WO2021062837A1 - 通信方法及装置 - Google Patents

通信方法及装置 Download PDF

Info

Publication number
WO2021062837A1
WO2021062837A1 PCT/CN2019/109766 CN2019109766W WO2021062837A1 WO 2021062837 A1 WO2021062837 A1 WO 2021062837A1 CN 2019109766 W CN2019109766 W CN 2019109766W WO 2021062837 A1 WO2021062837 A1 WO 2021062837A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
link
wireless backhaul
node
configuration information
Prior art date
Application number
PCT/CN2019/109766
Other languages
English (en)
French (fr)
Inventor
朱元萍
张鹏
戴明增
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to MX2022003826A priority Critical patent/MX2022003826A/es
Priority to CN201980097083.1A priority patent/CN113906816B/zh
Priority to PCT/CN2019/109766 priority patent/WO2021062837A1/zh
Publication of WO2021062837A1 publication Critical patent/WO2021062837A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA

Definitions

  • This application relates to the field of communication technology, and in particular to a communication method and device.
  • Wireless relay (relay) technology has the characteristics of convenient and flexible deployment, and lower cost compared with wired connections such as optical fiber. Therefore, in order to extend the coverage of wireless networks, reduce costs and increase capacity, in a multi-standard network, Both consider introducing this technology.
  • a terminal can access a wireless backhaul node, and access a host node through one or more wireless backhaul nodes, and then access the core network through the host node.
  • the wireless backhaul node can provide a wireless access service for the terminal so that the terminal can access the network, and on the other hand, it can provide a wireless backhaul service for the terminal to directly return the terminal’s data to the host node or through the parent node (for example, Another wireless backhaul node) transmits back to the host node.
  • 4G 4th generation
  • 5G 5th generation
  • the embodiments of the present application provide a communication method and device, which are used to reduce the design complexity of a wireless backhaul node, thereby reducing the cost of the wireless backhaul node.
  • a communication method including: a wireless backhaul node receives a random access request from a terminal and sends the random access request to a host node; the wireless backhaul node receives a first random access response from the host node , And send a second random access response to the terminal according to the first random access response, and the second random access response includes the timing advance calculated by the wireless backhaul node for the terminal.
  • the wireless backhaul node helps the terminal complete the random access process at the host node by monitoring and forwarding messages in the random access process of the terminal.
  • the wireless backhaul node processes the random access request by itself and sends the RAR to the terminal
  • the design of the wireless backhaul node can be simplified, the complexity of the wireless backhaul node can be reduced, and the cost of the wireless backhaul node can be reduced.
  • the wireless backhaul node sends the second random access response to the terminal according to the first random access response, including: the wireless backhaul node sets the host node carried in the first random access response to wireless The time advance calculated by the backhaul node is modified to the time advance calculated by the wireless backhaul node for the terminal, and the second random access response is obtained, and the second random access response is sent to the terminal; or, the wireless backhaul node sends the wireless back The timing advance calculated by the transmitting node for the terminal is added to the information element used to indicate the timing advance in the first random access response to obtain the second random access response, and the second random access response is sent to the terminal.
  • the wireless backhaul node since the node that directly communicates with the terminal is a wireless backhaul node, the wireless backhaul node needs to send the timing advance calculated for the terminal to the terminal so that the terminal can send uplink data at an appropriate time to ensure The wireless backhaul node correctly receives the uplink data.
  • the method further includes: the wireless backhaul node receives, from the host node, first configuration information for configuring the resource for transmitting or scheduling the second random access response.
  • the host node can configure the wireless backhaul node to transmit or schedule the second random access response resource.
  • the wireless backhaul node does not need to determine the transmission or scheduling second random access response by itself. Resources, thereby further simplifying the design of the wireless backhaul node, reducing the complexity of the wireless backhaul node, and thereby reducing the cost of the wireless backhaul node.
  • the method further includes: the wireless backhaul node receives from the terminal an uplink message including the terminal's conflict resolution identifier, records the conflict resolution identifier of the terminal in the uplink message, and forwards the uplink message to the host node .
  • the uplink message is a message sent by the terminal to the wireless backhaul node according to the second random access response.
  • the method further includes: the wireless backhaul node receives a downlink message from the host node, and in a case where it is determined that the downlink message carries the conflict resolution identifier of the terminal, forwarding the downlink message to the terminal.
  • the downlink message is a message sent by the host node to the wireless backhaul node according to the uplink message.
  • the wireless backhaul node when multiple terminals perform contention-based random access at the same time, the wireless backhaul node only needs to forward the downlink message to the terminal that it serves and succeeds in the random access process. All downlink messages of the host node (for example, messages sent to terminals served by other wireless backhaul nodes) need to be forwarded, so that signaling overhead can be saved.
  • the method further includes: the wireless backhaul node receives from the host node second configuration information used to configure the terminal with parameters corresponding to the protocol layer included in the first link, and sends the second configuration information to the terminal.
  • Configuration information The first link is the link between the wireless backhaul node and the terminal, and the second configuration information is generated by the host node.
  • the host node executes the configuration of the parameters corresponding to the protocol layer included in the first link with the assistance of the wireless backhaul node.
  • the wireless backhaul node configures the parameters corresponding to the protocol layer included in the first link
  • the design of the wireless backhaul node can be simplified, the complexity of the wireless backhaul node can be reduced, and the wireless backhaul node can be reduced. the cost of.
  • the second configuration information includes one or more of the following information: 1) first indication information, the first indication information is used to indicate the link targeted by the second configuration information; 2) host The identification of each logical channel of the terminal on the first link allocated by the node and the configuration of each logical channel.
  • the method further includes: the wireless backhaul node receives from the host node third configuration information used to configure the wireless backhaul node with parameters corresponding to the protocol layer included in the first link, and the third configuration The information is generated by the host node.
  • the host node performs the configuration of the parameters corresponding to the protocol layer included in the first link for the wireless backhaul node.
  • the third configuration information includes one or more of the following information: 1) second indication information, the second indication information is used to indicate the link targeted by the third configuration information; 2) the host node The identification of each logical channel of the wireless backhaul node on the allocated first link and the configuration of each logical channel; 3) the mapping relationship between the identification of the logical channel on the first link and the second link, the second link The path is the link between the wireless backhaul node and the host node.
  • a communication method including: a wireless backhaul node receives second configuration information from a host node, the second configuration information is used to configure the terminal with parameters corresponding to the protocol layer included in the first link, and the first link
  • the path is the link between the wireless backhaul node and the terminal, and the second configuration information is generated by the host node; the wireless backhaul node sends the second configuration information to the terminal.
  • the host node performs configuration of the parameters corresponding to the protocol layer included in the first link with the assistance of the wireless backhaul node.
  • the wireless backhaul node configures the parameters corresponding to the protocol layer included in the first link
  • the design of the wireless backhaul node can be simplified, the complexity of the wireless backhaul node can be reduced, and the wireless backhaul node can be reduced. the cost of.
  • the second configuration information includes one or more of the following information: 1) first indication information, the first indication information is used to indicate the link targeted by the second configuration information; 2) host The identification of each logical channel of the terminal on the first link allocated by the node and the configuration of each logical channel.
  • the method further includes: the wireless backhaul node receives third configuration information from the host node, and the third configuration information is used to configure the wireless backhaul node with parameters corresponding to the protocol layer included in the first link , The third configuration information is generated by the host node.
  • the host node performs the configuration of the parameters corresponding to the protocol layer included in the first link for the wireless backhaul node.
  • the third configuration information includes one or more of the following information: 1) second indication information, the second indication information is used to indicate the link targeted by the third configuration information; 2) the host node The identification of each logical channel of the wireless backhaul node on the allocated first link and the configuration of each logical channel; 3) the mapping relationship between the identification of the logical channel on the first link and the second link, the second link The path is the link between the wireless backhaul node and the host node.
  • a communication method including: a host node generates second configuration information for configuring parameters corresponding to a protocol layer included in a first link for a terminal, and sends the second configuration information to a wireless backhaul node.
  • the first link is the link between the wireless backhaul node and the terminal.
  • the host node performs configuration of the parameters corresponding to the protocol layer included in the first link with the assistance of the wireless backhaul node.
  • the wireless backhaul node configures the parameters corresponding to the protocol layer included in the first link
  • the design of the wireless backhaul node can be simplified, the complexity of the wireless backhaul node can be reduced, and the wireless backhaul node can be reduced. the cost of.
  • the second configuration information includes one or more of the following information: 1) first indication information, the first indication information is used to indicate the link targeted by the second configuration information; 2) host The identification of each logical channel of the terminal on the first link allocated by the node and the configuration of each logical channel.
  • the method further includes: the host node sends to the wireless backhaul node third configuration information for configuring the wireless backhaul node with parameters corresponding to the protocol layer included in the first link.
  • the host node performs the configuration of the parameters corresponding to the protocol layer included in the first link for the wireless backhaul node.
  • the third configuration information includes one or more of the following information: 1) second indication information, the second indication information is used to indicate the link targeted by the third configuration information; 2) the host node The identification of each logical channel of the wireless backhaul node on the allocated first link and the configuration of each logical channel; 3) the mapping relationship between the identification of the logical channel on the first link and the second link, the second link The path is the link between the wireless backhaul node and the host node.
  • a communication device including: a processing unit and a communication unit; the processing unit is configured to receive a random access request from a terminal through the communication unit and send the random access request to a host node; the processing unit, and It is used to receive the first random access response from the host node through the communication unit; the processing unit is also used to send a second random access response to the terminal through the communication unit according to the first random access response, and the second random access response includes The device is the time advance calculated by the terminal.
  • the processing unit is specifically configured to modify the timing advance calculated for the device by the host node carried in the first random access response to the timing advance calculated by the device for the terminal to obtain the second Random access response, and send a second random access response to the terminal through the communication unit; or, the processing unit, specifically configured to add the timing advance calculated by the device for the terminal to the indication for the first random access response Among the cells with the time advance, the second random access response is obtained, and the second random access response is sent to the terminal through the communication unit.
  • the processing unit is further configured to receive first configuration information from the host node through the communication unit, and the first configuration information is used to configure resources for transmission or scheduling of the second random access response.
  • the processing unit is further configured to receive an uplink message from the terminal through the communication unit, the uplink message includes the conflict resolution identifier of the terminal, and the uplink message is sent by the terminal to the device according to the second random access response. Message; the processing unit is also used to record the conflict resolution identification of the terminal in the uplink message, and forward the uplink message to the host node through the communication unit.
  • the processing unit is further configured to receive a downlink message from the host node through the communication unit.
  • the downlink message is a message sent by the host node to the device according to the uplink message; the determined downlink message carries the conflict resolution of the terminal
  • the processing unit is further configured to forward the downlink message to the terminal through the communication unit.
  • the processing unit is further configured to receive second configuration information from the host node through the communication unit, the second configuration information is used to configure the terminal with parameters corresponding to the protocol layer included in the first link, and the first The link is the link between the device and the terminal, and the second configuration information is generated by the host node; the processing unit is further configured to send the second configuration information to the terminal through the communication unit.
  • the second configuration information includes one or more of the following information: 1) first indication information, the first indication information is used to indicate the link targeted by the second configuration information; 2) host The identification of each logical channel of the terminal on the first link allocated by the node and the configuration of each logical channel.
  • the processing unit is further configured to receive third configuration information from the host node through the communication unit, and the third configuration information is used to configure the device with parameters corresponding to the protocol layer included in the first link.
  • Three configuration information is generated by the host node.
  • the third configuration information includes one or more of the following information: 1) second indication information, the second indication information is used to indicate the link targeted by the third configuration information; 2) the host node The identification of each logical channel of the device on the allocated first link and the configuration of each logical channel; 3) The mapping relationship between the identification of the logical channel on the first link and the second link, the second link is The link between the device and the host node.
  • a communication device including: a processing unit and a communication unit; the processing unit is configured to receive second configuration information from a host node through the communication unit, and the second configuration information is used to configure the terminal with the first link
  • the first link is the link between the device and the terminal, and the second configuration information is generated by the host node; the processing unit is also configured to send the second configuration information to the terminal through the communication unit.
  • the second configuration information includes one or more of the following information: 1) first indication information, the first indication information is used to indicate the link targeted by the second configuration information; 2) host The identification of each logical channel of the terminal on the first link allocated by the node and the configuration of each logical channel.
  • the processing unit is further configured to receive third configuration information from the host node through the communication unit, and the third configuration information is used to configure the device with parameters corresponding to the protocol layer included in the first link.
  • Three configuration information is generated by the host node.
  • the third configuration information includes one or more of the following information: 1) second indication information, the second indication information is used to indicate the link targeted by the third configuration information; 2) the host node The identification of each logical channel of the device on the allocated first link and the configuration of each logical channel; 3) The mapping relationship between the identification of the logical channel on the first link and the second link, the second link is The link between the device and the host node.
  • a communication device including: a processing unit and a communication unit; the processing unit is configured to generate second configuration information, and the second configuration information is used to configure parameters corresponding to the protocol layer included in the first link for the terminal ,
  • the first link is the link between the wireless backhaul node and the terminal; the communication unit is used to send the second configuration information to the wireless backhaul node.
  • the second configuration information includes one or more of the following information: 1) first indication information, the first indication information is used to indicate the link targeted by the second configuration information; 2) the The identifier of each logical channel of the terminal on the first link allocated by the device and the configuration of each logical channel.
  • the communication unit is further configured to send third configuration information to the wireless backhaul node, and the third configuration information is used to configure the wireless backhaul node with parameters corresponding to the protocol layer included in the first link.
  • the third configuration information includes one or more of the following information: 1) second indication information, the second indication information is used to indicate the link targeted by the third configuration information; 2) the device The identification of each logical channel of the wireless backhaul node on the allocated first link and the configuration of each logical channel; 3) the mapping relationship between the identification of the logical channel on the first link and the second link, the second link The path is the link between the wireless backhaul node and the device.
  • a communication device including a processor.
  • the processor is connected to the memory, the memory is used to store computer-executable instructions, and the processor executes the computer-executable instructions stored in the memory, so as to implement any one of the methods provided in any one of the first to third aspects.
  • the memory and the processor can be integrated together or can be independent devices. In the latter case, the memory may be located in the communication device or outside the communication device.
  • the processor includes a logic circuit, and also includes at least one of an input interface and an output interface. Among them, the output interface is used to execute the sending action in the corresponding method, and the input interface is used to execute the receiving action in the corresponding method.
  • the communication device further includes a communication interface and a communication bus, and the processor, the memory, and the communication interface are connected through the communication bus.
  • the communication interface is used to perform the sending and receiving actions in the corresponding method.
  • the communication interface may also be called a transceiver.
  • the communication interface includes at least one of a transmitter and a receiver. In this case, the transmitter is used to perform the sending action in the corresponding method, and the receiver is used to perform the receiving action in the corresponding method.
  • the communication device exists in the form of a chip product.
  • a communication system including: the communication device provided in the fourth aspect or the fifth aspect and the communication device provided in the sixth aspect.
  • a computer-readable storage medium including instructions, which when run on a computer, cause the computer to execute any one of the methods provided in any one of the first to third aspects.
  • a computer program product containing instructions is provided.
  • the instructions run on a computer, the computer executes any method provided in any one of the first to third aspects.
  • Figures 1 to 3 are schematic diagrams of a communication scenario provided by embodiments of the application.
  • Figure 4 is a flow chart of a random access method
  • Figures 5 and 6 are respectively a flowchart of a link configuration method
  • 9 and 10 are respectively flowcharts of a link configuration method provided by an embodiment of this application.
  • FIG. 11 is a schematic diagram of the composition of a communication device provided by an embodiment of this application.
  • FIG. 12 and FIG. 13 are respectively schematic diagrams of the hardware structure of a communication device provided by an embodiment of the application.
  • words such as “first” and “second” are used to distinguish the same or similar items with substantially the same function and effect. Those skilled in the art can understand that words such as “first” and “second” do not limit the quantity and execution order, and words such as “first” and “second” do not limit the difference.
  • the method provided in the embodiments of the present application can be applied to 4G, 5G, wireless local area networks (WLAN), and other networks, and can also be applied to networks that will evolve in the future or multiple communication-converged networks.
  • the 4G network may also be referred to as a long term evolution (LTE) network or an evolved packet system (EPS).
  • LTE long term evolution
  • EPS evolved packet system
  • the 5G network may also be called a new radio (NR) network.
  • NR new radio
  • the network can also be called a communication system.
  • the method provided in the embodiments of the present application can be applied to wireless relay scenarios in these networks.
  • the wireless relay scenario is the scenario where the wireless relay technology is applied.
  • the application scenarios of the wireless relay technology are very extensive.
  • the wireless relay technology can also be used in the indoor wireless coverage scenario. For example, a home access scenario or a relay scenario for terminal cooperation.
  • the terminal accesses a donor node through one or more wireless backhaul nodes, and the host node accesses the core network through a wired link.
  • both the access link (AL) and the backhaul link (BL) adopt wireless transmission schemes.
  • the terminal can access the wireless backhaul node through the wireless access link, and the wireless backhaul node can return the terminal's data to its parent node through the wireless backhaul link.
  • the parent node of a wireless backhaul node refers to the node that receives the uplink data sent by the wireless backhaul node.
  • the parent node of the wireless backhaul node 1 is the wireless backhaul node 2
  • the parent node of the wireless backhaul node 2 is the host node.
  • the terminal and the wireless backhaul node communicate through the Uu interface, and the wireless backhaul node and between the wireless backhaul node and the host node communicate through the Un interface.
  • the wireless relay scenario can include the following scenarios:
  • the terminal can access a wireless backhaul node, and access a donor node through a wireless backhaul node.
  • the terminal can access one wireless backhaul node, and access the host node through multiple wireless backhaul nodes (for example, 2, 3, 4 or more wireless backhaul nodes).
  • the terminal can access the host node through the wireless backhaul node 1 and the wireless backhaul node 2.
  • the terminal can access multiple wireless backhaul nodes, or the terminal can access the wireless backhaul node and the host node at the same time, or the wireless backhaul node is connected to at least two parent nodes at the same time, and the parent node can be other Wireless backhaul node or host node.
  • the terminal can access the wireless backhaul node 1 and the wireless backhaul node 3.
  • the wireless backhaul node 1 accesses the host node through the wireless backhaul node 2, and the wireless backhaul node 3 directly accesses the host node. .
  • the terminal is used to provide users with one or more of voice services and data connectivity services.
  • the terminal can also be called user equipment (UE), terminal equipment, access terminal, user unit, user station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or user Device.
  • the terminal can also be a mobile station (MS), subscriber unit (subscriber unit), drone, tablet computer, session initiation protocol (SIP) phone, wireless local loop (wireless local loop, WLL) ) Station, personal digital assistant (PDA) equipment, laptop computer, machine type communication (MTC) terminal, handheld device with wireless communication function, computing device or connected to wireless Other processing equipment of modems, vehicle-mounted equipment, wearable equipment (also called wearable smart equipment), etc.
  • MS mobile station
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • MTC machine type communication
  • the wireless backhaul node can have many forms.
  • the wireless backhaul node can be a relay node (RN), an integrated access and backhaul (IAB) node, etc. .
  • the wireless backhaul node can also be a terminal, and the terminal (for example, a mobile phone) accesses as a wireless backhaul node
  • the base station (at this time, the base station is the host node), based on the device-to-device (D2D) communication mechanism, provides wireless access for the wearable device.
  • the wireless backhaul node can also be a customer premises equipment (CPE) used to provide indoor coverage.
  • the CPE can access the base station (in this case, the base station is the host node), and is Indoor users provide wireless coverage.
  • CPE customer premises equipment
  • the wireless backhaul node can be an RN
  • the host node can be an evolved base station (evolved NodeB, eNB)
  • the core network can be an evolved packet core (EPC).
  • EPC evolved packet core
  • the wireless backhaul node can be an IAB node.
  • IAB nodes can have the role of mobile terminal (MT) and the role of distributed unit (DU).
  • MT mobile terminal
  • DU distributed unit
  • the IAB node faces its parent node, it can be regarded as a terminal.
  • the IAB node plays the role of MT.
  • the IAB node plays the role of DU. Therefore, it can be considered that the IAB node is composed of the MT part and the DU part.
  • An IAB node can establish a backhaul connection with at least one parent node of the IAB node through the MT part.
  • the DU part of an IAB node can provide access services for the terminal or the MT part of other IAB nodes.
  • the host node can be the next generation node base station (gNB), and the core network can be the core network (5G core, 5GC) of the 5G network.
  • the interface between the host node and the core network is the next generation ( next generation, NG) interface.
  • the host node may also be referred to as an IAB donor (IAB donor) or a host gNB (donor gNB, DgNB).
  • the host node in the embodiment of this application can be a complete entity, or a centralized unit (CU) (herein referred to as Donor-CU) and DU (herein referred to as Donor-DU) separated , That is, the host node is composed of Donor-CU and Donor-DU.
  • Donor-CU can also be a form in which the user plane (UP) (referred to as CU-UP in this article) and control plane (CP) (referred to as CU-CP in this article) are separated, namely Donor- CU is composed of CU-CP and CU-UP.
  • UP user plane
  • CP control plane
  • Timing advance (TA)
  • An important feature of uplink transmission is that the uplink transmissions of different terminals from the same cell do not interfere with each other.
  • network equipment In order to avoid intra-cell interference, network equipment requires signals from different terminals in the same subframe but with different frequency domain resources (for example, different resource blocks (RB)) to arrive at the network equipment basically. aligned. As long as the network device receives the uplink data sent by the terminal within the cyclic prefix (CP) range, it can decode the uplink data correctly. Therefore, the uplink synchronization requires the time when the signals from different terminals in the same subframe arrive at the network device. All fall within the CP.
  • CP cyclic prefix
  • the mechanism of Uplink Timing Advance (Uplink Timing Advance) is proposed.
  • the TA is essentially a negative offset (negative offset) between the start time of receiving the downlink subframe and the time of transmitting the uplink subframe.
  • the network equipment can control the time when the uplink signals from different terminals reach the network equipment by appropriately controlling the offset of each terminal. For a terminal far away from the network device, due to a larger transmission delay, it is necessary to send uplink data earlier than a terminal closer to the network device.
  • the random access process is used for the terminal to establish a connection with the cell and obtain uplink synchronization.
  • Random access mechanism in the wireless relay scenario of 4G network is Random access mechanism
  • the contention-based random access process in the wireless relay scenario of the 4G network includes the following steps 401 to 404, and the non-contention-based random access process includes the following steps 401 and 402.
  • the terminal sends a message 1 (Msg1) to the RN, where the Msg1 includes a random access preamble (preamble).
  • Msg1 includes a random access preamble (preamble).
  • Msg1 can tell the RN that there is a random access request, and at the same time enable the RN to estimate the transmission delay between it and the terminal and determine the uplink TA based on this.
  • Msg1 can be carried on a physical random access channel (PRACH).
  • PRACH physical random access channel
  • the PRACH resource and preamble are selected by the terminal.
  • Different terminals may select the same PRACH resource and the same preamble at the same time, resulting in conflicts.
  • a conflict resolution mechanism ie Step 403 and step 404 to solve this problem.
  • the terminal Based on non-competitive random access, the terminal already has a unique identifier in the accessed cell.
  • Cell-radio network temporary identifier C-RNTI
  • the PRACH resource and preamble are specified by the RN, so It is guaranteed that it will not conflict with other terminals, and there is no need for a conflict resolution mechanism (that is, step 403 and step 404).
  • the RN sends a message 2 (Msg2) to the terminal.
  • Msg2 may be a random access response (random access response, RAR).
  • the terminal sends a message 3 (Msg3) to the RN.
  • Msg3 message 3
  • the Msg3 needs to include an important piece of information: the UE contention resolution identity, which will be used for conflict resolution in step 404.
  • the RN sends a message 4 (Msg4) to the terminal, indicating the result of the random access competition of the terminal.
  • the RN will carry the conflict resolution identifier of the terminal in Msg4 to specify the terminal that succeeds in the conflict resolution, and other terminals that have not succeeded in the conflict resolution will re-initiate random access.
  • the terminal carries the available C-RNTI that it has obtained in the access cell when sending Msg3 (for example, the C-RNTI MAC control element (CE) is carried in Msg3)
  • Msg3 for example, the C-RNTI MAC control element (CE) is carried in Msg3
  • the terminal if the terminal carries the available C-RNTI that it has obtained in the access cell when sending Msg3 (for example, the C-RNTI MAC control element (CE) is carried in Msg3), then if the terminal The physical downlink control channel (PDCCH) received in Msg4 is scrambled by the C-RNTI of the terminal, and the terminal considers that the conflict resolution is successful and confirms that the random access is successful; or, the terminal is still in the cell that it is accessing. No usable C-RNTI is obtained, and the received PDCCH of Msg4 is scrambled by the temporary cell radio network temporary identification (TC-RNTI) specified in RAR.
  • TC-RNTI
  • the conflict resolution identifier matches the common control channel (CCCH) service data unit (SDU) carried in the Msg3
  • the conflict resolution is determined to be successful, that is, the random access is successful, otherwise, the random access is determined Entry failed.
  • the length of the CCCH SDU carried in Msg3 is greater than or equal to the length of the terminal's conflict resolution identifier (for example, the length is N bits)
  • compare the first N bits of the CCCH SDU with the terminal's conflict resolution identifier to see if they are consistent. It is considered that the two match, otherwise it is considered that the two do not match.
  • the link configuration process includes: the host node sends configuration information 1 to the RN, and the configuration information 1 is used to configure the RN with parameters corresponding to the protocol layer contained in the link between the host node and the RN; RN is Configure the parameters corresponding to the protocol layer included in the link between the RN and the terminal, and send configuration information 2 to the terminal.
  • the configuration information 2 is used to configure the terminal with the parameters corresponding to the protocol layer included in the link between the RN and the terminal.
  • a possible implementation of link configuration can be seen in Figure 6, including: the host node sends configuration information 1 to the IAB node, and configuration information 1 is used to configure the link between the host node and the IAB node for the IAB node The parameters corresponding to the protocol layer included; the IAB node configures itself the parameters corresponding to the protocol layer included in the link between the IAB node and the terminal, and sends configuration information 2 to the host node.
  • the configuration information 2 includes the IAB node used to configure the terminal Information about the parameters corresponding to the protocol layer below the packet data convergence protocol (PDCP) layer contained in the link between the terminal and the terminal.
  • the host node sends configuration information 3 to the terminal through the IAB node, and the configuration information 3 is used for The terminal configures the parameters corresponding to the protocol layer included in the link between the IAB node and the terminal.
  • PDCP packet data convergence protocol
  • the wireless backhaul node in the 4G network needs to support random access of the terminal, and the wireless access link of the terminal needs to be configured.
  • the wireless backhaul node in the 5G network also needs to configure the wireless access link of the terminal. Then, the function of the wireless backhaul node needs to be very complete, and the cost is relatively high.
  • the embodiments of the present application provide a communication method (also called a random access method).
  • a communication method also called a random access method.
  • the random access function supported by the wireless backhaul node is moved to the host.
  • the node performs processing to simplify the design of the wireless backhaul node.
  • the method includes:
  • the terminal sends a random access request to the wireless backhaul node.
  • the wireless backhaul node receives a random access request from the terminal.
  • the random access request may be the foregoing Msg1.
  • the random access request may include a preamble.
  • the wireless backhaul node sends a random access request to the host node.
  • the host node receives a random access request from the wireless backhaul node.
  • the actions performed by the host node in the embodiment of the present application may be specifically performed by Donor-CU.
  • the Donor-CU is an architecture in which the CP and the UP are separated, the actions performed by the host node in the embodiment of the present application may be specifically performed by the CU-CP.
  • the wireless backhaul node when the wireless backhaul node sends the preamble in the random access request, it needs to use the same preamble format as the terminal, that is, the preamble sent by the wireless backhaul node and the preamble sent by the received terminal are the same preamble.
  • the wireless backhaul node and the terminal use the same preamble format, which means that the PRACH resource used by the wireless backhaul node to send the preamble is the same as the terminal.
  • the same here does not mean that the time and frequency resources are completely the same, but that the PRACH resources corresponding to the preamble sent by the terminal are used.
  • the PRACH resources may appear periodically in the time domain. At this time, the wireless backhaul node sends
  • the PRACH resource used by the preamble and the PRACH resource used by the terminal to send the preamble may be in the same period or in different periods.
  • the PRACH resource used by the wireless backhaul node to send the preamble and the PRACH resource used by the terminal to send the preamble can be staggered by one PRACH resource period.
  • the PRACH resource used by the wireless backhaul node to send the preamble and the PRACH resource used by the terminal to send the preamble may be resources on different time slots of the PRACH resource in the same period.
  • the wireless backhaul node only needs to ensure that the sent preamble and the received preamble sent by the terminal are the same preamble, and the used PRACH resource can be selected by itself.
  • the host node sends an RAR (denoted as the first RAR) to the wireless backhaul node according to the random access request.
  • the wireless backhaul node receives the first RAR from the host node.
  • the first RAR may or may not include TA. It should be noted that since the host node is a random access request received from the wireless backhaul node, the host node can only calculate TA for the wireless backhaul node according to the random access request. Therefore, if the first RAR includes TA , The TA is the TA calculated by the host node for the wireless backhaul node.
  • the wireless backhaul node sends an RAR (denoted as a second RAR) to the terminal according to the first RAR, and the second RAR includes the TA calculated by the wireless backhaul node for the terminal.
  • RAR denoted as a second RAR
  • the wireless backhaul node Since the node that directly communicates with the terminal is a wireless backhaul node, the wireless backhaul node needs to send the TA calculated for the terminal to the terminal so that the terminal can send uplink data at an appropriate time to ensure that the wireless backhaul node correctly receives the uplink data.
  • the wireless backhaul node may calculate the TA for the terminal according to the random access request received in step 701.
  • the TA calculated by the wireless backhaul node for the terminal is twice the transmission delay between the wireless backhaul node and the terminal.
  • step 704 may be implemented in the following manner one or two in a specific implementation.
  • the wireless backhaul node modifies the TA calculated by the host node for the wireless backhaul node carried in the first RAR to the TA calculated by the wireless backhaul node for the terminal, obtains the second RAR, and sends the second RAR to the terminal.
  • Method one is applicable to the case where TA is included in the first RAR.
  • the wireless backhaul node adds the TA calculated by the wireless backhaul node for the terminal to the cell indicating the TA in the first RAR to obtain the second RAR, and sends the second RAR to the terminal.
  • the second method is applicable to the case where TA is not included in the first RAR.
  • the wireless backhaul node helps the terminal complete the random access process at the host node by monitoring and forwarding the message in the random access process of the terminal.
  • the method provided in this embodiment can simplify the design of the wireless backhaul node, reduce the complexity of the wireless backhaul node, and thereby reduce the wireless The cost of the return node.
  • the method further includes:
  • the host node determines the node type of the wireless backhaul node.
  • the way that the wireless backhaul node accesses the host node can follow the way that the terminal accesses the host node.
  • the wireless backhaul node needs to perform signaling and data forwarding processing between the terminal and the host node, it is somewhat different from ordinary terminals. Therefore, the host node needs to determine the node type of the wireless backhaul node.
  • Node types include: terminal and wireless backhaul node.
  • Step 700 may be implemented in the following manner 1 or manner 2 in specific implementation.
  • the wireless backhaul node sends indication information (denoted as indication information 1) to the host node, and the indication information 1 is used to indicate that it is a wireless backhaul node or that it has the capability of a wireless backhaul node.
  • indication information 1 is used to indicate that it is a wireless backhaul node or that it has the capability of a wireless backhaul node.
  • the capabilities of the wireless backhaul node include one or more of the following: the ability to return uplink data of the terminal to other wireless backhaul nodes or host nodes, and the ability to provide wireless access services for the terminal.
  • the host node receives indication information (denoted as indication information 2) and the identification of the wireless backhaul node from the core network equipment.
  • the indication information 2 and the identification of the wireless backhaul node indicate that the wireless backhaul node is certified as a wireless backhaul node by the core network equipment .
  • the core network equipment After the core network equipment authenticates the wireless backhaul node, it can be accessed and mobility management function (core access and mobility management function, AMF) through the NG interface or mobility management network element (mobility management entity, MME) Through the S1 interface, send instruction information 2 to the host node to confirm the node type of the wireless backhaul node.
  • AMF core access and mobility management function
  • MME mobility management entity
  • the method further includes:
  • the host node sends first configuration information to the wireless backhaul node, where the first configuration information is used to configure transmission and/or schedule resources for the second RAR.
  • the wireless backhaul node receives the first configuration information from the host node.
  • the first configuration information may be an RRC message.
  • the host node can configure the wireless backhaul node to transmit RAR resources, and can also configure the wireless backhaul node to schedule RAR resources, and can also configure the wireless backhaul node to configure both RAR transmission resources and RAR scheduling resources.
  • the resource for transmitting the RAR may be a physical downlink shared channel (PDSCH) resource
  • the resource for scheduling the RAR may be a PDCCH resource.
  • the wireless backhaul node does not need to determine its own transmission and/or scheduling RAR resources, which further simplifies the design of the wireless backhaul node, reduces the complexity of the wireless backhaul node, and thereby reduces the cost of the wireless backhaul node.
  • the wireless backhaul node may determine the resource for transmitting and/or scheduling the RAR according to the first configuration information, and use the resource to send the RAR to the terminal, for example, select a resource among the resources to send the above-mentioned second RAR.
  • step 703a the execution order of step 703a and any one of steps 701 to 703 is in no particular order.
  • the random access method in the embodiments of the present application may be based on contention or non-competition. If it is the former, after step 704, the above method further includes the following steps 705 to step 709, and if it is the latter, the above method does not include the following steps 705 to 709.
  • the terminal sends an uplink message to the wireless backhaul node according to the second RAR.
  • the wireless backhaul node receives the uplink message from the terminal.
  • the uplink message includes the conflict resolution identifier of the terminal, and the identifier is used for conflict resolution. Therefore, it may also be referred to as a contention resolution ID (contention resolution ID).
  • the conflict resolution identifier of the terminal may be the C-RNTI of the terminal or the terminal identifier from the core network (for example, serving-temporary mobile subscriber identity (S-TMSI) or a random number).
  • the conflict resolution identifier of the terminal may be carried in a medium access control (medium access control, MAC) control element (CE), or may be carried in an uplink CCCH SDU.
  • the uplink CCCH SDU may include an uplink RRC message, such as an RRC connection request message or an RRC connection establishment request message.
  • the uplink message may be the foregoing Msg3, and Msg3 may specifically include any of the following: RRC connection establishment request (RRC setup request), RRC resume request (RRC resume request), RRC reestablishment request (RRC reestablishment request) )Wait.
  • RRC connection establishment request RRC setup request
  • RRC resume request RRC resume request
  • RRC reestablishment request RRC reestablishment request
  • the wireless backhaul node records the conflict resolution identifier of the terminal in the uplink message.
  • the wireless backhaul node forwards the uplink message to the host node.
  • the host node receives the uplink message from the wireless backhaul node.
  • the host node sends a downlink message to the wireless backhaul node according to the foregoing uplink message.
  • the wireless backhaul node receives the downlink message from the host node.
  • the downlink message may include the conflict resolution identifier of the terminal that successfully competes.
  • the downlink message may be the foregoing Msg4, and the Msg4 may specifically include any one of the following: an RRC setup message (RRC setup), an RRC rejection message (RRC reject), and so on.
  • RRC setup RRC setup
  • RRC rejection RRC rejection
  • the wireless backhaul node forwards the downlink message to the terminal.
  • the host node will carry the conflict resolution identifier of the terminal in the downlink message to specify the terminal that succeeds in the conflict resolution, and other terminals that have not succeeded in the conflict resolution will re-initiate random access. Therefore, when the wireless backhaul node determines that the downlink message carries the conflict resolution identifier of the terminal, it indicates that the terminal succeeded in conflict resolution.
  • the method for determining whether the random access is successful can be similar to that of the terminal in LTE (for details, please refer to the description of step 404 above, which will not be repeated here), or other methods, which will not be discussed in this application. limit.
  • step 706 to step 709 when multiple terminals perform contention-based random access at the same time, the wireless backhaul node only needs to forward the downlink message to the terminal that it serves and succeeds in the random access process. , There is no need to forward all downlink messages of the host node (for example, messages sent to terminals served by other wireless backhaul nodes), thereby saving signaling overhead.
  • the random access request and the uplink message sent by the terminal can be carried in the same message and sent. If the message is marked as message A, the random access request sent by the wireless backhaul node and the uplink message The message can be replaced with message A.
  • the first RAR and the downlink message sent by the host node can be carried in the same message and sent, this message is marked as message C, then the second RAR and the downlink message sent by the wireless backhaul node can also be carried in the same message and sent, Denote this message as message B.
  • step 703a may not exist, and the host node may configure resources for sending one or more of message A, message B, and message C for the terminal and the wireless backhaul node in advance.
  • the terminal accesses the network through a two-step random access process (that is, the two steps of sending message A and receiving message B).
  • the terminal may determine the PRACH resource and the data resource of the 2-step random access procedure, and send message A on the PRACH resource and message B on the data resource. After sending message A, the terminal receives message B. If the terminal verifies that the contention resolution information contained in the message B is successful, then the random access is successful. If the host node decodes message A unsuccessfully, it can send a response message to notify the terminal to perform the 4-step random access process (that is, through the 4 steps 701, 704, 705, and 709 shown in Figure 8) or notify the terminal to continue the 2-step random access process. ⁇ Into the process.
  • the wireless backhaul node accessed by the terminal when the wireless backhaul node accessed by the terminal sends message B, it also needs to carry the TA calculated by the wireless backhaul node for the terminal (specifically, the above method 1 or method Second implementation), and after receiving message A, it is also necessary to record the conflict resolution identification of the terminal.
  • the messages in the 2-step random access process can also have other names, which are not limited to message A and message B in this application.
  • message A and message B in this application can also be called the first message, the second message, and so on.
  • the embodiment of the present application also provides a communication method (also called a link configuration method).
  • a communication method also called a link configuration method.
  • the function of configuring the wireless access link of the terminal is moved to the host node for processing, which further simplifies the wireless return.
  • the design of the transmission node Referring to Figure 9, the method includes:
  • the host node generates second configuration information, where the second configuration information is used to configure parameters corresponding to the protocol layer included in the first link for the terminal.
  • the first link is the link between the wireless backhaul node and the terminal.
  • the second configuration information may include one or more of the following information:
  • the first indication information is used to indicate the link targeted by the second configuration information.
  • the first indication information may be the identification of the first link and/or the identification of the terminal, the identification of the first link is used to indicate that the link targeted by the second configuration information is the first link, and the identification of the terminal is used for It indicates that the link targeted by the second configuration information is the wireless access link of the terminal (that is, the first link).
  • the identifier of the terminal may also indicate that the second configuration information is configuration information sent to the terminal.
  • the identity of the terminal can be the C-RNTI of the terminal, or "the identity of the cell that the terminal accesses + the C-RNTI of the terminal in the cell", where the cell that the terminal accesses is a wireless backhaul node The serving cell, or the cell served by the host node.
  • the identifier of the link may be the identifier of the nodes at both ends of the link.
  • the identifier of the first link may be: the identifier of the wireless backhaul node + the identifier of the terminal.
  • the identification of each logical channel and the configuration of each logical channel may be based on the radio bearer granularity of the terminal.
  • the radio bearer of the terminal may specifically be a data radio bearer (DRB) or a signaling radio bearer (SRB) of the terminal.
  • DRB data radio bearer
  • SRB signaling radio bearer
  • the identifier of each logical channel and the configuration of each logical channel may be carried in the configuration carried by the radio link control (radio link control, RLC).
  • the configuration of the RLC bearer included in the second configuration information may include: a list of added or released RLC bearers.
  • the configuration content included in it includes at least one of the following: the identifier of the logical channel, the identifier of the serving RB, whether to rebuild the RLC, the configuration of the RLC (for example, the RLC mode, the RLC layer Various timer settings), logical channel configuration (for example, the priority of the logical channel, the logical channel group corresponding to the logical channel, the priority bit rate (PBR) of the logical channel, the token bucket size of the logical channel (bucket size duration, BSD) etc.)
  • the configuration of the RLC for example, the RLC mode, the RLC layer Various timer settings
  • logical channel configuration for example, the priority of the logical channel, the logical channel group corresponding to the logical channel, the priority bit rate (PBR) of the logical channel, the token bucket size of the logical channel (bucket size duration, BSD) etc.
  • the second configuration information may also configure a cell group ID (cell group ID), the configuration of the MAC layer of the cell group, and the configuration of the physical layer of the cell group.
  • the host node sends second configuration information to the wireless backhaul node.
  • the wireless backhaul node receives the second configuration information from the host node.
  • the wireless backhaul node may determine that the second configuration information is for the terminal according to the identification of the terminal in the second configuration information.
  • the second configuration information may be carried in the RRC message.
  • the wireless backhaul node sends second configuration information to the terminal.
  • the wireless backhaul node may directly forward the second configuration information to the terminal, or may delete the first indication information in the second configuration information and send it to the terminal. Further, the wireless backhaul node may also add the identifier of the wireless backhaul node to the second configuration information and send it to the terminal, so that when the terminal accesses multiple wireless backhaul nodes, it can be determined that the second configuration information is configured with The link with which wireless backhaul node.
  • the identity of the wireless backhaul node can also be directly added by the host node to the second configuration information. In this case, the wireless backhaul node does not need to add the identity of the wireless backhaul node to the second configuration information.
  • the method further includes:
  • the host node generates third configuration information, where the third configuration information is used to configure parameters corresponding to the protocol layer included in the first link for the wireless backhaul node.
  • the third configuration information may include one or more of the following information:
  • the second indication information is used to indicate the link targeted by the third configuration information.
  • the second indication information may be an identifier of the first link, and the identifier of the first link is used to indicate that the link targeted by the third configuration information is the first link. For other descriptions of the identification of the first link, refer to the above, and will not be repeated.
  • mapping relationship between the identifiers of the logical channels on the first link and the second link. This mapping relationship can be used for the wireless backhaul node to subsequently perform two stages when forwarding the data/signaling exchanged between the terminal and the host node Bearer mapping on the link.
  • the second link is the link between the host node and the wireless backhaul node.
  • the host node sends third configuration information to the wireless backhaul node.
  • the wireless backhaul node receives the third configuration information from the host node.
  • the wireless backhaul node After receiving the third configuration information, the wireless backhaul node configures the parameters corresponding to the protocol layer included in the first link according to the third configuration information.
  • the third configuration information may be carried in the RRC message.
  • the wireless backhaul node can play the role of DU (for example, the wireless backhaul node is an IAB node)
  • the third configuration information can be carried in the F1 application protocol (F1 application protocol, F1AP) message in.
  • the method further includes:
  • the host node sends fourth configuration information to the wireless backhaul node, where the fourth configuration information is used to configure the wireless backhaul node with parameters corresponding to the protocol layer included in the second link.
  • the wireless backhaul node receives the fourth configuration information from the host node.
  • the wireless backhaul node may configure the parameters corresponding to the protocol layer included in the second link according to the fourth configuration information.
  • the fourth configuration information may be used to configure corresponding parameters such as the PHY layer, the MAC layer, and the RLC layer for the terminal.
  • the fourth configuration information may also be used to configure corresponding parameters such as a PDCP layer and an adaptation layer for the terminal.
  • the fourth configuration information may be carried in the RRC message.
  • step 902 step 905, and step 906 is in no particular order.
  • the host node performs configuration of the parameters corresponding to the protocol layers included in the first link and the second link with the assistance of the wireless backhaul node.
  • the method provided in this embodiment can simplify the design of the wireless backhaul node and reduce the complexity of the wireless backhaul node. In turn, the cost of wireless backhaul nodes is reduced.
  • any one of FIGS. 9 and 10 can be combined with the method shown in any one of FIGS. 7 and 8, and only the steps in the method shown in the former need to be executed in the method shown in the latter. Just after the steps in the method.
  • the wireless backhaul node accessed by the terminal can perform all the actions performed by the wireless backhaul node in the above-mentioned embodiment.
  • the difference includes: the wireless backhaul node interacts with its parent node Information (for example, receiving the aforementioned downlink message or the second configuration information or the third configuration information or the fourth configuration information, and for example, sending the aforementioned first RAR or random access request, etc.) instead of exchanging information with the host node;
  • the second link is the link between the wireless backhaul node and its parent node, rather than the link with the host node.
  • Other wireless backhaul nodes can process the messages sent to themselves by themselves, and forward the corresponding messages for messages not sent to themselves.
  • each network element for example, a host node and a wireless backhaul node, in order to implement the above-mentioned functions, includes a hardware structure and/or software module corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
  • the embodiment of the application can divide the host node and the wireless backhaul node into functional units according to the above method examples.
  • each functional unit can be divided corresponding to each function, or two or more functions can be integrated into one processing unit. in.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit. It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 11 shows a possible structural schematic diagram of the communication device (denoted as the communication device 110) involved in the above embodiment.
  • the communication device 110 includes a processing unit 1101 and a communication unit 1102. , May also include a storage unit 1103.
  • the schematic structural diagram shown in FIG. 11 may be used to illustrate the structure of the host node or the wireless backhaul node involved in the foregoing embodiment.
  • the processing unit 1101 is used to control and manage the actions of the host node.
  • the processing unit 1101 is used to support the host node to execute the graph. 702 and 703 in 7, 700, 702, 703a, 703, 707, and 708 in Fig. 8, 901 and 902 in Fig. 9, 901, 902, 904 to 906 in Fig. 10, and/or embodiments of the present application Actions performed by the host node in other processes described in.
  • the processing unit 1101 may communicate with other network entities through the communication unit 1102, for example, communicate with the wireless backhaul node shown in FIG. 7.
  • the storage unit 1103 is used to store the program code and data of the host node.
  • the communication apparatus 110 may be a device or a chip in the device.
  • the processing unit 1101 is used to control and manage the actions of the wireless backhaul node, for example, the processing unit 1101 is used to support
  • the wireless backhaul node executes 701 to 704 in Fig. 7, 701 to 709 in Fig. 8, 902 and 903 in Fig. 9, 902, 903, 905, and 906 in Fig. 10, and/or as described in the embodiment of the present application. Describe the actions performed by the wireless backhaul node in other processes.
  • the processing unit 1101 may communicate with other network entities through the communication unit 1102, for example, communicate with the host node shown in FIG. 7.
  • the storage unit 1103 is used to store the program code and data of the wireless backhaul node.
  • the communication device 110 may be a device or a chip in the device.
  • the processing unit 1101 may be a processor or a controller, and the communication unit 1102 may be a communication interface, a transceiver, a transceiver, a transceiver circuit, a transceiver, and so on.
  • the communication interface is a general term and may include one or more interfaces.
  • the storage unit 1103 may be a memory.
  • the processing unit 1101 may be a processor or a controller, and the communication unit 1102 may be an input interface and/or output interface, a pin or a circuit, etc.
  • the storage unit 1103 may be a storage unit in the chip (for example, a register, a cache, etc.), or a storage unit (for example, a read-only memory, a random access memory, etc.) located outside the chip in a device.
  • the communication unit may also be referred to as a transceiver unit.
  • the antenna and control circuit with the transceiver function in the communication device 110 can be regarded as the communication unit 1102 of the communication device 110, and the processor with the processing function can be regarded as the processing unit 1101 of the communication device 110.
  • the device for implementing the receiving function in the communication unit 1102 may be regarded as a receiving unit, which is used to perform the receiving steps in the embodiment of the present application, and the receiving unit may be a receiver, a receiver, a receiving circuit, and the like.
  • the device for implementing the sending function in the communication unit 1102 can be regarded as a sending unit, the sending unit is used to perform the sending steps in the embodiment of the present application, and the sending unit can be a transmitter, a transmitter, a sending circuit, and the like.
  • the integrated unit in FIG. 11 is implemented in the form of a software function module and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the medium includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • Storage media for storing computer software products include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disks or optical disks, etc., which can store program codes Medium.
  • the unit in FIG. 11 may also be referred to as a module, for example, the processing unit may be referred to as a processing module.
  • the embodiment of the present application also provides a schematic diagram of the hardware structure of a communication device (denoted as the communication device 120).
  • the communication device 120 includes a processor 1201, and optionally, a communication device connected to the processor 1201. ⁇ Memory 1202.
  • the processor 1201 may be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of this application. integrated circuit.
  • the processor 1201 may also include multiple CPUs, and the processor 1201 may be a single-CPU processor or a multi-CPU processor.
  • the processor here may refer to one or more devices, circuits, or processing cores for processing data (for example, computer program instructions).
  • the memory 1202 may be a ROM or other types of static storage devices that can store static information and instructions, RAM, or other types of dynamic storage devices that can store information and instructions, or an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory).
  • read-only memory EEPROM
  • compact disc read-only memory, CD-ROM
  • optical disc storage including compact discs, laser discs, optical discs, digital universal discs, Blu-ray discs, etc.
  • magnetic disks A storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, and the embodiment of the present application does not impose any limitation on this.
  • the memory 1202 may exist independently, or may be integrated with the processor 1201. Wherein, the memory 1202 may contain computer program code.
  • the processor 1201 is configured to execute the computer program code stored in the memory 1202, so as to implement the method provided in the embodiment of the present application.
  • the communication device 120 further includes a transceiver 1203.
  • the processor 1201, the memory 1202, and the transceiver 1203 are connected by a bus.
  • the transceiver 1203 is used to communicate with other devices or a communication network.
  • the transceiver 1203 may include a transmitter and a receiver.
  • the device used for implementing the receiving function in the transceiver 1203 can be regarded as a receiver, and the receiver is used to perform the receiving steps in the embodiment of the present application.
  • the device used in the transceiver 1203 to implement the sending function can be regarded as a transmitter, and the transmitter is used to perform the sending steps in the embodiment of the present application.
  • the schematic structural diagram shown in FIG. 12 may be used to illustrate the structure of the host node or the wireless backhaul node involved in the foregoing embodiment.
  • the processor 1201 is used to control and manage the actions of the host node.
  • the processor 1201 is used to support the host node to execute the graph. 702 and 703 in 7, 700, 702, 703a, 703, 707, and 708 in Fig. 8, 901 and 902 in Fig. 9, 901, 902, 904 to 906 in Fig. 10, and/or embodiments of the present application Actions performed by the host node in other processes described in.
  • the processor 1201 may communicate with other network entities through the transceiver 1203, for example, communicate with the wireless backhaul node shown in FIG. 7.
  • the memory 1202 is used to store the program code and data of the host node.
  • the processor 1201 is used to control and manage the actions of the wireless backhaul node.
  • the processor 1201 is used to support
  • the wireless backhaul node executes 701 to 704 in Fig. 7, 701 to 709 in Fig. 8, 902 and 903 in Fig. 9, 902, 903, 905, and 906 in Fig. 10, and/or as described in the embodiment of the present application. Describe the actions performed by the wireless backhaul node in other processes.
  • the processor 1201 may communicate with other network entities through the transceiver 1203, for example, communicate with the host node shown in FIG. 7.
  • the memory 1202 is used to store the program code and data of the wireless backhaul node.
  • the processor 1201 includes a logic circuit and an input interface and/or an output interface. Among them, the output interface is used to execute the sending action in the corresponding method, and the input interface is used to execute the receiving action in the corresponding method.
  • FIG. 13 The schematic structural diagram shown in FIG. 13 may be used to illustrate the structure of the host node or the wireless backhaul node involved in the foregoing embodiment.
  • the processor 1201 is used to control and manage the actions of the host node.
  • the processor 1201 is used to support the host node to execute the graph. 702 and 703 in 7, 700, 702, 703a, 703, 707, and 708 in Fig. 8, 901 and 902 in Fig. 9, 901, 902, 904 to 906 in Fig. 10, and/or embodiments of the present application Actions performed by the host node in other processes described in.
  • the processor 1201 may communicate with other network entities through an input interface and/or an output interface, for example, communicate with the wireless backhaul node shown in FIG. 7.
  • the memory 1202 is used to store the program code and data of the host node.
  • the processor 1201 is used to control and manage the actions of the wireless backhaul node.
  • the processor 1201 is used to support
  • the wireless backhaul node executes 701 to 704 in Fig. 7, 701 to 709 in Fig. 8, 902 and 903 in Fig. 9, 902, 903, 905, and 906 in Fig. 10, and/or as described in the embodiment of the present application. Describe the actions performed by the wireless backhaul node in other processes.
  • the processor 1201 may communicate with other network entities through an input interface and/or an output interface, for example, with the host node shown in FIG. 7.
  • the memory 1202 is used to store the program code and data of the wireless backhaul node.
  • the embodiment of the present application also provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute any of the above-mentioned methods.
  • the embodiments of the present application also provide a computer program product containing instructions, which when run on a computer, cause the computer to execute any of the above-mentioned methods.
  • An embodiment of the present application also provides a communication system, including: the above-mentioned host node and a wireless backhaul node. Optionally, it also includes the aforementioned terminal.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • a software program it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • Computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • computer instructions may be transmitted from a website, computer, server, or data center through a cable (such as Coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or may include one or more data storage devices such as a server or a data center that can be integrated with the medium.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种通信方法及装置,该方法中,无线回传节点从终端接收随机接入请求,并将随机接入请求发送给宿主节点,还根据宿主节点发送的第一随机接入响应向终端发送第二随机接入响应,第二随机接入响应中包括无线回传节点为终端计算的时间提前量,无线回传节点通过监测和转发终端的随机接入过程中的消息,帮助终端完成在宿主节点的随机接入过程,相较现有技术,可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。

Description

通信方法及装置 技术领域
本申请涉及通信技术领域,尤其涉及一种通信方法及装置。
背景技术
无线中继(relay)技术具有部署方便灵活、相较于光纤等有线连接的成本较低等特点,因此,为了延伸无线网络的覆盖范围、降低成本以及提升容量,在多种制式的网络中,均考虑引入该技术。
采用无线中继技术的网络中,终端可以接入无线回传节点,并通过一个或多个无线回传节点接入宿主节点,进而通过宿主节点接入到核心网中。无线回传节点一方面可以为终端提供无线接入服务,使得终端接入网络,另一方面可以为终端提供无线回传服务,将终端的数据直接回传到宿主节点或通过父节点(例如,另一无线回传节点)回传到宿主节点。目前,不论是第四代(the 4th generation,4G)网络还是第五代(the 5th generation,5G)网络,无线回传节点的设计都较为复杂,成本较高。
发明内容
本申请实施例提供了一种通信方法及装置,用于降低无线回传节点的设计复杂度,进而降低无线回传节点的成本。
为达到上述目的,本申请提供了以下技术方案:
第一方面,提供了一种通信方法,包括:无线回传节点从终端接收随机接入请求,并将随机接入请求发送给宿主节点;无线回传节点从宿主节点接收第一随机接入响应,并根据第一随机接入响应向终端发送第二随机接入响应,第二随机接入响应中包括无线回传节点为终端计算的时间提前量。第一方面提供的方法,无线回传节点通过监测和转发终端的随机接入过程中的消息,帮助终端完成在宿主节点的随机接入过程。相较现有技术(无线回传节点自己处理随机接入请求并向终端发送RAR),可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
在一种可能的实现方式中,无线回传节点根据第一随机接入响应向终端发送第二随机接入响应,包括:无线回传节点将第一随机接入响应中携带的宿主节点为无线回传节点计算的时间提前量修改为无线回传节点为终端计算的时间提前量,得到第二随机接入响应,并向终端发送第二随机接入响应;或者,无线回传节点将无线回传节点为终端计算的时间提前量添加至第一随机接入响应中的用于指示时间提前量的信元中,得到第二随机接入响应,并向终端发送第二随机接入响应。该种可能的实现方式,由于与终端直接通信的节点为无线回传节点,因此,无线回传节点需要将为终端计算的时间提前量发送给终端,以便终端在合适的时间发送上行数据,保证无线回传节点正确接收上行数据。
在一种可能的实现方式中,该方法还包括:无线回传节点从宿主节点接收用于配置传输或调度第二随机接入响应的资源的第一配置信息。该种可能的实现方式,宿主 节点可以为无线回传节点配置传输或调度第二随机接入响应的资源,该情况下,无线回传节点不需要自己确定传输或调度第二随机接入响应的资源,从而进一步简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
在一种可能的实现方式中,该方法还包括:无线回传节点从终端接收包括终端的冲突解决标识的上行消息,记录上行消息中的终端的冲突解决标识,并将上行消息转发给宿主节点。其中,上行消息为终端根据第二随机接入响应向无线回传节点发送的消息。
在一种可能的实现方式中,该方法还包括:无线回传节点从宿主节点接收下行消息,在确定下行消息中携带终端的冲突解决标识的情况下,将下行消息转发给终端。其中,下行消息为宿主节点根据上行消息向无线回传节点发送的消息。该种可能的实现方式,当有多个终端同时进行基于竞争的随机接入时,无线回传节点只需要向其服务的、且在随机接入过程中成功的终端转发下行消息即可,不需要转发宿主节点的所有下行消息(例如,发送给其他无线回传节点服务的终端的消息),从而可以节约信令开销。
在一种可能的实现方式中,该方法还包括:无线回传节点从宿主节点接收用于为终端配置第一链路包含的协议层对应的参数的第二配置信息,并向终端发送第二配置信息。其中,第一链路为无线回传节点和终端之间的链路,第二配置信息为宿主节点生成的。该种可能的实现方式,宿主节点通过无线回传节点的辅助,执行对第一链路包含的协议层对应的参数的配置。相较现有技术(无线回传节点为第一链路包含的协议层对应的参数进行配置),可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
在一种可能的实现方式中,第二配置信息中包括以下信息中的一个或多个:1)第一指示信息,第一指示信息用于指示第二配置信息针对的链路;2)宿主节点分配的第一链路上终端的每个逻辑信道的标识以及每个逻辑信道的配置。
在一种可能的实现方式中,该方法还包括:无线回传节点从宿主节点接收用于为无线回传节点配置第一链路包含的协议层对应的参数的第三配置信息,第三配置信息为宿主节点生成的。该种可能的实现方式,宿主节点为无线回传节点执行对第一链路包含的协议层对应的参数的配置。相较现有技术,可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
在一种可能的实现方式中,第三配置信息包括以下信息中的一个或多个:1)第二指示信息,第二指示信息用于指示第三配置信息针对的链路;2)宿主节点分配的第一链路上无线回传节点的每个逻辑信道的标识以及每个逻辑信道的配置;3)第一链路和第二链路上的逻辑信道的标识的映射关系,第二链路为无线回传节点和宿主节点之间的链路。
第二方面,提供了一种通信方法,包括:无线回传节点从宿主节点接收第二配置信息,第二配置信息用于为终端配置第一链路包含的协议层对应的参数,第一链路为无线回传节点和终端之间的链路,第二配置信息为宿主节点生成的;无线回传节点向终端发送第二配置信息。第二方面提供的方法,宿主节点通过无线回传节点的辅助,执行对第一链路包含的协议层对应的参数的配置。相较现有技术(无线回传节点为第 一链路包含的协议层对应的参数进行配置),可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
在一种可能的实现方式中,第二配置信息中包括以下信息中的一个或多个:1)第一指示信息,第一指示信息用于指示第二配置信息针对的链路;2)宿主节点分配的第一链路上终端的每个逻辑信道的标识以及每个逻辑信道的配置。
在一种可能的实现方式中,该方法还包括:无线回传节点从宿主节点接收第三配置信息,第三配置信息用于为无线回传节点配置第一链路包含的协议层对应的参数,第三配置信息为宿主节点生成的。该种可能的实现方式,宿主节点为无线回传节点执行对第一链路包含的协议层对应的参数的配置。相较现有技术,可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
在一种可能的实现方式中,第三配置信息包括以下信息中的一个或多个:1)第二指示信息,第二指示信息用于指示第三配置信息针对的链路;2)宿主节点分配的第一链路上无线回传节点的每个逻辑信道的标识以及每个逻辑信道的配置;3)第一链路和第二链路上的逻辑信道的标识的映射关系,第二链路为无线回传节点和宿主节点之间的链路。
第三方面,提供了一种通信方法,包括:宿主节点生成用于为终端配置第一链路包含的协议层对应的参数的第二配置信息,并向无线回传节点发送第二配置信息。其中,第一链路为无线回传节点和终端之间的链路。第三方面提供的方法,宿主节点通过无线回传节点的辅助,执行对第一链路包含的协议层对应的参数的配置。相较现有技术(无线回传节点为第一链路包含的协议层对应的参数进行配置),可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
在一种可能的实现方式中,第二配置信息中包括以下信息中的一个或多个:1)第一指示信息,第一指示信息用于指示第二配置信息针对的链路;2)宿主节点分配的第一链路上终端的每个逻辑信道的标识以及每个逻辑信道的配置。
在一种可能的实现方式中,该方法还包括:宿主节点向无线回传节点发送用于为无线回传节点配置第一链路包含的协议层对应的参数的第三配置信息。该种可能的实现方式,宿主节点为无线回传节点执行对第一链路包含的协议层对应的参数的配置。相较现有技术,可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
在一种可能的实现方式中,第三配置信息包括以下信息中的一个或多个:1)第二指示信息,第二指示信息用于指示第三配置信息针对的链路;2)宿主节点分配的第一链路上无线回传节点的每个逻辑信道的标识以及每个逻辑信道的配置;3)第一链路和第二链路上的逻辑信道的标识的映射关系,第二链路为无线回传节点和宿主节点之间的链路。
第四方面,提供了一种通信装置,包括:处理单元和通信单元;处理单元,用于通过通信单元从终端接收随机接入请求,并将随机接入请求发送给宿主节点;处理单元,还用于通过通信单元从宿主节点接收第一随机接入响应;处理单元,还用于根据第一随机接入响应通过通信单元向终端发送第二随机接入响应,第二随机接入响应中包括该装置为终端计算的时间提前量。
在一种可能的实现方式中,处理单元,具体用于将第一随机接入响应中携带的宿主节点为该装置计算的时间提前量修改为该装置为终端计算的时间提前量,得到第二随机接入响应,并通过通信单元向终端发送第二随机接入响应;或者,处理单元,具体用于将该装置为终端计算的时间提前量添加至第一随机接入响应中的用于指示时间提前量的信元中,得到第二随机接入响应,并通过通信单元向终端发送第二随机接入响应。
在一种可能的实现方式中,处理单元,还用于通过通信单元从宿主节点接收第一配置信息,第一配置信息用于配置传输或调度第二随机接入响应的资源。
在一种可能的实现方式中,处理单元,还用于通过通信单元从终端接收上行消息,上行消息中包括终端的冲突解决标识,上行消息为终端根据第二随机接入响应向该装置发送的消息;处理单元,还用于记录上行消息中的终端的冲突解决标识,并通过通信单元将上行消息转发给宿主节点。
在一种可能的实现方式中,处理单元,还用于通过通信单元从宿主节点接收下行消息,下行消息为宿主节点根据上行消息向该装置发送的消息;在确定下行消息中携带终端的冲突解决标识的情况下,处理单元,还用于通过通信单元将下行消息转发给终端。
在一种可能的实现方式中,处理单元,还用于通过通信单元从宿主节点接收第二配置信息,第二配置信息用于为终端配置第一链路包含的协议层对应的参数,第一链路为该装置和终端之间的链路,第二配置信息为宿主节点生成的;处理单元,还用于通过通信单元向终端发送第二配置信息。
在一种可能的实现方式中,第二配置信息中包括以下信息中的一个或多个:1)第一指示信息,第一指示信息用于指示第二配置信息针对的链路;2)宿主节点分配的第一链路上终端的每个逻辑信道的标识以及每个逻辑信道的配置。
在一种可能的实现方式中,处理单元,还用于通过通信单元从宿主节点接收第三配置信息,第三配置信息用于为该装置配置第一链路包含的协议层对应的参数,第三配置信息为宿主节点生成的。
在一种可能的实现方式中,第三配置信息包括以下信息中的一个或多个:1)第二指示信息,第二指示信息用于指示第三配置信息针对的链路;2)宿主节点分配的第一链路上该装置的每个逻辑信道的标识以及每个逻辑信道的配置;3)第一链路和第二链路上的逻辑信道的标识的映射关系,第二链路为该装置和宿主节点之间的链路。
第五方面,提供了一种通信装置,包括:处理单元和通信单元;处理单元,用于通过通信单元从宿主节点接收第二配置信息,第二配置信息用于为终端配置第一链路包含的协议层对应的参数,第一链路为该装置和终端之间的链路,第二配置信息为宿主节点生成的;处理单元,还用于通过通信单元向终端发送第二配置信息。
在一种可能的实现方式中,第二配置信息中包括以下信息中的一个或多个:1)第一指示信息,第一指示信息用于指示第二配置信息针对的链路;2)宿主节点分配的第一链路上终端的每个逻辑信道的标识以及每个逻辑信道的配置。
在一种可能的实现方式中,处理单元,还用于通过通信单元从宿主节点接收第三配置信息,第三配置信息用于为该装置配置第一链路包含的协议层对应的参数,第三 配置信息为宿主节点生成的。
在一种可能的实现方式中,第三配置信息包括以下信息中的一个或多个:1)第二指示信息,第二指示信息用于指示第三配置信息针对的链路;2)宿主节点分配的第一链路上该装置的每个逻辑信道的标识以及每个逻辑信道的配置;3)第一链路和第二链路上的逻辑信道的标识的映射关系,第二链路为该装置和宿主节点之间的链路。
第六方面,提供了一种通信装置,包括:处理单元和通信单元;处理单元,用于生成第二配置信息,第二配置信息用于为终端配置第一链路包含的协议层对应的参数,第一链路为无线回传节点和终端之间的链路;通信单元,用于向无线回传节点发送第二配置信息。
在一种可能的实现方式中,第二配置信息中包括以下信息中的一个或多个:1)第一指示信息,第一指示信息用于指示第二配置信息针对的链路;2)该装置分配的第一链路上终端的每个逻辑信道的标识以及每个逻辑信道的配置。
在一种可能的实现方式中,通信单元,还用于向无线回传节点发送第三配置信息,第三配置信息用于为无线回传节点配置第一链路包含的协议层对应的参数。
在一种可能的实现方式中,第三配置信息包括以下信息中的一个或多个:1)第二指示信息,第二指示信息用于指示第三配置信息针对的链路;2)该装置分配的第一链路上无线回传节点的每个逻辑信道的标识以及每个逻辑信道的配置;3)第一链路和第二链路上的逻辑信道的标识的映射关系,第二链路为无线回传节点和该装置之间的链路。
第七方面,提供了一种通信装置,包括:处理器。处理器与存储器连接,存储器用于存储计算机执行指令,处理器执行存储器存储的计算机执行指令,从而实现第一方面至第三方面中的任一方面提供的任意一种方法。其中,存储器和处理器可以集成在一起,也可以为独立的器件。若为后者,存储器可以位于通信装置内,也可以位于通信装置外。
在一种可能的实现方式中,处理器包括逻辑电路,还包括输入接口和输出接口中的至少一个。其中,输出接口用于执行相应方法中的发送的动作,输入接口用于执行相应方法中的接收的动作。
在一种可能的实现方式中,通信装置还包括通信接口和通信总线,处理器、存储器和通信接口通过通信总线连接。通信接口用于执行相应方法中的收发的动作。通信接口也可以称为收发器。可选的,通信接口包括发送器和接收器中的至少一种,该情况下,发送器用于执行相应方法中的发送的动作,接收器用于执行相应方法中的接收的动作。
在一种可能的实现方式中,通信装置以芯片的产品形态存在。
第八方面,提供了一种通信系统,包括:上述第四方面或第五方面提供的通信装置和上述第六方面提供的通信装置。
第九方面,提供了一种计算机可读存储介质,包括指令,当该指令在计算机上运行时,使得计算机执行第一方面至第三方面中的任一方面提供的任意一种方法。
第十方面,提供了一种包含指令的计算机程序产品,当该指令在计算机上运行时,使得计算机执行第一方面至第三方面中的任一方面提供的任意一种方法。
第四方面至第十方面中的任一种实现方式所带来的技术效果可参见第一方面至第三方面中的对应实现方式所带来的技术效果,此处不再赘述。
附图说明
图1至图3分别为本申请实施例提供的一种通信场景示意图;
图4为一种随机接入方法的流程图;
图5和图6分别为一种链路配置方法的流程图;
图7和图8为本申请实施例提供的一种随机接入方法的流程图;
图9和图10分别为本申请实施例提供的一种链路配置方法的流程图;
图11为本申请实施例提供的一种通信装置的组成示意图;
图12和图13分别为本申请实施例提供的一种通信装置的硬件结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B。本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。
另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
本申请实施例提供的方法可以应用于4G、5G、无线局域网(wireless local area networks,WLAN)等网络中,还可以应用于未来演进的网络或多种通信融合的网络中。其中,4G网络也可以称为长期演进(long term evolution,LTE)网络或演进分组系统(evolved packet system,EPS)。5G网络也可以称为新无线(new radio,NR)网络。网络也可以称为通信系统。
具体的,本申请实施例提供的方法可以应用于这些网络中的无线中继场景中。无线中继场景即应用无线中继技术的场景,无线中继技术的应用场景十分广泛,除了典型的室外无线覆盖,在室内无线覆盖场景,也可以用到无线中继技术。例如,家庭接入场景或终端协作的中继场景等。
在无线中继场景中,参见图1、图2和图3,终端通过一个或多个无线回传节点接入宿主节点(donor node),宿主节点通过有线链路接入到核心网。
在无线中继场景中,为了设计灵活便利的接入和回传方案,接入链路(access link,AL)和回传链路(backhaul link,BL)均采用无线传输方案。终端可以通过无线接入链路接入无线回传节点,无线回传节点可以通过无线回传链路将终端的数据回传给其父节点。其中,一个无线回传节点的父节点是指接收该无线回传节点发送的上行数据的节点。例如,在图2中,无线回传节点1的父节点为无线回传节点2,无线回传节点2的父节点为宿主节点。其中,终端和无线回传节点之间通过Uu接口通信,无线回传节点之间以及无线回传节点和宿主节点之间通过Un接口通信。
无线中继场景可以包括以下几种场景:
场景1、单跳中继组网场景
在场景1下,参见图1,终端可以接入一个无线回传节点,并通过一个无线回传节点接入宿主节点(donor node)。
场景2、多跳中继组网场景
在场景2下,终端可以接入一个无线回传节点,并通过多个无线回传节点(例如,2个,3个,4个甚至更多个无线回传节点)接入宿主节点。示例性的,参见图2,终端可以通过无线回传节点1和无线回传节点2接入宿主节点。
场景3、多连接组网场景
在场景3下,终端可以接入多个无线回传节点,或者,终端同时接入无线回传节点和宿主节点,或者,无线回传节点同时连接到至少两个父节点,父节点可以为其他无线回传节点或宿主节点。示例性的,参见图3,终端可以接入无线回传节点1和无线回传节点3,无线回传节点1通过无线回传节点2接入宿主节点,无线回传节点3直接接入宿主节点。
在上述场景中,终端用于向用户提供语音服务和数据连通性服务中的一种或多种。终端还可以称为用户设备(user equipment,UE)、终端设备、接入终端、用户单元、用户站、移动站、远方站、远程终端、移动设备、用户终端、无线通信设备、用户代理或用户装置。终端还可以是移动站(mobile station,MS)、用户单元(subscriber unit)、无人机、平板型电脑、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)设备、膝上型电脑(laptop computer)、机器类型通信(machine type communication,MTC)终端、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备(也可以称为穿戴式智能设备)等。
在上述场景中,无线回传节点的形态可以有多种,例如,无线回传节点可以为中继节点(relay node,RN)、接入回传一体化(integrated access and backhaul,IAB)节点等。在终端协作的中继场景中,例如,在为低功耗的可穿戴设备提供无线覆盖的场景中,无线回传节点还可以为终端,终端(例如,手机)作为无线回传节点接入到基站(此时,该基站即宿主节点),基于设备到设备(device to device,D2D)通信机制,为可穿戴设备提供无线接入。在家庭接入场景中,无线回传节点还可以为用于提供室内覆盖的用户驻地设备(customer premises equipment,CPE),CPE可以接入到基站(此时,该基站即宿主节点),并为室内用户提供无线覆盖。
在4G网络中,无线回传节点可以为RN,宿主节点可以为演进型基站(evolved NodeB,eNB),核心网可以为演进分组核心网(evolved packet core,EPC),此时,宿主节点和核心网之间的接口为S1接口。
在5G网络中,无线回传节点可以为IAB节点。根据目前针对IAB网络(即包含IAB节点的网络)的研究,IAB节点可以具有移动终端(mobile terminal,MT)的角色以及分布式单元(distributed unit,DU)的角色。当IAB节点面向其父节点时,可以被看做是终端。此时,IAB节点扮演MT的角色。当IAB节点面向其子节点(子节点可能是终端或另一IAB节点的终端部分)时,可以被看做是网络设备。此时,IAB节点扮演DU的角色。因此,可以认为IAB节点由MT部分和DU部分组成。一个IAB 节点可以通过MT部分与该IAB节点的至少一个父节点之间建立回传连接。一个IAB节点的DU部分可以为终端或其他IAB节点的MT部分提供接入服务。宿主节点可以为下一代基站节点(next generation node base station,gNB),核心网可以为5G网络的核心网(5G core,5GC),此时,宿主节点和核心网之间的接口为下一代(next generation,NG)接口。其中,宿主节点也可以称为IAB宿主(IAB donor)或宿主gNB(donor gNB,DgNB)。
本申请实施例中的宿主节点可以是一个完整的实体,还可以是集中式单元(centralized unit,CU)(本文中简称为Donor-CU)和DU(本文中简称为Donor-DU)分离的形态,即宿主节点由Donor-CU和Donor-DU组成。其中,Donor-CU还可以是用户面(User plane,UP)(本文中简称为CU-UP)和控制面(Control plane,CP)(本文中简称为CU-CP)分离的形态,即Donor-CU由CU-CP和CU-UP组成。
为了使得本申请实施例更加的清楚,以下对本申请实施例涉及到的部分内容作简单介绍。
1、时间提前量(timing advance,TA)
上行传输的一个重要特征是来自同一小区的不同终端的上行传输之间互不干扰。
为了避免小区内(intra-cell)干扰,网络设备要求来自同一子帧但不同频域资源(例如,不同的资源块(resource block,RB))的不同终端的信号到达网络设备的时间基本上是对齐的。网络设备只要在循环前缀(Cyclic Prefix,CP)范围内接收到终端所发送的上行数据,就能够正确地解码上行数据,因此,上行同步要求来自同一子帧的不同终端的信号到达网络设备的时间都落在CP之内。
为此,提出了上行定时提前(Uplink Timing Advance)的机制。在终端看来,TA本质上是接收到下行子帧的起始时间与传输上行子帧的时间之间的一个负偏移(negative offset)。网络设备通过适当地控制每个终端的偏移,可以控制来自不同终端的上行信号到达网络设备的时间。对于离网络设备较远的终端,由于有较大的传输延迟,就要比离网络设备较近的终端提前发送上行数据。
2、现有的无线中继场景中的随机接入机制
随机接入过程用于终端与小区建立连接并获得上行同步。随机接入的种类分为两种:基于竞争和基于非竞争。
4G网络无线中继场景中的随机接入机制:
参见图4,4G网络无线中继场景中的基于竞争的随机接入过程包括以下步骤401至步骤404,基于非竞争的随机接入过程包括以下步骤401和步骤402。
401、终端向RN发送消息1(Msg1),Msg1包括随机接入前导码(preamble)。
Msg1可以告诉RN有一个随机接入请求,同时使得RN能估计其与终端之间的传输时延并以此确定上行TA。Msg1可以承载在物理随机接入信道(physical random access channel,PRACH)上。
其中,基于竞争的随机接入,PRACH资源和preamble是由终端选择的,不同的终端可能同时选择同一个PRACH资源和同一个preamble,从而导致冲突的出现,这时就需要一个冲突解决机制(即步骤403和步骤404)来解决这个问题。
基于非竞争的随机接入,终端已经拥有在接入的小区内的唯一标识小区无线网络 临时标识(cell-radio network temporary identifier,C-RNTI),且PRACH资源和preamble是由RN指定的,从而保证不会与其它终端发生冲突,也就不需要冲突解决机制(即步骤403和步骤404)。
402、RN向终端发送消息2(Msg2)。
其中,Msg2可以是随机接入响应(random access response,RAR)。
403、终端向RN发送消息3(Msg3)。
Msg3中需要包含一个重要信息:终端的冲突解决标识(UE contention resolution identity),该标识将用于步骤404的冲突解决。
404、RN向终端发送消息4(Msg4),指示终端随机接入的竞争结果。
RN在冲突解决机制中,会在Msg4中携带终端的冲突解决标识以指定在冲突解决中成功的终端,其它没有在冲突解决中成功的终端将重新发起随机接入。
需要说明的是,若终端在发送Msg3时携带了其已经在接入小区获得的可用的C-RNTI(例如,在Msg3中携带C-RNTI MAC控制元素(control element,CE)),那么若终端在Msg4中接收到的物理下行控制信道(physical downlink control channel,PDCCH)由终端的C-RNTI加扰,则终端认为冲突解决成功,确认随机接入成功;或者,终端在接入的小区中还未获得可用的C-RNTI,其接收到的Msg4的PDCCH由RAR中指定的临时的小区无线网络临时标识(TC-RNTI)加扰,终端接收到Msg4进行解码后,若发现Msg4中携带的终端的冲突解决标识与自己在Msg3中携带的公共控制信道(common control channel,CCCH)业务数据单元(service data unit,SDU)匹配时,确定冲突解决成功,即随机接入成功,否则,确定随机接入失败。其中,当Msg3中携带的CCCH SDU长度大于或等于终端的冲突解决标识的长度(例如,长度为N比特)时,比较CCCH SDU的前N个比特与终端的冲突解决标识是否一致即可,一致则认为两者匹配,否则认为两者不匹配。
3、现有的无线中继场景中的链路配置机制
4G网络中,参见图5,链路配置过程包括:宿主节点向RN发送配置信息1,配置信息1用于为RN配置宿主节点和RN之间的链路包含的协议层对应的参数;RN为自己配置RN和终端之间的链路包含的协议层对应的参数,还向终端发送配置信息2,配置信息2用于为终端配置RN和终端之间的链路包含的协议层对应的参数。
5G网络中,链路配置的一种可能的实现方式可参见图6,包括:宿主节点向IAB节点发送配置信息1,配置信息1用于为IAB节点配置宿主节点和IAB节点之间的链路包含的协议层对应的参数;IAB节点为自己配置IAB节点和终端之间的链路包含的协议层对应的参数,并向宿主节点发送配置信息2,配置信息2包括用于为终端配置IAB节点和终端之间的链路包含的分组数据汇聚协议(packet data convergence protocol,PDCP)层以下的协议层对应的参数的信息,宿主节点通过IAB节点向终端发送配置信息3,配置信息3用于为终端配置IAB节点和终端之间的链路包含的协议层对应的参数。
基于上述描述,可以理解的是,4G网络中的无线回传节点,需要支持终端的随机接入,并且需要对终端的无线接入链路进行配置。5G网络中的无线回传节点,也需要 对终端的无线接入链路进行配置。那么,无线回传节点的功能就需要非常完善,成本也就较高。
为了满足低成本的无线覆盖需求,本申请实施例提供了一种通信方法(也可以称为随机接入方法),该方法中,通过将无线回传节点支持的随机接入的功能移至宿主节点进行处理,以简化无线回传节点的设计。参见图7,该方法包括:
701、终端向无线回传节点发送随机接入请求。相应的,无线回传节点从终端接收随机接入请求。
示例性的,在一种可能的情况下,随机接入请求可以为上述Msg1。随机接入请求中可以包括preamble。
702、无线回传节点将随机接入请求发送给宿主节点。相应的,宿主节点从无线回传节点接收随机接入请求。
其中,当宿主节点为CU和DU分离的架构时,本申请实施例中宿主节点执行的动作具体可以由Donor-CU执行。进一步的,当Donor-CU为CP和UP分离的架构时,本申请实施例中宿主节点执行的动作具体可以由CU-CP执行。
其中,无线回传节点发送随机接入请求中的preamble时,需要和终端使用相同的preamble格式,即无线回传节点发送的preamble和接收到的终端发送的preamble为同一个preamble。
当preamble和PRACH资源对应时,无线回传节点和终端使用相同的preamble格式,也就意味着无线回传节点发送preamble使用的PRACH资源与终端相同。这里的相同并不是指时频资源完全相同,而是指使用的都是终端发送的preamble对应的PRACH资源,该PRACH资源在时域上可能是周期性出现的,此时,无线回传节点发送preamble使用的PRACH资源与终端发送preamble使用的PRACH资源可以是同一个周期内的,也可以是不同周期内的。例如,无线回传节点发送preamble使用的PRACH资源与终端发送preamble使用的PRACH资源可以错开一个PRACH资源周期。再例如,无线回传节点发送preamble使用的PRACH资源与终端发送preamble使用的PRACH资源可以是同一个周期内的PRACH资源的不同时隙上的资源。
当preamble不与PRACH资源对应时,无线回传节点只需要保证发送的preamble和接收到的终端发送的preamble为同一个preamble即可,所采用的PRACH资源可以自己进行选择。
703、宿主节点根据随机接入请求向无线回传节点发送RAR(记为第一RAR)。相应的,无线回传节点从宿主节点接收第一RAR。
其中,第一RAR中可以包括TA,也可以不包括TA。需要说明的是,由于宿主节点是从无线回传节点接收到的随机接入请求,因此,宿主节点根据随机接入请求只能为无线回传节点计算TA,因此,若第一RAR中包括TA,则该TA为宿主节点为无线回传节点计算的TA。
704、无线回传节点根据第一RAR向终端发送RAR(记为第二RAR),第二RAR中包括无线回传节点为终端计算的TA。
由于与终端直接通信的节点为无线回传节点,因此,无线回传节点需要将为终端计算的TA发送给终端,以便终端在合适的时间发送上行数据,保证无线回传节点正确 接收上行数据。
其中,无线回传节点可以根据步骤701中接收到的随机接入请求为终端计算TA。示例性的,无线回传节点为终端计算的TA为无线回传节点与终端之间的传输时延的两倍。
可选的,步骤704在具体实现时可以通过以下方式一或方式二实现。
方式一
无线回传节点将第一RAR中携带的宿主节点为无线回传节点计算的TA修改为无线回传节点为终端计算的TA,得到第二RAR,并向终端发送第二RAR。
方式一适用于第一RAR中包括TA的情况。
方式二
无线回传节点将无线回传节点为终端计算的TA添加至第一RAR中的用于指示TA的信元中,得到第二RAR,并向终端发送第二RAR。
方式二适用于第一RAR中不包括TA的情况。
本申请实施例提供的方法,无线回传节点通过监测和转发终端的随机接入过程中的消息,帮助终端完成在宿主节点的随机接入过程。相较现有技术(无线回传节点自己处理随机接入请求并向终端发送RAR),该实施例提供的方法可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
可选的,参见图8,在步骤701之前,该方法还包括:
700、宿主节点确定无线回传节点的节点类型。
无线回传节点接入宿主节点的方式,可以沿用终端接入宿主节点的方式。但是由于无线回传节点需要在终端和宿主节点之间执行信令和数据的转发处理,故其与普通终端有一定区别。因此,宿主节点需要确定无线回传节点的节点类型。节点类型包括:终端和无线回传节点。
步骤700在具体实现时可以通过以下方式1或方式2实现。
方式1
无线回传节点向宿主节点发送指示信息(记为指示信息1),指示信息1用于指示自身为无线回传节点或指示自身具备无线回传节点的能力。
其中,无线回传节点的能力包括以下一种或多种:将终端的上行数据回传至其他无线回传节点或宿主节点的能力,为终端提供无线接入服务的能力。
方式2
宿主节点从核心网设备接收指示信息(记为指示信息2)以及无线回传节点的标识,指示信息2以及无线回传节点的标识表明该无线回传节点被核心网设备认证为无线回传节点。其中,核心网设备在对无线回传节点进行认证后,可以由接入和移动管理功能(core access and mobility management function,AMF)通过NG接口或由移动性管理网元(mobility management entity,MME)通过S1接口,向宿主节点发送指示信息2确认无线回传节点的节点类型。
可选的,参见图8,在步骤704之前,该方法还包括:
703a、宿主节点向无线回传节点发送第一配置信息,第一配置信息用于配置传输和/或调度第二RAR的资源。相应的,无线回传节点从宿主节点接收第一配置信息。
示例性的,第一配置信息可以为RRC消息。
其中,宿主节点可以为无线回传节点配置传输RAR的资源,也可以为无线回传节点配置调度RAR的资源,还可以为无线回传节点既配置传输RAR的资源,也配置调度RAR的资源。其中,传输RAR的资源可以为物理下行共享信道(physical downlink shared channel,PDSCH)资源,调度RAR的资源可以为PDCCH资源。该情况下,无线回传节点不需要自己确定传输和/或调度RAR的资源,从而进一步简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
无线回传节点可以根据第一配置信息确定传输和/或调度RAR的资源,并采用该资源向终端发送RAR,例如,在该资源中选择一个资源发送上述第二RAR。
其中,步骤703a和步骤701至步骤703中的任意一个步骤的执行顺序不分先后。
本申请实施例中的随机接入方法可以是基于竞争的,也可以是基于非竞争的。若为前者,在步骤704之后,上述方法还包括以下步骤705至步骤709,若为后者,上述方法不包括以下步骤705至步骤709。
705、终端根据第二RAR向无线回传节点发送上行消息。相应的,无线回传节点从终端接收上行消息。
其中,上行消息中包括终端的冲突解决标识,该标识用于冲突解决,因此,也可以称为冲突解决标识(contention resolution ID)。终端的冲突解决标识可以为终端的C-RNTI或来自核心网的终端标识(例如,服务临时移动用户标识(serving-temporary mobile subscriber identity,S-TMSI)或一个随机数)等。
示例性的,终端的冲突解决标识可以携带在媒介接入控制(medium access control,MAC)控制元素(control element,CE)中,也可以携带在上行的CCCHSDU中。其中,上行CCCH SDU可以包括上行RRC消息,例如RRC连接请求消息,或者RRC连接建立请求消息。
示例性的,上行消息可以为上述Msg3,Msg3中具体可以包括以下中的任意一项:RRC连接建立请求(RRC setup request)、RRC恢复请求(RRC resume request)、RRC重建立请求(RRC reestablishment request)等。
706、无线回传节点记录上行消息中的终端的冲突解决标识。
707、无线回传节点将上行消息转发给宿主节点。相应的,宿主节点从无线回传节点接收上行消息。
708、宿主节点根据上述上行消息向无线回传节点发送下行消息。相应的,无线回传节点从宿主节点接收下行消息。
其中,下行消息中可以包括竞争成功的终端的冲突解决标识。
示例性的,下行消息可以为上述Msg4,Msg4中具体可以包括以下中的任意一项:RRC建立消息(RRC setup)、RRC拒绝消息(RRC reject)等。
709、在确定下行消息中携带终端的冲突解决标识的情况下,无线回传节点将下行消息转发给终端。
其中,宿主节点在冲突解决机制中,会在下行消息中携带终端的冲突解决标识以指定在冲突解决中成功的终端,其它没有在冲突解决中成功的终端将重新发起随机接入。因此,当无线回传节点确定下行消息中携带终端的冲突解决标识的情况下,说明 该终端在冲突解决中成功。
终端接收到下行消息之后,确定随机接入是否成功的方法可以与LTE中的终端类似(具体可以参见上述步骤404相关的描述,此处不再赘述),也可以为其他的方法,本申请不作限制。
步骤706至步骤709的实现中,当有多个终端同时进行基于竞争的随机接入时,无线回传节点只需要向其服务的、且在随机接入过程中成功的终端转发下行消息即可,不需要转发宿主节点的所有下行消息(例如,发送给其他无线回传节点服务的终端的消息),从而可以节约信令开销。
在图8所示的方法中,终端发送的随机接入请求和上行消息可以携带在同一条消息中发送,若将该消息记为消息A,则无线回传节点发送的随机接入请求和上行消息可以替换为消息A。宿主节点发送的第一RAR和下行消息可以携带在同一条消息中发送,将该消息记为消息C,则无线回传节点发送的第二RAR和下行消息也可以携带在同一条消息中发送,将该消息记为消息B。该情况下,步骤703a可以不存在,宿主节点可以提前为终端和无线回传节点配置发送消息A、消息B和消息C中的一个或多个消息的资源。此时,终端是通过2步随机接入过程(即发送消息A和接收消息B这两步)接入网络的。
示例性的,终端可以确定2步随机接入过程的PRACH资源和数据资源,在PRACH资源上发送消息A,在数据资源上发送消息B。终端在发送消息A后,接收消息B。若终端验证消息B包含的竞争解决信息是成功的,那么随机接入成功。若宿主节点解码消息A不成功,可发送响应信息通知终端进行4步随机接入过程(即通过图8所示的701、704、705和709这4步)或通知终端继续进行2步随机接入过程。
需要说明的是,在2步随机接入过程中,终端接入的无线回传节点在发送消息B时,也是需要携带无线回传节点为终端计算的TA的(具体可通过上述方式一或方式二实现),并且在接收到消息A后也是需要记录终端的冲突解决标识的。
另外,2步随机接入过程中的消息也可以有其他的名称,不仅限于本申请中的消息A和消息B。例如,也可以称为第一消息、第二消息等。
本申请实施例还提供了一种通信方法(也可以称为链路配置方法),该方法中,将对终端的无线接入链路进行配置的功能移至宿主节点进行处理,进一步简化无线回传节点的设计。参见图9,该方法包括:
901、宿主节点生成第二配置信息,第二配置信息用于为终端配置第一链路包含的协议层对应的参数。
其中,第一链路为无线回传节点和终端之间的链路。
第二配置信息中可以包括以下信息中的一个或多个:
1)指示信息(记为第一指示信息),第一指示信息用于指示第二配置信息针对的链路。具体的,第一指示信息可以为第一链路的标识和/或终端的标识,第一链路的标识用于表明第二配置信息针对的链路为第一链路,终端的标识用于表明第二配置信息针对的链路为终端的无线接入链路(即第一链路)。终端的标识还可以指示第二配置信息是发送给终端的配置信息。示例性的,终端的标识,可以为终端的C-RNTI,也可以为“终端接入的小区标识+终端在该小区中的C-RNTI”,其中,终端接入的小区是 无线回传节点服务的小区,或者说是宿主节点服务的小区。
其中,链路的标识可以为链路两端的节点的标识,例如,第一链路的标识可以为:无线回传节点的标识+终端的标识。
2)宿主节点分配的第一链路上终端的每个逻辑信道的标识(logical channel identifier,LCID)以及每个逻辑信道的配置。
其中,每个逻辑信道的标识以及每个逻辑信道的配置可以是终端的无线承载粒度的。终端的无线承载具体可以是终端的数据无线承载(data radio bearer,DRB)或者信令无线承载(signaling radio bearer,SRB)。
其中,每个逻辑信道的标识以及每个逻辑信道的配置可以携带在无线链路控制(radio link control,RLC)承载的配置中。第二配置信息所包含的RLC承载的配置可以包括:添加或释放的RLC承载列表。针对每个待添加的RLC承载,其包含的配置内容包括以下中的至少一项:逻辑信道的标识,服务的RB的标识,是否重建RLC,RLC的配置(例如,RLC的模式,RLC层的各类定时器的设置)、逻辑信道的配置(例如,逻辑信道的优先级,逻辑信道对应的逻辑信道组,逻辑信道的保证比特速率(prioritised bit rate,PBR),逻辑信道的令牌桶尺寸(bucket size duration,BSD)等)
另外,第二配置信息还可以配置小区组标识(cell group ID)、小区组的MAC层的配置、小区组的物理层的配置等。
902、宿主节点向无线回传节点发送第二配置信息。相应的,无线回传节点从宿主节点接收第二配置信息。
无线回传节点可以根据第二配置信息中的终端的标识确定第二配置信息是针对终端的。
示例性的,第二配置信息可以携带在RRC消息中。
903、无线回传节点向终端发送第二配置信息。
步骤903在具体实现时,无线回传节点可以直接将第二配置信息转发给终端,也可以将第二配置信息中的第一指示信息删除后发送给终端。进一步的,无线回传节点还可以在第二配置信息中添加无线回传节点的标识后发送给终端,以便在终端接入多个无线回传节点的情况下,确定第二配置信息配置的是与哪个无线回传节点之间的链路。当然,无线回传节点的标识也可以由宿主节点直接添加在第二配置信息中,此时,无线回传节点就不需要在第二配置信息中添加无线回传节点的标识。
可选的,参见图10,该方法还包括:
904、宿主节点生成第三配置信息,第三配置信息用于为无线回传节点配置第一链路包含的协议层对应的参数。
第三配置信息可以包括以下信息中的一个或多个:
1)指示信息(记为第二指示信息),第二指示信息用于指示第三配置信息针对的链路。具体的,第二指示信息可以为第一链路的标识,第一链路的标识用于表明第三配置信息针对的链路为第一链路。关于第一链路的标识的其他描述可参见上文,不再赘述。
2)宿主节点分配的第一链路上无线回传节点的每个逻辑信道的标识以及每个逻辑 信道的配置。关于该部分的配置与宿主节点为终端的配置是类似的,参见上文,不再赘述。
3)第一链路和第二链路上的逻辑信道的标识的映射关系,该映射关系可以用于无线回传节点后续在转发终端和宿主节点之间交互的数据/信令时执行两段链路上的承载映射。
其中,第二链路为宿主节点和无线回传节点之间的链路。
905、宿主节点向无线回传节点发送第三配置信息。相应的,无线回传节点从宿主节点接收第三配置信息。
无线回传节点接收到第三配置信息之后,根据第三配置信息配置第一链路包含的协议层对应的参数。
一种情况下,第三配置信息可以承载在RRC消息中。另一种情况下,当无线回传节点可以作为DU的角色时(例如,无线回传节点为IAB节点),此时,第三配置信息可以承载在F1应用协议(F1 application protocol,F1AP)消息中。
可选的,参见图10,该方法还包括:
906、宿主节点向无线回传节点发送第四配置信息,第四配置信息用于为无线回传节点配置第二链路包含的协议层对应的参数。相应的,无线回传节点从宿主节点接收第四配置信息。
其中,无线回传节点可以根据第四配置信息配置第二链路包含的协议层对应的参数。
示例性的,第四配置信息可以用于为终端配置PHY层,MAC层,RLC层等对应的参数。可选的,第四配置信息还可以用于为终端配置PDCP层,适配层等对应的参数。
示例性的,第四配置信息可以承载在RRC消息中。
其中,步骤902、步骤905和步骤906的执行顺序不分先后。
该实施例提供的方法,宿主节点通过无线回传节点的辅助,执行对第一链路和第二链路包含的协议层对应的参数的配置。相较现有技术(无线回传节点为第一链路包含的协议层对应的参数进行配置),该实施例提供的方法可以简化无线回传节点的设计,降低无线回传节点的复杂度,进而降低无线回传节点的成本。
其中,图9和图10中的任意一个所示的方法可以与图7和图8中的任意一个所示的方法结合,只需将前者所示的方法中的步骤执行在后者所示的方法中的步骤之后即可。
本申请上述实施例中所示的方法均是以单跳中继组网场景为例对本申请实施例提供的方法作说明的,当本申请上述实施例提供的方法应用于多跳中继组网场景或多连接组网场景下,终端接入的无线回传节点可以执行上述实施例中无线回传节点执行的全部动作,所不同的地方包括:该无线回传节点是与其父节点之间交互信息(例如,接收上述下行消息或第二配置信息或第三配置信息或第四配置信息,再例如,发送上述第一RAR或随机接入请求等),而不是与宿主节点之间交互信息;第二链路为该无线回传节点和其父节点之间的链路,而不是和宿主节点之间的链路。其他的无线回传节点,针对发给自己的消息,自己处理即可,针对不是发给自己的消息,转发相应的消息即可。
上述主要从各个网元之间交互的角度对本申请实施例的方案进行了介绍。可以理解的是,各个网元,例如,宿主节点和无线回传节点为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对宿主节点和无线回传节点进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用集成的单元的情况下,图11示出了上述实施例中所涉及的通信装置(记为通信装置110)的一种可能的结构示意图,该通信装置110包括处理单元1101和通信单元1102,还可以包括存储单元1103。图11所示的结构示意图可以用于示意上述实施例中所涉及的宿主节点或无线回传节点的结构。
当图11所示的结构示意图用于示意上述实施例中所涉及的宿主节点的结构时,处理单元1101用于对宿主节点的动作进行控制管理,例如,处理单元1101用于支持宿主节点执行图7中的702和703,图8中的700、702、703a、703、707和708,图9中的901和902,图10中的901、902、904至906,和/或本申请实施例中所描述的其他过程中的宿主节点执行的动作。处理单元1101可以通过通信单元1102与其他网络实体通信,例如,与图7中示出的无线回传节点之间通信。存储单元1103用于存储宿主节点的程序代码和数据。
当图11所示的结构示意图用于示意上述实施例中所涉及的宿主节点的结构时,通信装置110可以是一个设备,也可以是设备内的芯片。
当图11所示的结构示意图用于示意上述实施例中所涉及的无线回传节点的结构时,处理单元1101用于对无线回传节点的动作进行控制管理,例如,处理单元1101用于支持无线回传节点执行图7中的701至704,图8中的701至709,图9中的902和903,图10中的902、903、905和906,和/或本申请实施例中所描述的其他过程中的无线回传节点执行的动作。处理单元1101可以通过通信单元1102与其他网络实体通信,例如,与图7中示出的宿主节点之间通信。存储单元1103用于存储无线回传节点的程序代码和数据。
当图11所示的结构示意图用于示意上述实施例中所涉及的无线回传节点的结构时,通信装置110可以是一个设备,也可以是设备内的芯片。
其中,当通信装置110为一个设备时,处理单元1101可以是处理器或控制器,通信单元1102可以是通信接口、收发器、收发机、收发电路、收发装置等。其中,通信接口是统称,可以包括一个或多个接口。存储单元1103可以是存储器。当通信装置110为一个设备内的芯片时,处理单元1101可以是处理器或控制器,通信单元1102 可以是输入接口和/或输出接口、管脚或电路等。存储单元1103可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
其中,通信单元也可以称为收发单元。通信装置110中的具有收发功能的天线和控制电路可以视为通信装置110的通信单元1102,具有处理功能的处理器可以视为通信装置110的处理单元1101。可选的,通信单元1102中用于实现接收功能的器件可以视为接收单元,接收单元用于执行本申请实施例中的接收的步骤,接收单元可以为接收机、接收器、接收电路等。通信单元1102中用于实现发送功能的器件可以视为发送单元,发送单元用于执行本申请实施例中的发送的步骤,发送单元可以为发送机、发送器、发送电路等。
图11中的集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。存储计算机软件产品的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
图11中的单元也可以称为模块,例如,处理单元可以称为处理模块。
本申请实施例还提供了一种通信装置(记为通信装置120)的硬件结构示意图,参见图12或图13,该通信装置120包括处理器1201,可选的,还包括与处理器1201连接的存储器1202。
处理器1201可以是一个通用中央处理器(central processing unit,CPU)、微处理器、特定应用集成电路(application-specific integrated circuit,ASIC),或者一个或多个用于控制本申请方案程序执行的集成电路。处理器1201也可以包括多个CPU,并且处理器1201可以是一个单核(single-CPU)处理器,也可以是多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路或用于处理数据(例如计算机程序指令)的处理核。
存储器1202可以是ROM或可存储静态信息和指令的其他类型的静态存储设备、RAM或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,本申请实施例对此不作任何限制。存储器1202可以是独立存在,也可以和处理器1201集成在一起。其中,存储器1202中可以包含计算机程序代码。处理器1201用于执行存储器1202中存储的计算机程序代码,从而实现本申请实施例提供的方法。
在第一种可能的实现方式中,参见图12,通信装置120还包括收发器1203。处理器1201、存储器1202和收发器1203通过总线相连接。收发器1203用于与其他设备或通信网络通信。可选的,收发器1203可以包括发射机和接收机。收发器1203中用于实现接收功能的器件可以视为接收机,接收机用于执行本申请实施例中的接收的步骤。收发器1203中用于实现发送功能的器件可以视为发射机,发射机用于执行本申请实施例中的发送的步骤。
基于第一种可能的实现方式,图12所示的结构示意图可以用于示意上述实施例中所涉及的宿主节点或无线回传节点的结构。
当图12所示的结构示意图用于示意上述实施例中所涉及的宿主节点的结构时,处理器1201用于对宿主节点的动作进行控制管理,例如,处理器1201用于支持宿主节点执行图7中的702和703,图8中的700、702、703a、703、707和708,图9中的901和902,图10中的901、902、904至906,和/或本申请实施例中所描述的其他过程中的宿主节点执行的动作。处理器1201可以通过收发器1203与其他网络实体通信,例如,与图7中示出的无线回传节点之间通信。存储器1202用于存储宿主节点的程序代码和数据。
当图12所示的结构示意图用于示意上述实施例中所涉及的无线回传节点的结构时,处理器1201用于对无线回传节点的动作进行控制管理,例如,处理器1201用于支持无线回传节点执行图7中的701至704,图8中的701至709,图9中的902和903,图10中的902、903、905和906,和/或本申请实施例中所描述的其他过程中的无线回传节点执行的动作。处理器1201可以通过收发器1203与其他网络实体通信,例如,与图7中示出的宿主节点之间通信。存储器1202用于存储无线回传节点的程序代码和数据。
在第二种可能的实现方式中,处理器1201包括逻辑电路以及输入接口和/或输出接口。其中,输出接口用于执行相应方法中的发送的动作,输入接口用于执行相应方法中的接收的动作。
基于第二种可能的实现方式,参见图13,图13所示的结构示意图可以用于示意上述实施例中所涉及的宿主节点或无线回传节点的结构。
当图13所示的结构示意图用于示意上述实施例中所涉及的宿主节点的结构时,处理器1201用于对宿主节点的动作进行控制管理,例如,处理器1201用于支持宿主节点执行图7中的702和703,图8中的700、702、703a、703、707和708,图9中的901和902,图10中的901、902、904至906,和/或本申请实施例中所描述的其他过程中的宿主节点执行的动作。处理器1201可以通过输入接口和/或输出接口与其他网络实体通信,例如,与图7中示出的无线回传节点之间通信。存储器1202用于存储宿主节点的程序代码和数据。
当图13所示的结构示意图用于示意上述实施例中所涉及的无线回传节点的结构时,处理器1201用于对无线回传节点的动作进行控制管理,例如,处理器1201用于支持无线回传节点执行图7中的701至704,图8中的701至709,图9中的902和903,图10中的902、903、905和906,和/或本申请实施例中所描述的其他过程中的无线回传节点执行的动作。处理器1201可以通过输入接口和/或输出接口与其他网络 实体通信,例如,与图7中示出的宿主节点之间通信。存储器1202用于存储无线回传节点的程序代码和数据。
本申请实施例还提供了一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行上述任一方法。
本申请实施例还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述任一方法。
本申请实施例还提供了一种通信系统,包括:上述宿主节点和无线回传节点。可选的,还包括上述终端。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看附图、公开内容、以及所附权利要求书,可理解并实现公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (30)

  1. 一种通信方法,其特征在于,包括:
    无线回传节点从终端接收随机接入请求,并将所述随机接入请求发送给宿主节点;
    所述无线回传节点从所述宿主节点接收第一随机接入响应;
    所述无线回传节点根据所述第一随机接入响应向所述终端发送第二随机接入响应,所述第二随机接入响应中包括所述无线回传节点为所述终端计算的时间提前量。
  2. 根据权利要求1所述的方法,其特征在于,所述无线回传节点根据所述第一随机接入响应向所述终端发送第二随机接入响应,包括:
    所述无线回传节点将所述第一随机接入响应中携带的所述宿主节点为所述无线回传节点计算的时间提前量修改为所述无线回传节点为所述终端计算的时间提前量,得到所述第二随机接入响应,并向所述终端发送所述第二随机接入响应;或者,
    所述无线回传节点将所述无线回传节点为所述终端计算的时间提前量添加至所述第一随机接入响应中的用于指示时间提前量的信元中,得到所述第二随机接入响应,并向所述终端发送所述第二随机接入响应。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述无线回传节点从所述宿主节点接收第一配置信息,所述第一配置信息用于配置传输或调度所述第二随机接入响应的资源。
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述方法还包括:
    所述无线回传节点从所述终端接收上行消息,所述上行消息中包括所述终端的冲突解决标识,所述上行消息为所述终端根据所述第二随机接入响应向所述无线回传节点发送的消息;
    所述无线回传节点记录所述上行消息中的所述终端的冲突解决标识,并将所述上行消息转发给所述宿主节点。
  5. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    所述无线回传节点从所述宿主节点接收下行消息,所述下行消息为所述宿主节点根据所述上行消息向所述无线回传节点发送的消息;
    在确定所述下行消息中携带所述终端的冲突解决标识的情况下,所述无线回传节点将所述下行消息转发给所述终端。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,所述方法还包括:
    所述无线回传节点从所述宿主节点接收第二配置信息,所述第二配置信息用于为所述终端配置第一链路包含的协议层对应的参数,所述第一链路为所述无线回传节点和所述终端之间的链路,所述第二配置信息为所述宿主节点生成的;
    所述无线回传节点向所述终端发送所述第二配置信息。
  7. 根据权利要求6所述的方法,其特征在于,所述第二配置信息中包括以下信息中的一个或多个:
    1)第一指示信息,所述第一指示信息用于指示所述第二配置信息针对的链路;
    2)所述宿主节点分配的所述第一链路上所述终端的每个逻辑信道的标识以及每个逻辑信道的配置。
  8. 根据权利要求6或7所述的方法,其特征在于,所述方法还包括:
    所述无线回传节点从所述宿主节点接收第三配置信息,所述第三配置信息用于为所述无线回传节点配置所述第一链路包含的协议层对应的参数,所述第三配置信息为所述宿主节点生成的。
  9. 根据权利要求8所述的方法,其特征在于,所述第三配置信息包括以下信息中的一个或多个:
    1)第二指示信息,所述第二指示信息用于指示所述第三配置信息针对的链路;
    2)所述宿主节点分配的所述第一链路上所述无线回传节点的每个逻辑信道的标识以及每个逻辑信道的配置;
    3)所述第一链路和第二链路上的逻辑信道的标识的映射关系,所述第二链路为所述无线回传节点和所述宿主节点之间的链路。
  10. 一种通信方法,其特征在于,包括:
    宿主节点生成第二配置信息,所述第二配置信息用于为终端配置第一链路包含的协议层对应的参数,所述第一链路为无线回传节点和所述终端之间的链路;
    所述宿主节点向所述无线回传节点发送所述第二配置信息。
  11. 根据权利要求10所述的方法,其特征在于,所述第二配置信息中包括以下信息中的一个或多个:
    1)第一指示信息,所述第一指示信息用于指示所述第二配置信息针对的链路;
    2)所述宿主节点分配的所述第一链路上所述终端的每个逻辑信道的标识以及每个逻辑信道的配置。
  12. 根据权利要求10或11所述的方法,其特征在于,所述方法还包括:
    所述宿主节点向所述无线回传节点发送第三配置信息,所述第三配置信息用于为所述无线回传节点配置所述第一链路包含的协议层对应的参数。
  13. 根据权利要求12所述的方法,其特征在于,所述第三配置信息包括以下信息中的一个或多个:
    1)第二指示信息,所述第二指示信息用于指示所述第三配置信息针对的链路;
    2)所述宿主节点分配的所述第一链路上所述无线回传节点的每个逻辑信道的标识以及每个逻辑信道的配置;
    3)所述第一链路和第二链路上的逻辑信道的标识的映射关系,所述第二链路为所述无线回传节点和所述宿主节点之间的链路。
  14. 一种通信装置,其特征在于,包括:处理单元和通信单元;
    所述处理单元,用于通过所述通信单元从终端接收随机接入请求,并将所述随机接入请求发送给宿主节点;
    所述处理单元,还用于通过所述通信单元从所述宿主节点接收第一随机接入响应;
    所述处理单元,还用于根据所述第一随机接入响应通过所述通信单元向所述终端发送第二随机接入响应,所述第二随机接入响应中包括所述装置为所述终端计算的时间提前量。
  15. 根据权利要求14所述的装置,其特征在于,
    所述处理单元,具体用于将所述第一随机接入响应中携带的所述宿主节点为所述装置计算的时间提前量修改为所述装置为所述终端计算的时间提前量,得到所述第二 随机接入响应,并通过所述通信单元向所述终端发送所述第二随机接入响应;或者,
    所述处理单元,具体用于将所述装置为所述终端计算的时间提前量添加至所述第一随机接入响应中的用于指示时间提前量的信元中,得到所述第二随机接入响应,并通过所述通信单元向所述终端发送所述第二随机接入响应。
  16. 根据权利要求14或15所述的装置,其特征在于,
    所述处理单元,还用于通过所述通信单元从所述宿主节点接收第一配置信息,所述第一配置信息用于配置传输或调度所述第二随机接入响应的资源。
  17. 根据权利要求14-16任一项所述的装置,其特征在于,
    所述处理单元,还用于通过所述通信单元从所述终端接收上行消息,所述上行消息中包括所述终端的冲突解决标识,所述上行消息为所述终端根据所述第二随机接入响应向所述装置发送的消息;
    所述处理单元,还用于记录所述上行消息中的所述终端的冲突解决标识,并通过所述通信单元将所述上行消息转发给所述宿主节点。
  18. 根据权利要求17所述的装置,其特征在于,
    所述处理单元,还用于通过所述通信单元从所述宿主节点接收下行消息,所述下行消息为所述宿主节点根据所述上行消息向所述装置发送的消息;
    在确定所述下行消息中携带所述终端的冲突解决标识的情况下,所述处理单元,还用于通过所述通信单元将所述下行消息转发给所述终端。
  19. 根据权利要求14-18任一项所述的装置,其特征在于,
    所述处理单元,还用于通过所述通信单元从所述宿主节点接收第二配置信息,所述第二配置信息用于为所述终端配置第一链路包含的协议层对应的参数,所述第一链路为所述装置和所述终端之间的链路,所述第二配置信息为所述宿主节点生成的;
    所述处理单元,还用于通过所述通信单元向所述终端发送所述第二配置信息。
  20. 根据权利要求19所述的装置,其特征在于,所述第二配置信息中包括以下信息中的一个或多个:
    1)第一指示信息,所述第一指示信息用于指示所述第二配置信息针对的链路;
    2)所述宿主节点分配的所述第一链路上所述终端的每个逻辑信道的标识以及每个逻辑信道的配置。
  21. 根据权利要求19或20所述的装置,其特征在于,
    所述处理单元,还用于通过所述通信单元从所述宿主节点接收第三配置信息,所述第三配置信息用于为所述装置配置所述第一链路包含的协议层对应的参数,所述第三配置信息为所述宿主节点生成的。
  22. 根据权利要求21所述的装置,其特征在于,所述第三配置信息包括以下信息中的一个或多个:
    1)第二指示信息,所述第二指示信息用于指示所述第三配置信息针对的链路;
    2)所述宿主节点分配的所述第一链路上所述装置的每个逻辑信道的标识以及每个逻辑信道的配置;
    3)所述第一链路和第二链路上的逻辑信道的标识的映射关系,所述第二链路为所述装置和所述宿主节点之间的链路。
  23. 一种通信装置,其特征在于,包括:处理单元和通信单元;
    所述处理单元,用于生成第二配置信息,所述第二配置信息用于为终端配置第一链路包含的协议层对应的参数,所述第一链路为无线回传节点和所述终端之间的链路;
    所述通信单元,用于向所述无线回传节点发送所述第二配置信息。
  24. 根据权利要求23所述的装置,其特征在于,所述第二配置信息中包括以下信息中的一个或多个:
    1)第一指示信息,所述第一指示信息用于指示所述第二配置信息针对的链路;
    2)所述装置分配的所述第一链路上所述终端的每个逻辑信道的标识以及每个逻辑信道的配置。
  25. 根据权利要求23或24所述的装置,其特征在于,
    所述通信单元,还用于向所述无线回传节点发送第三配置信息,所述第三配置信息用于为所述无线回传节点配置所述第一链路包含的协议层对应的参数。
  26. 根据权利要求25所述的装置,其特征在于,所述第三配置信息包括以下信息中的一个或多个:
    1)第二指示信息,所述第二指示信息用于指示所述第三配置信息针对的链路;
    2)所述装置分配的所述第一链路上所述无线回传节点的每个逻辑信道的标识以及每个逻辑信道的配置;
    3)所述第一链路和第二链路上的逻辑信道的标识的映射关系,所述第二链路为所述无线回传节点和所述装置之间的链路。
  27. 一种通信装置,其特征在于,包括:处理器;
    所述处理器与存储器连接,所述存储器用于存储计算机执行指令,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述装置实现如权利要求1-9任一项所述的方法。
  28. 一种通信装置,其特征在于,包括:处理器;
    所述处理器与存储器连接,所述存储器用于存储计算机执行指令,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述装置实现如权利要求10-13任一项所述的方法。
  29. 一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求1-9任一项所述的方法。
  30. 一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求10-13任一项所述的方法。
PCT/CN2019/109766 2019-09-30 2019-09-30 通信方法及装置 WO2021062837A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
MX2022003826A MX2022003826A (es) 2019-09-30 2019-09-30 Metodo y dispositivo de comunicacion.
CN201980097083.1A CN113906816B (zh) 2019-09-30 2019-09-30 通信方法及装置
PCT/CN2019/109766 WO2021062837A1 (zh) 2019-09-30 2019-09-30 通信方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/109766 WO2021062837A1 (zh) 2019-09-30 2019-09-30 通信方法及装置

Publications (1)

Publication Number Publication Date
WO2021062837A1 true WO2021062837A1 (zh) 2021-04-08

Family

ID=75336681

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/109766 WO2021062837A1 (zh) 2019-09-30 2019-09-30 通信方法及装置

Country Status (3)

Country Link
CN (1) CN113906816B (zh)
MX (1) MX2022003826A (zh)
WO (1) WO2021062837A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115996466A (zh) * 2023-03-23 2023-04-21 广州世炬网络科技有限公司 基于传输链路参数的节点功能切换控制方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101389121A (zh) * 2007-09-11 2009-03-18 大唐移动通信设备有限公司 一种随机接入方法、系统及其组成模块
US20120099515A1 (en) * 2009-06-20 2012-04-26 Zte Corporation Random access method for relay nodes
CN107113871A (zh) * 2014-12-31 2017-08-29 瑞典爱立信有限公司 对ue到中继ap的随机接入进行定时
CN109121222A (zh) * 2017-06-23 2019-01-01 华为技术有限公司 通信方法和通信设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2410812B1 (en) * 2010-07-22 2013-06-05 Alcatel Lucent Method for operating a relay node of a mobile communication network and relay node of a mobile communication network
EP3179814B1 (en) * 2014-09-10 2019-04-03 Huawei Technologies Co., Ltd. Apparatus and method for establishing data transmission link, and communications system
CN108633100B (zh) * 2017-03-24 2023-10-20 华为技术有限公司 随机接入响应的方法和设备以及随机接入的方法和设备
CN109152080B (zh) * 2017-06-16 2023-11-03 华为技术有限公司 随机接入响应方法及网络设备、终端设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101389121A (zh) * 2007-09-11 2009-03-18 大唐移动通信设备有限公司 一种随机接入方法、系统及其组成模块
US20120099515A1 (en) * 2009-06-20 2012-04-26 Zte Corporation Random access method for relay nodes
CN107113871A (zh) * 2014-12-31 2017-08-29 瑞典爱立信有限公司 对ue到中继ap的随机接入进行定时
CN109121222A (zh) * 2017-06-23 2019-01-01 华为技术有限公司 通信方法和通信设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NOKIA ET AL: "IAB Synchronization", 3GPP DRAFT; R1-1806664, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 25 May 2018 (2018-05-25), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 5, XP051462701 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115996466A (zh) * 2023-03-23 2023-04-21 广州世炬网络科技有限公司 基于传输链路参数的节点功能切换控制方法及装置

Also Published As

Publication number Publication date
CN113906816B (zh) 2024-05-03
MX2022003826A (es) 2022-05-10
CN113906816A (zh) 2022-01-07

Similar Documents

Publication Publication Date Title
TWI559721B (zh) 雙連結中分配無線網路暫時識別的方法
EP3869907A1 (en) User equipment (ue) and base station (bs) involved in transmission of small data in inactive state from user equipment (ue) to base station (bs)
WO2022152003A1 (zh) 非激活态下数据传输方法及装置
US10674500B2 (en) Communication method, device, and system
US11617209B2 (en) Timer control in early data transmission
CN116057983A (zh) 用于增强型恢复保护的方法和设备
WO2021062837A1 (zh) 通信方法及装置
WO2022183970A1 (zh) 一种通信方法及设备
CN109600860B (zh) 随机接入方法、装置、设备、存储介质和程序产品
WO2020221279A1 (zh) 随机接入方法和装置
JP2023534724A (ja) スモールデータの送信に関与するユーザ機器および基地局
WO2021022423A1 (zh) 一种传输数据的方法和装置
WO2023212893A1 (zh) 无线通信的方法及装置
WO2023225936A1 (zh) 无线通信的方法及装置
WO2024032800A1 (zh) 数据传输方法、装置、设备、存储介质及程序产品
WO2023005471A1 (zh) 一种上行资源确定和配置方法及装置
WO2024060187A1 (zh) 用于侧行通信方法以及终端设备
WO2022236504A1 (zh) 通信方法及装置
WO2023065316A1 (zh) 基于预配置资源的小数据传输方法、装置、设备及介质
WO2023231005A1 (zh) 无线通信的方法及装置
WO2024098212A1 (zh) 无线通信的方法、终端设备和网络设备
WO2023116410A1 (zh) 一种通信方法及设备
US20240179789A1 (en) User equipment and base station involved in transmission of small data
WO2023093868A1 (zh) 一种通信方法及设备
WO2024139936A1 (zh) 通信方法和相关通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19948027

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19948027

Country of ref document: EP

Kind code of ref document: A1