WO2019144679A1 - 一种网络架构、信息交互方法以及装置 - Google Patents
一种网络架构、信息交互方法以及装置 Download PDFInfo
- Publication number
- WO2019144679A1 WO2019144679A1 PCT/CN2018/115363 CN2018115363W WO2019144679A1 WO 2019144679 A1 WO2019144679 A1 WO 2019144679A1 CN 2018115363 W CN2018115363 W CN 2018115363W WO 2019144679 A1 WO2019144679 A1 WO 2019144679A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- identifier
- address
- establishment
- list
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/61—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present application relates to the field of communications, and in particular, to a network architecture, an information interaction method, and a device.
- Broadband wireless access technology represented by wireless LAN WLAN and global microwave interconnection access WiMAX can provide high-speed broadband wireless access services, and support nomadic and mobile applications, greatly improving the access capability of wireless communication, mobile communication network
- the integration with broadband wireless access technology is the evolution trend of telecommunication networks in the future.
- the terminal UE can access the network through the access network, establish a tunnel between the access network and the local service gateway under the control of the mobility management entity, and establish a local service gateway and the data gateway. Tunneling, thereby establishing connectivity between the UE and the packet data network.
- the radio access network RAN evolves into a central unit (CU) and a distributed control unit (DU), wherein the CU performs user planes. Decoupled from the control plane to form a CU-Control Plane (CU) and a CU-User Plane (CU).
- CU-CP and CU-UP support flexible deployment.
- the embodiment of the present application provides a network architecture, an information interaction method, and a device, which are used to determine a logical relationship definition between a CU-CP, a CU-UP, and a DU, and various types between the CU-CP, the CU-UP, and the DU. Business process.
- the first aspect of the embodiments of the present application provides a network architecture, including:
- the first CU-CP, M1 CU-UP and N1 DUs The first CU-CP, M1 CU-UP and N1 DUs.
- the first CU-CP is connected to the M1 CU-UPs, and the CU-CPs connected to any one of the M1 CU-UPs are only the first CU-CP, that is, one CU-CP can be One or more CU-UPs are connected, and one CU-UP is connected to only one CU-CP, that is, the CU-CP and the CU-UP are in a one-to-many relationship.
- the first CU-CP is connected to the N1 DUs, and the CU-CP connected to any one of the N1 DUs is only the first CU-CP, that is, one CU-CP can be connected to one or more DUs, one
- the DU is only connected to one CU-CP, that is, the CU-CP and the DU are one-to-many relationships.
- any one of the M1 CU-UPs is connected to at least one of the N1 DUs, and any one of the N1 DUs is connected to at least one of the M1 CU-UPs, that is, one CU-UP can be connected to one Or multiple DUs, one DU can also be connected to one or more CU-UPs, that is, CU-UP and DU are many-to-many relationships.
- a second aspect of the embodiments of the present application provides a network architecture, including:
- the first CU-UP is connected to the M2 CU-CPs, and the CU-UP connected to any one of the M2 CU-CPs is only the first CU-UP, that is, one CU-UP can be connected to one Or multiple CU-UPs, one CU-UP is connected to only one CU-CP, that is, the CU-CP and CU-UP are in a many-to-one relationship.
- Any one of the M2 CU-CPs is connected to at least one of the N2 DUs, and the CU-CP connected to any one of the N2 DUs is one of the M2 CU-CPs, that is, One CU-CP can be connected to one or more DUs, and one DU can only be connected to one CU-CP, that is, the CU-CP and the DU are in a one-to-many relationship.
- the first CU-UP is connected to the N2 DUs, and the CU-UP connected to any one of the N2 DUs is only the first CU-UP, and one CU-UP can be connected to one or more DUs, one DU Only one CU-UP is connected, that is, CU-UP and DU are one-to-many relationships.
- a third aspect of the embodiments of the present application provides a network architecture, including:
- any one of the N3 CU-UPs is connected to at least one of the M3 CU-CPs, and any one of the M3 CU-CPs is connected to at least one of the N3 CU-UPs, that is, one
- the CU-UP can be connected to one or more CU-UPs, and one CU-UP can also be connected to one or more CU-CPs, that is, the CU-CP and the CU-UP are in a many-to-many relationship.
- any one of the M3 CU-CPs is connected to at least one of the N2 DUs, and the CU-CP connected to any one of the N2 DUs is one of the M2 CU-CPs, one
- the CU-CP can be connected to one or more DUs, and one DU is connected to only one CU-CP, that is, the CU-CP and the DU are in a one-to-many relationship.
- any one of the N CU-UPs is connected to at least one of the K DUs, and any one of the K DUs is connected to at least one of the N 3 CU-UPs, that is, one CU-UP can be connected to one Or multiple DUs, one DU can also be connected to one or more CU-UPs, that is, CU-UP and DU are many-to-many relationships.
- the foregoing describes the logical structure relationship between the CU-CP, the CU-UP, and the DU.
- the following describes the various service flows between the CU-CP, the CU-UP, and the DU.
- the fourth aspect of the embodiment of the present application provides a An information interaction method for the network architecture of the above aspects, including:
- the CU-CP obtains the address of the CU-UP.
- the CU-CP obtains the address of the CU-CP through the domain name system or the operation and maintenance system configuration, and then can access the CU through the address of the CU-UP.
- -UP sends a first link setup request, the first link setup request carries the identity of the CU-CP or/and the naming of the CU-CP, and then receives the first link setup response returned by the CU-UP, the first The link setup response carries the identity of the CU-UP and/or the naming of the CU-UP such that the CU-CP and the CU-UP complete the link setup.
- the CU-UP obtains the address of the CU-CP.
- the CU-UP obtains the address of the CU-UP through the domain name system or the operation and maintenance system configuration, and then can pass the CU-
- the address of the CP sends a first link setup request to the CU-CP, where the first link setup request carries the identifier of the CU-UP or/and the naming of the CU-UP, and then receives the first link returned by the CU-CP.
- the first link setup response carries the identifier of the CU-CP and/or the naming of the CU-CP, so that the CU-UP and the CU-CP complete link establishment.
- the link establishment process between the CU-CP and the CU-UP is determined to support communication between the next generation network base station nodes and communication with the next generation core network, ensuring that the terminal can truly access the next generation.
- the internet The internet.
- the method further includes:
- the CU-CP may send a data bearer DRB setup request to the CU-UP, where the DRB setup request carries an evolved radio access bearer E-RAB setup list to be configured,
- E-RAB setup list to be configured
- Each item in the E-RAB establishment list to be configured includes an E-RAB identifier, an Internet Protocol IP address of the core network user plane function UPF, and a tunnel identifier of the UPF, so that the CU-UP is configured according to the E-RAB to be configured. Establish an upstream user plane tunnel between the list and the UPF.
- the CU-CP then receives the DRB setup response returned by the CU-UP, the DRB setup response includes an E-RAB setup list, a radio bearer RB establishment list to be configured, and each entry in the E-RAB setup list includes E- The RAB identifier, the IP address of the CU-UP, and the tunnel identifier of the CU-UP, each item in the RB establishment list to be configured includes an RB identifier, an IP address of the CU-UP, and a tunnel identifier of the CU-UP.
- the CU-CP sends the RB establishment list to be configured to the DU, so that the DU establishes an uplink user plane tunnel with the CU-UP using the setup list to be configured by the RB, and then the CU-CP goes to the CU-
- the UP sends an RB establishment list, and each item in the RB establishment list includes an RB identifier, an IP address of the DU, and a tunnel identifier of the DU, so that the CU-UP establishes a downlink user plane tunnel with the DU according to the RB establishment list.
- the CU-CP sends the E-RAB setup list to the UPF, so that the CU-UP and the UPF establish a downlink user plane tunnel.
- the data bearer DRB setup request includes security context information and a flow level quality of service QoS list, the security context information including an encryption algorithm, an integrity protection algorithm, and a security key, the security context information being The CU-UP is used to derive a user plane cipher protection key and an integrity protection key, and each item in the QoS list of the stream level includes an RAB identifier and a corresponding stream level QoS, and the QoS list of the stream level is used for knowing The RAB and corresponding QoS information to be established by the CU-UP.
- the CU-CP sends the RB establishment list by transmitting a DRB modification request to the CU-UP, and the DRB modification request carries the RB establishment list.
- each entry in the RB setup list to be configured further includes a Packet Data Convergence Protocol PDCP configuration for each RB.
- the CU-CP sends an RB establishment list by transmitting an RB bearer setup request to the DU, and the RB bearer setup request carries the RB establishment list to be configured.
- the user access procedure for the above network architecture is determined to support communication between the next generation network base station nodes and communication with the next generation core network, ensuring that the terminal can truly access the next generation network.
- the method further includes:
- the CU-CP When the CU-UP receives the data stream and determines that the current RB cannot carry the data stream, the CU-CP receives the DRB establishment indication sent by the CU-UP, where the DRB establishment indication is used to indicate that the current RB resource cannot carry the data flow. The data stream is then used by the CU-CP to create the RB resource as the first target RB to carry the data stream, or the CU-CP invokes the existing RB resource as the first target RB to carry the data stream.
- the CU-CP creates a new RB resource as the first target RB, including:
- the CU-CP sends a DRB setup request to the CU-UP, where the DRB setup request includes an identifier of the first target RB and a data flow level QoS corresponding to the first target RB, and then the CU-CP receives the CU-UP return.
- the DRB establishment response includes an identifier of the target RB, an IP address of the CU-UP, and a tunnel identifier of the CU-UP
- the CU-CP sends the identifier of the first target RB to the DU
- the IP address of the CU-UP and the tunnel identifier of the CU-UP so that the DU establishes an uplink user plane tunnel for the first target RB with the CU-UP
- the CU-CP sends the CU-UP to the CU-UP.
- the identifier of the first target RB, the IP address of the DU, and the tunnel identifier of the DU so that the CU-UP establishes a downlink user plane tunnel with the DU.
- the CU-CP invokes an existing RB resource as the RB, including:
- the CU-CP sends an RB modification request to the DU, the RB modification request indicates that the data stream is carried by using the RB, and then the CU-CP receives the RB modification response returned by the DU.
- the bearer modification process for the above network architecture is determined to support communication between the next generation network base station nodes and communication with the next generation core network, and ensure that the terminal can truly access the next generation network.
- the method further includes:
- the CU-CP receives a handover request for the second UE, and then the CU-CP determines to serve the target CU-UP and the target DU of the second UE, and then the CU-CP sends the identifier of the second target RB to the target DU, An IP address of the target CU-UP and a tunnel identifier of the target CU-UP, so that the target DU establishes an uplink user with the target CU-UP using the IP address of the target CU-UP and the tunnel identifier of the target CU-UP
- the CU-CP obtains the tunnel identifier of the target DU and the IP address of the target DU.
- the CU-CP sends a path switch message to the target CU-UP, where the path switch message carries the second target RB.
- the handover procedure for the above network architecture is determined to support communication between the next generation network base station nodes and communication with the next generation core network, ensuring that the terminal can truly access the next generation network.
- a fifth aspect of the embodiments of the present application provides an information interaction apparatus, including:
- the acquisition module is used to obtain the address of the CU-UP.
- a sending module configured to send, by using an address of the CU-UP, a first link setup request to the CU-UP, where the first link setup request carries the identifier of the CU-CP or/and the naming of the CU-CP.
- a receiving module configured to receive a first link setup response returned by the CU-UP, where the first link setup response carries an identifier of the CU-UP and/or a naming of the CU-UP, so that the CU-CP and The CU-UP completes the link setup.
- the receiving module is further configured to: when the CU-UP acquires the address of the CU-CP, receive a second link setup request sent by the CU-UP according to the address of the CU-CP, where the second link setup request carries Identification of the CU-UP and/or CU-UP.
- the sending module is further configured to: return, by the CU-CP, a second link setup response to the CU-UP according to the second link setup request, where the second link setup response carries the identifier of the CU-CP and/or the CU-
- the naming of the CP is such that the CU-CP and the CU-UP complete the link establishment.
- the obtaining module is specifically configured to obtain an address of the CU-CP by using a domain name system or an operation and maintenance system configuration.
- the information interaction device further includes:
- the sending module is further configured to: when detecting the attach procedure initiated by the first UE, send a data bearer DRB setup request to the CU-UP, where the DRB setup request carries an evolved radio access bearer E-RAB setup list to be configured.
- Each item in the E-RAB establishment list to be configured includes an E-RAB identifier, an Internet Protocol IP address of the core network user plane function UPF, and a tunnel identifier of the UPF, so that the CU-UP is configured according to the E -
- the RAB establishes an upstream user plane tunnel between the list and the UPF.
- the receiving module is further configured to receive a DRB setup response returned by the CU-UP, where the DRB setup response includes an E-RAB setup list, a radio bearer RB establishment list to be configured, and each item in the E-RAB setup list includes The E-RAB identifier, the IP address of the CU-UP, and the tunnel identifier of the CU-UP, each item in the RB establishment list to be configured includes an RB identifier, an IP address of the CU-UP, and a tunnel identifier of the CU-UP.
- the sending module is further configured to send the RB establishment list to be configured to the DU, so that the DU establishes an uplink user plane tunnel with the CU-UP using the establishment list to be configured by the RB.
- the sending module is further configured to send an RB establishment list to the CU-UP, where each item in the RB establishment list includes an RB identifier, an IP address of the DU, and a tunnel identifier of the DU, so that the CU-UP is established according to the RB.
- the list establishes a downlink user plane tunnel with the DU.
- the sending module is further configured to send the E-RAB establishment list to the UPF, so that the CU-UP and the UPF establish a downlink user plane tunnel.
- the data bearer DRB setup request includes security context information and a flow level quality of service QoS list, the security context information including an encryption algorithm, an integrity protection algorithm, and a security key, the security context information being The CU-UP is used to derive a user plane cipher protection key and an integrity protection key, and each item in the QoS list of the stream level includes an RAB identifier and a corresponding stream level QoS, and the QoS list of the stream level is used for knowing The RAB and corresponding QoS information to be established by the CU-UP.
- the sending module is specifically configured to send a DRB modification request to the CU-UP, where the DRB modification request carries the RB establishment list.
- the sending module is further configured to send an RB bearer setup request to the DU, where the RB bearer setup request carries the RB setup list to be configured.
- the receiving module is further configured to: when the CU-UP receives the data stream and determines that the current RB cannot carry the data stream, receive the DRB establishment indication sent by the CU-UP, where the DRB is established. The indication is used to indicate that the current RB resource cannot carry the data flow.
- the information interaction device includes:
- the sending module is further configured to send a DRB establishment request to the CU-UP, where the DRB establishment request includes an identifier of the first target RB and a data flow level QoS corresponding to the first target RB.
- the receiving module is further configured to receive a DRB setup response returned by the CU-UP, where the DRB setup response includes an identifier of the target RB, an IP address of the CU-UP, and a tunnel identifier of the CU-UP.
- the sending module is further configured to send, to the DU, an identifier of the first target RB, an IP address of the CU-UP, and a tunnel identifier of the CU-UP, so that the DU and the CU-UP establish a target for the first target Upstream user plane tunnel of RB.
- the sending module is further configured to send the identifier of the first target RB, the IP address of the DU, and the tunnel identifier of the DU to the CU-UP, so that the CU-UP establishes a downlink user plane tunnel with the DU.
- the device if the device invokes an existing RB resource as the first target RB to carry the data stream, the device includes:
- the sending module is further configured to send an RB modification request to the DU, where the RB modification request indicates that the data stream is carried by using the RB.
- the receiving module is further configured to receive an RB modification response returned by the DU.
- the receiving module is further configured to receive a handover request for the second UE.
- the information interaction device further includes:
- a determining module is configured to determine a target CU-UP and a target DU serving the second UE.
- the sending module is further configured to send, to the target DU, an identifier of the second target RB, an IP address of the target CU-UP, and a tunnel identifier of the target CU-UP, so that the target DU uses the IP of the target CU-UP.
- the address and the tunnel identifier of the target CU-UP establish an uplink user plane tunnel with the target CU-UP.
- the obtaining module is further configured to obtain a tunnel identifier of the target DU and an IP address of the target DU.
- the sending module is further configured to send a path switch message to the target CU-UP, where the path switch message carries an identifier of the second target RB, an IP address of the target DU, and a tunnel identifier of the target DU, so that the target CU -UP establishes a downlink user plane tunnel with the target DU.
- a sixth aspect of the embodiments of the present application provides an information interaction apparatus, including:
- This memory is used to store programs.
- the processor calls the program stored in the memory for performing the method of the above aspects.
- Yet another aspect of the present application provides a computer readable storage medium having instructions stored therein that, when executed on a computer, cause the computer to perform the methods described in the above aspects.
- the embodiments of the present application have the following advantages:
- the embodiment of the present application determines a logical relationship definition between a CU-CP, a CU-UP, and a DU to determine a network architecture of a next-generation network, and determines a link establishment process and a user between the CU-CP and the CU-UP.
- the access process, bearer modification process, and handover process are used to support communication between next-generation network base station nodes and communication with the next-generation core network, ensuring that the terminal can truly access the next-generation network.
- 1 is a schematic diagram of a typical network structure of an evolved network
- FIG. 2 is a schematic diagram of a network architecture of a next generation radio access network
- FIG. 3 is a schematic diagram of a network architecture according to an embodiment of the present disclosure.
- FIG. 4 is a schematic diagram of another network architecture provided by an embodiment of the present application.
- FIG. 5 is a schematic diagram of another network architecture according to an embodiment of the present disclosure.
- FIG. 6 is a schematic diagram of an information interaction method according to an embodiment of the present application.
- FIG. 7 is a schematic diagram of another information interaction method according to an embodiment of the present application.
- FIG. 8 is a schematic diagram of another information interaction method according to an embodiment of the present disclosure.
- FIG. 9 is a schematic diagram of another information interaction method according to an embodiment of the present disclosure.
- FIG. 10 is a schematic diagram of another information interaction method according to an embodiment of the present disclosure.
- FIG. 11 is a schematic diagram of another information interaction method according to an embodiment of the present application.
- FIG. 12 is a schematic diagram of an information interaction apparatus according to an embodiment of the present application.
- FIG. 13 is a schematic diagram of an information interaction apparatus according to an embodiment of the present application.
- the embodiment of the present application provides a network architecture, an information interaction method, and a device, which are used to determine a logical relationship definition between a CU-CP, a CU-UP, and a DU, and various types between the CU-CP, the CU-UP, and the DU. Business process.
- wireless LAN WLAN and global microwave interconnection access WiMAX and other broadband wireless access technologies can provide high-speed broadband wireless access services, and can support nomadic and mobile applications, greatly improving the access capability of wireless communications, enabling mobile communication networks. Integration with broadband wireless access technology.
- the terminal UE can access the network access network and establish a tunnel between the access network and the local service gateway under the control of the mobility management entity, and the local service gateway and the data gateway are also established. Tunneling, thereby establishing connectivity between the UE and the packet data network.
- FIG. 1 is a typical network structure of an evolved network, including a UE, an access network, a mobility management entity, a core control entity, a local service gateway, a data gateway, and a plurality of packet data networks PDN, respectively PDN1, PDN2, PDN3, etc.
- the UE can access the network through the access network, establish a tunnel between the access network and the local service gateway under the control of the mobility management entity, and establish a tunnel between the local service gateway and the data gateway, thereby establishing a UE and multiple
- the connectivity between the PDNs may be directly established between the UE and the data gateway, which is not limited herein.
- the UE involved in the embodiment of the present application may be a device that provides voice and/or data connectivity to a user, a handheld device with a wireless connection function, or other processing device connected to a wireless modem.
- the wireless terminal can communicate with one or more core networks via a RAN Radio Access Network, and the wireless terminal can be a mobile terminal, such as a mobile phone (or "cellular" phone) and a mobile terminal.
- the computer for example, can be a portable, pocket, handheld, computer built-in or in-vehicle mobile device that exchanges language and/or data with the wireless access network.
- the access network involved in the embodiment of the present application is composed of a series of transport entities (such as line equipment and transmission facilities) between the service node interface SNI and the user-network interface UNI, and provides a required transport bearer for supplying telecommunication services.
- the implementation system of capabilities can be configured and managed via the management interface (Q3).
- Q3 management interface
- the access network may not interpret signaling, and may be regarded as a transport network independent of services and applications, mainly completing cross-connection, multiplexing, and Transfer function.
- the mobility management entity may be responsible for managing UE location information, access authentication, non-access stratum signaling, signaling security, etc.; and the local serving gateway may be a small-range mobile data anchor of the UE. It is an interface entity of the core network and the access network, and is responsible for routing and forwarding user data; the core control entity is an entity that records and manages user location information and authentication authorization information.
- the principle of the tunneling technology is to encapsulate the protocol packets transmitted between the two endpoint entities of the tunnel with another protocol, so as to implement secure transmission and routing of data between the two endpoint entities.
- the telecommunication network may establish a complete network management and control mechanism, so that when the terminal exits the network, the resources allocated to the user need to be released in time. Including wireless channels, bearers, various tunnels and stored information.
- the user equipment may be connected to access one or more packet data services, and the packet data service is identified by an Access Point Name (APN), and the network side may establish a user to the corresponding data according to the APN. Gateway connectivity, the data gateway then establishes connectivity to the corresponding PDN based on the APN.
- APN of the packet data service that the user needs to access may be pre-configured on the network side or may be provided by the user equipment to the network side, which is not limited herein.
- FIG. 2 is a network architecture of a next generation radio access network, including a core network, an adio access network (RAN), and a UE, where the existing next generation radio access network architecture is discussed.
- the radio access network RAN evolves into a central unit (CU) and a distributed control unit (DU), wherein the CU decouples the user plane and the control plane to form a CU-control plane CP (CU).
- CU central unit
- DU distributed control unit
- CU CU-Control Plane, CU) and CU-User Plane (CU)
- CU-CP and CU-UP support flexible deployment.
- the embodiment of the present application determines a logical relationship definition between a CU-CP, a CU-UP, and a DU to determine a network architecture of a next-generation network, and determines a link establishment process and a user between the CU-CP and the CU-UP.
- the access process, bearer modification process, and handover process are used to support communication between next-generation network base station nodes and communication with the next-generation core network, ensuring that the terminal can truly access the next-generation network.
- a network architecture provided by the embodiment of the present application includes:
- the first CU-CP, M1 CU-UP and N1 DUs The first CU-CP, M1 CU-UP and N1 DUs.
- the first CU-CP is connected to the M1 CU-UPs, and the CU-CPs connected to any one of the M1 CU-UPs are only the first CU-CP, that is, one CU-CP can be One or more CU-UPs are connected, and one CU-UP is connected to only one CU-CP, that is, the CU-CP and the CU-UP are in a one-to-many relationship.
- the first CU-CP is connected to the N1 DUs, and the CU-CP connected to any one of the N1 DUs is only the first CU-CP, that is, one CU-CP can be connected to one or more DUs, one
- the DU is only connected to one CU-CP, that is, the CU-CP and the DU are one-to-many relationships.
- any one of the M1 CU-UPs is connected to at least one of the N1 DUs, and any one of the N1 DUs is connected to at least one of the M1 CU-UPs, that is, one CU-UP can be connected to one Or multiple DUs, one DU can also be connected to one or more CU-UPs, that is, CU-UP and DU are many-to-many relationships.
- another network architecture provided by the embodiment of the present application includes:
- the first CU-UP is connected to the M2 CU-CPs, and the CU-UP connected to any one of the M2 CU-CPs is only the first CU-UP, that is, one CU-UP can be connected to one Or multiple CU-UPs, one CU-UP is connected to only one CU-CP, that is, the CU-CP and CU-UP are in a many-to-one relationship.
- Any one of the M2 CU-CPs is connected to at least one of the N2 DUs, and the CU-CP connected to any one of the N2 DUs is one of the M2 CU-CPs, that is, One CU-CP can be connected to one or more DUs, and one DU can only be connected to one CU-CP, that is, CU-CP and DU are one-to-many relationships.
- the first CU-UP is connected to the N2 DUs, and the CU-UP connected to any one of the N2 DUs is only the first CU-UP, and one CU-UP can be connected to one or more DUs, one DU Only one CU-UP is connected, that is, CU-UP and DU are one-to-many relationships.
- another network architecture provided by the embodiment of the present application includes:
- any one of the N3 CU-UPs is connected to at least one of the M3 CU-CPs, and any one of the M3 CU-CPs is connected to at least one of the N3 CU-UPs, that is, one
- the CU-UP can be connected to one or more CU-UPs, and one CU-UP can also be connected to one or more CU-CPs, that is, the CU-CP and the CU-UP are in a many-to-many relationship.
- any one of the M3 CU-CPs is connected to at least one of the N2 DUs, and the CU-CP connected to any one of the N2 DUs is one of the M2 CU-CPs, one
- the CU-CP can be connected to one or more DUs, and one DU is connected to only one CU-CP, that is, the CU-CP and the DU are in a one-to-many relationship.
- any one of the N CU-UPs is connected to at least one of the K DUs, and any one of the K DUs is connected to at least one of the N 3 CU-UPs, that is, one CU-UP can be connected to one Or multiple DUs, one DU can also be connected to one or more CU-UPs, that is, CU-UP and DU are many-to-many relationships.
- the embodiment of the present application provides An information interaction method for link configuration of CU-CP and CU-UP quality inspection, including:
- the CU-CP obtains the DNS of the domain name system, or obtains the address of the CU-UP through the operation and maintenance system configuration.
- the CU-CP can obtain the address of the CU-UP. Specifically, it can be obtained through a domain name system (DNS) or configured through an operation and maintenance system.
- DNS domain name system
- the DNS mentioned in the embodiment of the present application is a distributed database that is mapped to each other as a domain name and an IP address on the Internet, which enables users to access the Internet more conveniently without having to remember to be able to be machined.
- the process of directly reading the IP number string only by the host name and finally obtaining the IP address corresponding to the host name is called domain name resolution (or host name resolution).
- the CU-CP may also configure the address of the CU-UP through the operation and maintenance system, which is not limited herein.
- the CU-CP sends a first link setup request to the CU-UP by using an address of the CU-UP.
- the first link establishment request may be sent to the CU-UP through the address to establish a link between each other.
- the first link setup request may carry the identifier of the CU-CP or/and the naming of the CU-CP, so that when the CU-UP needs to reply to the message, the CU-CP can be directly used. The name of the identifier or / and CU-CP to reply to the message.
- the CU-UP establishes a response to the first link returned by the CU-CP.
- the CU-UP when the CU-UP receives the first link setup request sent by the CU-CP and obtains the identifier of the CU-CP or/and the naming of the CU-CP, the CU- The identity of the CP or/and the naming of the CU-CP determines the address of the CU-CP and returns a first link setup response for the first link setup request.
- the CU-CP receives the first link setup response
- the CU-CP and the CU-UP complete the link setup.
- the first link setup response carries the identifier of the CU-UP and/or the naming of the CU-UP to facilitate subsequent information interaction.
- an information interaction method provided by an embodiment of the present application is used for a process of being accessed by a user, including:
- the CU-UP obtains the address of the CU-CP through the DNS, or through the operation and maintenance system configuration.
- the link can be established not only by acquiring the address of the CU-UP through the CU-CP, but also by actively acquiring the address of the CU-CP by the CU-UP.
- the CU-UP can also obtain the address of the CU-CP through the DNS, or configure the address of the CU-CP through the operation and maintenance system, which is not limited herein.
- the CU-UP establishes a second link setup request to the CU-CP according to the address of the CU-CP, where the second link setup request carries the identifier of the CU-UP and/or the naming of the CU-UP.
- the second link establishment request may be sent to the CU-CP through the address to establish a link between each other.
- the second link setup request may carry the identifier of the CU-UP or/and the naming of the CU-UP, so that when the CU-CP needs to reply to the message, the CU-UP can be directly used. The name of the identifier or / and CU-UP to reply to the message.
- the CU-CP returns a second link setup response to the CU-UP according to the second link setup request, where the second link setup response carries the identifier of the CU-CP and/or the naming of the CU-CP.
- the CU-CP and the CU-UP complete the link establishment.
- the CU-CP when the CU-CP receives the first link setup request sent by the CU-UP and obtains the identifier of the CU-UP or/and the naming of the CU-UP, the CU- The identity of the UP or/and the naming of the CU-UP determines the address of the CU-UP and returns a second link setup response for the second link setup request.
- the CU-UP receives the second link setup response
- the CU-UP and the CU-CP complete the link setup.
- the second link setup response carries the identity of the CU-CP and/or the naming of the CU-CP to facilitate subsequent information interaction.
- an information interaction method is provided for receiving user access, including:
- the attach process initiated by the first UE is detected.
- the attach service is initiated when the terminal is powered on or has no signal to have a signal, or switches to a certain base station.
- the first UE initiates an attach procedure, so that the CU-CP, the CU-UP, and the DU that serve the first UE perform the following steps to open a tunnel between the user planes.
- the CU-CP sends a data bearer DRB setup request to the CU-UP.
- the DRB establishment request may carry an evolved radio access bearer E-RAB establishment list to be configured, and each item in the E-RAB establishment list to be configured may include an E-RAB identifier and a core.
- the network user interface functions the Internet Protocol IP address of the UPF and the tunnel identifier of the UPF, and the CU-UP can determine the core network to be attached according to the E-RAB establishment list to be configured, and determine the IP address and tunnel of the core network. Identification to establish an upstream user plane tunnel with the User Plane Function (UPF) of the core network.
- UPF User Plane Function
- the data bearer DRB setup request may further include security context information and a traffic quality QoS list.
- security context information includes an encryption algorithm, an integrity protection algorithm, and a security key
- security context information is used by the CU-UP to derive a user plane encryption protection key and an integrity protection key.
- Each item in the QoS list of the flow level includes an RAB identifier and a corresponding flow level QoS, and the QoS list of the flow level is used to notify the RAB and the corresponding QoS information to be established by the CU-UP.
- the DRB establishment request may also include other information, which is not limited herein.
- the CU-UP returns a DRB setup response to the CU-CP.
- the CU-UP may return a DRB setup response to the CU-CP.
- the DRB setup response may include an E-RAB setup list and a radio bearer RB to be configured.
- the E-RAB establishment list is used for subsequent transmission to the UPF to establish a downlink user plane tunnel between the CU-UP and the UPF, and the RB to be configured is established.
- the list is used for subsequent transmission to the DU to establish an upstream user plane tunnel between the CU-UP and the DU.
- each item in the RB establishment list to be configured further includes a packet data convergence protocol (PDCP) configuration of each RB, which is not limited herein.
- PDCP packet data convergence protocol
- the CU-CP sends an RB bearer setup request to the DU.
- the DU sends an RB bearer setup response to the CU-CP.
- the CU-CP may send an RB bearer setup request to the DU that serves the first UE, where the RB bearer setup request may carry the RB establishment list to be configured, so that The DU establishes an uplink user plane tunnel with the CU-UP using the setup list to be configured by the RB.
- the DU sends an RB bearer setup response to the CU-CP, and establishes an uplink user plane tunnel with the CU-UP by using the address and tunnel identifier of the CU-UP in the RB bearer setup request.
- the CU-CP sends a DRB modification request to the CU-UP.
- the CU-UP sends a DRB modification response to the CU-CP.
- the DRB modification request may carry the RB establishment list, where each item in the RB establishment list includes an RB identifier.
- the IP address of the DU and the tunnel identifier of the DU so that the CU-UP establishes a downlink user plane tunnel with the DU according to the RB establishment list.
- the RB establishment list may be used to establish a downlink user plane tunnel with the DU, and return a DRB modification response to the CU-UP.
- the CU-CP initiates an RRC configuration process.
- the CU-CP may initiate an RRC configuration procedure, so that the first UE can connect to the network.
- the CU-CP sends the E-RAB establishment list to the UPF, so that the CU-UP and the UPF establish a downlink user plane tunnel.
- the CU-CP may send the E-RAB establishment list to the UPF, so that the CU-UP and the UPF establish a downlink user plane tunnel.
- the first UE can complete the remaining attach procedure.
- the bearer may be modified to meet the requirements of the new data stream.
- the The CU-CP may create a new RB resource as the first target RB to carry the data stream, or the CU-CP invokes the existing RB resource as the first target RB to carry the data stream.
- the CU-CP can create a new RB resource as the first target RB.
- an information interaction method provided by an embodiment of the present application is used in the foregoing various network architectures, including:
- the CU-UP may receive the data stream and perform bearer processing on the data stream using the RB.
- the current RB cannot carry the received data stream. If the qos does not meet the service requirements, the RB is not required to be created.
- the CU-UP sends a DRB establishment indication to the CU-CP.
- the CU-UP may send a DRB establishment indication to the CU-CP, so that other RBs are used to carry the data stream, where the DRB
- the establishment includes an Unsatisfied Flow Level QoS List, which includes the current RB resource cannot carry the data flow.
- the CU-CP sends a DRB establishment request to the CU-UP.
- the CU-UP returns a DRB setup response to the CU-CP.
- the CU-CP when the CU-CP receives the DRB establishment indication, it may determine a required first target RB, and send a DRB establishment request to the CU-UP, where the DRB establishment request may include the first The identifier of the target RB and the data flow level QoS corresponding to the first target RB.
- the CU-UP When the CU-UP receives the DRB establishment request, it may return a DRB establishment response to the CU-CP, where the DRB establishment response may include an identifier of the target RB, an IP address of the CU-UP, and the CU-UP. Tunnel identification.
- the CU-CP sends an RB bearer setup request to the DU.
- the DU sends an RB bearer setup response to the CU-CP.
- the RB bearer setup request may be sent to the DU, where the RB bearer setup request may include the identifier of the first target RB, the IP address of the CU-UP, and the CU-UP.
- the tunnel is identified such that the DU establishes an uplink user plane tunnel with the CU-UP for the first target RB.
- the DU may then send an RB bearer setup response to the CU-CP to complete the establishment of the RB bearer.
- the CU-CP sends a DRB modification request to the CU-UP.
- the CU-UP returns a DRB modification response to the CU-CP.
- the DU may send an RB bearer setup response to the CU-CP, where the RB modify request may include an identifier of the first target RB, an IP address of the DU, and a tunnel identifier of the DU, such that The CU-UP establishes a downlink user plane tunnel with the DU.
- the first target RB has been newly created to carry the data stream, and the CU-UP and the uplink user plane tunnel and the downlink user plane tunnel of the DU have been established.
- the CU-CP invokes the existing RB resource as the first target RB.
- the CU-UP sends a DRB establishment indication to the CU-CP.
- steps 1001 and 1002 are the same as the above steps 901 and 902, and are not described herein.
- the CU-CP sends an RB modification request to the DU.
- the CU-CP receives an RB modification response returned by the DU.
- the CU-CP may use the existing RB resource as the first target RB, and the CU-CP sends an RB modification request to the DU, where the RB modification request is used to indicate that the DU performs resource re-request. Allocated to meet new QoS requirements, the used first target RB is invoked to carry the data stream.
- the CU-CP initiates an RRC configuration process.
- the CU-CP may re-initiate the RRC configuration procedure, so that the UE reconnects to the network through the first target RB.
- an information interaction method provided by an embodiment of the present application is used for performing handover by a second UE, including:
- the CU-CP receives a handover request for a second UE.
- the CU-CP serves the second UE, and then the handover request of the second UE may be received, and the CU is triggered. - The switching process between CPs.
- the CU-CP determines a target CU-UP and a target DU serving the second UE.
- the CU-CP may determine a target CU-UP and a target DU serving the second UE, and then establish a connection with the target CU-UP and the target DU, and then establish the target by the following steps.
- the CU-CP sends an identifier of the second target RB, an IP address of the target CU-UP, and a tunnel identifier of the target CU-UP to the target DU.
- the identifier of the second target RB, the IP address of the target CU-UP, and the target CU-UP may be sent to the target DU.
- the tunnel identifier, the target DU may establish an uplink user plane tunnel with the target CU-UP using the IP address of the target CU-UP and the tunnel identifier of the target CU-UP.
- the CU-CP acquires a tunnel identifier of the target DU and an IP address of the target DU.
- the CU-CP may obtain the tunnel identifier of the target DU and the IP address of the target DU through communication with the target DU, and may also be obtained through other channels, which is not limited herein.
- the CU-CP sends a path switch message to the target CU-UP.
- the target CU-UP sends a path transition confirmation to the CU-CP.
- the CU-CP may send a path switch message to the target CU-UP, where the path switch message carries the identifier of the second target RB, the IP address of the target DU, and the tunnel identifier of the target DU. So that the target CU-UP establishes a downlink user plane tunnel with the target DU, and then the target CU-UP can send a path switch confirmation to the CU-CP. At this point, the uplink user plane tunnel and the downlink user plane tunnel of the target CU-UP and the target DU are established, and the second UE can tunnel and downlink through the target CU-UP and the uplink user plane of the target DU. The user plane tunnel is connected to the network.
- GSM Global System for Mobile Communication
- UMTS Universal Mobile Telecommunications System
- CDMA Code Division Multiple Access
- an information interaction apparatus 1200 provided by the embodiment of the present application includes:
- the obtaining module 1201 is configured to obtain an address of the CU-UP.
- the address of the CU-CP is obtained through a domain name system or an operation and maintenance system configuration.
- the sending module 1202 is configured to send, by using an address of the CU-UP, a first link setup request to the CU-UP, where the first link setup request carries the identifier of the CU-CP or/and the naming of the CU-CP.
- the receiving module 1203 is configured to receive a first link setup response returned by the CU-UP, where the first link setup response carries the identifier of the CU-UP and/or the naming of the CU-UP, so that the CU-CP And the CU-UP completes the link establishment.
- the receiving module 1203 is further configured to: when the CU-UP acquires the address of the CU-CP, receive a second link setup request sent by the CU-UP according to the address of the CU-CP, the second link setup request Carry the CU-UP logo and / or CU-UP naming.
- the sending module 1202 is further configured to: return, by the CU-CP, a second link setup response to the CU-UP according to the second link setup request, where the second link setup response carries the identifier of the CU-CP and/or the CU The naming of the CP so that the CU-CP and the CU-UP complete the link establishment.
- the information interaction device further includes:
- the sending module 1202 is further configured to: when detecting the attach procedure initiated by the first UE, send a data bearer DRB setup request to the CU-UP, where the DRB setup request carries the evolved radio access bearer E-RAB to be configured.
- a list, each item in the E-RAB establishment list to be configured includes an E-RAB identifier, an Internet Protocol IP address of the core network user plane function UPF, and a tunnel identifier of the UPF, so that the CU-UP is configured according to the The E-RAB establishes an uplink user plane tunnel between the list and the UPF.
- the data bearer DRB setup request may further include security context information and a flow level quality of service QoS list, the security context information including an encryption algorithm, an integrity protection algorithm, and a security key, the security context information being used by the CU-UP Deriving a user plane encryption protection key and an integrity protection key, each item in the flow level QoS list includes an RAB identifier and a corresponding flow level QoS, and the QoS list of the flow level is used to notify the CU-UP Established RAB and corresponding QoS information.
- security context information including an encryption algorithm, an integrity protection algorithm, and a security key
- the security context information being used by the CU-UP Deriving a user plane encryption protection key and an integrity protection key
- each item in the flow level QoS list includes an RAB identifier and a corresponding flow level QoS
- the QoS list of the flow level is used to notify the CU-UP Established RAB and corresponding QoS information.
- the receiving module 1203 is further configured to receive a DRB setup response returned by the CU-UP, where the DRB setup response includes an E-RAB setup list, a radio bearer RB establishment list to be configured, and each item in the E-RAB establishment list
- the E-RAB identifier, the IP address of the CU-UP, and the tunnel identifier of the CU-UP are included.
- Each entry in the RB establishment list to be configured includes an RB identifier, an IP address of the CU-UP, and a tunnel identifier of the CU-UP.
- the sending module 1202 is further configured to send the RB establishment list to be configured to the DU, so that the DU establishes an uplink user plane tunnel with the CU-UP using the establishment list to be configured by the RB.
- the RB bearer setup request is sent to the DU, and the RB bearer setup request carries the RB setup list to be configured.
- the sending module 1202 is further configured to send an RB establishment list to the CU-UP, where each item in the RB establishment list includes an RB identifier, an IP address of the DU, and a tunnel identifier of the DU, so that the CU-UP is based on the RB. Establish a list to establish a downlink user plane tunnel with the DU.
- the method is configured to send a DRB modification request to the CU-UP, where the DRB modification request carries the RB establishment list.
- the sending module 1202 is further configured to send the E-RAB establishment list to the UPF, so that the CU-UP and the UPF establish a downlink user plane tunnel.
- the receiving module 1203 is further configured to: when the CU-UP receives the data stream and determines that the current RB cannot carry the data stream, receive the DRB establishment indication sent by the CU-UP, the DRB An establishment indication is used to indicate that the current RB resource cannot carry the data flow.
- the information interaction apparatus 1200 may create a new RB resource as the first target RB to carry the data stream, then:
- the sending module 1202 is further configured to send a DRB establishment request to the CU-UP, where the DRB establishment request includes an identifier of the first target RB and a data flow level QoS corresponding to the first target RB.
- the receiving module 1203 is further configured to receive a DRB setup response returned by the CU-UP, where the DRB setup response includes an identifier of the target RB, an IP address of the CU-UP, and a tunnel identifier of the CU-UP.
- the sending module 1202 is further configured to send, to the DU, an identifier of the first target RB, an IP address of the CU-UP, and a tunnel identifier of the CU-UP, so that the DU and the CU-UP are established for the first The upstream user plane tunnel of the target RB.
- the sending module 1202 is further configured to send the identifier of the first target RB, the IP address of the DU, and the tunnel identifier of the DU to the CU-UP, so that the CU-UP establishes a downlink user plane tunnel with the DU.
- the sending module 1202 is further configured to send an RB modification request to the DU, where the RB is sent.
- the modification request indicates that the data stream is carried using the RB.
- the receiving module 1203 is further configured to receive an RB modification response returned by the DU.
- the receiving module 1203 is further configured to receive a handover request regarding the second UE.
- the information interaction device 1200 further includes:
- a determining module 1204 is configured to determine a target CU-UP and a target DU serving the second UE.
- the sending module 1202 is further configured to send, to the target DU, an identifier of the second target RB, an IP address of the target CU-UP, and a tunnel identifier of the target CU-UP, so that the target DU uses the target CU-UP.
- the IP address and the tunnel identifier of the target CU-UP establish an uplink user plane tunnel with the target CU-UP.
- the obtaining module 1201 is further configured to acquire a tunnel identifier of the target DU and an IP address of the target DU.
- the sending module 1202 is further configured to send a path switch message to the target CU-UP, where the path switch message carries an identifier of the second target RB, an IP address of the target DU, and a tunnel identifier of the target DU, so that the target The CU-UP establishes a downlink user plane tunnel with the target DU.
- an embodiment of the present application further provides an information interaction apparatus, including:
- the memory 1302 is configured to store a program.
- the processor 1301 invokes a program stored in the memory for performing the methods described in the above steps.
- the computer program product includes one or more computer instructions.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
- wire eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
- the computer readable storage medium can be any available media that can be stored by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
- the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
- the disclosed system, apparatus, and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请实施例公开了一种网络架构、信息交互方法以及装置,用于确定CU-CP、CU-UP和DU之间的逻辑关系定义,以及CU-CP、CU-UP和DU之间各种业务的流程。本申请实施例方法包括:CU-CP获取CU-UP的地址;所述CU-CP通过所述CU-UP的地址向所述CU-UP发送第一链路建立请求,所述第一链路建立请求携带CU-CP的标识或/和CU-CP的命名;所述CU-CP接收所述CU-UP返回的第一链路建立响应,所述第一链路建立响应携带所述CU-UP的标识和/或所述CU-UP的命名,以使得所述CU-CP和所述CU-UP完成链路建立。确定下一代网络的网络架构,且确定了CU-CP与CU-UP之间的链路建立流程、用户接入流程、承载修改流程和切换流程,以支持下一代网络基站节点之间通信以及与下一代核心网之间通信,确保了终端能够真正接入下一代网络。
Description
本申请要求于2018年1月23日提交中国专利局、申请号为201810065499.2、发明名称为“一种网络架构、信息交互方法以及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信领域,尤其涉及一种网络架构、信息交互方法以及装置。
以无线局域网WLAN和全球微波互联接入WiMAX为代表的宽带无线接入技术可以提供高速率的宽带无线接入业务,并且支持游牧和移动应用,大大提高了无线通信的接入能力,移动通信网络与宽带无线接入技术的融合是今后电信网络的演进趋势。
在演进后的典型网络结构中,终端UE可以通过接入网接入网络,在移动性管理实体的控制下在接入网和本地服务网关间建立隧道,本地服务网关和数据网关之间也建立隧道,从而建立了UE和分组数据网之间的连通性。在现有的下一代无线接入网架构的讨论中,无线接入网RAN的演进为集中控制单元(Central Unit,CU)和分布式控制单元(Distributed Unit,DU),其中,CU进行用户面和控制面解耦,形成CU-控制面CP(CU-Control Plane,CU)和CU-用户面UP(CU-User Plane,CU),CU-CP和CU-UP支持灵活部署。
但是,若要支持用户的接入,需要明确CU-CP、CU-UP和DU之间的逻辑关系和CU-CP和CU-UP之间需要进行哪些消息交互,但是当前下一代网络的定义,并没有明确以上的信息。
发明内容
本申请实施例提供了一种网络架构、信息交互方法以及装置,用于确定CU-CP、CU-UP和DU之间的逻辑关系定义,以及CU-CP、CU-UP和DU之间各种业务的流程。
有鉴于此,本申请实施例的第一方面提供一种网络架构,包括:
第一CU-CP、M1个CU-UP和N1个DU。
其中,该第一CU-CP连接该M1个CU-UP,该M1个CU-UP中的任一CU-UP所连接的CU-CP仅为该第一CU-CP,即一个CU-CP可以连接一个或多个CU-UP,而一个CU-UP只连接一个CU-CP,即CU-CP和CU-UP是一对多的关系。
该第一CU-CP连接该N1个DU,该N1个DU中的任一DU所连接的CU-CP仅为该第一CU-CP,即一个CU-CP可以连接一个或多个DU,一个DU只连接一个CU-CP,即CU-CP和DU是一对多的关系。
该M1个CU-UP中的任一CU-UP连接该N1个DU中至少一个,该N1个DU中的任一DU连接该M1个CU-UP中至少一个,即一个CU-UP可以连接一个或多个DU,一个DU也可以连接一个或多个CU-UP,即CU-UP和DU是多对多的关系。
其中,需要说明的是,虚线连接为通过为控制面连接,实线连接为通过用户面连接。
本申请实施例的第二方面提供一种网络架构,包括:
M2个CU-CP、第一CU-UP和N2个DU;
该第一CU-UP连接该M2个CU-CP,该M2个CU-CP中的任一CU-CP所连接的CU-UP仅为该第一CU-UP,即一个CU-UP可以连接一个或多个CU-UP,一个CU-UP只连接一个CU-CP,即CU-CP和CU-UP是多对一的关系。
该M2个CU-CP中的任一CU-CP连接该N2个DU中的至少一个,该N2个DU中的任一DU所连接的CU-CP为该M2个CU-CP中的一个,即一个CU-CP可以连接一个或多个DU,一个DU只连接一个CU-CP,即CU-CP和DU是一对多的关系。
该第一CU-UP连接该N2个DU,该N2个DU中的任一DU所连接的CU-UP仅为该第一CU-UP,一个CU-UP可以连接一个或多个DU,一个DU只连接一个CU-UP,即CU-UP和DU是一对多的关系。
本申请实施例的第三方面提供一种网络架构,包括:
M3个CU-CP、N3个CU-UP和K个DU;
该N3个CU-UP中任一CU-UP连接该M3个CU-CP中的至少一个,该M3个CU-CP中任一CU-CP连接该N3个CU-UP中的至少一个,即一个CU-UP可以连接一个或多个CU-UP,一个CU-UP也可以连接一个或多个CU-CP,即CU-CP和CU-UP是多对多的关系。
该M3个CU-CP中的任一CU-CP连接该N2个DU中的至少一个,该N2个DU中的任一DU所连接的CU-CP为该M2个CU-CP中的一个,一个CU-CP可以连接一个或多个DU,一个DU只连接一个CU-CP,即CU-CP和DU是一对多的关系。
该N3个CU-UP中任一CU-UP连接该K个DU中的至少一个,该K个DU中任一DU连接该N3个CU-UP中的至少一个,即一个CU-UP可以连接一个或多个DU,一个DU也可以连接一个或多CU-UP,即CU-UP和DU是多对多的关系。
以上描述了CU-CP、CU-UP和DU之间的逻辑结构关系,以下对CU-CP、CU-UP和DU之间的各种业务流程进行描述,本申请实施例的第四方面提供一种信息交互方法,用于上述各方面的网络架构,包括:
CU-CP获取CU-UP的地址,在一些可行的实施例中,该CU-CP通过域名系统或运维系统配置获取该CU-CP的地址,然后可以通过该CU-UP的地址向该CU-UP发送第一链路建立请求,该第一链路建立请求携带CU-CP的标识或/和CU-CP的命名,接着接收该CU-UP返回的第一链路建立响应,该第一链路建立响应携带该CU-UP的标识和/或该CU-UP的命名,以使得该CU-CP和该CU-UP完成链路建立。
或者,该CU-UP获取该CU-CP的地址,在一些可行的实施例中,该CU-UP通过该域名系统或该运维系统配置获取该CU-UP的地址,然后可以通过该CU-CP的地址向该CU-CP发送第一链路建立请求,该第一链路建立请求携带CU-UP的标识或/和CU-UP的命名,接着接收该CU-CP返回的第一链路建立响应,该第一链路建立响应携带该CU-CP的标识和/或该CU-CP的命名,以使得该CU-UP和该CU-CP完成链路建立。
通过上述步骤,确定了CU-CP与CU-UP之间的链路建立流程,以支持下一代网络基站节点之间通信以及与下一代核心网之间通信,确保了终端能够真正接入下一代网络。
在一些可行的实施例中,该CU-CP和该CU-UP完成链路建立后,还包括:
当检测到第一UE发起的附着流程时,该CU-CP可以向该CU-UP发送数据承载DRB建立请求,该DRB建立请求携带要配置的演进的无线接入承载E-RAB建立列表,该要配置的E-RAB建立列表中的每一项包括E-RAB标识、核心网用户面功能UPF的互联网协议IP地址和UPF的隧道标识,以使得该CU-UP根据该要配置的E-RAB建立列表建立与UPF之间的上行用户面隧道。然后该CU-CP接收该CU-UP返回的DRB建立响应,该DRB建立响应包括E-RAB建立列表、要配置的无线承载RB建立列表,该E-RAB建立列表中的每一项包括E-RAB标识、CU-UP的IP地址和CU-UP的隧道标识,该要配置的RB建立列表中的每一项包括RB标识、CU-UP的IP地址和CU-UP的隧道标识。接着,该CU-CP向DU发送该要配置的RB建立列表,以使得该DU使用该RB要配置的建立列表与该CU-UP建立上行用户面隧道,接着,该CU-CP向该CU-UP发送RB建立列表,该RB建立列表中的每一项包括RB标识,DU的IP地址和DU的隧道标识,以使得该CU-UP根据该RB建立列表与该DU建立下行用户面隧道。最后,该CU-CP向该UPF发送该E-RAB建立列表,以使得该CU-UP和该UPF建立下行用户面隧道。
在一些可行的实施例中,该数据承载DRB建立请求包括安全上下文信息和流级别的服务质量QoS列表,该安全上下文信息包括加密算法、完整性保护算法、和安全密钥,该安全上下文信息被该CU-UP用于导出用户面加密保护密钥和完整性保护密钥,该流级别的QoS列表中的每一项包括RAB标识以及对应的流级别QoS,该流级别的QoS列表用于知会该CU-UP要建立的RAB和对应的QoS信息。
在一些可行的实施例中,该CU-CP通过向该CU-UP发送DRB修改请求发送该RB建立列表,该DRB修改请求携带该RB建立列表。
在一些可行的实施例中,该要配置的RB建立列表中每一项还包括每一个RB的分组数据汇聚协议PDCP配置。
在一些可行的实施例中,该CU-CP通过向该DU发送RB承载建立请求发送RB建立列表,该RB承载建立请求携带该要配置的RB建立列表。
通过上述步骤,确定了对上述网络架构的用户接入流程,以支持下一代网络基站节点之间通信以及与下一代核心网之间通信,确保了终端能够真正接入下一代网络。
在一些可行的实施例中,该方法还包括:
当该CU-UP接收到数据流并确定当前的RB无法承载该数据流时,该CU-CP接收该CU-UP发送的DRB建立指示,该DRB建立指示用于指示当前的RB资源无法承载该数据流,然后该CU-CP新建RB资源作为第一目标RB,以承载该数据流,或者,该CU-CP调用已有的RB资源作为该第一目标RB,以承载该数据流。
具体的,在一些可行的实施例中,该CU-CP新建RB资源作为第一目标RB包括:
该CU-CP向该CU-UP发送DRB建立请求,该DRB建立请求包括该第一目标RB的标识以及该第一目标RB对应的数据流级别QoS,然后该CU-CP接收该CU-UP返回的DRB建立响应,该DRB建立响应包括该目标RB的标识、该CU-UP的IP地址和该CU-UP的隧道标识,记者,该CU-CP向该DU发送该第一目标RB的标识、该CU-UP的IP地址和该CU-UP的隧道标识,以使得该DU与该CU-UP建立针对该第一目标RB的上行用户面隧道,最后,该CU-CP向该CU-UP发送该第一目标RB的标识,该DU的IP地址和该DU的隧道标识,以使得该CU-UP与该DU建立下行用户面隧道。
在一些可行的实施例中,该CU-CP调用已有的RB资源作为该RB包括:
该CU-CP向该DU发送RB修改请求,该RB修改请求指示使用该RB承载该数据流,然后,该CU-CP接收该DU返回的RB修改响应。
通过上述步骤,确定了对上述网络架构的承载修改流程,以支持下一代网络基站节点之间通信以及与下一代核心网之间通信,确保了终端能够真正接入下一代网络。
在一些可行的实施例中,该方法还包括:
该CU-CP接收关于第二UE的切换请求,然后该CU-CP确定服务该第二UE的目标CU-UP和目标DU,接着该CU-CP向该目标DU发送第二目标RB的标识、该目标CU-UP的IP地址和该目标CU-UP的隧道标识,以使得该目标DU使用该目标CU-UP的IP地址和该目标CU-UP的隧道标识与该目标CU-UP建立上行用户面隧道,接着该CU-CP获取该目标DU的隧道标识和该目标DU的IP地址,最后,该CU-CP向该目标CU-UP发送路径转换消息,该路径转换消息携带该第二目标RB的标识、该目标DU的IP地址和该目标DU的隧道标识,以使得该目标CU-UP与该目标DU建立下行用户面隧道。
通过上述步骤,确定了对上述网络架构的切换流程,以支持下一代网络基站节点之间通信以及与下一代核心网之间通信,确保了终端能够真正接入下一代网络。
本申请实施例的第五方面提供一种信息交互装置,包括:
获取模块,用于获取CU-UP的地址。
发送模块,用于通过该CU-UP的地址向该CU-UP发送第一链路建立请求,该第一链路建立请求携带CU-CP的标识或/和CU-CP的命名。
接收模块,用于接收该CU-UP返回的第一链路建立响应,该第一链路建立响应携带该CU-UP的标识和/或该CU-UP的命名,以使得该CU-CP和该CU-UP完成链路建立。
或,
该接收模块,还用于当该CU-UP获取该CU-CP的地址时,接收该CU-UP根据该CU-CP的地址发送的第二链路建立请求,该第二链路建立请求携带CU-UP的标识和/或CU-UP的命名。
该发送模块,还用于该CU-CP根据该第二链路建立请求向该CU-UP返回第二链路建立响应,该第二链路建立响应携带CU-CP的标识和/或CU-CP的命名,以使得该CU-CP和该CU-UP完成链路建立。
在一些可行的实施例中,该获取模块,具体用于通过域名系统或运维系统配置获取该CU-CP的地址。
在一些可行的实施例中,该信息交互装置还包括:
该发送模块,还用于当检测到第一UE发起的附着流程时,向该CU-UP发送数据承载DRB建立请求,该DRB建立请求携带要配置的演进的无线接入承载E-RAB建立列表,该要配置的E-RAB建立列表中的每一项包括E-RAB标识、核心网用户面功能UPF的互联网协议IP地址和UPF的隧道标识,以使得该CU-UP根据该要配置的E-RAB建立列表建立与UPF之间的上行用户面隧道。
该接收模块,还用于接收该CU-UP返回的DRB建立响应,该DRB建立响应包括E-RAB建立列表、要配置的无线承载RB建立列表,该E-RAB建立列表中的每一项包括E-RAB标识、CU-UP的IP地址和CU-UP的隧道标识,该要配置的RB建立列表中的每一项包括RB标识、CU-UP 的IP地址和CU-UP的隧道标识。
该发送模块,还用于向DU发送该要配置的RB建立列表,以使得该DU使用该RB要配置的建立列表与该CU-UP建立上行用户面隧道。
该发送模块,还用于向该CU-UP发送RB建立列表,该RB建立列表中的每一项包括RB标识,DU的IP地址和DU的隧道标识,以使得该CU-UP根据该RB建立列表与该DU建立下行用户面隧道。
该发送模块,还用于向该UPF发送该E-RAB建立列表,以使得该CU-UP和该UPF建立下行用户面隧道。
在一些可行的实施例中,该数据承载DRB建立请求包括安全上下文信息和流级别的服务质量QoS列表,该安全上下文信息包括加密算法、完整性保护算法、和安全密钥,该安全上下文信息被该CU-UP用于导出用户面加密保护密钥和完整性保护密钥,该流级别的QoS列表中的每一项包括RAB标识以及对应的流级别QoS,该流级别的QoS列表用于知会该CU-UP要建立的RAB和对应的QoS信息。
在一些可行的实施例中,该发送模块,具体用于向该CU-UP发送DRB修改请求,该DRB修改请求携带该RB建立列表。
在一些可行的实施例中,该发送模块,具体还用于向该DU发送RB承载建立请求,该RB承载建立请求携带该要配置的RB建立列表。
在一些可行的实施例中,该接收模块,还用于当该CU-UP接收到数据流并确定当前的RB无法承载该数据流时,接收该CU-UP发送的DRB建立指示,该DRB建立指示用于指示当前的RB资源无法承载该数据流。
在一些可行的实施例中,若该装置新建RB资源作为第一目标RB,以承载该数据流,该信息交互装置包括:
该发送模块,还用于向该CU-UP发送DRB建立请求,该DRB建立请求包括该第一目标RB的标识以及该第一目标RB对应的数据流级别QoS。
该接收模块,还用于接收该CU-UP返回的DRB建立响应,该DRB建立响应包括该目标RB的标识、该CU-UP的IP地址和该CU-UP的隧道标识。
该发送模块,还用于向该DU发送该第一目标RB的标识、该CU-UP的IP地址和该CU-UP的隧道标识,以使得该DU与该CU-UP建立针对该第一目标RB的上行用户面隧道。
该发送模块,还用于向该CU-UP发送该第一目标RB的标识,该DU的IP地址和该DU的隧道标识,以使得该CU-UP与该DU建立下行用户面隧道。
在一些可行的实施例中,若该装置调用已有的RB资源作为该第一目标RB,以承载该数据流,该装置包括:
该发送模块,还用于向该DU发送RB修改请求,该RB修改请求指示使用该RB承载该数据流。
该接收模块,还用于接收该DU返回的RB修改响应。
在一些可行的实施例中,该接收模块,还用于接收关于第二UE的切换请求。
该信息交互装置还包括:
确定模块,用于确定服务该第二UE的目标CU-UP和目标DU。
该发送模块,还用于向该目标DU发送第二目标RB的标识、该目标CU-UP的IP地址和该目标CU-UP的隧道标识,以使得该目标DU使用该目标CU-UP的IP地址和该目标CU-UP的隧道标识与该目标CU-UP建立上行用户面隧道。
该获取模块,还用于获取该目标DU的隧道标识和该目标DU的IP地址。
该发送模块,还用于向该目标CU-UP发送路径转换消息,该路径转换消息携带该第二目标RB的标识、该目标DU的IP地址和该目标DU的隧道标识,以使得该目标CU-UP与该目标DU建立下行用户面隧道。
本申请实施例的第六方面提供一种信息交互装置,包括:
处理器和存储器。
该存储器,用于存储程序。该处理器调用该存储器存储的程序,用于执行上述各方面该的方法。
本申请的又一方面提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。
从以上技术方案可以看出,本申请实施例具有以下优点:
本申请实施例确定了CU-CP、CU-UP和DU之间的逻辑关系定义,以确定下一代网络的网络架构,且确定了CU-CP与CU-UP之间的链路建立流程、用户接入流程、承载修改流程和切换流程,以支持下一代网络基站节点之间通信以及与下一代核心网之间通信,确保了终端能够真正接入下一代网络。
图1为演进后的网络的典型网络结构的示意图;
图2为下一代无线接入网的网络架构的示意图;
图3为本申请实施例提供的一种网络架构的示意图;
图4为本申请实施例提供的另一种网络架构的示意图;
图5为本申请实施例提供的另一种网络架构的示意图;
图6为本申请实施例提供的一种信息交互方法的示意图;
图7为本申请实施例提供的另一种信息交互方法的示意图;
图8为本申请实施例提供的另一种信息交互方法的示意图;
图9为本申请实施例提供的另一种信息交互方法的示意图;
图10为本申请实施例提供的另一种信息交互方法的示意图;
图11为本申请实施例提供的另一种信息交互方法的示意图;
图12为本申请实施例提供的一种信息交互装置的示意图;
图13为本申请实施例提供的一种信息交互装置的示意图。
本申请实施例提供了一种网络架构、信息交互方法以及装置,用于确定CU-CP、CU-UP和DU之间的逻辑关系定义,以及CU-CP、CU-UP和DU之间各种业务的流程。
为了使本技术领域的人员更好地理解本申请实施例方案,下面将结合本申请实施例中的 附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
当下,无线局域网WLAN和全球微波互联接入WiMAX等宽带无线接入技术可以提供高速率的宽带无线接入业务,并且可以支持游牧和移动应用,大大提高无线通信的接入能力,使得移动通信网络与宽带无线接入技术的融合。在演进后的典型网络结构中,终端UE可以接入网接入网络,并在移动性管理实体的控制下在接入网和本地服务网关间建立隧道,本地服务网关和数据网关之间也建立隧道,从而建立了UE和分组数据网之间的连通性。
具体的,请参考图1,为演进后的网络的典型网络结构,包括UE、接入网、移动性管理实体、核心控制实体、本地服务网关、数据网关和多个分组数据网PDN,分别为PDN1、PDN2、PDN3等。
其中,UE可以通过接入网接入网络,在移动性管理实体的控制下在接入网和本地服务网关间建立隧道,本地服务网关和数据网关之间也建立隧道,从而建立了UE和多个PDN之间的连通性,这里也可以是UE到数据网关之间直接建立隧道,此处不做限定。
需要说明的是,本申请实施例涉及的UE,可以是指向用户提供语音和/或数据连通性的设备,具有无线连接功能的手持式设备、或连接到无线调制解调器的其他处理设备。其中,无线终端可以经无线接入网(RAN Radio Access Network)与一个或多个核心网进行通信,无线终端可以是移动终端,如移动电话(或称为“蜂窝”电话)和具有移动终端的计算机,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据。
本申请实施例涉及的接入网,是由业务节点接口SNI和用户-网络接口UNI之间的一系列传送实体(如:线路设备和传输设施)组成,为供给电信业务而提供所需传送承载能力的实施系统,可经由管理接口(Q3)配置和管理。原则上对接入网可以实现的UNI和SNI的类型和数目没有限制,接入网可以不解释信令,并可以看成是与业务和应用无关的传送网,主要完成交叉连接、复用和传输功能。
在本申请实施例中,移动性管理实体可以负责管理UE位置信息、接入鉴权、非接入层信令及信令安全等;而本地服务网关可以是UE的小范围移动的数据锚点,是核心网和接入网的接口实体,负责用户数据的路由转发;核心控制实体是记录和管理用户位置信息、认证授权信息的实体。
需要说明的是,隧道技术的原理是通过对隧道的两个端点实体间传输的协议包用另一种协议进行封装,实现两个端点实体间数据的安全传输和路由。在一些可行的实施例中,为了有效的管理和利用网络资源,电信网络可以建立了完整的网络管理和控制机制,以使得当终 端退出网络时,需要将分配给该用户的资源及时释放掉,包括无线信道、承载、各种隧道及存储的信息等。
在一些可行的实施例中,可以支持用户设备接入一个或多个分组数据业务,分组数据业务通过接入点名(Access Point Name,APN)来标识,网络侧则可以依据APN建立用户到相应数据网关的连通性,数据网关再依据APN建立到相应PDN的连通性。这种情况下,用户需要接入的分组数据业务的APN有可能在网络侧预配置,也可能由用户设备向网络侧提供,此处不做限定。
请参考图2,为下一代无线接入网的网络架构,包括核心网、无线接入网(adio Access Network,RAN)和UE,其中,在现有的下一代无线接入网架构的讨论中,无线接入网RAN的演进为集中控制单元(Central Unit,CU)和分布式控制单元(Distributed Unit,DU),其中,CU进行用户面和控制面解耦,形成CU-控制面CP(CU-Control Plane,CU)和CU-用户面UP(CU-User Plane,CU),CU-CP和CU-UP支持灵活部署。
但是,若要支持用户的接入,则需要明确CU-CP、CU-UP和DU之间的逻辑关系和CU-CP和CU-UP之间需要进行哪些消息交互,但是当前下一代网络的定义,并没有明确以上的信息。
本申请实施例确定了CU-CP、CU-UP和DU之间的逻辑关系定义,以确定下一代网络的网络架构,且确定了CU-CP与CU-UP之间的链路建立流程、用户接入流程、承载修改流程和切换流程,以支持下一代网络基站节点之间通信以及与下一代核心网之间通信,确保了终端能够真正接入下一代网络。
为便于理解,下面对本申请实施例中的具体网络架构进行描述,请参阅图3,本申请实施例提供的一种网络架构,包括:
第一CU-CP、M1个CU-UP和N1个DU。
其中,该第一CU-CP连接该M1个CU-UP,该M1个CU-UP中的任一CU-UP所连接的CU-CP仅为该第一CU-CP,即一个CU-CP可以连接一个或多个CU-UP,而一个CU-UP只连接一个CU-CP,即CU-CP和CU-UP是一对多的关系。
该第一CU-CP连接该N1个DU,该N1个DU中的任一DU所连接的CU-CP仅为该第一CU-CP,即一个CU-CP可以连接一个或多个DU,一个DU只连接一个CU-CP,即CU-CP和DU是一对多的关系。
该M1个CU-UP中的任一CU-UP连接该N1个DU中至少一个,该N1个DU中的任一DU连接该M1个CU-UP中至少一个,即一个CU-UP可以连接一个或多个DU,一个DU也可以连接一个或多个CU-UP,即CU-UP和DU是多对多的关系。
其中,需要说明的是,虚线连接为通过为控制面连接,实线连接为通过用户面连接。
请参考图4,本申请实施例提供的另一种网络架构,包括:
M2个CU-CP、第一CU-UP和N2个DU;
该第一CU-UP连接该M2个CU-CP,该M2个CU-CP中的任一CU-CP所连接的CU-UP仅为该第一CU-UP,即一个CU-UP可以连接一个或多个CU-UP,一个CU-UP只连接一个CU-CP,即CU-CP和CU-UP是多对一的关系。
该M2个CU-CP中的任一CU-CP连接该N2个DU中的至少一个,该N2个DU中的任一DU所连接的CU-CP为该M2个CU-CP中的一个,即一个CU-CP可以连接一个或多个DU,一个DU 只连接一个CU-CP,即CU-CP和DU是一对多的关系。
该第一CU-UP连接该N2个DU,该N2个DU中的任一DU所连接的CU-UP仅为该第一CU-UP,一个CU-UP可以连接一个或多个DU,一个DU只连接一个CU-UP,即CU-UP和DU是一对多的关系。
请参考图5,本申请实施例提供的另一种网络架构,包括:
M3个CU-CP、N3个CU-UP和K个DU;
该N3个CU-UP中任一CU-UP连接该M3个CU-CP中的至少一个,该M3个CU-CP中任一CU-CP连接该N3个CU-UP中的至少一个,即一个CU-UP可以连接一个或多个CU-UP,一个CU-UP也可以连接一个或多个CU-CP,即CU-CP和CU-UP是多对多的关系。
该M3个CU-CP中的任一CU-CP连接该N2个DU中的至少一个,该N2个DU中的任一DU所连接的CU-CP为该M2个CU-CP中的一个,一个CU-CP可以连接一个或多个DU,一个DU只连接一个CU-CP,即CU-CP和DU是一对多的关系。
该N3个CU-UP中任一CU-UP连接该K个DU中的至少一个,该K个DU中任一DU连接该N3个CU-UP中的至少一个,即一个CU-UP可以连接一个或多个DU,一个DU也可以连接一个或多CU-UP,即CU-UP和DU是多对多的关系。
以上描述了CU-CP、CU-UP和DU之间的逻辑结构关系,以下对CU-CP、CU-UP和DU之间的各种业务流程进行描述,请参阅图6,本申请实施例提供的一种信息交互方法,用于CU-CP和CU-UP质检的链路配置,包括:
601、CU-CP通过域名系统DNS获取,或者通过运维系统配置获取CU-UP的地址。
在本申请实施例中,CU-CP可以获取CU-UP的地址,具体的,可以通过域名系统(Domain Name System,DNS)获取,或者通过运维系统配置获取。需要说明的是,在本申请实施例中所提及的DNS,在因特网上作为域名和IP地址相互映射的一个分布式数据库,能够使用户更方便的访问互联网,而不用去记住能够被机器直接读取的IP数串,只需要通过主机名,最终得到该主机名对应的IP地址的过程叫做域名解析(或主机名解析)。在一些可行的实施例中,CU-CP还可以通过运维系统配置该CU-UP的地址,此处不足限定。
602、该CU-CP通过该CU-UP的地址向该CU-UP发送第一链路建立请求。
在本申请实施例中,当该CU-CP获取了该CU-UP的地址后,可以通过该地址向该CU-UP发送第一链路建立请求,以建立相互之间的链路,在一些可行的实施例中,该第一链路建立请求可以携带CU-CP的标识或/和CU-CP的命名,以使得当该CU-UP需要回复消息的时候,可以直接使用该CU-CP的标识或/和CU-CP的命名以回复消息。
603、该CU-UP向该CU-CP返回的第一链路建立响应。
在本申请实施例中,当该CU-UP接收到该CU-CP发送的第一链路建立请求并获取了该CU-CP的标识或/和CU-CP的命名时,可以通过该CU-CP的标识或/和CU-CP的命名确定该CU-CP的地址,并返回关于该第一链路建立请求的第一链路建立响应。当该CU-CP接收到该第一链路建立响应,则该CU-CP和该CU-UP完成链路建立。在一些可行的实施例中,该第一链路建立响应携带该CU-UP的标识和/或该CU-UP的命名,以方便后续的信息交互的需要。
在一些可行的实施例中,请参阅图7,本申请实施例提供的一种信息交互方法,用于被用户接入的流程,包括:
701、该CU-UP通过DNS获取,或者通过运维系统配置获取该CU-CP的地址。
在一些可行的实施例中,不仅可以通过CU-CP获取CU-UP的地址而主动建立链路,还可以由CU-UP获取CU-CP的地址而主动建立链路。同样的,该CU-UP也可以通过DNS获取该CU-CP的地址,或者通过运维系统配置该CU-CP的地址,此处不做限定。
702、该CU-UP根据该CU-CP的地址向该CU-CP发送的第二链路建立请求,该第二链路建立请求携带CU-UP的标识和/或CU-UP的命名。
在本申请实施例中,当该CU-UP获取了该CU-CP的地址后,可以通过该地址向该CU-CP发送第二链路建立请求,以建立相互之间的链路,在一些可行的实施例中,该第二链路建立请求可以携带CU-UP的标识或/和CU-UP的命名,以使得当该CU-CP需要回复消息的时候,可以直接使用该CU-UP的标识或/和CU-UP的命名以回复消息。
703、该CU-CP根据该第二链路建立请求向该CU-UP返回第二链路建立响应,该第二链路建立响应携带CU-CP的标识和/或CU-CP的命名,以使得该CU-CP和该CU-UP完成链路建立。
在本申请实施例中,当该CU-CP接收到该CU-UP发送的第一链路建立请求并获取了该CU-UP的标识或/和CU-UP的命名时,可以通过该CU-UP的标识或/和CU-UP的命名确定该CU-UP的地址,并返回关于该第二链路建立请求的第二链路建立响应。当该CU-UP接收到该第二链路建立响应,则该CU-UP和该CU-CP完成链路建立。在一些可行的实施例中,该第二链路建立响应携带该CU-CP的标识和/或该CU-CP的命名,以方便后续的信息交互的需要。
当CU-CP和CU-UP之间的链路建立完成后,可以接收用户的接入,请参阅图8,本申请实施例提供的一种信息交互方法,用于接收用户接入,包括:
801、检测到第一UE发起的附着流程。
在一些可行的实施例中,当终端开机或者从没有信号到有信号,或者切换到某个基站时,会发起附着业务。在本申请实施例中,第一UE发起附着流程,则使得服务该第一UE的CU-CP、CU-UP和DU进行下述各个步骤,以打通各个用户面之间的隧道。
802、该CU-CP向该CU-UP发送数据承载DRB建立请求。
在本申请实施例中,该DRB建立请求可以携带要配置的演进的无线接入承载E-RAB建立列表,该要配置的E-RAB建立列表中的每一项可以包括E-RAB标识、核心网用户面功能UPF的互联网协议IP地址和UPF的隧道标识,则该CU-UP可以根据该要配置的E-RAB建立列表中确定需要附着的核心网,并确定该核心网的IP地址和隧道标识,以建立与核心网的用户面功能(User Plane Function,UPF)之间的上行用户面隧道。
在一些可行的实施例中,该数据承载DRB建立请求还可以包括安全上下文信息和流级别的服务质量QoS列表。需要说明的是,该安全上下文信息包括加密算法、完整性保护算法、和安全密钥,该安全上下文信息被该CU-UP用于导出用户面加密保护密钥和完整性保护密钥。而该流级别的QoS列表中的每一项包括RAB标识以及对应的流级别QoS,该流级别的QoS列表用于知会该CU-UP要建立的RAB和对应的QoS信息。该DRB建立请求还可以包括其他信息,此处不做限定。
803、该CU-UP向该CU-CP返回DRB建立响应。
当该CU-UP接收到该CU-CP发送的DRB建立请求,后可以向该CU-CP返回DRB建立响应, 具体的,该DRB建立响应可以包括E-RAB建立列表、要配置的无线承载RB建立列表,其中,该E-RAB建立列表中的每一项包括E-RAB标识、CU-UP的IP地址和CU-UP的隧道标识,该要配置的RB建立列表中的每一项包括RB标识、CU-UP的IP地址和CU-UP的隧道标识,该E-RAB建立列表用于后续发送给UPF,以建立CU-UP和UPF之间的下行用户面隧道,该要配置的RB建立列表用于后续发送给DU,以建立CU-UP和DU之间的上行用户面隧道。在一些可行的实施例中,该要配置的RB建立列表中每一项还包括每一个RB的分组数据汇聚协议PDCP配置,此处不做限定。
804、该CU-CP向DU发送RB承载建立请求。
805、该DU向该CU-CP发送RB承载建立响应。
当该CU-CP接收到该CU-CP返回的DRB建立响应后,可以向服务该第一UE的DU发送RB承载建立请求,该RB承载建立请求可以携带该要配置的RB建立列表,以使得该DU使用该RB要配置的建立列表与该CU-UP建立上行用户面隧道。在一些可行的实施例中,该DU向该CU-CP发送RB承载建立响应,并通过RB承载建立请求中的该CU-UP的地址和隧道标识与该CU-UP建立上行用户面隧道。
806、该CU-CP向该CU-UP发送DRB修改请求。
807、该CU-UP向该CU-CP发送DRB修改响应。
在一些可行的实施例中,当该CU-CP还可以像该CU-UP发送DRB修改请求,该DRB修改请求可以携带该RB建立列表,其中,该RB建立列表中的每一项包括RB标识,DU的IP地址和DU的隧道标识,以使得该CU-UP根据该RB建立列表与该DU建立下行用户面隧道。当该CU-UP接收到该DRB修改请求时,可以使用该RB建立列表与该DU建立下行用户面隧道,并向该CU-UP返回DRB修改响应。
808、该CU-CP发起RRC配置流程。
在一些可行的实施例中,当建立了上述各个用户面隧道后,该CU-CP可以发起RRC配置流程,以使得该第一UE可以连接网络。
809、该CU-CP向该UPF发送该E-RAB建立列表,以使得该CU-UP和该UPF建立下行用户面隧道。
在一些可行的实施例中,该CU-CP可以向该UPF发送该E-RAB建立列表,以使得该CU-UP和该UPF建立下行用户面隧道。
810、完成剩余的附着流程。
当建立了所有必要的用户面隧道后,该第一UE即可完成剩余的附着流程。
在一些可行的实施例中,当第一UE完成附着并接入网络后,若CU-UP接收到无法满足的数据流时,可以修改承载,以满足新的数据流的要求,具体的,该CU-CP可以新建RB资源作为第一目标RB,以承载该数据流,或该CU-CP调用已有的RB资源作为该第一目标RB,以承载该数据流。
一、该CU-CP可以新建RB资源作为第一目标RB。
请参阅图9,本申请实施例提供的一种信息交互方法,用于以上所述的各种网络架构,包括:
901、当该CU-UP接收到数据流并确定当前的RB无法承载该数据流。
在一些可行的实施例中,CU-UP可以接收数据流,并使用RB对数据流进行承载处理。在一些情况下,当前的RB无法承载接收到的数据流,也许是qos不满足业务需求的时候,此处不做限定,则需要新建RB或调用其他RB对该数据流进行承载处理。
902、该CU-UP向CU-CP发送DRB建立指示。
当该CU-UP接收到数据流并确定当前的RB无法承载该数据流时,该CU-UP可以向CU-CP发送DRB建立指示,以求其他RB用于承载该数据流,其中,该DRB建立指示包括无法满足需求的数据流的QoS列表(Unsatisfied Flow Level QoS List),该列表包括当前的RB资源无法承载该数据流。
903、该CU-CP向该CU-UP发送DRB建立请求。
904、该CU-UP向该CU-CP返回DRB建立响应。
在一些可行的实施例中,当该CU-CP接收到该DRB建立指示时,可以确定需要的第一目标RB,并向该CU-UP发送DRB建立请求,该DRB建立请求可以包括该第一目标RB的标识以及该第一目标RB对应的数据流级别QoS。当该CU-UP接收到该DRB建立请求时,可以向该CU-CP返回DRB建立响应,该DRB建立响应中可以包括该目标RB的标识、该CU-UP的IP地址和该CU-UP的隧道标识。
905、该CU-CP向该DU发送RB承载建立请求。
906、该DU向该CU-CP发送RB承载建立响应。
当该CU-CP接收到RB建立响应时,可以向该DU发送RB承载建立请求,该RB承载建立请求可以包括该第一目标RB的标识、该CU-UP的IP地址和该CU-UP的隧道标识,以使得该DU与该CU-UP建立针对该第一目标RB的上行用户面隧道。然后该DU可以向该CU-CP发送RB承载建立响应,以完成RB承载的建立。
907、该CU-CP向该CU-UP发送DRB修改请求。
908、该CU-UP向该CU-CP返回DRB修改响应。
在一些可行的实施例中,该DU可以向该CU-CP发送RB承载建立响应,该RB修改请求可以包括该第一目标RB的标识,该DU的IP地址和该DU的隧道标识,以使得该CU-UP与该DU建立下行用户面隧道。到此为止,已经新建了第一目标RB以承载该数据流,且该CU-UP与该DU的上行用户面隧道和下行用户面隧道均已建立完成。
二、该CU-CP调用已有的RB资源作为该第一目标RB。
1001、当该CU-UP接收到数据流并确定当前的RB无法承载该数据流。
1002、该CU-UP向该CU-CP发送DRB建立指示。
在本申请实施例中,步骤1001、1002与上述步骤901、902相同,此处不做赘述。
1003、该CU-CP向该DU发送RB修改请求。
1004、该CU-CP接收该DU返回的RB修改响应。
在本申请实施例中,该CU-CP可以调用已有的RB资源作为第一目标RB,则该CU-CP向该DU发送RB修改请求,该RB修改请求用于指示该DU进行资源的重新分配,以满足新的QoS需求,调用已用的第一目标RB以承载该数据流。
1005、该CU-CP发起RRC配置流程。
当完成上述步骤1003和步骤1004后,CU-CP可以重新发起RRC配置流程,以使得UE 通过该第一目标RB重新连接网络。
请参阅图11,本申请实施例提供的一种信息交互方法,用于被第二UE进行切换,包括:
1101、该CU-CP接收关于第二UE的切换请求。
在一些可行的实施例中,当第二UE从其他基站切换至该CU-CP所在的基站时,该CU-CP服务该第二UE,则可以接收该第二UE的切换请求,则触发CU-CP之间的切换流程。
1102、该CU-CP确定服务该第二UE的目标CU-UP和目标DU。
在本申请实施例中,该CU-CP可以确定服务该第二UE的目标CU-UP和目标DU,然后建立与该目标CU-UP和该目标DU的连接,接着通过以下步骤,建立该目标CU-UP和该目标DU以及核心网的隧道,以实现第二UE通过该CU-CP接入网络。
1103、该CU-CP向该目标DU发送第二目标RB的标识、该目标CU-UP的IP地址和该目标CU-UP的隧道标识。
在本申请实施例中,当该CU-CP确定服务该第二UE的目标DU后,可以向该目标DU发送第二目标RB的标识、该目标CU-UP的IP地址和该目标CU-UP的隧道标识,该目标DU可以使用该目标CU-UP的IP地址和该目标CU-UP的隧道标识与该目标CU-UP建立上行用户面隧道。
1104、该CU-CP获取该目标DU的隧道标识和该目标DU的IP地址。
在一些可行的实施例中,该CU-CP还可以通过与该目标DU的通信中获取该目标DU的隧道标识和该目标DU的IP地址,也可以通过其他渠道获取,此处不做限定。
1105、该CU-CP向该目标CU-UP发送路径转换消息。
1106、该目标CU-UP向该CU-CP发送路径转换确认。
在本申请实施例中,该CU-CP可以向该目标CU-UP发送路径转换消息,该路径转换消息携带该第二目标RB的标识、该目标DU的IP地址和该目标DU的隧道标识,以使得该目标CU-UP与该目标DU建立下行用户面隧道,然后该目标CU-UP可以向该CU-CP发送路径转换确认。到此为止,则建立了该目标CU-UP与该目标DU的上行用户面隧道和下行用户面隧道,则该第二UE可以通过该目标CU-UP与该目标DU的上行用户面隧道和下行用户面隧道与网络连接。
需要说明的是,在一些可行的实施例中,除了保护4G/5G的网络之外,对于应用类似网络结构的其他通信制式也适用,如全球移动通信系统(Global System for Mobile Communication,GSM),通用移动通信系统(Universal Mobile Telecommunications System,UMTS),码分多址(Code Division Multiple Access,CDMA)等,此处不做限定。
以上对信息交互方法进行了描述,以下请参阅图12,本申请实施例提供的一种信息交互装置1200,包括:
获取模块1201,用于获取CU-UP的地址。
具体用于通过域名系统或运维系统配置获取该CU-CP的地址。
发送模块1202,用于通过该CU-UP的地址向该CU-UP发送第一链路建立请求,该第一链路建立请求携带CU-CP的标识或/和CU-CP的命名。
接收模块1203,用于接收该CU-UP返回的第一链路建立响应,该第一链路建立响应携带该CU-UP的标识和/或该CU-UP的命名,以使得该CU-CP和该CU-UP完成链路建立。
或,
该接收模块1203,还用于当该CU-UP获取该CU-CP的地址时,接收该CU-UP根据该CU-CP的地址发送的第二链路建立请求,该第二链路建立请求携带CU-UP的标识和/或CU-UP的命名。
该发送模块1202,还用于该CU-CP根据该第二链路建立请求向该CU-UP返回第二链路建立响应,该第二链路建立响应携带CU-CP的标识和/或CU-CP的命名,以使得该CU-CP和该CU-UP完成链路建立。
在一些可行的实施例中,该信息交互装置还包括:
该发送模块1202,还用于当检测到第一UE发起的附着流程时,向该CU-UP发送数据承载DRB建立请求,该DRB建立请求携带要配置的演进的无线接入承载E-RAB建立列表,该要配置的E-RAB建立列表中的每一项包括E-RAB标识、核心网用户面功能UPF的互联网协议IP地址和UPF的隧道标识,以使得该CU-UP根据该要配置的E-RAB建立列表建立与UPF之间的上行用户面隧道。
该数据承载DRB建立请求还可以包括安全上下文信息和流级别的服务质量QoS列表,该安全上下文信息包括加密算法、完整性保护算法、和安全密钥,该安全上下文信息被该CU-UP用于导出用户面加密保护密钥和完整性保护密钥,该流级别的QoS列表中的每一项包括RAB标识以及对应的流级别QoS,该流级别的QoS列表用于知会该CU-UP要建立的RAB和对应的QoS信息。
该接收模块1203,还用于接收该CU-UP返回的DRB建立响应,该DRB建立响应包括E-RAB建立列表、要配置的无线承载RB建立列表,该E-RAB建立列表中的每一项包括E-RAB标识、CU-UP的IP地址和CU-UP的隧道标识,该要配置的RB建立列表中的每一项包括RB标识、CU-UP的IP地址和CU-UP的隧道标识。
该发送模块1202,还用于向DU发送该要配置的RB建立列表,以使得该DU使用该RB要配置的建立列表与该CU-UP建立上行用户面隧道。
具体还用于向该DU发送RB承载建立请求,该RB承载建立请求携带该要配置的RB建立列表。
该发送模块1202,还用于向该CU-UP发送RB建立列表,该RB建立列表中的每一项包括RB标识,DU的IP地址和DU的隧道标识,以使得该CU-UP根据该RB建立列表与该DU建立下行用户面隧道。
具体用于向该CU-UP发送DRB修改请求,该DRB修改请求携带该RB建立列表。
该发送模块1202,还用于向该UPF发送该E-RAB建立列表,以使得该CU-UP和该UPF建立下行用户面隧道。
在一些可行的实施例中,该接收模块1203,还用于当该CU-UP接收到数据流并确定当前的RB无法承载该数据流时,接收该CU-UP发送的DRB建立指示,该DRB建立指示用于指示当前的RB资源无法承载该数据流。
在一些可行的实施例中,该信息交互装置1200可以新建RB资源作为第一目标RB,以承载该数据流,则:
该发送模块1202,还用于向该CU-UP发送DRB建立请求,该DRB建立请求包括该第一目标RB的标识以及该第一目标RB对应的数据流级别QoS。
该接收模块1203,还用于接收该CU-UP返回的DRB建立响应,该DRB建立响应包括该目标RB的标识、该CU-UP的IP地址和该CU-UP的隧道标识。
该发送模块1202,还用于向该DU发送该第一目标RB的标识、该CU-UP的IP地址和该CU-UP的隧道标识,以使得该DU与该CU-UP建立针对该第一目标RB的上行用户面隧道。
该发送模块1202,还用于向该CU-UP发送该第一目标RB的标识,该DU的IP地址和该DU的隧道标识,以使得该CU-UP与该DU建立下行用户面隧道。
在一些可行的实施例中,若该装置1200调用已有的RB资源作为该第一目标RB,以承载该数据流,则该发送模块1202,还用于向该DU发送RB修改请求,该RB修改请求指示使用该RB承载该数据流。
该接收模块1203,还用于接收该DU返回的RB修改响应。
在一些可行的实施例中,该接收模块1203,还用于接收关于第二UE的切换请求。
该信息交互装置1200还包括:
确定模块1204,用于确定服务该第二UE的目标CU-UP和目标DU。
该发送模块1202,还用于向该目标DU发送第二目标RB的标识、该目标CU-UP的IP地址和该目标CU-UP的隧道标识,以使得该目标DU使用该目标CU-UP的IP地址和该目标CU-UP的隧道标识与该目标CU-UP建立上行用户面隧道。
该获取模块1201,还用于获取该目标DU的隧道标识和该目标DU的IP地址。
该发送模块1202,还用于向该目标CU-UP发送路径转换消息,该路径转换消息携带该第二目标RB的标识、该目标DU的IP地址和该目标DU的隧道标识,以使得该目标CU-UP与该目标DU建立下行用户面隧道。
请参阅图13,本申请实施例还提供了一种信息交互装置,包括:
处理器1301和存储器1302。
该存储器1302,用于存储程序。
该处理器1301调用该存储器存储的程序,用于执行以上各步骤所述的方法。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。
Claims (26)
- 一种网络架构,其特征在于,包括:第一CU-CP、M1个CU-UP和N1个DU;所述第一CU-CP连接所述M1个CU-UP,所述M1个CU-UP中的任一CU-UP所连接的CU-CP仅为所述第一CU-CP;所述第一CU-CP连接所述N1个DU,所述N1个DU中的任一DU所连接的CU-CP仅为所述第一CU-CP;所述M1个CU-UP中的任一CU-UP连接所述N1个DU中至少一个,所述N1个DU中的任一DU连接所述M1个CU-UP中至少一个。
- 一种网络架构,其特征在于,包括:M2个CU-CP、第一CU-UP和N2个DU;所述第一CU-UP连接所述M2个CU-CP,所述M2个CU-CP中的任一CU-CP所连接的CU-UP仅为所述第一CU-UP;所述M2个CU-CP中的任一CU-CP连接所述N2个DU中的至少一个,所述N2个DU中的任一DU所连接的CU-CP为所述M2个CU-CP中的一个;所述第一CU-UP连接所述N2个DU,所述N2个DU中的任一DU所连接的CU-UP仅为所述第一CU-UP。
- 一种网络架构,其特征在于,包括:M3个CU-CP、N3个CU-UP和K个DU;所述N3个CU-UP中任一CU-UP连接所述M3个CU-CP中的至少一个,所述M3个CU-CP中任一CU-CP连接所述N3个CU-UP中的至少一个;所述M3个CU-CP中的任一CU-CP连接所述N2个DU中的至少一个,所述N2个DU中的任一DU所连接的CU-CP为所述M2个CU-CP中的一个;所述N3个CU-UP中任一CU-UP连接所述K个DU中的至少一个,所述K个DU中任一DU连接所述N3个CU-UP中的至少一个。
- 一种信息交互方法,其特征在于,用于如权利要求1-3所述的网络架构,包括:CU-CP获取CU-UP的地址;所述CU-CP通过所述CU-UP的地址向所述CU-UP发送第一链路建立请求,所述第一链路建立请求携带CU-CP的标识或/和CU-CP的命名;所述CU-CP接收所述CU-UP返回的第一链路建立响应,所述第一链路建立响应携带所述CU-UP的标识和/或所述CU-UP的命名,以使得所述CU-CP和所述CU-UP完成链路建立;或,当所述CU-UP获取所述CU-CP的地址时,所述CU-CP接收所述CU-UP根据所述CU-CP的地址发送的第二链路建立请求,所述第二链路建立请求携带CU-UP的标识和/或CU-UP的命名;所述CU-CP根据所述第二链路建立请求向所述CU-UP返回第二链路建立响应,所述第二链路建立响应携带CU-CP的标识和/或CU-CP的命名,以使得所述CU-CP和所述CU-UP完成链路建立。
- 根据权利要求4所述方法,其特征在于,所述CU-CP获取CU-UP的地址包括:所述CU-CP通过域名系统或运维系统配置获取所述CU-CP的地址;所述CU-UP获取所述CU-CP的地址包括:所述CU-UP通过所述域名系统或所述运维系统配置获取所述CU-UP的地址。
- 根据权利要求5所述方法,其特征在于,所述CU-CP和所述CU-UP完成链路建立后,还包括:当检测到第一UE发起的附着流程时,所述CU-CP向所述CU-UP发送数据承载DRB建立请求,所述DRB建立请求携带要配置的演进的无线接入承载E-RAB建立列表,所述要配置的E-RAB建立列表中的每一项包括E-RAB标识、核心网用户面功能UPF的互联网协议IP地址和UPF的隧道标识,以使得所述CU-UP根据所述要配置的E-RAB建立列表建立与UPF之间的上行用户面隧道;所述CU-CP接收所述CU-UP返回的DRB建立响应,所述DRB建立响应包括E-RAB建立列表、要配置的无线承载RB建立列表,所述E-RAB建立列表中的每一项包括E-RAB标识、CU-UP的IP地址和CU-UP的隧道标识,所述要配置的RB建立列表中的每一项包括RB标识、CU-UP的IP地址和CU-UP的隧道标识;所述CU-CP向DU发送所述要配置的RB建立列表,以使得所述DU使用所述RB要配置的建立列表与所述CU-UP建立上行用户面隧道;所述CU-CP向所述CU-UP发送RB建立列表,所述RB建立列表中的每一项包括RB标识,DU的IP地址和DU的隧道标识,以使得所述CU-UP根据所述RB建立列表与所述DU建立下行用户面隧道;所述CU-CP向所述UPF发送所述E-RAB建立列表,以使得所述CU-UP和所述UPF建立下行用户面隧道。
- 根据权利要求6所述方法,其特征在于,所述数据承载DRB建立请求包括安全上下文信息和流级别的服务质量QoS列表,所述安全上下文信息包括加密算法、完整性保护算法、和安全密钥,所述安全上下文信息被所述CU-UP用于导出用户面加密保护密钥和完整性保护密钥,所述流级别的QoS列表中的每一项包括RAB标识以及对应的流级别QoS,所述流级别的QoS列表用于知会所述CU-UP要建立的RAB和对应的QoS信息。
- 根据权利要求6或7所述方法,其特征在于,所述CU-CP向所述CU-UP发送RB建立列表包括:所述CU-CP向所述CU-UP发送DRB修改请求,所述DRB修改请求携带所述RB建立列表。
- 根据权利要求6或7所述方法,其特征在于,所述要配置的RB建立列表中每一项还包括每一个RB的分组数据汇聚协议PDCP配置。
- 根据权利要求9所述方法,其特征在于,所述CU-CP向DU发送所述要配置的RB建立列表包括:所述CU-CP向所述DU发送RB承载建立请求,所述RB承载建立请求携带所述要配置的RB建立列表。
- 根据权利要求6或7所述方法,其特征在于,所述方法还包括:当所述CU-UP接收到数据流并确定当前的RB无法承载所述数据流时,所述CU-CP接收所述CU-UP发送的DRB建立指示,所述DRB建立指示用于指示当前的RB资源无法承载所述数据流;所述CU-CP新建RB资源作为第一目标RB,以承载所述数据流;或,所述CU-CP调用已有的RB资源作为所述第一目标RB,以承载所述数据流。
- 据权利要求11所述方法,其特征在于,所述CU-CP新建RB资源作为第一目标RB包括:所述CU-CP向所述CU-UP发送DRB建立请求,所述DRB建立请求包括所述第一目标RB的标识以及所述第一目标RB对应的数据流级别QoS;所述CU-CP接收所述CU-UP返回的DRB建立响应,所述DRB建立响应包括所述目标RB的标识、所述CU-UP的IP地址和所述CU-UP的隧道标识;所述CU-CP向所述DU发送所述第一目标RB的标识、所述CU-UP的IP地址和所述CU-UP的隧道标识,以使得所述DU与所述CU-UP建立针对所述第一目标RB的上行用户面隧道;所述CU-CP向所述CU-UP发送所述第一目标RB的标识,所述DU的IP地址和所述DU的隧道标识,以使得所述CU-UP与所述DU建立下行用户面隧道。
- 据权利要求11所述方法,其特征在于,所述CU-CP调用已有的RB资源作为所述RB包括:所述CU-CP向所述DU发送RB修改请求,所述RB修改请求指示使用所述RB承载所述数据流;所述CU-CP接收所述DU返回的RB修改响应。
- 据权利要求6或7所述方法,其特征在于,所述方法还包括:所述CU-CP接收关于第二UE的切换请求;所述CU-CP确定服务所述第二UE的目标CU-UP和目标DU;所述CU-CP向所述目标DU发送第二目标RB的标识、所述目标CU-UP的IP地址和所述目标CU-UP的隧道标识,以使得所述目标DU使用所述目标CU-UP的IP地址和所述目标CU-UP的隧道标识与所述目标CU-UP建立上行用户面隧道;所述CU-CP获取所述目标DU的隧道标识和所述目标DU的IP地址;所述CU-CP向所述目标CU-UP发送路径转换消息,所述路径转换消息携带所述第二目标RB的标识、所述目标DU的IP地址和所述目标DU的隧道标识,以使得所述目标CU-UP与所述目标DU建立下行用户面隧道。
- 一种信息交互装置,其特征在于,包括:获取模块,用于获取CU-UP的地址;发送模块,用于通过所述CU-UP的地址向所述CU-UP发送第一链路建立请求,所述第一链路建立请求携带CU-CP的标识或/和CU-CP的命名;接收模块,用于接收所述CU-UP返回的第一链路建立响应,所述第一链路建立响应携带所述CU-UP的标识和/或所述CU-UP的命名,以使得所述CU-CP和所述CU-UP完成链路建立;或,所述接收模块,还用于当所述CU-UP获取所述CU-CP的地址时,接收所述CU-UP根据所 述CU-CP的地址发送的第二链路建立请求,所述第二链路建立请求携带CU-UP的标识和/或CU-UP的命名;所述发送模块,还用于所述CU-CP根据所述第二链路建立请求向所述CU-UP返回第二链路建立响应,所述第二链路建立响应携带CU-CP的标识和/或CU-CP的命名,以使得所述CU-CP和所述CU-UP完成链路建立。
- 根据权利要求15所述信息交互装置,其特征在于,所述获取模块,具体用于通过域名系统或运维系统配置获取所述CU-CP的地址。
- 根据权利要求16所述信息交互装置,其特征在于,还包括:所述发送模块,还用于当检测到第一UE发起的附着流程时,向所述CU-UP发送数据承载DRB建立请求,所述DRB建立请求携带要配置的演进的无线接入承载E-RAB建立列表,所述要配置的E-RAB建立列表中的每一项包括E-RAB标识、核心网用户面功能UPF的互联网协议IP地址和UPF的隧道标识,以使得所述CU-UP根据所述要配置的E-RAB建立列表建立与UPF之间的上行用户面隧道;所述接收模块,还用于接收所述CU-UP返回的DRB建立响应,所述DRB建立响应包括E-RAB建立列表、要配置的无线承载RB建立列表,所述E-RAB建立列表中的每一项包括E-RAB标识、CU-UP的IP地址和CU-UP的隧道标识,所述要配置的RB建立列表中的每一项包括RB标识、CU-UP的IP地址和CU-UP的隧道标识;所述发送模块,还用于向DU发送所述要配置的RB建立列表,以使得所述DU使用所述RB要配置的建立列表与所述CU-UP建立上行用户面隧道;所述发送模块,还用于向所述CU-UP发送RB建立列表,所述RB建立列表中的每一项包括RB标识,DU的IP地址和DU的隧道标识,以使得所述CU-UP根据所述RB建立列表与所述DU建立下行用户面隧道;所述发送模块,还用于向所述UPF发送所述E-RAB建立列表,以使得所述CU-UP和所述UPF建立下行用户面隧道。
- 根据权利要求17所述信息交互装置,其特征在于,所述数据承载DRB建立请求包括安全上下文信息和流级别的服务质量QoS列表,所述安全上下文信息包括加密算法、完整性保护算法、和安全密钥,所述安全上下文信息被所述CU-UP用于导出用户面加密保护密钥和完整性保护密钥,所述流级别的QoS列表中的每一项包括RAB标识以及对应的流级别QoS,所述流级别的QoS列表用于知会所述CU-UP要建立的RAB和对应的QoS信息。
- 根据权利要求17或18所述信息交互装置,其特征在于,所述发送模块,具体用于向所述CU-UP发送DRB修改请求,所述DRB修改请求携带所述RB建立列表。
- 根据权利要求19所述信息交互装置,其特征在于,所述发送模块,具体还用于向所述DU发送RB承载建立请求,所述RB承载建立请求携带所述要配置的RB建立列表。
- 根据权利要求17或18所述信息交互装置,其特征在于,所述接收模块,还用于当所述CU-UP接收到数据流并确定当前的RB无法承载所述数据流时,接收所述CU-UP发送的DRB建立指示,所述DRB建立指示用于指示当前的RB资源无 法承载所述数据流。
- 据权利要求21所述信息交互装置,其特征在于,若所述信息交互装置新建RB资源作为第一目标RB,以承载所述数据流,所述信息交互装置包括:所述发送模块,还用于向所述CU-UP发送DRB建立请求,所述DRB建立请求包括所述第一目标RB的标识以及所述第一目标RB对应的数据流级别QoS;所述接收模块,还用于接收所述CU-UP返回的DRB建立响应,所述DRB建立响应包括所述目标RB的标识、所述CU-UP的IP地址和所述CU-UP的隧道标识;所述发送模块,还用于向所述DU发送所述第一目标RB的标识、所述CU-UP的IP地址和所述CU-UP的隧道标识,以使得所述DU与所述CU-UP建立针对所述第一目标RB的上行用户面隧道;所述发送模块,还用于向所述CU-UP发送所述第一目标RB的标识,所述DU的IP地址和所述DU的隧道标识,以使得所述CU-UP与所述DU建立下行用户面隧道。
- 据权利要求21所述信息交互装置,其特征在于,若所述信息交互装置调用已有的RB资源作为所述第一目标RB,以承载所述数据流,所述信息交互装置包括:所述发送模块,还用于向所述DU发送RB修改请求,所述RB修改请求指示使用所述RB承载所述数据流;所述接收模块,还用于接收所述DU返回的RB修改响应。
- 据权利要求17或18所述信息交互装置,其特征在于,所述接收模块,还用于接收关于第二UE的切换请求;所述信息交互装置还包括:确定模块,用于确定服务所述第二UE的目标CU-UP和目标DU;所述发送模块,还用于向所述目标DU发送第二目标RB的标识、所述目标CU-UP的IP地址和所述目标CU-UP的隧道标识,以使得所述目标DU使用所述目标CU-UP的IP地址和所述目标CU-UP的隧道标识与所述目标CU-UP建立上行用户面隧道;所述获取模块,还用于获取所述目标DU的隧道标识和所述目标DU的IP地址;所述发送模块,还用于向所述目标CU-UP发送路径转换消息,所述路径转换消息携带所述第二目标RB的标识、所述目标DU的IP地址和所述目标DU的隧道标识,以使得所述目标CU-UP与所述目标DU建立下行用户面隧道。
- 一种信息交互装置,其特征在于,包括:处理器和存储器;所述存储器,用于存储程序;所述处理器调用所述存储器存储的程序,用于执行如权利要求4-14任一项所述的方法。
- 一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行如权利要求4-14所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18903017.4A EP3737195B1 (en) | 2018-01-23 | 2018-11-14 | Network architecture and information interaction method and device |
US16/935,804 US11259344B2 (en) | 2018-01-23 | 2020-07-22 | Network architecture and information exchange method and apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810065499.2A CN110072297B (zh) | 2018-01-23 | 2018-01-23 | 一种信息交互方法、装置及计算机可读存储介质 |
CN201810065499.2 | 2018-01-23 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/935,804 Continuation US11259344B2 (en) | 2018-01-23 | 2020-07-22 | Network architecture and information exchange method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019144679A1 true WO2019144679A1 (zh) | 2019-08-01 |
Family
ID=67365179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/115363 WO2019144679A1 (zh) | 2018-01-23 | 2018-11-14 | 一种网络架构、信息交互方法以及装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US11259344B2 (zh) |
EP (1) | EP3737195B1 (zh) |
CN (1) | CN110072297B (zh) |
WO (1) | WO2019144679A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020159415A1 (en) * | 2019-02-01 | 2020-08-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Distributed unit, proxy central unit and methods in a wireless communications network |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110650502B (zh) * | 2018-06-26 | 2021-04-09 | 电信科学技术研究院有限公司 | 一种切换方法及装置 |
US11601841B2 (en) * | 2018-08-01 | 2023-03-07 | Nec Corporation | Radio station, radio communication method, non-transitory computer readable medium, and radio communication system |
US11297669B2 (en) * | 2018-11-02 | 2022-04-05 | Samsung Electronics Co., Ltd. | Method for transmitting control signaling in relay network, configuration method and device |
CN111866988B (zh) * | 2019-04-30 | 2024-09-13 | 北京三星通信技术研究有限公司 | 信息配置方法、信息交互方法、以及地址信息更新方法 |
WO2021031055A1 (zh) * | 2019-08-18 | 2021-02-25 | 华为技术有限公司 | 通信方法及装置 |
CN112566150A (zh) * | 2019-09-26 | 2021-03-26 | 北京三星通信技术研究有限公司 | 切换的方法及设备 |
CN112752230B (zh) * | 2020-12-28 | 2022-03-25 | 京信网络系统股份有限公司 | 消息识别方法、系统、集中单元、分布单元和存储介质 |
CN114698145A (zh) * | 2020-12-29 | 2022-07-01 | 华为技术有限公司 | 用于传输数据的方法和装置 |
CN114095342B (zh) * | 2021-10-21 | 2023-12-26 | 新华三大数据技术有限公司 | 备份的实现方法及装置 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106102106A (zh) * | 2016-06-20 | 2016-11-09 | 电信科学技术研究院 | 一种终端接入的方法、装置及网络架构 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10932168B2 (en) * | 2017-09-29 | 2021-02-23 | Apple Inc. | Next generation node-B (gNB) and methods for mobility management with separate user plane and control plane in new radio (NR) systems |
US10716096B2 (en) * | 2017-11-07 | 2020-07-14 | Apple Inc. | Enabling network slicing in a 5G network with CP/UP separation |
CN111602461B (zh) * | 2017-11-16 | 2024-04-26 | 瑞典爱立信有限公司 | gNB中的DU与CU-UP之间的TEID交换 |
US11089513B2 (en) * | 2018-06-21 | 2021-08-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Duplication of traffic of a radio bearer over multiple paths |
-
2018
- 2018-01-23 CN CN201810065499.2A patent/CN110072297B/zh active Active
- 2018-11-14 WO PCT/CN2018/115363 patent/WO2019144679A1/zh unknown
- 2018-11-14 EP EP18903017.4A patent/EP3737195B1/en active Active
-
2020
- 2020-07-22 US US16/935,804 patent/US11259344B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106102106A (zh) * | 2016-06-20 | 2016-11-09 | 电信科学技术研究院 | 一种终端接入的方法、装置及网络架构 |
Non-Patent Citations (3)
Title |
---|
3GPP: "3rd Genaration Partnership Project; Technical Specification Group Radio Access Network; Study of Separation of NR Control Plane (CP) and User Plane (UP) for Split Option 2; (Release 15", 3GPP DRAFT; TR 38.806 V1.0.0, no. V1.0.0, 11 December 2017 (2017-12-11) - 17 December 2017 (2017-12-17), XP051365407 * |
IAESI ET AL.: "Architecture Details of Split gNB- CU", R3-173624, vol. RAN WG3, 29 September 2017 (2017-09-29), XP051356296 * |
See also references of EP3737195A4 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020159415A1 (en) * | 2019-02-01 | 2020-08-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Distributed unit, proxy central unit and methods in a wireless communications network |
US11785653B2 (en) | 2019-02-01 | 2023-10-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Distributed unit, proxy central unit and methods in a wireless communications network |
Also Published As
Publication number | Publication date |
---|---|
EP3737195A1 (en) | 2020-11-11 |
CN110072297B (zh) | 2021-01-05 |
US20200351963A1 (en) | 2020-11-05 |
CN110072297A (zh) | 2019-07-30 |
EP3737195A4 (en) | 2021-03-10 |
US11259344B2 (en) | 2022-02-22 |
EP3737195B1 (en) | 2022-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019144679A1 (zh) | 一种网络架构、信息交互方法以及装置 | |
US11979798B2 (en) | Session establishment to join a group communication | |
US11991761B2 (en) | Request to establish protocol data unit session with time sensitive network parameters | |
US11832341B2 (en) | Group communication service request | |
US9578556B2 (en) | Long term evolution (LTE) communications over trusted hardware | |
WO2018171685A1 (zh) | 移动网络切换方法和通信装置 | |
WO2018137637A1 (zh) | 一种接入目标小区的方法以及设备 | |
WO2018145654A1 (zh) | 实现多接入管理的方法、装置及计算机存储介质 | |
WO2021073314A1 (zh) | 一种数据传输的方法、通信设备及通信系统 | |
EP4008128A1 (en) | Configuration of time sensitive bridge during handover | |
WO2017201722A1 (zh) | 一种通信控制的方法及相关网元 | |
GB2559231A (en) | A system and a method for establishing an emergency call over a wireless LAN network | |
WO2017219355A1 (zh) | 多连接通信方法和设备 | |
AU2018315349A1 (en) | Data integrity protection method, communication apparatus, terminal device, access network device, core network device, computer readable medium, and communication system | |
US9107071B2 (en) | Method and system for transmitting wireless data streams | |
WO2011023125A1 (zh) | 释放连接的方法、装置及系统 | |
CN102076113A (zh) | 一种终端从网络侧去附着的优化方法和系统及接入网关 | |
US10542575B1 (en) | Controlling initiation of dedicated bearer setup following failed dedicated bearer setup | |
WO2018000319A1 (zh) | 一种用户终端的附着方法及设备 | |
KR20100021690A (ko) | 이동 통신 시스템의 인증과 비계층 프로토콜 보안 운영을 효율적으로 지원하는 관리 방법 및 시스템 | |
CN106161513B (zh) | 实现快速内容分发的方法及设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18903017 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2018903017 Country of ref document: EP Effective date: 20200803 |