一基站的无线回传。
在一实施例中,所述接入请求消息中还携带有最小回传带宽。
在一实施例中,所述装置还包括:
第三发送模块,被配置为在建立与所述第二基站之间的无线连接之后,发送广播消息,所述广播消息用于有接入需求的用户设备接入。
在一实施例中,所述装置还包括:
搜寻模块,被配置为在监听到拒绝接入的响应消息时,继续搜寻具备有线回传能力的其他基站。
根据本公开实施例的第五方面,提供一种基站,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收接入请求消息,所述接入请求消息中携带有身份标识信息;
在基于所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一 基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;
向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。
根据本公开实施例的第六方面,提供一种基站,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
在搜寻到具备有线回传能力的第二基站时,向所述第二基站发送接入请求消息,所述接入请求消息中携带身份标识信息;
监听所述第二基站基于所述身份标识信息返回的响应消息;
在监听到允许接入的响应消息时,建立与所述第二基站之间的无线连接,所述无线连接用于实现所述第一基站的无线回传。
根据本公开实施例的第七方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机指令,所述指令被处理器执行时实现以下步骤:
接收接入请求消息,所述接入请求消息中携带有身份标识信息;
在基于所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;
向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。
根据本公开实施例的第八方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机指令,所述指令被处理器执行时实现以下步骤:
在搜寻到具备有线回传能力的第二基站时,向所述第二基站发送接入请求消息,所述接入请求消息中携带身份标识信息;
监听所述第二基站基于所述身份标识信息返回的响应消息;
在监听到允许接入的响应消息时,建立与所述第二基站之间的无线连接,所述无线连接用于实现所述第一基站的无线回传。
本公开的实施例提供的技术方案可以包括以下有益效果:
具备有线回传能力的第二基站在接收到接入请求消息后,若基于接入请求消息中的身份标识信息确定出请求接入的设备是具备无线回传能力的第一基站,则可基于 与核心网之间的有线回传链路的可用有线带宽确定是否允许第一基站接入,并基于判断结果返回对应的响应消息,由此可以实现只具备无线回传能力的第一基站与具备有线回传能力的第二基站之间的建立无线连接,实现无线回传。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1A是根据一示例性实施例示出的一种无线回传的实现方法的流程图。
图1B是根据一示例性实施例示出的一种无线回传的实现方法的应用场景图一。
图1C是根据一示例性实施例示出的一种无线回传的实现方法的应用场景图二。
图2是根据一示例性实施例示出的又一种无线回传的实现方法的流程图。
图3是根据一示例性实施例示出的再一种无线回传的实现方法的流程图。
图4是根据一示例性实施例示出的一种无线回传的实现方法的流程图。
图5是根据一示例性实施例示出的又一种无线回传的实现方法的流程图。
图6是根据一示例性实施例示出的一种无线回传的实现装置的框图。
图7是根据一示例性实施例示出的另一种无线回传的实现装置的框图。
图8是根据一示例性实施例示出的一种无线回传的实现装置的框图。
图9是根据一示例性实施例示出的另一种无线回传的实现装置的框图。
图10是根据一示例性实施例示出的一种适用于无线回传的实现装置的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。
本公开提供的技术方案中,核心网覆盖范围内可以具有两种类型的基站,参见图1B,图1B中核心网覆盖范围内有具备有线回传能力的基站,如标记11所指示的基站,具备有线回传能力的基站与核心网之间部署了有线回传链路;核心网覆盖范围内还有具备无线回传能力的基站,如标记12所指示的基站为具备无线回传能力的基站, 具备无线回传能力的基站与核心网之间没有部署有线回传链路,需要通过建立与具备有线回传能力的基站之间建立无线连接来实现无线回传。
图1A是根据一示例性实施例示出的一种无线回传的实现方法的流程图,图1B是根据一示例性实施例示出的一种无线回传的实现方法的应用场景图一,图1C是根据一示例性实施例示出的一种无线回传的实现方法的应用场景图二;该无线回传的实现方法可以应用在具备有线回传能力的基站上,如图1A所示,该无线回传的实现方法包括以下步骤101-103:
在步骤101中,接收接入请求消息,接入请求消息中携带有身份标识信息。
在一实施例中,接入请求消息可以为相关技术中的随机接入流程的第一个消息MSG1或者随机接入流程的第三个消息MSG3,可在接入请求消息中携带设备的身份标识信息,身份标识信息用于指示请求接入的设备的设备类型;在一实施例中,设备类型可以为具备无线回传能力的基站或者为用户设备。在一实施例中,若请求接入的设备为具备无线回传能力的基站,则可在接入请求消息中携带身份标识信息,若请求接入的设备为普通的用户设备,则可不在接入请求消息中携带身份标识信息。
在一实施例中,接入请求消息还可以为新定义的一个专属消息,用于具备无线回传能力的基站在请求建立与具备有线回传能力的基站之间的无线连接时使用,接入请求消息中还可以携带身份标识信息,指示请求接入的为具备无线回传能力的基站。
在步骤102中,在基于身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许第一基站接入。
在一实施例中,具备有线回传能力的第二基站可基于与核心网设备之间的有线回传链路的可用有线带宽可以基于有线回传链路的总的有线带宽与已用带宽的差值得到,例如,有线回传链路的总带宽为6.4GB/s,而已用带宽为3.2GB/s,则剩余的可用有线带宽为3.2GB/s。
在一实施例中,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许第一基站接入的实现方式可参见图2和图3所示实施例的描述,这里先不详述。
在步骤103中,向第一基站返回响应消息,响应消息用于指示是否允许第一基站接入。
在一实施例中,若接入请求消息为随机接入流程中的第一个消息MSG1,则响应消息对应为第二个消息MSG2,其中携带有是否允许第一基站接入的指示信息;在一实施例中,若接入请求消息为随机接入流程中的第三个消息MSG3,则响应消息可 以为随机接入流程的第四个消息MSG4,其中携带有是否允许第一基站接入的指示信息,基于该第四个消息MSG4,即可建立第一基站和第二基站之间的无线连接,也即数据和信令连接。
在一实施例中,若接入请求消息为新定义的一个专属消息,则该响应消息也可以为该专属消息对应的一个新的响应消息。
在一实施例中,若具备有线回传能力的第二基站允许具备无线回传能力的第一基站接入,则第一基站可与第二基站建立无线连接,第一基站可通过该无线连接将回传数据发送至第二基站,第二基站再通过有线回传链路,如光纤链路传输至核心网设备,由此实现第一基站的无线回传。
在一示例性场景中,如图1C所示,包括具备无线回传能力的第一基站10、具备有线回传能力的第二基站20、核心网设备30,其中,第二基站20与核心网设备30之间具有有线回传链路,第二基站20可接收到接入请求消息,并且基于接入请求消息中的身份标识信息确定出请求接入的设备为具备无线回传能力的第一基站10时,第二基站20可基于自己的当前状态,如当前的可用有线带宽确定时否允许第一基站10接入,在确定允许第一基站10接入时,第一基站10通过与具备有线回传能力的第二基站20之间的无线连接实现无线回传。
本实施例通过上述步骤101-步骤103,具备有线回传能力的第二基站在接收到接入请求消息后,若基于接入请求消息中的身份标识信息确定出请求接入的设备是具备无线回传能力的第一基站,则可基于与核心网之间的有线回传链路的可用有线带宽确定是否允许第一基站接入,并基于判断结果返回对应的响应消息,由此可以实现只具备无线回传能力的第一基站与具备有线回传能力的第二基站之间的建立无线连接,实现无线回传。
具体如何实现无线回传的,请参考后续实施例。
下面以具体实施例来说明本公开实施例提供的技术方案。
图2是根据一示例性实施例示出的又一种无线回传的实现方法的流程图;本实施例利用本公开实施例提供的上述方法,以具备有线回传能力的基站如何确定是否允许具备无线回传能力的基站接入为例进行示例性说明,如图2所示,包括如下步骤:
在步骤201中,接收接入请求消息,接入请求消息中携带有身份标识信息。
在步骤202中,在基于身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许第一基站接入,执行步骤203或者步骤205。
在一实施例中,步骤201和步骤202的描述可参见图1A所示实施例的步骤101和步骤102的描述,这里不再详述。
在步骤203中,若可用有线带宽高于预设门限值,确定允许第一基站接入,执行步骤204。
在一实施例中,预设门限值可以为一个固定值,由系统预先配置或者由基站自身设置。由于具备有线回传能力的第二基站也需要服务用户设备,为了服务已接入或者待接入的用户设备,第二基站需要预留不低于预设门限值的有线带宽。例如,第二基站的有线回传链路的可用有线带宽为3.2GB/s,预设门限值为1.6GB/s,则第二基站可以确定允许第一基站接入。
在一实施例中,预设门限值可以为一个动态变化的值,由第二基站基于自己当前接入的用户设备的数量和/或基于历史接入信息确定出的待接入的用户设备的数量,确定出的用于服务用户设备的有线带宽确定,例如,第二基站基于已接入的用户设备的数量和/或待接入的用户设备的数量确定出服务用户设备的有线带宽为3.2GB/s,而当前已经用于服务用户设备的有线带宽为1.8GB/s,则可设置预设门限值为1.4GB/s,当前的可用有线带宽为3.2GB/s,高于1.4GB/s,因此第二基站可以确定允许第一基站接入。
在步骤204中,向第一基站返回响应消息,响应消息指示允许第一基站接入,流程结束。
在一实施例中,步骤204的描述可参见图1A所示实施例的步骤103的描述,这里不再详述。
在步骤205中,若可用有线带宽不高于预设门限值,确定拒绝第一基站接入。
在一实施例中,关于预设门限值的描述,可参见步骤203的描述,这里不再详述。
在步骤206中,向第一基站返回响应消息,响应消息用于指示不允许第一基站接入。
本实施例中,具备有线回传能力的第一基站在接收到具备无线回传能力的第二基站发送的接入请求后,可基于可用有线带宽与预设门限值的比较结果确定是否允许第一基站接入,预设门限值可以为一个固定值,也可以为一个动态变化的值,由第二基站为已接入的或者待接入的用户设备预留,由此可以实现第二基站在确定不会影响服务用户设备的前提下决定是否允许第一基站接入,以避免第二基站在自身情况不允许第一基站接入时接入第一基站所导致的第一基站和第二基站均不能正常服务用户设 备的问题。
图3是根据一示例性实施例示出的一种无线回传的实现方法的流程图;本实施例利用本公开实施例提供的上述方法,以具备有线回传能力的基站如何确定是否允许具备无线回传能力的基站接入为例进行示例性说明,如图3所示,包括如下步骤:
在步骤301中,接收接入请求消息,接入请求消息中携带有身份标识信息。
在步骤302中,在基于身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许第一基站接入,执行步骤303或者步骤305。
在一实施例中,步骤301和步骤302的描述可参见图1A所示实施例的步骤101和步骤102的描述,这里不再详述。
在步骤303中,若可用有线带宽高于最小回传带宽,确定允许第一基站接入,执行步骤304。
在一实施例中,接入请求消息中还可以携带有第一基站所需的最小回传带宽,如第一基站所需的最小回传带宽为0.8GB/s,而第二基站剩余的可用有线带宽为1.6GB/s,则第二基站可以确定允许第一基站接入。
在步骤304中,向第一基站返回响应消息,响应消息指示允许第一基站接入,流程结束。
在一实施例中,步骤204的描述可参见图1A所示实施例的步骤103的描述,这里不再详述。
在步骤305中,若可用有线带宽不高于最小回传带宽,确定拒绝第一基站接入。
在步骤306中,向第一基站返回响应消息,响应消息用于指示不允许第一基站接入。
本实施例中,第二基站可以基于请求接入的第一基站的最小回传带宽和可用有线带宽确定是否允许第一基站接入,以实现在允许第一基站接入后能为第一基站提供不低于最小回传带宽的回传带宽,保证第一基站在接入第二基站后,能实现正常的无线回传,保证数据传输的效率。
图4是根据一示例性实施例示出的一种无线回传的实现方法的流程图;本实施例的无线回传的实现方法可应用在具备无线回传能力的基站上,如图4所示,包括以下步骤401-403:
在步骤401中,在搜寻到具备有线回传能力的第二基站时,向第二基站发送接入请求消息,接入请求消息中携带身份标识信息。
在一实施例中,身份标识信息用于指示第二基站自己为一个具备无线回传能力的基站,而不是一个普通的用户设备。
在一实施例中,接入请求消息可以为相关技术中的随机接入流程的第一个消息MSG1或者随机接入流程的第三个消息MSG3。
在一实施例中,接入请求消息还可以为新定义的一个专属消息,用于具备无线回传能力的基站在请求建立与具备有线回传能力的基站之间的无线连接时使用,接入请求消息中还可以携带身份标识信息,指示请求接入的为具备无线回传能力的基站。
在步骤402中,监听第二基站基于身份标识信息返回的响应消息。
在一实施例中,若接入请求消息为随机接入流程中的第一个消息MSG1,则响应消息可以为随机接入流程中的第二个消息MSG2;在一实施例中,若接入请求消息为随机接入流程中的第三个消息MSG3,则响应消息可以为随机接入流程的第四个消息MSG4。
在一实施例中,若接入请求消息为新定义的一个专属消息,则该响应消息也可以为该专属消息对应的一个新的响应消息。
在步骤403中,在监听到允许接入的响应消息时,建立与第二基站之间的无线连接,无线连接用于实现第一基站的无线回传。
在一实施例中,具备有线回传能力的第二基站为与核心网之间具有有线传输链路,如光纤链路;而具备无线回传能力的第一基站为与核心网之间不具有有线传输链路,可借助与具备有线回传能力的第二基站之间的无线连接实现无线回传的基站。
在一示例性场景中,如图1C所示,包括具备无线回传能力的第一基站10、具备有线回传能力的第二基站20、核心网设备30,其中,第一基站10可在开机后搜寻周边具备有线回传能力的第二基站20,并在搜寻到第二基站20后向第二基站20发送接入请求消息,在接入请求消息中指示第二基站20自己为具备无线回传能力的基站,在监听到第二基站20基于接入请求消息返回的允许接入的响应消息时,建立与第二基站之间的无线连接,并通过该无线连接实现无线回传。
本实施例中,通过步骤401-步骤403,具备无线回传能力的基站可建立与具备有线回传能力的基站的无线连接,进而实现无线回传。
图5是根据一示例性实施例示出的又一种无线回传的实现方法的流程图;本实施例利用本公开实施例提供的上述方法,以具备无线回传能力的第一基站如何实现无线回传为例进行示例性说明,如图5所示,包括如下步骤:
在步骤501中,在搜寻到具备有线回传能力的第二基站时,向第二基站发送接 入请求消息,接入请求消息中携带身份标识信息。
在步骤502中,监听第二基站基于身份标识信息返回的响应消息,执行步骤503或者步骤504。
在一实施例中,步骤501-步骤502的描述可参见图4所示实施例的步骤401-步骤402的描述,这里不再详述。
在步骤503中,在监听到拒绝接入的响应消息时,继续搜寻具备有线回传能力的其他基站,执行步骤501。
在一实施例中,在监听到拒绝接入的响应消息时,第一基站可以继续搜寻具备有线回传能力的基站,并在搜寻到具备有线回传能力的其他基站时,向搜寻到的其他基站发送接入请求消息,尝试接入具备有线回传能力的其他基站。
在一实施例中,第一基站在成功接入具备有线回传能力的基站之前,不能发送发送广播消息,以免有接入需求的用户设备接入而不能为其提供服务。
在步骤504中,在监听到允许接入的响应消息时,建立与第二基站之间的无线连接,无线连接用于实现第一基站的无线回传。
在步骤505中,在建立与第二基站之间的无线连接之后,发送广播消息,广播消息用于有接入需求的用户设备接入。
本实施例中,公开了具备无线回传能力的第一基站如何尝试建立与具备有线回传能力的基站之间的无线连接以实现无线回传,并且禁止第一基站在成功建立与具备有线回传能力的基站之间的无线连接之前发送广播消息,以免有接入需求的用户设备接入而不能为其提供服务。
图6是根据一示例性实施例示出的一种无线回传的实现装置的框图,应用在具备有线回传能力的第二基站上,如图6所示,无线回传的实现装置包括:
接收模块61,被配置为接收接入请求消息,接入请求消息中携带有身份标识信息;
确定模块62,被配置为在基于接收模块61接收到的接收请求消息中携带的身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许第一基站接入;
第一发送模块63,被配置为向第一基站返回响应消息,响应消息用于指示是否允许第一基站接入。
图7是根据一示例性实施例示出的另一种无线回传的实现装置的框图,如图7所示,在上述图6所示实施例的基础上,在一实施例中,确定模块62包括:
第一确定子模块621,被配置为若可用有线带宽高于预设门限值,确定允许第一基站接入;
第二确定子模块622,被配置为若可用有线带宽不高于预设门限值,确定拒绝第一基站接入。
在一实施例中,接入请求消息中还携带有最小回传带宽;
确定模块62包括:
第三确定子模块623,被配置为若可用有线带宽高于最小回传带宽,确定允许第一基站接入;
第四确定子模块624,被配置为若可用有线带宽不高于最小回传带宽,确定拒绝第一基站接入。
图8是根据一示例性实施例示出的一种无线回传的实现装置的框图,应用在具备无线回传能力的第一基站上,如图8所示,无线回传的实现装置包括:
第二发送模块81,被配置为在搜寻到具备有线回传能力的第二基站时,向第二基站发送接入请求消息,接入请求消息中携带身份标识信息;
监听模块82,被配置为监听第二基站基于第二发送模块81发送的接入请求消息中携带的身份标识信息返回的响应消息;
建立模块83,被配置为在监听模块82监听到允许接入的响应消息时,建立与第二基站之间的无线连接,无线连接用于实现第一基站的无线回传。
图9是根据一示例性实施例示出的另一种无线回传的实现装置的框图;在上述图8所示实施例的基础上,如图9所示,在一实施例中,接入请求消息中还携带有最小回传带宽。
在一实施例中,装置还包括:
第三发送模块84,被配置为在建立与第二基站之间的无线连接之后,发送广播消息,广播消息用于有接入需求的用户设备接入。
在一实施例中,装置还包括:
搜寻模块85,被配置为在监听到拒绝接入的响应消息时,继续搜寻具备有线回传能力的其他基站。
图10是根据一示例性实施例示出的一种适用于数据发送装置的框图。装置1000可以被提供为一个基站。参照图10,装置1000包括处理组件1022、无线发射/接收组件1024、天线组件1026、以及无线接口特有的信号处理部分,处理组件1022可进一步包括一个或多个处理器。
在基站为具备无线回传能力的基站时,处理组件1022中的其中一个处理器可以被配置为执行上述第二方面所描述的无线回传的实现方法。
在基站为具备有线回传能力的基站时,处理组件1022中的其中一个处理器可以被配置为执行上述第一方面所描述的无线回传的实现方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,上述指令可由装置1000的处理组件1022执行以完成上述第一方面和第二方面所描述的方法。例如,非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (18)

  1. 一种无线回传的实现方法,其特征在于,应用在具备有线回传能力的第二基站上,所述方法包括:
    接收接入请求消息,所述接入请求消息中携带有身份标识信息;
    在基于所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;
    向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。
  2. 根据权利要求1所述的方法,其特征在于,所述基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入,包括:
    若所述可用有线带宽高于预设门限值,确定允许所述第一基站接入;
    若所述可用有线带宽不高于预设门限值,确定拒绝所述第一基站接入。
  3. 根据权利要求1所述的方法,其特征在于,所述接入请求消息中还携带有最小回传带宽;
    所述基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入,包括:
    若所述可用有线带宽高于所述最小回传带宽,确定允许所述第一基站接入;
    若所述可用有线带宽不高于所述最小回传带宽,确定拒绝所述第一基站接入。
  4. 一种无线回传的实现方法,其特征在于,应用在只具备无线回传能力的第一基站上,所述方法包括:
    在搜寻到具备有线回传能力的第二基站时,向所述第二基站发送接入请求消息,所述接入请求消息中携带身份标识信息;
    监听所述第二基站基于所述身份标识信息返回的响应消息;
    在监听到允许接入的响应消息时,建立与所述第二基站之间的无线连接,所述无线连接用于实现所述第一基站的无线回传。
  5. 根据权利要求4所述的方法,其特征在于,所述接入请求消息中还携带有最小回传带宽。
  6. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    在建立与所述第二基站之间的无线连接之后,发送广播消息,所述广播消息用于有接入需求的用户设备接入。
  7. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    在监听到拒绝接入的响应消息时,继续搜寻具备有线回传能力的其他基站。
  8. 一种无线回传的实现装置,其特征在于,应用在具备有线回传能力的第二基站上,所述装置包括:
    接收模块,被配置为接收接入请求消息,所述接入请求消息中携带有身份标识信息;
    确定模块,被配置为在基于所述接收模块接收到的所述接收请求消息中携带的所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;
    第一发送模块,被配置为向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。
  9. 根据权利要求8所述的装置,其特征在于,所述确定模块包括:
    第一确定子模块,被配置为若所述可用有线带宽高于预设门限值,确定允许所述第一基站接入;
    第二确定子模块,被配置为若所述可用有线带宽不高于预设门限值,确定拒绝所述第一基站接入。
  10. 根据权利要求8所述的装置,其特征在于,所述接入请求消息中还携带有最小回传带宽;
    所述确定模块包括:
    第三确定子模块,被配置为若所述可用有线带宽高于所述最小回传带宽,确定允许所述第一基站接入;
    第四确定子模块,被配置为若所述可用有线带宽不高于所述最小回传带宽,确定拒绝所述第一基站接入。
  11. 一种无线回传的实现装置,其特征在于,应用在只具备无线回传能力的第一基站上,所述装置包括:
    第二发送模块,被配置为在搜寻到具备有线回传能力的第二基站时,向所述第二基站发送接入请求消息,所述接入请求消息中携带身份标识信息;
    监听模块,被配置为监听所述第二基站基于所述第二发送模块发送的所述接入请求消息中携带的所述身份标识信息返回的响应消息;
    建立模块,被配置为在所述监听模块监听到允许接入的响应消息时,建立与所述第二基站之间的无线连接,所述无线连接用于实现所述第一基站的无线回传。
  12. 根据权利要求11所述的装置,其特征在于,所述接入请求消息中还携带有最小回传带宽。
  13. 根据权利要求11所述的装置,其特征在于,所述装置还包括:
    第三发送模块,被配置为在建立与所述第二基站之间的无线连接之后,发送广播消息,所述广播消息用于有接入需求的用户设备接入。
  14. 根据权利要求11所述的装置,其特征在于,所述装置还包括:
    搜寻模块,被配置为在监听到拒绝接入的响应消息时,继续搜寻具备有线回传能力的其他基站。
  15. 一种基站,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    接收接入请求消息,所述接入请求消息中携带有身份标识信息;
    在基于所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;
    向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。
  16. 一种基站,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    在搜寻到具备有线回传能力的第二基站时,向所述第二基站发送接入请求消息,所述接入请求消息中携带身份标识信息;
    监听所述第二基站基于所述身份标识信息返回的响应消息;
    在监听到允许接入的响应消息时,建立与所述第二基站之间的无线连接,所述无线连接用于实现所述第一基站的无线回传。
  17. 一种非临时计算机可读存储介质,所述存储介质上存储有计算机指令,其特征在于,所述指令被处理器执行时实现以下步骤:
    接收接入请求消息,所述接入请求消息中携带有身份标识信息;
    在基于所述身份标识信息确定请求接入的设备为只具备无线回传能力的第一基站 时,基于与核心网之间的有线回传链路的可用有线带宽确定是否允许所述第一基站接入;
    向所述第一基站返回响应消息,所述响应消息用于指示是否允许所述第一基站接入。
  18. 一种非临时计算机可读存储介质,所述存储介质上存储有计算机指令,其特征在于,所述指令被处理器执行时实现以下步骤:
    在搜寻到具备有线回传能力的第二基站时,向所述第二基站发送接入请求消息,所述接入请求消息中携带身份标识信息;
    监听所述第二基站基于所述身份标识信息返回的响应消息;
    在监听到允许接入的响应消息时,建立与所述第二基站之间的无线连接,所述无线连接用于实现所述第一基站的无线回传。
PCT/CN2017/106713 2017-10-18 2017-10-18 无线回传的实现方法、装置及基站 WO2019075665A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP17929241.2A EP3687240B1 (en) 2017-10-18 2017-10-18 Method and base station for implementing wireless backhaul
PCT/CN2017/106713 WO2019075665A1 (zh) 2017-10-18 2017-10-18 无线回传的实现方法、装置及基站
CN201780001686.8A CN108370497B (zh) 2017-10-18 2017-10-18 无线回传的实现方法、装置及基站
US16/849,440 US11330643B2 (en) 2017-10-18 2020-04-15 Method and device for implementing wireless backhaul, and base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/106713 WO2019075665A1 (zh) 2017-10-18 2017-10-18 无线回传的实现方法、装置及基站

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/849,440 Continuation US11330643B2 (en) 2017-10-18 2020-04-15 Method and device for implementing wireless backhaul, and base station

Publications (1)

Publication Number Publication Date
WO2019075665A1 true WO2019075665A1 (zh) 2019-04-25

Family

ID=63011408

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/106713 WO2019075665A1 (zh) 2017-10-18 2017-10-18 无线回传的实现方法、装置及基站

Country Status (4)

Country Link
US (1) US11330643B2 (zh)
EP (1) EP3687240B1 (zh)
CN (1) CN108370497B (zh)
WO (1) WO2019075665A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112335267A (zh) * 2019-02-15 2021-02-05 Oppo广东移动通信有限公司 信息指示方法、装置、系统、设备及存储介质
CN111278034B (zh) * 2020-01-21 2022-08-12 北京佰才邦技术股份有限公司 一种信息备份方法、装置、存储介质和计算机设备
US11477808B2 (en) * 2020-09-01 2022-10-18 Verizon Patent And Licensing, Inc. System and method for low latency integrated access and backhaul
CN112954714B (zh) * 2021-01-29 2022-06-14 博为科技有限公司 一种mesh网络控制方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140126500A1 (en) * 2011-05-06 2014-05-08 Blinq Wireless Inc. Method and apparatus for performance management in wireless backhaul networks via power control
CN103906246A (zh) * 2014-02-25 2014-07-02 北京邮电大学 一种蜂窝异构网络下的无线回传资源调度方法
CN104185245A (zh) * 2014-08-26 2014-12-03 京信通信系统(中国)有限公司 一种限制基站的接入位置的方法、装置和系统
CN106572480A (zh) * 2015-10-10 2017-04-19 电信科学技术研究院 回传网络的管理方法、接入网管理实体、设备及无线小站
CN106912078A (zh) * 2017-02-17 2017-06-30 河北电信设计咨询有限公司 无线带内回传资源分配应用系统及分配方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9119107B2 (en) * 2011-02-04 2015-08-25 Telefonaktiebolaget L M Ericsson (Publ) Methods and devices for supporting backhaul selection
CN102594455A (zh) * 2012-02-22 2012-07-18 烽火通信科技股份有限公司 家庭网络系统及通过光纤传输射频信号的方法
US9642145B2 (en) * 2013-05-07 2017-05-02 Calix, Inc. Methods and apparatuses for dynamic backhaul bandwidth management in wireless networks
CN104412675B (zh) * 2013-05-13 2018-12-07 华为技术有限公司 节点同步方法及装置
EP3209051B1 (en) 2014-10-17 2021-10-27 Sony Group Corporation Apparatus
US9807624B2 (en) * 2015-06-01 2017-10-31 T-Mobile Usa, Inc. Self-adjusting wireless in-band backhaul

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140126500A1 (en) * 2011-05-06 2014-05-08 Blinq Wireless Inc. Method and apparatus for performance management in wireless backhaul networks via power control
CN103906246A (zh) * 2014-02-25 2014-07-02 北京邮电大学 一种蜂窝异构网络下的无线回传资源调度方法
CN104185245A (zh) * 2014-08-26 2014-12-03 京信通信系统(中国)有限公司 一种限制基站的接入位置的方法、装置和系统
CN106572480A (zh) * 2015-10-10 2017-04-19 电信科学技术研究院 回传网络的管理方法、接入网管理实体、设备及无线小站
CN106912078A (zh) * 2017-02-17 2017-06-30 河北电信设计咨询有限公司 无线带内回传资源分配应用系统及分配方法

Also Published As

Publication number Publication date
CN108370497B (zh) 2021-06-04
EP3687240A4 (en) 2020-08-19
US11330643B2 (en) 2022-05-10
EP3687240C0 (en) 2023-08-23
CN108370497A (zh) 2018-08-03
EP3687240B1 (en) 2023-08-23
EP3687240A1 (en) 2020-07-29
US20200245379A1 (en) 2020-07-30

Similar Documents

Publication Publication Date Title
CN105393605B (zh) 终端、基站及其通信方法
CN106793090B (zh) D2d直接通信资源的选择方法及系统
JP6247293B2 (ja) 2次セルを追加するための方法、装置、デバイスおよびネットワークシステム
WO2019075665A1 (zh) 无线回传的实现方法、装置及基站
US11729846B2 (en) Method for activating packet data convergence protocol duplication and node device
WO2018059457A1 (zh) 一种会话连接建立方法、相关设备及系统
WO2018227494A1 (zh) 测量间隔配置方法、装置、设备、终端及系统
US11375410B2 (en) Method and apparatus for obtaining configuration information, device, storage medium, and system
US20220417825A1 (en) Path-switching between pc5 link and uu link
WO2018137601A1 (zh) 通信方法和相关装置
US20140295826A1 (en) Method and apparatus for controlling traffic next generation mobile communication system
WO2018228537A1 (zh) 信息发送、接收方法及装置
US11109436B2 (en) Rejection of connection re-establishment
WO2019028738A1 (zh) 无人机接入方法及装置
WO2020140276A1 (zh) 数据传输方法、装置、计算机设备及系统
US11510257B2 (en) Communications method and apparatus
TW201735711A (zh) 基於設備到設備的通訊方法和終端
EP3606264A1 (en) Method for random access, terminal, and network device
WO2014082215A1 (zh) Fdd系统中多载波配置、用户设备接入方法及相应装置
CN108370598B (zh) 无线回传的实现方法、装置及基站
WO2017219322A1 (zh) 用于可见光通信的接入方法、装置、设备及系统
CN113228808A (zh) 用于两步随机接入过程的方法、基站和终端设备
WO2024045923A1 (zh) 一种随机接入报告记录方法以及通信装置
WO2023155046A1 (zh) 通信方法和通信装置
US20240031092A1 (en) Terminal device and network device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17929241

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017929241

Country of ref document: EP

Effective date: 20200423