WO2020088490A1 - 传输数据的方法和装置 - Google Patents

传输数据的方法和装置 Download PDF

Info

Publication number
WO2020088490A1
WO2020088490A1 PCT/CN2019/114227 CN2019114227W WO2020088490A1 WO 2020088490 A1 WO2020088490 A1 WO 2020088490A1 CN 2019114227 W CN2019114227 W CN 2019114227W WO 2020088490 A1 WO2020088490 A1 WO 2020088490A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
network device
sent
data
uplink
Prior art date
Application number
PCT/CN2019/114227
Other languages
English (en)
French (fr)
Inventor
黄曲芳
娄崇
范强
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP19880833.9A priority Critical patent/EP3866538A4/en
Publication of WO2020088490A1 publication Critical patent/WO2020088490A1/zh
Priority to US17/246,194 priority patent/US20210259012A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0278Traffic management, e.g. flow control or congestion control using buffer status reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/21Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/53Allocation or scheduling criteria for wireless resources based on regulatory allocation policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • H04W72/1268Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/52Allocation or scheduling criteria for wireless resources based on load

Definitions

  • the present application relates to the field of communication, and more specifically, to a method and device for data transmission in the field of communication.
  • Industrial control data packets usually appear periodically. After wireless communication technology is applied to industrial control, when packet loss occurs in the wireless communication system, data packets cannot be transmitted on time. In order to ensure the safety of data transmission, the industrial operating arm introduces the concept of "survival time", that is, when no data packet is received for a period of time, the operating arm starts a survival timer (survival timer). When the timer expires, the operating arm enters a safety lockout state to prevent a safety accident.
  • survival timer survival timer
  • the wireless communication network In order to reduce the production equipment into a deadlocked state, the wireless communication network should minimize continuous packet loss. Therefore, how to reduce continuous packet loss in wireless communication networks is an urgent problem to be solved.
  • the present application provides a method and device for data transmission, with a view to reducing continuous packet loss or reducing production equipment from entering a locked state in a wireless communication system.
  • a data transmission method including:
  • the terminal device sends first information to the network device, where the first information is used to indicate that the data packet to be sent of the terminal device requires at least two uplink authorizations or to determine that the data packet to be sent of the terminal device requires at least two uplink authorizations Upstream authorization
  • the terminal device receives the at least two uplink authorizations from the network device;
  • the terminal device composes the data packet to be sent into at least two transmission blocks, and sends the indicated uplink resources to the network device through the at least two uplink authorizations, respectively.
  • the at least two transmission blocks correspond to the at least two uplink resources indicated by the grant, that is, each transmission block corresponds to an uplink resource indicated by the uplink grant, and is transmitted through the corresponding uplink resource.
  • the terminal device may indicate to the network device that at least two uplink authorizations are required for the data packet to be sent, or send indication information to the network device to determine that the data packet to be sent requires at least two uplink authorizations, so The network device sends at least two uplink authorizations for the data packet to be sent, and then the terminal device composes the data packet to be sent into at least two transmission blocks, and sends the uplink resources indicated by the at least two uplink authorizations to the network device, thereby reducing The probability that the terminal device transmits all the data packets to be sent at one time to reduce the continuous packet loss.
  • the terminal device sending the first information to the network device includes:
  • the terminal device sends at least two buffer status report BSRs to the network device, and each BSR is used to indicate the data amount of the data packet to be sent corresponding to the BSR.
  • the terminal device here sends at least two BSRs to the network device refers to that after the BSR is triggered once and the amount of data in the cache does not change, the terminal device sends at least two BSRs to the network device.
  • the trigger state of the BSR is maintained until the data packets to be sent in the cache All reports are made in the BSR before the trigger status of the BSR is cancelled.
  • the terminal device may send at least two BSRs to the network device to notify the network device that the number of uplink authorizations required is at least two So that the network device sends at least two uplink authorizations for the data packet to be sent
  • the terminal device may determine the number of reported BSRs according to the information of the number of data packets to be sent in the cache and / or time information.
  • the quantity information may refer to the quantity of data packets to be sent
  • the time information may include the arrival time, valid time or survival time of the data packets to be sent, or other time information, which is not limited in the embodiments of the present application.
  • the arrival time of the data packet to be sent refers to the time when the data packet to be sent reaches the access layer of the terminal device
  • the valid time refers to that the data packet must be transmitted to the receiver within XX time.
  • the survival time means that the receiver enters a deadlock state if no packet is received within XX time.
  • the terminal device sends the first information to the network device, including:
  • the terminal device sends first indication information to the network device, where the first indication information is used to indicate the number of data packets to be sent, and the number of data packets to be sent is used to determine that the terminal device is to be sent
  • the data packet requires at least two upstream authorizations.
  • the terminal device may indicate the data amount of the data packet to be sent to the network device, so that the network device determines that the number of uplink authorizations required for the data packet to be sent is at least two according to the number of the data packet to be sent And then send at least two uplink authorizations for the data packet to be sent.
  • the first indication information is carried in the MAC CE.
  • the first indication information may be carried in the BSR in the MAC CE.
  • a field may be directly added to the BSR, and this field is used to display the number of data packets to be sent indicated by the BSR.
  • the LCG field in the BSR can be reused to indicate the number of data packets to be sent.
  • the indication information may be carried in a separate MAC CE, that is to say, the MAC CE only includes the indication information at this time.
  • the network device may also determine, according to the number of data packets to be sent and the data pattern of the data packets to be sent, how many wireless resources to allocate to the data to be sent.
  • the data pattern is used to indicate the transmission strategy of the data to be sent.
  • the data pattern of the terminal device may indicate that a data packet is transmitted every 20 ms.
  • the terminal device sending the first information to the network device includes:
  • the terminal device sends a MAC to the network device, and the MAC includes two BSRs with the same content.
  • the network device when the network device receives the two BSRs with the same content, it can determine that the data packet to be sent of the terminal device requires at least two uplink authorizations.
  • the terminal device sending the first information to the network device includes:
  • the terminal device determines a threshold, and the threshold represents an upper limit of the amount of data transmitted by the uplink resource;
  • the terminal device When the terminal device requires at least two uplink authorizations, the terminal device sends second indication information to the network device, where the second indication information is used to indicate that the data amount of the data packet to be sent is greater than or equal to the Said threshold.
  • the network device determines that the amount of data to be sent by the terminal device is greater than or equal to the threshold, which may specifically include two cases: one is that the amount of data to be sent by the terminal is really greater than or equal to the threshold, and the other is the data to be sent by the terminal The amount is less than the threshold, but the terminal requires two or more uplink resources. In both cases, the network device can configure at least two uplink grants for the terminal device.
  • the terminal device may send a "threshold value" to the network device to indicate that the data amount of the data packet to be sent is greater than the threshold value.
  • the terminal device may also send other indication information to the network device to indicate that the data amount of the data packet to be sent is greater than the threshold.
  • a method for data transmission including:
  • the network device receives first information from the terminal device, where the first information is used to indicate that the data packet to be sent of the terminal device requires at least two uplink authorizations or to determine that the data packet to be sent of the terminal device requires at least two uplink authorizations Upstream authorization
  • the network device sends the at least two uplink authorizations to the terminal device according to the first information
  • the network device receives at least two transport blocks sent by the terminal device through the uplink resources indicated by the at least two uplink grants.
  • the terminal device may indicate to the network device that at least two uplink authorizations are needed for the data packet to be sent, or send indication information to the network device to determine that the data packet to be sent requires at least two uplink authorizations, so that The network device sends at least two uplink authorizations for the data packet to be sent, and then the terminal device composes the data packet to be sent into at least two transmission blocks, and sends the uplink resources indicated by the at least two uplink authorizations to the network device, thereby reducing The small terminal device transmits the probability of transmitting all the data packets to be sent at a time to reduce continuous packet loss.
  • the network device receiving the first information from the terminal device includes:
  • the network device receives at least two buffer status report BSRs from the terminal device, and each BSR is used to indicate the data volume of the data packet to be sent corresponding to the BSR;
  • the network device sending the at least two uplink authorizations to the terminal device according to the first information includes:
  • the network device sends the at least two uplink grants to the terminal device according to the at least two BSRs.
  • the network device receiving the first information from the terminal device includes:
  • the network device receives indication information from the terminal device, where the indication information is used to indicate the number of data packets to be sent;
  • the network device sending the at least two uplink authorizations to the terminal device according to the first information includes:
  • the network device sends the at least two uplink authorizations to the terminal device according to the number of data packets to be sent.
  • the indication information is carried in the MAC CE.
  • the network device sending the at least two uplink authorizations to the terminal device according to the number of data packets to be sent includes:
  • the network device determines the at least two uplink authorizations according to the number of data packets to be sent and the data pattern of the data to be sent, where the data pattern is used to indicate a transmission strategy of the data to be sent.
  • the network device receiving the first information from the terminal device includes:
  • the network device receives a MAC from the terminal device, and the MAC includes two BSRs with the same content;
  • the network device sending the at least two uplink authorizations to the terminal device according to the first information includes:
  • the network device sends the at least two uplink grants to the terminal device according to at least two BSRs with the same content in the MAC CE.
  • the network device receiving the first information from the terminal device includes:
  • the network device determines a threshold, and the threshold represents an upper limit of the amount of data transmitted by the uplink resource;
  • the network device receives second indication information from the terminal device, where the second indication information is used to indicate that the number of data packets to be sent is greater than or equal to the threshold;
  • the network device sending the at least two uplink authorizations to the terminal device according to the first information includes:
  • the network device sends the at least two uplink authorizations to the terminal device according to the second indication information.
  • a method for data transmission including:
  • the terminal device notifies the network device of the amount of data to be sent
  • the terminal device receives the first uplink authorization from the network device
  • the terminal device forms a first transmission block of the first part of the data packet to be sent, and sends it to the network device through the uplink resource indicated by the first uplink authorization;
  • the terminal device notifies the network device of the data volume of the second part of the data packet to be sent;
  • the terminal device receives a second uplink authorization from the network device
  • the terminal device forms the second part of the data packet into a second transmission block, and sends the uplink resource indicated by the second uplink authorization to the network device.
  • the terminal device when the terminal device determines that if multiple data packets to be sent are transmitted through one transmission block, a deadlock may occur, the terminal device may divide these data packets twice, or transmit more than two times , Thereby reducing the probability that the terminal device transmits these data packets all at once to reduce continuous packet loss.
  • the first part of the data packet is a part of the plurality of data packets to be sent
  • the second part of the data packet is a part of the plurality of data packets to be sent.
  • the first part of the data packet is different from the second part of the data packet.
  • the first part of the data packet is the first several data packets of the plurality of data packets to be sent
  • the second part of the data packet is the data packet after the first part of the data packet.
  • the first part of the data packet is all of the plurality of data packets to be sent. And in this case, the terminal device may consider that some of the plurality of data packets to be sent are not sent out, for example, the second part of the data packet. At this time, the first part of the data packet includes the second part of the data packet.
  • the terminal device determines that the transmission of the first part of the data packet is successful, the transmission of the second part of the data packet is canceled.
  • the second Some data packets are sent to the network device through the next wireless resource.
  • a method for data transmission including:
  • the network device obtains the data volume of the data packet to be sent from the terminal device;
  • the network device sends a first uplink authorization to the terminal device
  • the network device obtains the data volume of the second part of the data packet from the terminal device;
  • the network device sends a second uplink authorization to the terminal device
  • the network device receives the second transmission block composed of the second partial data packet through the wireless resource indicated by the second uplink authorization.
  • the terminal device when the terminal device determines that if multiple data packets to be sent are transmitted through one transmission block, a deadlock may occur, the terminal device may divide these data packets twice, or transmit more than two times , Thereby reducing the probability that the terminal device will pass these data packets all at once to reduce continuous packet loss.
  • an apparatus in a fifth aspect, is provided.
  • the apparatus may be a network device, a network element or module in the network device, or a chip in the network device, or a chip in the network or module in the network device.
  • the apparatus has a function of implementing the network device in the various possible implementation manners of the first aspect to the fourth aspect and any aspect described above. This function can be realized by hardware, and can also be realized by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the device includes: a transceiver module, and optionally, the device further includes a processing module, and the transceiver module may be, for example, at least one of a transceiver, a receiver, and a transmitter, and the transceiver module It may include a radio frequency circuit or an antenna.
  • the processing module may be a processor.
  • the device further includes a storage module, which may be, for example, a memory. When a storage module is included, the storage module is used to store instructions.
  • the processing module is connected to the storage module, and the processing module can execute instructions stored by the storage module or instructions derived from other.
  • the device may be a network device, or a module, network element, or function in the network device.
  • the chip when the device is a chip, the chip includes: a transceiver module, optionally, the device further includes a processing module, and the transceiver module may be, for example, an input / output interface or a pin on the chip Or circuit etc.
  • the processing module may be a processor, for example.
  • the processing module may execute instructions in the storage module, and the storage module may be a storage module in the chip, such as a register, a cache, and so on.
  • the storage module may also be located in the communication device but outside the chip, such as read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access) memory, RAM), etc.
  • an apparatus which may be a terminal device, a module in the terminal device, or a chip in the terminal device, or a chip in the module in the terminal device.
  • the device has the functions of a terminal device in various possible implementation manners of the first aspect to the fourth aspect and any aspect described above. This function can be realized by hardware, and can also be realized by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the device includes: a transceiver module, and optionally, the device further includes a processing module, and the transceiver module may be, for example, at least one of a transceiver, a receiver, and a transmitter, and the transceiver module It may include a radio frequency circuit or an antenna.
  • the processing module may be a processor.
  • the device further includes a storage module, which may be, for example, a memory. When a storage module is included, the storage module is used to store instructions.
  • the processing module is connected to the storage module, and the processing module can execute instructions stored by the storage module or instructions derived from other.
  • the device may be a terminal device, or a module or function in the terminal device.
  • the chip when the device is a chip, the chip includes: a transceiver module, optionally, the device further includes a processing module, and the transceiver module may be, for example, an input / output interface or a pin on the chip Or circuit etc.
  • the processing module may be a processor, for example.
  • the processing module may execute instructions in the storage module, and the storage module may be a storage module in the chip, such as a register, a cache, and so on.
  • the storage module may also be located in the communication device but outside the chip, such as read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access) memory, RAM), etc.
  • the processor mentioned in any of the above can be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more for controlling the above The integrated circuit in which the program of the communication method of each of the first to fourth aspects is executed.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • a computer storage medium in which a program code is stored in the computer storage medium, and the program code is used to instruct to execute the method in any one of the first aspect to the fourth aspect or any possible implementation manner thereof Instructions.
  • a computer program product containing instructions that, when run on a computer, causes the computer to execute the method in any one of the first to fourth aspects or any possible implementation manner thereof.
  • a communication system in a ninth aspect, includes a device and a combination thereof having functions for implementing the methods and any possible designs of any of the first to fourth aspects.
  • a processor for coupling with a memory for performing the method in any one of the first aspect to the fourth aspect or any possible implementation manner thereof.
  • a chip is provided.
  • the chip includes a processor and a communication interface.
  • the communication interface is used to communicate with an external device or an internal device. In any possible implementation.
  • the chip may further include a memory, in which instructions are stored, and the processor is used to execute instructions stored in the memory or derived from other instructions.
  • the processor is used to implement the method in any possible implementation manner of any one of the first aspect to the fourth aspect.
  • FIG. 1 shows a schematic flowchart of a data transmission method provided by an embodiment of the present application.
  • FIG. 2 shows a specific example of data transmission provided by an embodiment of the present application.
  • FIG. 3 shows an example of data transmission provided by an embodiment of the present application.
  • FIG. 4 shows an example of data transmission provided by an embodiment of the present application.
  • FIG. 5 shows an example of a BSR provided by an embodiment of the present application.
  • FIG. 6 shows an example of a BSR provided by an embodiment of the present application.
  • FIG. 7 shows a schematic flowchart of a data transmission method provided by an embodiment of the present application.
  • FIG. 8 shows a schematic block diagram of a communication device provided by an embodiment of the present application.
  • FIG. 9 shows a schematic block diagram of another communication device provided by an embodiment of the present application.
  • FIG. 10 shows a schematic block diagram of another communication device provided by an embodiment of the present application.
  • FIG. 11 shows a schematic block diagram of a terminal device provided by an embodiment of the present application.
  • GSM global mobile communication
  • CDMA code division multiple access
  • WCDMA broadband code division multiple access
  • general packet radio service general packet radio service, GPRS
  • LTE long term evolution
  • LTE frequency division duplex FDD
  • TDD time division duplex
  • UMTS universal mobile communication system
  • WiMAX worldwide interoperability for microwave access
  • the terminal device in the embodiment of the present application may refer to user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or User device.
  • Terminal devices can also be cellular phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (wireless local loop (WLL) stations, personal digital assistants (personal digital assistants, PDAs), wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future 5G networks or public land mobile communication networks (PLMN) in the future evolution
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDAs personal digital assistants
  • wireless communication Functional handheld devices computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future 5G networks or public land mobile communication networks (PLMN) in the future evolution
  • PLMN public land mobile communication networks
  • the network device in the embodiment of the present application may be a device for communicating with a terminal device, and the network device may be a global system for mobile (GSM) system or code division multiple access (CDMA)
  • GSM global system for mobile
  • CDMA code division multiple access
  • the base transceiver station (BTS) in the system can also be a base station (NodeB, NB) in a wideband code division multiple access (WCDMA) system, or an evolved base station (evolved) in an LTE system NodeB, eNB or eNodeB), or a wireless controller in a cloud radio access network (CRAN) scenario, or the network device can be a relay station, an access point, an in-vehicle device, a wearable device, and future Network devices in a 5G network or network devices in a PLMN network that will evolve in the future are not limited in the embodiments of the present application.
  • data packets are transmitted in order at the access layer. That is to say, on the sending side, what order are the data packets handed over by the application layer to the access layer, and on the receiving side, the access layer will hand over the data packets to the application layer in the same order.
  • the access layer transmits data, whether it is uplink or downlink, the allocation of wireless resources depends on the network equipment. For the downlink, the network device determines the wireless resources occupied by the data packet and sends the data packet to each terminal device.
  • BSR buffer status report
  • the network device After receiving the BSR, the network device allocates a wireless resource of an appropriate size to the terminal device, and the terminal device uses the wireless resource to transmit data to the network device.
  • a network device may receive BSRs of multiple terminal devices at the same time, and wireless resources are limited, so the network device will determine which terminals are first based on the importance and urgency of the terminal device's business. The device allocates resources, and then allocates resources for which terminal devices. After the terminal device reports the BSR, the network device knows the amount of data to be sent by the terminal device, and may not necessarily allocate the wireless resource to the terminal device once, and may allocate multiple wireless resources.
  • the terminal device uses the wireless resources allocated by the network device to transmit all the data packets in the cache at once, that is, all the data packets are grouped into one transmission block and transmitted at once. In this way, these data packets are either transmitted successfully, or all are transmitted unsuccessfully or failed. If the transmission is unsuccessful, and the receiver does not receive any data packets within a certain period of time, the receiver's operating arm may lock up.
  • FIG. 1 shows a schematic flowchart of a data transmission method according to an embodiment of the present application.
  • the terminal device may notify the network device of the relevant information of the data packet to be sent, so that the network device can send at least two uplink authorizations to the terminal device, so that the terminal device can compose at least two transmissions Blocks, which are sent to the network device through the at least two uplink resources indicated by the uplink authorization, respectively, thereby reducing the terminal device transmitting all the data packets to be sent at once, so as to reduce continuous packet loss.
  • the terminal device and the network device are used as the main body for executing the data transmission method as an example to describe the data transmission method.
  • the execution subject of the method for performing the data transmission may also be a chip corresponding to a terminal device and a chip corresponding to a network device.
  • the data transmission method in FIG. 1 includes 110 to 130.
  • the terminal device sends first information to the network device, where the first information is used to indicate that the data packet to be sent of the terminal device requires at least two uplink authorizations, or the first information is used to determine the data packet to be sent by the terminal device At least two upstream authorizations are required.
  • the network device receives the first information and allocates at least two uplink resources for the data packet to be sent according to the first information.
  • the first information is used to indicate that the terminal device needs at least two uplink authorizations for the data packet to be sent, for example, the terminal device notifies the network device of the number of uplink authorizations required for the data packet to be sent in its cache. That is, at this time, the terminal device determines that the number of uplink authorizations required for the data packet to be sent is at least two, and notifies the network device. Then, the network device allocates at least two uplink resources to the data packet to be sent of the terminal device according to the first information, and sends authorization information of the at least two uplink resources (that is, at least two uplink authorizations) to the terminal device.
  • the network device may determine that the data packet to be sent of the terminal device requires at least two uplink authorizations according to the first information. Then, the network device allocates at least two uplink resources to the data packet to be sent by the terminal device, and sends authorization information of the at least two uplink resources (that is, at least two uplink authorizations) to the terminal device.
  • the network device sends at least two uplink authorizations to the terminal device.
  • the network device may send configuration information to the terminal device, where the configuration information is used to configure the at least two uplink authorizations.
  • the terminal device receives the configuration information from the network device, and determines the at least two uplink grants according to the configuration information, and further determines the uplink resources indicated by the at least two uplink grants.
  • the terminal device composes the data packet to be sent into at least two transmission blocks, and sends the uplink resources indicated by the at least two uplink grants allocated by the network device to the network device, respectively.
  • the at least two transmission blocks correspond to the at least two uplink resources indicated by the grant, that is, each transmission block corresponds to an uplink resource indicated by the uplink grant, and is transmitted through the corresponding uplink resource.
  • the network device receives the at least two transport blocks on the at least two uplink resources.
  • the terminal device may indicate to the network device that at least two uplink authorizations are needed for the data packet to be sent, or send indication information to the network device to determine that the data packet to be sent requires at least two uplink authorizations, so that The network device sends at least two uplink authorizations for the data packet to be sent, and then the terminal device composes the data packet to be sent into at least two transmission blocks, and sends the uplink resources indicated by the at least two uplink authorizations to the network device. Once again, all the data packets to be sent are transmitted to reduce the probability of continuous packet loss.
  • the terminal device may send a buffer status report BSR to the network device to notify the network device of the data amount of the data packet to be sent in the cache.
  • BSR reporting can be triggered when a data packet to be sent is newly added to the cache of the terminal device, or the terminal device can be configured to report the BSR periodically, or the terminal device can request wireless for the data packet to be sent in the cache When resources are available, BSR reporting is triggered.
  • BSR can refer to the description of the prior art, and will not be described in detail here.
  • the terminal device may trigger BSR reporting. If the buffer of the terminal device at this time also includes the data packet to be sent that originally already exists, the BSR reported by the terminal device to indicate the data packet to be sent may include the data packet to be sent that has been previously stored in the cache.
  • a higher priority for example, higher than a preset priority level
  • the priority of the data packet to be sent that has already existed in the cache may be higher than the preset priority level, or may be lower than the preset priority level, which is not specifically limited in this embodiment of the present application.
  • the terminal device has already sent a BSR corresponding to the data packet to be sent that originally existed in the cache, or the terminal device has not sent a BSR corresponding to the data packet to be sent that has originally been stored in the cache.
  • the application examples do not specifically limit this.
  • the terminal device when there are 100 data packets to be sent in the buffer of the terminal device, and the 100 data packets to be sent have been sent a BSR to indicate the data amount of the 100 data packets to be sent. Later, 10 data packets to be sent were newly added to the cache of the terminal device, and the 10 data packets to be sent had higher priority. At this time, the 10 data packets to be sent trigger the terminal device to report the BSR. At this time, the BSR reported by the terminal device may be used to indicate the data amount of 110 data packets to be sent in the buffer of the terminal device.
  • the terminal device sending the first information to the network device includes:
  • the terminal device sends at least two BSRs to the network device, and each of the at least two BSRs is used to indicate the data amount of the data packet to be sent corresponding to each BSR.
  • the first information may include the at least two BSRs, and the number of the at least two BSRs may be equal to the number of at least two uplink grants required.
  • the terminal device sending the at least two BSRs to the network device may include the following cases: after the BSR is triggered once and the amount of data in the cache does not change, the terminal device sends the at least two BSRs to the network device. That is, when the terminal device meets the conditions for BSR triggering, the terminal device triggers at least two BSRs, and uses the at least two BSRs to request the network device for resources required for the amount of data in the cache.
  • the terminal device can send three BSRs to the network device, of which the first BSR can be used for Indicate the data volume of the first 40 data packets to be sent in the cache, the second BSR can be used to indicate the data volume of the 30 data packets to be sent after the first 40 data packets in the cache, the third A BSR can be used to indicate the data volume of the last 40 packets to be sent in the buffer. And in the process of sending these three BSRs, the data packets to be sent in the cache have not changed, that is, neither increased nor decreased, and no new BSR is triggered (that is, a new packet is added again to trigger the BSR).
  • a new BSR may be triggered.
  • a new BSR may be triggered.
  • the trigger state of the BSR is maintained until all the data packets to be sent in the cache are Only when the BSR is reported, the trigger state of the BSR is cancelled.
  • the trigger state of the BSR is canceled after the first BSR, the second BSR, and the third BSR are sent.
  • FIG. 2 shows a specific example of data transmission provided by an embodiment of the present application.
  • there are four data packets to be sent in the buffer of the terminal device which are data packets 7, 8, 9, 10, and the sizes are respectively 20 bytes, 20 bytes, 30 bytes, and 30 bytes.
  • the method shown in FIG. 2 includes steps 201 to 206.
  • the terminal device reports BSR # 1 to the network device.
  • BSR # 1 is used to indicate that the data amount of the data packet to be sent by the terminal device is 20 bytes, that is, the terminal device has 20 bytes to be transmitted.
  • the terminal device reports BSR # 2 to the network device.
  • BSR # 2 is used to indicate that the data amount of the data packet to be sent by the terminal device is 80 bytes, that is, the terminal device has 80 bytes to be transmitted.
  • the terminal device reports two BSRs to the network device, which are BSR # 1 in step 201 and BSR # 2 in step 202, respectively.
  • the network device configures a 20-byte uplink resource to the terminal device.
  • the network device sends an uplink authorization to the terminal device, and the uplink authorization indicates the 20-byte uplink resource.
  • the terminal device uses the uplink resource indicated by the network device in step 203 to send a data packet 7.
  • the network device configures 80 bytes of uplink resources to the terminal device.
  • the network device sends an uplink authorization to the terminal device, and the uplink authorization indicates the 80-byte uplink resource.
  • the terminal device uses the uplink resource indicated by the network device in step 205 to send data packets 8, 9, and 10.
  • Data packets are transmitted in order at the access layer, that is, on the terminal device side, what order are the data packets handed over to the access layer by the application layer, and on the network device side, the access layer will hand over the data packets in the same order To the application layer. It can be seen that when the sequence of data packets handed over to the access layer by the application layer is 7, 8, 9, 10, in step 203, after determining the 20-byte uplink resource, the terminal device will first send data in 204 Pack 7. In step 205, after determining the 80-byte uplink resource, the terminal device will sequentially send data packets 8, 9, and 10.
  • BSR # 2 can be sent first, and then BSR # 1.
  • the resources in 205 can be allocated first, and then the resources in 203 can be allocated.
  • there is no limit to the number of BSRs nor is the size of resources required for each BSR. For example, three BSRs can be generated, requiring resources of 20 bytes, 20 bytes, and 60 bytes, or resources of 20 bytes, 50 bytes, and 30 bytes, respectively. It is also possible to generate 4 BSRs, each requiring 20 bytes, 20 bytes, 30 bytes, and 30 bytes of resources.
  • the terminal device may send at least two BSRs to the network device to notify the network device that the number of uplink authorizations required is at least two, so that the network device is the data packet to be sent Send at least two uplink authorizations, and then the terminal device composes the data packet to be sent into at least two transmission blocks, and sends the uplink resource indicated by the at least two uplink authorizations to the network device, thereby reducing the number of data packets to be sent once The probability of complete transmission reduces the possibility of continuous packet loss.
  • the terminal device may determine the number of reported BSRs according to the information of the number of data packets to be sent in the cache and / or time information.
  • the quantity information may refer to the quantity of data packets to be sent
  • the time information may include the arrival time, valid time or survival time of the data packets to be sent, or other time information, which is not limited in the embodiments of the present application.
  • the arrival time of the data packet to be sent refers to the time when the data packet to be sent reaches the access layer of the terminal device
  • the valid time refers to the prescribed time.
  • the survival time refers to the set time. If the receiver does not receive a packet within the set time, it enters the deadlock state.
  • Embodiment 1 The terminal device determines the number of BSRs to report according to the data volume of the data packets to be transmitted in the cache.
  • the terminal device receives three data packets, and the sizes of the three data packets are 50Bytes, 20Bytes, and 40Bytes, respectively.
  • the data volume of the three data packets is reported through two BSRs, so that the network device allocates 2 or more uplink resources for transmitting the three uplinks data pack.
  • the terminal device decides to report the data volume of the first data packet through a BSR, and the data volume of the second and third data packets Report through another BSR, so that the size of the uplink resources allocated by the network device is more uniform.
  • Embodiment 2 The terminal device determines to report into several BSRs according to the arrival time of the data packet to be transmitted in the cache.
  • the terminal device receives three data packets, and the time for the three data packets to reach the access layer of the terminal device is 00 seconds: 00 milliseconds: 00 microseconds, 00 seconds: 00 milliseconds: 02 microseconds, 00 seconds: 00 milliseconds: 07 microseconds.
  • the data volume of these three packets is reported through two BSRs, so that the network device allocates 2 or more uplink resources. Used to transmit these three upstream data packets.
  • the terminal device reports the data volume of the first packet and the second packet through a BSR To report the data volume of the third data packet through another BSR.
  • Embodiment 3 The terminal device determines how many BSRs to report based on the effective time of the data packet to be transmitted in the cache.
  • the access layer of the terminal device receives three data packets.
  • the first data packet is received at 00 seconds: 00 milliseconds: 00 microseconds, and the valid time reaches 00 seconds: 00 milliseconds: 600 microseconds;
  • the second The data packet is received in 00 seconds: 00 milliseconds: 100 microseconds, and the effective time reaches 00 seconds: 00 milliseconds: 400 microseconds;
  • the third data packet is 00 seconds: 00 milliseconds: 150 microseconds, valid time To 00 seconds: 00 milliseconds: 600 microseconds, the terminal device finds that the first packet and the third packet are both valid for 00 seconds: 00 milliseconds: 600 microseconds, and the second packet is valid for 00 seconds: 00 milliseconds: 400 microseconds, so the UE divides the data volume of these three packets into two BSR reports, one BSR reports the data volume of the second packet, and the other BSR reports the first packet and The data volume of the
  • Embodiment 4 The terminal device determines to report into several BSRs according to the survival time of the data packets to be transmitted in the cache.
  • the time for the data packet 6 to reach the network device side is T1
  • the time required for the data packet 10 to reach the network device side is T2.
  • the time interval between T1 and T2 is too long, for example, exceeding the "survival time". If the transmission block composed of data packets 7, 8, 9, and 10 arrives at time T2, it will cause the survival timer of the network device to time out.
  • the terminal device can divide the data packets 7, 8, 9, 10 into multiple BSR reports, one BSR reports the data volume of the data packet 7, and the other BSR reports the data volume of the data packet 8, 9, 10.
  • sending the first information to the network device by the terminal device includes: the terminal device sending first indication information to the network device, where the first indication information is used to indicate the number of the data packets to be sent The number of the data packets to be sent is used to determine whether the terminal device needs at least two uplink authorizations for the data packets to be sent. That is to say, at this time, the first information is the first indication information, which can be specifically used to indicate the number of the data packets to be sent, and the network device can determine the need of the data packet to be sent according to the obtained number of the data packets to be sent At least two upstream resources.
  • the terminal device when the terminal device reports the BSR to the network device, it not only reports the amount of data packets to be sent in the cache, but also reports the number of data packets to be sent, so that the network device can determine the terminal device according to the number of data packets to be sent The number of uplink resources allocated. For example, if the number of data packets to be sent is greater than a preset value, the network device may determine to send at least two uplink grants to the terminal device, that is, allocate at least two wireless resources to the data packet to be sent.
  • the number of data packets to be sent may be the number of all data packets to be sent in the cache, or may be the number of continuous data packets to be sent in the cache. If there are multiple consecutive data packets, it indicates the number of the longest consecutive data packet, or the number of the first consecutive data packet.
  • continuous data packets refer to data packets that are cached in order. For example, the data packets 6,7,8,9,10 described above.
  • the terminal device when the terminal device indicates the number of continuous data packets to the network device, and the network device allocates at least two wireless resources to the continuous data packet, the terminal device may form the continuous data packet into two transmission blocks, and The wireless resources allocated by the network device are sent to the network device.
  • FIG. 4 shows a specific example of data transmission provided by an embodiment of the present application.
  • there are four data packets to be sent in the buffer of the terminal device which are data packets 7, 8, 9, and 10, respectively, and the sizes are 20 bytes, 20 bytes, 30 bytes, and 30 bytes.
  • the method shown in FIG. 2 includes steps 401 to 405.
  • the terminal device reports BSR # 3 to the network device.
  • BSR # 3 is used to indicate that the data volume of the data packet to be sent by the terminal device is 100 bytes, that is, the terminal device has 100 bytes to be transmitted, and BSR # 3 is also used to Indicates that the number of data packets to be sent is 4.
  • the network device receives the BSR # 3, and allocates at least two wireless resources to the terminal device according to the data volume and number of the data packets to be sent indicated by the BSR # 3, for example, assigning two wireless resources to one
  • An example is a 20-byte uplink resource and an 80-byte uplink resource.
  • the network device configures a 20-byte uplink resource to the terminal device.
  • the network device sends an uplink authorization to the terminal device, and the uplink authorization indicates the 20-byte uplink resource.
  • the terminal device uses the uplink resource indicated by the network device in step 402 to send the data packet 7.
  • the network device configures 80 bytes of uplink resources to the terminal device.
  • the network device sends an uplink authorization to the terminal device, and the uplink authorization indicates the 80-byte uplink resource.
  • the terminal device uses the uplink resource indicated by the network device in step 404 to send data packets 8, 9, and 10.
  • the resources in 404 may be allocated first, and then the resources in 402 may be allocated.
  • the number of BSRs there is no limit to the number of BSRs, nor is the size of resources required for each BSR. For example, three BSRs can be generated, requiring resources of 20 bytes, 20 bytes, and 60 bytes, or resources of 20 bytes, 50 bytes, and 30 bytes, respectively. It is also possible to generate 4 BSRs, each requiring 20 bytes, 20 bytes, 30 bytes, and 30 bytes of resources.
  • the terminal device may indicate the data amount of the data packet to be sent to the network device, so that the network device determines that the number of uplink authorizations required for the data packet to be sent is at least two according to the number of the data packet to be sent And then send at least two uplink authorizations for the data packet to be sent, and then the terminal device composes the data packet to be sent into at least two transmission blocks, and sends the uplink resource indicated by the at least two uplink authorizations to the network device, thereby Reduce the probability of passing all the data packets in the cache at once, reducing the possibility of continuous packet loss.
  • the indication information may be carried in the MAC CE.
  • the indication information is carried in the BSR in the MAC CE.
  • the indication information is carried in a separate MAC CE.
  • a field may be directly added to the BSR, and the field is used to display the number of data packets to be sent indicated by the BSR.
  • Figure 5 shows a specific example of a BSR.
  • the BSR includes the LCG0-7 field.
  • the LCG0-7 field is used to represent the 8 logical channel groups of the terminal device, BS (BS for LCG0) of LCG0, and BS (BS) of LCG1.
  • LCG1 LCG2 BS
  • LCG3 BS BS for LCG3
  • LCG4 BS BS for LCG4
  • LCG5 BS BS for LCG5
  • LCG6 BS BS for LCG6
  • LCG7 The BS (BS for LCG7) field, where the LCG0-7 field is used to indicate whether the data volume of the logical channel corresponding to LCG0-7 is included in the BSR, and BS is used to indicate the LCG0-7 corresponding to The number of packets in the logical channel field.
  • LCGi when the value of LCGi is "0", it indicates that BS for LCGi is not included in the BSR, and when the value of LCGi is "1", it indicates that BS for LCGi is not included in the BSR. That is, BS for LCG0-7 is optional, and the value of LCGi determines whether there is a corresponding BS for LCGi. Among them, i is taken from 0 to 7.
  • the LCG field in the BSR can be reused to indicate the number of data packets to be sent.
  • the terminal device may be implicitly indicated that the data packet to be sent requires at least two uplink authorizations.
  • a certain bit in the LCG can be used for implicit indication, such as LCG0 in FIG. 6.
  • the value of this bit is "0", which means that the terminal device can use one radio resource to transmit all the data packets in the buffer.
  • the value of this bit is "1", which means that the terminal device wants to use two or more copies.
  • the LCG should not be configured for the terminal device, that is, no logical channel of the terminal device belongs to LCG0.
  • the network device may use RRC signaling configuration, or use MAC CE configuration to reuse which LCG indicator bit to indicate the number of data packets to be sent.
  • the indication information may be carried in a separate MAC CE, that is to say, the MAC CE only includes the indication information at this time.
  • the network device may also determine, according to the number of data packets to be sent and the data pattern of the data packets to be sent, how many wireless resources to allocate to the data to be sent.
  • the data pattern is used to indicate the transmission strategy of the data to be sent or the resource allocation method of the data to be sent or the distribution of the data to be sent.
  • the data pattern of the terminal device may indicate that a data packet is transmitted every 20 ms.
  • the terminal device may obtain the data pattern from an operation, administration and maintenance (OAM) system, or may obtain the data pattern from a control center, or the terminal device may report the data pattern.
  • OAM operation, administration and maintenance
  • the survival timer (survival timer) is 100 ms. If the network device receives the instruction information sent by the terminal device, it knows that the terminal device has 5 data packets to be transmitted. If the network device allocates a wireless resource to the five data packets to be sent at a time, once the transmission of these five data packets fails on the wireless interface, the operation arm will enter a deadlock state. Therefore, at this time, the network device can allocate two or more wireless resources to the terminal device, so that the terminal device can send the five data packets to the network device in two or more times. In this way, only when all the data transmission fails, the operation arm will enter the deadlock state, that is to say, even if a part of the data packet transmission fails, the operation arm will not enter the deadlock state.
  • the terminal device sending the first information to the network device includes:
  • the terminal device sends two BSRs with the same content to the network device.
  • the two BSRs with the same content may be included in one MAC CE.
  • the first information includes the two BSRs having the same content.
  • the network device receives the two BSRs with the same content, it can be determined that the data packet to be sent by the terminal device requires at least two uplink authorizations.
  • the BSR with the same content refers to the completely same BSR, that is, the information indicated by the two BSRs is completely the same.
  • the MAC may also include three or more BSRs with the same content, which is used to indicate that the terminal device needs at least two uplink authorizations for the data packet to be sent.
  • the terminal device notifies the network device of the number of at least two uplink resources required for data to be sent, including:
  • the terminal device determines a threshold, and the threshold represents an upper limit of the amount of data transmitted by the uplink resource;
  • the terminal device When the terminal device needs at least two uplink authorizations, the terminal device sends second indication information to the network device, where the second indication information is used to indicate that the amount of data to be sent is greater than or equal to the threshold.
  • the network device determines that the amount of data to be sent by the terminal device is greater than or equal to the threshold, which may include two cases: one case is that the amount of data to be sent by the terminal is really greater than or equal to the threshold, and the other case is that the terminal The amount of data sent is less than the threshold, but the terminal requires two or more uplink resources. In both cases, the network device can configure at least two uplink grants for the terminal device.
  • the threshold may be configured by a network device or specified by a protocol, which is not limited in this embodiment of the present application.
  • the threshold may be 500 bytes.
  • the terminal device may indicate to the network device that the data amount of the data packet to be sent is greater than or equal to the threshold value when the data amount of the data packet to be sent is less than or equal to the threshold value.
  • the "instruction” is not a real instruction, but an “instruction” for the network device to allocate at least two uplink resources to the terminal device. In other words, the "instruction" is used to instruct the network device to ignore the actual The amount of data sent.
  • the terminal device may also indicate to the network device that the data amount of the data packet to be sent is greater than the threshold value when the data amount of the data packet to be sent is greater than the threshold value.
  • the terminal device may send a "threshold value" to the network device to indicate that the data amount of the data packet to be sent is greater than the threshold value.
  • the terminal device may also send other indication information to the network device to indicate that the data amount of the data packet to be sent is greater than the threshold, which is not limited in this embodiment of the present application.
  • the terminal device may indicate to the network device that at least two uplink authorizations are needed for the data packet to be sent, or send indication information to the network device to determine that the data packet to be sent requires at least two uplink authorizations, so that The network device sends at least two uplink authorizations for the data packet to be sent, and then the terminal device composes the data packet to be sent into at least two transmission blocks, and sends the uplink resources indicated by the at least two uplink authorizations to the network device, thereby reducing The probability of transmitting all the data packets to be sent at once reduces the possibility of continuous packet loss.
  • FIG. 7 shows a schematic flowchart of a data transmission method provided by an embodiment of the present application.
  • the wireless communication network should try to prevent continuous packet loss.
  • the terminal device may divide these data packets into two or more than two transmissions, thereby reducing one The probability of transmitting all these data packets to reduce the possibility of continuous packet loss.
  • the terminal device and the network device are used as the main body for executing the data transmission method as an example, and the data transmission method will be described.
  • the execution subject of the method for performing the data transmission may also be a chip corresponding to a terminal device and a chip corresponding to a network device.
  • FIG. 7 shows steps or operations of the data transmission method, but these steps or operations are merely examples, and other operations or variations of the operations in FIG. 7 may be performed in the embodiments of the present application. In addition, each step in FIG. 7 may be performed in a different order than that presented in FIG. 1, and it may not be necessary to perform all operations in FIG. 7.
  • the data transmission method in FIG. 7 includes 710 to 760.
  • the terminal device notifies the network device of the amount of data packets to be sent.
  • the terminal device may send BSR # 4 to the network device, and the BSR # 4 is used to notify the terminal device of the data amount of the data packet to be sent in the cache.
  • the network device allocates the first uplink resource to the terminal device. Specifically, the network device may send the first uplink authorization to the terminal device according to BSR # 4 to indicate the first uplink resource.
  • the terminal device forms a first transmission block of the first part of the data packet to be sent, and sends the uplink resource allocated to the data packet to be sent by the network device to the network device.
  • the terminal device notifies the network device of the data volume of the second part of the data packet to be sent.
  • the network device allocates the second uplink resource to the terminal device. Specifically, the network device may send a second uplink authorization to the terminal device to indicate the second uplink resource. The network device may allocate the second uplink resource according to the data volume of the second part of the data packet.
  • the terminal device forms the second partial data packet into a second transmission block, and sends the uplink resource allocated to the second partial data packet by the network device to the network device.
  • the terminal device may divide the multiple data packets to be transmitted into multiple At least twice (at least twice), the first part of the data packet in 730 is the part of the plurality of data packets to be sent, that is, the part of the data packet to be sent in 710.
  • the first part of the data packet may be the first several data packets of the data packet to be sent.
  • the terminal device and the network device can perform 730 to 760, that is, they can send BSR # 5 to the network device, and the BSR # 5 is used to notify the terminal device of the amount of data packets to be sent in the current cache, that is, The second part of the packet.
  • the data packet to be sent (that is, the second part of the data packet) in the current buffer of the terminal device is part of the data packet to be sent in step 710.
  • the second part of the data packet may be several data packets after the first part of the data packet in 730.
  • the terminal device may put BSR # 5 in the first transmission block and send it to the network device.
  • the terminal device may trigger BSR reporting, and then send BSR # 5 to the network device.
  • the terminal device does not cancel the BSR trigger and still maintains the trigger state of the BSR, and then sends BSR # 5 to the network device.
  • the terminal device may transmit the data packet to be sent in 710 to the network device at least twice, so the terminal device and the network device may perform 740 to 760 once, twice, or multiple times.
  • the embodiment does not limit this.
  • the terminal device can put three data packets 7, 8, 9 into the transmission block. Then, the terminal device can put another BSR in the transmission block to indicate that it still has a 30-byte data packet to be transmitted.
  • the network device receives the transmission block, it can obtain the BSR, so that the network device can continue to allocate wireless resources to the terminal device to transmit the data packet 10.
  • the terminal device may put all the multiple data packets to be transmitted into the In the transmission block, at this time, the first part of the data packet in 730 is all of the plurality of data packets to be sent, that is, all of the data packets in 710 to be sent. In this case, the terminal device may consider that some of the plurality of data packets to be sent have not been sent, for example, the second part of the data packet. At this time, the first part of the data packet includes the second part of the data packet.
  • the terminal device may trigger reporting BSR # 6, which is used to notify the terminal device of the data volume of the second part of the data packet. Or, after sending the first transmission block in 730, the terminal device does not cancel the BSR trigger and still maintains the trigger state of the BSR, and then sends BSR # 6 to the network device. In this way, the network device can allocate the next radio resource to the terminal device according to BSR # 6. At this time, when the wireless resource is available next time, if the terminal device does not confirm the successful transmission of the first transmission block in 730, the second part of the data packet will be sent to the network device through the next wireless resource.
  • the terminal device If after the terminal device triggers BSR # 6, but before receiving the uplink authorization sent by the network device, it is confirmed that the first transmission block in 730 has been successfully transmitted, the terminal device cancels triggering BSR # 6, so that the second part will not be The data packet is transmitted to the network device through the next wireless resource.
  • the terminal device confirms that the first transmission block in 730 has been successfully transmitted before the next wireless resource transmission, the second part of the data packet will not be transmitted to the network device through the next wireless resource.
  • the terminal device may still put these 4 data packets into the transmission block, but the terminal device thinks that the data packet 10 has not yet been transmitted.
  • the terminal device can trigger a BSR to indicate that it still has a 30-byte data packet to be transmitted to request the next wireless resource. If the terminal device confirms that the transmission block is successfully transmitted, the terminal device may cancel triggering the BSR.
  • the terminal device When the wireless resource is allocated next time, if the transmission block has not confirmed the successful transmission, the terminal device will still transmit the data packet 10 to the network device through the next wireless resource. If the terminal device has confirmed that the data packet transmission is successful when the radio resource is allocated next time, the terminal device may not transmit the data packet 10 through the next radio resource.
  • the terminal device when the terminal device determines that if a plurality of data packets are transmitted through one transmission block, a deadlock may occur, the terminal device may divide these data packets into two or more than two transmissions, thereby Reduce the probability of transmitting all these data packets at once to reduce the possibility of continuous packet loss.
  • the network device and the terminal device include hardware structures and / or software modules corresponding to performing each function.
  • the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is executed by hardware or computer software driven hardware depends on the specific application and design constraints of the technical solution. A person skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be considered to exceed the scope of the technical solutions of the embodiments of the present application.
  • the embodiments of the present application may divide the functional units of network devices and terminal devices according to the above method examples, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit .
  • the above integrated unit may be implemented in the form of hardware or software functional unit. It should be noted that the division of the units in the embodiments of the present application is schematic, and is only a division of logical functions. In actual implementation, there may be another division manner.
  • FIG. 8 shows a possible exemplary block diagram of a communication device involved in an embodiment of the present application.
  • the device 800 may exist in the form of software, hardware, or a combination of software and hardware. .
  • FIG. 8 shows a possible schematic block diagram of the device involved in the embodiment of the present application.
  • the device 800 includes a processing unit 802 and a communication unit 803.
  • the processing unit 802 is used to control and manage the operation of the device.
  • the communication unit 803 is used to support communication between the device and other devices.
  • the device may further include a storage unit 801 for storing the program code and data of the device.
  • the apparatus 800 shown in FIG. 8 may be the network device involved in the embodiment of the present application.
  • the processing unit 802 can support the device 800 to perform the actions performed by the network device in the above method examples, for example, the processing unit 802 supports the device 800 to perform processing of the first information and generate an uplink authorization And actions to process transport blocks, and / or other processes for the techniques described herein.
  • the communication unit 803 can support communication between the device 800 and a terminal device, etc.
  • the communication unit 803 supports the device 800 to perform steps 110, 120, and 130 in FIG. 1, steps 201 to 206 in FIG. 2, and 401 in FIG. To 405, 710 to 760 in FIG. 7, and / or other related communication processes.
  • the processing unit 802 may be a processor or a controller, for example, may be a central processing unit (CPU), a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application -Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, units, and circuits described in conjunction with the disclosure of the present application.
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of DSP and microprocessor, and so on.
  • the communication unit 803 may be a communication interface, which is a general term. In a specific implementation, the communication interface may include one or more interfaces.
  • the storage unit 801 may be a memory.
  • the processing unit 802 is a processor
  • the communication unit 803 is a communication interface
  • the storage unit 801 is a memory
  • the device 800 involved in the embodiment of the present application may be the communication device 900 shown in FIG. 9.
  • the device 900 includes a processor 902 and a communication interface 903. Further, the device 900 may further include a memory 901. Optionally, the device 900 may further include a bus 904. Among them, the communication interface 903, the processor 902, and the memory 901 may be connected to each other through a bus 904; the bus 904 may be a peripheral component interconnection (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard, Architecture, EISA) Bus etc.
  • PCI peripheral component interconnection
  • EISA Extended Industry Standard, Architecture
  • the bus 904 can be divided into an address bus, a data bus, and a control bus. For ease of representation, only a thick line is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.
  • the processor 902 can execute various functions of the device 900 by running or executing programs stored in the memory 901.
  • the communication apparatus 900 shown in FIG. 9 may be a network device involved in an embodiment of the present application.
  • the processor 902 may perform the actions performed by the network device in the above method examples by running or executing a program stored in the memory 901.
  • FIG. 10 shows a possible exemplary block diagram of another device involved in an embodiment of the present application.
  • the device 1000 may exist in the form of software, hardware, or a combination of software and hardware. .
  • FIG. 10 shows a possible schematic block diagram of the device involved in the embodiment of the present application.
  • the device 1000 includes a processing unit 1002 and a communication unit 1003.
  • the processing unit 1002 is used to control and manage the operation of the device.
  • the communication unit 1003 is used to support communication between the device and other devices.
  • the device may further include a storage unit 1001 for storing program codes and data of the device.
  • the communication device 1000 shown in FIG. 10 may be a terminal device or a chip applied to the terminal device.
  • the processing unit 1002 can support the device 1000 to perform the actions performed by the terminal device in the above method examples, for example, the action of generating the first information, generating the transmission block, and / or other processes used in the technology described herein.
  • the communication unit 1003 can support communication between the device 1000 and a network device, etc.
  • the communication unit 1003 supports the device 1000 to perform steps 110, 120, and 130 in FIG. 1, steps 201 to 206 in FIG. 2, and 401 in FIG. To 405, 710 to 760 in FIG. 7, and / or other related communication processes.
  • the processing unit 1002 may be a processor or a controller, for example, it may be a CPU, a general-purpose processor, a DSP, an ASIC, an FPGA, or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, units, and circuits described in conjunction with the disclosure of the present application.
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of DSP and microprocessor, and so on.
  • the communication unit 1003 may be a communication interface, which is a general term. In a specific implementation, the communication interface may include one or more interfaces.
  • the storage unit 1001 may be a memory.
  • the apparatus 1000 involved in the embodiment of the present application may be the terminal device shown in FIG. 11.
  • FIG. 11 shows a simplified schematic diagram of a possible design structure of the terminal device involved in the embodiment of the present application.
  • the terminal device 1100 includes a transmitter 1101, a receiver 1102, and a processor 1103.
  • the processor 1103 may also be a controller, which is represented as "controller / processor 1103" in FIG.
  • the terminal device 1100 may further include a modem processor 1105, where the modem processor 1105 may include an encoder 1106, a modulator 1107, a decoder 1108, and a demodulator 1109.
  • the transmitter 1101 adjusts (eg, analog conversion, filtering, amplification, up-conversion, etc.) the output samples and generates an uplink signal, which is transmitted to the network described in the above embodiment via an antenna device.
  • the antenna receives the downlink signal transmitted by the base station in the above embodiment.
  • the receiver 1102 adjusts (eg, filters, amplifies, down-converts, digitizes, etc.) the signal received from the antenna and provides input samples.
  • the encoder 806 receives service data and signaling messages to be sent on the uplink, and processes the service data and signaling messages (eg, formatting, encoding, and interleaving).
  • the modulator 1107 further processes (eg, symbol mapping and modulation) the encoded service data and signaling messages and provides output samples.
  • the demodulator 1109 processes (eg, demodulates) the input samples and provides symbol estimates.
  • the decoder 1108 processes (e.g., deinterleaves and decodes) the symbol estimate and provides the decoded data and signaling message sent to the terminal device 1100.
  • the encoder 1106, the modulator 1107, the demodulator 1109, and the decoder 1108 may be implemented by a synthesized modem processor 1105. These units are processed according to the wireless access technology adopted by the wireless access network (for example, the access technology of LTE, 5G and other evolved systems). It should be noted that, when the terminal device 1100 does not include the modem processor 1105, the foregoing functions of the modem processor 1105 may also be completed by the processor 1103.
  • the processor 1103 controls and manages the operation of the terminal device 100, and is used to execute the processing procedure performed by the terminal device 1100 in the foregoing embodiment of the present application.
  • the processor 1103 is further configured to execute the processing procedures related to the terminal device and / or other procedures in the technical solutions described in this application in the methods shown in FIG. 1, FIG. 2, FIG. 4, and FIG.
  • the terminal device 1100 may further include a memory 1104, and the memory 1104 is used to store program codes and data for the terminal device 1100.
  • the steps of the method or algorithm described in conjunction with the disclosure of the embodiments of the present application may be implemented by hardware, or by a processor executing software instructions.
  • the software instructions can be composed of corresponding software modules, which can be stored in random access memory (Random Access Memory, RAM), flash memory, read-only memory (Read Only Memory, ROM), and erasable programmable read-only memory ( Erasable Programmable ROM (EPROM), Electrically Erasable Programmable Read Only Memory (Electrically EPROM, EEPROM), registers, hard disk, removable hard disk, CD-ROM or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor so that the processor can read information from the storage medium and can write information to the storage medium.
  • the storage medium may also be a component of the processor.
  • the processor and the storage medium may be located in the ASIC.
  • the ASIC may be located in the control plane entity of the centralized unit, the user plane entity of the centralized unit, the terminal device, or the unified data storage network element.
  • the processor and the storage medium may also exist as discrete components in the control plane entity of the centralized unit, the user plane entity of the centralized unit, the terminal device, or the unified data storage network element.
  • Embodiments of the present application also provide a computer-readable storage medium, including a computer program, which, when the computer program runs on a computer, causes the computer to execute the method provided by the foregoing method embodiments.
  • Embodiments of the present application also provide a computer program product containing instructions, which, when the computer program product runs on a computer, causes the computer to execute the method provided by the foregoing method embodiment.
  • An embodiment of the present application further provides a chip, which can be applied to a communication device.
  • the chip includes at least one processor. When the at least one processor executes an instruction, the chip or the communication device executes the above method.
  • the method can also include a memory, the memory can be used to store the instructions involved.
  • the processor mentioned in the embodiment of the present invention may be a central processing unit (Central Processing Unit, CPU), and may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), and special integrated circuits ( Application Specific (Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the terminal device or the network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
  • the hardware layer includes central processing unit (CPU), memory management unit (memory management unit, MMU), and memory (also called main memory) and other hardware.
  • the operating system may be any one or more computer operating systems that implement business processes through processes, for example, a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a windows operating system.
  • the application layer includes browser, address book, word processing software, instant messaging software and other applications.
  • the embodiment of the present application does not specifically limit the specific structure of the execution body of the method provided in the embodiment of the present application, as long as it can run the program that records the code of the method provided by the embodiment of the present application to provide according to the embodiment of the present application
  • the method may be used for communication.
  • the execution body of the method provided in the embodiments of the present application may be a terminal device or a network device, or a functional module in the terminal device or network device that can call a program and execute the program.
  • the term "article of manufacture” as used in this application encompasses a computer program accessible from any computer-readable device, carrier, or medium.
  • the computer-readable medium may include, but is not limited to: magnetic storage devices (for example, hard disks, floppy disks, or magnetic tapes, etc.), optical disks (for example, compact discs (CDs), digital universal discs (digital discs, DVDs)) Etc.), smart cards and flash memory devices (for example, erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.).
  • various storage media described herein may represent one or more devices and / or other machine-readable media for storing information.
  • machine-readable medium may include, but is not limited to, wireless channels and various other media capable of storing, containing, and / or carrying instructions and / or data.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a division of logical functions.
  • there may be other divisions for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例中,终端设备可以向网络设备指示待发送数据包需要至少两个上行授权,或者向网络设备发送用于确定该待发送数据包需要至少两个上行授权的指示信息,使得网络设备为该待发送数据包发送至少两个上行授权,然后终端设备将该待发送数据包组成至少两个传输块,并通过该至少两个上行授权指示的上行资源发送给网络设备,从而减小终端设备一次将该待发送数据包都传完的概率,减少连续的丢包,进而减少接收方操作臂就进入安全锁死状态。

Description

传输数据的方法和装置
本申请要求于2018年11月02日提交中国专利局、申请号为201811303641.9、申请名称为“传输数据的方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,并且更具体的,涉及通信领域中的数据传输的方法和装置。
背景技术
工业控制的数据包通常周期性出现。无线通信技术应用于工业控制之后,当无线通信系统发生丢包时,会导致数据包不能按时传输。为了保证数据传输的安全,工业操作臂引入了“存活时间(survival time)”的概念,也就是说,当一段时间内没有收到数据包,操作臂就启动一个存活定时器(survival timer),当该定时器超时时,操作臂就进入安全锁死状态,以防止发生安全事故。
为了减少生产设备进入锁死状态,无线通信网络要尽量减少连续的丢包。因此,无线通信网络如何减少连续的丢包是亟需解决的问题。
发明内容
本申请提供一种数据传输的方法和装置,以期在无线通信系统中减少连续的丢包或减少生产设备进入锁死状态。
第一方面,提供了一种数据传输的方法,包括:
终端设备向网络设备发送第一信息,所述第一信息用于指示所述终端设备的待发送数据包需要至少两个上行授权,或用于确定所述终端设备的待发送数据包需要至少两个上行授权;
所述终端设备从所述网络设备接收所述至少两个上行授权;
所述终端设备将所述待发送数据包组成至少两个传输块,并分别通过所述至少两个上行授权所述指示的上行资源发送给所述网络设备。
其中,该至少两个传输块与该至少两个授权指示的上行资源一一对应,即每个传输块对应一个上行授权所指示的上行资源,并通过其对应的上行资源进行传输。
因此,本申请实施例中,终端设备可以向网络设备指示待发送数据包需要至少两个上行授权,或者向网络设备发送用于确定该待发送数据包需要至少两个上行授权的指示信息,使得网络设备为该待发送数据包发送至少两个上行授权,然后终端设备将该待发送数据包组成至少两个传输块,并通过该至少两个上行授权指示的上行资源发送给网络设备,从而减少终端设备一次将该待发送数据包都传完的概率,以减少连续的丢包。
结合第一方面,在第一方面的某些实现方式中,所述终端设备向网络设备发送第一信 息,包括:
所述终端设备向所述网络设备发送至少两个缓存状态报告BSR,所述每个BSR用于指示所述BSR对应的待发送数据包的数据量。
需要说明的是,这里终端设备向网络设备发送至少两个BSR,是指在一次触发BSR后,缓存中的数据量没有改变的情况下,终端设备向网络设备发送至少两个BSR。另外,在发送该至少两个BSR中的第一个BSR之后,如果触发上报BSR时缓存中的待发送数据包没有全部在BSR上报,就保持BSR的触发状态,直到缓存中的待发送数据包全部在BSR中上报了,才取消BSR的触发状态。
因此,本申请实施例中,在一次触发BSR后,缓存中的数据量没有改变的情况下,终端设备可以向网络设备发送至少两个BSR,以通知网络设备需要的上行授权的数量为至少两个,使得网络设备为该待发送数据包发送至少两个上行授权
可选的,本申请实施例中,终端设备可以根据缓存中的待发送数据包的数量信息,和/或时间信息,确定上报的BSR的数量。
这里,数量信息可以指待发送数据包的数量,时间信息可以包括待发送数据包的到达时间、有效时间或者存活时间,或者其他时间信息,本申请实施例对此不作限定。其中,待发送数据包的到达时间指待发送数据包到达终端设备的接入层的时间,有效时间是指数据包在XX时间内必须被传到接收方。存活时间是指接收方如果XX时间内一个包都没有收到,就进入死锁状态。
结合第一方面,在第一方面的某些实现方式中,终端设备向网络设备发送第一信息,包括:
所述终端设备向所述网络设备发送第一指示信息,所述第一指示信息用于指示所述待发送数据包的数量,所述待发送数据包的数量用于确定所述终端设备对待发送数据包需要至少两个上行授权。
因此,本申请实施例中,终端设备可以向网络设备指示待发送数据包的数据量,使得网络设备根据该待发送数据包的数量,确定该待发送数据包需要的上行授权的数量为至少两个,进而为该待发送数据包发送至少两个上行授权。
结合第一方面,在第一方面的某些实现方式中,所述第一指示信息携带在MAC CE中。可选的,第一指示信息可以携带在MAC CE中的BSR中。
当该指示信息携带在BSR中时,一种可能的实现方式中,可以直接在BSR中增加一个字段,该字段用于显示指示该BSR所指示的待发送数据包的数量。另一种可能的实现方式中,可以重用BSR中的LCG字段来指示待发送数据包的数量。
当该指示信息携带在MAC CE中时,一种可能的实现方式中,可以将该指示信息携带在单独的MAC CE中,也就是说此时该MAC CE中仅包括该指示信息。
可选的,本申请实施例中,网络设备还可以根据待发送数据包的数量和待发送数据包的数据图案(pattern),确定为该待发送数据分配几份无线资源。这里,数据pattern用于指示待发送数据的传输策略。例如,终端设备的数据pattern可以指示每隔20ms传输一个数据包。
结合第一方面,在第一方面的某些实现方式中,所述终端设备向网络设备发送第一信息,包括:
所述终端设备向所述网络设备发送MAC CE,所述MAC CE中包括两个内容相同的BSR。
这样,使得网络设备在接收到这两个内容完全相同的BSR时,可以确定终端设备的待发送数据包需要至少两个上行授权。
结合第一方面,在第一方面的某些实现方式中,所述终端设备向网络设备发送第一信息,包括:
所述终端设备确定阈值,所述阈值表示上行资源传输的数据量的上限;
当所述终端设备需要至少两个上行授权时,所述终端设备向所述网络设备发送第二指示信息,所述第二指示信息用于指示所述待发送数据包的数据量大于或等于所述阈值。
网络设备确定终端设备的待发送数据的数量大于或等于阈值,具体可以包括两种情况:一种情况是终端的待发送数据量真的大于或等于阈值,另一种情况是终端的待发送数据量小于阈值,但是终端需要两个或两个以上的上行资源,这两种情况下,网络设备都可以为终端设备配置至少两个上行授权。
在一种可能的实现方式中,终端设备可以向网络设备发送“阈值”,以指示待发送数据包的数据量大于该阈值。或者,终端设备也可以向网络设备发送其他指示信息,来指示待发送数据包的数据量大于该阈值。
第二方面,提供了一种数据传输的方法,包括:
网络设备从终端设备接收第一信息,所述第一信息用于指示所述终端设备的待发送数据包需要至少两个上行授权,或用于确定所述终端设备的待发送数据包需要至少两个上行授权;
所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权;
所述网络设备通过所述至少两个上行授权所指示的上行资源接收所述终端设备发送的至少两个传输块。
因此,本申请实施例中,终端设备可以向网络设备指示待发送数据包需要至少两个上行授权,或者向网络设备发送用于确定该待发送数据包需要至少两个上行授权的指示信息,使得网络设备为该待发送数据包发送至少两个上行授权,然后终端设备将该待发送数据包组成至少两个传输块,并通过该至少两个上行授权指示的上行资源发送给网络设备,从而减小终端设备一次将该待发送数据包都传完的概率,以减小连续的丢包。
结合第二方面,在第二方面的某些实现方式中,所述网络设备从终端设备接收第一信息,包括:
所述网络设备从所述终端设备接收至少两个缓存状态报告BSR,所述每个BSR用于指示所述BSR对应的待发送数据包的数据量;
其中,所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权,包括:
所述网络设备根据所述至少两个BSR,向所述终端设备发送所述至少两个上行授权。
结合第二方面,在第二方面的某些实现方式中,所述网络设备从终端设备接收第一信息,包括:
所述网络设备从所述终端设备接收指示信息,所述指示信息用于指示所述待发送数据包的数量;
其中,所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权,包括:
所述网络设备根据所述待发送数据包的数量,向所述终端设备发送所述至少两个上行授权。
结合第二方面,在第二方面的某些实现方式中,所述指示信息携带在MAC CE中。
结合第二方面,在第二方面的某些实现方式中,所述网络设备根据所述待发送数据包的数量,向所述终端设备发送所述至少两个上行授权,包括:
所述网络设备根据所述待发送数据包的数量和所述待发送数据的数据图样,确定所述至少两个上行授权,其中,所述数据图样用于指示待发送数据的传输策略。
结合第二方面,在第二方面的某些实现方式中,所述网络设备从终端设备接收第一信息,包括:
所述网络设备从所述终端设备接收MAC CE,所述MAC CE中包括两个内容相同的BSR;
其中,所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权,包括:
所述网络设备根据所述MAC CE中的至少两个内容相同的BSR,向所述终端设备发送所述至少两个上行授权。
结合第二方面,在第二方面的某些实现方式中,所述网络设备从所述终端设备接收第一信息,包括:
所述网络设备确定阈值,所述阈值表示上行资源传输的数据量的上限;
所述网络设备从所述终端设备接收第二指示信息,所述第二指示信息用于指示所述待发送数据包的数量大于或等于所述阈值;
其中,所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权,包括:
所述网络设备根据所述第二指示信息,向所述终端设备发送所述至少两个上行授权。
第三方面,提供了一种数据传输的方法,包括:
终端设备向网络设备通知待发送数据包的数据量;
所述终端设备从所述网络设备接收第一上行授权;
所述终端设备将所述待发送数据包中的第一部分数据包组成第一传输块,通过所述第一上行授权所指示的上行资源发送给所述网络设备;
所述终端设备向所述网络设备通知所述待发送数据包中的第二部分数据包的数据量;
所述终端设备从所述网络设备接收第二上行授权;
所述终端设备将所述第二部分数据包组成第二传输块,通过所述第二上行授权所指示的上行资源发送给所述网络设备。
因此,本申请实施例中,当终端设备确定如果将多个待发送数据包通过一个传输块传输时,可能发生死锁,则终端设备可以将这些数据包分两次,或多于两次传输,从而减小了终端设备一次将这些数据包都传完的概率,以减小连续的丢包。
一种可能的实现方式中,第一部分数据包为该多个待发送数据包的部分,第二部分数据包为该多个待发送数据包的其中一部分。可选的,第一部分数据包与第二部分数据包不 同。作为举例,第一部分数据包为该多个待发送数据包的前若干个数据包,第二部分数据包为该第一部分数据包之后的数据包。
另一种可能的实现方式中,第一部分数据包为该多个待发送数据包的全部。并且在这种情况下,终端设备可以认为该多个待发送数据包中的部分数据包没有发送出去,例如第二部分数据包。这时,该第一部分数据包包括该第二部分数据包。可选的,当终端设备确定第一部分数据包传输成功时,取消第二部分数据包的发送,当终端设备有了下一次无线资源时,还没有确认第一部分数据包传输成功,则将第二部分数据包通过下一次的无线资源发送给网络设备。
第四方面,提供了一种数据传输的方法,包括:
网络设备从终端设备获取待发送数据包的数据量;
所述网络设备向所述终端设备发送第一上行授权;
所述网络设备通过所述第一上行授权指示的无线资源接收所述待发送数据包中的第一部分数据包组成的第一传输块;
所述网络设备从所述终端设备获取所述待发送数据包中的第二部分数据包的数据量;
所述网络设备向所述终端设备发送第二上行授权;
所述网络设备通过所述第二上行授权指示的无线资源接收所述第二部分数据包组成的第二传输块。
因此,本申请实施例中,当终端设备确定如果将多个待发送数据包通过一个传输块传输时,可能发生死锁,则终端设备可以将这些数据包分两次,或多于两次传输,从而减小了终端设备一次将这些数据包都传完的概率,以减少连续的丢包。
第五方面,提供了一种装置,该装置可以是网络设备,网络设备中的网元或模块,也可以是网络设备内的芯片,网络设备中的网络或模块内的芯片。该装置具有实现上述第一方面至第四方面及任一方面的各种可能的实现方式中的网络设备的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的设计中,该装置包括:收发模块,可选地,该装置还包括处理模块,所述收发模块例如可以是收发器、接收器、发射器中的至少一种,该收发模块可以包括射频电路或天线。该处理模块可以是处理器。可选地,所述装置还包括存储模块,该存储模块例如可以是存储器。当包括存储模块时,该存储模块用于存储指令。该处理模块与该存储模块连接,该处理模块可以执行该存储模块存储的指令或源自其他的指令。在本设计中,该装置可以为网络设备,或网络设备中的模块、网元或者功能。
在另一种可能的设计中,当该装置为芯片时,该芯片包括:收发模块,可选地,该装置还包括处理模块,收发模块例如可以是该芯片上的输入/输出接口、管脚或电路等。处理模块例如可以是处理器。可选地,该处理模块可以执行存储模块中的指令,该存储模块可以为芯片内的存储模块,如寄存器、缓存等。该存储模块还可以是位于通信设备内,但位于芯片外部,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。
第六方面,提供了一种装置,该装置可以是终端设备,终端设备中的模块,也可以是终端设备内的芯片,终端设备中的模块内的芯片。该装置具有实现上述第一方面至第四方 面及任一方面的各种可能的实现方式中的终端设备的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的设计中,该装置包括:收发模块,可选地,该装置还包括处理模块,所述收发模块例如可以是收发器、接收器、发射器中的至少一种,该收发模块可以包括射频电路或天线。该处理模块可以是处理器。可选地,所述装置还包括存储模块,该存储模块例如可以是存储器。当包括存储模块时,该存储模块用于存储指令。该处理模块与该存储模块连接,该处理模块可以执行该存储模块存储的指令或源自其他的指令。在本设计中,该装置可以为终端设备,或终端设备中的模块或者功能。
在另一种可能的设计中,当该装置为芯片时,该芯片包括:收发模块,可选地,该装置还包括处理模块,收发模块例如可以是该芯片上的输入/输出接口、管脚或电路等。处理模块例如可以是处理器。可选地,该处理模块可以执行存储模块中的指令,该存储模块可以为芯片内的存储模块,如寄存器、缓存等。该存储模块还可以是位于通信设备内,但位于芯片外部,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。
其中,上述任一处提到的处理器,可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制上述第一方面至第四方面各方面通信方法的程序执行的集成电路。
第七方面,提供了一种计算机存储介质,该计算机存储介质中存储有程序代码,该程序代码用于指示执行上述第一方面至第四方面任一方面或其任意可能的实现方式中的方法的指令。
第八方面,提供了一种包含指令的计算机程序产品,其在计算机上运行时,使得计算机执行上述第一方面至第四方面任一方面或其任意可能的实现方式中的方法。
第九方面,提供了一种通信系统,该通信系统包括具有实现上述第一方面至第四方面任一方面的各方法及各种可能设计的功能的装置及其组合。
第十方面,提供了一种处理器,用于与存储器耦合,用于执行上述第一方面至第四方面任一方面或其任意可能的实现方式中的方法。
第十一方面,提供了一种芯片,芯片包括处理器和通信接口,该通信接口用于与外部器件或内部器件进行通信,该处理器用于实现上述第一方面至第四方面任一方面或其任意可能的实现方式中的方法。
可选地,该芯片还可以包括存储器,该存储器中存储有指令,处理器用于执行存储器中存储的指令或源于其他的指令。当该指令被执行时,处理器用于实现上述第一方面至第四方面任一方面其任意可能的实现方式中的方法。
附图说明
图1示出了本申请实施例提供的数据传输的方法的示意性流程图。
图2示出了本申请实施例提供的一个数据传输的具体的例子。
图3示出了本申请实施例提供的一个数据传输的例子。
图4示出了本申请实施例提供的一个数据传输的例子。
图5示出了本申请实施例提供的一种BSR的示例。
图6示出了本申请实施例提供的一种BSR的示例。
图7示出了本申请实施例提供的数据传输的方法的示意性流程图。
图8示出了本申请实施例提供的一种通信装置的示意性框图。
图9示出了本申请实施例提供的另一种通信装置的示意性框图。
图10示出了本申请实施例提供的另一种通信装置的示意性框图。
图11示出了本申请实施例提供的一种终端设备的示意性框图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通信(global system for mobile communications,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、未来的第五代(5th generation,5G)系统或新无线(new radio,NR)等。
本申请实施例中的终端设备可以指用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。
本申请实施例中的网络设备可以是用于与终端设备通信的设备,该网络设备可以是全球移动通信(global system for mobile communications,GSM)系统或码分多址(code division multiple access,CDMA)中的基站(base transceiver station,BTS),也可以是宽带码分多址(wideband code division multiple access,WCDMA)系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(evolved NodeB,eNB或eNodeB),还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器,或者该网络设备可以为中继站、接入点、车载设备、可穿戴设备以及未来5G网络中的网络设备或者未来演进的PLMN网络中的网络设备等,本申请实施例并不限定。
无线通信系统中,数据包在接入层是按顺序传输的。也就是说,在发送方,应用层交给接入层的数据包是什么顺序,在接收方,接入层就会按照相同的顺序将数据包交给应用层。接入层传输数据时,无论是上行还是下行,无线资源的分配都取决于网络设备。对下行而言,网络设备确定数据包所占用的无线资源,将数据包发给各个终端设备。对上行而言,终端设备侧的应用层将数据包交给接入层后,会向网络设备发送一个缓存状态报告 (buffer status reports,BSR),用来通知网络设备其有多少,例如有多少字节(byte),数据要发送。
网络设备收到该BSR后,为该终端设备分配适当大小的无线资源,终端设备使用该无线资源向网络设备传输数据。实际的通信系统中,网络设备可能会同时收到多个终端设备的BSR,而无线资源是有限的,所以网络设备会根据终端设备的业务的重要程度、紧急程度等信息,确定先为哪些终端设备分配资源,后为哪些终端设备分配资源。终端设备上报BSR后,网络设备知道了终端设备的待发送数据量,也不一定为终端设备分配一次无线资源,可能分配多次无线资源。
具体的,一种实现方式中,终端设备会使用网络设备分配的该无线资源,一次将缓存中的所有数据包都传完,即把所有的数据包组成一个传输块并一次传走。这样,这些数据包要么都传输成功,要么都传输不成功或失败。如果传输不成功,接收方在一段时间之内没有收到任何数据包,接收方的操作臂就有可能发生锁死。
图1示出了本申请实施例提供的一种数据传输的方法的示意性流程图。为了防止生产设备进入锁死状态,无线通信网络要尽量防止连续的丢包。本申请实施例中,终端设备可以向网络设备通知该待发送数据包的相关信息,使得网络设备可以向该终端设备发送至少两个上行授权,从而终端设备可以将待发送数据组成至少两个传输块,分别通过该至少两个上行授权所指示的上行资源发送给网络设备,从而减少终端设备一次将该待发送数据包都传完,以减少连续的丢包。
应理解,图1中以终端设备和网络设备作为执行该数据传输的方法的执行主体为例,对该数据传输的方法进行说明。作为示例而非限定,执行该数据传输的方法的执行主体也可以是对应终端设备的芯片和对应网络设备的芯片。
图1中的该数据传输的方法包括110至130。
110,终端设备向网络设备发送第一信息,该第一信息用于指示该终端设备的待发送数据包需要至少两个上行授权,或者该第一信息用于确定该终端设备的待发送数据包需要至少两个上行授权。
对应的,网络设备接收该第一信息,并根据该第一信息,为该待发送数据包分配至少两个上行资源。
具体的,第一信息用于指示该终端设备的待发送数据包需要至少两个上行授权,例如,终端设备通知网络设备其缓存中的待发送数据包需要的上行授权的数量。也就是说,此时,终端设备确定该待发送数据包需要的上行授权的数量为至少两个,并通知给网络设备。然后网络设备根据该第一信息,为该终端设备的待发送数据包分配至少两个上行资源,并将该至少两个上行资源的授权信息(即至少两个上行授权)发送给终端设备。
当第一信息用于确定该终端设备的待发送数据包需要至少两个上行授权时,网络设备可以根据该第一信息,确定该终端设备的待发送数据包需要至少两个上行授权。然后,网络设备为该终端设备的待发送数据包分配至少两个上行资源,并将该至少两个上行资源的授权信息(即至少两个上行授权)发送给终端设备。
120,网络设备向终端设备发送至少两个上行授权。
具体的,网络设备可以向终端设备发送配置信息,该配置信息用于配置所述至少两个上行授权。对应的,终端设备从网络设备接收该配置信息,并根据该配置信息,确定该至 少两个上行授权,进一步确定该至少两个上行授权指示的上行资源。
130,终端设备将该待发送数据包组成至少两个传输块,并分别通过网络设备分配的至少两个上行授权所指示的上行资源发送给网络设备。
其中,该至少两个传输块与该至少两个授权指示的上行资源一一对应,即每个传输块对应一个上行授权所指示的上行资源,并通过其对应的上行资源进行传输。
对应的,网络设备在该至少两个上行资源上接收该至少两个传输块。
因此,本申请实施例中,终端设备可以向网络设备指示待发送数据包需要至少两个上行授权,或者向网络设备发送用于确定该待发送数据包需要至少两个上行授权的指示信息,使得网络设备为该待发送数据包发送至少两个上行授权,然后终端设备将该待发送数据包组成至少两个传输块,并通过该至少两个上行授权指示的上行资源发送给网络设备,从而不再一次将该待发送数据包都传完,以降低连续的丢包的概率。
本申请实施例中,当终端设备的缓存中有待发送数据包时,终端设备可以向网络设备发送缓存状态报告BSR,用来通知网络设备其缓存中待发送数据包的数据量。具体而言,终端设备的缓存中新加入待发送数据包时可以触发BSR上报,或者,可以配置终端设备周期性的上报BSR,或者,终端设备可以在需要为缓存中的待发送数据包请求无线资源时,触发BSR上报。具体的,BSR可以参见现有技术的描述,这里不再详细描述。
一种可能的实现方式中,当终端设备的缓存中新加入优先级较高的待发送数据包(例如高于预先设置的优先级等级)时,终端设备可以触发BSR上报。如果此时该终端设备的缓存中还包括原先已经存在的待发送数据包时,终端设备上报的BSR用于指示的待发送数据包可以包括该原先已经存在于缓存中的待发送数据包。
这里,该原先已经存在于缓存中的待发送数据包的优先级可以高于预先设置的优先级等级,或者可以低于预先设置的优先级等级,本申请实施例对此不作具体限定。或者,该终端设备已经发送过对应于该原先已经存在于缓存中的待发送数据包的BSR,或者该终端设备没有发送过对应于该原先已经存在于缓存中的待发送数据包的BSR,本申请实施例对此不作具体限定。
例如,当终端设备的缓存中有100个待发送的数据包,并且该100个待发送的数据包已经发送过BSR,来指示该100个待发送数据包的数据量。后来,该终端设备的缓存中又新加入了10个待发送的数据包,该10个待发送的数据包的优先级较高。此时,该10个待发送的数据包触发了终端设备上报BSR。此时终端设备上报的该BSR可以用于指示该终端设备的缓存中的110个待发送数据包的数据量。
可选的,本申请实施例中,所述终端设备向网络设备发送第一信息,包括:
所述终端设备向所述网络设备发送至少两个BSR,所述至少两个BSR中的每个BSR用于指示所述每个BSR对应的待发送数据包的数据量。
也就是说,本申请实施例中,第一信息可以包括该至少两个BSR,该至少两个BSR的数量可以等于需要的至少两个上行授权的数量。
终端设备向网络设备发送至少两个BSR可以包括以下情况:在一次触发BSR后,缓存中的数据量没有改变的情况下,终端设备向网络设备发送至少两个BSR。也就是说,当终端设备满足BSR触发的条件时,终端设备触发至少两个BSR,利用该至少两个BSR向网络设备请求缓存中数据量所需的资源。相对于现有技术,只触发一个BSR的情况,可 以获得至少两个上行授权,进而通过至少两个传输块发送缓存中的数据包,这样至少两个传输块相对于现有技术中一个传输块丢失的概率降低,降低了生产设备进入锁死状态的概率。作为举例,延续上面的例子,在该10个新加入的优先级较高的待发送数据包触发终端设备上报BSR后,终端设备可以向网络设备发送三个BSR,其中第一个BSR可以用于指示该缓存中的其中前40个待发送数据包的数据量,第二个BSR可以用于指示该缓存中的前40个待发送数据包之后的30个待发送数据包的数据量,第三个BSR用可以于指示该缓存中的后40个待发送数据包的数据量。并且在发送这三个BSR的过程中,缓存中的待发送数据包没有改变,即既没有增多,也没有减少,并且也没有新的BSR被触发(即再次新加入数据包触发BSR)。
在一次触发BSR后,如果缓存中的数据量发生改变,例如新加入了优先级较高的待发送数据包时,可以触发新的BSR。或者,可以将以上至少两个BSR发送完之后,再触发新的BSR。在发送该至少两个BSR中的第一个BSR之后,如果触发上报BSR时缓存中的待发送数据包没有全部在BSR上报,就保持BSR的触发状态,直到缓存中的待发送数据包全部在BSR中上报了,才取消BSR的触发状态。作为举例,延续上面的例子,在发送第一个BSR、第二个BSR和第三个BSR之后,才取消BSR的触发状态。
图2示出了本申请实施例提供的一个数据传输的具体的例子。如图2所示,终端设备的缓存中有4个待发送数据包,分别为数据包7,8,9,10,大小分别是20字节(bytes)、20bytes、30bytes、30bytes。图2中所示的方法包括步骤201至206。
201,终端设备的向网络设备上报BSR#1,BSR#1用于指示终端设备的待发送数据包的数据量为20字节,即终端设备有20字节要传。
202,终端设备向网络设备上报BSR#2,BSR#2用于指示终端设备的待发送数据包的数据量为80字节,即终端设备有80字节要传。
也就是说,终端设备向网络设备上报两个BSR,分别为步骤201中的BSR#1和步骤202中的BSR#2。
203,网络设备向终端设备配置20字节的上行资源。
具体的,网络设备向终端设备发送上行授权,该上行授权指示该20字节的上行资源。
204,终端设备使用步骤203中网络设备发送的上行授权指示的上行资源,发送数据包7。
205,网络设备向终端设备配置80字节的上行资源。
具体的,网络设备向终端设备发送上行授权,该上行授权指示该80字节的上行资源。
206,终端设备使用步骤205中网络设备发送的上行授权指示的上行资源,发送数据包8,9,10。
数据包在接入层是按顺序传输的,即在终端设备侧,应用层交给接入层的数据包是什么顺序,在网络设备侧,接入层就会按照相同的顺序将数据包交给应用层。由此可知,当应用层交给接入层的数据包的顺序为7,8,9,10时,在步骤203中终端设备在确定20字节的上行资源之后,将首先在204中发送数据包7。在步骤205中终端设备在确定80字节的上行资源后,会依次发送数据包8,9,10。
此外,以上步骤201和202之间的顺序没有要求,可以先发送BSR#2,再发送BSR#1。以上步骤203和205之间没有顺序限制,也可以先分配205中的资源,再分配203中的资 源。另外,对于BSR的数量也不做限制,每个BSR要求资源的大小也不做限制。例如可以生成3个BSR,分别要求20字节,20字节,60字节的资源,或者,20字节,50字节,30字节的资源。也可以生成4个BSR,分别要求20字节,20字节,30字节,30字节的资源。
因此,本申请实施例中,在一次触发BSR后,终端设备可以向网络设备发送至少两个BSR,以通知网络设备需要的上行授权的数量为至少两个,使得网络设备为该待发送数据包发送至少两个上行授权,然后终端设备将该待发送数据包组成至少两个传输块,并通过该至少两个上行授权指示的上行资源发送给网络设备,从而减少一次将该待发送数据包都传完的概率,减少了连续的丢包的可能性。
可选的,本申请实施例中,终端设备可以根据缓存中的待发送数据包的数量信息,和/或时间信息,确定上报的BSR的数量。
这里,数量信息可以指待发送数据包的数量,时间信息可以包括待发送数据包的到达时间、有效时间或者存活时间,或者其他时间信息,本申请实施例对此不作限定。其中,待发送数据包的到达时间指待发送数据包到达终端设备的接入层的时间,有效时间是指规定时间,数据包在规定时间内必须被传到接收方。存活时间是指设定时间,接收方如果在设定时间内一个包都没有收到,就进入死锁状态。
实施方式一:终端设备根据缓存中的待传数据包的数据量,确定分为几个BSR上报。
比如,终端设备收到三个数据包,这三个数据包的大小分别为50Bytes,20Bytes,40Bytes。终端设备为了使这三个数据包不能全都传输失败,将这三个数据包的数据量通过两个BSR上报,以便网络设备分配2份或大于2份的上行资源,用于传输这三个上行数据包。因为第一个包比较大,后两个包相对较小,所以,终端设备决定将第一个数据包的数据量通过一个BSR上报,将第二个数据包和第三个数据包的数据量通过另一个BSR上报,以便网络设备分配的上行资源大小较为均匀。
实施方式二:终端设备根据缓存中的待传数据包的到达时间,确定分为几个BSR上报。
比如,终端设备收到三个数据包,这三个数据包到达终端设备的接入层的时间分别为00秒:00毫秒:00微秒,00秒:00毫秒:02微秒,00秒:00毫秒:07微秒,终端设备为了使这三个数据包不能全都传输失败,将这三个数据包的数据量通过两个BSR上报,以便网络设备分配2份或大于2份的上行资源,用于传输这三个上行数据包。因为前两个包的到达时间比较接近,第三个包的到达时间与前两个包相隔较远,所以,终端设备将第一个数据包和第二个数据包的数据量通过一个BSR上报,将第三个数据包的数据量通过另一个BSR上报。
实施方式三:终端设备根据缓存中的待传数据包的有效时间,确定分成几个BSR上报。
比如,终端设备的接入层收到三个数据包,第一个数据包是00秒:00毫秒:00微秒收到的,有效时间到00秒:00毫秒:600微秒;第二个数据包是00秒:00毫秒:100微秒收到的,有效时间到00秒:00毫秒:400微秒;第三个数据包是00秒:00毫秒:150微秒收到的,有效时间到00秒:00毫秒:600微秒,终端设备发现第一个数据包和第三个数据包的有效时间都是00秒:00毫秒:600微秒,而第二个数据包的有效时间是00秒:00毫秒:400微秒,所以,UE将这三个数据包的数据量分成两个BSR上报,一个BSR 上报第二个数据包的数据量,另一个BSR上报第一个数据包和第三个数据包的数据量。
实施方式四:终端设备根据缓存中的待传数据包的存活时间,确定分成几个BSR上报。
以图3为例,数据包6到达网络设备侧的时间是T1,终端设备的缓存中有数据包7,8,9,10,且数据包10要求达到网络设备侧的时间是T2。但是T1和T2之间的时间间隔太长,例如超过了“存活时间”。如果数据包7,8,9,10所组成的传输块在T2时刻到达,会导致网络设备侧的存活定时器超时。这个时候,终端设备可以将数据包7,8,9,10分成多个BSR上报,一个BSR上报数据包7的数据量,另一个BSR上报数据包8,9,10的数据量。
可选的,所述终端设备向网络设备发送第一信息,包括:所述终端设备向所述网络设备发送第一指示信息,所述第一指示信息用于指示所述待发送数据包的数量,所述待发送数据包的数量用于确定所述终端设备对待发送数据包是否需要至少两个上行授权。也就是说,此时该第一信息为第一指示信息,具体可以用于指示该待发送数据包的数量,网络设备可以根据获取到的待发送数据包的数量,确定该待发送数据包需要至少两个上行资源。
具体的,终端设备向网络设备上报BSR时,不仅仅上报缓存中的待发送数据包的数据量,还上报待发送数据包的数量,使得网络设备可以根据待发送数据包的数量确定为终端设备分配的上行资源的数量。例如,如果待发送数据包的数量大于预设值,则网络设备可以确定向终端设备发送至少两个上行授权,即为该待发送数据包分配至少两个无线资源。
本申请实施例中,待发送数据包的数量,可以是缓存中全部待发送数据包的数量,也可以是缓存中待发送的连续数据包的数量。如果有多段连续的数据包,就指示最长的那一段连续的数据包的数量,或者第一段连续的数据包的数量。这里,连续数据包指的是缓存按顺序进入的数据包。例如上文中所述的数据包6,7,8,9,10。
具体而言,当终端设备向网络设备指示连续数据包的数量,并且网络设备为该连续数据包分配至少两个无线资源时,终端设备可以将该段连续的数据包组成两个传输块,并通过网络设备分配的无线资源发送给网络设备。
图4示出了本申请实施例提供的一个数据传输的具体的例子。如图4所示,终端设备的缓存中有4个待发送数据包,分别为数据包7,8,9,10,大小分别是20字节(bytes)、20bytes、30bytes、30bytes。图2中所示的方法包括步骤401至405。
401,终端设备向网络设备上报BSR#3,BSR#3用于指示终端设备的待发送数据包的数据量为100字节,即终端设备有100字节要传,并且BSR#3还用于指示该待发送数据包的数量为4个。
对应的,网络设备接收该BSR#3,并根据该BSR#3指示的待发送数据包的数据量和数量,为该终端设备分配至少两个无线资源,例如,分配两个无线资源,以一个20字节的上行资源和一个80字节的上行资源为例。
402,网络设备向终端设备配置20字节的上行资源。
具体的,网络设备向终端设备发送上行授权,该上行授权指示该20字节的上行资源。
403,终端设备使用步骤402中网络设备发送的上行授权指示的上行资源,发送数据包7。
404,网络设备向终端设备配置80字节的上行资源。
具体的,网络设备向终端设备发送上行授权,该上行授权指示该80字节的上行资源。
405,终端设备使用步骤404中网络设备发送的上行授权指示的上行资源,发送数据包8,9,10。
此外,以上步骤402和404之间没有顺序限制,也可以先分配404中的资源,再分配402中的资源。另外,对于BSR的数量也不做限制,每个BSR要求资源的大小也不做限制。例如可以生成3个BSR,分别要求20字节,20字节,60字节的资源,或者,20字节,50字节,30字节的资源。也可以生成4个BSR,分别要求20字节,20字节,30字节,30字节的资源。
因此,本申请实施例中,终端设备可以向网络设备指示待发送数据包的数据量,使得网络设备根据该待发送数据包的数量,确定该待发送数据包需要的上行授权的数量为至少两个,进而为该待发送数据包发送至少两个上行授权,然后终端设备将该待发送数据包组成至少两个传输块,并通过该至少两个上行授权指示的上行资源发送给网络设备,从而减少一次将缓存中的所有数据包都传完的概率,减少了连续的丢包的可能性。
可选的,该指示信息可以携带在MAC CE中。一种实现方式,该指示信息携带在MAC CE中的BSR中。另一种实现方式中,指示信息携带在独立的MAC CE中。
具体的,当该指示信息携带在BSR中时,一种可能的实现方式中,可以直接在BSR中增加一个字段,该字段用于显示指示该BSR所指示的待发送数据包的数量。图5示出了一个BSR的具体例子,该BSR包括LCG0-7字段,LCG0-7字段分别用来表示终端设备的8个逻辑信道组,LCG0的BS(BS for LCG0)、LCG1的BS(BS for LCG1)、LCG2的BS(BS for LCG2)、LCG3的BS(BS for LCG3)、LCG4的BS(BS for LCG4)、LCG5的BS(BS for LCG5)、LCG6的BS(BS for LCG6)、LCG7的BS(BS for LCG7)字段,其中LCG0-7字段分别用来表示LCG0-7所对应的逻辑信道的数据量有没有在BSR中包含,BS for LCG0-7分别用来表示LCG0-7所对应的逻辑信道的数据包数量字段。例如当LCGi取值为“0”时,表明BS for LCGi未包含在BSR中,当LCGi取值为“1”时,表明BS for LCGi未包含在BSR中。即图中BS for LCG0-7是可选的,由LCGi的取值决定是否存在对应的BS for LCGi。其中,i取至0到7。
另一种可能的实现方式中,可以重用BSR中的LCG字段来指示待发送数据包的数量。具体的,此时可以隐式指示终端设备的待发送数据包需要至少两个上行授权。例如,可以采用LCG中的某一个比特来隐式指示,例如图6中的LCG0。作为举例,该比特的值为“0”,表示终端设备可以用一份无线资源传输缓存中的所有待发送数据包,该比特的值为“1”,表示终端设备希望使用两份或多份无线资源传输缓存中的待发送数据包。该LCG应该没有被配置给终端设备,也就是说,终端设备没有任何一个逻辑信道属于LCG0。具体的,网络设备可以采用RRC信令配置,或者使用MAC CE配置重用哪个LCG指示位来指示待发送数据包的数量。
当该指示信息携带在MAC CE中时,一种可能的实现方式中,可以将该指示信息携带在单独的MAC CE中,也就是说此时该MAC CE中仅包括该指示信息。
可选的,本申请实施例中,网络设备还可以根据待发送数据包的数量和待发送数据包的数据图案(pattern),确定为该待发送数据分配几份无线资源。这里,数据pattern用于指示待发送数据的传输策略或发送数据的资源分配方式或待发送数据的分布情况。例如, 终端设备的数据pattern可以指示每隔20ms传输一个数据包。
本申请实施例中,终端设备可以从操作、管理和维护(operation,administration and maintenance,OAM)系统获取该数据pattern,也可以从控制中心获取该该数据pattern,也可以由终端设备上报数据pattern,本申请实施例对此不作限定。
作为举例,当终端设备的数据pattern指示每隔20ms传输一个数据包,存活定时器(survival timer)是100ms,如果网络设备接收到终端设备发送的指示信息,知道终端设备有5个数据包要传,如果网络设备一次性为这5个待发送数据包分配一份无线资源,一旦这5个数据包在无线接口上传输失败,操作臂就会进入死锁状态。因此,此时网络设备就可以为终端设备分配两份或者更多份无线资源,使得终端设备可以分两次或者多次,将这5个数据包发送给网络设备。这样,只有当所有数据都传输失败,操作臂才会进入死锁状态,也就是说,即使有一部分数据包传输失败,操作臂也不会进入死锁状态。
可选的,本申请实施例中,所述终端设备向网络设备发送第一信息,包括:
所述终端设备向所述网络设备发送两个内容相同的BSR。可选的,该两个内容相同的BSR可以包括在一个MAC CE中。
此时第一信息包括该两个内容相同的BSR。当网络设备接收到这两个内容完全相同的BSR时,可以确定终端设备的待发送数据包需要至少两个上行授权。这里,内容相同的BSR,指的是完全相同的BSR,即这两个BSR所指示的信息完全相同。需要说明的是,本申请实施例中,该MAC CE中也可以包括三个,或三个以上的内容相同的BSR,用来指示终端设备的待发送数据包需要至少两个上行授权。
可选的,本申请实施例中,所述终端设备向网络设备通知待发送数据所需的至少两个上行资源的数量,包括:
所述终端设备确定阈值,所述阈值表示上行资源传输的数据量的上限;
当所述终端设备需要至少两个上行授权时,所述终端设备向所述网络设备发送第二指示信息,该第二指示信息用于指示待发送数据包的数据量大于或等于所述阈值。
对应的,网络设备确定终端设备的待发送数据的数量大于或等于阈值,可以包括两种情况:一种情况是终端的待发送数据量真的大于或等于阈值,另一种情况是终端的待发送数据量小于阈值,但是终端需要两个或两个以上的上行资源,这两种情况下,网络设备都可以为终端设备配置至少两个上行授权。
这里,该阈值可以由网络设备配置,或者由协议规定,本申请实施例对此不作限定。作为举例,该阈值可以为500字节。
具体的,终端设备可以在待发送数据包的数据量小于或等于阈值的情况下,向网络设备指示待发送数据包的数据量大于或等于阈值。此时,该“指示”并不是真实的指示,而是为了让网络设备为终端设备分配至少两个上行资源而进行的“指示”,换言之,该“指示”用于指示网络设备忽略真实的待发送数据量。
终端设备也可以在待发送数据包的数据量大于阈值的情况下,向网络设备指示待发送数据包的数据量大于阈值。
在一种可能的实现方式中,终端设备可以向网络设备发送“阈值”,以指示待发送数据包的数据量大于该阈值。或者,终端设备也可以向网络设备发送其他指示信息,来指示待发送数据包的数据量大于该阈值,本申请实施例对此不作限定。
因此,本申请实施例中,终端设备可以向网络设备指示待发送数据包需要至少两个上行授权,或者向网络设备发送用于确定该待发送数据包需要至少两个上行授权的指示信息,使得网络设备为该待发送数据包发送至少两个上行授权,然后终端设备将该待发送数据包组成至少两个传输块,并通过该至少两个上行授权指示的上行资源发送给网络设备,从而减少一次将该待发送数据包都传完的概率,减少了连续的丢包的可能性。
图7示出了本申请实施例提供的数据传输的方法的示意性流程图。为了减少生产设备进入锁死状态,无线通信网络要尽量防止连续的丢包。本申请实施例中,当终端设备确定如果将多个数据包通过一个传输块传输时,可能发生死锁,则终端设备可以将这些数据包分两次,或多于两次传输,从而减少一次将这些数据包都传完的概率,以减少连续的丢包的可能性。
应理解,图7中以终端设备和网络设备作为执行该数据传输的方法的执行主体为例,对该数据传输的方法进行说明。作为示例而非限定,执行该数据传输的方法的执行主体也可以是对应终端设备的芯片和对应网络设备的芯片。
还应理解,图7示出了数据传输的方法的步骤或操作,但这些步骤或操作仅是示例,本申请实施例还可以执行其他操作或者图7中的各个操作的变形。此外,图7中的各个步骤可以按照与图1呈现的不同的顺序来执行,并且有可能并非要执行图7中的全部操作。
图7中的该数据传输的方法包括710至760。
710,终端设备向网络设备通知待发送数据包的数据量。
具体的,终端设备可以向网络设备发送BSR#4,该BSR#4用来通知终端设备的缓存中的待发送数据包的数据量。
720,网络设备向终端设备分配第一上行资源。具体的,网络设备可以根据BSR#4,向终端设备发送第一上行授权,以指示该第一上行资源。
730,所述终端设备将所述待发送数据包中的第一部分数据包组成第一传输块,通过所述网络设备为所述待发送数据包分配的上行资源发送给所述网络设备。
740,所述终端设备向所述网络设备通知所述待发送数据包中的第二部分数据包的数据量。
750,网络设备向终端设备分配第二上行资源。具体的,网络设备可以向终端设备发送第二上行授权,以指示该第二上行资源。网络设备可以根据第二部分数据包的数据量分配第二上行资源。
760,所述终端设备将所述第二部分数据包组成第二传输块,通过所述网络设备为所述第二部分数据包分配的上行资源发送给所述网络设备。
情况1
具体的,当终端设备确定将多个待发送数据包通过一个传输块传输时,可能发生死锁,此时一种可能的实现方式中,该终端设备可以将该多个待发送数据包分多次(至少两次)传输,这时730中的第一部分数据包为该多个待发送数据包的部分,即710中的待发送数据包的部分。作为举例,第一部分数据包可以为该待发送数据包的前若干个数据包。在这种情况下,终端设备和网络设备可以执行730至760,即可以向网络设备发送BSR#5,该BSR#5用来通知终端设备当前的缓存中的待发送数据包的数据量,即第二部分数据包。需要说明的是,此时该终端设备当前的缓存中的待发送数据包(即第二部分数据包)为步骤 710中的待发送数据包的其中一部分。作为举例,第二部分数据包可以为730中的第一部分数据包之后的若干个数据包。
其中,终端设备可以将BSR#5放入第一传输块中发送给网络设备。或者,终端设备可以触发BSR上报,然后向网络设备发送BSR#5。或者,终端设备在发送第一传输块后,不取消BSR触发,仍然保持BSR的触发状态,然后向网络设备发送BSR#5。
应理解,本申请实施例中,终端设备可以将710中的待发送数据包分至少两次传输给网络设备,因此终端设备和网络设备可以执行一次、两次或多次740至760,本申请实施例对此不作限定。
作为一个具体的例子,终端设备的缓存中有4个带传输数据包,分别为数据包7,8,9,10,当终端设备确定将这4个数据包通过一个传输块传输时,可能发生死锁。此时,终端设备可以向传输块中放入三个数据包7,8,9。然后,终端设备可以在该传块中再放入一个BSR,用来指示自己还有一个30bytes的数据包待传。网络设备在接收到该传输块时,能够获取该BSR,这样,网络设备就可以继续为该终端设备分配无线资源来传输数据包10。
情况2
当终端设备确定将多个待发送数据包通过一个传输块传输时,可能发生死锁,此时另一种可能的实现方式中,该终端设备可以将该多个待发送数据包全部放入该传输块中传输,这时,730中的第一部分数据包为该多个待发送数据包的全部,即710中的待发送数据包的全部。在这种情况下,终端设备可以认为该多个待发送数据包中的部分数据包没有发送出去,例如第二部分数据包。这时,该第一部分数据包包括该第二部分数据包。
当730中的第一传输块发送之后,终端设备可以触发上报BSR#6,该BSR#6用来通知终端设备第二部分数据包的数据量。或者,终端设备在发送730中的第一传输块后,不取消BSR触发,仍然保持BSR的触发状态,然后向网络设备发送BSR#6。这样,网络设备可以根据BSR#6为终端设备分配下一次的无线资源。这时,当下一次有了无线资源时,如果终端设备没有确认730中的第一传输块传输成功,会将该第二部分数据包通过该下一次的无线资源发送给网络设备。
如果终端设备触发BSR#6之后,但是还没有接收到网络设备发送的上行授权之前,确认730中的第一传输块已经传输成功,则终端设备取消触发BSR#6,从而不会将第二部分数据包通过该下一次的无线资源传输给网络设备。
或者如果终端设备在进行下一个无线资源传输之前,确认730中的第一传输块已经传输成功,则不会将第二部分数据包通过该下一次的无线资源传输给网络设备。
作为一个具体的例子,终端设备的缓存中有4个待发送数据包,分别为数据包7,8,9,10,当终端设备确定将这4个数据包通过一个传输块传输时,可能发生死锁。此时,终端设备可以仍然将这4个数据包放入传输块中,但是终端设备认为数据包10还没有传输出去。在终端设备发送该传输块之后,终端设备可以触发BSR,用来指示自己还有一个30bytes的数据包待传,以请求下一次的无线资源。如果终端设备确认该传输块传输成功,则终端设备可以取消触发BSR。
当下一次分配到无线资源时,如果该传输块还没有确认传输成功,终端设备仍然会将数据包10通过下一次的无线资源传输给网络设备。如果下一次分配到无线资源时,终端设备已经确认该数据包传输成功,则终端设备可以不将数据包10通过该下一次无线资源 传输。
因此,本申请实施例中,当终端设备确定如果将多个数据包通过一个传输块传输时,可能发生死锁,则终端设备可以将这些数据包分两次,或多于两次传输,从而减少一次将这些数据包都传完的概率,以减少连续的丢包的可能性。
上述主要从不同设备之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,网络设备和终端设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。结合本申请中所公开的实施例描述的各示例的单元及算法步骤,本申请实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。本领域技术人员可以对每个特定的应用来使用不同的方法来实现所描述的功能,但是这种实现不应认为超出本申请实施例的技术方案的范围。
本申请实施例可以根据上述方法示例对网络设备和终端设备等进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用集成的单元的情况下,图8示出了本申请实施例中所涉及的一种通信装置的一种可能的示例性框图,该装置800可以以软件、硬件或软硬结合的形式存在。图8示出了本申请实施例中所涉及的装置的一种可能的示意性框图。装置800包括:处理单元802和通信单元803。处理单元802用于对装置的动作进行控制管理。通信单元803用于支持装置与其他设备的通信。装置还可以包括存储单元801,用于存储装置的程序代码和数据。
图8所示的装置800可以是本申请实施例所涉及的网络设备。
当图8所示的装置800为网络设备时,处理单元802能够支持装置800执行上述各方法示例中由网络设备完成的动作,例如,处理单元802支持装置800执行处理第一信息、生成上行授权以及处理传输块的动作,和/或用于本文所描述的技术的其它过程。通信单元803能够支持装置800与终端设备等之间的通信,例如,通信单元803支持装置800执行图1中的步骤110、120和130,图2中的步骤201至206,图4中的401至405,图7中的710至760,和/或其他相关的通信过程。
示例性地,处理单元802可以是处理器或控制器,例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC),现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,单元和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信单元803可以是通信接口,该通信接口是统称,在具体实现中,该通信接口可以包括一个或多个接口。存储单元801可以是存储器。
当处理单元802为处理器,通信单元803为通信接口,存储单元801为存储器时,本申请实施例所涉及的装置800可以为图9所示的通信装置900。
参阅图9所示,该装置900包括:处理器902和通信接口903。进一步地,该装置900 还可以包括存储器901。可选的,装置900还可以包括总线904。其中,通信接口903、处理器902以及存储器901可以通过总线904相互连接;总线904可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。所述总线904可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
其中,处理器902可以通过运行或执行存储在存储器901内的程序,执行所述装置900的各种功能。
示例性地,图9所示的通信装置900可以是本申请实施例所涉及的网络设备。
当装置900为网络设备时,处理器902可以通过运行或执行存储在存储器901内的程序,执行上述各方法示例中由网络设备完成的动作。
在采用集成的单元的情况下,图10示出了本申请实施例中所涉及的另一种装置的一种可能的示例性框图,该装置1000可以以软件、硬件或软硬结合的形式存在。图10示出了本申请实施例中所涉及的装置的一种可能的示意性框图。装置1000包括:处理单元1002和通信单元1003。处理单元1002用于对装置的动作进行控制管理。通信单元1003用于支持装置与其他设备的通信。装置还可以包括存储单元1001,用于存储装置的程序代码和数据。
图10所示的通信装置1000可以是终端设备,也可以为应用于终端设备的芯片。处理单元1002能够支持装置1000执行上述各方法示例中由终端设备完成的动作,例如,生成第一信息、生成传输块的动作,和/或用于本文所描述的技术的其它过程。通信单元1003能够支持装置1000与网络设备等之间的通信,例如,通信单元1003支持装置1000执行图1中的步骤110、120和130,图2中的步骤201至206,图4中的401至405,图7中的710至760,和/或其他相关的通信过程。
示例性地,处理单元1002可以是处理器或控制器,例如可以是CPU,通用处理器,DSP,ASIC,FPGA或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,单元和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信单元1003可以是通信接口,该通信接口是统称,在具体实现中,该通信接口可以包括一个或多个接口。存储单元1001可以是存储器。
当处理单元1002为处理器,通信单元1003为收发器,存储单元1001为存储器时,本申请实施例所涉及的装置1000可以为图11所示的终端设备。
图11示出了本申请实施例中所涉及的终端设备的一种可能的设计结构的简化示意图。所述终端设备1100包括发射器1101,接收器1102和处理器1103。其中,处理器1103也可以为控制器,图11中表示为“控制器/处理器1103”。可选的,所述终端设备1100还可以包括调制解调处理器1105,其中,调制解调处理器1105可以包括编码器1106、调制器1107、解码器1108和解调器1109。
在一个示例中,发射器1101调节(例如,模拟转换、滤波、放大和上变频等)该输出采样并生成上行链路信号,该上行链路信号经由天线发射给上述实施例中所述的网络设备。在下行链路上,天线接收上述实施例中基站发射的下行链路信号。接收器1102调节(例如, 滤波、放大、下变频以及数字化等)从天线接收的信号并提供输入采样。在调制解调处理器805中,编码器806接收要在上行链路上发送的业务数据和信令消息,并对业务数据和信令消息进行处理(例如,格式化、编码和交织)。调制器1107进一步处理(例如,符号映射和调制)编码后的业务数据和信令消息并提供输出采样。解调器1109处理(例如,解调)该输入采样并提供符号估计。解码器1108处理(例如,解交织和解码)该符号估计并提供发送给终端设备1100的已解码的数据和信令消息。编码器1106、调制器1107、解调器1109和解码器1108可以由合成的调制解调处理器1105来实现。这些单元根据无线接入网采用的无线接入技术(例如,LTE、5G及其他演进系统的接入技术)来进行处理。需要说明的是,当终端设备1100不包括调制解调处理器1105时,调制解调处理器1105的上述功能也可以由处理器1103完成。
处理器1103对终端设备100的动作进行控制管理,用于执行上述本申请实施例中由终端设备1100进行的处理过程。例如,处理器1103还用于执行1、图2、图4和图7所示方法中涉及终端设备的处理过程和/或本申请所描述的技术方案的其他过程。
进一步的,终端设备1100还可以包括存储器1104,存储器1104用于存储用于端设备1100的程序代码和数据。
结合本申请实施例公开内容所描述的方法或者算法的步骤可以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器(Random Access Memory,RAM)、闪存、只读存储器(Read Only Memory,ROM)、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、电可擦可编程只读存储器(Electrically EPROM,EEPROM)、寄存器、硬盘、移动硬盘、只读光盘(CD-ROM)或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于集中式单元的控制面实体、集中式单元的用户面实体、终端设备或统一数据存储网元中。当然,处理器和存储介质也可以作为分立组件存在于集中式单元的控制面实体、集中式单元的用户面实体、终端设备或统一数据存储网元中。
本申请实施例还提供了一种计算机可读存储介质,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述方法实施例提供的方法。
本申请实施例还提供了一种包含指令的计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行上述方法实施例提供的方法。
本申请实施例还提供了一种芯片,该芯片可应用于通信装置,该芯片包括至少一个处理器,当该至少一个处理器执行指令时,使得该芯片或该通信装置执行上述方法实施例提供的方法,该芯片还可以包括存储器,该存储器可用于存储涉及的指令。
应理解,本发明实施例中提及的处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
还应理解,本文中涉及的第一、第二以及各种数字编号仅为描述方便进行的区分,并不用来限制本申请的范围。
在本申请实施例中,终端设备或网络设备包括硬件层、运行在硬件层之上的操作系统层,以及运行在操作系统层上的应用层。该硬件层包括中央处理器(central processing unit,CPU)、内存管理单元(memory management unit,MMU)和内存(也称为主存)等硬件。该操作系统可以是任意一种或多种通过进程(process)实现业务处理的计算机操作系统,例如,Linux操作系统、Unix操作系统、Android操作系统、iOS操作系统或windows操作系统等。该应用层包含浏览器、通讯录、文字处理软件、即时通信软件等应用。并且,本申请实施例并未对本申请实施例提供的方法的执行主体的具体结构特别限定,只要能够通过运行记录有本申请实施例的提供的方法的代码的程序,以根据本申请实施例提供的方法进行通信即可,例如,本申请实施例提供的方法的执行主体可以是终端设备或网络设备,或者,是终端设备或网络设备中能够调用程序并执行程序的功能模块。
另外,本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制品。本申请中使用的术语“制品”涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。例如,计算机可读介质可以包括,但不限于:磁存储器件(例如,硬盘、软盘或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。另外,本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可包括但不限于,无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (21)

  1. 一种数据传输的方法,其特征在于,包括:
    终端设备向网络设备发送第一信息,所述第一信息用于指示所述终端设备的待发送数据包需要至少两个上行授权,或用于确定所述终端设备的待发送数据包需要至少两个上行授权;
    所述终端设备从所述网络设备接收所述至少两个上行授权;
    所述终端设备将所述待发送数据包组成至少两个传输块,并分别通过所述至少两个上行授权所述指示的上行资源发送给所述网络设备。
  2. 根据权利要求1所述的方法,其特征在于,所述终端设备向网络设备发送第一信息,包括:
    所述终端设备向所述网络设备发送至少两个缓存状态报告BSR,所述每个BSR用于指示所述BSR对应的待发送数据包的数据量。
  3. 根据权利要求1所述的方法,其特征在于,终端设备向网络设备发送第一信息,包括:
    所述终端设备向所述网络设备发送第一指示信息,所述第一指示信息用于指示所述待发送数据包的数量,所述待发送数据包的数量用于确定所述终端设备对待发送数据包需要至少两个上行授权。
  4. 根据权利要求3所述的方法,其特征在于,所述第一指示信息携带MAC CE中。
  5. 根据权利要求3所述的方法,其特征在于,所述第一指示信息携带在BSR中。
  6. 根据权利要求1所述的方法,其特征在于,所述终端设备向网络设备发送第一信息,包括:
    所述终端设备向所述网络设备发送MAC CE,所述MAC CE中包括两个内容相同的BSR。
  7. 根据权利要求1所述的方法,其特征在于,所述终端设备向网络设备发送第一信息,包括:
    所述终端设备确定阈值,所述阈值表示上行资源传输的数据量的上限;
    当所述终端设备需要至少两个上行授权时,所述终端设备向所述网络设备发送第二指示信息,所述第二指示信息用于指示所述待发送数据包的数据量大于或等于所述阈值。
  8. 一种数据传输的方法,其特征在于,包括:
    网络设备从终端设备接收第一信息,所述第一信息用于指示所述终端设备的待发送数据包需要至少两个上行授权,或用于确定所述终端设备的待发送数据包需要至少两个上行授权;
    所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权;
    所述网络设备通过所述至少两个上行授权所指示的上行资源接收所述终端设备发送的至少两个传输块。
  9. 根据权利8所述的方法,其特征在于,所述网络设备从终端设备接收第一信息,包括:
    所述网络设备从所述终端设备接收至少两个缓存状态报告BSR,所述每个BSR用于指示所述BSR对应的待发送数据包的数据量;
    其中,所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权,包括:
    所述网络设备根据所述至少两个BSR,向所述终端设备发送所述至少两个上行授权。
  10. 根据权利要求8所述的方法,其特征在于,所述网络设备从终端设备接收第一信息,包括:
    所述网络设备从所述终端设备接收指示信息,所述指示信息用于指示所述待发送数据包的数量;
    其中,所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权,包括:
    所述网络设备根据所述待发送数据包的数量,向所述终端设备发送所述至少两个上行授权。
  11. 根据权利要求10所述的方法,其特征在于,所述指示信息携带在MAC CE中。
  12. 根据权利要求10或11所述的方法,其特征在于,所述网络设备根据所述待发送数据包的数量,向所述终端设备发送所述至少两个上行授权,包括:
    所述网络设备根据所述待发送数据包的数量和所述待发送数据的数据图样,确定所述至少两个上行授权,其中,所述数据图样用于指示待发送数据的传输策略。
  13. 根据权利要求8所述的方法,其特征在于,所述网络设备从终端设备接收第一信息,包括:
    所述网络设备从所述终端设备接收MAC CE,所述MAC CE中包括两个内容相同的BSR;
    其中,所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权,包括:
    所述网络设备根据所述MAC CE中的至少两个内容相同的BSR,向所述终端设备发送所述至少两个上行授权。
  14. 根据权利要求8所述的方法,其特征在于,所述网络设备从所述终端设备接收第一信息,包括:
    所述网络设备确定阈值,所述阈值表示上行资源传输的数据量的上限;
    所述网络设备从所述终端设备接收第二指示信息,所述第二指示信息用于指示所述待发送数据包的数量大于或等于所述阈值;
    其中,所述网络设备根据所述第一信息,向所述终端设备发送所述至少两个上行授权,包括:
    所述网络设备根据所述第二指示信息,向所述终端设备发送所述至少两个上行授权。
  15. 一种数据传输的装置,其特征在于,包括用于执行如权利要求1至7任一项所述的方法的单元。
  16. 一种数据传输的装置,其特征在于,所述装置包括处理器,用于连接存储器,并执行所述存储器中的指令以实现如权利要求1至7任一项所述的方法。
  17. 一种数据传输的装置,其特征在于,包括用于执行如权利要求8至14任一项所 述的方法的单元。
  18. 一种数据传输的装置,其特征在于,所述装置包括处理器,用于连接存储器,并执行所述存储器中的指令以实现如权利要求8至14任一项所述的方法。
  19. 一种终端设备,包括如权利要求15或16所述的装置。
  20. 一种计算机可读存储介质,其特征在于,包括指令,当其在计算机上运行时,使得计算机执行如权利要求1至14中任一项所述的方法。
  21. 一种通信芯片,其特征在于,所述通信芯片包括处理器,当所述通信芯片在通信装置上运行时,用于读取所述通信装置存储器中的指令,使得所述通信芯片执行如权利要求1至14中任一项所述的方法。
PCT/CN2019/114227 2018-11-02 2019-10-30 传输数据的方法和装置 WO2020088490A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP19880833.9A EP3866538A4 (en) 2018-11-02 2019-10-30 DATA TRANSMISSION PROCESS AND APPARATUS
US17/246,194 US20210259012A1 (en) 2018-11-02 2021-04-30 Data transmission method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811303641.9 2018-11-02
CN201811303641.9A CN111148234A (zh) 2018-11-02 2018-11-02 传输数据的方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/246,194 Continuation US20210259012A1 (en) 2018-11-02 2021-04-30 Data transmission method and apparatus

Publications (1)

Publication Number Publication Date
WO2020088490A1 true WO2020088490A1 (zh) 2020-05-07

Family

ID=70464337

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/114227 WO2020088490A1 (zh) 2018-11-02 2019-10-30 传输数据的方法和装置

Country Status (4)

Country Link
US (1) US20210259012A1 (zh)
EP (1) EP3866538A4 (zh)
CN (1) CN111148234A (zh)
WO (1) WO2020088490A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11558923B2 (en) * 2019-09-09 2023-01-17 Qualcomm Incorporated Uplink resource grant release in wireless communication systems
US11849430B2 (en) 2019-09-09 2023-12-19 Qualcomm Incorporated Uplink resource allocation and activation
CN113709804A (zh) * 2020-05-22 2021-11-26 维沃移动通信有限公司 数据传输方法、终端设备和网络设备
US20240064797A1 (en) * 2021-01-15 2024-02-22 Apple Inc. Prioritized Data Transmission
CN115460624A (zh) * 2021-06-08 2022-12-09 大唐移动通信设备有限公司 一种数据传输方法、装置及可读存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102149206A (zh) * 2010-02-09 2011-08-10 中兴通讯股份有限公司 上行调度方法
CN102158932A (zh) * 2010-02-12 2011-08-17 中兴通讯股份有限公司 一种基于竞争的上行发送方法和系统
EP2838297A1 (en) * 2013-08-15 2015-02-18 General Dynamics C4 Systems, Inc. Apparatus and methods for semi-persistent scheduling
CN108292987A (zh) * 2015-12-14 2018-07-17 苹果公司 Volte中基于rohc的链路估计和功率节省
CN108633088A (zh) * 2017-03-24 2018-10-09 华为技术有限公司 资源调度的方法和装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1338125A2 (en) * 2000-11-03 2003-08-27 AT & T Corp. Tiered contention multiple access (tcma): a method for priority-based shared channel access
CN102970761A (zh) * 2011-09-01 2013-03-13 华为技术有限公司 数据发送方法和用户设备
EP3244680B1 (en) * 2015-01-29 2019-12-04 Huawei Technologies Co., Ltd. Data transmission method and device
EP3125643B1 (en) * 2015-07-31 2019-04-03 Panasonic Intellectual Property Corporation of America Improved scheduling mechanism for prose relays serving remote ues
CN107113819B (zh) * 2015-10-21 2020-09-04 华为技术有限公司 一种通信设备、网络设备及设备到设备数据传输方法
US20170212865A1 (en) * 2016-01-26 2017-07-27 Qualcomm Incorporated Methods and apparatus for improving buffer size setting for one or more buffer status reports
US10827529B2 (en) * 2016-06-24 2020-11-03 Qualcomm Incorporated Random access collision reduction based on multiple uplink grants
JP2020031260A (ja) * 2016-12-28 2020-02-27 シャープ株式会社 基地局装置、端末装置およびその通信方法
CN109309923A (zh) * 2017-07-26 2019-02-05 索尼公司 电子装置、信息处理设备和信息处理方法
JP2021530150A (ja) * 2018-06-28 2021-11-04 コンヴィーダ ワイヤレス, エルエルシー 新無線車両サイドリンク共有チャネルデータ送信のためのサイドリンクバッファステータスレポートおよびスケジューリング要求

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102149206A (zh) * 2010-02-09 2011-08-10 中兴通讯股份有限公司 上行调度方法
CN102158932A (zh) * 2010-02-12 2011-08-17 中兴通讯股份有限公司 一种基于竞争的上行发送方法和系统
EP2838297A1 (en) * 2013-08-15 2015-02-18 General Dynamics C4 Systems, Inc. Apparatus and methods for semi-persistent scheduling
CN108292987A (zh) * 2015-12-14 2018-07-17 苹果公司 Volte中基于rohc的链路估计和功率节省
CN108633088A (zh) * 2017-03-24 2018-10-09 华为技术有限公司 资源调度的方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3866538A4

Also Published As

Publication number Publication date
EP3866538A1 (en) 2021-08-18
EP3866538A4 (en) 2021-12-22
US20210259012A1 (en) 2021-08-19
CN111148234A (zh) 2020-05-12

Similar Documents

Publication Publication Date Title
WO2020088490A1 (zh) 传输数据的方法和装置
US20210219323A1 (en) Method and Apparatus in a Wireless Communications System
US20200374888A1 (en) Data Sending Method And Communications Device
US10912110B2 (en) Systems and methods for an enhanced scheduling request for 5G NR
CN111327392B (zh) 一种数据传输方法及装置
WO2020143428A1 (zh) 传输上行信息的方法和通信装置
WO2020200078A1 (zh) 传输上行信息的方法和通信装置
TW201203949A (en) A method of handling buffer status reporting and a communication device for use in a wireless communication system
EP3780442A1 (en) Transmission method, terminal device and network device for csi report
CN110139383B (zh) 数据传输方法和设备
WO2021012996A1 (zh) 信息传输方法及装置
CN118075813A (zh) 协议数据单元生成方法、配置方法、装置及电子设备
CN111148225B (zh) 资源调度方法、装置及设备
CN114451017A (zh) 一种激活和释放非动态调度传输的方法及装置
CN112153672B (zh) 一种资源配置方法及装置
CN112217618B (zh) 信息传输方法及装置
WO2019153250A1 (zh) 传输信息的方法和终端设备
WO2018141309A1 (zh) 一种信号发送方法、相关设备及系统
WO2023051290A1 (zh) 激活方法、装置、终端和存储介质
WO2021169517A1 (zh) 通信方法及装置
WO2020061966A1 (zh) 数据传输的方法和装置
WO2024140114A1 (zh) 一种确定harq进程号的方法及相关装置
WO2024097082A1 (en) Buffer size optimization in xr
TW202329730A (zh) 通信裝置及通信方法
CN117063589A (zh) 终端、基站及通信方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19880833

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019880833

Country of ref document: EP

Effective date: 20210512