WO2020135850A1 - Procédé et appareil de communication - Google Patents

Procédé et appareil de communication Download PDF

Info

Publication number
WO2020135850A1
WO2020135850A1 PCT/CN2019/129730 CN2019129730W WO2020135850A1 WO 2020135850 A1 WO2020135850 A1 WO 2020135850A1 CN 2019129730 W CN2019129730 W CN 2019129730W WO 2020135850 A1 WO2020135850 A1 WO 2020135850A1
Authority
WO
WIPO (PCT)
Prior art keywords
access network
message
network device
terminal device
information
Prior art date
Application number
PCT/CN2019/129730
Other languages
English (en)
Chinese (zh)
Inventor
耿婷婷
严乐
张宏平
曾清海
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020135850A1 publication Critical patent/WO2020135850A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/10Scheduling measurement reports ; Arrangements for measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0016Hand-off preparation specially adapted for end-to-end data sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Definitions

  • the present application relates to the field of communication technology, and in particular, to a communication method and device that can realize fast switching.
  • the serving base station when it cannot provide the services or network services required by the terminal device, it can send a radio resource control (RRC) release without security protection (release) ) Message, for example, the RRC release message may be carried on a signaling radio bearer (signaling radio bearer, SRB) 0.
  • RRC release message After receiving the RRC release message, the terminal device will release the RRC connection with the serving base station, and the terminal device may choose to continue to camp on the cell under the serving base station or reselect to another new cell.
  • the terminal device access network delay will increase .
  • the communication method provided by the embodiment of the present application can reduce the delay of the terminal device accessing the network.
  • a communication method including: a first access network device sends a first message to a second access network device, the first message includes identification information of a terminal device, and the terminal device initiates a wireless resource The reason for controlling the establishment of the RRC connection and the identification information of the public land mobile network PLMN selected by the terminal device; the first access network device receives a response message (first response message) of the first message from the second access network device.
  • This communication method can, for example, send the first message to the second access network device through the first access network device when the first access network device cannot provide the service service required by the UE, so that the UE can be selected as soon as possible Appropriate service access network equipment can reduce the delay of terminal equipment accessing the network.
  • the first access network device may determine the target access network device (second access network device) according to the measurement report and service information sent by the terminal device.
  • the measurement report may be a measurement report
  • the service information may include registered target core network node identification information and/or single network slice selection support information list. Therefore, the first access network device can determine the target access network device when it cannot support the requirements of the terminal device, thereby shortening the time delay for the terminal device to access the network.
  • the response message of the first message sent by the second access network device to the first access network device may include the content of the security mode command message and the content of the RRC reconfiguration message, Therefore, when the second access network device allows the terminal device to access, the content of the security mode command message can be sent through the first access network device before the terminal device directly sends an access request to the second access network device The content of the RRC reconfiguration message is transferred to shorten the delay of the terminal device accessing the network.
  • the content of the RRC reconfiguration message is security protection based on the initial key and the security algorithm, where the security protection includes integrity protection, or includes integrity protection and encryption protection.
  • the security protection includes integrity protection, or includes integrity protection and encryption protection.
  • the content of the foregoing RRC reconfiguration message is security protection according to a first key and a security algorithm, where the first key is based on the initial key and source from the core network
  • the information of the cell determines that the source cell belongs to the first access network device.
  • the response message of the first message received by the first access network device may further include information of the first key.
  • the content of the RRC reconfiguration message is protected to ensure the authenticity and privacy of the message.
  • the first key information includes first key indication information or first key, so that the first access network device can pass the first key information to the terminal device, The terminal device can use the correct key for security protection.
  • the terminal device when the terminal device sends a response message of the security mode command message to the first access network device, the first access network device receives the security mode command from the terminal device
  • the response message (second response message) of the message makes the first access network device know that the terminal device has activated the security mode or the activation of the security mode has failed.
  • the first access network device in a case where the second access network device configures the terminal device to send the second response message to the second access network device, the first access network device The access network device receives second indication information, and the second indication information indicates that the first access network device does not receive the response message of the security mode command message, so that when the terminal device sends the second In the second response, the energy consumption caused by the first access network device receiving the corresponding message of the security mode command message caused by the inconsistent operation of the terminal device and the first access network device is avoided.
  • the measurement report is an advance measurement report.
  • the advance measurement report may be carried in a message 3 or message 5, for example.
  • the advance of the terminal device to be sent can be determined based on the information of the random access preamble sent by the terminal device Measurement report, and send uplink authorization resource information for transmitting advance measurement report to the terminal equipment through message2.
  • the terminal device can quickly report the measurement report, so that the serving base station can perform mobility-related configuration faster, and improve the data transmission experience of the terminal device. It should be noted that this implementation may be implemented independently of other implementations of the first aspect.
  • a communication method including: a second access network device receives a first message from a first access network device, and the second access network device sends a first message to the first access network device A response message (first response message), wherein the first message includes identification information of the terminal device, the reason why the terminal device initiates the establishment of a radio resource control RRC connection, and the public land mobile network PLMN selected by the terminal device Identification information.
  • the first response message may include the content of the security mode command message and the content of the RRC reconfiguration message, so that the second access network device can allow the terminal device to access
  • the content of the security mode command message and the content of the RRC reconfiguration message are transferred in advance to shorten the time delay for the terminal device to access the network.
  • the content of the RRC reconfiguration message is security protection based on the initial key and the security algorithm, where the security protection includes integrity protection, or includes integrity protection and encryption protection.
  • the security protection includes integrity protection, or includes integrity protection and encryption protection.
  • the content of the foregoing RRC reconfiguration message is security protection according to the first key and the security algorithm, where the first key is based on the initial key and source from the core network
  • the information of the cell determines that the source cell belongs to the first access network device.
  • the response message of the first message received by the first access network device may further include information of the first key.
  • the information of the first key includes first key indication information or the first key, so that the first access network device can use the information of the first key Passed to the terminal equipment, so that the terminal equipment can use the correct key for security protection.
  • the second access network device when the second access network device configures the terminal device to send the second response message to the second access network device, the second access network device sends The access network device sends second indication information, and the second indication information indicates that the first access network device does not receive the second response message, so that when the terminal device sends the second response to the second access network device , To avoid energy consumption caused by the first access network device receiving the corresponding message of the security mode command message caused by the inconsistent operation of the terminal device and the first access network device.
  • the second access network device receives the second response message from the terminal device, so that the second access network device learns that the terminal device activates the security mode or the security mode activation fails.
  • the second access network device receives a third response message from the terminal device, such as an RRC reconfiguration completion message or a handover completion message, indicating that the RRC reconfiguration is completed, and can be switched to the second access Network access equipment.
  • a third response message such as an RRC reconfiguration completion message or a handover completion message, indicating that the RRC reconfiguration is completed
  • the third response message may be securely protected according to the initial key, or may be securely protected according to the second key.
  • the second key is determined (derived) based on the initial key and the information of the target cell; assuming that the content of the RRC reconfiguration message is secured according to the first key, then the third response message may be based on the third key
  • the key is used for security protection, and may also be used for security protection according to the second key described above, and the third key is determined (derived) based on the first key and the information of the target cell.
  • the information of the target cell may include, for example, at least one of physical cell identity (PCI) of the target cell and frequency information of the target cell.
  • PCI physical cell identity
  • a communication method including: a communication apparatus receives a security mode command message from a first access network device, wherein the content of the security mode command message and the security mode message determined by the second access network device Content is consistent, the security mode command message includes the information of the first key, the first key is determined based on the initial key determined by the core network, the source cell information, where the source cell belongs to all The first access network device; sending a response message of the security mode command message, wherein the response message of the security mode command is securely protected according to the first key.
  • the information of the first key includes first key indication information or a first key, and the first key indication information is used to indicate that according to the initial key 1.
  • the information of the source cell determines the first key.
  • the communication apparatus sends a second message indicating that radio resource control RRC reconfiguration is completed to the second access network device, where the second message is based on the second password
  • the key is used for security protection, and the second key is determined according to the first key, the identifier of the target cell, and the frequency of the target cell, and the target cell belongs to the second access network device.
  • the communication apparatus receives first indication information from the first access network device, where the first indication information is used to indicate to the second access network device Sending a response message (second response message) of the security mode command message.
  • the communication apparatus may be a response message that sends the security mode command message to the first access network device.
  • the communication apparatus sends an advance measurement report to the first access network device, where the advance measurement report may be carried in, for example, radio resource control RRC establishment in a random access process Request (message 3) or RRC establishment complete message (message 5).
  • RRC establishment in a random access process Request (message 3) or RRC establishment complete message (message 5).
  • the communication device uses a random access preamble (message 1) to connect to the first
  • the network access device indicates the advance measurement report to be sent; and receives a random access response (message 2) from the first access network device, so as to obtain uplink authorized resource information for sending the advance measurement report.
  • messages 1 a random access preamble
  • the network access device indicates the advance measurement report to be sent; and receives a random access response (message 2) from the first access network device, so as to obtain uplink authorized resource information for sending the advance measurement report.
  • the communication apparatus indicates to the first access network device that the advance measurement report does not send complete information, so that the first access network device can learn the advance measurement report Whether the transmission is completed in order to make corresponding processing.
  • a communication method including: a first node sends a message to a core network node for transmitting non-access layer signaling of a terminal device to the core network node, and the first node receives a response from the core network node Message, after the RRC reconfiguration of the terminal device is completed, a message including an initial context establishment response, a session resource identifier, and address information for transmitting downlink data of the session resource is sent to the core network node.
  • a communication method including: receiving a message for transmitting non-access layer signaling of a terminal device to a core network node from a first node, sending a response message to the first node, and sending After the RRC reconfiguration is completed, a message including an initial context establishment response, a session resource identifier, and address information for transmitting downlink data of the session resource is received from the first node.
  • a communication device for implementing the method of the first aspect.
  • the communication device may be the first access network device in the above-mentioned first aspect, or an apparatus including the above first access network device, or a component (chip or circuit) configured in the first access network device.
  • a communication device for implementing the method of the second aspect.
  • the communication device may be the second access network device in the second aspect above, or an apparatus including the above second access network device, or a component (chip or circuit) configured in the second access network device.
  • a communication device for implementing the method of the third aspect.
  • the communication device may be a terminal device, or an apparatus including the above terminal device, or a component (chip or circuit) configured in the second access network device.
  • a communication device for implementing the method of the fourth aspect.
  • the communication device may be a first node (access network device), or a device including the above-mentioned first node, or a component (chip or circuit) disposed in the first node.
  • a communication device for implementing the method of the fifth aspect.
  • the communication device may be a core network node or a device including the above core network node, or a component (chip or circuit) disposed in the core network node.
  • the communication device includes a module, unit, or means corresponding to the above method.
  • the module, unit, or means can be implemented by hardware, software, or execute the corresponding software by hardware achieve.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • a communication device including: a processor and a memory; the memory is used to store computer instructions, and when the processor executes the instructions, so that the communication device performs the method described in any one of the above aspects .
  • a communication device including: a processor; the processor is configured to couple with a memory and read an instruction in the memory, and then execute the method according to any one of the above aspects according to the instruction.
  • a computer-readable storage medium stores instructions, which when executed on a computer, enables the computer to perform the method described in any one of the above aspects.
  • a computer program product containing instructions, which when executed, enables a communication device to perform the method described in any of the above aspects.
  • a communication device for example, the communication device may be a chip or a chip system
  • the communication device includes a processor for implementing the method involved in any of the above aspects.
  • the communication device further includes a memory for storing necessary program instructions and data.
  • the communication device is a chip system, it may be composed of a chip, or may include a chip and other discrete devices.
  • a communication system including the communication device according to the sixth aspect and the communication device according to the seventh aspect, or including the communication device according to the sixth to eighth aspects, or including the The communication device described in the ninth and tenth aspects.
  • FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of this application.
  • FIG. 2 is a schematic structural diagram of an access network device and a terminal device provided by an embodiment of this application;
  • FIG. 3 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another communication method provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of yet another communication method provided by an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of another communication method according to an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of yet another communication method provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • At least one of the following or a similar expression refers to any combination of these items, including any combination of a single item or a plurality of items.
  • at least one item (a) in a, b, or c can represent: a, b, c, ab, ac, bc, or abc, where a, b, c can be a single or multiple .
  • the words “first” and “second” are used to distinguish the same or similar items whose functions and functions are basically the same. Those skilled in the art may understand that the words “first” and “second” do not limit the number and execution order, and the words “first” and “second” do not necessarily mean different.
  • the network architecture and business scenarios described in the embodiments of the present application are intended to more clearly explain the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application.
  • the technical solutions provided by the embodiments of the present application are also applicable to similar technical problems.
  • the communication system 10 includes access network devices 20 and 40, and one or more terminal devices 30 connected to the access network devices 20 and 40. Take the access network device 20 shown in FIG. 1 interacting with the access network device 40 and interacting with any terminal device 30 as an example.
  • the access network device 20 sends a first message to the access network device 40, where the first message includes the identification information of the terminal device 30, the reason why the terminal device 30 initiates the RRC establishment, and the public land selected by the terminal device 30
  • the identification information of the mobile network and after receiving the first message, the access network device 40 sends a corresponding response message to the access network device 20.
  • the first message may be, for example, an access request message, which is used to initiate an access request to the access network device 40, so that the access network device 40 can determine whether to accept the terminal device 30.
  • the access network device 40 may send a confirmation response message (a type of response message) to the access network device 20.
  • the confirmation response message may carry the content of the security mode command message and the content of the RRC reconfiguration message.
  • the access network device 20 may forward the content of the security mode command message and the content of the RRC reconfiguration message to the terminal device 30, and the terminal device 30 receives the content of the security mode command (SMC) message and the RRC reconfiguration message.
  • SMC security mode command
  • corresponding operations can be performed, such as sending a security mode command completion message to the access network device 20 or 40 and sending an RRC reconfiguration completion message to the access network device 40, which is not limited in the embodiments of the present application .
  • accepting the terminal device is a brief expression method that allows the terminal device to access.
  • the access network device 40 may send a negative response message to the access network device 20, so that the access network device 20 learns that the access network device 40 is not Accepted terminal equipment 30.
  • an access network device 40 is used as an example for description here.
  • the access network device 20 may perform similar interaction with multiple access network devices 40, and different access network devices 40 may send different response messages to the access network device 20.
  • the RRC establishment reason may include, for example, at least one of the following: emergency call, high priority access, passive service, actively triggered signaling service, actively triggered data service, actively triggered voice call, and actively triggered video call , Short message service (SMS, short message service) that is actively triggered, high priority access for multimedia priority services (MPS, Multimedia Priority Service), high priority access for mission-critical services (MCS) Other RRC establishment reasons.
  • SMS Short message service
  • MCS mission-critical services
  • RRC connection establishment may also be referred to as the cause of RRC connection establishment.
  • the terminal device can also have a communication connection with multiple access network devices at the same time and can send and receive data, which can be called multi-connectivity (MC).
  • MC multi-connectivity
  • the multiple access devices there can be one
  • the access device is responsible for exchanging radio resource control messages with the terminal device and for interacting with the core network control plane entity. Then, the access device may be called an MN, and the remaining access devices may be called SN.
  • FIG. 2 it is a schematic diagram of the hardware structure of the access network device 20 and the terminal device 30 provided by the embodiment of the present application.
  • the terminal device 30 includes at least one processor (exemplarily illustrated in FIG. 2 including one processor 301) and at least one transceiver (exemplified illustrated in FIG. 2 including one transceiver 303) ).
  • the terminal device 30 may further include at least one memory (exemplified in FIG. 2 by including a memory 302 as an example), and at least one output device (exemplified in FIG. 2 by including an output device 304 as an example) (For explanation) and at least one input device (in FIG. 2, an example is described by including an input device 305 as an example).
  • the processor 301, the memory 302, and the transceiver 303 are connected by a communication line.
  • the communication line may include any path to transfer information between the above components.
  • the processor 301 may be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrations for controlling the execution of the program program of the present application Circuit.
  • the processor 301 may also include multiple CPUs, and the processor 301 may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • the processor here may refer to one or more devices, circuits, or processing cores for processing data (eg, computer program instructions).
  • the memory 302 may be a device having a storage function.
  • it can be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM), or other types of information and instructions that can be stored.
  • ROM read-only memory
  • RAM random access memory
  • Dynamic storage devices can also be electrically erasable programmable read-only memory (electrically erasable programmable-read-only memory (EEPROM), read-only compact disc (compact disc read-only memory, CD-ROM) or other optical disc storage, optical disc storage ( (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), disk storage media or other magnetic storage devices, or can be used to carry or store the desired program code in the form of instructions or data structures and can be stored by the computer Any other media, but not limited to this.
  • the memory 302 may exist independently and be connected to the processor 301 through a communication line.
  • the memory 302 may also be integrated with the processor 301.
  • the memory 302 is used to store computer execution instructions for executing the solution of the present application, and the processor 301 controls execution.
  • the processor 301 is used to execute computer execution instructions stored in the memory 302, so as to implement the communication method described in the embodiments of the present application.
  • the computer execution instructions in the embodiments of the present application may also be called application program codes or computer program codes, which are not specifically limited in the embodiments of the present application.
  • the transceiver 303 may use any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, wireless access network (RAN), or wireless local area networks (WLAN) Wait.
  • the transceiver 303 includes a transmitter Tx and a receiver Rx.
  • the transceiver 303 may also be an interface circuit.
  • the output device 304 communicates with the processor 301 and can display information in various ways.
  • the output device 304 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
  • LCD liquid crystal display
  • LED light emitting diode
  • CRT cathode ray tube
  • the input device 305 communicates with the processor 301 and can accept user input in a variety of ways.
  • the input device 305 may be a mouse, a keyboard, a touch screen device, or a sensing device.
  • the access network device 20 includes at least one processor (exemplarily illustrated in FIG. 2 including one processor 201), and at least one transceiver (exemplified illustrated in FIG. 2 including one transceiver 203) ) And at least one network interface (exemplarily illustrated in FIG. 2 by including one network interface 204).
  • the access network device 20 may further include at least one memory (the example in FIG. 2 includes a memory 202 as an example).
  • the processor 201, the memory 202, the transceiver 203 and the network interface 204 are connected through a communication line.
  • the network interface 204 is used to connect to the core network device through a link (such as an S1 interface), or connect to the network interface of other access network devices through a wired or wireless link (such as an X2 interface) (not shown in FIG. 2) This is not specifically limited in the embodiments of the present application.
  • the access network device 20 in the embodiment of the present application is a device that connects the terminal device 30 to a wireless network, and may be an evolutionary base station (evolutional Node) in long term evolution (LTE) B, eNB or eNodeB); or base station in eLTE; or base station in 5th generation (5G) network or public land mobile network (PLMN) in future evolution, broadband network service gateway (broadband network gateway (BNG), aggregation switch or non-3rd generation partnership project (3rd generation partnership project, 3GPP) access equipment, etc.
  • LTE long term evolution
  • PLMN public land mobile network
  • BNG broadband network service gateway
  • aggregation switch or non-3rd generation partnership project (3rd generation partnership project, 3GPP) access equipment etc.
  • the base stations in the embodiments of the present application may include various forms of base stations, such as macro base stations, micro base stations (also called small stations), relay stations, and access points, which are not specifically limited in the embodiments of the present application. .
  • the access network may include a centralized unit (CU) node, or a distributed unit (DU) node, or a RAN device including a CU node and a DU node, or a control plane CU node (CU-CP node), user plane CU node (CU-UP node) and DU node.
  • CU centralized unit
  • DU distributed unit
  • RAN device including a CU node and a DU node
  • CU-CP node control plane CU node
  • CU-UP node user plane CU node
  • DU node DU node
  • the control plane protocol layer structure may include a radio resource control (radio resource control (RRC) layer, a packet data convergence layer protocol (packet data convergence protocol, PDCP) layer, a radio link control (radio link control (RLC) layer, a media access
  • RRC radio resource control
  • PDCP packet data convergence layer protocol
  • RLC radio link control
  • the functions of protocol layer such as media access (MAC) layer and physical layer.
  • the user plane protocol layer structure can include PDCP layer, RLC layer, MAC layer and physical layer protocol layer functions; in one implementation, the PDCP layer can also include a service data adaptation (service data adaptation (SDAP) layer .
  • SDAP service data adaptation
  • RAN equipment may include a centralized unit (CU) and a distributed unit (DU), Multiple DUs can be centrally controlled by a CU.
  • CU centralized unit
  • DU distributed unit
  • the CU and DU can be divided according to the protocol layer of the wireless network.
  • the functions of the PDCP layer and above are set in the CU, and the functions of the protocol layers below the PDCP, such as the RLC layer and the MAC layer, are set in the DU.
  • the CU has functions above the PDCP layer (including PDCP, RRC, and SDAP), and the DU has functions below the PDCP layer (including RLC, MAC, and PHY).
  • This division of the protocol layer is only an example, and it can also be divided at other protocol layers, for example, at the RLC layer, the functions of the RLC layer and above are set in the CU, and the functions of the protocol layers below the RLC layer are set in the DU; Or, in a certain protocol layer, for example, some functions of the RLC layer and the functions of the protocol layer above the RLC layer are set in the CU, and the remaining functions of the RLC layer and the functions of the protocol layer below the RLC layer are set in the DU. In addition, it can also be divided in other ways, for example, according to delay, and the function that the processing time needs to meet the delay requirement is set in the DU, and the function that does not need to meet the delay requirement is set in the CU.
  • the terminal device 30 in the embodiment of the present application may be a device for implementing a wireless communication function, such as a terminal or a chip that can be used in the terminal.
  • the terminal may be a user equipment (user equipment, UE), access terminal, terminal unit, terminal station, mobile station, mobile station, remote station, remote terminal, mobile device, wireless communication in a 5G network or a future evolved PLMN Equipment, terminal agent or terminal device, etc.
  • Access terminals can be cellular phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital processing (personal digital assistant (PDA), wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices or wearable devices, virtual reality (VR) terminal devices, augmented reality (AR) terminal devices, industrial control (industrial wireless terminal in control), wireless terminal in self-driving (self-driving), wireless terminal in remote medical (remote), wireless terminal in smart grid (smart), wireless in transportation safety (transportation safety) Terminals, wireless terminals in smart cities (smart cities), wireless terminals in smart homes (smart homes), etc.
  • the terminal can be mobile or fixed.
  • the access network device 20 and the terminal device 30 shown in FIG. 1 or FIG. 2 may also be referred to as communication devices, which may be a general device or a dedicated device. The example does not specifically limit this.
  • a beam can be understood as a spatial resource, which can refer to a transmission or reception precoding vector with energy transmission directivity.
  • the sending or receiving precoding vector can be identified by index information, which can correspond to the resource identity (ID) of the configured terminal, for example, the index information can correspond to the identity or resource of the configured SSB; also It may correspond to the configured identifier or resource of the CSI-RS; it may also correspond to the configured identifier or resource of the uplink sounding reference signal (SRS).
  • the index information may also be index information displayed or implicitly carried by a signal or channel carried by a beam.
  • the energy transmission directivity may refer to the precoding processing of the signal to be sent by the precoding vector, the signal after the precoding processing has a certain spatial directivity, and the precoding processing after receiving the precoding vector
  • the signal has better received power, such as satisfying the reception demodulation signal-to-noise ratio, etc.; the energy transmission directivity may also mean that the same signal sent from different spatial positions received by the precoding vector has different received power.
  • the same communication device (such as a terminal device or a network device) may have different precoding vectors, and different devices may also have different precoding vectors, that is, corresponding to different beams.
  • one communication device may use one or more of multiple different precoding vectors at the same time, that is, one beam or multiple beams may be formed at the same time.
  • the involved messages 1-message 4 may correspond to the first message to the fourth message in the competitive random access process, and the message may also be abbreviated as MSG .
  • message 1 can also be called message 1
  • message 2 can also be called message 2, and so on.
  • competitive random access may also be implemented through a two-step process, and the messages included in the competitive random access process of the two-step process may be referred to as message (the first message) and message (b) The second message), where message is the same as message 1 and message 3 described above, and message 2 is the same as message 2 and message 4 described above.
  • message 3 when referring to message 3 in the following embodiments of the present application, it may also refer to other messages having the function of message 3, such as message, and when referring to message 4 in the following embodiments of the present application, it may also be Refers to other messages with the function of message4, such as messageb.
  • message 5 the first message sent by the terminal device after the message having the function of message 4 is collectively referred to as message 5.
  • the embodiments of the present application do not describe in detail the function of each message in the process of competitive random access.
  • FIG. 3 it is a communication method provided by an embodiment of the present application.
  • the method includes the following steps:
  • the terminal device sends a measurement report to the first access network device.
  • the terminal device may perform signal quality measurement, obtain a signal quality measurement result, and generate a measurement report according to the signal quality measurement result.
  • the terminal device here may be a terminal device in an idle or inactive state.
  • the inactive state is an RRC state, which may also be called “RRC inactive state” or “inactive state”. Similar to the idle state, in the deactivated state, the terminal device disconnects the RRC connection from the network. But unlike the idle state, in the deactivated state, the terminal device and the access network device save the context of the terminal.
  • an access network device that configures a terminal device to enter a deactivated state and stores context information of the terminal device is generally referred to as a source network device or an anchor network device.
  • the deactivation state please refer to the relevant description in 3GPP TS 38.300.
  • the above measurement report may include identification information of at least one cell, or include identification information of at least one cell and a corresponding signal quality measurement result.
  • the identification information of at least one beam in the at least one cell may also be included, or the identification information of the at least one beam in the at least one cell and the corresponding beam measurement result may also be included.
  • the at least one cell may include a cell where the terminal device is currently located and other cells, where the other cells may include other cells that belong to the first network device and/or other cells that do not belong to the first network device.
  • the number of other cells may be an integer greater than or equal to 0, which is not limited in this embodiment of the present application.
  • the identification information of at least one cell carried in the measurement report may be identification information of a cell whose signal quality satisfies the first preset condition, and the identification information of the at least one beam may be that the beam signal quality satisfies the second preset
  • the conditional beam identification information may also be identification information of all beams belonging to the cell.
  • the first preset condition and the second preset condition may be configured by an access network device, or may be predefined, which is not limited in this embodiment of the present application.
  • the measurement report in the embodiment of the present application may also be called other names such as a signal quality measurement report or a signal quality measurement result.
  • a measurement report may be sent to the first access network device through an RRC establishment request message (for example, message 3) or an RRC establishment completion message (for example, message 5) in the random access process.
  • the first access network device is the access network device where the terminal device is currently located. In a possible manner, the first access network device may also be called a source base station.
  • a measurement report may be sent to the first access network device through message 3 (or message).
  • the first access network device may be an anchor network device or a non-anchor network device.
  • the measurement report sent through message 3 (or message) or message 5 may be referred to as an early measurement report (EMR).
  • EMR early measurement report
  • the measurement report and message 3 (or message) are multiplexed on the same MAC data.
  • the packet is sent, for example, multiplexed in the MAC service data unit (service data unit, SDU), or the measurement report and message 3 (or message) are on different upstream authorized resources before message 4 (or message) b, respectively. send.
  • including message 3 may include, for example, identification information of a terminal device and an RRC establishment cause (establishment cause), where the identification information of the terminal device may be initial user equipment identification information (initial UE-Identity), for example.
  • the initial user equipment identification information may be, for example, S-temporary mobile subscriber identity (S-TMSI) related information.
  • S-TMSI S-temporary mobile subscriber identity
  • message 5 may include identification information of the selected public land mobile network (PLMN). Further, in addition to the selected PLMN identification information, the message 5 can also include the registered target core network node identification information and single network slice selection support information (S-NSSAI) list and other information, This embodiment of the present application does not limit this. In the case where the measurement report is sent through message 5, the measurement report may also be included in message 5.
  • PLMN public land mobile network
  • S-NSSAI single network slice selection support information
  • the terminal device may also send the measurement report to the first access network device at other timings, as long as the first access network device can determine a suitable target access network device (second access network device) ), which is not limited in the embodiments of the present application.
  • the terminal device sends service information to the first access network device.
  • the service information here refers to information used to indicate the service or network requirements of the terminal device.
  • the service information may also be referred to as network information.
  • the foregoing service information may include registered target core network node identification information and/or an S-NSSAI list.
  • the aforementioned core network node may be an access mobility management function (access and mobility management function, AMF).
  • AMF access and mobility management function
  • the above-mentioned core network node may be, for example, a mobility management entity (mobility management entity, MME).
  • S301 and S302 can be executed simultaneously.
  • the measurement report and the service information may be sent to the first access network device through a message (for example, message 5).
  • S301 and S302 may also be executed at different times, that is, the measurement report and the service information may be sent to the first access network device through different messages.
  • the embodiment of the present application does not limit the sequence of S301 and S302.
  • the first access network device may determine the second access network device.
  • the first access network device determines whether it can support or meet the needs of the terminal device according to the service information, thereby determining whether to provide services for the terminal device. If the first access network device determines that the terminal device cannot be served, it may further determine the second access network device according to the measurement report, and execute S304 and subsequent processes. It can be understood that, if the first access network device determines that it can provide services for the terminal device, it is not necessary to perform the subsequent process of the embodiment of the present application, but select a suitable core network for the terminal device according to the service information of the terminal device Nodes and provide business services required by the terminal equipment. Or, if the first access network device cannot determine a suitable second access network device, it may not perform the subsequent process of the embodiment of the present application, but may send a rejection message or a release message to the terminal device to refuse to provide Business services required by the terminal equipment.
  • the first access network device may be further determined based on the configuration information of the wireless network area (radio) area of the terminal device.
  • the second access network device for example, preferentially selects the second access network device that satisfies the conditions in the RNA to provide services to the terminal device.
  • the first access network device cannot support or cannot meet the needs of the terminal device according to the service information:
  • the first access network device determines that the target core network node is congested or the target core network node does not support access by the terminal device, where the target core network node is identified by the registered target core network node identification information The target core network node; and/or,
  • the first access network device determines that the slice is not congested or the slice does not support access by the terminal device, where the slice is one or more slices identified by the S-NSSAI list.
  • the first access network device may select a suitable second access network device according to the measurement report sent in S302, for example, select the access network device whose cell signal quality meets the preset condition as the second access network device.
  • the preset condition here may be, for example, that the cell signal quality is greater than or equal to a preset threshold, which is not limited in this embodiment of the present application.
  • a suitable second access network device is also a second access network device determined by the first access network device. It can be understood that there may be more than one second access network device.
  • S301-S302 are all optional steps, which means that the second access network device can be determined without sending the first message to any one or more second access network devices in the above manner.
  • the process of sending the first message to any one or more second access network devices may also be called blind selection.
  • the first network device may determine that the first message needs to be sent to any one or more second access network devices according to the service information in S302, or may send the first message to any one or more second devices at other timings.
  • the second access network device sends the first message, which is not limited in this embodiment of the present application.
  • the determination of the second access network device based on the service information and the measurement report can enable the first access network device to determine the target access network device when it cannot support the needs of the terminal device, thereby shortening the terminal device access to the network Delay.
  • the following processes are performed between the first access network device and each second access network device.
  • the following takes an example of a second access network device.
  • the second access network device may also be referred to as a target access network device.
  • the first access network device sends a first message to the second access network device.
  • the first message includes at least the identification information of the terminal device, the reason for establishing the radio resource control RRC and the identification information of the public land mobile network PLMN selected by the terminal device.
  • the PLMN identification information selected by the terminal device is provided to the second access network device, so that the second access network device can select the core network node according to the PLMN identification information, and the identification information of the terminal device and the RRC establishment reason can be used for the first 2.
  • the identification information of the terminal device, the reason for establishing the RRC, and the identification information of the public land mobile network PLMN selected by the terminal device can be obtained based on the information sent by the terminal device, for example, based on the message 3 and message 5 sent by the terminal device.
  • the first message may further include one or more of the following information: registered core network identification information, globally unique core network identification type (guami-type, Globally Unique AMF, Identifier type), and S-NSSAI list 3.
  • registered core network identification information globally unique core network identification type (guami-type, Globally Unique AMF, Identifier type)
  • S-NSSAI list 3 S-NSSAI list 3.
  • Dedicated NAS messages The above information may also be obtained by the first access network device from a message (such as message 5) sent by the terminal device.
  • the first message may include part or all of the content included in the message 3 (or message) and message 5 sent by the terminal device to the first access network device.
  • the identification information of the terminal device may be terminal identification information of a non-access layer, such as a temporary mobile subscriber identity (temporary mobile identity (TMSI) or 5G-TMSI).
  • a temporary mobile subscriber identity temporary mobile identity (temporary mobile identity (TMSI) or 5G-TMSI).
  • the identification information of the terminal device may be a deactivated wireless network temporary identifier (inactive radio network temporary identity, I-RNTI).
  • I-RNTI active radio network temporary identity
  • the second access network device sends a response message of the first message to the first access network device.
  • the first access network device receives the response message of the first message from the second access network device.
  • This response message may also be referred to as a first response message.
  • the second access network device may determine whether to allow the terminal device to access according to factors such as network load conditions or base station functions, etc., so as to send a corresponding first response to the first access network device news. It should be noted that the embodiment of the present application does not limit how the second access network device determines whether to allow the terminal device to access.
  • a confirmation response message (an example of the first response message) may be sent to the first access network device.
  • the confirmation response message may include the content of the security mode command message and the content of the RRC reconfiguration message. Understandably, the content of the security mode command message and the content of the RRC reconfiguration message may be included in the same confirmation response message, or may be included in different confirmation response messages.
  • the RRC reconfiguration message may also be called a handover message, and the name of the message is not limited in this embodiment of the present application.
  • the content of the security mode command message is used to activate the access layer security of the terminal device, and the content of the RRC reconfiguration message is used to switch the terminal device to the target cell. Understandably, the target cell belongs to the second access network device Of the community.
  • the content of the security mode command message may also be called security mode command information
  • the content of the RRC reconfiguration message may also be called RRC reconfiguration information.
  • the content of the security mode command message and the content of the RRC reconfiguration message are passed through the first access network device, thereby reducing the delay of the terminal device accessing the network .
  • the content of the security mode command message and the content of the RRC reconfiguration message can also be sent to the first access network device through different messages, respectively.
  • the content of the security mode command message and the content of the RRC reconfiguration message are included in the form of encapsulated packet data convergence protocol control protocol data unit (packet data convergence protocol control data protocol unit, PDCP-C PDU) The confirmation response message.
  • packet data convergence protocol control protocol data unit packet data convergence protocol control data protocol unit, PDCP-C PDU
  • the security protection includes integrity protection, or includes integrity protection and encryption protection.
  • the second access network device may send negative response information (another example of the first response message) to the first access network device, so that The first access network device learns that the second access network device does not accept the terminal device.
  • the embodiments of the present application may further include the following steps:
  • the first access network device sends the content in the received first response message to the terminal device.
  • the first access network device sends the content of the security mode command message and the content of the RRC reconfiguration message to the terminal device.
  • the first access network device transparently transmits the security mode command message and the RRC reconfiguration message to the terminal device.
  • the content of the security mode command message and the content of the RRC reconfiguration message may be sent to the terminal device through a single message, or may be sent to the terminal device at different timings through different messages.
  • the content of the security mode command message may be sent to the terminal device through a security mode command message (SMC), and the content of the RRC reconfiguration message may be sent to the terminal device through an RRC reconfiguration message.
  • SMC security mode command message
  • the terminal device may send a response message to the first access network device. Or, after receiving the content of the security mode command message, the terminal device sends a response message to the first access network device or the second access network device according to the corresponding instruction information. Optionally, if the first access network device receives the response message sent by the terminal device, the first access network device forwards the second response message to the second access network device. In addition, after receiving the content of the RRC reconfiguration complete message transmitted by the first access network device, the terminal device sends a response message to the second access network device. For the response message mentioned in this embodiment, reference may be made to the description of the embodiment in FIG. 4 for details.
  • the first access network device sends the first message to the second access network device, so that a suitable service access network device can be selected for the terminal device as soon as possible, reducing the time for the terminal device to access the network Delay.
  • an embodiment of the present application provides a communication method.
  • the method may include:
  • the terminal device sends a measurement report to the first access network device.
  • the terminal device sends service information to the first access network device.
  • the first access network device sends a first message to the second access network device.
  • the second access network device sends a first response message to the first access network device.
  • the first response message includes the content of the security mode command message and the content of the RRC reconfiguration message. Understandably, the content of the security mode command message and the content of the RRC reconfiguration message may be included in the same confirmation response message, or may be included in different confirmation response messages.
  • the content of the RRC reconfiguration message may be securely protected according to the initial key and a certain security algorithm (which may be called the first security algorithm). This method can reduce the impact on the terminal device.
  • the content of the RRC reconfiguration message is protected to ensure the authenticity and privacy of the message.
  • the initial key may be from the core network device, for example, the core network device determines and sends the initial key to the second access network device.
  • the first security algorithm includes an integrity protection algorithm, or the first security algorithm includes an integrity protection algorithm and an encryption algorithm.
  • the first security algorithm may be determined by the second access network device.
  • the second access network device may select the algorithm with the highest priority among the security algorithms it supports as the first security algorithm. The embodiment of the present application does not limit how to determine the first security algorithm and the specific security algorithm.
  • the content of the security mode command message may include the information of the first security algorithm, so that the terminal device can learn what security algorithm is used in the content of the RRC reconfiguration information. It should be noted that the information of the first security algorithm may also be sent to the first access network device through other messages or signaling, which is not limited in this embodiment of the present application.
  • the content of the RRC reconfiguration message may be security protection according to the first key and the first security algorithm, where the first key is determined according to the initial key and the information of the source cell.
  • the information of the source cell may include at least one of a physical cell identifier of the source cell and a frequency of the source cell.
  • the source cell belongs to the first access network device and initiates an access request for the terminal device.
  • the process of determining the first key according to the initial key and the information of the source cell may also be referred to as key derivation. In this way, the content of the RRC reconfiguration message is protected to ensure the authenticity and privacy of the message.
  • the second access network device may send the first key network information to the first access network device, for example
  • the information of the first key may be included in the content of the security mode message in the first response message.
  • the terminal device can learn that the content of the RRC reconfiguration message is securely protected according to the first key.
  • the information of the first key may be the first key itself, or may be indication information of the first key (indicating the use of the first key).
  • the terminal device may derive the first key according to the initial key and the information of the source cell.
  • the embodiment of the present application does not limit the manner in which the second access network device sends the first key information to the first access network device.
  • the first access network device sends the content of the security mode command message to the terminal device.
  • the terminal device receives the content of the above security mode command message.
  • the first access network device may forward the content of the security mode command message sent by the second access network device to the terminal device through the security mode command message.
  • the content of the security mode command message sent by the first access network device to the terminal device is the same as the content of the security mode command message sent by the second access network device to the first access network device.
  • the first access network device transparently forwards the security mode command message received from the second access network device.
  • the terminal device sends a second response message.
  • the terminal device may send a second response message to the first access network device, or may send a second response message to the second access network device.
  • the terminal device may send a second response message to the first access network device after receiving the content of the security mode command message transmitted by the first access network device.
  • the terminal device may determine whether to send the second response message to the first access network device or the second response message to the second access network device according to the first indication information from the second access network device.
  • the first indication information may be forwarded to the terminal device through the first access network device.
  • the content of the security mode command message in the first response message may include first indication information, where the first indication information is used to instruct the terminal device to send the second response message to the second access network device.
  • the terminal device sends the second response message to the first access network device by default.
  • the first indication information may indicate that the second response message is sent to the first access network device. If the first response information is not included in the first response message, the terminal device sends the second response message to the second access network device by default. Second response message.
  • the embodiment of the present application does not limit how the first indication information is specifically indicated, as long as the terminal device can determine whether to send the second response message to the first access network device or the second access network device.
  • the second access network device may also send the second to the first access network device.
  • Indication information indicates that the first access network device does not receive the second response message.
  • the terminal device sends the second response to the second access network device, it can avoid that the first access network device receives the security mode command message caused by the inconsistent operation of the terminal device and the first access network device
  • the corresponding news brings about energy consumption.
  • the first indication information and the second indication information may be sent in the same message, or may be sent in different messages, which is not limited in this embodiment of the present application.
  • the terminal device correctly receives the content of the security mode command message, and sends a second response message to the first access network device or the second access network device according to the content of the security mode command message, so that The first access network device or the second access network device learns that the terminal device has activated the security mode.
  • the second response message may be, for example, a security mode completion message.
  • the terminal device when the terminal device cannot activate the security mode according to the content of the security mode command message, the terminal device sends a second response message so that the first access network device or the second access network device learns about the terminal The device failed to activate safe mode.
  • the second response message may be, for example, a security mode failure message.
  • the method shown in FIG. 4 may further include: the first access network device forwards the second response message to the second access network device. For example, when the first access network device receives the second response message sent by the terminal device, the first access network device forwards the second response message to the second access network device.
  • the second The response message has a corresponding security mechanism:
  • the second response message can also be protected according to the above initial key and the first security algorithm; or, it is assumed that the content of the RRC reconfiguration message sent by the second access network device is protected according to the initial key and the first security algorithm , And the second response message is sent to the second access network device, then the second response message can be protected according to the same security mechanism as the third response message.
  • the security mechanism of the third response message below description;
  • the second response message may also be protected according to the first key and the first security algorithm; or, it is assumed that the content of the RRC reconfiguration message sent by the second access network device is based on the first key and the first security algorithm for security Protected, and the second response message is sent to the second access network device, then the second response message can be securely protected according to the same security mechanism as the third response message, for details, please refer to the security of the third response message below Description of the mechanism.
  • the second response message may be secured according to the same security mechanism as the content of the RRC reconfiguration message described in S404
  • the second response message may be protected according to the same security mechanism as the third response message.
  • the method shown in FIG. 4 may further include the following steps:
  • the first access network device sends the content of the RRC reconfiguration message to the terminal device.
  • the terminal receives the content of the RRC reconfiguration message.
  • the content of the RRC reconfiguration message sent by the first access network device to the terminal device is the same as the content of the RRC reconfiguration message sent by the second access network device to the first access network device.
  • the first access network device may transparently forward the content of the RRC reconfiguration message sent by the second access network device to the terminal device through an RRC reconfiguration message.
  • the terminal device sends a third response message to the second access network device.
  • the terminal device may send a third response message (which may also be called a second message) to the second access network device.
  • a third response message (which may also be called a second message)
  • the terminal device may enter an idle state. It is understandable that the terminal device does not need to perform S408 at this time.
  • the third response message may be an RRC reconfiguration completion message or a handover completion message.
  • the third response message can also be protected according to a certain security mechanism:
  • the third response message may be secured according to the initial key, or may be secured according to the second key Protection, the second key is determined (derived) based on the initial key and the information of the target cell; assuming that the content of the RRC reconfiguration message described in S404 is securely protected according to the first key, then the third The response message may be security protected according to the third key, or may be security protected according to the above-mentioned first key, which is determined (derived) based on the first key and the information of the target cell.
  • the information of the target cell may include, for example, at least one of physical cell identity (PCI) of the target cell and frequency information of the target cell.
  • PCI physical cell identity
  • the target cell is a cell belonging to the second access network device. In a possible manner, the terminal device may obtain the target cell information from the content of the RRC reconfiguration message.
  • S405 and S407 can also be executed simultaneously, for example, the content of the security mode command message and the content of the RRC reconfiguration message are sent to the terminal device in one message; S407 can also be executed after S405, or S407 It may also be executed before S405, which is not limited in the embodiment of the present application.
  • the second access network device can perform a security activation and reconfiguration process on the terminal device through the first access network device, and remove the terminal device from the first The network access device switches to the second access network device to reduce the delay of the terminal device accessing the network.
  • the embodiments of the present application provide a communication method, as shown in FIG. 5, including:
  • S501 Receive random access resource configuration information of an advance measurement report from an access network device.
  • the configuration information of the random access resource may be any combination of random access preamble information, random access time domain resource information, or random access frequency domain resource information.
  • the configuration information of the random access resource may include random access preamble information; or, the configuration information of the random access resource may include random access time domain resource information; or, the configuration information of the random access resource may include random access Incoming frequency domain resource information; or, the configuration information of the random access resource may include random access preamble information on the random access frequency domain resource, that is, the configuration information of the random access resource includes random access frequency resource information And random access preamble information; or, the configuration information of the random access resource may include random access preamble information on the random access time domain resource, that is, the configuration information of the random access resource includes random access time Domain resource information and random access preamble code information; or, the configuration information of the random access resource may include a random access preamble code on a random access time domain resource and a random access frequency domain resource, that is, a random access resource
  • the configuration information includes random access time domain resource information, random access frequency resource information, and random access preamble information.
  • the random access time domain resource information may include, for example, an identifier of the random access time domain resource or a configuration of the random access time domain resource, where the configuration of the random access time domain resource may be, for example, Including the configuration of frames, symbols, slots, etc.
  • the random access frequency domain resource information may include, for example, an identifier of the random access frequency domain resource or a configuration of the random access frequency domain resource.
  • the configuration of the random access frequency domain resources may include the configuration of bandwidth, resource blocks, etc., for example.
  • the random access preamble information may include, for example, an identifier of the random access preamble or a configuration used to determine the random access preamble.
  • the configuration of the random access preamble may include, for example, the preamble.
  • S501 is an optional step, that is, the access network device may not need to send the random access resource configuration information of the advance measurement report, and the advance measurement report may correspond to the predefined random access resource.
  • the terminal device sends a random access preamble (preamble) to the access network device.
  • the terminal device sending the preamble to the access network device may also be referred to as message 1 (message 1).
  • the access network device receives the random access preamble sent by the terminal device.
  • the terminal device may send a random access preamble according to the random access resource corresponding to the random access resource configuration information described in S501.
  • the access network device determines whether the terminal device has an advance measurement report to be sent based on the random access preamble information.
  • the information of the random access preamble may be any one or more of the following: random access preamble itself, time domain resource information used to send the random access preamble, and used to send the random access preamble Frequency domain resource information. If the access network device learns that the information of the random access preamble is consistent with the random access resource configured by the access network device or the pre-defined advance measurement report, then the access network device determines that the terminal device has to be sent Advance measurement report, execute S503; if the access network device learns that the information of the random access preamble does not match the random access resource configured by the access network device or the pre-defined advance measurement report, then the access network device determines the The terminal device has no advance measurement report to be sent, and it is processed according to the normal process.
  • the information of the random access preamble and the random access resource configured by the access network device or the pre-defined advance measurement report may be the information of the random access preamble belonging to the configuration of the access network device or the predefined random Random access resource information corresponding to the configuration information of the access resource.
  • the access network device sends the uplink scheduling information of the advance measurement report to the terminal device.
  • the access network device may send the uplink scheduling of the advance measurement report to the terminal device through a random access response (message 2), for example, uplink grant resource information.
  • message 2 may not only include the uplink scheduling information of the advance measurement report, but optionally, may also include the uplink scheduling information of message 3.
  • the upstream scheduling information of the advance measurement report and the upstream scheduling information of message 3 may be the same or different.
  • message 2 includes two uplink scheduling information, grant 1, grant 2, and grant 3. Grant 1 can be used to send message 3, and grant 2 can be used to send advance measurement reports.
  • S505 The terminal device measures the measurement report to the access network device in advance.
  • the terminal device After receiving the uplink scheduling information sent by the access network device, the terminal device sends an advance measurement report to the access network device while sending message 3 (also can be understood as accompanied by message 3) according to the uplink scheduling information, or With message 3, advance measurement report is sent.
  • message 3 also can be understood as accompanied by message 3
  • the advance measurement report and the message 3 can be multiplexed and sent in the same MAC data packet, such as the MAC service data unit (service data unit (SDU), or the measurement report and the message 3 before the message 4 respectively) Send on different upstream authorized resources; or, include the advance measurement report in message 3.
  • the method may further include:
  • the terminal device After the terminal device sends the advance measurement report according to the uplink scheduling information configured in S504, if the terminal device finds that the configured uplink scheduling information is insufficient, the advance measurement report is sent completely, that is, the terminal device cannot send the advance measurement report all at once , The terminal device may indicate to the access network device that the advance measurement report does not send complete information.
  • the information indicating that the advance measurement report is not completely transmitted may be implemented in different ways: for example, the indication information indicates whether the advance measurement report is completely transmitted, which may be indicated by 1 bit of information (for example, "0" indicates The advance measurement report is sent completely, "1" means that the advance measurement report is not sent completely); or, the corresponding indication information can be sent only when the advance measurement report is not sent completely, if there is no corresponding indication information, it means advance measurement The report is completely sent; alternatively, the corresponding indication information may be sent only when the advance measurement report is completely sent. If there is no corresponding indication information, it means that the advance measurement report is not completely sent.
  • the indication information indicates whether the advance measurement report is completely transmitted, which may be indicated by 1 bit of information (for example, "0" indicates The advance measurement report is sent completely, "1" means that the advance measurement report is not sent completely); or, the corresponding indication information can be sent only when the advance measurement report is not sent completely, if there is no corresponding indication information, it means advance measurement The report is completely sent; alternative
  • the above indication information may be sent through a physical uplink control channel, or may be carried in an advance measurement report, which is not limited in this embodiment of the present application, as long as the access network device can learn whether the advance measurement report is completely sent, thereby Just make the appropriate actions.
  • the communication method of the embodiment shown in FIG. 5 can be applied to terminal devices in an inactive state, terminal devices in an idle state, and terminal devices in which wireless link re-establishment occurs, no matter what In all scenarios, the advance measurement report can be sent according to a communication method similar to that shown in FIG. 5.
  • the communication method shown in FIG. 5 may be independent of any other embodiment in this application, or may be combined with other embodiments of this application.
  • the communication method shown in FIG. 5 can be combined with the communication method shown in FIG. 3 or FIG. 4 for sending the advance measurement report of the communication method shown in FIG. 3 or FIG. 4, at this time, shown in FIG. 5 Is the first access network device.
  • the communication method in the embodiment shown in FIG. 5 enables the terminal device to quickly report the measurement report, enables the serving base station to perform mobility-related configuration faster, and improves the data transmission experience of the terminal device.
  • An embodiment of the present application also provides a communication method. As shown in FIG. 6, it may include:
  • the first node sends a message A to the core network node.
  • the first node may also be referred to as a first base station or a master base station or a master node (MN).
  • the core network node may be, for example, AMF or MME.
  • the message A is a message for sending non-access stratum signaling of the terminal device to the core network node, for example, it may be an initial user equipment message (initial UE message).
  • the terminal device may further include: the terminal device sends information indicating that there is a measurement report to the first node.
  • the core network node sends a message B to the first node.
  • the message B is used to establish the connection configuration between the first node and the core network node for the terminal device, for example, it may be an initial context establishment request (initial context setup).
  • the first node sends a response message of message B to the core network node, for example, an initial context establishment response (initial context setup response).
  • an initial context establishment response initial context setup response
  • the response of message B is not sent immediately
  • the message is sent after being merged with other message content in the subsequent process.
  • the terminal device sends a measurement report to the first node.
  • S603 may also include a security mode interaction process between the first node and the terminal device: the first node sends a security mode command to the terminal device, and after the terminal device activates the security mode, the terminal device Send safe mode complete message.
  • S603, S601, and S602 are only an example, and this embodiment of the present application is not limited thereto.
  • S603 may be before S601, or S603 may be after S601 and before S602.
  • S604 The first node sends a request to the second node to add the second node to provide services for the terminal device.
  • the second node may also be called a second base station or a secondary base station or a secondary node (SN).
  • the request for adding a second node to provide services for the terminal device may be, for example, a secondary node addition request (S-Node addition request).
  • the request sent by the first node to the second node is used to request the second node to allocate resources for the multi-connection operation to the terminal device.
  • the first node may determine and add the second node according to the measurement report, or may determine the second node to add by other methods.
  • S605 The second node sends a response to the first node.
  • the second node sends a response to the first node based on the request of the first node
  • the response sent by the second node to the first node may be, for example, a secondary node add request response (S-Node addition request), which is used to let the first node know that the second node can provide the terminal device with service.
  • the response sent by the second node to the first node may include resource configuration information allocated by the second node to the terminal device for multi-connection operation.
  • the response sent by the second node to the first node may be, for example, a secondary node addition request rejection (S-Node addition request). It is used to let the first node know that the second node cannot provide services for the terminal device. .
  • S-Node addition request secondary node addition request rejection
  • the first node sends a message C to the terminal device.
  • the message C is used for RRC reconfiguration, for example, it may be called an RRC reconfiguration message.
  • message C may include configuration information of the second node, which is used by the terminal device to establish a connection with the second node.
  • the terminal device After receiving the message C, the terminal device establishes a connection with the second node according to the configuration information of the second node carried in the message C.
  • S607 The terminal device sends a response message of message C to the first node.
  • the first node receives the response message of the message C sent by the terminal device, and the response message is used to notify the first node that the terminal device has completed the corresponding configuration according to the message C.
  • the response message of message C may be an RRC reconfiguration completion message.
  • S608 The first node sends a message D to the core network node.
  • the core network node receives the message D.
  • the message D may include initial context, setup response, session resource identifier, and corresponding address information for transmitting downlink data of the session resource in the prior art.
  • the signaling overhead between the first node and the core network node is reduced.
  • Another embodiment of the present application also provides a communication method, as shown in FIG. 7, including:
  • the terminal device A sends an advance measurement report to the access network device A.
  • the terminal device may be a terminal device in a deactivated state or a terminal device during a radio link failure recovery process.
  • the access network device A may also be called a third access network device or a target access network device.
  • the access network device A sends a message E to the access network device B, requesting to obtain the context of the terminal device.
  • the access network device A After the access network device A obtains the pre-measurement report, it determines whether to request the context of the terminal device A. For example, the access device A may determine that the access network device needs to be replaced according to the cell load or other factors, and select an appropriate target connection according to the measurement report. If the network access device can find a suitable target access network device, it requests the context of the terminal device.
  • the target access network device may be the same access network device as access network device A, or the target access network device may be the same access network device as access network device B, or the target access network device
  • the network access device is an access network device different from the access network device A and the access network device B.
  • access network device A When the target access network device is the same access network device as access network device B: While requesting to obtain the context of the terminal device, access network device A will also send the target to access network device B The identification information of the cell, optionally, may also send the measurement result related to the access network device B to the access network device.
  • the access network device B is an access network device that stores the context of the terminal device A.
  • the access network device B may be an access network device that configures the terminal device A to enter the deactivated state, and the access network device B may also be called a source access network device or an anchor connection.
  • the network access device; or, for the terminal device during the wireless link failure recovery process, the access network device B may be the access network device where the terminal device A fails when the wireless link fails, and the access network device B may also be called It is the source access network device.
  • the access network device B may also be called a fourth access network device.
  • the message E may be a user equipment context request (retrieval UE context request) message requesting to obtain the context of the terminal device.
  • Message E may also be referred to as a third message.
  • the access network device B sends the next hop linking counter (NCC) to the access network device A.
  • NCC next hop linking counter
  • the NCC sent by the access network device B is different:
  • the NCC sent by the access network device B to the access network device A is the same as the NCC sent to the terminal device when the access network device B configures the terminal device to enter the deactivated state.
  • the NCC sent by the access network device B to the access network device A may be the NCC carried in the RRC release message in which the access network device B configures the terminal device to enter the deactivated state.
  • the NCC fed back by the access network device B to the access network device A may be the NCC used by the terminal device A in the access network device B or the terminal device A in the access network NCC not used by the device B (may also be referred to as NCC not used by the terminal device).
  • the access network device B feeds back to the access network device A that the NCC is not used by the terminal device A.
  • the access network device B feeds back to the access network device A the NCC used by the terminal device A in the access network device B.
  • the NCC used by the terminal device A in the access network device B is configured by the access network device B for the terminal device A. It should be noted that in this scenario, the access network device B may not send the NCC to the access network device B based on the request of the access network device A, but may send the NCC to the access network device A in advance. At this time, S702 may not be executed.
  • the execution order of S701 and S703 is not limited, for example, S703 may also be executed before S701.
  • the access network device B may send the NCC to the access network device A in the acquiring terminal device context request response message. It can be understood that the name of the message for sending the NCC is not limited in the embodiment of the present application.
  • the access network device B may also send a key A to the access network device A, where the key A may be based on the key used by the terminal device A when the access network device A initiates an access request Or a key corresponding to terminal device A stored in access network device B.
  • the information of the cell where the terminal device A initiates the access request includes at least one of the following: the physical cell identity of the cell and frequency point information.
  • the access network device A sends a handover request to the target access network device.
  • the target access network device replies to the access network device A with a handover response.
  • S704 and S705 are optional steps, that is, S704 and S705 may not be executed or do not exist, then S706 is executed after S703. For example, when the target access network device is the same access network device as access network device A or access network device B, S704 and S705 need not be performed.
  • the access network device A sends a message 4 to the terminal device A.
  • the message 4 includes target cell information.
  • the target cell information includes at least one of the following: the physical cell identifier of the target cell and the frequency information of the target cell.
  • the message 4 may also include reserved non-contention random access resource configuration information of the target cell.
  • the message 4 may also include information for determining the key B and/or the second security algorithm.
  • the information for determining the key B may include NCC.
  • the NCC may be the NCC received by the access network device A from the access network device B.
  • the second security algorithm may be a security algorithm received by the access network device A from the target access network device. It can be understood that the message 4 may not include the information and/or the security algorithm for the key B.
  • the terminal device A adopts the relevant information in the saved context by default.
  • terminal device A sends a fourth message to the target access device.
  • the fourth message is used to access the target access device.
  • the fourth message may be, for example, an RRC recovery completion message or an RRC reconfiguration completion message.
  • the fourth message may be secured by using a key B (which may also be called a new key).
  • the key B may be determined according to the key A, NCC, and information of the target cell.
  • a suitable target access network device is determined for the terminal device in time, so as to better provide services for the terminal device.
  • An embodiment of the present application also provides a communication method. As shown in FIG. 8, it may include:
  • the terminal device A sends an advance measurement report to the access network device A.
  • the access network device A sends a fifth message to the access network device B.
  • the fifth message may carry part or all of the content of the advance measurement report received by the access network device A from the terminal device A.
  • the fifth message may carry information of the target access network device and/or target cell, which is used by the access network device B to identify the target access network device and/or target cell.
  • the access network device B sends a sixth message to the target access network device.
  • the sixth message is a message for realizing a handover request.
  • the target access network device may be determined by the access network device B based on part or all of the content of the advance measurement report received from the access network device A; or, the target access network device may be determined by the access network device A and sent to the receiver Network device B.
  • the sixth message carries the target key (the key used during communication between the terminal device A and the target cell).
  • the sixth message may further include information of the target cell, and may further include the measurement result of the target cell.
  • the method for determining the target key is as follows: the access network device B uses the old key when the terminal device A and the access network device B perform service transmission and the cell where the terminal device A initiates the access request (the cell It belongs to the cell of the access network device A) to determine the first key; then the access network device B determines the target key based on the first key and the target cell information.
  • the sixth message may further include a target NCC (NCC used for communication between the terminal device A and the target cell).
  • NCC used for communication between the terminal device A and the target cell.
  • the target access network device replies to the access network device B with a response of the sixth message.
  • the response may carry the target security algorithm selected by the target access network device.
  • the access network device B sends a response message of the fifth message to the access network device A.
  • the response message may carry target cell information.
  • the response message may also carry the reserved non-contention random access resource configuration information of the target cell.
  • the response message may also carry information used by terminal device A to determine the target key and/or target security algorithm.
  • the information for determining the target key may include the target NCC.
  • the access network device A sends a message 4 to the terminal device A.
  • terminal device A sends a fourth message to the target access device.
  • a suitable target access network device is determined for the terminal device in time, so as to better provide services for the terminal device.
  • the methods and/or steps implemented by the terminal device may also be implemented by components (such as chips or circuits) that can be used for the terminal device, and by the access network device (such as the first access Network equipment, second access network equipment, access network equipment A, or access network equipment B)
  • the methods and/or steps implemented may also be implemented by components that can be used for access network equipment, by the core network equipment or the core network
  • the method and/or steps implemented by the node may also be implemented by components that can be used in the core network device or the core network node.
  • the terminal device and/or the access network device may perform some or all of the steps in the embodiments of the present application. These steps or operations are merely examples, and other operations may also be performed in the embodiments of the present application or Deformation of various operations. In addition, each step may be executed in a different order presented in the embodiments of the present application, and it may not be necessary to perform all operations in the embodiments of the present application.
  • the above mainly introduces the solutions provided by the embodiments of the present application from the perspective of interaction between various network elements.
  • the embodiments of the present application also provide a communication device, which is used to implement the above various methods.
  • the communication device may be the terminal device involved in the above method embodiments, or the device containing the above terminal device, or a component that can be used for the terminal device; or, the communication device may be the device involved in each of the above method embodiments Access network equipment (such as the first access network equipment, the second access network equipment, the access network equipment A, or the access network equipment B), or the device containing the above access network equipment, or it can be used to connect A component of a network access device; alternatively, the communication device may also be a core network node involved in the above method embodiments, or a device including the above core network node, or a component that can be used for a core network node.
  • Access network equipment such as the first access network equipment, the second access network equipment, the access network equipment A, or the access network equipment B
  • the communication device includes a hardware structure and/or a software module corresponding to each function.
  • a hardware structure and/or a software module corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driven hardware depends on the specific application of the technical solution and design constraints. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of this application.
  • the embodiments of the present application may divide the functional modules of the communication apparatus according to the above method embodiments, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of the modules in the embodiments of the present application is schematic, and is only a division of logical functions. In actual implementation, there may be another division manner.
  • FIG. 9 shows a schematic structural diagram of a communication device 90.
  • the communication device 90 includes a sending module 901 and a receiving module 902.
  • the sending module 901 and the receiving module 902 may exist independently in the form of an interface, or may be integrated into a transceiver module.
  • the transceiver module may also be called a transceiver unit to implement sending and/or receiving functions, for example, it may be a transceiver circuit, a transceiver , Transceiver or communication interface.
  • the sending module 901 may be used to send a first message to a second access network device, where the first message may refer to the description of the foregoing embodiment.
  • the receiving module 902 may be used to receive a response message of the first message from the second access network device.
  • the receiving module 902 may also be used to receive the measurement report and service information from the terminal device.
  • the access network device 90 may further include a processing module 903, configured to determine the foregoing second access network device according to the measurement report and service information.
  • the sending module 901 may also be used for the terminal device to send the content of the security mode command message and the content of the RRC reconfiguration message.
  • the receiving module 902 may also receive second indication information from the second access network device, where the second indication information indicates that the first access network device does not receive the response message of the security mode command message.
  • the receiving module 902 may also be used to receive a response message of the security mode command message from the terminal device.
  • the receiving module 902 can also be used to receive a random access preamble from the terminal device, and the processing module 903 is used to perform random access
  • the information of the preamble determines that the terminal device has an advance measurement report to be sent.
  • the sending module 901 may be used to send a random access response (message 2) to the terminal device, where the random access response includes Measurement report uplink scheduling information. It can be understood that the interaction between the structures and modules involved in this case can also be implemented independently.
  • the “module” in the embodiments of the present application may refer to an application specific integrated circuit ASIC, a circuit, a processor and memory that execute one or more software or firmware programs, an integrated logic circuit, and/or other devices that can provide the above functions.
  • ASIC application specific integrated circuit
  • the communication device 90 may be in the form of the access network device 20 shown in FIG. 2.
  • the processor 201 in the access network device 20 shown in FIG. 2 may call the computer stored in the memory 202 to execute instructions, so that the access network device 20 executes the communication method in the foregoing method embodiment.
  • the function/implementation process of the sending module 901 and the receiving module 902 in FIG. 9 can be performed by calling the computer execution instruction stored in the memory 202 by the processor 201 in the access network device 20 shown in FIG. 2 achieve.
  • the functions/implementation processes of the sending module 901 and the receiving module 902 in FIG. 9 can be implemented by the transceiver 203 in the access network device 20 shown in FIG. 2, and the functions/implementation of the processing module 903 in FIG. The process can be implemented by the processor 201 described in FIG. 2.
  • the communication device 90 provided by this embodiment can execute the above-mentioned communication method, the technical effects that can be obtained can refer to the above-mentioned method embodiments, which will not be repeated here.
  • FIG. 10 shows a schematic structural diagram of a communication device 1000.
  • the communication device 1000 includes a receiving module 1001 and a sending module 1002.
  • the receiving module 1001 and the sending module 1002 may exist independently in the form of an interface, or may be integrated as a transceiver module.
  • the transceiver module may also be called a transceiver unit to implement a transmission and/or reception function, for example, it may be a transceiver circuit, a transceiver , Transceiver or communication interface.
  • the receiving module 1001 may be used to receive a first message from a first access network device, where the first message includes identification information of a terminal device, a reason why the terminal device initiates establishment of a radio resource control RRC connection, and The identification information of the public land mobile network PLMN selected by the terminal device.
  • the sending module 1002 may be used to send a response message (first response message) of the first message to the first access network device.
  • the first response message sent by the sending module 1002 may further include information about the first key.
  • the sending module 1002 may also send second indication information to the first access network device, where the second indication information indicates that the first access network device does not receive the second response message.
  • the receiving module 1001 may also be used to receive the second response message from the terminal device.
  • the receiving module 1001 may also be used to receive a third response message from the terminal device.
  • the “module” here may refer to an application specific integrated circuit ASIC, a circuit, a processor and memory that execute one or more software or firmware programs, an integrated logic circuit, and/or other devices that can provide the above functions.
  • ASIC application specific integrated circuit
  • the communication device 1000 may be in the form of the access network device 20 shown in FIG. 2.
  • the function/implementation process of the receiving module 1001 and the sending module 1002 in FIG. 10 can be performed by calling the computer execution instruction stored in the memory 202 by the processor 201 in the access network device 20 shown in FIG. 2 achieve.
  • the functions/implementation processes of the receiving module 1001 and the sending module 1002 in FIG. 10 may be implemented by the transceiver 203 in the access network device 20 shown in FIG. 2.
  • FIG. 11 shows a schematic structural diagram of a communication device 11.
  • the communication device 11 includes a sending module 1101 and a receiving module 1102.
  • the sending module 1101 and the receiving module 1102 may exist independently in the form of an interface, or may be integrated into a transceiver module.
  • the transceiver module may also be called a transceiver unit to implement a sending and/or receiving function. For example, it may be a transceiver circuit or a transceiver. , Transceiver or communication interface.
  • the receiving module 1102 may be used to receive a security mode command message from the first access network device, where the content of the security mode command message is consistent with the content of the security mode message determined by the second access network device.
  • the security mode command message includes the information of the first key, which is determined according to the initial key determined by the core network, the physical cell identity of the source cell, and the frequency of the source cell, where the source cell Belongs to the first access network device.
  • the sending module 1101 is used to send a response message of the security mode command message, and the response message of the security mode command may be sent to the first access network device or the second access network device.
  • the sending module 1101 may also be used to send a measurement report and service information to the first access network device.
  • the sending module 1101 may also be used to send a second message to the second access network device indicating that radio resource control RRC reconfiguration is completed.
  • the receiving module 1102 may be further configured to receive first indication information from the first access network device, where the first indication information is used to instruct to send the security to the second access network device Response message for mode command message.
  • the sending module 1101 sends a response message of the security mode command message to the second access network device.
  • the sending module 1101 can also be used to send a random access preamble to the first access network device, and the receiving module 1102 It can be used to receive a random access response (message 2) from the first access network device, where the random access response includes uplink scheduling information for the advance measurement report, and the sending module 1101 is used to receive the receiving module 1102
  • the received uplink scheduling information sends an advance measurement report to the first access network device.
  • the “module” here may refer to an application specific integrated circuit ASIC, a circuit, a processor and memory that execute one or more software or firmware programs, an integrated logic circuit, and/or other devices that can provide the above functions.
  • ASIC application specific integrated circuit
  • the communication device 11 may be in the form of the terminal device 30 shown in FIG. 2.
  • the processor 301 in the terminal device 30 shown in FIG. 2 may call the computer stored in the memory 302 to execute instructions, so that the terminal device 30 executes the communication method in the foregoing method embodiment.
  • the function/implementation process of the sending module 1101 and the receiving module 1102 in FIG. 11 may be implemented by calling the computer execution instruction stored in the memory 302 by the processor 301 in the terminal device 30 shown in FIG. 2.
  • the functions/implementation processes of the sending module 1101 and the receiving module 1102 in FIG. 11 may be implemented by the transceiver 303 in the terminal device 30 shown in FIG. 2.
  • An embodiment of the present application further provides a communication device, which is used to implement related functions/implementation processes of the first node in the foregoing method embodiments.
  • the communication device may include a sending module for sending a message to the core network node for transmitting non-access layer signaling of the terminal device to the core network node, and a receiving module for receiving a response message from the core network node, Further, after the RRC reconfiguration of the terminal device is completed, the sending module may also send a message including an initial context establishment response, a session resource identifier, and address information for transmitting downlink data of the session resource to the core network node.
  • the sending module and the receiving module may exist independently in the form of an interface, or may be integrated into a transceiver module.
  • the transceiver module may also be called a transceiver unit to implement a sending and/or receiving function, for example, a transceiver circuit. , Transceiver, transceiver or communication interface.
  • the communication apparatus may include a receiving module for receiving a message for transmitting non-access stratum signaling of a terminal device to a core network node from a first node; and a sending module for sending a response message to the first node Further, after the RRC reconfiguration of the terminal device is completed, the receiving module is used to receive a message including an initial context establishment response, a session resource identifier, and address information for transmitting downlink data of the session resource from the first node.
  • the sending module and the receiving module may exist independently in the form of an interface, or may be integrated into a transceiver module.
  • the transceiver module may also be called a transceiver unit to implement a sending and/or receiving function. For example, it may be a transceiver circuit, a transceiver, and a transceiver. Device or communication interface.
  • An embodiment of the present application further provides a communication apparatus, including a module for implementing related functions/implementation processes corresponding to the access network device A of the embodiment shown in FIG. 7 or FIG. 8.
  • a communication apparatus including a module for implementing related functions/implementation processes corresponding to the access network device A of the embodiment shown in FIG. 7 or FIG. 8.
  • the sending module and the receiving module for the specific interaction between the sending module and the receiving module, reference may be made to the steps related to sending and receiving in the method embodiment, and details are not described here.
  • An embodiment of the present application further provides a communication apparatus, including a module for implementing related functions/implementation processes corresponding to the access network device B of the embodiment shown in FIG. 7 or FIG. 8.
  • a communication apparatus including a module for implementing related functions/implementation processes corresponding to the access network device B of the embodiment shown in FIG. 7 or FIG. 8.
  • the sending module and the receiving module for the specific interaction between the sending module and the receiving module, reference may be made to the steps related to sending and receiving in the method embodiment, and details are not described here.
  • An embodiment of the present application further provides a communication apparatus, including a module for implementing related functions/implementation processes corresponding to the target access network device of the embodiment shown in FIG. 7 or FIG. 8.
  • a communication apparatus including a module for implementing related functions/implementation processes corresponding to the target access network device of the embodiment shown in FIG. 7 or FIG. 8.
  • the sending module and the receiving module for the specific interaction between the sending module and the receiving module, reference may be made to the steps related to sending and receiving in the method embodiment, and details are not described here.
  • An embodiment of the present application further provides a communication apparatus, including a module for implementing related functions/implementation processes corresponding to the terminal device A of the embodiment shown in FIG. 7 or FIG. 8.
  • a communication apparatus including a module for implementing related functions/implementation processes corresponding to the terminal device A of the embodiment shown in FIG. 7 or FIG. 8.
  • the sending module and the receiving module for the specific interaction between the sending module and the receiving module, reference may be made to the steps related to sending and receiving in the method embodiment, and details are not described here.
  • an embodiment of the present application further provides a communication device (for example, the communication device may be a chip or a chip system), and the communication device includes a processor for implementing the method in any of the foregoing method embodiments.
  • the communication device further includes a memory.
  • the memory is used to store necessary program instructions and data, and the processor can call the program code stored in the memory to instruct the communication device to perform the method in any of the above method embodiments.
  • the memory may not be in the communication device.
  • the communication device is a chip system, it may be composed of a chip, or may include a chip and other discrete devices, which is not specifically limited in the embodiments of the present application.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server or data center Transmission to another website, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers and data centers that can be integrated with the medium.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)) or the like.
  • the computer may include the aforementioned device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Selon un procédé et un appareil de communication, et un système décrits dans des modes de réalisation de la présente invention, un premier dispositif de réseau d'accès transmet un premier message à un deuxième dispositif de réseau d'accès, le premier message comprenant des informations d'identification d'un dispositif terminal, la raison pour laquelle le dispositif terminal lance l'établissement d'une connexion de commande de ressource radio (RRC), et des informations d'identification d'un réseau mobile terrestre public (PLMN) sélectionné par le dispositif terminal ; et le premier dispositif de réseau d'accès reçoit un message de réponse au premier message provenant du deuxième dispositif de réseau d'accès, de sorte qu'un dispositif de réseau d'accès de service approprié puisse être sélectionné pour le dispositif terminal dès que possible, et que le retard temporel pour que le dispositif terminal accède à un réseau soit réduit.
PCT/CN2019/129730 2018-12-29 2019-12-30 Procédé et appareil de communication WO2020135850A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811644580.2A CN111385830B (zh) 2018-12-29 2018-12-29 通信方法和装置
CN201811644580.2 2018-12-29

Publications (1)

Publication Number Publication Date
WO2020135850A1 true WO2020135850A1 (fr) 2020-07-02

Family

ID=71127779

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/129730 WO2020135850A1 (fr) 2018-12-29 2019-12-30 Procédé et appareil de communication

Country Status (2)

Country Link
CN (2) CN111385830B (fr)
WO (1) WO2020135850A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200359208A1 (en) * 2018-02-06 2020-11-12 Huawei Technologies Co., Ltd. Security Negotiation Method and Apparatus
CN114079986A (zh) * 2020-08-18 2022-02-22 华为技术有限公司 一种移动性管理方法和装置
CN114145043A (zh) * 2020-07-03 2022-03-04 华为技术有限公司 一种通信方法及装置
CN114270964A (zh) * 2020-07-31 2022-04-01 华为技术有限公司 通信方法、装置及系统

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220150739A1 (en) * 2019-02-12 2022-05-12 Telefonaktiebolaget Lm Ericsson (Publ) Early measurement reporting with rrc resume request message and indication of request for early measurements in association with paging
WO2022082674A1 (fr) * 2020-10-22 2022-04-28 华为技术有限公司 Procédé, appareil et système de communication
CA3201516A1 (fr) * 2020-11-11 2022-05-19 Huawei Technologies Co., Ltd. Procede, appareil et systeme de communication
CN115707358A (zh) * 2021-06-02 2023-02-17 华为技术有限公司 一种安全激活失败后的恢复方法和装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101925142A (zh) * 2009-06-17 2010-12-22 华为技术有限公司 一种小区切换的控制方法、网络设备和系统
CN102238659A (zh) * 2010-04-29 2011-11-09 华为技术有限公司 基站切换处理方法和基站设备
CN102625302A (zh) * 2008-06-23 2012-08-01 华为技术有限公司 密钥衍生方法、设备及系统
CN104219717A (zh) * 2013-05-31 2014-12-17 中国移动通信集团公司 一种终端切换的方法、基站及终端切换的系统
CN106572508A (zh) * 2015-10-13 2017-04-19 电信科学技术研究院 一种将终端设备切换到目标小区的方法、装置及基站
CN108617020A (zh) * 2016-12-30 2018-10-02 中国电信股份有限公司 一种用于建立控制面连接的方法和系统
US10118698B2 (en) * 2016-07-06 2018-11-06 At&T Intellectual Property I, L.P. Remote forensic investigation

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100566264C (zh) * 2006-01-26 2009-12-02 Ut斯达康通讯有限公司 一种在无线接入网内进行监听的方法和装置
US8204502B2 (en) * 2006-09-22 2012-06-19 Kineto Wireless, Inc. Method and apparatus for user equipment registration
KR101368588B1 (ko) * 2006-10-30 2014-02-27 인터디지탈 테크날러지 코포레이션 Lte 시스템에서 추적 영역 업데이트 및 셀 재선택을 구현하는 방법 및 장치
CN101815314A (zh) * 2009-02-20 2010-08-25 华为技术有限公司 发现无线网络问题的方法、装置及系统
US8842546B2 (en) * 2010-07-22 2014-09-23 Mediatek Inc. Method for wireless communication in a device with co-existence radio
CN102821385B (zh) * 2011-06-10 2017-03-22 中兴通讯股份有限公司 一种向终端发送公共警报系统密钥信息的方法和网络实体
US9007972B2 (en) * 2011-07-01 2015-04-14 Intel Corporation Communication state transitioning control
CN102932823A (zh) * 2011-08-10 2013-02-13 华为技术有限公司 关联报告的方法及装置
CN102333352B (zh) * 2011-09-19 2014-03-19 新邮通信设备有限公司 一种长期演进lte系统中减少切换时延的方法
CN103428761A (zh) * 2012-05-16 2013-12-04 北京三星通信技术研究有限公司 一种指示mdt plmn的方法
US9332473B2 (en) * 2013-05-09 2016-05-03 Sharp Kabushiki Kaisha Systems and methods for re-establishing a connection
CN104602307A (zh) * 2013-10-30 2015-05-06 北京三星通信技术研究有限公司 切换方法及系统
CN106341839B (zh) * 2015-07-07 2019-08-30 电信科学技术研究院 一种信息上报、接收,承载建立的方法及装置
CN106376037B (zh) * 2015-07-20 2019-12-03 中兴通讯股份有限公司 一种基站内跨plmn切换方法、基站及通信系统
CN105491604B (zh) * 2015-11-24 2018-09-04 广东欧珀移动通信有限公司 网络通信功能异常的处理方法、调制解调器及用户终端
CN108713347B (zh) * 2016-10-28 2021-02-09 华为技术有限公司 一种通过用户设备接入网络的方法、装置及系统
CN108064050B (zh) * 2016-11-05 2021-05-14 华为技术有限公司 配置方法及装置
CN108616939B (zh) * 2016-12-21 2021-01-22 大唐移动通信设备有限公司 一种无线资源控制rrc重建立处理方法和装置
CN108616958B (zh) * 2016-12-30 2021-01-26 中国电信股份有限公司 激活异系统SeNB的方法、终端、基站和通信系统
CN108347751B (zh) * 2017-01-25 2021-08-03 华为技术有限公司 通信方法和通信装置
CN108566309B (zh) * 2017-01-26 2019-08-06 华为技术有限公司 一种接入目标小区的方法以及设备
CN108632926B (zh) * 2017-03-24 2021-04-09 华为技术有限公司 通信方法、网络设备和终端
CN108632934B (zh) * 2017-03-24 2021-01-01 华为技术有限公司 切换的方法和设备
CN108632815B (zh) * 2017-03-24 2020-02-21 华为技术有限公司 通信方法与设备
CN112135323B (zh) * 2017-05-05 2024-04-12 华为技术有限公司 一种通信方法及设备

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102625302A (zh) * 2008-06-23 2012-08-01 华为技术有限公司 密钥衍生方法、设备及系统
CN101925142A (zh) * 2009-06-17 2010-12-22 华为技术有限公司 一种小区切换的控制方法、网络设备和系统
CN102238659A (zh) * 2010-04-29 2011-11-09 华为技术有限公司 基站切换处理方法和基站设备
CN104219717A (zh) * 2013-05-31 2014-12-17 中国移动通信集团公司 一种终端切换的方法、基站及终端切换的系统
CN106572508A (zh) * 2015-10-13 2017-04-19 电信科学技术研究院 一种将终端设备切换到目标小区的方法、装置及基站
US10118698B2 (en) * 2016-07-06 2018-11-06 At&T Intellectual Property I, L.P. Remote forensic investigation
CN108617020A (zh) * 2016-12-30 2018-10-02 中国电信股份有限公司 一种用于建立控制面连接的方法和系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RESEARCH IN MOTION UK LIMITED: "Signaling Procedures for IDC operation", 3GPP DRAFT; R2-121281, 30 March 2012 (2012-03-30), Jeju, Korea, pages 1 - 6, XP050605861 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200359208A1 (en) * 2018-02-06 2020-11-12 Huawei Technologies Co., Ltd. Security Negotiation Method and Apparatus
US11765578B2 (en) * 2018-02-06 2023-09-19 Huawei Technologies Co., Ltd. Security negotiation method and apparatus
CN114145043A (zh) * 2020-07-03 2022-03-04 华为技术有限公司 一种通信方法及装置
CN114145043B (zh) * 2020-07-03 2023-08-22 华为技术有限公司 一种通信方法及装置
CN114270964A (zh) * 2020-07-31 2022-04-01 华为技术有限公司 通信方法、装置及系统
CN114270964B (zh) * 2020-07-31 2023-11-17 华为技术有限公司 通信方法、装置及系统
CN114079986A (zh) * 2020-08-18 2022-02-22 华为技术有限公司 一种移动性管理方法和装置
CN114079986B (zh) * 2020-08-18 2024-04-09 华为技术有限公司 一种移动性管理方法和装置

Also Published As

Publication number Publication date
CN111385830A (zh) 2020-07-07
CN115396927A (zh) 2022-11-25
CN111385830B (zh) 2022-07-22

Similar Documents

Publication Publication Date Title
WO2020135850A1 (fr) Procédé et appareil de communication
US10420009B2 (en) Methods and devices for determining and using Device-to-Device relay node
EP3713372A1 (fr) Procédé et dispositif de création de groupe d'utilisateurs
EP3711352A1 (fr) Procédé, appareil, produit-programme informatique et programme informatique pour transfert intercellulaire conditionnel
WO2019196811A1 (fr) Procédé de communication, et appareil associé
EP3986007A1 (fr) Procédé, dispositif et système de sélection d'un élément de réseau de gestion de session
EP4142376A1 (fr) Procédé d'accès au réseau et appareil de communication
US11700553B2 (en) Method of apparatus for monitoring for a radio link failure associated with a secondary cell of a secondary base station
US11470674B2 (en) Communication method and communications apparatus
WO2020221223A1 (fr) Procédé, appareil et système de communication
US20210099912A1 (en) Rate control method, apparatus, and system
US20210022203A1 (en) Method for deactivating user plane connection and network entity for controlling user plane connection deactivation in network
US20230156833A1 (en) Packet Forwarding Method, Apparatus, and System
US20230388908A1 (en) Network slice-based communication method and apparatus
US11510257B2 (en) Communications method and apparatus
WO2020164620A1 (fr) Procédé de traitement de communication pour informations de terminal et dispositif associé
US20220304097A1 (en) User Equipment Context Transfer Over Radio Access Network Paging
US10827403B2 (en) Data transmission method, user equipment, base station, and system
EP3905736A1 (fr) Procédé, appareil et système de découverte de dispositif
EP4087316A1 (fr) Procédé et appareil de communication
US20240155325A1 (en) Information obtaining method and apparatus, and system
US20240179118A1 (en) Edge Service Obtaining Method and Apparatus
WO2022188156A1 (fr) Procédé de communication et appareil de communication
CN114642079B (zh) 通信方法及装置
WO2024045923A1 (fr) Procédé d'enregistrement de rapport d'accès aléatoire et appareil de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19905686

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19905686

Country of ref document: EP

Kind code of ref document: A1