WO2021088638A1 - 一种通信方法、装置及设备 - Google Patents

一种通信方法、装置及设备 Download PDF

Info

Publication number
WO2021088638A1
WO2021088638A1 PCT/CN2020/122177 CN2020122177W WO2021088638A1 WO 2021088638 A1 WO2021088638 A1 WO 2021088638A1 CN 2020122177 W CN2020122177 W CN 2020122177W WO 2021088638 A1 WO2021088638 A1 WO 2021088638A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
network device
message
network
resource
Prior art date
Application number
PCT/CN2020/122177
Other languages
English (en)
French (fr)
Inventor
姚楚婷
徐海博
才宇
王键
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20883830.0A priority Critical patent/EP4044671A4/en
Publication of WO2021088638A1 publication Critical patent/WO2021088638A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0009Control or signalling for completing the hand-off for a plurality of users or terminals, e.g. group communication or moving wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/1607Details of the supervisory signal
    • H04L1/1671Details of the supervisory signal the supervisory signal being transmitted together with control information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • This application relates to the field of communication technology, and in particular to a communication method, device and equipment.
  • terminal devices generally implement communication with other devices through a subscriber identification module (SIM) card provided in the terminal device.
  • SIM subscriber identification module
  • PLMN public land mobile network
  • SIM card 1 corresponds to operator 1
  • SIM card 2 corresponds to operator 2.
  • a hybrid automatic repeat request (HARQ) mechanism has also been introduced on the side link. That is, after terminal device 1 sends data to terminal device 2, terminal device 2 can The terminal device 1 sends feedback information corresponding to the data, thereby determining whether the data is successfully transmitted. For a terminal device, if it sends data in one frequency band and monitors information from other devices, it will monitor in multiple frequency bands.
  • HARQ hybrid automatic repeat request
  • terminal device 1 even if the SIM cards installed in terminal device 1 and terminal device 2 correspond to different Operators, the frequency bands supported by different operators may be different, but after terminal device 1 sends data to terminal device 2, since it can monitor information from other devices in multiple frequency bands, terminal device 1 may be able to monitor information from the terminal Feedback information of device 2. However, since the frequency band in which the terminal device 1 sends data is different from the frequency band in which the feedback information is located, the terminal device 1 cannot determine whether the feedback information is feedback information corresponding to the data, and the terminal device 1 may think that the feedback information of the data is not obtained.
  • the embodiments of the present application provide a communication method, device, and equipment, which are used to improve the reliability of information transmission.
  • a first communication method includes: when a second terminal device resides on a second network device, receiving a first message, where the first message is used to instruct the second terminal device to reside on To the first network device, the first network device and the second network device correspond to different PLMNs; the second terminal device resides on the first network device.
  • the method may be executed by a first communication device, and the first communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the first communication device is a second terminal device, or a chip set in the second terminal device for realizing the function of the second terminal device, or a chip used for realizing the function of the second terminal device Other parts.
  • the first communication device is the second terminal device.
  • the second terminal device if the second terminal device resides on the second network device, the second terminal device can be changed to reside on the first network device, where the first terminal device resides on the first network device.
  • the second terminal device if two terminal devices reside on different network devices in the PLMN, one of the terminal devices can be changed to reside on the network device where the other terminal device is located, so that the two terminal devices reside on the same network device If the two terminal devices are to communicate through the side link, the HARQ and other mechanisms can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • receiving the first message includes:
  • the second terminal device to reside on the first network device may be determined based on different factors. For example, the second network device may notify the second terminal device to reside on the first network device, and the second terminal device receives the first message from the second network device, or it may be the first terminal device notifying the second terminal device to reside on the first network device. To the first network device, the second terminal device receives the first message from the first terminal device, or it may be that the first network device notifies the second terminal device to reside on the first network device, then the second terminal device receives the message from the first network device The first message of a network device, and so on. There are many implementation methods and more flexible.
  • the method before receiving the first message from the second network device, the method further includes:
  • the second terminal device sends a request message to the second network device, where the request message is used to request to reside on the first network device; or,
  • the second terminal device sends a third message to the first network device, where the third message is used to request to camp on the first network device.
  • the second terminal device when the second terminal device needs to communicate with the first terminal device, or the second terminal device is in the process of communicating with the first terminal device, it is determined that the second network device and the first terminal device reside on the second terminal device. If the first network device corresponds to a different PLMN, the second terminal device can request to reside on the first network device, so that it works under the same network device as the first terminal device, which can avoid the HARQ mechanism being unable to be caused due to the different PLMN.
  • the second terminal device can send a request to the second network device, or can directly request the first network device, in a variety of ways.
  • the second terminal device is resident
  • the first network device is reserved, including:
  • the second terminal device camps on the first network device through cell reselection according to the information of the first network device.
  • the first message may include the information of the first network device, or the second terminal device may also obtain the information of the first network device through other means.
  • the second terminal device may interact with the first terminal device from the first network device.
  • the terminal device obtains the information of the first network device.
  • the information of the first network device is, for example, the ID of the first network device, or may be other information of the first network device.
  • the second terminal device After the second terminal device obtains the information of the first network device, it can determine to reselect to the first network device, and the second terminal device only needs to provide a cell reselection method to camp on the cell provided by the first network device.
  • the second terminal device performs cell reselection under the condition of knowing the information of the first network device, making the cell reselection more targeted, and there is no need to measure too many cells during cell reselection, making the cell reselection more efficient .
  • the method further includes:
  • the second terminal device establishes a sideline connection with the first terminal device under the first network device.
  • the second terminal device After the second terminal device resides on the first network device, it can establish a sideline connection with the first terminal device under the first network device, so that the second terminal device and the first terminal device can perform data interaction.
  • the two terminal devices reside under the same network device. If the two terminal devices communicate through the side link, the HARQ and other mechanisms can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • the first message further includes verification information of the second terminal device, and the verification information of the second terminal device is used to verify the second terminal device.
  • the second terminal device needs to reside on the first network device, and the first network device does not know the information of the second terminal device in advance. If the second terminal device is accepted without verification, the network security may be affected. Therefore, the first message may include the verification information of the second terminal device. For example, when the second terminal device establishes an RRC connection with the first network device, or after establishing an RRC connection with the first network device, the second terminal device may verify the verification information of the second terminal device. The information is sent to the first network device, so that the first network device can verify the second terminal device according to the verification information. If the verification passes, the second terminal device can reside on the first network device, and if the verification fails, the first network device can even refuse the second terminal device to reside. In this way, the security of the network can be ensured as much as possible.
  • the method further includes:
  • the second terminal device sends a fifth message to the first network device, where the fifth message includes verification information of the second terminal device.
  • the second terminal device when the second terminal device establishes an RRC connection with the first network device, or after establishing an RRC connection with the first network device, the second terminal device can send the verification information of the second terminal device to the first network device, so that the first network device can The second terminal device is verified according to the verification information. If the verification passes, the second terminal device can reside on the first network device, and if the verification fails, the first network device can even refuse the second terminal device to reside. In this way, the security of the network can be ensured as much as possible.
  • the verification information of the second terminal device is, for example, obtained by the second terminal device through the first message, or may also be obtained by the second terminal device through other methods.
  • a second communication method includes: a first terminal device receives a second message from a first network device, the second message is used to instruct the second terminal device to reside on the first network Device, the second terminal device currently resides on a second network device, and the first network device and the second network device correspond to different PLMNs; the first terminal device sends to the second terminal device A first message, where the first message is used to instruct the second terminal device to camp on the first network device.
  • the method may be executed by a second communication device, and the second communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the second communication device is a first terminal device, or a chip set in the first terminal device for realizing the function of the first terminal device, or a chip for realizing the function of the first terminal device Other parts.
  • the second communication device is the first terminal device as an example.
  • the second terminal device can be changed to reside on the first network device, where the first terminal device resides on the first network device.
  • the first terminal device resides on the first network device.
  • the second terminal device can be changed to reside on the first network device, where the first terminal device resides on the first network device.
  • the first terminal device notifies the second terminal device to reside on the first network device.
  • the first terminal device needs to communicate with the second terminal device, or the first terminal device is in the process of communicating with the second terminal device, it is determined that the second network device and the first terminal device reside on the second terminal device. If the first network device corresponds to a different PLMN, the first terminal device can instruct the second terminal device to reside on the first network device, so as to work under the same network device as the second terminal device, which can avoid the different PLMNs. This leads to the problem that the HARQ mechanism cannot be implemented.
  • the method further includes:
  • the first terminal device sends a third message to the first network device, where the third message is used to instruct the second terminal device to reside on the second network device.
  • the first terminal device needs to instruct the second terminal device to reside on the first network device.
  • One way is that the first terminal device first sends a third message to the first network device, and the third message instructs the second terminal device to reside on the first network device. 2.
  • Network equipment After the first network device receives the third message, it can be determined that the first terminal device wants the second terminal device to reside on the first network device. In this way, the first network device can first determine that a new terminal device is about to reside.
  • the method further includes:
  • the first terminal device establishes a sideline connection with the second terminal device under the first network device.
  • the first terminal device can establish a sideline connection with the second terminal device under the first network device, so that the second terminal device and the first terminal device can exchange data.
  • the two terminal devices reside under the same network device. If the two terminal devices communicate through the side link, the HARQ and other mechanisms can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • a third communication method includes: a first network device receives a third message, the third message is used to instruct the second terminal device to reside on the second network device, or to indicate to reside on the second network device
  • the second terminal device of the second network device requests to reside on the first network device.
  • the first network device and the second network device correspond to different PLMNs; the first network device sends a second message, so The second message is used to instruct the second terminal device to camp on the first network device.
  • the method may be executed by a third communication device, and the third communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the third communication device is a first network device, or a chip set in the first network device for realizing the function of the first network device, or a chip for realizing the function of the first network device Other parts.
  • the third communication device is the first network device.
  • the second terminal device if the second terminal device resides on the second network device, the second terminal device can be changed to reside on the first network device, where the first terminal device resides on the first network device.
  • the second terminal device if two terminal devices reside on different network devices in the PLMN, one of the terminal devices can be changed to reside on the network device where the other terminal device is located, so that the two terminal devices reside on the same network device If the two terminal devices are to communicate through the side link, the HARQ and other mechanisms can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • the first network device receiving the third message includes:
  • the first network device receives the third message from the first terminal device; or,
  • the first network device receives the third message from the second network device; or,
  • the first network device receives the third message from the second terminal device.
  • the first terminal device when the first terminal device needs to communicate with the second terminal device, or the first terminal device is in the process of communicating with the second terminal device, it is determined that the second network device and the first terminal device reside on the second terminal device. If the first network device corresponds to a different PLMN, the first terminal device can request the first network device so that the second terminal device resides on the first network device; or, the second network device on which the second terminal device resides The device may request the first network device to make the second terminal device reside on the first network device; or, the second terminal device may also request the first network device to make the second terminal device reside on the first network device, and many more. In the embodiment of the present application, the first network device can determine that the second terminal device requests to reside on the first network device through different ways, which is relatively flexible.
  • the sending of the second message by the first network device includes:
  • the first network device sends the second message to a first terminal device residing on the first network device; or,
  • the first network device sends the second message to the second network device.
  • the first network device may send a second message to the first terminal device. For example, after the first terminal device receives the first message, it may send a message to the second terminal device to instruct the second terminal device to reside on the first network device. Alternatively, the first network device may also send a second message to the second network device. For example, after the second network device receives the first message, it may send a message to the second terminal device to instruct the second terminal device to reside on the first network. equipment. Alternatively, the first network device may also send the first message to the second terminal device to instruct the second terminal device to reside on the first network device, which is more direct.
  • the method further includes:
  • the first network device receives the verification information of the second terminal device from the second network device, and the verification information of the second terminal device is used to verify the second terminal device.
  • the second terminal device needs to reside on the first network device, and the first network device does not know the information of the second terminal device in advance. If the second terminal device is accepted without verification, the network security may be affected. Therefore, the first network device can obtain the verification information of the second terminal device from the second network device, so that the first network device can verify the second terminal device according to the verification information. If the verification passes, the second terminal device can reside on the first network device, and if the verification fails, the first network device can even refuse the second terminal device to reside. In this way, the security of the network can be ensured as much as possible.
  • the method further includes:
  • the first network device sends a fourth message to the second network device, where the fourth message is used to request the verification information of the second terminal device.
  • the first network device may send a request to the second network device to request the verification information of the second terminal device.
  • the second network device can send the verification information of the second terminal device to the first network device.
  • the first network device can request the verification information of the second terminal device again when required, which improves the effectiveness of the acquired information.
  • the first network device may not need to send the fourth message to the second network device.
  • the second network device may actively send the verification information of the second terminal device to the first network device, which can reduce the number of first network devices and second network devices. 2.
  • the interaction process between network devices saves signaling overhead.
  • the method further includes:
  • the first network device performs verification according to the verification information of the second terminal device included in the fifth message and the verification information of the second terminal device from the second network device;
  • the first network device determines that the second terminal device can access the first network device.
  • the first network device can obtain the verification information of the second terminal device from the second terminal device, and can also obtain the verification information of the second terminal device from the second network device, then the first network device can pair the verification information according to the two pieces of verification information
  • the second terminal device performs verification.
  • a verification method is that the first network device compares the two pieces of verification information to determine whether the two pieces of verification information are consistent.
  • the first network device can determine that the verification of the second terminal device fails. If the second terminal device passes the verification, the second terminal device may reside on the first network device, and if the second terminal device fails the verification, the first network device may even refuse the second terminal device to reside. In this way, the security of the network can be ensured as much as possible.
  • a fourth communication method includes: a second network device determines that a second terminal device residing on the second network device needs to reside on the first network device, the first network device and The second network device corresponds to a different PLMN; the second network device sends a first message to the second terminal device, and the first message is used to instruct the second terminal device to reside on the first terminal device.
  • a network device determines that a second terminal device residing on the second network device needs to reside on the first network device, the first network device and The second network device corresponds to a different PLMN; the second network device sends a first message to the second terminal device, and the first message is used to instruct the second terminal device to reside on the first terminal device.
  • the method may be executed by a fourth communication device, and the fourth communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip.
  • the fourth communication device is a second network device, or a chip set in the second network device for realizing the function of the second network device, or a chip for realizing the function of the first network device Other parts.
  • the fourth communication device is the second network device.
  • the second terminal device if the second terminal device resides on the second network device, the second terminal device can be changed to reside on the first network device, where the first terminal device resides on the first network device.
  • the second terminal device if two terminal devices reside on different network devices in the PLMN, one of the terminal devices can be changed to reside on the network device where the other terminal device is located, so that the two terminal devices reside on the same network device If the two terminal devices are to communicate through the side link, the HARQ and other mechanisms can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • the second network device determining that the second terminal device residing on the second network device needs to reside on the first network device includes:
  • the second network device receives a second message from the first network device, where the second message is used to instruct the second terminal device to reside on the first network device; or,
  • the second network device receives a request message from the second terminal device, where the request message is used to request to reside on the first network device.
  • the first network device determines that the second terminal device can reside on the first network device
  • the first network device can send a message to the second network device to instruct the second terminal device to reside on the first network device.
  • the second terminal device may actively request to reside on the first network device. There may be multiple ways for the second network device to determine that the second terminal device needs to reside on the first network device, which can be applied to different scenarios.
  • the method further includes:
  • the second network device sends the verification information of the second terminal device to the first network device, where the verification information of the second terminal device is used to verify the second terminal device.
  • the second terminal device needs to reside on the first network device, and the first network device does not know the information of the second terminal device in advance. If the second terminal device is accepted without verification, the network security may be affected. Therefore, the second network device can send the verification information of the second terminal device to the first network device, so that the first network device can verify the second terminal device according to the verification information. If the verification passes, the second terminal device can reside on the first network device, and if the verification fails, the first network device can even refuse the second terminal device to reside. In this way, the security of the network can be ensured as much as possible.
  • the method further includes:
  • the second network device receives a fourth message from the first network device, where the fourth message is used to request the verification information of the second terminal device.
  • the first network device may send a request to the second network device to request the verification information of the second terminal device.
  • the second network device can send the verification information of the second terminal device to the first network device.
  • the first network device can request the verification information of the second terminal device again when required, which improves the effectiveness of the acquired information.
  • the first network device may not need to send the fourth message to the second network device.
  • the second network device may actively send the verification information of the second terminal device to the first network device, which can reduce the number of first network devices and second network devices. 2.
  • the interaction process between network devices saves signaling overhead.
  • a communication device is provided, for example, the communication device is the first communication device as described above.
  • the first communication device is used to execute the method in the foregoing first aspect or any possible implementation manner.
  • the first communication device may include a module for executing the method in the first aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the first communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a second terminal device.
  • the first communication device is the second terminal device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver (or transmitter and receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the introduction is continued by taking the first communication device as the second terminal device, and the processing module and the transceiver module as examples. among them,
  • the transceiver module is configured to receive a first message when the second terminal device resides on the second network device, and the first message is used to instruct the second terminal device to reside on the first network device,
  • the first network device and the second network device correspond to different PLMNs;
  • the processing module is configured to reside on the first network device.
  • the transceiver module is configured to receive the first message in the following manner:
  • the transceiver module is further configured to send a request message to the second network device before receiving the first message from the second network device, where the request message is used to request to reside on the first network device ;or,
  • the transceiver module is further configured to send a third message to the first network device before receiving the first message from the second network device, and the third message is used to request to stay on the first network device.
  • Internet equipment
  • the processing module is configured to pass Resides on the first network device in the following manner:
  • the processing module is further configured to establish a side-line connection with the first terminal device under the first network device.
  • the first message further includes verification information of the second terminal device, and the verification information of the second terminal device is used to verify the second terminal device.
  • the transceiver module is further configured to send a fifth message to the first network device, and the fifth message Including verification information of the second terminal device.
  • a communication device is provided, for example, the communication device is the second communication device as described above.
  • the second communication device is used to execute the method in the foregoing second aspect or any possible implementation manner.
  • the second communication device may include a module for executing the method in the second aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the second communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a first terminal device.
  • the second communication device is the first terminal device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the transceiver (or, transmitter and receiver) is, for example, a communication interface in the chip, and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the second communication device is the first terminal device, and the processing module and the transceiver module are used as examples for the introduction. among them,
  • the transceiver module is configured to receive a second message from a first network device, and the second message is used to instruct a second terminal device to reside on the first network device, and the second terminal device currently resides on A second network device, where the first network device and the second network device correspond to different PLMNs;
  • the processing module is configured to determine a first message, where the first message is used to instruct the second terminal device to reside on the first network device;
  • the transceiver module is also used to send the first message to the second terminal device.
  • the transceiver module is further configured to send a third message to the first network device, and the third message is used to instruct the first network device Two terminal devices reside in the second network device.
  • the processing module is further configured to communicate with the second network device under the first network device.
  • the terminal device establishes a side-line connection.
  • a communication device is provided, for example, the communication device is the aforementioned third communication device.
  • the third communication device is used to execute the method in the foregoing third aspect or any possible implementation manner.
  • the third communication device may include a module for executing the method in the third aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the third communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a first network device.
  • the third communication device is the first network device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter
  • the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the third communication device is a chip set in the communication device
  • the transceiver (or, the transmitter and the receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the third communication device is continued to be the first network device, and the processing module and the transceiver module are used as examples for the introduction. among them,
  • the transceiver module is configured to receive a third message, and the third message is used to instruct the second terminal device to reside on the second network device, or to instruct the second terminal device to reside on the second network device to request to reside on the second network device.
  • the first network device and the second network device correspond to different PLMNs;
  • the processing module is configured to determine a second message, where the second message is used to instruct the second terminal device to reside on the first network device,
  • the transceiver module is also used to send the second message.
  • the transceiver module is configured to receive the third message in the following manner:
  • the transceiver module is configured to send the second message in the following manner:
  • the transceiver module further uses For receiving the verification information of the second terminal device from the second network device, the verification information of the second terminal device is used to verify the second terminal device.
  • the transceiver module is further configured to send a fourth message to the second network device, and the first The four messages are used to request the verification information of the second terminal device.
  • the transceiver module is further configured to receive a fifth message from the second terminal device, where the fifth message includes verification information of the second terminal device;
  • the processing module is further configured to perform verification based on the verification information of the second terminal device included in the fifth message and the verification information of the second terminal device from the second network device;
  • the processing module is further configured to determine that the second terminal device can access the first network device when the verification is passed.
  • a communication device is provided, for example, the communication device is the fourth communication device as described above.
  • the fourth communication device is configured to execute the method in the foregoing fourth aspect or any possible implementation manner.
  • the fourth communication device may include a module for executing the method in the fourth aspect or any possible implementation manner, for example, including a processing module and a transceiver module.
  • the transceiver module may include a sending module and a receiving module.
  • the sending module and the receiving module may be different functional modules, or may also be the same functional module, but can implement different functions.
  • the fourth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a second network device.
  • the fourth communication device is the second network device.
  • the transceiver module may also be implemented by a transceiver, and the processing module may also be implemented by a processor.
  • the sending module may be implemented by a transmitter, and the receiving module may be implemented by a receiver.
  • the transmitter and the receiver may be different functional modules, or may be the same functional module, but can implement different functions.
  • the transceiver is realized by, for example, an antenna, a feeder, and a codec in the communication device.
  • the fourth communication device is a chip set in the communication device
  • the transceiver (or, the transmitter and the receiver) is, for example, a communication interface in the chip, and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • the fourth communication device is continued to be the second network device, and the processing module and the transceiving module are taken as examples for the introduction. among them,
  • the processing module is configured to determine that a second terminal device that resides in the second network device needs to reside in a first network device, and the first network device and the second network device correspond to different PLMNs;
  • the transceiver module is configured to send a first message to the second terminal device, where the first message is used to instruct the second terminal device to reside on the first network device.
  • the processing module is configured to determine that the second terminal device residing on the second network device needs to reside on the first network in the following manner equipment:
  • a request message from the second terminal device is received through the transceiver module, where the request message is used to request to reside on the first network device.
  • the transceiver module is further configured to send the first network device to the first network device. 2. Verification information of the terminal device, where the verification information of the second terminal device is used to verify the second terminal device.
  • the transceiver module is further configured to receive a fourth message from the first network device, and the The fourth message is used to request the verification information of the second terminal device.
  • a communication device is provided.
  • the communication device is, for example, the first communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the first aspect or various possible implementation manners.
  • the first communication device may not include a memory, and the memory may be located outside the first communication device.
  • the first communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the first aspect or various possible implementation manners.
  • the first communication device when the processor executes the computer instructions stored in the memory, the first communication device is caused to execute the method in the foregoing first aspect or any one of the possible implementation manners.
  • the first communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a second terminal device.
  • the communication interface is realized by a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as input/output pins, etc., and the communication interface is connected to the radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the second communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the second aspect or various possible implementation manners.
  • the second communication device may not include a memory, and the memory may be located outside the second communication device.
  • the second communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the second aspect or various possible implementation manners.
  • the second communication device when the processor executes the computer instructions stored in the memory, the second communication device is caused to execute the method in the second aspect or any one of the possible implementation manners.
  • the second communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a first terminal device.
  • the communication interface is realized by, for example, a transceiver (or transmitter and receiver) in the communication device.
  • the transceiver is realized by an antenna, a feeder, and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the third communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the third aspect or various possible implementation manners.
  • the third communication device may not include a memory, and the memory may be located outside the third communication device.
  • the third communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the third aspect or various possible implementation manners.
  • the third communication device when the processor executes the computer instructions stored in the memory, the third communication device is caused to execute the method in the third aspect or any one of the possible implementation manners.
  • the third communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a first network device.
  • the communication interface is realized by a transceiver (or a transmitter and a receiver) in the communication device, for example, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication device is provided.
  • the communication device is, for example, the fourth communication device as described above.
  • the communication device includes a processor.
  • it may also include a memory for storing computer instructions.
  • the processor and the memory are coupled with each other, and are used to implement the methods described in the fourth aspect or various possible implementation manners.
  • the fourth communication device may not include a memory, and the memory may be located outside the fourth communication device.
  • the fourth communication device may further include a communication interface for communicating with other devices or equipment.
  • the processor, the memory, and the communication interface are coupled with each other, and are used to implement the methods described in the fourth aspect or various possible implementation manners.
  • the fourth communication device when the processor executes the computer instructions stored in the memory, the fourth communication device is caused to execute the method in the foregoing fourth aspect or any one of the possible implementation manners.
  • the fourth communication device is a communication device, or a chip or other component provided in the communication device.
  • the communication device is a second network device.
  • the communication interface is realized by, for example, a transceiver (or a transmitter and a receiver) in the communication device, for example, the transceiver is realized by an antenna, a feeder and a receiver in the communication device. Codec and other implementations.
  • the fourth communication device is a chip set in a communication device, the communication interface is, for example, an input/output interface of the chip, such as an input/output pin, etc., and the communication interface is connected to a radio frequency transceiver component in the communication device to Information is sent and received through radio frequency transceiver components.
  • a communication system which includes the communication device according to the fifth aspect or the communication device according to the ninth aspect.
  • the communication system further includes the communication device according to the seventh aspect or the communication device according to the eleventh aspect.
  • the communication system further includes the communication device according to the sixth aspect or the communication device according to the tenth aspect.
  • the communication system further includes the communication device according to the eighth aspect or the communication device according to the twelfth aspect.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the first aspect or any one of the above. The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the second aspect or any one of the foregoing. The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the third aspect or any one of the foregoing. The method described in one possible implementation.
  • a computer-readable storage medium is provided, the computer-readable storage medium is used to store computer instructions, and when the computer instructions are executed on a computer, the computer executes the fourth aspect or any one of the foregoing. The method described in one possible implementation.
  • a computer program product containing instructions is provided.
  • the computer program product is used to store computer instructions.
  • the computer instructions run on a computer, the computer executes the first aspect or any one of the above. The method described in one possible implementation.
  • a computer program product containing instructions is provided.
  • the computer program product is used to store computer instructions.
  • the computer instructions run on a computer, the computer executes the second aspect or any one of the foregoing. The method described in one possible implementation.
  • a computer program product containing instructions is provided.
  • the computer program product is used to store computer instructions.
  • the computer instructions run on a computer, the computer can execute the third aspect or any one of the foregoing. The method described in one possible implementation.
  • a computer program product containing instructions is provided, the computer program product is used to store computer instructions, and when the computer instructions run on a computer, the computer executes the fourth aspect or any of the above The method described in one possible implementation.
  • two terminal devices that reside under the network devices corresponding to different PLMNs can be changed to reside under the same network device, so if the two terminal devices are to be connected through the side link
  • HARQ and other mechanisms can be implemented normally, which improves the reliability of information transmission between terminal devices.
  • Figure 1A and Figure 1B are two schematic diagrams of side links
  • FIG. 2A is a schematic diagram of an application scenario of an embodiment of the application.
  • 2B is a schematic diagram of another application scenario of an embodiment of the application.
  • FIG. 3 is a flowchart of a case where the second terminal device determines to change to reside on the first network device in the first determining manner in the first communication method provided by the embodiment of the application;
  • FIG. 4 is a flowchart of a case where the second terminal device determines to change to reside on the first network device in the second determining manner in the first communication method provided by the embodiment of the application;
  • FIG. 5 is a flow chart of a situation in which the second terminal device determines to change to reside on the first network device in a third determining manner in the first communication method provided by an embodiment of the application;
  • FIG. 6 is a flowchart of the second network device authenticating the second terminal device in an embodiment of this application.
  • FIG. 7 is a flowchart of a second communication method provided by an embodiment of this application.
  • FIG. 8 is a flowchart of a third communication method provided by an embodiment of this application.
  • FIG. 9 is a flowchart of a fourth communication method provided by an embodiment of this application.
  • FIG. 10 is a schematic block diagram of a first type of second terminal device according to an embodiment of this application.
  • FIG. 11 is a schematic block diagram of a first terminal device of the first type according to an embodiment of this application.
  • FIG. 12 is a schematic block diagram of a first type of first network device according to an embodiment of this application.
  • FIG. 13 is a schematic block diagram of a first type of second network device according to an embodiment of this application.
  • FIG. 14 is a schematic block diagram of a second type of first terminal device according to an embodiment of this application.
  • 15 is a schematic block diagram of a second type of second terminal device according to an embodiment of this application.
  • FIG. 16 is a schematic block diagram of a second type of first network device according to an embodiment of this application.
  • FIG. 17 is a schematic block diagram of a second type of second network device according to an embodiment of this application.
  • FIG. 18 is a schematic block diagram of a third type of first terminal device provided by an embodiment of this application.
  • FIG. 19 is a schematic block diagram of a third type of second terminal device provided by an embodiment of this application.
  • FIG. 20 is a schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 21 is another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 22 is still another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 23 is another schematic block diagram of a communication device provided by an embodiment of this application.
  • Terminal devices including devices that provide users with voice and/or data connectivity, specifically, include devices that provide users with voice, or include devices that provide users with data connectivity, or include devices that provide users with voice and data connectivity Sexual equipment.
  • it may include a handheld device with a wireless connection function, or a processing device connected to a wireless modem.
  • the terminal device can communicate with the core network via a radio access network (RAN), exchange voice or data with the RAN, or exchange voice and data with the RAN.
  • RAN radio access network
  • the terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, vehicle to everything (V2X) terminal equipment , Machine-to-machine/machine-type communications (M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscriber unit, subscriber station (subscriber) station), mobile station (mobile station), remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user Agent (user agent), or user equipment (user device), etc.
  • UE user equipment
  • M2M/MTC Machine-to-machine/machine-type communications
  • IoT Internet of things
  • subscriber unit subscriber station (subscriber) station)
  • mobile station mobile station
  • remote station remote station
  • access point access point
  • AP remote terminal
  • remote terminal remote terminal
  • access terminal access terminal
  • user terminal user terminal
  • user Agent
  • it may include mobile phones (or “cellular” phones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, mobile devices with built-in computers, and so on.
  • PCS personal communication service
  • PCS cordless phones
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistants
  • restricted devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities. Examples include barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), laser scanners and other information sensing equipment.
  • RFID radio frequency identification
  • GPS global positioning system
  • laser scanners and other information sensing equipment.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses (for example, using virtual reality technology ( virtual reality (VR) technology glasses or augmented reality (augmented reality (AR) technology glasses, etc.), gloves, watches, clothing, shoes, etc.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
  • Use such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
  • the various terminal devices described above if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be regarded as vehicle-mounted terminal equipment, for example, the vehicle-mounted terminal equipment is also called on-board unit (OBU). ).
  • the terminal device may also refer to the vehicle itself.
  • the terminal device may also include a relay. Or it can be understood that everything that can communicate with the base station can be regarded as a terminal device.
  • the device for realizing the function of the terminal device may be a terminal device, or a device capable of supporting the terminal device to realize the function, such as a chip system, and the device may be installed in the terminal device.
  • the chip system may be composed of one or more chips, and may also include chips and other discrete devices.
  • the device used to implement the functions of the terminal is a terminal device as an example to describe the technical solutions provided by the embodiments of the present application.
  • Network equipment including, for example, access network (AN) equipment, such as a base station (e.g., access point), which may refer to equipment that communicates with wireless terminal equipment through one or more cells on the air interface in the access network
  • AN access network
  • a base station e.g., access point
  • V2X vehicle-to-everything
  • the base station can be used to convert the received air frame and IP packet to each other, as a router between the terminal device and the rest of the access network, where the rest of the access network can include the IP network.
  • the RSU can be a fixed infrastructure entity that supports V2X applications, and can exchange messages with other entities that support V2X applications.
  • the network equipment can also coordinate the attribute management of the air interface.
  • the network equipment may include a long term evolution (LTE) system or an evolved base station (NodeB or eNB or e-NodeB, evolutional NodeB) in a long term evolution-advanced (LTE-A) system, Or it can also include the next generation node B (gNB) in the new radio (NR) system (also referred to as the NR system) in the 5th generation (5G) mobile communication technology (the 5th generation, 5G), or it can also Including a centralized unit (CU) and a distributed unit (DU) in a cloud radio access network (cloud radio access network, Cloud RAN) system, which is not limited in the embodiment of the present application.
  • LTE long term evolution
  • NodeB or eNB or e-NodeB, evolutional NodeB evolutional NodeB
  • LTE-A long term evolution-advanced
  • gNB next generation node B
  • NR new radio
  • 5G 5th generation
  • 5G 5th generation
  • CU centralized
  • the network equipment may also include core network equipment.
  • the core network equipment includes, for example, access and mobility management function (AMF), security anchor function (SEAF), and authentication server function (authentication server function, AUSF). , Core network function (core network function, CN function) or unified data management (unified data management, UDM), etc.
  • the device used to implement the function of the network device may be a network device, or a device capable of supporting the network device to implement the function, such as a chip system.
  • the device can be installed in network equipment.
  • the technical solutions provided by the embodiments of the present application are mainly described by taking the device for realizing the functions of the network equipment as the network equipment as an example.
  • the SIM card can be understood as the key for the terminal device to access the mobile network.
  • the SIM card and its evolution are collectively referred to as a SIM card.
  • the SIM card can be an identification card for a user of a global system for mobile communications (GSM) digital mobile phone, which is used to store the user's identification code and key, and supports the authentication of the user by the GSM system; and
  • GSM global system for mobile communications
  • the SIM card can also be a universal subscriber identity module (USIM), it can also be called an upgraded SIM card, or the SIM card can also be an embedded global subscriber identity module (eSIM), and many more.
  • USIM universal subscriber identity module
  • eSIM embedded global subscriber identity module
  • the side link is the transmission link between terminal devices.
  • the base station and the vehicle 1 communicate through the Uu interface
  • the vehicle 1 and the vehicle 2 communicate through the side link.
  • the base station and the mobile phone communicate through the Uu interface
  • the mobile phone and the VR glasses communicate through the side link.
  • first and second are used to distinguish multiple objects, and are not used to limit the size, content, order, and timing of multiple objects. , Priority or importance, etc.
  • first message and the second message are only for distinguishing different messages, but do not indicate the difference in content, sending order, priority, or importance of the two messages.
  • the embodiments of the present application can be applied to various communication systems, such as: an LTE system, an LTE-A system, an NR system, or a possible future communication system, and there is no specific limitation.
  • the technical solutions provided by the embodiments of this application can be applied to device-to-device (D2D) scenarios, which can be NR D2D scenarios or LTE D2D scenarios, etc.; or, they can also be applied to vehicle to everything (vehicle to everything, V2X) scenarios, which can be NR V2X scenarios or LTE V2X scenarios, etc. Or it can also be applied to other scenarios or other communication systems, and there is no specific limitation.
  • D2D device-to-device
  • V2X vehicle to everything
  • V2X vehicle to everything
  • LTE V2X LTE V2X
  • SIM card 1 corresponds to operator 1
  • SIM card 2 corresponds to operator 2.
  • the mobile phone needs to communicate with the display of the wearable device, the SIM card installed in the mobile phone is, for example, a SIM card of China Unicom, and the SIM card installed in the display of the wearable device may be a mobile SIM card. This requires support for unicast communication across PLMNs.
  • the HARQ/ARQ retransmission mechanism means that after terminal device 1 sends data to terminal device 2, terminal device 2 can actively send feedback information corresponding to the data to terminal device 1, so as to determine whether the data is successfully transmitted.
  • HARQ is It is used to determine whether the MAC layer data needs to be retransmitted, and ARQ is used to determine whether the RLC layer data needs to be retransmitted. For a terminal device, if it sends data in one frequency band and monitors information from other devices, it will monitor in multiple frequency bands.
  • terminal device 1 may be able to monitor information from the terminal Feedback information of device 2.
  • the problem is that since the frequency band where the terminal device 1 sends data is different from the frequency band where the feedback information is located, the terminal device 1 cannot determine whether the feedback information is feedback information corresponding to the data. The terminal device 1 may think that the feedback information of the data has not been obtained.
  • the technical solutions of the embodiments of the present application are provided.
  • the second terminal device if the second terminal device resides on the second network device, the second terminal device can be changed to reside on the first network device, and the first terminal device resides on the first network device.
  • the HARQ mechanism can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • FIG. 2A is an application scenario of an embodiment of this application.
  • 2A includes network equipment 1, network equipment 2, terminal equipment 1, and terminal equipment 2.
  • Terminal device 1 resides in network device 1
  • terminal device 2 resides in network device 2.
  • the terminal device 1 and the terminal device 2 can communicate via a side link.
  • the network device 1 works, for example, in an evolved UMTS terrestrial radio access (E-UTRA) system, or works in an NR system, or works in a next-generation communication system or other communication system. in.
  • the network device 2 works, for example, in the E-UTRA system, or in the NR system, or in the next-generation communication system or other communication systems.
  • the network device 1 and the network device 2 may work in the same communication system, or may also work in different communication systems.
  • the network device in FIG. 2A is, for example, a base station.
  • network devices correspond to different devices in different systems.
  • they can correspond to an eNB
  • 5G system they correspond to an access network device in 5G, such as gNB.
  • the technical solutions provided by the embodiments of the present application can also be applied to future mobile communication systems.
  • the network equipment in FIG. 2A can also correspond to the network equipment in the future mobile communication system.
  • Figure 2A takes the network device as a base station as an example.
  • the network device may also be a device such as an RSU.
  • the first network and the second network are shown in Figure 2B.
  • the first network corresponds to PLMN1, the second network corresponds to PLMN2, and PLMN1 and PLMN2 are different PLMNs.
  • the first network includes access network equipment 1 and core network equipment.
  • the core network equipment included in the first network may include AUSF1, AMF/SEAF1, SMF1, CN function 1, and UDM1.
  • the second network includes access network equipment 2 and core network equipment.
  • the core network equipment included in the second network may include AUSF2, AMF/SEAF2, SMF2, CN function 2, and UDM2.
  • the first network is connected to the Internet through a gateway 1, and the second network is connected to the Internet through a gateway 2.
  • FIG. 2B also includes a terminal device 1 accessing the first network and a terminal device 2 accessing the second network.
  • the access network device is a base station as an example, that is, the access network device 1 is the base station 1, and the access network device 2 is the base station 2.
  • the base station can correspond to different devices in different systems, for example, in a 4G system, it can correspond to an eNB, and in a 5G system, it can correspond to an access network device in 5G, such as gNB.
  • the technical solutions provided by the embodiments of the present application can also be applied to future mobile communication systems. Therefore, the base station in FIG. 2B can also correspond to the access network equipment in the future mobile communication system.
  • Figure 2B takes the access network device as a base station as an example.
  • the access network device may also be a device such as an RSU.
  • the embodiment of the present application provides a first communication method. Please refer to FIG. 3, which is a flowchart of this method. In the following introduction process, the application of this method to the network architecture shown in FIG. 2B is taken as an example.
  • the method executed by the network device and the terminal device is taken as an example.
  • the first network device described below may include base stations 1, AMF1/SEAF1, and AMF1/SEAF1 included in the first network in the network architecture shown in FIG. 2B.
  • One or more of SMF1, CN function 1, or UDM1 the second network device described below may include base station 2, AUSF2, AMF/SEAF2, SMF2, and CN function included in the second network in the network architecture shown in FIG. 2B 2 or one or more of UDM2,
  • the first terminal device described below may be the terminal device 1 in the network architecture shown in FIG. 2B
  • the second terminal device described below may be the network architecture shown in FIG. 2B In the terminal equipment 2.
  • the first network device and the second network device correspond to different PLMNs, that is, the first network device and the second network device belong to different operators.
  • the second terminal device if the second terminal device resides on the second network device, the second terminal device can be changed to reside on the first network device, and the first terminal device resides on the first network device.
  • the first terminal device resides on the first network device.
  • two terminal devices reside on different network devices in the PLMN, one of the terminal devices can be changed to reside on the network device where the other terminal device is located, so that the two terminal devices reside on the same network device.
  • the HARQ mechanism can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • the second terminal device is determined to be changed to reside on the first network device. There may be multiple ways to determine it, which are described below with examples.
  • the second terminal device determines to change to the first determination method to reside on the first network device.
  • the second network device sends a first message to the second terminal device, and the first message may indicate that the second terminal device resides on the first network device. Then, after receiving the first message from the second network device, the second terminal device may determine to reside on the first network device according to the first message.
  • the first terminal device sends a third message to the first network device, and the first network device receives the third message from the first terminal device.
  • the third message is used to instruct the second terminal device to reside on the first network device.
  • the first terminal device and the second terminal device may establish a connection through a non-third generation partnership project (3rd generation partnership project, 3GPP) method for pairing identification, or the first terminal device and the second terminal device may also Pairing recognition is performed through the discovery process of 3GPP.
  • 3GPP non-third generation partnership project
  • the first terminal device determines that the network device where the second terminal device resides is not the first network device, then the first terminal device can request the first network device to change the second terminal device to reside on The first network equipment.
  • non-3GPP methods are, for example, wireless fidelity (Wi-Fi), Bluetooth (bluetooth), or near field communication (NFC).
  • the third message may reuse existing messages.
  • the third message may include first information, and the first information is used to indicate that the second terminal device resides on the first network device.
  • the first information may be carried in an existing field of the third message, for example, a reserved field of the third message may be used to carry the first information, or a reserved bit in a field of the third message may be used to carry the first information.
  • a new field may be added to the third message, and this field is used to carry the first information.
  • the third message may also be a newly defined message in the embodiment of the present application.
  • the first network device sends a second message to the second network device, and the second network device receives the second message from the first network device.
  • the second message is used to instruct the second terminal device to reside on the first network device, or to request verification of the second terminal device.
  • the first network device may include base station 1 and AMF1/SEAF1, then in S302, the first terminal device may actually send a third message to base station 1 included in the first network device, and base station 1 may receive the message from the first terminal device.
  • the third news After base station 1 receives the third message, it can send the third message to AMF1/SEAF1 again, and AMF1/SEAF1 receives the third message from base station 1.
  • an existing message may be reused, or may also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction of the third message in S302.
  • AMF1/SEAF1 may send the second message to the second network device, and the second network device may receive the second message from AMF1/SEAF1.
  • the second network device includes AMF2/SEAF2, AUSF2, and UDM2, then in S303, AMF1/SEAF1 may send a second message to the second network device including AMF2/SEAF2, and AMF2/SEAF2 receives the second message from AMF1/SEAF1 .
  • the third message in S302 includes the identifier of the second terminal device, and in S303, the second message may also include the identifier of the second terminal device, indicating that the second message is related to the second terminal device.
  • the second network device can authenticate the second terminal device.
  • the third message sent by the first terminal device to the first network device includes the identity of the second terminal device.
  • the first terminal device is the identity of the second terminal device obtained after pairing and identification with the second terminal device.
  • the identifier of the second terminal device is, for example, the ID of the second terminal device, or may also be other information that can indicate the second terminal device.
  • the second network device authenticates the second terminal device.
  • AMF2/SEAF2 receives the second message from AMF1/SEAF1, it can trigger the authentication process to authenticate the second terminal device.
  • the second network device authenticates the second terminal device in a variety of ways. The following example describes the authentication method.
  • the second network device can obtain the identifier of the second terminal device included in the second message. Since the second terminal device resides in the second network device, and when the second terminal device registers with the second network device, the second network device may have authenticated the second terminal device, so the second network device may The identification of the second terminal device is inquired to determine whether the authentication information of the second terminal device is stored, and the authentication information of the second terminal device may indicate that the authentication of the second terminal device has passed or failed. If the second network device determines that the authentication information of the second terminal device is stored, the second network device is equivalent to completing the authentication of the second terminal device described in S304. Then the second network device may send the authentication information of the second terminal device to the first network device, so that the first network device can determine whether the second terminal device has passed the authentication or failed the authentication.
  • the second network device may authenticate the second terminal device to obtain the authentication result.
  • the second network device can be authenticated again to obtain the authentication result again.
  • the authentication method adopted by the second network device It can also be the second authentication method described below.
  • AMF2/SEAF2 sends a first request to AUSF2, and AUSF2 receives the first request from AMF2/SEAF2.
  • the first request may be used to request authentication of the second terminal device.
  • the first request may include the identifier of the second terminal device to indicate that the second terminal device is to be authenticated.
  • the first request may also include information about the side link to be performed by the second terminal device, etc., for example, the information about the side link to be performed by the second terminal device may be that the first terminal device passes the first terminal device in S302.
  • the three messages are sent to AMF1/SEAF1, and AMF1/SEAF1 is sent to AMF2/SEAF2 through the second message in S303.
  • the first terminal device is the information about the side link to be performed by the second terminal device acquired after pairing and identification with the second terminal device. It can be used to authenticate the second terminal device.
  • AUSF2 After receiving the first request, AUSF2 can send a second request to UDM2, and UDM2 receives the second request from AUSF2.
  • the second request may be used to request to obtain data for authenticating the second terminal device, such as authentication data for side link information.
  • UDM2 may generate verification information of the second terminal device.
  • the verification information of the second terminal device can be used to authenticate the second terminal device.
  • UDM2 may send a response message for the second request to AUSF2, and AUSF2 receives a response message for the second request from UDM2.
  • the response message of the second request may include the verification information of the second terminal device.
  • AUSF2 After AUSF2 receives the response message of the second request, it can send the response message of the first request to AMF2/SEAF2, and AMF2/SEAF2 receives the response message of the first request from AUSF2.
  • the response message of the first request is, for example, used to request the verification information of the second terminal device.
  • the AMF2/SEAF2 After the AMF2/SEAF2 receives the response message of the first request, it can send the third request to the second terminal device, and the second terminal device receives the third request from AMF2/SEAF2.
  • the third request may be used to request the verification information of the second terminal device.
  • the second terminal device After receiving the third request, the second terminal device can calculate an authentication response.
  • the authentication reply includes, for example, the verification information of the second terminal device.
  • the verification information of the second terminal device mentioned in the previous step is obtained by UDM2, and the verification information of the second terminal device mentioned here is Data determined by the second terminal device to be used for authenticating the second terminal device.
  • the second terminal device can send an authentication reply to AMF2/SEAF2, and AMF2/SEAF2 receives the authentication reply from the second terminal device.
  • AMF2/SEAF2 can send the authentication reply to AUSF2, and AUSF2 receives the authentication reply from AMF2/SEAF2.
  • AUSF2 After receiving the authentication reply, AUSF2 also obtains the verification information of the second terminal device from the second terminal device. And AUSF2 has previously obtained the verification information from the second terminal device of UDM2, and AUSF2 can perform verification based on the two pieces of verification information to determine whether the second terminal device has passed the authentication. For example, AUSF2 compares the two pieces of verification information, and if the two pieces of verification information are consistent, it is determined that the authentication of the second terminal device has passed, and if the two pieces are inconsistent, it is determined that the authentication of the second terminal device has failed.
  • AUSF2 sends the authentication result to AMF2/SEAF2, and AMF2/SEAF2 receives the authentication result from AUSF2.
  • the authentication result can indicate that the second terminal device has passed or failed authentication, or that the second terminal device is legal or illegal (if the second terminal device passes the authentication, the second terminal device can be considered legal, if the second terminal device If the device authentication fails, it can be considered that the second terminal device is illegal).
  • AUSF2 may also send the verification information of the second terminal device to AMF2/SEAF2.
  • the second network device completes the authentication of the second terminal device.
  • the manner in which the second network device authenticates the second terminal device is not limited to the two described above, and the embodiment of the present application does not limit the specific authentication manner.
  • the second network device sends a fifth message to the first network device, and the first network device receives the fifth message from the second network device.
  • the fifth message includes verification information of the second terminal device.
  • the verification information of the second terminal device may be used to verify the second terminal device, for example, may be used to verify whether the identity of the second terminal device is legal or not.
  • an existing message can be reused, or it can also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction of the third message in S302.
  • AMF2/SEAF2 included in the second network device sends the fifth message to AMF1/SEAF1 included in the first network device, and AMF1/SEAF1 receives the fifth message from AMF2/SEAF2.
  • the verification information of the second terminal device included in the fifth message may be a string of random numbers, or a string of numbers generated according to the ID of the second terminal device in the second network.
  • the second network device sends a first message to the second terminal device, where the first message may indicate that the second terminal device resides on the first network device. After receiving the first message from the second network device, the second terminal device can determine to reside on the first network device.
  • the first message may reuse existing messages.
  • the first message may be an RRC connection reconfiguration message (RRC connection reconfiguration).
  • the first message may include the second information, and the second information is used to indicate that the second terminal device resides on the first network device.
  • the second information may be carried in an existing field of the first message, for example, a reserved field of the first message may be used to carry the first information, or a reserved bit in a field of the first message may be used to carry the second information. Or, a new field may be added to the first message, and the field is used to carry the second information.
  • the first message may also be a newly defined message in the embodiment of the present application.
  • the first message in S306 may include verification information of the second terminal device, which is used for verification of the second terminal device in the first network device.
  • verification information of the second terminal device which is used for verification of the second terminal device in the first network device.
  • an existing message can be reused, or it can also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction of the third message in S302.
  • AMF2/SEAF2 included in the second network device sends the first message to the second terminal device, and the second terminal device receives the first message from AMF2/SEAF2.
  • the second terminal device sends a request message to the second network device, and the second network device receives the request message from the second terminal device.
  • the request message is used to request to reside on the first network device.
  • the request message may carry a reason for requesting to reside on the first network device.
  • the request message may carry information about the side link service to be performed by the second terminal device.
  • the first terminal device and the second terminal device may establish a connection in a non-3GPP manner to perform pairing recognition, or the first terminal device and the second terminal device may also perform pairing recognition through a 3GPP discovery process.
  • the second terminal device determines that the network device where the second terminal device resides and the network device where the first terminal device resides are not the same network device, then the second terminal device can request the second network device to It resides on the first network device instead.
  • the second terminal device may obtain the PLMN information of the first terminal device from the first terminal device.
  • the non-3GPP method is, for example, Wi-Fi, Bluetooth, or NFC.
  • an existing message can be reused, or a newly defined message in the embodiment of the present application, etc., can refer to the introduction of the third message in S302.
  • the second terminal device may send the request message to AMF2/SEAF2 included in the second network device, and AMF2/SEAF2 receives the request message from the second terminal device.
  • the second network device sends a third message to the first network device, and the first network device receives the third message from the second network device.
  • the third message may indicate that the second terminal device resides on the first network device, or indicates that the second terminal device residing on the second network device requests to reside on the first network device, or the third message may also be used to request the first network device.
  • the network device receives the second terminal device.
  • an existing message may be reused, or may also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction in S302.
  • the third message in S308 may include verification information of the second terminal device, which is used to verify the second terminal device.
  • the verification information in the third message may be a string of random numbers, or a string of numbers generated according to the ID of the second terminal device in the second network.
  • AMF2/SEAF2 in the second network device sends a third message to AMF1/SEAF1 in the first network device, and AMF1/SEAF1 receives the third message from AMF2/SEAF2.
  • the first network device sends a second message to the second network device, and the second network device receives the second message from the first network device.
  • the second message may indicate that the second terminal device resides on the first network device, or the second message indicates that the first network device agrees to receive the second terminal device.
  • an existing message may be reused, or may also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction of the third message in S302.
  • AMF1/SEAF1 may send the second message to AMF2/SEAF2, and AMF2/SEAF2 may receive the second message from AMF1/SEAF1.
  • the second message may include a verification message for subsequent identity verification of the second terminal device under the first network.
  • the verification information in the second message may be a string of random numbers, or a string of numbers generated according to the ID of the second terminal device in the second network.
  • the second network device sends a first message to the second terminal device, where the first message may indicate that the second terminal device resides on the first network device. After receiving the first message from the second network device, the second terminal device can determine to reside on the first network device.
  • the first message in S310 may include verification information of the second terminal device, which is used for verification of the second terminal device in the first network.
  • verification information of the second terminal device for example, an existing message may be reused, or may also be a newly defined message in the embodiment of the present application, etc., and reference may be made to the introduction of the first message in S306.
  • AMF2/SEAF2 sends the first message to the second terminal device, and the second terminal device receives the first message from AMF2/SEAF2.
  • the second terminal device determines to change to the second determination method of staying on the first network device.
  • the first terminal device sends a first message to the second terminal device, and the second terminal device receives the first message from the first terminal device.
  • the first message may indicate that the second terminal device resides on the first network device.
  • the first terminal device sends a third message to the first network device, and the first network device receives the third message from the first terminal device.
  • the third message is used to instruct the second terminal device to reside on the first network device.
  • the first network device sends a message for requesting verification of the second terminal device to the second network device, or sends a message for instructing the second terminal device to reside on the first network device, or sends a message for requesting the second terminal device to reside on the first network device.
  • a message from the first network device, and the second network device receives the message from the first network device. For example, the message is the fourth message.
  • the second network device authenticates the second terminal device.
  • the second network device sends a fifth message to the first network device, and the first network device receives the fifth message from the second network device.
  • the fifth message includes verification information of the second terminal device.
  • the verification information of the second terminal device can be used to verify the second terminal device, for example, can verify whether the identity of the second terminal device is legal or not.
  • the first network device sends a second message to the first terminal device, and the first terminal device receives the second message from the first network device.
  • the second message may indicate that the second terminal device resides on the first network device.
  • an existing message may be reused, or may also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction of the third message in S302.
  • the AMF1/SEAF1 included in the first network device may send the verification information of the second terminal device to the base station 1, and the base station 1 receives the verification information of the second terminal device from the AMF1/SEAF1. And the base station 1 may determine the second message and send the second message to the first terminal device, and the first terminal device receives the second message from the base station 1.
  • the first terminal device sends a first message to the second terminal device, and the second terminal device receives the first message from the first terminal device.
  • the first message may indicate that the second terminal device resides on the first network device.
  • the second terminal device determines to change to the third determination method of staying on the first network device.
  • the first network device sends a first message to the second terminal device, and the second terminal device receives the first message from the first network device.
  • the first message may indicate that the second terminal device resides on the first network device.
  • the second terminal device sends a third message to the first network device, and the first network device receives the third message from the second terminal device.
  • the third message can be used to request to reside on the first network device.
  • the second terminal device thinks that it needs to access the cell under the first network device (for example, the second terminal device needs to communicate with the first terminal device through the side link, or the second terminal device is passing through the side link.
  • the second terminal device determines that the network device where the second terminal device resides is not the network device where the first terminal device is located, then the second terminal device may consider that it needs to access the first network device Cell below), the second terminal device can actively request to access the first network device.
  • an existing message may be reused, or may also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction in S302.
  • the second terminal device may send a third message to the base station 1, and the base station 1 receives the third message from the second terminal device.
  • S502 The first network device authenticates the second terminal device.
  • the base station 1 and AMF1/SEAF1 authenticate the second terminal device, it is determined that the second terminal device is a terminal device that resides on the second network device.
  • the first network device sends a fourth message to the second network device, and the second network device receives the fourth message from the first network device.
  • the fourth message may be used to request to obtain verification information of the second terminal device, or to request verification of the second terminal device.
  • an existing message may be reused, or it may also be a newly defined message in the embodiment of the present application.
  • an existing message may be reused, or it may also be a newly defined message in the embodiment of the present application.
  • AMF1/SEAF1 may send the fourth message to AMF2/SEAF2, and AMF2/SEAF2 may receive the fourth message from AMF1/SEAF1.
  • the second network device authenticates the second terminal device.
  • the authentication process does not include interaction with the first terminal device, and the second network device transparently transmits the authentication message through the first network device to interact with the second terminal device.
  • the second network device wants to authenticate the second terminal device, refer to the authentication method introduced in S304, or the second network device may also use other methods to authenticate the second terminal device.
  • the second network device sends a fifth message to the first network device, and the first network device receives the fifth message from the second network device.
  • the fifth message may indicate the success or failure of the authentication of the second terminal device.
  • the fifth message may also include verification information of the second terminal device.
  • the verification information in the fifth message may be a string of random numbers, or a string of numbers generated according to the ID of the second terminal device in the second network.
  • an existing message can be reused, or it can also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction of the third message in S302.
  • AMF2/SEAF2 can send the fifth message to AMF1/SEAF1, and AMF1/SEAF1 receives the fifth message from AMF2/SEAF2.
  • S506 The first network device determines that the authentication of the second terminal device is successful.
  • the successful authentication of the second terminal device is taken as an example.
  • the first network device sends a first message to the second terminal device, and the second terminal device receives the first message from the first network device.
  • the first message may indicate that the second terminal device resides on the first network device.
  • an existing message can be reused, or it can also be a newly defined message in the embodiment of the present application, etc., please refer to the introduction of the third message in S302.
  • an existing message may be reused, or may also be a newly defined message in the embodiment of the present application, etc., and reference may be made to the introduction of the first message in S306.
  • the second terminal device adopts the first determination method or the second determination method described above to determine to change to reside on the first network device, then after the second terminal device determines to change to reside on the first network device, Corresponding steps can also be included, which are described below.
  • the second terminal device performs cell reselection to access the first network device.
  • the second terminal device first disconnects the RRC connection with the second network device and enters the RRC idle state. After that, the second terminal device in the RRC idle state may perform cell reselection according to the information corresponding to the first network device to access the first network device.
  • the first message received by the second terminal device may include the identity of the first network device, such as the ID of the first network device, the PLMN ID of the first network, etc.
  • the second terminal device is performing During cell reselection, it can be determined to reselect the cell under the first network device.
  • the first message may not include the identity of the first network device, but the first terminal device and the second terminal device may have communicated, for example, the communication can be performed through Bluetooth or Wi-Fi, and the first terminal device can connect the first terminal device to the first network device.
  • the identity of a network device is sent to the second terminal device, so that the second terminal device can obtain the identity of the first network device from the first terminal device.
  • the second terminal device establishes an RRC connection with the first network device.
  • the second terminal device may establish an RRC connection with the first network device through a random access process.
  • the second terminal device may establish an RRC connection with the base station 1. I won’t go into details here for the random access process.
  • the establishment of an RRC connection between the second terminal device and the first network device in S312 may refer to establishing a new RRC connection, or may also refer to reestablishing an RRC connection.
  • the second terminal device may perform a registration process to register with the first network device.
  • the first network device may also perform corresponding authentication on the second terminal device to determine whether the identity of the second terminal device is legal.
  • FIG. 6 please refer to FIG. 6 below to introduce the authentication of the current terminal device in the registration process, taking the registration of the second terminal device to the first network device as an example.
  • the first network equipment includes base station 1, AMF1/SEAF1, AUSF1, and UDM1.
  • the authentication process may also include the first network device's service identification for the side link to be performed by the second terminal device, so as to generate specific authentication information for a specific service, such as determining that the second terminal device needs to perform on the side link For the VR/AR service performed on the Internet, the authentication information under the first network device is determined.
  • the second terminal device establishes an RRC connection with the base station 1.
  • the second terminal device may select the cell under the PLMN corresponding to the SIM card according to the SIM card set by the second terminal device. If the second terminal device does not know which network device specifically needs to be accessed, the second terminal device may perform cell reselection to select the corresponding cell. For the embodiment of the present application, if the second terminal device has obtained the identity of the first network device, the second terminal device can perform cell reselection according to the identity of the first network device to reselect to the first network device. The cell is reselected to the cell under base station 1. If the registration process is applied to the embodiment of this application, S601 and S312 can be the same step.
  • the second terminal device sends a registration request to AMF1/SEAF1, and AMF1/SEAF1 receives a registration request from the second terminal device.
  • the registration request may carry sidelink information to be performed by the second terminal device, such as service information.
  • AMF1/SEAF1 sends a user authentication request to AUSFl, and AUSFl receives the user authentication request from AMF1/SEAF1.
  • the user authentication request is used to request authentication of the second terminal device.
  • the user authentication request may carry the information of the side link to be performed by the second terminal device. If this process is applied to the embodiment of this application, the side link information carried in the user authentication request may be sent by the first terminal device to the first network device through a third message in S302, and the first network device In S303, it is sent to the second network device through the second message.
  • the first terminal device is the information about the side link to be performed by the second terminal device acquired after pairing and identification with the second terminal device. It can be used to authenticate the second terminal device.
  • AUSF1 sends a user authentication data acquisition request to UDM1, and UDM1 receives the user authentication data acquisition request from AUSF1.
  • the request for obtaining user authentication data is used to request to obtain data for authenticating the second terminal device, such as authentication data for side link information.
  • UDM1 generates authentication data.
  • the authentication data can be used to authenticate the second terminal device.
  • the authentication data may also be referred to as verification information of the second terminal device.
  • UDM1 sends a response to obtaining user authentication data to AUSF1, and AUSF1 receives the response to obtaining user authentication data from UDM1.
  • the said reply for obtaining user authentication data may carry the said authentication data.
  • AUSF1 sends a user authentication response to AMF1/SEAF1, and AMF1/SEAF1 receives the user authentication response from AUSF1.
  • AMF1/SEAF1 sends an authentication request to the second terminal device, and the second terminal device receives the authentication request from AMF1/SEAF1.
  • the second terminal device calculates an authentication reply.
  • the authentication reply for example, includes authentication data used to authenticate the second terminal device.
  • the authentication data in S609 is obtained by the second terminal device, and the authentication data in S605 is obtained by UDM1.
  • the second terminal device sends an authentication reply to AMF1/SEAF1, and AMF1/SEAF1 receives the authentication reply from the second terminal device.
  • AMF1/SEAF1 sends the authentication reply to AUSFl, and AUSF1 receives the authentication reply from AMF1/SEAF1.
  • AUSF1 compares the authentication data included in the authentication reply with the authentication data from UDM1. If the two are consistent, it is determined that the authentication of the second terminal device is passed. If the two are inconsistent, the authentication data of the second terminal device is determined to be passed. Right failed.
  • AUSF2 sends the authentication result to AMF1/SEAF1, and AMF1/SEAF1 receives the authentication result from AUSF1.
  • the authentication result can indicate that the second terminal device has passed or failed authentication, or that the second terminal device is legal or illegal (if the second terminal device passes the authentication, the second terminal device can be considered legal, if the second If the authentication of the terminal device fails, it can be considered that the second terminal device is illegal).
  • AMF1/SEAF1 sends the authentication result to the second terminal device, and the second terminal device receives the authentication result from AMF1/SEAF1. Therefore, the second terminal device can determine whether the second terminal device has passed the authentication.
  • S614 is an optional step.
  • Figure 6 shows the authentication process when the terminal device is currently registered.
  • the second terminal device is registered with the first network device.
  • For the authentication during the registration process refer to the embodiment shown in Figure 6 .
  • the first network device verifies the second terminal device. If the verification is passed, S314 is executed, and if the verification fails, S315 is executed.
  • the second terminal device may send the verification information of the second terminal device to the first network device, and the verification information of the second terminal device sent by the second terminal device is included in the first message.
  • the first network device also obtains the verification information of the second terminal device from the second network device (for example, the fifth message or the third message from the second network device may include the verification information of the second terminal device), then the first network The device may perform verification based on the verification information from the second terminal device and the verification information from the second network device.
  • the first network device may compare the verification information from the second terminal device with the verification information from the second network device to determine whether the two are consistent, and if the two are consistent, then the second terminal device is determined to pass the verification, and if If the two are inconsistent, it is determined that the verification of the second terminal device fails.
  • the verification information of the second terminal device may be a string of random numbers, or a string of numbers generated according to the ID of the second terminal device in the second network.
  • the second terminal device may send the verification information of the second terminal device to the first network device through any message in the process of establishing an RRC connection, such as an RRC establishment request message or an RRC establishment completion message.
  • the second terminal device may also send the verification information of the second terminal device to the first network device through any message after the RRC connection is established, or the second terminal device may also send the authentication information of the second terminal device to the first network device through a newly defined message in this embodiment of the application.
  • the verification information of the second terminal device is sent to the first network device. If it is a newly defined message, then there is no restriction on the occurrence time of the message.
  • the second terminal device sends the verification information of the second terminal device to AMF1/SEAF1 through the authentication reply in S610, and AMF1/SEAF1 sends the authentication reply to AUSF1, and AUSF1 Verify the second terminal device.
  • the second terminal device sends the verification information of the second terminal device to the base station 1.
  • the base station 1 may send the verification information of the second terminal device to AMF1/SEAF1, the second terminal device is verified by AMF1/SEAF1.
  • AMF1/SEAF1 may also send the verification information of the second terminal device to AUSF1, and AUSF1 will verify the second terminal device.
  • the second terminal device can also send the authentication information of the second terminal device to AMF1/SEAF1 through the authentication reply in S610, and AMF1/SEAF1 sends the authentication reply
  • the second terminal device is verified by AUSFl, that is, when S612 is executed, S313 is actually executed. But the difference is that in S313, the first network device compares the verification information from the second terminal device with the verification information from the second network device, that is, the two pieces of verification information compared by the first network device , One is from the second terminal device, and the other is from the second network device (not determined by the first network device).
  • the first terminal device and the second terminal device establish a sideline connection under the first network device.
  • one of the terminal devices can be changed to reside on the network device where the other terminal device is located, so that the two terminal devices reside on the same network device. Under one network device, then these two terminal devices communicate through the side link, and the HARQ mechanism can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • the first network device sends a rejection message to the second terminal device, and the second terminal device receives the rejection message from the first network device.
  • the rejection message is used to indicate that the access of the second terminal device is rejected.
  • the second terminal device may be illegal, and the first network device may deny access to the second terminal device to ensure network security. For example, if AMF1/SEAF1 fails to verify the second terminal device, AMF1/SEAF1 may send to the base station 1 information indicating that the second terminal device fails to verify. After base station 1 receives the information from AMF1/SEAF1, it can send a rejection message to the second terminal device, and the second terminal device can receive the rejection message from base station 1.
  • the second terminal device adopts the first determination method or the second determination method described above to determine to change to reside on the first network device, then the second terminal device determines to change to reside on the network device. After arriving at the first network device, the corresponding steps may also be included. If the second terminal device determines to change to reside on the first network device by using the third determining method as described above, after the second terminal device determines to change to reside on the first network device, it may also include the corresponding corresponding The steps are described below.
  • the second terminal device establishes an RRC connection with the first network device.
  • the second terminal device may establish an RRC connection with the first network device through a random access process.
  • the second terminal device may establish an RRC connection with the base station 1. I won’t go into details here for the random access process.
  • the first terminal device and the second terminal device establish a sideline connection under the first network device.
  • the first network device has determined that the authentication of the second terminal device is successful, so the first network device does not need to verify the second terminal device. After the second terminal device succeeds in random access, it The communication can be carried out under the first network device.
  • one of the terminal devices can be changed to reside on the network device where the other terminal device is located, so that the two terminal devices reside on the same network device. Under one network device, then these two terminal devices communicate through the side link, and the HARQ mechanism can be implemented normally, which improves the reliability of information transmission between the terminal devices.
  • Fig. 7 is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 2A is taken as an example.
  • the method executed by the network device and the terminal device is taken as an example.
  • the first network device described below may be the network device 1 in the network architecture shown in FIG. 2A
  • the second network device described below The device may be the network device 2 in the network architecture shown in FIG. 2A
  • the first terminal device described below may be the terminal device 1 in the network architecture shown in FIG. 2A
  • the second terminal device described below may be The terminal device 2 in the network architecture shown in 2A.
  • the first network device determines a transmission resource used by the first terminal device to send data, and a feedback resource used by the first terminal device to receive feedback information of data sent by the transmission resource.
  • the transmission resource may include the first resource, and the feedback resource includes the second resource; or, the transmission resource includes the first resource pool, and the feedback resource includes the second resource pool.
  • the transmission resources required for the communication may be allocated by the first network device.
  • the first network device allocates transmission resources to the first terminal device, and there are two allocation methods.
  • An allocation method is that the resources required by the first terminal device to send data each time are scheduled by the first network device.
  • the sending resource determined by the first network device may be the first resource.
  • Another allocation method is that the first network device can configure a resource pool for the first terminal device. For example, the first network device can broadcast the information of the resource pool, then all or part of the terminal devices covered by the first network device All terminal devices can use this resource pool to send data.
  • the sending resource determined by the first network device may be a first resource pool, and the first resource pool includes one or more resources for sending data.
  • the first terminal device resides in the first network device
  • the second terminal device resides in the second network device
  • the first network device and the second network device correspond to different PLMNs.
  • the second terminal device needs to send feedback information corresponding to the data to the first terminal device, for example, the feedback information is an acknowledgement (ACK) or a negative acknowledgement (NACK), ACK indicates that the second terminal device successfully receives data, and NACK indicates that the second terminal device fails to receive data.
  • the second terminal device sends the feedback information corresponding to the data to the first terminal device, it also needs to use corresponding resources to send it.
  • the first network device in addition to determining the sending resource, is used to receive the resource of the feedback information of the data sent through the sending resource (this is referred to as the feedback resource in this document), which may also be used by the first network device to make sure.
  • the first network device sends a first message, and the first terminal device receives the first message from the first network device.
  • the first message is used to indicate the transmission resource and is used to indicate the feedback resource.
  • the first message may indicate a feedback resource.
  • the first terminal device may determine that the feedback resource is feedback information for receiving data sent through the transmission resource.
  • the first message may also indicate that the feedback resource is used to receive feedback information of data sent through the sending resource.
  • the sending resource is the first resource pool and the feedback resource is the second resource pool
  • the first message can be a broadcast message, and all terminal devices that receive the first message can use the first resource pool to send data
  • the second resource pool can be used to receive feedback information
  • the first terminal device is only one of the multiple terminal devices.
  • the transmission resource is the first resource
  • the feedback resource is the second resource
  • the first message may be a unicast message, and the first resource and the second resource are configured for the first terminal device.
  • the first network device may also indicate the sending resource and the feedback resource separately through two messages.
  • the two messages may be sent at the same time, or may also be sent in time sharing.
  • the sending resource is the first resource pool and the feedback resource is the second resource pool
  • the first resource pool and the second resource pool can be pre-configured in the terminal device , Or it can be stipulated by agreement. If this is the case, the first network device may not need to send the first message.
  • the first network device may also determine a feedback resource for receiving feedback information of data sent through the transmission resource. For example, to implement the HARQ mechanism, after the first terminal device sends data to the second terminal device, the second terminal device needs to send feedback information corresponding to the data to the first terminal device, for example, the feedback information is ACK or NACK. When the second terminal device sends the feedback information corresponding to the data to the first terminal device, it also needs to use corresponding resources to send it. If the second network device determines the resource used to send the feedback information, the first terminal device may not be able to identify whether the feedback information actually corresponds to the feedback information of the data, and the feedback actually fails.
  • the first network device can determine the feedback resource, and the first network device can notify the first terminal device of the determined transmission resource and the feedback resource, and the first terminal device can use the feedback resource To monitor the feedback information, the first terminal device can determine that the feedback information corresponds to the data sent through the transmission resource, thereby ensuring the normal operation of the HARQ mechanism and improving the reliability of transmission.
  • the first network device sends a fourth message to the second network device, where the fourth message is used to indicate the sending resource and the feedback resource.
  • the second network device receives the fourth message from the first network device, and can determine the sending resource and the feedback resource according to the fourth message.
  • the first network device may inform the second network device of the sending resource and the feedback resource.
  • the first terminal device determines the first resource according to the first message.
  • the first terminal device When the first terminal device wants to send data to the second terminal device, it may determine the first resource.
  • the first terminal device may determine the first resource. Alternatively, if the sending resource indicated by the first message is the first resource pool, the first terminal device may select the first resource for sending data from the first resource pool.
  • S73 can occur before S74, or S73 can occur after S74, or S73 and S74 can occur simultaneously.
  • the second network device sends a third message, and the second terminal device receives the third message from the second network device.
  • the third message is used to indicate the feedback resource.
  • the third message may indicate a feedback resource, and after receiving the third message, the second terminal device may determine that the feedback resource is feedback information for receiving data sent through the transmission resource.
  • the third message may also indicate that the feedback resource is used to receive feedback information of data sent through the sending resource.
  • the third message can be a broadcast message, and all terminal devices that receive the third message can use the second resource pool to send feedback information corresponding to the first resource pool.
  • the terminal device is only one of these multiple terminal devices.
  • the third message may be a unicast message, and the second resource is configured for the second terminal device.
  • S75 can happen after S73.
  • S75 may occur before S74, or S75 may occur after S74, or S75 and S74 may occur simultaneously.
  • the second terminal device determines the second resource according to the third message.
  • the second terminal device When the second terminal device wants to receive data from the first terminal device, it may determine the second resource.
  • the second terminal device may determine the second resource. Alternatively, if the sending resource indicated by the third message is the second resource pool, the second terminal device may select the second resource for sending the feedback information from the second resource pool.
  • the first terminal device sends data to the second terminal device on the first resource, and the second terminal device receives the data from the first terminal device through the first resource.
  • the second terminal device sends feedback information to the first terminal device on the second resource, and the first terminal device receives the feedback information from the second terminal device on the second resource.
  • the feedback information corresponds to the data in S77.
  • the feedback information is, for example, ACK or NACK.
  • the second terminal device determines the feedback resource, and after receiving the data from the first terminal device, the second terminal device sends feedback information of the data to the first terminal device through the feedback resource. If the feedback resource is the second resource, the second terminal device sends the feedback information of the data to the first terminal device on the second resource, or if the feedback resource is the second resource pool, the second terminal device can send the data from the second resource pool. Select a resource in the resource pool to send the feedback information, for example, the second terminal device selects the second resource to send the feedback information.
  • the first terminal device also determines the feedback resource corresponding to the sending resource according to the first message. If the feedback resource is the second resource, the first terminal device can monitor the feedback information of the data on the second resource. As long as the feedback information is received on the second resource, the first terminal device can determine that the feedback information corresponds to Feedback information of the data. Or, if the feedback resource is the second resource pool, the first terminal device can monitor the feedback information of the data on all or part of the resources included in the second resource pool, because the second terminal device sends the data on the second resource Therefore, the first terminal device may receive the feedback information on the second resource. As long as it is the feedback information received on the resources included in the second resource pool, the first terminal device can determine that it is the feedback information corresponding to the data.
  • the sending resource is the first resource pool and the feedback resource is the second resource pool
  • the first terminal device can select from the second resource pool in addition to the first resource for sending data from the first resource pool.
  • the second resource used to send feedback information of the data.
  • the first terminal device may send the first indication information to the second terminal device, the first indication information may indicate the second resource, or the first indication information may indicate the second resource, and indicate that the second resource is used to send information through the first resource. Feedback information of received data. After the second terminal device receives the first indication information from the first terminal device, it can determine the second resource.
  • the second terminal device after receiving the data from the first terminal device, the second terminal device does not need to select a resource from the second resource pool, but can use the second resource to send feedback information of the data to the first terminal device.
  • the first terminal device does not need to monitor the second resource pool, but only needs to monitor the second resource, which reduces the power consumption of the first terminal device.
  • the second terminal device may need to feed back on the second resource and send on the resource of the second network at the same time. If the second terminal device cannot complete simultaneous transmission due to capacity problems, it may be agreed to send feedback information first, or send the data of the second terminal device first. In this way, inconsistent understanding between the sender and the receiver can be avoided in the communication on the side link.
  • the first network device The transmission resource used for the first terminal device to send data and the feedback resource used for the second terminal device to send feedback information can be determined, so that the second terminal device uses the feedback resource to send feedback information, and the first terminal device only needs to monitor on the feedback resource.
  • the feedback information it can be determined that it is the feedback information corresponding to the sent data. In this way, the HARQ mechanism can be performed normally, and the reliability of transmission is improved.
  • FIG. 8 is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 2A is taken as an example.
  • the method executed by the network device and the terminal device is taken as an example.
  • the first network device described below may be the network device 1 in the network architecture shown in FIG. 2A
  • the second network device described below The device may be the network device 2 in the network architecture shown in FIG. 2A
  • the first terminal device described below may be the terminal device 1 in the network architecture shown in FIG. 2A
  • the second terminal device described below may be The terminal device 2 in the network architecture shown in 2A.
  • the first network device determines a sending resource for the first terminal device to send data.
  • the sending resource may include the first resource or the first resource pool.
  • the transmission resources required for the communication may be allocated by the first network device.
  • the first network device allocates transmission resources to the first terminal device, and there are two allocation methods.
  • An allocation method is that the resources required by the first terminal device to send data each time are scheduled by the first network device.
  • the sending resource determined by the first network device may be the first resource.
  • Another allocation method is that the first network device can configure a resource pool for the first terminal device. For example, the first network device can broadcast the information of the resource pool, then all or part of the terminal devices covered by the first network device All terminal devices can use this resource pool to send data.
  • the sending resource determined by the first network device may be a first resource pool, and the first resource pool includes one or more resources for sending data.
  • the first terminal device resides in the first network device
  • the second terminal device resides in the second network device
  • the first network device and the second network device correspond to different PLMNs.
  • the first network device sends the sending resource information to the second network device, and the second network device receives the sending resource information from the first network device.
  • the first network device can notify the second network device of the information of the transmission resource, so that the second network device can determine the transmission resource.
  • the second network device sends the feedback resource information to the first network device, and the first network device receives the feedback resource information from the second network device.
  • the second network device may determine the corresponding feedback resource.
  • the feedback resource may be used for the second terminal device to send feedback information of data received through the sending resource.
  • the transmission resource includes the first resource
  • the feedback resource may include the second resource; or, if the transmission resource includes the first resource pool, the feedback resource may include the second resource pool.
  • the first network device After receiving the information of the feedback resource, the first network device can determine the feedback resource. Through S81-S83, the first network device can determine the sending resource and the feedback resource.
  • the first network device sends a first message, and the first terminal device receives the first message from the first network device.
  • the first message is used to indicate the transmission resource and is used to indicate the feedback resource.
  • the first message may indicate that the transmission resource and the feedback resource have an association relationship, and the association relationship means that the feedback resource is used to receive feedback information of data sent through the transmission resource. Then, after receiving the first message, the first terminal device can determine that the feedback resource is feedback information for receiving data sent through the sending resource. For example, if the first message indicates the transmission resource and the feedback resource, it implicitly indicates that the first message indicates that the transmission resource and the feedback resource have an association relationship, and no additional indication information is needed, which helps to save signaling overhead; or In addition to indicating the sending resource and the feedback resource, the first message may also indicate that the sending resource and the feedback resource have an association relationship, so that the indication is more clear.
  • the sending resource is the first resource pool and the feedback resource is the second resource pool
  • the first message can be a broadcast message, and all terminal devices that receive the first message can use the first resource pool to send data
  • the second resource pool can be used to receive feedback information
  • the first terminal device is only one of the multiple terminal devices.
  • the transmission resource is the first resource
  • the feedback resource is the second resource
  • the first message may be a unicast message, and the first resource and the second resource are configured for the first terminal device.
  • the first network device after determining the transmission resource, can inform the second network device of the information of the transmission resource, so that the second network device can determine the corresponding feedback resource, and the second network device can send feedback
  • the resource information informs the first network device, and both the first network device and the second network device can determine the association relationship between the sending resource and the feedback resource.
  • the second terminal device needs to send feedback information corresponding to the data to the first terminal device, for example, the feedback information is ACK or NACK.
  • the second terminal device sends the feedback information corresponding to the data to the first terminal device, it also needs to use corresponding resources to send it.
  • both the first network device and the second network device can determine the association relationship between the sending resource and the feedback resource, the second terminal device uses the feedback resource to send feedback information, and the first terminal device can use the feedback
  • the resource monitors the feedback information, so that the first terminal device can determine that the feedback information corresponds to the data sent through the transmission resource, thereby ensuring the normal operation of the HARQ mechanism and improving the reliability of transmission.
  • the first terminal device determines the first resource according to the first message.
  • the first terminal device When the first terminal device wants to send data to the second terminal device, it may determine the first resource.
  • the first terminal device may determine the first resource. Alternatively, if the sending resource indicated by the first message is the first resource pool, the first terminal device may select the first resource for sending data from the first resource pool.
  • the second network device sends a third message, and the second terminal device receives the third message from the second network device.
  • the third message is used to indicate the sending resource and the feedback resource.
  • the third message may indicate that the transmission resource and the feedback resource have an association relationship, and the association relationship means that the feedback resource is used to receive feedback information of data sent through the transmission resource. Then, after receiving the third message, the second terminal device can determine that the feedback resource is feedback information for receiving data sent through the sending resource.
  • the third message indicates the transmission resource and the feedback resource, which also implicitly indicates that the third message indicates that the transmission resource and the feedback resource have an association relationship, without additional indication information, which helps to save signaling overhead; or
  • the third message may also indicate that the sending resource and the feedback resource have an association relationship, so that the indication is clearer.
  • the third message can be a broadcast message, and all terminal devices that receive the third message can use the second resource pool to send feedback Information, the second terminal device is only one of the multiple terminal devices.
  • the transmission resource is the first resource
  • the feedback resource is the second resource
  • the third message may be a unicast message, and the second resource is configured for the second terminal device.
  • S86 can occur before S85, or S86 can occur after S85, or S86 and S85 can occur simultaneously.
  • the second terminal device determines the second resource according to the third message.
  • the second terminal device When the second terminal device wants to receive data from the first terminal device, it may determine the second resource.
  • the second terminal device may determine the second resource. Alternatively, if the sending resource indicated by the third message is the second resource pool, the second terminal device may select the second resource for sending the feedback information from the second resource pool.
  • the first terminal device sends data to the second terminal device on the first resource, and the second terminal device receives the data from the first terminal device through the first resource.
  • the second terminal device sends feedback information to the first terminal device on the second resource, and the first terminal device receives the feedback information from the second terminal device on the second resource.
  • the feedback information corresponds to the data in S88.
  • the feedback information is, for example, ACK or NACK.
  • the second terminal device determines the feedback resource, and after receiving the data from the first terminal device, the second terminal device will send the feedback information of the data to the first terminal device through the feedback resource. If the feedback resource is the second resource, the second terminal device sends the feedback information of the data to the first terminal device on the second resource, or if the feedback resource is the second resource pool, the second terminal device can send the data from the second resource pool. Select a resource in the resource pool to send the feedback information, for example, the second terminal device selects the second resource to send the feedback information.
  • the first terminal device also determines the feedback resource corresponding to the sending resource according to the first message. If the feedback resource is the second resource, the first terminal device can monitor the feedback information of the data on the second resource. As long as the feedback information is received on the second resource, the first terminal device can determine that the feedback information corresponds to Feedback information of the data. Or, if the feedback resource is the second resource pool, the first terminal device can monitor the feedback information of the data on all or part of the resources included in the second resource pool, because the second terminal device sends the data on the second resource Therefore, the first terminal device may receive the feedback information on the second resource. As long as it is the feedback information received on the resources included in the second resource pool, the first terminal device can determine that it is the feedback information corresponding to the data.
  • the first network device after determining the transmission resource, can inform the second network device of the information of the transmission resource, so that the second network device can determine the corresponding feedback resource, and the second network device can send feedback
  • the resource information informs the first network device, and both the first network device and the second network device can determine the association relationship between the sending resource and the feedback resource.
  • the first network device will notify the first terminal device of the association relationship, and the second network device will also notify the second terminal device of the association relationship.
  • the first terminal device uses the sending resource to send data, and the second terminal device uses the feedback
  • the resource sends feedback information, and the first terminal device can use the feedback resource to monitor the feedback information, so that the first terminal device can determine that the feedback information corresponds to the data sent through the transmission resource, thereby ensuring the normal progress of the HARQ mechanism. Improve the reliability of transmission.
  • FIG. 9 is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 2A is taken as an example.
  • the method executed by the network device and the terminal device is taken as an example.
  • the first network device described below may be the network device 1 in the network architecture shown in FIG. 2A
  • the second network device described below The device may be the network device 2 in the network architecture shown in FIG. 2A
  • the first terminal device described below may be the terminal device 1 in the network architecture shown in FIG. 2A
  • the second terminal device described below may be The terminal device 2 in the network architecture shown in 2A.
  • the first terminal device sends data to the second terminal device, and the second terminal device receives the data from the first terminal device.
  • the first terminal device resides in the first network device
  • the second terminal device resides in the second network device
  • the first network device and the second network device correspond to different PLMNs.
  • the second terminal device sends feedback information corresponding to the data to the first terminal device, and the first terminal device receives the feedback information from the second terminal device.
  • the feedback information may include the first identifier corresponding to the data.
  • the feedback information sent by the second terminal device to the first terminal device may be received by the first terminal device, but the first terminal device cannot recognize that the feedback information is Which data corresponds to the feedback information, it is even impossible to determine whether the feedback information corresponds to the feedback information of the first terminal device, thereby causing the HARQ mechanism to fail.
  • the feedback information sent by the second terminal device may include a first identifier. If the first terminal device receives the feedback information, the data corresponding to the feedback information can be determined according to the first identifier, so that the data corresponding to the feedback information can be determined.
  • the HARQ mechanism is performed normally, which improves the reliability of data transmission.
  • the first identifier is, for example, the identifier of the first terminal device, such as the ID of the first terminal device, and the like. Or, the first identifier is, for example, the HARQ process number corresponding to the data. Or, the first identifier is, for example, a random number.
  • the random number is generated by the first terminal device.
  • the first terminal device may include the random number in the data of S91 and send it to the second terminal device or the first terminal.
  • the device may also send the random number to the second terminal device through another message, and the random number corresponds to the data in S91.
  • the second terminal device can include the random number in the feedback information when sending feedback information to the first terminal device, so that the first terminal device can determine according to the random number after receiving the feedback information The data corresponding to the feedback information.
  • the first identifier in the feedback information, it is equivalent to establishing the corresponding relationship between the feedback information and the data, so that the first terminal device can recognize that the feedback information is the feedback information corresponding to the data, and guarantee The normal progress of the HARQ mechanism makes data transmission more reliable.
  • FIG. 10 is a schematic block diagram of a communication device 1000 according to an embodiment of the application.
  • the communication apparatus 1000 is, for example, the second terminal device 1000.
  • the second terminal device 1000 includes a transceiver module 1020 and a processing module 1010.
  • the second terminal device 1000 may be a second terminal device, and may also be a chip applied in the second terminal device or other combination devices, components, etc. having the functions of the second terminal device described above.
  • the transceiver module 1020 may be a transceiver
  • the transceiver may include an antenna and a radio frequency circuit
  • the processing module 1010 may be a processor
  • the processor may include one or more central processing units. Unit (central processing unit, CPU).
  • the transceiver module 1020 may be a radio frequency unit, and the processing module 1010 may be a processor.
  • the transceiver module 1020 may be an input/output interface of the chip, and the processing module 1010 may be a processor of the chip system, and may include one or more central processing units.
  • the processing module 1010 may be used to perform all operations except for receiving and sending operations performed by the second terminal device in the embodiment shown in FIG. 3, such as S301, S311, and S314, and/or to support the operations described herein. Other processes of the technology.
  • the transceiver module 1020 can be used to perform all the receiving operations performed by the second terminal device in the embodiment shown in FIG. 3, such as S306, S307, S310, S312, S314, and S315, and/or to support the operations described herein. Other processes of technology.
  • the processing module 1010 may be used to perform all operations other than the transceiving operations performed by the second terminal device in the embodiment shown in FIG. 4, such as S301, S311, and S314, and/or to support the operations described herein.
  • Other processes of the technology can be used to perform all the receiving operations performed by the second terminal device in the embodiment shown in FIG. 4, such as S406, S312, S314, and S315, and/or other processes used to support the technology described herein .
  • the processing module 1010 may be used to perform all operations other than the transceiving operation performed by the second terminal device in the embodiment shown in FIG. 5, such as S301 and S509, and/or to support the technology described herein Other processes.
  • the transceiver module 1020 can be used to perform all the receiving operations performed by the second terminal device in the embodiment shown in FIG. 5, such as S501, S504, S507, S508, and S509, and/or for supporting the technology described herein Other processes.
  • the transceiver module 1020 may be a functional module (for example, the functional module corresponds to a transceiver, a radio frequency unit, or an input/output interface), which can perform both sending and receiving operations.
  • the transceiver module 1020 can be used to perform All the sending operations and receiving operations performed by the second terminal device in the embodiment shown in any one of the drawings in FIGS.
  • the transceiver module 1020 when performing a sending operation, can be considered as a sending module, and When performing a receiving operation, the transceiver module 1020 can be regarded as a receiving module; or, the transceiver module 1020 can also be two functional modules, and the transceiver module 1020 can be regarded as the collective name of the two functional modules, and the two functional modules are respectively the transmitting module.
  • Module for example, corresponding to the transmitter, radio frequency unit or output interface
  • receiving module for example, corresponding to the receiver, radio frequency unit or input interface.
  • the sending module is used to complete the sending operation.
  • the sending module can be used to execute Figure 3 ⁇ Figure For all the sending operations performed by the second terminal device in the embodiment shown in any one of the drawings in Figure 5, the receiving module is used to complete the receiving operation.
  • the receiving module can be used to perform any one of Figures 3 to 5 All the receiving operations performed by the second terminal device in the embodiment shown in the figure.
  • the transceiver module 1020 is configured to receive a first message when the second terminal device 1000 resides on the second network device, and the first message is used to instruct the second terminal device 1000 to reside on the first network device, so The first network device and the second network device correspond to different PLMNs;
  • the processing module 1010 is configured to reside on the first network device.
  • the transceiver module 1020 is configured to receive the first message in the following manner:
  • the transceiver module 1020 is further configured to: before receiving the first message from the second network device:
  • processing module 1010 is configured to reside on the first network device in the following manner:
  • the processing module 1010 is further configured to establish a sideline connection with the first terminal device under the first network device.
  • the first message further includes verification information of the second terminal device 1000, and the verification information of the second terminal device 1000 is used to verify the second terminal device 1000.
  • the transceiver module 1020 is further configured to send a fifth message to the first network device, where the fifth message includes verification information of the second terminal device 1000.
  • FIG. 11 is a schematic block diagram of a communication device 1100 according to an embodiment of the application.
  • the communication apparatus 1100 is, for example, the first terminal device 1100.
  • the first terminal device 1100 includes a transceiver module 1120.
  • a processing module 1110 may also be included.
  • the first terminal device 1100 may be a first terminal device, or may be a chip applied in the first terminal device, or other combination devices, components, etc. having the functions of the first terminal device described above.
  • the implementation form of the transceiver module 1120 or the processing module 1110, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1110 may be used to perform all operations other than the transceiving operation performed by the first terminal device in the embodiment shown in FIG. 3, such as S314, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1120 may be used to perform all the receiving operations performed by the first terminal device in the embodiment shown in FIG. 3, such as S302, S314, and S315, and/or other processes used to support the technology described herein.
  • the processing module 1110 may be used to perform all operations other than the transceiving operation performed by the first terminal device in the embodiment shown in FIG. 4, such as S314, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1120 can be used to perform all the receiving operations performed by the first terminal device in the embodiment shown in FIG. 4, such as S401, S405, S406, and S314, and/or other processes used to support the technology described herein .
  • the processing module 1110 may be used to perform all operations other than the transceiving operation performed by the first terminal device in the embodiment shown in FIG. 5, such as S509, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1120 may be used to perform all the receiving operations performed by the first terminal device in the embodiment shown in FIG. 5, such as S509, and/or other processes used to support the technology described herein.
  • the transceiver module 1120 is configured to receive a second message from the first network device, the second message is used to instruct the second terminal device to reside on the first network device, and the second terminal device currently resides In the second network device, the first network device and the second network device correspond to different PLMNs;
  • the transceiver module 1120 is further configured to send a first message to the second terminal device, where the first message is used to instruct the second terminal device to reside on the first network device.
  • the processing module 1110 is configured to determine the first message.
  • the transceiver module 1120 is further configured to send a third message to the first network device, where the third message is used to instruct the second terminal device to reside on the second network equipment.
  • the processing module 1110 is configured to establish a side-line connection with the second terminal device under the first network device.
  • FIG. 12 is a schematic block diagram of a communication device 1200 according to an embodiment of the application.
  • the communication apparatus 1200 is, for example, the first network device 1200.
  • the first network device 1200 may be a base station 1, AMF1, or SEAF1.
  • the first network device 1200 includes a transceiver module 1220.
  • a processing module 1210 may also be included.
  • the first network device 1200 may be the first network device, or may be a chip applied in the first network device or other combination devices, components, etc. having the function of the first network device.
  • the implementation form of the transceiver module 1220 or the processing module 1210, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1210 may be used to perform all the operations performed by the first network device in the embodiment shown in FIG. 3 except for the transceiving operation, such as S313, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1220 can be used to perform all the receiving operations performed by the first network device in the embodiment shown in FIG. 3, such as S302, S303, S305, S308, S309, S312, and S315, and/or to support the Other processes of the described technology.
  • the processing module 1210 may be used to perform all operations other than the transceiving operation performed by the first network device in the embodiment shown in FIG. 4, such as S313, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1220 can be used to perform all the receiving operations performed by the first network device in the embodiment shown in FIG. 4, such as S401, S402, S404, S405, S312, and S315, and/or to support the operations described herein. Other processes of technology.
  • the processing module 1210 may be used to perform all operations other than the transceiving operation performed by the first network device in the embodiment shown in FIG. 5, such as S502 and S506, and/or to support the technology described herein Other processes.
  • the transceiver module 1220 can be used to perform all the receiving operations performed by the first network device in the embodiment shown in FIG. 5, such as S501, S503, S505, S507, and S508, and/or for supporting the technology described herein Other processes.
  • the transceiver module 1220 is configured to receive a third message, the third message is used to instruct the second terminal device to reside on the second network device, or to indicate that the second terminal device resides on the second network device to request Residing on a first network device 1200, the first network device 1200 and the second network device correspond to different PLMNs;
  • the transceiver module 1220 is further configured to send a second message, where the second message is used to instruct the second terminal device to reside on the first network device 1200.
  • the processing module 1210 is configured to determine the second message.
  • the transceiver module 1220 is configured to receive the third message in the following manner:
  • the transceiver module 1220 is configured to send the second message in the following manner:
  • the transceiver module 1220 is further configured to receive verification information of the second terminal device from the second network device, and the verification information of the second terminal device is used to verify the first network device. Two terminal equipment.
  • the transceiver module 1220 is further configured to send a fourth message to the second network device, where the fourth message is used to request the verification information of the second terminal device.
  • the transceiver module 1220 is further configured to receive a fifth message from the second terminal device, where the fifth message includes verification information of the second terminal device;
  • the processing module 1210 is configured to perform verification according to the verification information of the second terminal device included in the fifth message and the verification information of the second terminal device from the second network device;
  • the processing module 1210 is further configured to determine that the second terminal device can access the first network device 1200 when the verification is passed.
  • FIG. 13 is a schematic block diagram of a communication device 1300 according to an embodiment of the application.
  • the communication apparatus 1300 is, for example, the second network device 1300.
  • the second network device 1300 may be a base station 2, AUSF2, AMF2, SEAF2, or UDM2.
  • the second network device 1300 includes a transceiver module 1320 and a processing module 1310.
  • the second network device 1300 may be a second network device, and may also be a chip applied to the second network device or other combination devices, components, etc. having the function of the second network device described above.
  • the implementation form of the transceiver module 1320 or the processing module 1310, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1310 may be used to perform all the operations performed by the second network device in the embodiment shown in FIG. 3 except for the transceiving operation, such as S304, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1320 can be used to perform all the receiving operations performed by the second network device in the embodiment shown in FIG. 3, such as S303, S305, S306, S307, S308, S309, and S310, and/or to support Other processes of the described technology.
  • the processing module 1310 may be used to perform all operations other than the transceiving operation performed by the second network device in the embodiment shown in FIG. 4, such as S403, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1320 may be used to perform all the receiving operations performed by the second network device in the embodiment shown in FIG. 4, such as S402 and S404, and/or other processes used to support the technology described herein.
  • the processing module 1310 may be used to perform all operations other than the transceiving operation performed by the second network device in the embodiment shown in FIG. 5, such as S504, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1320 may be used to perform all the receiving operations performed by the second network device in the embodiment shown in FIG. 5, such as S503 and S505, and/or other processes used to support the technology described herein.
  • the processing module 1310 is configured to determine that the second terminal device residing on the second network device 1300 needs to reside on the first network device, and the first network device and the second network device 1300 correspond to different PLMNs;
  • the transceiver module 1320 is configured to send a first message to the second terminal device, where the first message is used to instruct the second terminal device to reside on the first network device.
  • the processing module 1310 is configured to determine that the second terminal device residing on the second network device 1300 needs to reside on the first network device in the following manner:
  • a request message from the second terminal device is received through the transceiver module 1320, where the request message is used to request to reside on the first network device.
  • the transceiver module 1320 is further configured to send verification information of the second terminal device to the first network device, and the verification information of the second terminal device is used to verify the second network device. Terminal Equipment.
  • the transceiver module 1320 is further configured to receive a fourth message from the first network device, where the fourth message is used to request the verification information of the second terminal device.
  • FIG. 14 is a schematic block diagram of a communication device 1400 according to an embodiment of the application.
  • the communication device 1400 is, for example, the first terminal device 1400.
  • the first terminal device 1400 includes a transceiver module 1420 and a processing module 1410.
  • the first terminal device 1400 may be the first terminal device, or may be a chip applied in the first terminal device or other combination devices, components, etc. having the function of the first terminal device.
  • the implementation form of the transceiver module 1420 or the processing module 1410, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1410 may be used to perform all the operations performed by the first terminal device in the embodiment shown in FIG. 7 except for the transceiving operation, such as S74, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1420 may be used to perform all the receiving operations performed by the first terminal device in the embodiment shown in FIG. 7, such as S72, S77, and S78, and/or other processes used to support the technology described herein.
  • the processing module 1410 may be used to perform all operations other than the transceiving operation performed by the first terminal device in the embodiment shown in FIG. 8, such as S85, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1420 may be used to perform all the receiving operations performed by the first terminal device in the embodiment shown in FIG. 8, such as S84, S88, and S89, and/or other processes used to support the technology described herein.
  • the transceiver module 1420 is configured to receive the first message from the first network device
  • the processing module 1410 is configured to determine the first resource according to the first message
  • the transceiver module 1420 is further configured to send data to the second terminal device on the first resource
  • the transceiver module 1420 is further configured to receive feedback information corresponding to the data from the second terminal device on a second resource, where the second resource is used to receive feedback information of the data sent through the first resource .
  • the first message is used to indicate that the second resource is used to receive feedback information of data sent through the first resource.
  • the first message is used to indicate that the second resource has an association relationship with the first resource, and the association relationship indicates that the second resource is used to receive the Feedback information of data sent by a resource.
  • the first message is used to indicate the first resource pool and the second resource pool, the first resource pool and the second resource pool have an association relationship, and the The association relationship indicates that the resources included in the second resource pool are used to receive feedback information of data sent through the resources included in the first resource pool.
  • the processing module 1410 is configured to determine the first resource in the following manner:
  • the processing module 1410 is further configured to select the second resource from the second resource pool for receiving feedback information of the data sent through the first resource;
  • the transceiver module 1420 is further configured to send first indication information to the second terminal device, where the first indication information is used to indicate that the second resource is used to send feedback information of data received through the first resource.
  • FIG. 15 is a schematic block diagram of a communication device 1500 according to an embodiment of the application.
  • the communication device 1500 is, for example, the second terminal device 1500.
  • the second terminal device 1500 includes a transceiver module 1520 and a processing module 1510.
  • the second terminal device 1500 may be a second terminal device, or may be a chip applied in the second terminal device or other combination devices, components, etc. having the functions of the second terminal device described above.
  • the implementation form of the transceiver module 1520 or the processing module 1510, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1510 may be used to perform all the operations performed by the second terminal device in the embodiment shown in FIG. 7 except for the transceiving operation, such as S76, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1520 may be used to perform all the receiving operations performed by the second terminal device in the embodiment shown in FIG. 7, such as S75, S77, and S78, and/or other processes used to support the technology described herein.
  • the processing module 1510 may be used to perform all operations other than the transceiving operation performed by the second terminal device in the embodiment shown in FIG. 8, such as S87, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1520 may be used to perform all the receiving operations performed by the second terminal device in the embodiment shown in FIG. 8, such as S86, S88, and S89, and/or other processes used to support the technology described herein.
  • the transceiver module 1520 is configured to receive data from the first terminal device on the first resource
  • the transceiver module 1520 is further configured to send feedback information corresponding to the data to the first terminal device on a second resource, where the second resource is used to receive feedback information of the data sent through the first resource.
  • the processing module 1510 is configured to determine the feedback information.
  • the transceiver module 1520 is also used for:
  • the third message is used to indicate that the second resource has an association relationship with the first resource, and the association relationship indicates that the second resource is used to send data through the first resource. Feedback information of the data received by the resource.
  • the transceiver module 1520 is further configured to receive a third message from a second network device, where the third message is used to indicate a first resource pool and a second resource pool, and the first resource pool and the second resource pool have An association relationship, where the association relationship indicates that the resources included in the second resource pool are used to send feedback information of data received through the resources included in the first resource pool;
  • the processing module 1510 is further configured to select the second resource from the second resource pool, and the first resource belongs to the first resource pool.
  • FIG. 16 is a schematic block diagram of a communication device 1600 according to an embodiment of the application.
  • the communication apparatus 1600 is, for example, the first network device 1600.
  • the first network device 1600 includes a transceiver module 1620 and a processing module 1610.
  • the first network device 1600 may be the first network device, or may be a chip applied in the first network device or other combination devices, components, etc. having the function of the first network device.
  • the implementation form of the transceiver module 1620 or the processing module 1610, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1610 may be used to perform all the operations performed by the first network device in the embodiment shown in FIG. 7 except for the transceiving operation, such as S71, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1620 may be used to perform all the receiving operations performed by the first network device in the embodiment shown in FIG. 7, such as S72 and S73, and/or other processes used to support the technology described herein.
  • the processing module 1610 may be used to perform all operations other than the transceiving operation performed by the first network device in the embodiment shown in FIG. 8, such as S81, and/or other operations used to support the technology described herein. process.
  • the transceiver module 1620 may be used to perform all the receiving operations performed by the first network device in the embodiment shown in FIG. 8, such as S82, S83, and S84, and/or other processes used to support the technology described herein.
  • the processing module 1610 is configured to determine a transmission resource used for the first terminal device to send data, and a feedback resource used for the first terminal device to receive feedback information of the data transmitted through the transmission resource, wherein
  • the transmission resource includes a first resource, the feedback resource includes a second resource, or the transmission resource includes a first resource pool, and the feedback resource includes a second resource pool;
  • the transceiver module 1620 is configured to send a first message to the first terminal device, where the first message is used to indicate the sending resource, and the feedback resource is used to receive data sent through the sending resource. Feedback.
  • the transceiver module 1620 is further configured to send a fourth message to the second network device, where the fourth message is used to indicate the sending resource and the feedback resource, and the second network device It is a network device where a second terminal device resides, and the second terminal device is a receiving end of the data.
  • the first message is used to indicate that the transmission resource and the feedback resource have an association relationship, and the association relationship indicates that the feedback resource is used to receive data sent through the transmission resource. Data feedback information.
  • the transceiver module 1620 is also used for:
  • FIG. 17 is a schematic block diagram of a communication device 1700 according to an embodiment of the application.
  • the communication apparatus 1700 is, for example, the second network device 1700.
  • the second network device 1700 includes a transceiver module 1720 and a processing module 1710.
  • the second network device 1700 may be a second network device, and may also be a chip applied in the second network device or other combination devices, components, etc. having the function of the second network device described above.
  • the implementation form of the transceiver module 1720 or the processing module 1710, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1710 may be used to perform all operations performed by the second network device in the embodiment shown in FIG. 7 except for the transceiving operation, for example, the operation of determining the feedback resource used for the second terminal device to send feedback information. , And/or other processes used to support the technology described herein.
  • the transceiver module 1720 may be used to perform all the receiving operations performed by the second network device in the embodiment shown in FIG. 7, such as S73 and S75, and/or other processes used to support the technology described herein.
  • the processing module 1710 may be used to perform all operations performed by the second network device in the embodiment shown in FIG. 8 except for the transceiving operation, for example, the operation of determining the feedback resource used for the second terminal device to send feedback information. , And/or other processes used to support the technology described herein.
  • the transceiver module 1720 may be used to perform all the receiving operations performed by the second network device in the embodiment shown in FIG. 8, such as S82, S83, and S86, and/or other processes used to support the technology described herein.
  • the processing module 1710 is configured to determine a feedback resource used for the second terminal device to send feedback information, and the feedback resource is used for the second terminal device to send feedback information of data sent through the sending resource, where the The sending resource includes a first resource, and the feedback resource includes a second resource, or the sending resource includes a first resource pool, and the feedback resource includes a second resource pool;
  • the transceiver module 1720 is configured to send a third message to the second terminal device, where the third message is used to indicate that the feedback resource is used to receive feedback information of data sent through the sending resource.
  • the transceiver module 1720 is further configured to receive a fourth message from the first network device, where the fourth message is used to indicate the transmission resource and the feedback resource, and the first network
  • the device is a network device where a first terminal device resides, and the first terminal device is a sender of the data.
  • the third message is used to indicate that the sending resource and the feedback resource have an association relationship, and the association relationship indicates that the receiving resource is used to receive data sent through the sending resource. Data feedback information.
  • the transceiver module 1720 is further configured to receive information about the sending resource from a first network device, where the first network device is a network device where a first terminal device resides, and the first terminal device is a data transmission device. end;
  • the processing module 1710 is further configured to determine the information of the feedback resource according to the information of the transmission resource;
  • the transceiver module 1720 is further configured to send the feedback resource information to the first network device.
  • FIG. 18 is a schematic block diagram of a communication device 1800 according to an embodiment of the application.
  • the communication apparatus 1800 is, for example, the first terminal device 1800.
  • the first terminal device 1800 includes a transceiver module 1820 and a processing module 1810.
  • the first terminal device 1800 may be the first terminal device, or may be a chip applied in the first terminal device or other combination devices, components, etc. having the function of the first terminal device.
  • the implementation form of the transceiver module 1820 or the processing module 1810, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1810 may be used to perform all the operations performed by the first terminal device in the embodiment shown in FIG. 9 except for the transceiving operation, such as the operation of determining data, and/or to support the operations described herein. Other processes of technology.
  • the transceiver module 1820 may be used to perform all the receiving operations performed by the first terminal device in the embodiment shown in FIG. 9, such as S91 and S92, and/or other processes used to support the technology described herein.
  • the transceiver module 1820 is used to send data to the second terminal device
  • the transceiver module 1820 is further configured to receive feedback information corresponding to the data from the second terminal device, where the feedback information includes a first identifier corresponding to the data.
  • the processing module 1810 is configured to determine the data.
  • the first identifier includes one or more of the following:
  • the identity of the first terminal device 1800 is the identity of the first terminal device 1800.
  • the HARQ process number corresponding to the data is the HARQ process number corresponding to the data.
  • the first identifier includes the random number
  • the transceiver module 1820 is further configured to send the random number corresponding to the data to the second terminal device.
  • FIG. 19 is a schematic block diagram of a communication device 1900 according to an embodiment of the application.
  • the communication device 1900 is, for example, the second terminal device 1900.
  • the second terminal device 1900 includes a transceiver module 1920 and a processing module 1910.
  • the second terminal device 1900 may be the first terminal device, or may be a chip applied to the second terminal device or other combination devices or components having the functions of the second terminal device described above.
  • the implementation form of the transceiver module 1920 or the processing module 1910, etc. reference may be made to the introduction of the implementation form of the transceiver module 1020 or the processing module 1010 in the embodiment shown in FIG. 10.
  • the processing module 1910 may be used to perform all the operations performed by the second terminal device in the embodiment shown in FIG. 9 except for the transceiving operation, such as the operation of determining the feedback information, and/or to support the operations described herein. Other processes of the technology.
  • the transceiver module 1920 may be used to perform all the receiving operations performed by the second terminal device in the embodiment shown in FIG. 9, such as S91 and S92, and/or other processes used to support the technology described herein.
  • the transceiver module 1920 is configured to receive data from the first terminal device
  • the transceiver module 1920 is further configured to send feedback information corresponding to the data to the first terminal device, where the feedback information includes a first identifier corresponding to the data.
  • the processing module 1910 is configured to determine the feedback information.
  • the first identifier includes one or more of the following:
  • the HARQ process number corresponding to the data is the HARQ process number corresponding to the data.
  • the first identifier includes the random number
  • the transceiver module 1920 is further configured to receive the random number corresponding to the data from the second terminal device.
  • the embodiment of the present application also provides a communication device, and the communication device may be a terminal device or a circuit.
  • the communication device may be used to perform the actions performed by the terminal device in the foregoing method embodiments.
  • FIG. 20 shows a simplified schematic diagram of the structure of the terminal device. It is easy to understand and easy to illustrate.
  • the terminal device uses a mobile phone as an example.
  • the terminal equipment includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, and to control the terminal device, execute the software program, and process the data of the software program.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of baseband signal and radio frequency signal and the processing of radio frequency signal.
  • the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal devices may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 20 only one memory and processor are shown in FIG. 20. In an actual terminal device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the antenna and radio frequency circuit with the transceiving function can be regarded as the transceiving unit of the terminal device
  • the processor with the processing function can be regarded as the processing unit of the terminal device.
  • the terminal device includes a transceiver unit 2010 and a processing unit 2020.
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
  • the processing unit may also be called a processor, a processing board, a processing module, a processing device, and so on.
  • the device for implementing the receiving function in the transceiver unit 2010 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 2010 as the sending unit, that is, the transceiver unit 2010 includes a receiving unit and a sending unit.
  • the transceiver unit may sometimes be called a transceiver, a transceiver, or a transceiver circuit.
  • the receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit.
  • the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
  • transceiving unit 2010 is used to perform the sending and receiving operations on the terminal device side in the foregoing method embodiment
  • processing unit 2020 is used to perform other operations on the terminal device in the foregoing method embodiment except for the transceiving operation.
  • the transceiver unit 2010 can implement the function of the aforementioned transceiver module 1020, or implement the function of the transceiver module 1120, or implement the function of the transceiver module 1420, or implement the function of the transceiver module 1520, or implement the transceiver module. 1820 function, or realize the function of the transceiver module 1920.
  • the device may include a transceiver unit and a processing unit.
  • the transceiving unit may be an input/output circuit and/or a communication interface;
  • the processing unit is an integrated processor or a microprocessor or an integrated circuit.
  • the device shown in FIG. 21 can be referred to.
  • the device can perform a function similar to the processing module 1010 in FIG. 10, or it can perform a function similar to the processing module 1110 in FIG. 11, or it can perform a function similar to the processing module 1410 in FIG. 14, or it can perform a function similar to the processing module 1410 in FIG.
  • the function of the processing module 1510 in FIG. 15 may either perform a function similar to that of the processing module 1810 in FIG. 18, or may perform a function similar to the processing module 1910 in FIG. 19.
  • the device includes a processor 2110, a data sending processor 2120, and a data receiving processor 2130.
  • the processing module 1010 in the foregoing embodiment may be the processor 2110 in FIG. 21 and completes corresponding functions; the transceiving module 1020 in the foregoing embodiment may be the sending data processor 2120 in FIG. 21, and/or receiving data The processor 2130.
  • the processing module 1110 in the foregoing embodiment may be the processor 2110 in FIG. 21 and complete corresponding functions; the transceiver module 1120 in the foregoing embodiment may be the sending data processor 2120 in FIG. 21, and/or Receive data processor 2130.
  • the processing module 1410 in the foregoing embodiment may be the processor 2110 in FIG. 21 and perform corresponding functions; the transceiver module 1420 in the foregoing embodiment may be the data sending processor 2120 in FIG.
  • the processing module 1510 in the foregoing embodiment may be the processor 2110 in FIG. 21 and complete corresponding functions; the transceiver module 1520 in the foregoing embodiment may be the data sending processor 2120 in FIG. 21, and/or Receive data processor 2130.
  • the processing module 1810 in the foregoing embodiment may be the processor 2110 in FIG. 21 and complete corresponding functions; the transceiver module 1820 in the foregoing embodiment may be the data sending processor 2120 in FIG. 21, and/or Receive data processor 2130.
  • the processing module 1910 in the foregoing embodiment may be the processor 2110 in FIG.
  • the transceiver module 1920 in the foregoing embodiment may be the data sending processor 2120 in FIG. 21, and/or Receive data processor 2130.
  • the channel encoder and the channel decoder are shown in FIG. 21, it can be understood that these modules do not constitute a restrictive description of this embodiment, and are only illustrative.
  • the processing device 2200 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem.
  • the communication device in this embodiment can be used as the modulation subsystem therein.
  • the modulation subsystem may include a processor 2203 and an interface 2204.
  • the processor 2203 completes the function of the aforementioned processing module 1010
  • the interface 2204 completes the function of the aforementioned transceiver module 1020.
  • the processor 2203 completes the function of the aforementioned processing module 1110
  • the interface 2204 completes the function of the aforementioned transceiver module 1120.
  • the processor 2203 completes the function of the aforementioned processing module 1410, and the interface 2204 completes the function of the aforementioned transceiver module 1420.
  • the processor 2203 completes the function of the aforementioned processing module 1510, and the interface 2204 completes the function of the aforementioned transceiver module 1520.
  • the processor 2203 completes the function of the aforementioned processing module 1810, and the interface 2204 completes the function of the aforementioned transceiver module 1820.
  • the processor 2203 completes the function of the aforementioned processing module 1910, and the interface 2204 completes the function of the aforementioned transceiver module 1920.
  • the modulation subsystem includes a memory 2206, a processor 2203, and a program stored in the memory 2206 and running on the processor.
  • the processor 2203 executes the program, the terminal device side in the above method embodiment is implemented.
  • Methods It should be noted that the memory 2206 can be non-volatile or volatile, and its location can be located inside the modulation subsystem or in the processing device 2200, as long as the memory 2206 can be connected to the The processor 2203 is sufficient.
  • the device 2300 includes one or more radio frequency units, such as a remote radio unit (RRU) 2310 and one or more baseband units (BBU) (also referred to as digital units, digital units, DU) 2320 .
  • the RRU 2310 may be called a transceiver module, which corresponds to the transceiver module 1220 in FIG. 12, or corresponds to the transceiver module 1320 in FIG. 13, or corresponds to the transceiver module 1620 in FIG. 16, or corresponds to the transceiver module 1720 in FIG. correspond.
  • the transceiver module may also be called a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 2311 and a radio frequency unit 2312.
  • the RRU 2310 is mainly used for receiving and sending radio frequency signals and converting radio frequency signals and baseband signals, for example, for sending instruction information to terminal equipment.
  • the BBU2310 part is mainly used to perform baseband processing, control the base station, and so on.
  • the RRU 2310 and the BBU 2320 may be physically set together, or may be physically separated, that is, a distributed base station.
  • the BBU 2320 is the control center of the base station, and may also be called a processing module, and may correspond to the processing module 1210 in FIG. 12, or the processing module 1310 in FIG. 13, or the processing module 1610 in FIG. 16, Or it corresponds to the processing module 1710 in FIG. 17, and is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, spread spectrum, and so on.
  • the BBU processing module
  • the BBU may be used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment, for example, to generate the foregoing indication information.
  • the BBU 2320 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network with a single access standard (such as an LTE network), or support different access standards. Wireless access network (such as LTE network, 5G network or other networks).
  • the BBU 2320 also includes a memory 2321 and a processor 2322.
  • the memory 2321 is used to store necessary instructions and data.
  • the processor 2322 is used to control the base station to perform necessary actions, for example, to control the base station to execute the operation flow of the network device in the foregoing method embodiment.
  • the memory 2321 and the processor 2322 may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • the device 2300 shown in FIG. 23 is mainly based on a base station as an example.
  • the network device in the embodiment of the present application is a core network device, the structure may also be different accordingly.
  • the embodiment of the present application provides a first communication system.
  • the first communication system may include the second terminal device in the embodiment shown in any one of FIGS. 3 to 6.
  • the second terminal device is, for example, the second terminal device 1000 in FIG. 10.
  • the first communication system may further include the first network device involved in the embodiment shown in any one of the foregoing Figures 3 to 6.
  • the first network device is, for example, the first network device 1200 in FIG. 12.
  • the first communication system may further include the second network device in the embodiment shown in any one of FIGS. 3 to 6.
  • the second network device is, for example, the second network device 1300 in FIG. 13.
  • the first communication system may further include the first terminal device in the embodiment shown in any one of FIGS. 3 to 6.
  • the first terminal device is, for example, the first terminal device 1100 in FIG. 11.
  • the embodiment of the present application provides a second communication system.
  • the second communication system may include the second terminal device in the embodiment shown in FIG. 7 or the embodiment shown in FIG. 8.
  • the second terminal device is, for example, the second terminal device 1500 in FIG. 15.
  • the first communication system may further include the first network device involved in the embodiment shown in FIG. 7 or the embodiment shown in FIG. 8 described above.
  • the first network device is, for example, the first network device 1600 in FIG. 16.
  • the first communication system may further include the second network device involved in the embodiment shown in FIG. 7 or the embodiment shown in FIG. 8 described above.
  • the second network device is, for example, the second network device 1700 in FIG. 17.
  • the first communication system may further include the first terminal device involved in the embodiment shown in FIG. 7 or the embodiment shown in FIG. 8 described above.
  • the first terminal device is, for example, the first terminal device 1400 in FIG. 14.
  • the embodiment of the present application provides a third communication system.
  • the third communication system may include the first terminal device and the second terminal device in the embodiment shown in FIG. 9.
  • the first terminal device is, for example, the first terminal device 1800 in FIG. 18.
  • the second terminal device is, for example, the second terminal device 1900 in FIG. 19.
  • the first communication system, the second communication system, and the third communication system may be the same communication system, or may also be different communication systems, or any two of them may be the same communication system.
  • the embodiment of the present application also provides a computer-readable storage medium, which is used to store a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement FIGS. 3 to 3 provided by the foregoing method embodiment.
  • FIGS. 3 to 3 The process related to the first terminal device in the embodiment shown in any one of the drawings in Figure 6.
  • the embodiment of the present application also provides a computer-readable storage medium, which is used to store a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement FIGS. 3 to 3 provided by the foregoing method embodiment.
  • FIGS. 3 to 3 The process related to the second terminal device in the embodiment shown in any one of the drawings in Figure 6.
  • the embodiment of the present application also provides a computer-readable storage medium, which is used to store a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement FIGS. 3 to 3 provided by the foregoing method embodiment.
  • the embodiment of the present application also provides a computer-readable storage medium, which is used to store a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement FIGS. 3 to 3 provided by the foregoing method embodiment.
  • FIGS. 3 to 3 The process related to the second network device in the embodiment shown in any one of the drawings in Figure 6.
  • the embodiments of the present application also provide a computer-readable storage medium for storing a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the method shown in FIG. 7 provided by the above-mentioned method embodiment. Or the process related to the first terminal device in the embodiment shown in FIG. 8.
  • the embodiments of the present application also provide a computer-readable storage medium for storing a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the method shown in FIG. 7 provided by the above-mentioned method embodiment. Or the process related to the second terminal device in the embodiment shown in FIG. 8.
  • the embodiments of the present application also provide a computer-readable storage medium for storing a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the method shown in FIG. 7 provided by the above-mentioned method embodiment. Or the process related to the first network device in the embodiment shown in FIG. 8.
  • the embodiments of the present application also provide a computer-readable storage medium for storing a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the method shown in FIG. 7 provided by the above-mentioned method embodiment. Or the process related to the second network device in the embodiment shown in FIG. 8.
  • the embodiment of the present application also provides a computer-readable storage medium, which is used to store a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the method shown in FIG. 9 provided by the above-mentioned method embodiment. The process related to the first terminal device in the embodiment.
  • the embodiment of the present application also provides a computer-readable storage medium, which is used to store a computer program.
  • the computer program When the computer program is executed by a computer, the computer can implement the method shown in FIG. 9 provided by the above-mentioned method embodiment. The process related to the second terminal device in the embodiment.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can implement any of the methods in Figures 3 to 6 provided by the above method embodiments.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can implement any of the methods in Figures 3 to 6 provided by the above method embodiments.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can implement any of the methods in Figures 3 to 6 provided by the above method embodiments.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can implement any of the methods in Figures 3 to 6 provided by the above method embodiments.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 7 provided by the above method embodiment or The process related to the first terminal device in the embodiment shown in FIG. 8.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 7 provided by the above method embodiment or The process related to the second terminal device in the embodiment shown in FIG. 8.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 7 provided by the above method embodiment or The process related to the first network device in the embodiment shown in FIG. 8.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 7 provided by the above method embodiment or The process related to the second network device in the embodiment shown in FIG. 8.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 9 provided by the above method embodiment The process related to the first terminal device.
  • the embodiments of the present application also provide a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement the embodiment shown in FIG. 9 provided by the above method embodiment The process related to the second terminal device.
  • processors mentioned in the embodiments of this application may be a CPU, or other general-purpose processors, digital signal processors (digital signal processors, DSP), application specific integrated circuits (ASICs), ready-made Field programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component
  • the memory storage module
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program code .
  • Embodiment 1 A communication method, wherein the method includes:
  • the first terminal device receives the first message from the first network device
  • the first terminal device sends data to the second terminal device on the first resource
  • the first terminal device receives feedback information corresponding to the data from the second terminal device on a second resource, and the second resource is used to receive feedback information of the data sent through the first resource.
  • Embodiment 2 The method according to embodiment 1, wherein the first message is used to indicate that the second resource is used to receive feedback information of data sent through the first resource.
  • Embodiment 3 The method according to embodiment 1 or 2, wherein:
  • the first message is used to indicate that the second resource has an association relationship with the first resource, and the association relationship indicates that the second resource is used to receive feedback information of data sent through the first resource.
  • Embodiment 4 The method according to embodiment 1, wherein the first message is used to indicate the first resource pool and the second resource pool, and the first resource pool and the second resource pool are There is an association relationship, and the association relationship indicates that the resources included in the second resource pool are used to receive feedback information of data sent through the resources included in the first resource pool.
  • Embodiment 5 The method according to embodiment 4, wherein the determining of the first resource by the first terminal device includes:
  • the first terminal device selects the first resource from a first resource pool.
  • Embodiment 6 The method according to embodiment 4 or embodiment 5, wherein the method further comprises:
  • the first terminal device sends first indication information to the second terminal device, where the first indication information is used to indicate that the second resource is used to send feedback information of data received through the first resource.
  • Embodiment 7 A communication method, wherein the method includes:
  • the second terminal device receives data from the first terminal device on the first resource
  • the second terminal device sends feedback information corresponding to the data to the first terminal device on a second resource, and the second resource is used to receive feedback information of the data sent through the first resource.
  • Embodiment 8 The method according to embodiment 7, wherein the method further comprises:
  • the second terminal device receives first indication information from the first terminal device, where the first indication information is used to indicate the second resource, and the second resource is used to send and receive information through the first resource. Feedback of data; or,
  • the second terminal device receives a third message from a second network device, the third message is used to indicate the second resource, and the second resource is used to send feedback of data received through the first resource Information, the second terminal device resides in the second network device.
  • Embodiment 9 The method according to embodiment 8, wherein:
  • the third message is used to indicate that the second resource has an association relationship with the first resource, and the association relationship indicates that the second resource is used to send feedback information of data received through the first resource.
  • Embodiment 10 The method according to embodiment 7, wherein the method further comprises:
  • the second terminal device receives a third message from a second network device, the third message is used to indicate a first resource pool and a second resource pool, and the first resource pool is associated with the second resource pool Relationship, the association relationship indicates that the resources included in the second resource pool are used to send feedback information of data received through the resources included in the first resource pool;
  • the second terminal device selects the second resource from the second resource pool, and the first resource belongs to the first resource pool.
  • Embodiment 11 A communication method, wherein the method includes:
  • the first network device determines a transmission resource for the first terminal device to send data, and a feedback resource for the first terminal device to receive feedback information of data sent through the transmission resource, where the transmission resource includes A first resource, the feedback resource includes a second resource, or the sending resource includes a first resource pool, and the feedback resource includes a second resource pool;
  • the first network device sends a first message to the first terminal device, where the first message is used to indicate the sending resource, and the feedback resource is used to receive data sent through the sending resource. Feedback.
  • Embodiment 12 The method according to embodiment 11, wherein the method further comprises:
  • the first network device sends a fourth message to a second network device, where the fourth message is used to indicate the sending resource and the feedback resource, and the second network device is the network device where the second terminal device resides , The second terminal device is the receiving end of the data.
  • Embodiment 13 The method according to embodiment 11, wherein:
  • the first message is used to indicate that the transmission resource and the feedback resource have an association relationship, and the association relationship indicates that the feedback resource is used to receive feedback information of data transmitted through the transmission resource.
  • Embodiment 14 The method according to embodiment 11 or 13, wherein the method further includes:
  • the first network device sends the information of the sending resource to the second network device, and the information of the sending resource is used to determine the information of the feedback resource;
  • the first network device receives the feedback resource information from the second network device.
  • Embodiment 15 A communication method, wherein the method includes:
  • the second network device determines a feedback resource used for the second terminal device to send feedback information, where the feedback resource is used for the second terminal device to send feedback information of data sent through the sending resource, where the sending resource includes the first A resource, the feedback resource includes a second resource, or the sending resource includes a first resource pool, and the feedback resource includes a second resource pool;
  • the second network device sends a third message to the second terminal device, where the third message is used to indicate that the feedback resource is used to receive feedback information of data sent through the sending resource.
  • Embodiment 16 The method according to embodiment 15, wherein the method further comprises:
  • the second network device receives a fourth message from the first network device, where the fourth message is used to indicate the sending resource and the feedback resource, and the first network device is the network where the first terminal device resides Device, the first terminal device is the sender of the data.
  • Embodiment 17 The method of embodiment 15, wherein:
  • the third message is used to indicate that the sending resource and the feedback resource have an association relationship, and the association relationship indicates that the receiving resource is used to receive feedback information of data sent through the sending resource.
  • Embodiment 18 The method according to embodiment 15 or embodiment 17, wherein the method further comprises:
  • the second network device receives the information of the transmission resource from a first network device, the first network device is a network device where a first terminal device resides, and the first terminal device is a sender of the data ;
  • the second network device sends the information of the feedback resource to the first network device.
  • Embodiment 19 A communication method, including:
  • the first terminal device sends data to the second terminal device
  • the first terminal device receives feedback information corresponding to the data from the second terminal device, where the feedback information includes a first identifier corresponding to the data.
  • Embodiment 20 The method according to embodiment 19, wherein the first identifier includes one or more of the following:
  • the HARQ process number corresponding to the data is the HARQ process number corresponding to the data.
  • Embodiment 21 The method according to embodiment 20, wherein the first identifier includes the random number, and the method further includes:
  • the first terminal device sends the random number corresponding to the data to the second terminal device.
  • Embodiment 22 A communication method, wherein the method includes:
  • the second terminal device receives data from the first terminal device
  • the second terminal device sends feedback information corresponding to the data to the first terminal device, where the feedback information includes a first identifier corresponding to the data.
  • Embodiment 23 The method according to embodiment 22, wherein the first identifier includes one or more of the following:
  • the HARQ process number corresponding to the data is the HARQ process number corresponding to the data.
  • Embodiment 24 The method according to embodiment 23, wherein the first identifier includes the random number, and the method further includes:
  • the second terminal device receives the random number corresponding to the data from the first terminal device.
  • Embodiment 25 A communication device, wherein the communication device includes:
  • a transceiver module for receiving the first message from the first network device
  • a processing module configured to determine a first resource according to the first message
  • the transceiver module is further configured to send data to a second terminal device on the first resource;
  • the transceiver module is further configured to receive feedback information corresponding to the data from the second terminal device on a second resource, and the second resource is configured to receive feedback of data sent through the first resource information.
  • Embodiment 26 The communication device according to embodiment 25, wherein the first message is used to indicate that the second resource is used to receive feedback information of data sent through the first resource.
  • Embodiment 27 The communication device according to embodiment 25 or embodiment 26, wherein:
  • the first message is used to indicate that the second resource has an association relationship with the first resource, and the association relationship indicates that the second resource is used to receive feedback information of data sent through the first resource.
  • Embodiment 28 The communication device according to embodiment 27, wherein the first message is used to indicate the first resource pool and the second resource pool, and the first resource pool and the second resource The pool has an association relationship, and the association relationship indicates that the resources included in the second resource pool are used to receive feedback information of data sent through the resources included in the first resource pool.
  • Embodiment 29 The communication device according to embodiment 28, wherein the processing module is configured to determine the first resource in the following manner:
  • Embodiment 30 The communication device according to embodiment 28 or embodiment 29, wherein:
  • the processing module is further configured to select the second resource from the second resource pool for receiving feedback information of the data sent through the first resource;
  • the transceiver module is further configured to send first indication information to the second terminal device, where the first indication information is used to indicate that the second resource is used to send feedback information of data received through the first resource .
  • Embodiment 31 A communication device, wherein the communication device includes:
  • a transceiver module configured to receive data from a first terminal device on the first resource
  • a processing module for determining feedback information corresponding to the data
  • the transceiver module is further configured to send the feedback information to the first terminal device on a second resource, and the second resource is used to receive feedback information of data sent through the first resource.
  • Embodiment 32 The communication device according to embodiment 31, wherein the transceiver module is further configured to:
  • the second resource is used to send feedback information of data received through the first resource, and the second The terminal device resides in the second network device.
  • Embodiment 33 The communication device according to embodiment 32, wherein:
  • the third message is used to indicate that the second resource has an association relationship with the first resource, and the association relationship indicates that the second resource is used to send feedback information of data received through the first resource.
  • Embodiment 34 The communication device according to embodiment 31, wherein:
  • the transceiver module is further configured to receive a third message from a second network device, the third message is used to indicate a first resource pool and a second resource pool, the first resource pool and the second resource pool Having an association relationship, and the association relationship indicates that the resources included in the second resource pool are used to send feedback information of data received through the resources included in the first resource pool;
  • the processing module is further configured to select the second resource from the second resource pool, and the first resource belongs to the first resource pool.
  • Embodiment 35 A network device, wherein the network device includes:
  • the processing module is configured to determine a transmission resource for the first terminal device to send data, and a feedback resource for the first terminal device to receive feedback information of the data sent through the transmission resource, wherein the transmission resource Including a first resource, the feedback resource includes a second resource, or, the sending resource includes a first resource pool, and the feedback resource includes a second resource pool;
  • a transceiver module configured to send a first message to the first terminal device, the first message being used to indicate the transmission resource, and indicating that the feedback resource is used to receive feedback of data sent through the transmission resource information.
  • Embodiment 36 The network device according to embodiment 35, wherein the transceiver module is further configured to send a fourth message to the second network device, and the fourth message is used to indicate the sending resource and the feedback Resources, the second network device is a network device where a second terminal device resides, and the second terminal device is a receiving end of the data.
  • Embodiment 37 The network device according to embodiment 35, wherein:
  • the first message is used to indicate that the transmission resource and the feedback resource have an association relationship, and the association relationship indicates that the feedback resource is used to receive feedback information of data transmitted through the transmission resource.
  • Embodiment 38 The network device according to embodiment 35 or embodiment 37, wherein the transceiver module is further configured to:
  • Embodiment 39 A network device, wherein the network device includes:
  • the processing module is configured to determine a feedback resource used for the second terminal device to send feedback information, where the feedback resource is used for the second terminal device to send feedback information of data sent through the sending resource, where the sending resource includes A first resource, the feedback resource includes a second resource, or the sending resource includes a first resource pool, and the feedback resource includes a second resource pool;
  • the transceiver module is configured to send a third message to the second terminal device, where the third message is used to indicate that the feedback resource is used to receive feedback information of data sent through the sending resource.
  • Embodiment 40 The network device according to embodiment 39, wherein the transceiver module is further configured to receive a fourth message from the first network device, and the fourth message is used to indicate the transmission resource and the For feedback resources, the first network device is a network device where a first terminal device resides, and the first terminal device is a sender of the data.
  • Embodiment 41 The network device according to embodiment 39, wherein:
  • the third message is used to indicate that the sending resource and the feedback resource have an association relationship, and the association relationship indicates that the receiving resource is used to receive feedback information of data sent through the sending resource.
  • Embodiment 42 The network device according to embodiment 39 or embodiment 41, wherein:
  • the transceiver module is further configured to receive information about the sending resource from a first network device, where the first network device is the network device where the first terminal device resides, and the first terminal device is the data source Sender
  • the processing module is further configured to determine the information of the feedback resource according to the information of the transmission resource;
  • the transceiver module is also configured to send the feedback resource information to the first network device.
  • Embodiment 43 A communication device, wherein the communication device includes:
  • Processing module used to determine data
  • a transceiver module configured to send the data to the second terminal device
  • the transceiver module is further configured to receive feedback information corresponding to the data from the second terminal device, where the feedback information includes a first identifier corresponding to the data.
  • Embodiment 44 The communication device according to embodiment 43, wherein the first identifier includes one or more of the following:
  • the identifier of the communication device
  • the HARQ process number corresponding to the data is the HARQ process number corresponding to the data.
  • Embodiment 45 The communication device according to embodiment 44, wherein the first identifier includes the random number, and the transceiver module is further configured to send the random number corresponding to the data to the first Two terminal equipment.
  • Embodiment 46 A communication device, wherein the communication device includes:
  • a transceiver module for receiving data from the first terminal device
  • a processing module for determining feedback information corresponding to the data
  • the transceiver module is further configured to send the feedback information to the first terminal device, where the feedback information includes a first identifier corresponding to the data.
  • Embodiment 47 The communication device according to embodiment 46, wherein the first identifier includes one or more of the following:
  • the HARQ process number corresponding to the data is the HARQ process number corresponding to the data.
  • Embodiment 48 The communication device according to embodiment 47, wherein the first identifier includes the random number, and the transceiver module is further configured to receive all data corresponding to the data from the first terminal device. The random number.
  • Embodiment 49 A communication device, wherein the communication device includes a processor and a transceiver, and the processor and the transceiver are coupled and capable of performing as described in any one of Embodiments 1 to 6.
  • Embodiment 50 A communication device, wherein the communication device includes a processor and a transceiver, and the processor and the transceiver are coupled and capable of performing as described in any one of Embodiment 19 to Embodiment 21. The method described above, or execute the method described in any one of Embodiment 22 to Embodiment 24.
  • Embodiment 51 A chip that includes a processor, and when the processor executes an instruction, the processor is used to execute the method described in any one of the foregoing Embodiments 1 to 6, or execute the method as described in the embodiment The method described in any one of the embodiments 7 to 10, or the method described in any one of the embodiments 11 to 14, or the method described in any of the embodiments 15 to 18 The method described in an embodiment.
  • the instruction can come from the internal memory of the chip or the external memory of the chip.
  • the chip also includes an input and output circuit.
  • Embodiment 52 A chip that includes a processor.
  • the processor executes an instruction, the processor is used to execute the method described in any one of the above-mentioned Embodiments 19 to 21, or execute the method as described in the embodiment The method described in any one of 22 to 24.
  • the instruction can come from the internal memory of the chip or the external memory of the chip.
  • the chip also includes an input and output circuit.
  • Embodiment 53 a communication system, wherein the communication system includes the communication device described in any one of embodiments 25 to 30, and the communication device described in any one of embodiments 31 to 34
  • the communication device is the network device described in any one of Embodiment 35 to Embodiment 38, and the network device described in any one of Embodiment 39 to Embodiment 42.
  • Embodiment 54 A communication system, wherein the communication system includes the communication device described in any one of the embodiments 43 to 45, and the communication device described in any one of the embodiments 46 to 48 ⁇ Communication device.
  • Embodiment 55 A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, and when the computer program is run on a computer, the computer is caused to execute as in Embodiment 1 to Embodiment 6.
  • Embodiment 56 A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, and when the computer program is run on a computer, the computer is caused to execute as in embodiment 19 to embodiment 21.
  • Embodiment 57 A computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can implement any one of the embodiments 1 to 6 Method, or implement the method described in any one of Embodiments 7 to 10, or implement the method described in any one of Embodiments 11 to 14, or implement the method as described in Embodiment 15. To the method described in any one of the embodiments in Embodiment 18.
  • Embodiment 58 a computer program product
  • the computer program product is used to store a computer program
  • the computer can implement the method described in any one of the embodiments 19 to 21 Method, or implement the method described in any one of Embodiment 22 to Embodiment 24.
  • Embodiment 59 A communication method, including:
  • a first message is received.
  • the first message is used to instruct the second terminal device to reside on the first network device, and the first network device and the The second network device corresponds to a different PLMN;
  • the second terminal device resides on the first network device.
  • Embodiment 60 The method according to embodiment 59, wherein receiving the first message includes:
  • Embodiment 61 The method according to embodiment 60, wherein before receiving the first message from the second network device, the method further includes:
  • the second terminal device sends a request message to the second network device, where the request message is used to request to reside on the first network device; or,
  • the second terminal device sends a third message to the first network device, where the third message is used to request to camp on the first network device.
  • Embodiment 62 The method according to any one of embodiment 59 to embodiment 61, wherein the resident of the second terminal device on the first network device includes:
  • the second terminal device camps on the first network device through cell reselection according to the information of the first network device.
  • Embodiment 63 The method according to any one of Embodiment 59 to Embodiment 62, wherein the method further includes:
  • the second terminal device establishes a sideline connection with the first terminal device under the first network device.
  • Embodiment 64 The method according to any one of embodiments 59 to 63, wherein the first message further includes verification information of the second terminal device, and the verification information of the second terminal device is used for Verify the second terminal device.
  • Embodiment 65 The method according to embodiment 64, wherein the method further comprises:
  • the second terminal device sends a fifth message to the first network device, where the fifth message includes verification information of the second terminal device.
  • Embodiment 66 A communication method, including:
  • the first terminal device receives a second message from the first network device, the second message is used to instruct the second terminal device to reside on the first network device, and the second terminal device currently resides on the second network Equipment, the first network equipment and the second network equipment correspond to different PLMNs;
  • the first terminal device sends a first message to the second terminal device, where the first message is used to instruct the second terminal device to reside on the first network device.
  • Embodiment 67 The method according to embodiment 66, wherein the method further comprises:
  • the first terminal device sends a third message to the first network device, where the third message is used to instruct the second terminal device to reside on the second network device.
  • Embodiment 68 The method according to embodiment 66 or embodiment 67, wherein the method further comprises:
  • the first terminal device establishes a sideline connection with the second terminal device under the first network device.
  • Embodiment 69 A communication method, including:
  • the first network device receives a third message, which is used to instruct the second terminal device to reside on the second network device, or to indicate that the second terminal device resides on the second network device to request to reside on the first network device.
  • a network device, the first network device and the second network device correspond to different PLMNs;
  • the first network device sends a second message, where the second message is used to instruct the second terminal device to camp on the first network device.
  • Embodiment 70 The method according to embodiment 69, wherein the first network device receiving the third message includes:
  • the first network device receives the third message from the first terminal device; or,
  • the first network device receives the third message from the second network device; or,
  • the first network device receives the third message from the second terminal device.
  • Embodiment 71 The method according to embodiment 69 or embodiment 70, wherein the sending of the second message by the first network device includes:
  • the first network device sends the second message to a first terminal device residing on the first network device; or,
  • the first network device sends the second message to the second network device.
  • Embodiment 72 The method according to any one of embodiments 69 to 71, wherein the method further includes:
  • the first network device receives the verification information of the second terminal device from the second network device, and the verification information of the second terminal device is used to verify the second terminal device.
  • Embodiment 73 The method according to embodiment 72, wherein the method further comprises:
  • the first network device sends a fourth message to the second network device, where the fourth message is used to request the verification information of the second terminal device.
  • Embodiment 74 The method according to embodiment 72 or embodiment 73, wherein the method further comprises:
  • the first network device performs verification according to the verification information of the second terminal device included in the fifth message and the verification information of the second terminal device from the second network device;
  • the first network device determines that the second terminal device can access the first network device.
  • Embodiment 75 A communication method, including:
  • the second network device determines that the second terminal device that resides in the second network device needs to reside in the first network device, and the first network device and the second network device correspond to different PLMNs;
  • the second network device sends a first message to the second terminal device, where the first message is used to instruct the second terminal device to reside on the first network device.
  • Embodiment 76 The method according to embodiment 75, wherein the second network device determining that the second terminal device residing on the second network device needs to reside on the first network device includes:
  • the second network device receives a second message from the first network device, where the second message is used to instruct the second terminal device to reside on the first network device; or,
  • the second network device receives a request message from the second terminal device, where the request message is used to request to reside on the first network device.
  • Embodiment 77 The method according to embodiment 75 or embodiment 76, wherein the method further includes:
  • the second network device sends the verification information of the second terminal device to the first network device, where the verification information of the second terminal device is used to verify the second terminal device.
  • Embodiment 78 The method according to embodiment 77, wherein the method further comprises:
  • the second network device receives a fourth message from the first network device, where the fourth message is used to request the verification information of the second terminal device.
  • a communication device including:
  • the transceiver module is configured to receive a first message when the communication device resides on the second network device, and the first message is used to instruct the communication device to reside on the first network device, and the first network device Correspond to a different PLMN from the second network device;
  • the processing module is configured to reside on the first network device.
  • Embodiment 80 The communication device according to embodiment 79, wherein the transceiver module is configured to receive the first message in the following manner:
  • Embodiment 81 The communication device according to embodiment 80, wherein:
  • the transceiver module is further configured to send a request message to the second network device before receiving the first message from the second network device, where the request message is used to request to reside on the first network device ;or,
  • the transceiver module is further configured to send a third message to the first network device before receiving the first message from the second network device, and the third message is used to request to stay on the first network device.
  • Internet equipment
  • Embodiment 82 The communication device according to any one of Embodiment 79 to Embodiment 81, wherein the processing module is configured to cause the communication device to reside on the first network device in the following manner, including:
  • Embodiment 83 The communication device according to any one of Embodiment 79 to Embodiment 82, wherein the processing module is further configured to establish a side-line connection with a first terminal device under the first network device.
  • Embodiment 84 The communication device according to any one of Embodiment 79 to Embodiment 83, wherein the first message further includes verification information of the communication device, and the verification information of the communication device is used to verify the Communication device.
  • Embodiment 85 The communication device according to embodiment 84, wherein the transceiver module is further configured to send a fifth message to the first network device, and the fifth message includes verification information of the communication device.
  • a communication device including:
  • the transceiver module is configured to receive a second message from the first network device, the second message is used to instruct the second terminal device to reside on the first network device, and the second terminal device currently resides on the second network device.
  • Network equipment, the first network equipment and the second network equipment correspond to different PLMNs;
  • a processing module configured to determine a first message, where the first message is used to instruct the second terminal device to reside on the first network device;
  • the transceiver module is also used to send the first message to the second terminal device.
  • Embodiment 87 The communication device according to embodiment 86, wherein the transceiver module is further configured to send a third message to the first network device, and the third message is used to instruct the second terminal device Resides on the second network device.
  • Embodiment 88 The communication device according to embodiment 86 or embodiment 87, wherein the processing module is further configured to establish a side-line connection with a second terminal device under the first network device.
  • a network device including:
  • the transceiver module is configured to receive a third message, the third message being used to instruct the second terminal device to reside on the second network device, or to indicate that the second terminal device residing on the second network device requests to reside on the second network device
  • the network device, the network device and the second network device correspond to different PLMNs;
  • a processing module configured to determine a second message, where the second message is used to instruct the second terminal device to reside on the network device;
  • the transceiver module is also used to send the second message.
  • Embodiment 90 The network device according to embodiment 89, wherein the transceiver module is configured to receive the third message in the following manner:
  • Embodiment 91 The network device according to embodiment 89 or embodiment 90, wherein the transceiver module is configured to send the second message in the following manner, including:
  • Embodiment 92 The network device according to any one of embodiments 89 to 91, wherein the transceiver module is further configured to receive verification information from the second terminal device of the second network device, The verification information of the second terminal device is used to verify the second terminal device.
  • Embodiment 93 The network device according to embodiment 92, wherein the transceiver module is further configured to send a fourth message to the second network device, and the fourth message is used to request to obtain the second terminal Verification information of the device.
  • Embodiment 94 The network device according to embodiment 92 or 93, wherein:
  • the transceiver module is further configured to receive a fifth message from the second terminal device, where the fifth message includes verification information of the second terminal device;
  • the processing module is further configured to perform verification based on the verification information of the second terminal device included in the fifth message and the verification information of the second terminal device from the second network device;
  • the processing module is further configured to determine that the second terminal device can access the network device when the verification is passed.
  • a network device including:
  • a processing module configured to determine that a second terminal device that resides in the network device needs to reside in a first network device, and the first network device and the network device correspond to different PLMNs;
  • the transceiver module is configured to send a first message to the second terminal device, where the first message is used to instruct the second terminal device to reside on the first network device.
  • Embodiment 96 The network device according to embodiment 95, wherein the processing module is configured to determine that the second terminal device residing on the network device needs to reside on the first network device in the following manner:
  • a request message from the second terminal device is received through the transceiver module, where the request message is used to request to reside on the first network device.
  • Embodiment 97 The network device according to embodiment 95 or 96, wherein the transceiver module is further configured to send verification information of the second terminal device to the first network device, and the second terminal device The verification information is used to verify the second terminal device.
  • Embodiment 98 The network device according to embodiment 97, wherein the transceiver module is further configured to receive a fourth message from the first network device, and the fourth message is used to request to obtain the second Verification information of the terminal device.
  • Embodiment 99 A communication device, wherein the communication device includes a processor and a transceiver, and the processor and the transceiver are coupled to be capable of performing as described in any of the embodiments 59 to 65.
  • Embodiment 100 A communication device, wherein the communication device includes a processor and a transceiver, and the processor and the transceiver are coupled and capable of performing as described in any one of Embodiment 69 to Embodiment 74. The method described above, or execute the method described in any one of Embodiment 75 to Embodiment 78.
  • Embodiment 101 A chip that includes a processor, and when the processor executes an instruction, the processor is used to execute the method described in any one of the above-mentioned Embodiments 59 to 65, or execute the method as described in the embodiment The method described in any one of 66 to 68, or the method described in any one of embodiments 69 to 74, or any of the methods described in embodiment 75 to 78 The method described in an embodiment.
  • the instruction can come from the internal memory of the chip or the external memory of the chip.
  • the chip also includes an input and output circuit.
  • Embodiment 102 A communication system, wherein the communication system includes the communication device described in any one of Embodiments 79 to 85, and the communication device described in any one of Embodiments 86 to 88 The communication device described in any one of Embodiments 89 to 94, and the network device described in any of Embodiments 95 to 98.
  • Embodiment 103 A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, and when the computer program is run on a computer, the computer is caused to execute operations as in embodiment 59 to embodiment 65.
  • Embodiment 104 A computer program product, the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can implement as described in any one of the embodiments 59 to 65 , Or implement the method described in any one of embodiments 66 to 68, or implement the method described in any one of embodiments 69 to 74, or implement the method as described in the embodiment 75 to the method described in any one of the embodiments of the embodiment 78.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请涉及一种通信方法、装置及设备。当第二终端设备驻留在第二网络设备时,接收第一消息,第一消息用于指示第二终端设备驻留到第一网络设备,第一网络设备和第二网络设备对应于不同的PLMN。第二终端设备驻留到第一网络设备。在本申请实施例中,驻留在对应于不同的PLMN的网络设备下的两个终端设备可以改为驻留在同一个网络设备下,那么这两个终端设备如果要通过侧行链路进行通信,就能够正常实现HARQ等机制,提高了终端设备之间信息传输的可靠性。

Description

一种通信方法、装置及设备
相关申请的交叉引用
本申请要求在2019年11月07日提交中国国家知识产权局、申请号为201911083630.9、申请名称为“一种通信方法、装置及设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种通信方法、装置及设备。
背景技术
目前,终端设备一般都是通过设置在终端设备内的用户身份模块(subscriber identification module,SIM)卡实现与其他设备的通信。每个SIM卡都有对应的公共陆地移动网络(public land mobile network,PLMN),例如SIM卡1对应于运营商1,SIM卡2对应于运营商2。
另外,终端设备与终端设备之间可以通过侧行链路(sidelink,SL)传输信息。为了提高信息传输的可靠性,在侧行链路上也引入了混合自动重传请求(hybrid automatic repeat request,HARQ)机制,即,终端设备1向终端设备2发送数据后,终端设备2可以向终端设备1发送对应于该数据的反馈信息,从而确定该数据是否传输成功。对于一个终端设备来说,如果在一个频段发送数据,而在监听来自其他设备的信息时,会在多个频段进行监听,那么,即使终端设备1和终端设备2安装的SIM卡对应于不同的运营商,不同的运营商所支持的频段可能不同,但终端设备1在向终端设备2发送数据后,由于能够在多个频段监听来自其他设备的信息,因此终端设备1可能能够监听到来自终端设备2的反馈信息。但是由于终端设备1发送数据的频段和该反馈信息所在的频段不同,因此终端设备1无法确定该反馈信息是否是对应于该数据的反馈信息,终端设备1会认为未获取该数据的反馈信息。
可见,对应于不同的运营商的终端设备,目前无法实现HARQ机制,这也就降低了信息传输的可靠性。
发明内容
本申请实施例提供一种通信方法、装置及设备,用于提高信息传输的可靠性。
第一方面,提供第一种通信方法,该方法包括:当第二终端设备驻留在第二网络设备时,接收第一消息,所述第一消息用于指示所述第二终端设备驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;所述第二终端设备驻留到所述第一网络设备。
该方法可由第一通信装置执行,第一通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片。示例性地,所述第一通信装置为第二终端设备,或者为设置在第二终端设备中的用于实现第二终端设备的功能的芯片,或者为用于实 现第二终端设备的功能的其他部件。在下文的介绍过程中,以第一通信装置是第二终端设备为例。
在本申请实施例中,如果第二终端设备驻留在第二网络设备,那么第二终端设备可以变更为驻留到第一网络设备,其中第一终端设备驻留在第一网络设备。也就是说,如果两个终端设备驻留在PLMN不同的网络设备,则其中一个终端设备可以变更为驻留到另一个终端设备所在的网络设备,从而两个终端设备驻留在同一个网络设备下,那么这两个终端设备如果要通过侧行链路进行通信,就能够正常实现HARQ等机制,提高了终端设备之间信息传输的可靠性。
结合第一方面,在第一方面的第一种可能的实施方式中,接收第一消息,包括:
接收来自所述第二网络设备的第一消息;或,
接收来自第一终端设备的第一消息,所述第一终端设备驻留在所述第一网络设备;或,
接收来自所述第一网络设备的第一消息。
第二终端设备要驻留到第一网络设备,可能是根据不同的因素确定的。例如可能是第二网络设备通知第二终端设备驻留到第一网络设备,则第二终端设备接收来自第二网络设备的第一消息,或者可能是第一终端设备通知第二终端设备驻留到第一网络设备,则第二终端设备接收来自第一终端设备的第一消息,或者可能是第一网络设备通知第二终端设备驻留到第一网络设备,则第二终端设备接收来自第一网络设备的第一消息,等等。实现方式较多,较为灵活。
结合第一方面的第一种可能的实施方式,在第一方面的第二种可能的实施方式中,在接收来自所述第二网络设备的第一消息之前,还包括:
所述第二终端设备向所述第二网络设备发送请求消息,所述请求消息用于请求驻留到所述第一网络设备;或,
所述第二终端设备向所述第一网络设备发送第三消息,所述第三消息用于请求驻留到所述第一网络设备。
例如,第二终端设备需要与第一终端设备通信时,或者第二终端设备在与第一终端设备通信的过程中,确定第二终端设备驻留的第二网络设备和第一终端设备驻留的第一网络设备对应于不同的PLMN,则第二终端设备可以请求驻留到第一网络设备,从而与第一终端设备工作在同一个网络设备下,可以避免由于PLMN不同而导致HARQ机制无法实现的问题。第二终端设备可以向第二网络设备发送请求,或者也可以直接请求第一网络设备,方式较为多样。
结合第一方面或第一方面的第一种可能的实施方式或第一方面的第二种可能的实施方式,在第一方面的第三种可能的实施方式中,所述第二终端设备驻留到所述第一网络设备,包括:
所述第二终端设备根据所述第一网络设备的信息,通过小区重选驻留到所述第一网络设备。
例如,第一消息可以包括第一网络设备的信息,或者第二终端设备也可以通过其他途径获得第一网络设备的信息,例如第二终端设备可以通过与第一终端设备的交互,从第一终端设备获得第一网络设备的信息。第一网络设备的信息,例如为第一网络设备的ID,或者可以是第一网络设备的其他信息。第二终端设备在得到第一网络设备的信息后,可以确定重选到第一网络设备,则第二终端设备只需提供小区重选的方式驻留到第一网络设备提 供的小区即可。第二终端设备在知晓第一网络设备的信息的情况下进行小区重选,使得小区重选的目标性更强,且小区重选时无需测量过多的小区,使得小区重选的效率更高。
结合第一方面或第一方面的第一种可能的实施方式至第一方面的第三种可能的实施方式中的任一种可能的实施方式,在第一方面的第四种可能的实施方式中,所述方法还包括:
所述第二终端设备在所述第一网络设备下与第一终端设备建立侧行连接。
第二终端设备驻留到第一网络设备后,可以在第一网络设备下与第一终端设备建立侧行连接,从而第二终端设备和第一终端设备可以进行数据交互。这两个终端设备驻留在同一个网络设备下,这两个终端设备如果要通过侧行链路进行通信,能够正常实现HARQ等机制,提高了终端设备之间信息传输的可靠性。
结合第一方面或第一方面的第一种可能的实施方式至第一方面的第四种可能的实施方式中的任一种可能的实施方式,在第一方面的第五种可能的实施方式中,所述第一消息还包括所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
第二终端设备要驻留到第一网络设备,而第一网络设备事先并不知道第二终端设备的信息,如果不加验证就接受第二终端设备的驻留,可能会影响网络安全。因此第一消息可以包括第二终端设备的验证信息,例如第二终端设备在与第一网络设备建立RRC连接时,或者在与第一网络设备建立RRC连接后,可以将第二终端设备的验证信息发送给第一网络设备,从而第一网络设备可以根据该验证信息对第二终端设备进行验证。如果验证通过,则第二终端设备可以驻留在第一网络设备,而如果验证失败,第一网络设备甚至可以拒绝第二终端设备驻留。通过这种方式,可以尽量保证网络的安全性。
结合第一方面的第五种可能的实施方式,在第一方面的第六种可能的实施方式中,所述方法还包括:
所述第二终端设备向第一网络设备发送第五消息,所述第五消息包括所述第二终端设备的验证信息。
例如第二终端设备在与第一网络设备建立RRC连接时,或者在与第一网络设备建立RRC连接后,可以将第二终端设备的验证信息发送给第一网络设备,从而第一网络设备可以根据该验证信息对第二终端设备进行验证。如果验证通过,则第二终端设备可以驻留在第一网络设备,而如果验证失败,第一网络设备甚至可以拒绝第二终端设备驻留。通过这种方式,可以尽量保证网络的安全性。第二终端设备的验证信息例如是第二终端设备通过第一消息获得的,或者也可以是第二终端设备通过其他方式获得的。
第二方面,提供第二种通信方法,该方法包括:第一终端设备接收来自第一网络设备的第二消息,所述第二消息用于指示第二终端设备驻留到所述第一网络设备,所述第二终端设备当前驻留在第二网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;所述第一终端设备向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
该方法可由第二通信装置执行,第二通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片。示例性地,所述第二通信装置为第一终端设备,或者为设置在第一终端设备中的用于实现第一终端设备的功能的芯片,或者为用于实现第一终端设备的功能的其他部件。在下文的介绍过程中,以第二通信装置是第一终端设 备为例。
在本申请实施例中,如果第二终端设备驻留在第二网络设备,那么第二终端设备可以变更为驻留到第一网络设备,其中第一终端设备驻留在第一网络设备。也就是说,如果两个终端设备驻留在PLMN不同的网络设备,则其中一个终端设备可以变更为驻留到另一个终端设备所在的网络设备,从而两个终端设备驻留在同一个网络设备下,那么这两个终端设备如果要通过侧行链路进行通信,就能够正常实现HARQ等机制,提高了终端设备之间信息传输的可靠性。第二终端设备要驻留在第一网络设备,一种实现方式就是,第一终端设备通知第二终端设备驻留到第一网络设备。例如,第一终端设备需要与第二终端设备通信时,或者第一终端设备在与第二终端设备通信的过程中,确定第二终端设备驻留的第二网络设备和第一终端设备驻留的第一网络设备对应于不同的PLMN,则第一终端设备可以指示第二终端设备驻留到第一网络设备,从而与第二终端设备工作在同一个网络设备下,可以避免由于PLMN不同而导致HARQ机制无法实现的问题。
结合第二方面,在第二方面的第一种可能的实施方式中,所述方法还包括:
所述第一终端设备向所述第一网络设备发送第三消息,所述第三消息用于指示所述第二终端设备驻留在所述第二网络设备。
第一终端设备要指示第二终端设备驻留在第一网络设备,一种方式为,第一终端设备先向第一网络设备发送第三消息,第三消息指示第二终端设备驻留在第二网络设备。第一网络设备接收第三消息后,就可以明确第一终端设备是希望第二终端设备驻留在第一网络设备。通过这种方式,可以使得第一网络设备先明确可能有新的终端设备即将驻留。
结合第二方面或第二方面的第一种可能的实施方式,在第二方面的第二种可能的实施方式中,所述方法还包括:
所述第一终端设备在所述第一网络设备下与第二终端设备建立侧行连接。
第二终端设备驻留到第一网络设备后,第一终端设备可以在第一网络设备下与第二终端设备建立侧行连接,从而第二终端设备和第一终端设备可以进行数据交互。这两个终端设备驻留在同一个网络设备下,这两个终端设备如果要通过侧行链路进行通信,能够正常实现HARQ等机制,提高了终端设备之间信息传输的可靠性。
第三方面,提供第三种通信方法,该方法包括:第一网络设备接收第三消息,所述第三消息用于指示第二终端设备驻留在第二网络设备,或用于指示驻留在第二网络设备的第二终端设备请求驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;所述第一网络设备发送第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备。
该方法可由第三通信装置执行,第三通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片。示例性地,所述第三通信装置为第一网络设备,或者为设置在第一网络设备中的用于实现第一网络设备的功能的芯片,或者为用于实现第一网络设备的功能的其他部件。在下文的介绍过程中,以第三通信装置是第一网络设备为例。
在本申请实施例中,如果第二终端设备驻留在第二网络设备,那么第二终端设备可以变更为驻留到第一网络设备,其中第一终端设备驻留在第一网络设备。也就是说,如果两个终端设备驻留在PLMN不同的网络设备,则其中一个终端设备可以变更为驻留到另一个终端设备所在的网络设备,从而两个终端设备驻留在同一个网络设备下,那么这两个终端 设备如果要通过侧行链路进行通信,就能够正常实现HARQ等机制,提高了终端设备之间信息传输的可靠性。
结合第三方面,在第三方面的第一种可能的实施方式中,第一网络设备接收第三消息,包括:
所述第一网络设备接收来自所述第一终端设备的所述第三消息;或,
所述第一网络设备接收来自所述第二网络设备的所述第三消息;或,
所述第一网络设备接收来自所述第二终端设备的所述第三消息。
例如,第一终端设备需要与第二终端设备通信时,或者第一终端设备在与第二终端设备通信的过程中,确定第二终端设备驻留的第二网络设备和第一终端设备驻留的第一网络设备对应于不同的PLMN,则第一终端设备可以请求第一网络设备,以使得第二终端设备驻留到第一网络设备;或者,第二终端设备所驻留的第二网络设备可以请求第一网络设备,以使得第二终端设备驻留到第一网络设备;或者,第二终端设备也可以请求第一网络设备,以使得第二终端设备驻留到第一网络设备,等等。在本申请实施例中,第一网络设备可以通过不同的途径确定第二终端设备请求驻留到第一网络设备,较为灵活。
结合第三方面或第三方面的第一种可能的实施方式,在第三方面的第二种可能的实施方式中,所述第一网络设备发送第二消息,包括:
所述第一网络设备向驻留在所述第一网络设备的第一终端设备发送所述第二消息;或,
所述第一网络设备向所述第二网络设备发送所述第二消息。
第一网络设备可以向第一终端设备发送第二消息,例如第一终端设备接收第一消息后,可以向第二终端设备发送消息,以指示第二终端设备驻留到第一网络设备。或者,第一网络设备也可以向第二网络设备发送第二消息,例如第二网络设备接收第一消息后,可以向第二终端设备发送消息,以指示第二终端设备驻留到第一网络设备。或者,第一网络设备也可以向第二终端设备发送第一消息,以指示第二终端设备驻留到第一网络设备,这种方式更为直接。
结合第三方面或第三方面的第一种可能的实施方式或第三方面的第二种可能的实施方式,在第三方面的第三种可能的实施方式中,所述方法还包括:
所述第一网络设备接收来自所述第二网络设备的所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
第二终端设备要驻留到第一网络设备,而第一网络设备事先并不知道第二终端设备的信息,如果不加验证就接受第二终端设备的驻留,可能会影响网络安全。因此第一网络设备可以获得来自第二网络设备的第二终端设备的验证信息,从而第一网络设备可以根据该验证信息对第二终端设备进行验证。如果验证通过,则第二终端设备可以驻留在第一网络设备,而如果验证失败,第一网络设备甚至可以拒绝第二终端设备驻留。通过这种方式,可以尽量保证网络的安全性。
结合第三方面的第三种可能的实施方式,在第三方面的第四种可能的实施方式中,所述方法还包括:
所述第一网络设备向所述第二网络设备发送第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
例如第一网络设备可以向第二网络设备发送请求,以请求获得第二终端设备的验证信息。第二网络设备接收第四消息后,就可以将第二终端设备的验证信息发送给第一网络设 备。这样第一网络设备可以在有需求时再请求获得第二终端设备的验证信息,提高了所获取的信息的有效性。或者,第一网络设备也可以无需向第二网络设备发送第四消息,例如第二网络设备可以主动将第二终端设备的验证信息发送给第一网络设备,这样可以减少第一网络设备和第二网络设备之间的交互过程,节省信令开销。
结合第三方面的第三种可能的实施方式或第三方面的第四种可能的实施方式,在第三方面的第五种可能的实施方式中,所述方法还包括:
所述第一网络设备接收来自所述第二终端设备的第五消息,所述第五消息包括所述第二终端设备的验证信息;
所述第一网络设备根据所述第五消息包括的所述第二终端设备的验证信息,和来自所述第二网络设备的所述第二终端设备的验证信息,进行验证;
当验证通过时,所述第一网络设备确定所述第二终端设备能够接入所述第一网络设备。
第一网络设备可以获得来自第二终端设备的第二终端设备的验证信息,也可以获得来自第二网络设备的第二终端设备的验证信息,则第一网络设备可以根据这两份验证信息对第二终端设备进行验证。例如一种验证方式为,第一网络设备将这两份验证信息进行比较,以确定二者是否一致,如果二者一致,则第一网络设备确定第二终端设备验证通过,而如果二者不一致,则第一网络设备可以确定第二终端设备验证失败。如果第二终端设备验证通过,则第二终端设备可以驻留在第一网络设备,而如果第二终端设备验证失败,第一网络设备甚至可以拒绝第二终端设备驻留。通过这种方式,可以尽量保证网络的安全性。
第四方面,提供第四种通信方法,该方法包括:第二网络设备确定驻留在所述第二网络设备的第二终端设备需驻留在第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;所述第二网络设备向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
该方法可由第四通信装置执行,第四通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片。示例性地,所述第四通信装置为第二网络设备,或者为设置在第二网络设备中的用于实现第二网络设备的功能的芯片,或者为用于实现第一网络设备的功能的其他部件。在下文的介绍过程中,以第四通信装置是第二网络设备为例。
在本申请实施例中,如果第二终端设备驻留在第二网络设备,那么第二终端设备可以变更为驻留到第一网络设备,其中第一终端设备驻留在第一网络设备。也就是说,如果两个终端设备驻留在PLMN不同的网络设备,则其中一个终端设备可以变更为驻留到另一个终端设备所在的网络设备,从而两个终端设备驻留在同一个网络设备下,那么这两个终端设备如果要通过侧行链路进行通信,就能够正常实现HARQ等机制,提高了终端设备之间信息传输的可靠性。
结合第四方面,在第四方面的第一种可能的实施方式中,第二网络设备确定驻留在所述第二网络设备的第二终端设备需驻留在第一网络设备,包括:
所述第二网络设备接收来自所述第一网络设备的第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备;或,
所述第二网络设备接收来自所述第二终端设备的请求消息,所述请求消息用于请求驻留到所述第一网络设备。
例如,第一网络设备确定第二终端设备可以驻留在第一网络设备,则第一网络设备可 以向第二网络设备发送消息,以指示第二终端设备驻留在第一网络设备。或者,第二终端设备可以主动请求驻留到第一网络设备。第二网络设备确定第二终端设备需驻留在第一网络设备的方式可以有多种,可适用于不同的场景。
结合第四方面或第四方面的第一种可能的实施方式,在第四方面的第二种可能的实施方式中,所述方法还包括:
所述第二网络设备向所述第一网络设备发送所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
第二终端设备要驻留到第一网络设备,而第一网络设备事先并不知道第二终端设备的信息,如果不加验证就接受第二终端设备的驻留,可能会影响网络安全。因此第二网络设备可以将第二终端设备的验证信息发送给第一网络设备,从而第一网络设备可以根据该验证信息对第二终端设备进行验证。如果验证通过,则第二终端设备可以驻留在第一网络设备,而如果验证失败,第一网络设备甚至可以拒绝第二终端设备驻留。通过这种方式,可以尽量保证网络的安全性。
结合第四方面的第二种可能的实施方式,在第四方面的第三种可能的实施方式中,所述方法还包括:
所述第二网络设备接收来自所述第一网络设备的第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
例如第一网络设备可以向第二网络设备发送请求,以请求获得第二终端设备的验证信息。第二网络设备接收第四消息后,就可以将第二终端设备的验证信息发送给第一网络设备。这样第一网络设备可以在有需求时再请求获得第二终端设备的验证信息,提高了所获取的信息的有效性。或者,第一网络设备也可以无需向第二网络设备发送第四消息,例如第二网络设备可以主动将第二终端设备的验证信息发送给第一网络设备,这样可以减少第一网络设备和第二网络设备之间的交互过程,节省信令开销。
第五方面,提供一种通信装置,例如该通信装置为如前所述的第一通信装置。所述第一通信装置用于执行上述第一方面或任一可能的实施方式中的方法。具体地,所述第一通信装置可以包括用于执行第一方面或任一可能的实施方式中的方法的模块,例如包括处理模块和收发模块。示例性地,收发模块可以包括发送模块和接收模块,发送模块和接收模块可以是不同的功能模块,或者也可以是同一个功能模块,但能够实现不同的功能。示例性地,所述第一通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性地,所述通信设备为第二终端设备。下面以第一通信装置是第二终端设备为例。例如,所述收发模块也可以通过收发器实现,所述处理模块也可以通过处理器实现。或者,发送模块可以通过发送器实现,接收模块可以通过接收器实现,发送器和接收器可以是不同的功能模块,或者也可以是同一个功能模块,但能够实现不同的功能。如果第一通信装置为通信设备,收发器例如通过通信设备中的天线、馈线和编解码器等实现。或者,如果第一通信装置为设置在通信设备中的芯片,那么收发器(或,发送器和接收器)例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。在第五方面的介绍过程中,继续以所述第一通信装置是第二终端设备,以及,以所述处理模块和所述收发模块为例进行介绍。其中,
所述收发模块,用于当所述第二终端设备驻留在第二网络设备时,接收第一消息,所述第一消息用于指示所述第二终端设备驻留到第一网络设备,所述第一网络设备和所述第 二网络设备对应于不同的PLMN;
所述处理模块,用于驻留到所述第一网络设备。
结合第五方面,在第五方面的第一种可能的实施方式中,所述收发模块用于通过如下方式接收第一消息:
接收来自所述第二网络设备的第一消息;或,
接收来自第一终端设备的第一消息,所述第一终端设备驻留在所述第一网络设备;或,
接收来自所述第一网络设备的第一消息。
结合第五方面的第一种可能的实施方式,在第五方面的第二种可能的实施方式中,
所述收发模块,还用于在接收来自所述第二网络设备的第一消息之前,向所述第二网络设备发送请求消息,所述请求消息用于请求驻留到所述第一网络设备;或,
所述收发模块,还用于在接收来自所述第二网络设备的第一消息之前,向所述第一网络设备发送第三消息,所述第三消息用于请求驻留到所述第一网络设备。
结合第五方面或第五方面的第一种可能的实施方式或第五方面的第二种可能的实施方式,在第五方面的第三种可能的实施方式中,所述处理模块用于通过如下方式驻留到所述第一网络设备:
根据所述第一网络设备的信息,通过小区重选驻留到所述第一网络设备。
结合第五方面或第五方面的第一种可能的实施方式至第五方面的第三种可能的实施方式中的任一种可能的实施方式,在第五方面的第四种可能的实施方式中,所述处理模块,还用于在所述第一网络设备下与第一终端设备建立侧行连接。
结合第五方面或第五方面的第一种可能的实施方式至第五方面的第四种可能的实施方式中的任一种可能的实施方式,在第五方面的第五种可能的实施方式中,所述第一消息还包括所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
结合第五方面的第五种可能的实施方式,在第五方面的第六种可能的实施方式中,所述收发模块,还用于向第一网络设备发送第五消息,所述第五消息包括所述第二终端设备的验证信息。
关于第五方面或第五方面的各种可能的实施方式所带来的技术效果,可参考对于第一方面或第一方面的相应的实施方式的技术效果的介绍。
第六方面,提供一种通信装置,例如该通信装置为如前所述的第二通信装置。所述第二通信装置用于执行上述第二方面或任一可能的实施方式中的方法。具体地,所述第二通信装置可以包括用于执行第二方面或任一可能的实施方式中的方法的模块,例如包括处理模块和收发模块。示例性地,收发模块可以包括发送模块和接收模块,发送模块和接收模块可以是不同的功能模块,或者也可以是同一个功能模块,但能够实现不同的功能。示例性地,所述第二通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性地,所述通信设备为第一终端设备。下面以第二通信装置是第一终端设备为例。例如,所述收发模块也可以通过收发器实现,所述处理模块也可以通过处理器实现。或者,发送模块可以通过发送器实现,接收模块可以通过接收器实现,发送器和接收器可以是不同的功能模块,或者也可以是同一个功能模块,但能够实现不同的功能。如果第二通信装置为通信设备,收发器例如通过通信设备中的天线、馈线和编解码器等实现。或者,如果第二通信装置为设置在通信设备中的芯片,那么收发器(或,发送器和接收器)例如为芯片中 的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。在第六方面的介绍过程中,继续以所述第二通信装置是第一终端设备,以及,以所述处理模块和所述收发模块为例进行介绍。其中,
所述收发模块,用于接收来自第一网络设备的第二消息,所述第二消息用于指示第二终端设备驻留到所述第一网络设备,所述第二终端设备当前驻留在第二网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
所述处理模块,用于确定第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备;
所述收发模块,还用于向所述第二终端设备发送所述第一消息。
结合第六方面,在第六方面的第一种可能的实施方式中,所述收发模块,还用于向所述第一网络设备发送第三消息,所述第三消息用于指示所述第二终端设备驻留在所述第二网络设备。
结合第六方面或第六方面的第一种可能的实施方式,在第六方面的第二种可能的实施方式中,所述处理模块,还用于在所述第一网络设备下与第二终端设备建立侧行连接。
关于第六方面或第六方面的各种可能的实施方式所带来的技术效果,可参考对于第二方面或第二方面的相应的实施方式的技术效果的介绍。
第七方面,提供一种通信装置,例如该通信装置为如前所述的第三通信装置。所述第三通信装置用于执行上述第三方面或任一可能的实施方式中的方法。具体地,所述第三通信装置可以包括用于执行第三方面或任一可能的实施方式中的方法的模块,例如包括处理模块和收发模块。示例性地,收发模块可以包括发送模块和接收模块,发送模块和接收模块可以是不同的功能模块,或者也可以是同一个功能模块,但能够实现不同的功能。示例性地,所述第三通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性地,所述通信设备为第一网络设备。下面以第三通信装置是第一网络设备为例。例如,所述收发模块也可以通过收发器实现,所述处理模块也可以通过处理器实现。或者,发送模块可以通过发送器实现,接收模块可以通过接收器实现,发送器和接收器可以是不同的功能模块,或者也可以是同一个功能模块,但能够实现不同的功能。如果第三通信装置为通信设备,收发器例如通过通信设备中的天线、馈线和编解码器等实现。或者,如果第三通信装置为设置在通信设备中的芯片,那么收发器(或,发送器和接收器)例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。在第七方面的介绍过程中,继续以所述第三通信装置是第一网络设备,以及,以所述处理模块和所述收发模块为例进行介绍。其中,
所述收发模块,用于接收第三消息,所述第三消息用于指示第二终端设备驻留在第二网络设备,或用于指示驻留在第二网络设备的第二终端设备请求驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
所述处理模块,用于确定第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备,
所述收发模块,还用于发送所述第二消息。
结合第七方面,在第七方面的第一种可能的实施方式中,所述收发模块用于通过如下方式接收第三消息:
接收来自所述第一终端设备的所述第三消息;或,
接收来自所述第二网络设备的所述第三消息;或,
接收来自所述第二终端设备的所述第三消息。
结合第七方面或第七方面的第一种可能的实施方式,在第七方面的第二种可能的实施方式中,所述收发模块用于通过如下方式发送第二消息:
向驻留在所述第一网络设备的第一终端设备发送所述第二消息;或,
向所述第二网络设备发送所述第二消息。
结合第七方面或第七方面的第一种可能的实施方式或第七方面的第二种可能的实施方式,在第七方面的第三种可能的实施方式中,所述收发模块,还用于接收来自所述第二网络设备的所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
结合第七方面的第三种可能的实施方式,在第七方面的第四种可能的实施方式中,所述收发模块,还用于向所述第二网络设备发送第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
结合第七方面的第三种可能的实施方式或第七方面的第四种可能的实施方式,在第七方面的第五种可能的实施方式中,
所述收发模块,还用于接收来自所述第二终端设备的第五消息,所述第五消息包括所述第二终端设备的验证信息;
所述处理模块,还用于根据所述第五消息包括的所述第二终端设备的验证信息,和来自所述第二网络设备的所述第二终端设备的验证信息,进行验证;
所述处理模块,还用于当验证通过时,确定所述第二终端设备能够接入所述第一网络设备。
关于第七方面或第七方面的各种可能的实施方式所带来的技术效果,可参考对于第三方面或第三方面的相应的实施方式的技术效果的介绍。
第八方面,提供一种通信装置,例如该通信装置为如前所述的第四通信装置。所述第四通信装置用于执行上述第四方面或任一可能的实施方式中的方法。具体地,所述第四通信装置可以包括用于执行第四方面或任一可能的实施方式中的方法的模块,例如包括处理模块和收发模块。示例性地,收发模块可以包括发送模块和接收模块,发送模块和接收模块可以是不同的功能模块,或者也可以是同一个功能模块,但能够实现不同的功能。示例性地,所述第四通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性地,所述通信设备为第二网络设备。下面以第四通信装置是第二网络设备为例。例如,所述收发模块也可以通过收发器实现,所述处理模块也可以通过处理器实现。或者,发送模块可以通过发送器实现,接收模块可以通过接收器实现,发送器和接收器可以是不同的功能模块,或者也可以是同一个功能模块,但能够实现不同的功能。如果第四通信装置为通信设备,收发器例如通过通信设备中的天线、馈线和编解码器等实现。或者,如果第四通信装置为设置在通信设备中的芯片,那么收发器(或,发送器和接收器)例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。在第八方面的介绍过程中,继续以所述第四通信装置是第二网络设备,以及,以所述处理模块和所述收发模块为例进行介绍。其中,
所述处理模块,用于确定驻留在所述第二网络设备的第二终端设备需驻留在第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
所述收发模块,用于向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
结合第八方面,在第八方面的第一种可能的实施方式中,所述处理模块用于通过如下方式确定驻留在所述第二网络设备的第二终端设备需驻留在第一网络设备:
通过所述收发模块接收来自所述第一网络设备的第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备;或,
通过所述收发模块接收来自所述第二终端设备的请求消息,所述请求消息用于请求驻留到所述第一网络设备。
结合第八方面或第八方面的第一种可能的实施方式,在第八方面的第二种可能的实施方式中,所述收发模块,还用于向所述第一网络设备发送所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
结合第八方面的第二种可能的实施方式,在第八方面的第三种可能的实施方式中,所述收发模块,还用于接收来自所述第一网络设备的第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
关于第八方面或第八方面的各种可能的实施方式所带来的技术效果,可参考对于第四方面或第四方面的相应的实施方式的技术效果的介绍。
第九方面,提供一种通信装置,该通信装置例如为如前所述的第一通信装置。该通信装置包括处理器。可选的,还可以包括存储器,用于存储计算机指令。处理器和存储器相互耦合,用于实现上述第一方面或各种可能的实施方式所描述的方法。或者,第一通信装置也可以不包括存储器,存储器可以位于第一通信装置外部。可选的,第一通信装置还可以包括通信接口,用于与其他装置或设备进行通信。处理器、存储器和通信接口相互耦合,用于实现上述第一方面或各种可能的实施方式所描述的方法。例如,当处理器执行所述存储器存储的计算机指令时,使第一通信装置执行上述第一方面或任意一种可能的实施方式中的方法。示例性地,所述第一通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性的,所述通信设备为第二终端设备。
其中,如果第一通信装置为通信设备,通信接口例如通过所述通信设备中的收发器(或者,发送器和接收器)实现,例如所述收发器通过所述通信设备中的天线、馈线和编解码器等实现。或者,如果第一通信装置为设置在通信设备中的芯片,那么通信接口例如为芯片的输入/输出接口,例如输入/输出管脚等,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。
第十方面,提供一种通信装置,该通信装置例如为如前所述的第二通信装置。该通信装置包括处理器。可选的,还可以包括存储器,用于存储计算机指令。处理器和存储器相互耦合,用于实现上述第二方面或各种可能的实施方式所描述的方法。或者,第二通信装置也可以不包括存储器,存储器可以位于第二通信装置外部。可选的,第二通信装置还可以包括通信接口,用于与其他装置或设备进行通信。处理器、存储器和通信接口相互耦合,用于实现上述第二方面或各种可能的实施方式所描述的方法。例如,当处理器执行所述存储器存储的计算机指令时,使第二通信装置执行上述第二方面或任意一种可能的实施方式中的方法。示例性地,所述第二通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性的,所述通信设备为第一终端设备。
其中,如果第二通信装置为通信设备,通信接口例如通过所述通信设备中的收发器(或 者,发送器和接收器)实现,例如所述收发器通过所述通信设备中的天线、馈线和编解码器等实现。或者,如果第二通信装置为设置在通信设备中的芯片,那么通信接口例如为芯片的输入/输出接口,例如输入/输出管脚等,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。
第十一方面,提供一种通信装置,该通信装置例如为如前所述的第三通信装置。该通信装置包括处理器。可选的,还可以包括存储器,用于存储计算机指令。处理器和存储器相互耦合,用于实现上述第三方面或各种可能的实施方式所描述的方法。或者,第三通信装置也可以不包括存储器,存储器可以位于第三通信装置外部。可选的,第三通信装置还可以包括通信接口,用于与其他装置或设备进行通信。处理器、存储器和通信接口相互耦合,用于实现上述第三方面或各种可能的实施方式所描述的方法。例如,当处理器执行所述存储器存储的计算机指令时,使第三通信装置执行上述第三方面或任意一种可能的实施方式中的方法。示例性地,所述第三通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性的,所述通信设备为第一网络设备。
其中,如果第三通信装置为通信设备,通信接口例如通过所述通信设备中的收发器(或者,发送器和接收器)实现,例如所述收发器通过所述通信设备中的天线、馈线和编解码器等实现。或者,如果第三通信装置为设置在通信设备中的芯片,那么通信接口例如为芯片的输入/输出接口,例如输入/输出管脚等,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。
第十二方面,提供一种通信装置,该通信装置例如为如前所述的第四通信装置。该通信装置包括处理器。可选的,还可以包括存储器,用于存储计算机指令。处理器和存储器相互耦合,用于实现上述第四方面或各种可能的实施方式所描述的方法。或者,第四通信装置也可以不包括存储器,存储器可以位于第四通信装置外部。可选的,第四通信装置还可以包括通信接口,用于与其他装置或设备进行通信。处理器、存储器和通信接口相互耦合,用于实现上述第四方面或各种可能的实施方式所描述的方法。例如,当处理器执行所述存储器存储的计算机指令时,使第四通信装置执行上述第四方面或任意一种可能的实施方式中的方法。示例性地,所述第四通信装置为通信设备,或者为设置在通信设备中的芯片或其他部件。示例性的,所述通信设备为第二网络设备。
其中,如果第四通信装置为通信设备,通信接口例如通过所述通信设备中的收发器(或者,发送器和接收器)实现,例如所述收发器通过所述通信设备中的天线、馈线和编解码器等实现。或者,如果第四通信装置为设置在通信设备中的芯片,那么通信接口例如为芯片的输入/输出接口,例如输入/输出管脚等,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。
第十三方面,提供一种通信系统,该通信系统包括第五方面所述的通信装置或第九方面所述的通信装置。
在一种可选的实施方式中,该通信系统还包括第七方面所述的通信装置或第十一方面所述的通信装置。
在一种可选的实施方式中,该通信系统还包括第六方面所述的通信装置或第十方面所述的通信装置。
在一种可选的实施方式中,该通信系统还包括第八方面所述的通信装置或第十二方面所述的通信装置。
第十四方面,提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行上述第一方面或任意一种可能的实施方式中所述的方法。
第十五方面,提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行上述第二方面或任意一种可能的实施方式中所述的方法。
第十六方面,提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行上述第三方面或任意一种可能的实施方式中所述的方法。
第十七方面,提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行上述第四方面或任意一种可能的实施方式中所述的方法。
第十八方面,提供一种包含指令的计算机程序产品,所述计算机程序产品用于存储计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行上述第一方面或的任意一种可能的实施方式中所述的方法。
第十九方面,提供一种包含指令的计算机程序产品,所述计算机程序产品用于存储计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行上述第二方面或的任意一种可能的实施方式中所述的方法。
第二十方面,提供一种包含指令的计算机程序产品,所述计算机程序产品用于存储计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行上述第三方面或的任意一种可能的实施方式中所述的方法。
第二十一方面,提供一种包含指令的计算机程序产品,所述计算机程序产品用于存储计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行上述第四方面或的任意一种可能的实施方式中所述的方法。
在本申请实施例中,驻留在对应于不同的PLMN的网络设备下的两个终端设备可以改为驻留在同一个网络设备下,那么这两个终端设备如果要通过侧行链路进行通信,就能够正常实现HARQ等机制,提高了终端设备之间信息传输的可靠性。
附图说明
图1A和图1B为侧行链路的两种示意图;
图2A为本申请实施例的一种应用场景示意图;
图2B为本申请实施例的另一种应用场景示意图;
图3为本申请实施例提供的第一种通信方法中,第二终端设备以第一种确定方式确定变更为驻留到第一网络设备的情况的流程图;
图4为本申请实施例提供的第一种通信方法中,第二终端设备以第二种确定方式确定变更为驻留到第一网络设备的情况的流程图;
图5为本申请实施例提供的第一种通信方法中,第二终端设备以第三种确定方式确定变更为驻留到第一网络设备的情况的流程图;
图6为本申请实施例中第二网络设备对第二终端设备进行鉴权的流程图;
图7为本申请实施例提供的第二种通信方法的流程图;
图8为本申请实施例提供的第三种通信方法的流程图;
图9为本申请实施例提供的第四种通信方法的流程图;
图10为本申请实施例提供的第一种第二终端设备的示意性框图;
图11为本申请实施例提供的第一种第一终端设备的示意性框图;
图12为本申请实施例提供的第一种第一网络设备的示意性框图;
图13为本申请实施例提供的第一种第二网络设备的示意性框图;
图14为本申请实施例提供的第二种第一终端设备的示意性框图;
图15为本申请实施例提供的第二种第二终端设备的示意性框图;
图16为本申请实施例提供的第二种第一网络设备的示意性框图;
图17为本申请实施例提供的第二种第二网络设备的示意性框图;
图18为本申请实施例提供的第三种第一终端设备的示意性框图;
图19为本申请实施例提供的第三种第二终端设备的示意性框图;
图20为本申请实施例提供的通信装置的示意性框图;
图21为本申请实施例提供的通信装置的另一示意性框图;
图22为本申请实施例提供的通信装置的再一示意性框图;
图23为本申请实施例提供的通信装置的又一示意性框图。
具体实施方式
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。
以下,对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解。
1)终端设备,包括向用户提供语音和/或数据连通性的设备,具体的,包括向用户提供语音的设备,或包括向用户提供数据连通性的设备,或包括向用户提供语音和数据连通性的设备。例如可以包括具有无线连接功能的手持式设备、或连接到无线调制解调器的处理设备。该终端设备可以经无线接入网(radio access network,RAN)与核心网进行通信,与RAN交换语音或数据,或与RAN交互语音和数据。该终端设备可以包括用户设备(user equipment,UE)、无线终端设备、移动终端设备、设备到设备通信(device-to-device,D2D)终端设备、车到一切(vehicle to everything,V2X)终端设备、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)终端设备、物联网(internet of things,IoT)终端设备、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、远程站(remote station)、接入点(access point,AP)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、或用户装备(user device)等。例如,可以包括移动电话(或称为“蜂窝”电话),具有移动终端设备的计算机,便携式、袖珍式、手持式、计算机内置的移动装置等。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、等设备。还包括受限设备,例如功耗较低的设备,或存储能力有限的设备,或计算能力有限的设备等。例如包括条码、射频识别(radio frequency identification,RFID)、传感器、全球定位系统(global positioning system,GPS)、激光扫描器等信息传感设备。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备或智能穿戴式设备等,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜(例如采用了虚拟现实技术(virtual reality,VR)技术的眼镜或增强现实(augmented reality,AR)技术的眼镜等)、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能头盔、智能首饰等。
而如上介绍的各种终端设备,如果位于车辆上(例如放置在车辆内或安装在车辆内),都可以认为是车载终端设备,车载终端设备例如也称为车载单元(on-board unit,OBU)。或者,终端设备也可以是指车辆本身。
本申请实施例中,终端设备还可以包括中继(relay)。或者理解为,能够与基站进行数据通信的都可以看作终端设备。
本申请实施例中,用于实现终端设备的功能的装置可以是终端设备,也可以是能够支持终端设备实现该功能的装置,例如芯片系统,该装置可以被安装在终端设备中。本申请实施例中,芯片系统可以由一个或多个芯片构成,也可以包括芯片和其他分立器件。本申请实施例提供的技术方案中,以用于实现终端的功能的装置是终端设备为例,描述本申请实施例提供的技术方案。
2)网络设备,例如包括接入网(access network,AN)设备,例如基站(例如,接入点),可以是指接入网中在空口通过一个或多个小区与无线终端设备通信的设备,或者例如,一种车到一切(vehicle-to-everything,V2X)技术中的网络设备为路侧单元(road side unit,RSU)。基站可用于将收到的空中帧与IP分组进行相互转换,作为终端设备与接入网的其余部分之间的路由器,其中接入网的其余部分可包括IP网络。RSU可以是支持V2X应用的固定基础设施实体,可以与支持V2X应用的其他实体交换消息。网络设备还可协调对空口的属性管理。例如,网络设备可以包括长期演进(long term evolution,LTE)系统或高级长期演进(long term evolution-advanced,LTE-A)中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),或者也可以包括第五代移动通信技术(the 5th generation,5G)新空口(new radio,NR)系统(也简称为NR系统)中的下一代节点B(next generation node B,gNB)或者也可以包括云接入网(cloud radio access network,Cloud RAN)系统中的集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU),本申请实施例并不限定。
网络设备还可以包括核心网设备,核心网设备例如包括访问和移动管理功能(access and mobility management function,AMF)、安全锚功能(security anchor function,SEAF)、认证服务器功能(authentication server function,AUSF)、核心网功能(core network function,CN function)或统一数据管理(unified data management,UDM)等。
本申请实施例中,用于实现网络设备的功能的装置可以是网络设备,也可以是能够支持网络设备实现该功能的装置,例如芯片系统等。该装置可以被安装在网络设备中。在后文中,主要以用于实现网络设备的功能的装置是网络设备为例来描述本申请实施例提供的技术方案。
3)示例性地,SIM卡可以理解为终端设备接入移动网络的钥匙。为了便于描述,本申请实施例中将SIM卡以及其演进都统称为SIM卡。例如SIM卡可以是全球移动通信系统(global system for mobile communications,GSM)数字移动电话用户的身份识别卡,用于存储用户的身份识别码和密钥,并支持GSM系统对用户的鉴权;又例如,SIM卡也可以是全球用户识别卡(universal subscriber identity module,USIM),也可以称为升级SIM卡,或者,SIM卡也可以是嵌入式全球用户识别卡(embedded subscriber identity module,eSIM),等等。
4)侧行链路,是终端设备之间的传输链路。可参考图1A,基站和车辆1通过Uu接口通信,而车辆1和车辆2通过侧行链路通信。还可参考图1B,基站和手机通过Uu接口通信,而手机和VR眼镜通过侧行链路通信。
5)本申请实施例中的术语“系统”和“网络”可被互换使用。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:
a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
以及,除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的大小、内容、顺序、时序、优先级或者重要程度等。例如,第一消息和第二消息,只是为了区分不同的消息,而并不是表示这两个消息的内容、发送顺序、优先级或者重要程度等的不同。
本申请实施例可以应用于各种通信系统,例如:LTE系统、LTE-A系统、NR系统或未来可能的通信系统,具体不做限制。本申请实施例提供的技术方案可以应用于设备到设备(device to device,D2D)场景,可以是NR D2D场景也可以是LTE D2D场景等;或者,还可以应用于车到一切(vehicle to everything,V2X)场景,可以是NR V2X场景也可以是LTE V2X场景等。或者还可以应用于其他的场景或其他的通信系统,具体的不做限制。
前文介绍了本申请实施例所涉及到的一些名词概念,下面介绍本申请实施例涉及的技术特征。
目前,终端设备一般都是通过设置在终端设备内的SIM卡实现与其他设备的通信。每个SIM卡都有对应的PLMN,例如SIM卡1对应于运营商1,SIM卡2对应于运营商2。
而对于D2D的应用场景(如通过毫米波进行D2D通信的场景),可能会存在需要通信的两个终端设备属于不同的运营商的情况。例如手机需要与可穿戴设备的显示器通信,手机内安装的SIM卡例如为联通的SIM卡,而可穿戴设备的显示器内安装的SIM卡可能是移动的SIM卡。这就需要支持跨PLMN的单播通信。
为了提高信息传输的可靠性,当前在侧行链路上也引入了HARQ机制和自动重传请求(automatic repeat request,ARQ)机制,处于同一PLMN的两个终端设备在通过单播方式通信时,需要支持HARQ和ARQ传输。其中HARQ/ARQ的重传机制是指,终端设备1向终端设备2发送数据后,终端设备2可以主动向终端设备1发送对应于该数据的反馈信息,从而确定该数据是否传输成功,HARQ是用来判断MAC层数据是否需要重传,ARQ是用来判断RLC层数据是否需要重传。对于一个终端设备来说,如果在一个频段发送数据, 而在监听来自其他设备的信息时,会在多个频段进行监听,那么,即使终端设备1和终端设备2安装的SIM卡对应于不同的运营商,不同的运营商所支持的频段可能不同,但终端设备1在向终端设备2发送数据后,由于能够在多个频段监听来自其他设备的信息,因此终端设备1可能能够监听到来自终端设备2的反馈信息。
但是对于跨PLMN的场景来说,存在的问题是,由于终端设备1发送数据的频段和该反馈信息所在的频段不同,因此终端设备1无法确定该反馈信息是否是对应于该数据的反馈信息,终端设备1会认为未获取该数据的反馈信息。
可见,对应于不同的运营商的终端设备,目前无法实现HARQ机制,这也就降低了信息传输的可靠性。
鉴于此,提供本申请实施例的技术方案。在本申请实施例中,如果第二终端设备驻留在第二网络设备,那么第二终端设备可以变更为驻留到第一网络设备,第一终端设备驻留在第一网络设备。也就是说,如果两个终端设备驻留在PLMN不同的网络设备,则其中一个终端设备可以变更为驻留到另一个终端设备所在的网络设备,从而两个终端设备驻留在同一个网络设备下,那么这两个终端设备如果要通过侧行链路进行通信,就能够正常实现HARQ机制,提高了终端设备之间信息传输的可靠性。
请参见图2A,为本申请实施例的一种应用场景。在图2A中包括网络设备1、网络设备2、终端设备1和终端设备2。终端设备1驻留在网络设备1,终端设备2驻留在网络设备2。终端设备1和终端设备2可以通过侧行链路通信。其中,网络设备1例如工作在演进的通用移动通信系统陆地无线接入(evolved UMTS terrestrial radio access,E-UTRA)系统中,或者工作在NR系统中,或者工作在下一代通信系统或其他通信系统中。网络设备2例如工作在E-UTRA系统中,或者工作在NR系统中,或者工作在下一代通信系统或其他通信系统中。网络设备1和网络设备2可以工作在同一个通信系统中,或者也可以工作在不同的通信系统中。
图2A中的网络设备例如为基站。其中,网络设备在不同的系统对应不同的设备,例如在4G系统中可以对应eNB,在5G系统中对应5G中的接入网设备,例如gNB。当然本申请实施例所提供的技术方案也可以应用于未来的移动通信系统中,因此图2A中的网络设备也可以对应未来的移动通信系统中的网络设备。图2A以网络设备是基站为例,实际上参考前文的介绍,网络设备还可以是RSU等设备。
请再参考图2B,为本申请实施例的另一种应用场景。在图2B中给出了第一网络和第二网络。第一网络对应于PLMN1,第二网络对应于PLMN2,PLMN1和PLMN2是不同的PLMN。第一网络包括接入网设备1和核心网设备。第一网络包括的核心网设备,可以包括AUSF1、AMF/SEAF1、SMF1、CN功能1以及UDM1。第二网络包括接入网设备2和核心网设备。第二网络包括的核心网设备,可以包括AUSF2、AMF/SEAF2、SMF2、CN功能2以及UDM2。第一网络通过网关(gateway)1接入互联网(internet),第二网络通过网关2接入互联网。另外,图2B中还包括接入第一网络的终端设备1和接入第二网络的终端设备2。
图2B中以接入网设备是基站为例,即,接入网设备1是基站1,接入网设备2是基站2。基站在不同的系统可以对应不同的设备,例如在4G系统中可以对应eNB,在5G系统中对应5G中的接入网设备,例如gNB。当然本申请实施例所提供的技术方案也可以应用于未来的移动通信系统中,因此图2B中的基站也可以对应未来的移动通信系统中的接入 网设备。图2B以接入网设备是基站为例,实际上参考前文的介绍,接入网设备还可以是RSU等设备。
下面结合附图介绍本申请实施例提供的技术方案。
本申请实施例提供第一种通信方法,请参见图3,为该方法的流程图。在下文的介绍过程中,以该方法应用于图2B所示的网络架构为例。
为了便于介绍,在下文中,以该方法由网络设备和终端设备执行为例。因为本实施例是以应用在图2B所示的网络架构为例,因此,下文所述的第一网络设备可以包括图2B所示的网络架构中第一网络包括的基站1、AMF1/SEAF1、SMF1、CN功能1或UDM1中的一个或多个,下文所述的第二网络设备可以包括图2B所示的网络架构中第二网络包括的基站2、AUSF2、AMF/SEAF2、SMF2、CN功能2或UDM2中的一个或多个,下文所述的第一终端设备可以是图2B所示的网络架构中的终端设备1,下文所述的第二终端设备可以是图2B所示的网络架构中的终端设备2。
S301、当第二终端设备驻留在第二网络设备时,确定变更为驻留到第一网络设备。
第一网络设备和第二网络设备对应于不同的PLMN,也就是说,第一网络设备和第二网络设备属于不同的运营商。
在本申请实施例中,如果第二终端设备驻留在第二网络设备,那么第二终端设备可以变更为驻留到第一网络设备,第一终端设备驻留在第一网络设备。也就是说,如果两个终端设备驻留在PLMN不同的网络设备,则其中一个终端设备可以变更为驻留到另一个终端设备所在的网络设备,从而两个终端设备驻留在同一个网络设备下,那么这两个终端设备如果要通过侧行链路进行通信,就能够正常实现HARQ机制,提高了终端设备之间信息传输的可靠性。
第二终端设备确定变更为驻留到第一网络设备,确定方式可以有多种,下面举例介绍。
1、第二终端设备确定变更为驻留到第一网络设备的第一种确定方式。
第二网络设备向第二终端设备发送第一消息,第一消息可以指示第二终端设备驻留到第一网络设备。则第二终端设备接收来自第二网络设备的第一消息后,可以根据第一消息确定驻留到第一网络设备。
关于第二网络设备向第二终端设备发送第一消息,也可以有不同的实现方式。
实现方式一、
请参考S302、第一终端设备向第一网络设备发送第三消息,第一网络设备接收来自第一终端设备的第三消息。第三消息用于指示第二终端设备驻留到第一网络设备。
例如,第一终端设备和第二终端设备可以通过非第三代合作伙伴计划(3rd generation partnership project,3GPP)的方式建立连接,进行配对识别,或者,第一终端设备和第二终端设备也可以通过3GPP的发现过程进行配对识别。在进行配对识别后,第一终端设备确定第二终端设备所驻留的网络设备不是第一网络设备,那么第一终端设备就可以请求第一网络设备,令第二终端设备改为驻留到第一网络设备。其中,非3GPP方式例如为无线保真(wireless fidelity,Wi-Fi)、蓝牙(bluetooth)或近场通信(near field communication,NFC)等。
第三消息可以复用目前已有的消息,例如可以第三消息可以包括第一信息,第一信息就用于指示第二终端设备驻留到第一网络设备。第一信息可以承载在第三消息的已有的字段中,例如可以利用第三消息的预留字段承载第一信息,或者利用第三消息的字段中的预 留比特承载第一信息。或者也可以在第三消息中增加新的字段,该字段用于承载第一信息。
或者,第三消息也可以是本申请实施例新定义的消息。
S303、第一网络设备向第二网络设备发送第二消息,第二网络设备接收来自第一网络设备的第二消息。第二消息用于指示第二终端设备驻留到第一网络设备,或用于请求验证第二终端设备。
例如,第一网络设备可以包括基站1和AMF1/SEAF1,那么S302中,第一终端设备实际可以是向第一网络设备包括的基站1发送第三消息,而基站1可以接收来自第一终端设备的第三消息。而基站1接收第三消息后,可以将第三消息再发送给AMF1/SEAF1,则AMF1/SEAF1接收来自基站1的第三消息。
关于第二消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
在S303中,可以是AMF1/SEAF1向第二网络设备发送第二消息,第二网络设备接收来自AMF1/SEAF1的第二消息。
例如第二网络设备包括AMF2/SEAF2、AUSF2和UDM2,则在S303中,可以是AMF1/SEAF1向第二网络设备包括AMF2/SEAF2发送第二消息,AMF2/SEAF2接收来自AMF1/SEAF1的第二消息。
例如,S302中的第三消息包括第二终端设备的标识,在S303中,第二消息也可以包括第二终端设备的标识,表明第二消息与第二终端设备相关。第二网络设备接收第二消息后,就可以对第二终端设备进行鉴权。其中,第一终端设备发送给第一网络设备的第三消息包括第二终端设备的标识,例如第一终端设备是在与第二终端设备进行配对识别后,获取的第二终端设备的标识。第二终端设备的标识例如为第二终端设备的ID,或者也可以是能够指示第二终端设备的其他信息。
S304、第二网络设备对第二终端设备进行鉴权。
例如,AMF2/SEAF2接收来自AMF1/SEAF1的第二消息后,就可以触发鉴权流程,以对第二终端设备进行鉴权。第二网络设备对第二终端设备进行鉴权,可以采用多种方式,下面举例介绍鉴权方式。
1、第一种鉴权方式。
例如,第二网络设备在接收第二消息后,就可以获得第二消息所包括的第二终端设备的标识。由于第二终端设备驻留在第二网络设备,而第二终端设备在注册到第二网络设备时可能第二网络设备已对第二终端设备进行过鉴权,因此第二网络设备可以根据第二终端设备的标识进行查询,以确定是否存储有第二终端设备的鉴权信息,第二终端设备的鉴权信息可以指示第二终端设备鉴权通过或鉴权失败。如果第二网络设备确定存储了第二终端设备的鉴权信息,第二网络设备相当于就完成了S304所述的对第二终端设备的鉴权。则第二网络设备可以将第二终端设备的鉴权信息发送给第一网络设备,以使得第一网络设备可以明确第二终端设备是鉴权通过还是鉴权失败。
或者,如果第二网络设备未存储第二终端设备的鉴权信息,则第二网络设备可以对第二终端设备进行鉴权,以得到鉴权结果。
或者,即使第二网络设备存储了第二终端设备的鉴权信息,但考虑到第二终端设备的鉴权过程可能是很早之前完成的,为了保证鉴权结果的可靠性,第二网络设备可以再次对第二终端设备进行鉴权,以重新得到鉴权结果。
如果第二网络设备需要得到第二终端设备的鉴权结果,即,第二网络设备不根据存储的鉴权信息确定第二终端设备是否鉴权通过,那么第二网络设备所采用的鉴权方式还可以是下面所介绍的第二种鉴权方式。
2、第二种鉴权方式。
例如,AMF2/SEAF2向AUSF2发送第一请求,AUSF2接收来自AMF2/SEAF2的第一请求,第一请求可以用于请求对第二终端设备进行鉴权。例如第一请求可以包括第二终端设备的标识,以表明是对第二终端设备进行鉴权。可选的,第一请求还可以包括第二终端设备即将进行的侧行链路的信息等,例如第二终端设备即将进行的侧行链路的信息可以是第一终端设备在S302中通过第三消息发送给AMF1/SEAF1,AMF1/SEAF1在S303中通过第二消息发送给AMF2/SEAF2的。例如第一终端设备是在与第二终端设备进行配对识别后,获取的第二终端设备即将进行的侧行链路的信息。可以用于对第二终端设备进行鉴权。
AUSF2接收第一请求后,可以向UDM2发送第二请求,UDM2接收来自AUSF2的第二请求。第二请求可以用于请求获得用于对第二终端设备进行鉴权的数据,如针对侧行链路信息的鉴权数据。
UDM2在接收第二请求后,可以生成第二终端设备的验证信息。所述的第二终端设备的验证信息可以用于对第二终端设备进行鉴权。
在生成鉴权数据后,UDM2可以向AUSF2发送第二请求的响应消息,AUSF2接收来自UDM2的第二请求的响应消息。第二请求的响应消息可以包括所述的第二终端设备的验证信息。
AUSF2接收第二请求的响应消息后,可以向AMF2/SEAF2发送第一请求的响应消息,AMF2/SEAF2接收来自AUSF2的第一请求的响应消息。第一请求的响应消息例如用于请求获得第二终端设备的验证信息。
AMF2/SEAF2接收第一请求的响应消息后,可以向第二终端设备发送第三请求,第二终端设备接收来自AMF2/SEAF2的第三请求。第三请求可以用于请求获得第二终端设备的验证信息。
第二终端设备接收第三请求后,可以计算鉴权回复。所述的鉴权回复例如包括第二终端设备的验证信息,前面的步骤中所述的第二终端设备的验证信息,是UDM2得到的,而这里所述的第二终端设备的验证信息,是第二终端设备确定的用于对第二终端设备进行鉴权的数据。
在得鉴权回复后,第二终端设备可以向AMF2/SEAF2发送鉴权回复,AMF2/SEAF2接收来自第二终端设备的鉴权回复。之后,AMF2/SEAF2可以将该鉴权回复再发送给AUSF2,AUSF2接收来自AMF2/SEAF2的该鉴权回复。
在接收该鉴权回复后,AUSF2也就得到了来自第二终端设备的第二终端设备的验证信息。而AUSF2之前已经得到了来自UDM2的第二终端设备的验证信息,AUSF2可以根据这两份验证信息进行验证,以确定第二终端设备是否鉴权通过。例如,AUSF2将这两份验证信息进行比对,如果二者一致,则确定第二终端设备鉴权通过,如果二者不一致,确定第二终端设备鉴权失败。
AUSF2将鉴权结果发送给AMF2/SEAF2,AMF2/SEAF2接收来自AUSF2的鉴权结果。鉴权结果可以指示第二终端设备鉴权通过或鉴权失败,或者,指示第二终端设备合法或不合法(如果第二终端设备鉴权通过,可以认为第二终端设备合法,如果第二终端设备鉴权 失败,可以认为第二终端设备不合法)。其中,如果第二终端设备鉴权通过或第二终端设备合法,则AUSF2还可以将第二终端设备的验证信息发送给AMF2/SEAF2。
通过如上的过程,第二网络设备就完成了对第二终端设备的鉴权。
当然,第二网络设备对第二终端设备进行鉴权的方式不限于如上介绍的这两种,本申请实施例不限制具体的鉴权方式。
S305、第二网络设备向第一网络设备发送第五消息,第一网络设备接收来自第二网络设备的第五消息。
例如,第五消息包括第二终端设备的验证信息。第二终端设备的验证信息可以用于对第二终端设备进行验证,例如可以用于验证第二终端设备的身份是否合法等。
关于第五消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
例如,可以是第二网络设备包括的AMF2/SEAF2向第一网络设备包括的AMF1/SEAF1发送第五消息,AMF1/SEAF1接收来自AMF2/SEAF2的第五消息。第五消息中包括的第二终端设备的验证信息,可以是一串随机数,也可以是根据第二终端设备在第二网络里的ID生成的一串数。
S306、第二网络设备向第二终端设备发送第一消息,第一消息可以指示第二终端设备驻留到第一网络设备。第二终端设备接收来自第二网络设备的第一消息后,就可以确定驻留到第一网络设备。
第一消息可以复用目前已有的消息,例如第一消息可以是RRC连接重配置消息(RRC connection reconfiguration)等。例如可以第一消息可以包括第二信息,第二信息就用于指示第二终端设备驻留到第一网络设备。第二信息可以承载在第一消息的已有的字段中,例如可以利用第一消息的预留字段承载第一信息,或者利用第一消息的字段中的预留比特承载第二信息。或者也可以在第一消息中增加新的字段,该字段用于承载第二信息。
或者,第一消息也可以是本申请实施例新定义的消息。
作为一种可选的实施方式,S306中的第一消息可以包括第二终端设备的验证信息,用于第二终端设备在第一网络设备中的验证。关于第一消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
例如,可以是第二网络设备包括的AMF2/SEAF2向第二终端设备发送第一消息,第二终端设备接收来自AMF2/SEAF2的第一消息。
实现方式二、
S307、第二终端设备向第二网络设备发送请求消息,第二网络设备接收来自第二终端设备的请求消息。该请求消息用于请求驻留到第一网络设备。该请求消息可以携带要求驻留到第一网络设备的原因,如该请求消息可以携带第二终端设备将进行的侧行链路业务信息。
例如,第一终端设备和第二终端设备可以通过非3GPP的方式建立连接,进行配对识别,或者,第一终端设备和第二终端设备也可以通过3GPP的发现过程进行配对识别。在进行配对识别后,第二终端设备确定第二终端设备所驻留的网络设备和第一终端设备所驻留的网络设备不是同一网络设备,那么第二终端设备可以请求第二网络设备,以改为驻留到第一网络设备。或者,第二终端设备在确定第二终端设备所驻留的网络设备和第一终端 设备所驻留的网络设备不是同一网络设备,且确定两个网络设备的PLMN不同时,再请求第二网络设备,以改为驻留到第一网络设备。例如第二终端设备可以从第一终端设备获得第一终端设备的PLMN的信息。其中,非3GPP方式例如为Wi-Fi、蓝牙或NFC等。
关于请求消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
例如,第二终端设备可以向第二网络设备包括的AMF2/SEAF2发送该请求消息,AMF2/SEAF2接收来自第二终端设备的请求消息。
S308、第二网络设备向第一网络设备发送第三消息,第一网络设备接收来自第二网络设备的第三消息。第三消息可以指示第二终端设备驻留到第一网络设备,或指示驻留在第二网络设备的第二终端设备请求驻留到第一网络设备,或第三消息也可用于请求第一网络设备接收第二终端设备。
关于第三消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中的介绍。
作为一种可选的实施方式,S308中的第三消息可以包括第二终端设备的验证信息,用于对第二终端设备进行验证。第三消息中的验证信息,可以是一串随机数,也可以是根据第二终端设备在第二网络里的ID生成的一串数。
例如,可以是第二网络设备中的AMF2/SEAF2向第一网络设备中的AMF1/SEAF1发送第三消息,AMF1/SEAF1接收来自AMF2/SEAF2的第三消息。
S309、第一网络设备向第二网络设备发送第二消息,第二网络设备接收来自第一网络设备的第二消息。第二消息可以指示第二终端设备驻留到第一网络设备,或第二消息指示第一网络设备同意接收第二终端设备。
关于第二消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
例如,可以是AMF1/SEAF1向AMF2/SEAF2发送第二消息,AMF2/SEAF2接收来自AMF1/SEAF1的第二消息。第二消息可以包含验证消息,用以后续第二终端设备的在第一网络下的身份验证。第二消息中的验证信息,可以是一串随机数,也可以是根据第二终端设备在第二网络里的ID生成的一串数。
S310、第二网络设备向第二终端设备发送第一消息,第一消息可以指示第二终端设备驻留到第一网络设备。第二终端设备接收来自第二网络设备的第一消息后,就可以确定驻留到第一网络设备。
作为一种可选的实施方式,S310中的第一消息可以包括第二终端设备的验证信息,用于第二终端设备在第一网络中的验证。关于第一消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S306中对于第一消息的介绍。
例如,可以是AMF2/SEAF2向第二终端设备发送第一消息,第二终端设备接收来自AMF2/SEAF2的第一消息。
2、第二终端设备确定变更为驻留到第一网络设备的第二种确定方式。
第一终端设备向第二终端设备发送第一消息,第二终端设备接收来自第一终端设备的第一消息,第一消息可以指示第二终端设备驻留到第一网络设备。请参考图4,关于这种确定方式的一种场景介绍如下。
S401、第一终端设备向第一网络设备发送第三消息,第一网络设备接收来自第一终端 设备的第三消息。第三消息用于指示第二终端设备驻留到第一网络设备。
关于S401的更多内容,可参考对于S302的介绍。
S402、第一网络设备向第二网络设备发送用于请求验证第二终端设备的消息,或发送指示第二终端设备驻留第一网络设备的消息,或发送用于请求第二终端设备驻留第一网络设备的消息,第二网络设备接收来自第一网络设备的该消息。例如该消息为第四消息。
关于S402的更多内容,可参考对于S303的介绍。
S403、第二网络设备对第二终端设备进行鉴权。
关于S403的更多内容,可参考对于S304的介绍。
S404、第二网络设备向第一网络设备发送第五消息,第一网络设备接收来自第二网络设备的第五消息。
例如,第五消息包括第二终端设备的验证信息。第二终端设备的验证信息可以用于对第二终端设备进行验证,例如可以验证第二终端设备的身份是否合法等。
关于S404的更多内容,可参考对于S305的介绍。
S405、第一网络设备向第一终端设备发送第二消息,第一终端设备接收来自第一网络设备的第二消息。第二消息可以指示第二终端设备驻留到第一网络设备。
关于第二消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
例如,第一网络设备包括的AMF1/SEAF1可以向基站1发送第二终端设备的验证信息,基站1接收来自AMF1/SEAF1的第二终端设备的验证信息。且基站1可以确定第二消息,并将第二消息发送给第一终端设备,第一终端设备接收来自基站1的第二消息。
S406、第一终端设备向第二终端设备发送第一消息,第二终端设备接收来自第一终端设备的第一消息。第一消息可以指示第二终端设备驻留到第一网络设备。
3、第二终端设备确定变更为驻留到第一网络设备的第三种确定方式。
第一网络设备向第二终端设备发送第一消息,第二终端设备接收来自第一网络设备的第一消息,第一消息可以指示第二终端设备驻留到第一网络设备。请参考图5,关于这种确定方式的一种场景介绍如下。
S501、第二终端设备向第一网络设备发送第三消息,第一网络设备接收来自第二终端设备的第三消息。第三消息可以用于请求驻留到第一网络设备。
例如,第二终端设备认为需要接入第一网络设备下的小区(例如,第二终端设备在需要通过侧行链路与第一终端设备通信之前,或者第二终端设备在通过侧行链路与第一终端设备进行通信的过程中,第二终端设备确定第二终端设备所驻留的网络设备不是第一终端设备所在的网络设备,那么第二终端设备可以认为需要接入第一网络设备下的小区),则第二终端设备可以主动请求接入第一网络设备。
关于第三消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中的介绍。
例如,第二终端设备可以向基站1发送第三消息,基站1接收来自第二终端设备的第三消息。
S502、第一网络设备对第二终端设备进行鉴权。
基站1和AMF1/SEAF1对第二终端设备进行鉴权时,确定第二终端设备是驻留在第二网络设备的终端设备。
S503、第一网络设备向第二网络设备发送第四消息,第二网络设备接收来自第一网络设备的第四消息。第四消息可以用于请求获得第二终端设备的验证信息,或用于请求验证第二终端设备。
关于第四消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
例如,AMF1/SEAF1可以向AMF2/SEAF2发送第四消息,AMF2/SEAF2接收来自AMF1/SEAF1的第四消息。
S504、第二网络设备对第二终端设备进行鉴权。在图5中,该鉴权过程不包括与第一终端设备的交互,第二网络设备通过第一网络设备透传鉴权消息,与第二终端设备进行交互。
在S504中,第二网络设备要对第二终端设备进行鉴权,可参考如S304所介绍的鉴权方式,或者第二网络设备也可以采用其他方式对第二终端设备进行鉴权。
S505、第二网络设备向第一网络设备发送第五消息,第一网络设备接收来自第二网络设备的第五消息。第五消息可以指示第二终端设备鉴权成功或失败。可选的,第五消息还可以包括第二终端设备的验证信息。第五消息中的验证信息,可以是一串随机数,也可以是根据第二终端设备在第二网络里的ID生成的一串数。
关于第五消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
例如,AMF2/SEAF2可以向AMF1/SEAF1发送第五消息,AMF1/SEAF1接收来自AMF2/SEAF2的第五消息。
S506、第一网络设备确定第二终端设备鉴权成功。
本申请实施例中,以对第二终端设备鉴权成功为例。
S507、第一网络设备向第二终端设备发送第一消息,第二终端设备接收来自第一网络设备的第一消息,第一消息可以指示第二终端设备驻留到第一网络设备。关于第一消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S302中对于第三消息的介绍。
关于第一消息的实现形式,例如可以复用已有的消息,或者也可以是本申请实施例新定义的消息等,可参考S306中对于第一消息的介绍。
如果第二终端设备采用如上所述的第一种确定方式或第二种确定方式确定变更为驻留到第一网络设备,那么在第二终端设备确定变更为驻留到第一网络设备后,还可以包括相应的步骤,下文进行介绍。
S311、第二终端设备进行小区重选,以接入第一网络设备。
例如,第二终端设备先断开与第二网络设备的RRC连接,进入RRC空闲(idle)态。之后,处于RRC空闲态的第二终端设备可以根据对应于第一网络设备的信息进行小区重选,以接入第一网络设备。
作为一种可选的方式,在第二终端设备接收的第一消息中可以包括第一网络设备的标识,例如第一网络设备的ID、第一网络的PLMN ID等,第二终端设备在进行小区重选时,可以确定重选到第一网络设备下的小区。或者,第一消息可以不包括第一网络设备的标识,但第一终端设备和第二终端设备可能已进行过通信,例如可以通过蓝牙或Wi-Fi等方式通信,第一终端设备可以将第一网络设备的标识发送给第二终端设备,从而第二终端设备可 以得到来自第一终端设备的第一网络设备的标识。
S312、第二终端设备与第一网络设备建立RRC连接。
例如,第二终端设备可以通过随机接入过程与第一网络设备建立RRC连接。例如,第二终端设备可以与基站1建立RRC连接。对于随机接入过程这里不多赘述。其中,S312中所述的第二终端设备与第一网络设备建立RRC连接,可以是指新建RRC连接,或者也可以是指重建RRC连接。
在建立RRC连接后,第二终端设备可以进行注册过程,以注册到第一网络设备。在注册过程中,第一网络设备还可以对第二终端设备进行相应的鉴权,以确定第二终端设备的身份是否合法。为了了解这一过程,下面请参考图6,介绍目前终端设备在注册过程中的鉴权,以第二终端设备注册到第一网络设备为例。其中,第一网络设备包括基站1、AMF1/SEAF1、AUSF1和UDM1。鉴权过程可以还包括第一网络设备针对第二终端设备即将进行的侧行链路的业务识别,以针对特定业务产生特定的鉴权信息,如确定第二终端设备需要进行在侧行链路上进行的VR/AR服务,则确定在第一网络设备下的鉴权信息。
S601、第二终端设备与基站1建立RRC连接。
第二终端设备可以根据第二终端设备所设置的SIM卡,选择该SIM卡对应的PLMN下的小区。如果第二终端设备不知道具体需要接入哪个网络设备,则第二终端设备可以进行小区重选,以选择对应的小区。而对于本申请实施例来说,第二终端设备已经获得了第一网络设备的标识,则第二终端设备可以根据第一网络设备的标识进行小区重选,以重选到第一网络设备下的小区,也就是重选到基站1下的小区。如果将该注册流程应用于本申请实施例,那么S601与S312可以是同一步骤。
S602、第二终端设备向AMF1/SEAF1发送注册请求,AMF1/SEAF1接收来自第二终端设备的注册请求,注册请求中可以携带第二终端设备即将进行的侧行链路信息,如业务信息。
S603、AMF1/SEAF1向AUSF1发送用户鉴权请求,AUSF1接收来自AMF1/SEAF1的用户鉴权请求。所述的用户鉴权请求用于请求对第二终端设备进行鉴权。
用户鉴权请求中可以携带第二终端设备即将进行的侧行链路的信息。如果将该流程应用于本申请实施例,那么用户鉴权请求所携带的侧行链路的信息,可以是第一终端设备在S302中通过第三消息发送给第一网络设备,第一网络设备在S303中通过第二消息发送给第二网络设备的。例如第一终端设备是在与第二终端设备进行配对识别后,获取的第二终端设备即将进行的侧行链路的信息。可以用于对第二终端设备进行鉴权。
S604、AUSF1向UDM1发送获取用户鉴权数据请求,UDM1接收来自AUSF1的获取用户鉴权数据请求。
所述的获取用户鉴权数据请求,用于请求获得用于对第二终端设备进行鉴权的数据,如针对侧行链路信息的鉴权数据。
S605、UDM1生成鉴权数据。所述的鉴权数据可以用于对第二终端设备进行鉴权。所述的鉴权数据,也可以称为第二终端设备的验证信息。
S606、UDM1向AUSF1发送获取用户鉴权数据回复,AUSF1接收来自UDM1的获取用户鉴权数据回复。
所述的获取用户鉴权数据回复可以携带所述的鉴权数据。
S607、AUSF1向AMF1/SEAF1发送用户鉴权响应,AMF1/SEAF1接收来自AUSF1 的用户鉴权响应。
S608、AMF1/SEAF1向第二终端设备发送鉴权请求,第二终端设备接收来自AMF1/SEAF1的鉴权请求。
S609、第二终端设备计算鉴权回复。所述的鉴权回复,例如包括用于对第二终端设备进行鉴权的鉴权数据。S609中的鉴权数据是第二终端设备得到的,而S605中的鉴权数据是UDM1得到的。
S610、第二终端设备向AMF1/SEAF1发送鉴权回复,AMF1/SEAF1接收来自第二终端设备的鉴权回复。
S611、AMF1/SEAF1将该鉴权回复发送给AUSF1,AUSF1接收来自AMF1/SEAF1的该鉴权回复。
S612、AUSF1验证第二终端设备是否鉴权通过。
例如,AUSF1将该鉴权回复包括的鉴权数据与来自UDM1的鉴权数据进行比对,如果二者一致,则确定第二终端设备鉴权通过,如果二者不一致,确定第二终端设备鉴权失败。
S613、AUSF2将鉴权结果发送给AMF1/SEAF1,AMF1/SEAF1接收来自AUSF1的鉴权结果。鉴权结果可以指示第二终端设备鉴权通过或鉴权失败,或者,指示第二终端设备合法或不合法(如果第二终端设备鉴权通过,则可以认为第二终端设备合法,如果第二终端设备鉴权失败,可以认为第二终端设备不合法)。
S614、AMF1/SEAF1将鉴权结果发送给第二终端设备,第二终端设备接收来自AMF1/SEAF1的鉴权结果。从而第二终端设备就可以确定第二终端设备究竟是否鉴权通过。其中S614是可选的步骤。
图6所示的是目前终端设备进行注册时的鉴权过程,在本申请实施例中,第二终端设备注册到第一网络设备,注册过程中的鉴权可以参考图6所示的实施例。
S313、第一网络设备对第二终端设备进行验证。如果验证通过,则执行S314,如果验证失败,则执行S315。
第二终端设备可以将第二终端设备的验证信息发送给第一网络设备,第二终端设备所发送的第二终端设备的验证信息,是第一消息所包括的。而第一网络设备也从第二网络设备获得了第二终端设备的验证信息(例如来自第二网络设备的第五消息或第三消息可以包括第二终端设备的验证信息),则第一网络设备可以根据来自第二终端设备的验证信息和来自第二网络设备的验证信息进行验证。例如第一网络设备可以将来自第二终端设备的验证信息和来自第二网络设备的验证信息进行比对,确定二者是否一致,如果二者一致,则确定第二终端设备验证通过,而如果二者不一致,则确定第二终端设备验证失败。第二终端设备的验证信息,可以是一串随机数,也可以是根据第二终端设备在第二网络里的ID生成的一串数。
例如,第二终端设备可以通过建立RRC连接过程中的任意一条消息将第二终端设备的验证信息发送给第一网络设备,例如RRC建立请求消息,或RRC建立完成消息等。或者,第二终端设备也可以通过RRC连接建立完成后的任意一条消息将第二终端设备的验证信息发送给第一网络设备,或者,第二终端设备也可以通过本申请实施例新定义的消息将第二终端设备的验证信息发送给第一网络设备,如果是新定义的消息,那么对该消息的发生时机不做限制。
在图6所示的实施例中,第二终端设备是通过S610中的鉴权回复将第二终端设备的验证信息发送给AMF1/SEAF1,AMF1/SEAF1将该鉴权回复发送给AUSF1,由AUSF1对第二终端设备进行验证。而在本申请实施例中,例如第二终端设备是将第二终端设备的验证信息发送给基站1,基站1接收第二终端设备的验证信息后,可以将第二终端设备的验证信息发送给AMF1/SEAF1,由AMF1/SEAF1来对第二终端设备进行验证。或者在本申请实施例中,AMF1/SEAF1也可以再将第二终端设备的验证信息发送给AUSF1,由AUSF1对第二终端设备进行验证。如果是这种情况,那么在本申请实施例中,第二终端设备也可以通过S610中的鉴权回复将第二终端设备的验证信息发送给AMF1/SEAF1,AMF1/SEAF1将该鉴权回复发送给AUSF1,由AUSF1对第二终端设备进行验证,即,在执行S612时,实际可执行S313。但不同的是,在S313中,第一网络设备是将来自第二终端设备的验证信息和来自第二网络设备的验证信息进行比对,即,第一网络设备所比对的两份验证信息,一份来自第二终端设备,而另一份来自第二网络设备(而并不是第一网络设备自行确定的)。
S314、第一终端设备和第二终端设备在第一网络设备下建立侧行连接。
在本申请实施例中,如果两个终端设备驻留在PLMN不同的网络设备,则其中一个终端设备可以变更为驻留到另一个终端设备所在的网络设备,从而两个终端设备驻留在同一个网络设备下,那么这两个终端设备再通过侧行链路进行通信,就能够正常实现HARQ机制,提高了终端设备之间信息传输的可靠性。
S315、第一网络设备向第二终端设备发送拒绝消息,第二终端设备接收来自第一网络设备的拒绝消息。拒绝消息用于指示拒绝第二终端设备接入。
如果第一网络设备对第二终端设备验证失败,则第二终端设备可能是不合法的,第一网络设备可以拒绝第二终端设备接入,以保证网络安全。例如,AMF1/SEAF1对第二终端设备验证失败,AMF1/SEAF1可以向基站1发送用于指示第二终端设备验证失败的信息。基站1接收来自AMF1/SEAF1的该信息后,就可以向第二终端设备发送拒绝消息,第二终端设备可以接收来自基站1的拒绝消息。
S311~S315,介绍的是如果第二终端设备采用如上所述的第一种确定方式或第二种确定方式确定变更为驻留到第一网络设备,则在第二终端设备确定变更为驻留到第一网络设备后,还可以包括的相应的步骤。如果第二终端设备采用如上所述的第三种确定方式确定变更为驻留到第一网络设备,则在第二终端设备确定变更为驻留到第一网络设备后,也可以包括的相应的步骤,下面进行介绍。
例如,第二终端设备与第一网络设备建立RRC连接。例如,第二终端设备可以通过随机接入过程与第一网络设备建立RRC连接。例如,第二终端设备可以与基站1建立RRC连接。对于随机接入过程这里不多赘述。
第一终端设备和第二终端设备在第一网络设备下建立侧行连接。在第三种确定方式下,第一网络设备已经确定了第二终端设备鉴权成功,因此第一网络设备无需再对第二终端设备进行验证,第二终端设备在随机接入成功后,就可以在第一网络设备下进行通信。
在本申请实施例中,如果两个终端设备驻留在PLMN不同的网络设备,则其中一个终端设备可以变更为驻留到另一个终端设备所在的网络设备,从而两个终端设备驻留在同一个网络设备下,那么这两个终端设备再通过侧行链路进行通信,就能够正常实现HARQ机制,提高了终端设备之间信息传输的可靠性。
为了解决相同的技术问题,本申请实施例提供第二种通信方法,请参见图7,为该方 法的流程图。在下文的介绍过程中,以该方法应用于图2A所示的网络架构为例。
为了便于介绍,在下文中,以该方法由网络设备和终端设备执行为例。因为本实施例是以应用在图2A所示的网络架构为例,因此,下文所述的第一网络设备可以是图2A所示的网络架构中的网络设备1,下文所述的第二网络设备可以是图2A所示的网络架构中的网络设备2,下文所述的第一终端设备可以是图2A所示的网络架构中的终端设备1,下文所述的第二终端设备可以是图2A所示的网络架构中的终端设备2。
S71、第一网络设备确定用于第一终端设备发送数据的发送资源,以及用于第一终端设备接收所述发送资源所发送的数据的反馈信息的反馈资源。
发送资源可以包括第一资源,反馈资源包括第二资源;或者,发送资源包括第一资源池,反馈资源包括第二资源池。
对于第一终端设备来说,要通过侧行链路与第二终端设备通信,通信所需的发送资源可以是第一网络设备分配的。第一网络设备为第一终端设备分配发送资源,有两种分配方式。一种分配方式为,第一终端设备每次发送数据所需的资源都由第一网络设备调度,在这种情况下,第一网络设备所确定的发送资源可以是第一资源。另一种分配方式为,第一网络设备可以为第一终端设备配置资源池,例如第一网络设备可以通过广播方式发送该资源池的信息,那么第一网络设备覆盖下的全部终端设备或部分终端设备都可以使用该资源池发送数据。在这种情况下,第一网络设备所确定的发送资源可以是第一资源池,第一资源池包括一个或多个用于发送数据的资源。其中,第一终端设备驻留在第一网络设备,第二终端设备驻留在第二网络设备,第一网络设备和第二网络设备对应于不同的PLMN。
要实现HARQ机制,则第一终端设备向第二终端设备发送数据后,第二终端设备要向第一终端设备发送对应于该数据的反馈信息,例如反馈信息为肯定应答(ACK)或否定应答(NACK),ACK表示第二终端设备接收数据成功,NACK表示第二终端设备接收数据失败。第二终端设备向第一终端设备发送对应于该数据的反馈信息,也需要使用相应的资源来发送。在本申请实施例中,第一网络设备除了确定发送资源外,用于接收通过该发送资源所发送的数据的反馈信息的资源(本文将其称为反馈资源),也可以由第一网络设备来确定。
S72、第一网络设备发送第一消息,第一终端设备接收来自第一网络设备的第一消息。第一消息用于指示所述发送资源,以及用于指示所述反馈资源。
例如,第一消息可以指示反馈资源,第一终端设备接收第一消息后,可以确定该反馈资源是用于接收通过所述发送资源所发送的数据的反馈信息。或者,第一消息除了指示该反馈资源外,还可以指示该反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
例如,所述的发送资源是第一资源池,所述的反馈资源是第二资源池,那么第一消息可以是广播消息,接收第一消息的终端设备都可以使用第一资源池来发送数据,以及可以使用第二资源池来接收反馈信息,第一终端设备只是这多个终端设备中的一个。或者,所述的发送资源是第一资源,所述的反馈资源是第二资源,那么第一消息可以是单播消息,该第一资源和第二资源是配置给第一终端设备的。
或者,第一网络设备也可以通过两条消息来分别指示发送资源和反馈资源,例如,这两条消息可以同时发送,或者也可以分时发送。
或者,如果所述的发送资源是第一资源池,所述的反馈资源是第二资源池,那么还有一种可能的方式是,第一资源池和第二资源池可以预配置在终端设备中,或者也可以通过 协议规定等。如果是这种情况,则第一网络设备也可以不必发送第一消息。
在本申请实施例中,第一网络设备除了确定发送资源外,还可以确定用于接收通过该发送资源所发送的数据的反馈信息的反馈资源。例如,要实现HARQ机制,则第一终端设备向第二终端设备发送数据后,第二终端设备要向第一终端设备发送对应于该数据的反馈信息,例如反馈信息为ACK或NACK。第二终端设备向第一终端设备发送对应于该数据的反馈信息,也需要使用相应的资源来发送。如果由第二网络设备确定用于发送该反馈信息的资源,则第一终端设备可能无法识别该反馈信息究竟是不是对应于该数据的反馈信息,从而导致反馈实际上失败。因此在本申请实施例中,可以由第一网络设备来确定反馈资源,且第一网络设备可以将所确定的发送资源和反馈资源均告知第一终端设备,第一终端设备可以利用该反馈资源来监听反馈信息,从而第一终端设备就可以确定该反馈信息对应于通过该发送资源所发送的数据,从而保证了HARQ机制的正常进行,提高了传输的可靠性。
S73、第一网络设备向第二网络设备发送第四消息,第四消息用于指示所述发送资源和所述反馈资源。第二网络设备接收来自第一网络设备的第四消息,根据第四消息就可以确定所述发送资源和所述反馈资源。
第一网络设备在确定发送资源和反馈资源后,可以将发送资源和反馈资源告知第二网络设备。
S74、第一终端设备根据第一消息确定第一资源。
第一终端设备在要向第二终端设备发送数据时,可以确定第一资源。
如果第一消息指示的发送资源是第一资源,则第一终端设备可以确定第一资源。或者,如果第一消息指示的发送资源是第一资源池,则第一终端设备可以从第一资源池中选择用于发送数据的第一资源。
其中,S73可以发生在S74之前,或者,S73可以发生在S74之后,或者,S73和S74可以同时发生。
S75、第二网络设备发送第三消息,第二终端设备接收来自第二网络设备的第三消息。第三消息用于指示所述反馈资源。
例如,第三消息可以指示反馈资源,第二终端设备接收第三消息后,可以确定该反馈资源是用于接收通过所述发送资源所发送的数据的反馈信息。或者,第三消息除了指示该反馈资源外,还可以指示该反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
例如,所述的反馈资源是第二资源池,那么第三消息可以是广播消息,接收第三消息的终端设备都可以使用第二资源池来发送对应于第一资源池的反馈信息,第二终端设备只是这多个终端设备中的一个。或者,所述的反馈资源是第二资源,那么第三消息可以是单播消息,该第二资源是配置给第二终端设备的。
S75可以发生在S73之后。另外,S75可以发生在S74之前,或者,S75可以发生在S74之后,或者,S75和S74可以同时发生。
S76、第二终端设备根据第三消息确定第二资源。
第二终端设备在要接收来自第一终端设备的数据时,可以确定第二资源。
如果第三消息指示的发送资源是第二资源,则第二终端设备可以确定第二资源。或者,如果第三消息指示的发送资源是第二资源池,则第二终端设备可以从第二资源池中选择用于发送反馈信息的第二资源。
S77、第一终端设备在第一资源上向第二终端设备发送数据,第二终端设备通过第一 资源接收来自第一终端设备的该数据。
S78、第二终端设备在第二资源上向第一终端设备发送反馈信息,第一终端设备在第二资源上接收来自第二终端设备的反馈信息。该反馈信息是对应于S77中的数据的。该反馈信息例如为ACK或NACK。
第二终端设备确定了反馈资源,则第二终端设备接收来自第一终端设备的数据后,就会通过反馈资源向第一终端设备发送该数据的反馈信息。如果反馈资源是第二资源,则第二终端设备在第二资源上向第一终端设备发送该数据的反馈信息,或者,如果反馈资源是第二资源池,则第二终端设备可以从第二资源池中选择资源来发送该反馈信息,例如第二终端设备选择了第二资源来发送该反馈信息。
而第一终端设备也根据第一消息确定了与发送资源对应的反馈资源。如果反馈资源是第二资源,则第一终端设备可以在第二资源上监听该数据的反馈信息,只要在第二资源上接收了反馈信息,第一终端设备就可以确定该反馈信息是对应于该数据的反馈信息。或者,如果反馈资源是第二资源池,则第一终端设备可以在第二资源池所包括的全部资源或部分资源上监听该数据的反馈信息,由于第二终端设备是在第二资源上发送的反馈信息,因此第一终端设备可能会在第二资源上接收该反馈信息。只要是在第二资源池所包括的资源上接收的反馈信息,第一终端设备都可以确定是对应于该数据的反馈信息。
或者,还有一种方式。如果发送资源是第一资源池,反馈资源是第二资源池,那么第一终端设备除了可以从第一资源池中选择用于发送数据的第一资源外,还可以从第二资源池中选择用于发送该数据的反馈信息的第二资源。第一终端设备可以向第二终端设备发送第一指示信息,第一指示信息可以指示第二资源,或者,第一指示信息指示第二资源,以及指示第二资源用于发送通过第一资源所接收的数据的反馈信息。第二终端设备接收来自第一终端设备的第一指示信息后,就可以确定第二资源。从而第二终端设备在接收来自第一终端设备的数据后,无需再从第二资源池中选择资源,而是可以利用第二资源向第一终端设备发送该数据的反馈信息。而第一终端设备也无需对第二资源池进行监听,而只需在第二资源上监听即可,减小了第一终端设备的功耗。
作为一种可选的实施方式,第二终端设备可能需要同时在第二资源上反馈,以及在第二网络的资源上发送。如果第二终端设备由于能力问题,无法完成同时发送,则可以约定优先发送反馈信息,或优先发送第二终端设备的数据等。通过这种方式,可以避免侧行链路上的通信出现发送端与接收端理解不一致的情况。
在本申请实施例中,如果第一终端设备和第二终端设备要通过侧行链路通信,而第一终端设备和第二终端设备所属的网络设备对应于不同的PLMN,那么第一网络设备可以确定用于第一终端设备发送数据的发送资源和用于第二终端设备发送反馈信息的反馈资源,从而第二终端设备利用该反馈资源发送反馈信息,第一终端设备只要在反馈资源上监听到反馈信息,就可以确定是对应于所发送的数据的反馈信息。通过这种方式,使得HARQ机制能够正常进行,提高了传输的可靠性。
为了解决相同的技术问题,本申请实施例提供第三种通信方法,请参见图8,为该方法的流程图。在下文的介绍过程中,以该方法应用于图2A所示的网络架构为例。
为了便于介绍,在下文中,以该方法由网络设备和终端设备执行为例。因为本实施例是以应用在图2A所示的网络架构为例,因此,下文所述的第一网络设备可以是图2A所示的网络架构中的网络设备1,下文所述的第二网络设备可以是图2A所示的网络架构中的网 络设备2,下文所述的第一终端设备可以是图2A所示的网络架构中的终端设备1,下文所述的第二终端设备可以是图2A所示的网络架构中的终端设备2。
S81、第一网络设备确定用于第一终端设备发送数据的发送资源。
发送资源可以包括第一资源,或者包括第一资源池。
对于第一终端设备来说,要通过侧行链路与第二终端设备通信,通信所需的发送资源可以是第一网络设备分配的。第一网络设备为第一终端设备分配发送资源,有两种分配方式。一种分配方式为,第一终端设备每次发送数据所需的资源都由第一网络设备调度,在这种情况下,第一网络设备所确定的发送资源可以是第一资源。另一种分配方式为,第一网络设备可以为第一终端设备配置资源池,例如第一网络设备可以通过广播方式发送该资源池的信息,那么第一网络设备覆盖下的全部终端设备或部分终端设备都可以使用该资源池发送数据。在这种情况下,第一网络设备所确定的发送资源可以是第一资源池,第一资源池包括一个或多个用于发送数据的资源。其中,第一终端设备驻留在第一网络设备,第二终端设备驻留在第二网络设备,第一网络设备和第二网络设备对应于不同的PLMN。
S82、第一网络设备向第二网络设备发送所述发送资源的信息,第二网络设备接收来自第一网络设备的所述发送资源的信息。
第一网络设备在确定发送资源后,可以将发送资源的信息告知第二网络设备,从而第二网络设备可以确定该发送资源。
S83、第二网络设备向第一网络设备发送反馈资源的信息,第一网络设备接收来自第二网络设备的所述反馈资源的信息。
第二网络设备在确定该发送资源后,可以确定对应的反馈资源。该反馈资源可以用于第二终端设备发送通过该发送资源接收的数据的反馈信息。其中,如果发送资源包括第一资源,则反馈资源可以包括第二资源;或者,如果发送资源包括第一资源池,则反馈资源可以包括第二资源池。
第一网络设备接收该反馈资源的信息后,就可以确定该反馈资源。通过S81~S83,第一网络设备就可以确定发送资源和反馈资源。
S84、第一网络设备发送第一消息,第一终端设备接收来自第一网络设备的第一消息。第一消息用于指示所述发送资源,以及用于指示所述反馈资源。
例如,第一消息可以指示该发送资源和该反馈资源具有关联关系,而该关联关系是指,该反馈资源用于接收通过该发送资源所发送的数据的反馈信息。则第一终端设备接收第一消息后,就可以确定该反馈资源是用于接收通过所述发送资源所发送的数据的反馈信息。例如,第一消息指示了该发送资源和该反馈资源,就隐含表明第一消息指示了该发送资源和该反馈资源具有关联关系,无需额外的指示信息,有助于节省信令开销;或者,第一消息除了指示该发送资源和该反馈资源外,还可以指示该发送资源和该反馈资源具有关联关系,从而指示更为明确。
例如,所述的发送资源是第一资源池,所述的反馈资源是第二资源池,那么第一消息可以是广播消息,接收第一消息的终端设备都可以使用第一资源池来发送数据,以及可以使用第二资源池来接收反馈信息,第一终端设备只是这多个终端设备中的一个。或者,所述的发送资源是第一资源,所述的反馈资源是第二资源,那么第一消息可以是单播消息,该第一资源和第二资源是配置给第一终端设备的。
在本申请实施例中,第一网络设备在确定发送资源后,可以将该发送资源的信息告知 第二网络设备,从而第二网络设备可以确定对应的反馈资源,且第二网络设备可以将反馈资源的信息告知第一网络设备,则第一网络设备和第二网络设备都可以确定发送资源和反馈资源之间的关联关系。例如,要实现HARQ机制,则第一终端设备向第二终端设备发送数据后,第二终端设备要向第一终端设备发送对应于该数据的反馈信息,例如反馈信息为ACK或NACK。第二终端设备向第一终端设备发送对应于该数据的反馈信息,也需要使用相应的资源来发送。在本申请实施例中,第一网络设备和第二网络设备都可以确定发送资源和反馈资源之间的关联关系,第二终端设备利用该反馈资源发送反馈信息,第一终端设备可以利用该反馈资源来监听反馈信息,从而第一终端设备就可以确定该反馈信息对应于通过该发送资源所发送的数据,从而保证了HARQ机制的正常进行,提高了传输的可靠性。
S85、第一终端设备根据第一消息确定第一资源。
第一终端设备在要向第二终端设备发送数据时,可以确定第一资源。
如果第一消息指示的发送资源是第一资源,则第一终端设备可以确定第一资源。或者,如果第一消息指示的发送资源是第一资源池,则第一终端设备可以从第一资源池中选择用于发送数据的第一资源。
S86、第二网络设备发送第三消息,第二终端设备接收来自第二网络设备的第三消息。第三消息用于指示所述发送资源和所述反馈资源。
例如,第三消息可以指示该发送资源和该反馈资源具有关联关系,而该关联关系是指,该反馈资源用于接收通过该发送资源所发送的数据的反馈信息。则第二终端设备接收第三消息后,就可以确定该反馈资源是用于接收通过所述发送资源所发送的数据的反馈信息。例如,第三消息指示该发送资源和该反馈资源,这也隐含表明第三消息指示了该发送资源和该反馈资源具有关联关系,无需额外的指示信息,有助于节省信令开销;或者,第三消息除了指示该发送资源和该反馈资源外,还可以指示该发送资源和该反馈资源具有关联关系,从而指示更为明确。
例如,所述的发送资源是第一资源池,所述的反馈资源是第二资源池,那么第三消息可以是广播消息,接收第三消息的终端设备都可以使用第二资源池来发送反馈信息,第二终端设备只是这多个终端设备中的一个。或者,所述的发送资源是第一资源,所述的反馈资源是第二资源,那么第三消息可以是单播消息,该第二资源是配置给第二终端设备的。
S86可以发生在S85之前,或者,S86可以发生在S85之后,或者,S86和S85可以同时发生。
S87、第二终端设备根据第三消息确定第二资源。
第二终端设备在要接收来自第一终端设备的数据时,可以确定第二资源。
如果第三消息指示的发送资源是第二资源,则第二终端设备可以确定第二资源。或者,如果第三消息指示的发送资源是第二资源池,则第二终端设备可以从第二资源池中选择用于发送反馈信息的第二资源。
S88、第一终端设备在第一资源上向第二终端设备发送数据,第二终端设备通过第一资源接收来自第一终端设备的该数据。
S89、第二终端设备在第二资源上向第一终端设备发送反馈信息,第一终端设备在第二资源上接收来自第二终端设备的反馈信息。该反馈信息是对应于S88中的数据的。该反馈信息例如为ACK或NACK。
第二终端设备确定了反馈资源,则第二终端设备接收来自第一终端设备的数据后,就 会通过反馈资源向第一终端设备发送该数据的反馈信息。如果反馈资源是第二资源,则第二终端设备在第二资源上向第一终端设备发送该数据的反馈信息,或者,如果反馈资源是第二资源池,则第二终端设备可以从第二资源池中选择资源来发送该反馈信息,例如第二终端设备选择了第二资源来发送该反馈信息。
而第一终端设备也根据第一消息确定了与发送资源对应的反馈资源。如果反馈资源是第二资源,则第一终端设备可以在第二资源上监听该数据的反馈信息,只要在第二资源上接收了反馈信息,第一终端设备就可以确定该反馈信息是对应于该数据的反馈信息。或者,如果反馈资源是第二资源池,则第一终端设备可以在第二资源池所包括的全部资源或部分资源上监听该数据的反馈信息,由于第二终端设备是在第二资源上发送的反馈信息,因此第一终端设备可能会在第二资源上接收该反馈信息。只要是在第二资源池所包括的资源上接收的反馈信息,第一终端设备都可以确定是对应于该数据的反馈信息。
在本申请实施例中,第一网络设备在确定发送资源后,可以将该发送资源的信息告知第二网络设备,从而第二网络设备可以确定对应的反馈资源,且第二网络设备可以将反馈资源的信息告知第一网络设备,则第一网络设备和第二网络设备都可以确定发送资源和反馈资源之间的关联关系。且第一网络设备会将该关联关系告知第一终端设备,第二网络设备也会将该关联关系告知第二终端设备,第一终端设备利用该发送资源发送数据,第二终端设备利用该反馈资源发送反馈信息,第一终端设备可以利用该反馈资源来监听反馈信息,从而第一终端设备就可以确定该反馈信息对应于通过该发送资源所发送的数据,从而保证了HARQ机制的正常进行,提高了传输的可靠性。
为了解决相同的技术问题,本申请实施例提供第四种通信方法,请参见图9,为该方法的流程图。在下文的介绍过程中,以该方法应用于图2A所示的网络架构为例。
为了便于介绍,在下文中,以该方法由网络设备和终端设备执行为例。因为本实施例是以应用在图2A所示的网络架构为例,因此,下文所述的第一网络设备可以是图2A所示的网络架构中的网络设备1,下文所述的第二网络设备可以是图2A所示的网络架构中的网络设备2,下文所述的第一终端设备可以是图2A所示的网络架构中的终端设备1,下文所述的第二终端设备可以是图2A所示的网络架构中的终端设备2。
S91、第一终端设备向第二终端设备发送数据,第二终端设备接收来自第一终端设备的数据。
其中,第一终端设备驻留在第一网络设备,第二终端设备驻留在第二网络设备,第一网络设备和第二网络设备对应于不同的PLMN。
S92、第二终端设备向第一终端设备发送对应于该数据的反馈信息,第一终端设备接收来自第二终端设备的该反馈信息。该反馈信息可以包括该数据对应的第一标识。
由于第一网络设备和第二网络设备属于不同的PLMN,则第二终端设备向第一终端设备发送的反馈信息,第一终端设备虽然能够接收,但第一终端设备并不能识别该反馈信息是对应于哪个数据的反馈信息,甚至不能确定该反馈信息是否是对应于第一终端设备的反馈信息,由此导致HARQ机制无法进行。在本申请实施例中,第二终端设备所发送的反馈信息可以包括第一标识,第一终端设备如果接收了该反馈信息,根据第一标识就可以确定该反馈信息所对应的数据,从而可以正常进行HARQ机制,提高了数据传输的可靠性。
第一标识例如为第一终端设备的标识,例如第一终端设备的ID等。或者,第一标识例如为该数据对应的HARQ进程号。或者,第一标识例如为随机数,例如该随机数是第一 终端设备生成的,第一终端设备可以将该随机数包括在S91的数据中一并发送给第二终端设备,或者第一终端设备也可以通过另外的消息将该随机数发送给第二终端设备,该随机数对应于S91中的数据。第二终端设备接收该随机数后,在向第一终端设备发送反馈信息时,就可以在反馈信息中包括该随机数,从而第一终端设备接收该反馈信息后,根据该随机数就可以确定该反馈信息所对应的数据。
本申请实施例中,通过在反馈信息中包括第一标识,相当于建立了反馈信息和数据之间的对应关系,从而第一终端设备能够识别该反馈信息是对应于该数据的反馈信息,保证了HARQ机制的正常进行,使得数据传输更为可靠。
下面结合附图介绍本申请实施例中用来实现上述方法的装置。因此,上文中的内容均可以用于后续实施例中,重复的内容不再赘述。
图10为本申请实施例提供的通信装置1000的示意性框图。示例性地,通信装置1000例如为第二终端设备1000。
第二终端设备1000包括收发模块1020和处理模块1010。示例性地,第二终端设备1000可以是第二终端设备,也可以是应用于第二终端设备中的芯片或者其他具有上述第二终端设备功能的组合器件、部件等。当第二终端设备1000是第二终端设备时,收发模块1020可以是收发器,收发器可以包括天线和射频电路等,处理模块1010可以是处理器,处理器中可以包括一个或多个中央处理单元(central processing unit,CPU)。当第二终端设备1000是具有上述第二终端设备功能的部件时,收发模块1020可以是射频单元,处理模块1010可以是处理器。当第二终端设备1000是芯片系统时,收发模块1020可以是芯片的输入输出接口,处理模块1010可以是芯片系统的处理器,可以包括一个或多个中央处理单元。
其中,处理模块1010可以用于执行图3所示的实施例中由第二终端设备所执行的除了收发操作之外的全部操作,例如S301、S311和S314,和/或用于支持本文所描述的技术的其它过程。收发模块1020可以用于执行图3所示的实施例中由第二终端设备所执行的全部接收操作,例如S306、S307、S310、S312、S314和S315,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1010可以用于执行图4所示的实施例中由第二终端设备所执行的除了收发操作之外的全部操作,例如S301、S311和S314,和/或用于支持本文所描述的技术的其它过程。收发模块1020可以用于执行图4所示的实施例中由第二终端设备所执行的全部接收操作,例如S406、S312、S314和S315,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1010可以用于执行图5所示的实施例中由第二终端设备所执行的除了收发操作之外的全部操作,例如S301和S509,和/或用于支持本文所描述的技术的其它过程。收发模块1020可以用于执行图5所示的实施例中由第二终端设备所执行的全部接收操作,例如S501、S504、S507、S508和S509,和/或用于支持本文所描述的技术的其它过程。
另外,收发模块1020可以是一个功能模块(该功能模块例如对应于收发器、射频单元或输入输出接口),该功能模块既能完成发送操作也能完成接收操作,例如收发模块1020可以用于执行图3~图5中的任一个附图所示的实施例中由第二终端设备所执行的全部发送操作和接收操作,例如,在执行发送操作时,可以认为收发模块1020是发送模块,而在 执行接收操作时,可以认为收发模块1020是接收模块;或者,收发模块1020也可以是两个功能模块,收发模块1020可以视为这两个功能模块的统称,这两个功能模块分别为发送模块(例如对应于发送器、射频单元或输出接口)和接收模块(例如对应于接收器、射频单元或输入接口),发送模块用于完成发送操作,例如发送模块可以用于执行图3~图5中的任一个附图所示的实施例中由第二终端设备所执行的全部发送操作,接收模块用于完成接收操作,例如接收模块可以用于执行图3~图5中的任一个附图所示的实施例中由第二终端设备所执行的全部接收操作。
其中,收发模块1020,用于当第二终端设备1000驻留在第二网络设备时,接收第一消息,所述第一消息用于指示第二终端设备1000驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
处理模块1010,用于驻留到所述第一网络设备。
作为一种可选的实施方式,收发模块1020用于通过如下方式接收第一消息:
接收来自所述第二网络设备的第一消息;或,
接收来自第一终端设备的第一消息,所述第一终端设备驻留在所述第一网络设备;或,
接收来自所述第一网络设备的第一消息。
作为一种可选的实施方式,收发模块1020,还用于在接收来自所述第二网络设备的第一消息之前:
向所述第二网络设备发送请求消息,所述请求消息用于请求驻留到所述第一网络设备;或,
向所述第一网络设备发送第三消息,所述第三消息用于请求驻留到所述第一网络设备。
作为一种可选的实施方式,处理模块1010用于通过如下方式驻留到所述第一网络设备:
根据所述第一网络设备的信息,通过小区重选驻留到所述第一网络设备。
作为一种可选的实施方式,处理模块1010,还用于在所述第一网络设备下与第一终端设备建立侧行连接。
作为一种可选的实施方式,所述第一消息还包括第二终端设备1000的验证信息,第二终端设备1000的验证信息用于验证第二终端设备1000。
作为一种可选的实施方式,收发模块1020,还用于向第一网络设备发送第五消息,所述第五消息包括第二终端设备1000的验证信息。
图11为本申请实施例提供的通信装置1100的示意性框图。示例性地,通信装置1100例如为第一终端设备1100。
第一终端设备1100包括收发模块1120。可选的,还可以包括处理模块1110。示例性地,第一终端设备1100可以是第一终端设备,也可以是应用于第一终端设备中的芯片或者其他具有上述第一终端设备功能的组合器件、部件等。关于收发模块1120或处理模块1110的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介绍。
其中,处理模块1110可以用于执行图3所示的实施例中由第一终端设备所执行的除了收发操作之外的全部操作,例如S314,和/或用于支持本文所描述的技术的其它过程。收发模块1120可以用于执行图3所示的实施例中由第一终端设备所执行的全部接收操作,例如S302、S314和S315,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1110可以用于执行图4所示的实施例中由第一终端设备所执行的除了收发操作之外的全部操作,例如S314,和/或用于支持本文所描述的技术的其它过程。收发模块1120可以用于执行图4所示的实施例中由第一终端设备所执行的全部接收操作,例如S401、S405、S406和S314,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1110可以用于执行图5所示的实施例中由第一终端设备所执行的除了收发操作之外的全部操作,例如S509,和/或用于支持本文所描述的技术的其它过程。收发模块1120可以用于执行图5所示的实施例中由第一终端设备所执行的全部接收操作,例如S509,和/或用于支持本文所描述的技术的其它过程。
其中,收发模块1120,用于接收来自第一网络设备的第二消息,所述第二消息用于指示第二终端设备驻留到所述第一网络设备,所述第二终端设备当前驻留在第二网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
收发模块1120,还用于向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
作为一种可选的实施方式,处理模块1110,用于确定所述第一消息。
作为一种可选的实施方式,收发模块1120,还用于向所述第一网络设备发送第三消息,所述第三消息用于指示所述第二终端设备驻留在所述第二网络设备。
作为一种可选的实施方式,处理模块1110,用于在所述第一网络设备下与第二终端设备建立侧行连接。
图12为本申请实施例提供的通信装置1200的示意性框图。示例性地,通信装置1200例如为第一网络设备1200。第一网络设备1200可以是基站1、AMF1或SEAF1。
第一网络设备1200包括收发模块1220。可选的,还可以包括处理模块1210。示例性地,第一网络设备1200可以是第一网络设备,也可以是应用于第一网络设备中的芯片或者其他具有上述第一网络设备功能的组合器件、部件等。关于收发模块1220或处理模块1210的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介绍。
其中,处理模块1210可以用于执行图3所示的实施例中由第一网络设备所执行的除了收发操作之外的全部操作,例如S313,和/或用于支持本文所描述的技术的其它过程。收发模块1220可以用于执行图3所示的实施例中由第一网络设备所执行的全部接收操作,例如S302、S303、S305、S308、S309、S312和S315,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1210可以用于执行图4所示的实施例中由第一网络设备所执行的除了收发操作之外的全部操作,例如S313,和/或用于支持本文所描述的技术的其它过程。收发模块1220可以用于执行图4所示的实施例中由第一网络设备所执行的全部接收操作,例如S401、S402、S404、S405、S312和S315,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1210可以用于执行图5所示的实施例中由第一网络设备所执行的除了收发操作之外的全部操作,例如S502和S506,和/或用于支持本文所描述的技术的其它过程。收发模块1220可以用于执行图5所示的实施例中由第一网络设备所执行的全部接收操作,例如S501、S503、S505、S507和S508,和/或用于支持本文所描述的技术的其它过程。
其中,收发模块1220,用于接收第三消息,所述第三消息用于指示第二终端设备驻留在第二网络设备,或用于指示驻留在第二网络设备的第二终端设备请求驻留到第一网络设备1200,第一网络设备1200和所述第二网络设备对应于不同的PLMN;
收发模块1220,还用于发送第二消息,所述第二消息用于指示所述第二终端设备驻留到第一网络设备1200。
作为一种可选的实施方式,处理模块1210,用于确定所述第二消息。
作为一种可选的实施方式,收发模块1220用于通过如下方式接收第三消息:
接收来自所述第一终端设备的所述第三消息;或,
接收来自所述第二网络设备的所述第三消息;或,
接收来自所述第二终端设备的所述第三消息。
作为一种可选的实施方式,收发模块1220用于通过如下方式发送第二消息:
向驻留在第一网络设备1200的第一终端设备发送所述第二消息;或,
向所述第二网络设备发送所述第二消息。
作为一种可选的实施方式,收发模块1220,还用于接收来自所述第二网络设备的所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
作为一种可选的实施方式,收发模块1220,还用于向所述第二网络设备发送第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
作为一种可选的实施方式,
收发模块1220,还用于接收来自所述第二终端设备的第五消息,所述第五消息包括所述第二终端设备的验证信息;
处理模块1210,用于根据所述第五消息包括的所述第二终端设备的验证信息,和来自所述第二网络设备的所述第二终端设备的验证信息,进行验证;
处理模块1210,还用于当验证通过时,确定所述第二终端设备能够接入第一网络设备1200。
图13为本申请实施例提供的通信装置1300的示意性框图。示例性地,通信装置1300例如为第二网络设备1300。第二网络设备1300可以是基站2、AUSF2、AMF2、SEAF2或UDM2。
第二网络设备1300包括收发模块1320和处理模块1310。示例性地,第二网络设备1300可以是第二网络设备,也可以是应用于第二网络设备中的芯片或者其他具有上述第二网络设备功能的组合器件、部件等。关于收发模块1320或处理模块1310的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介绍。
其中,处理模块1310可以用于执行图3所示的实施例中由第二网络设备所执行的除了收发操作之外的全部操作,例如S304,和/或用于支持本文所描述的技术的其它过程。收发模块1320可以用于执行图3所示的实施例中由第二网络设备所执行的全部接收操作,例如S303、S305、S306、S307、S308、S309和S310,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1310可以用于执行图4所示的实施例中由第二网络设备所执行的除了收发操作之外的全部操作,例如S403,和/或用于支持本文所描述的技术的其它过程。收发模块1320可以用于执行图4所示的实施例中由第二网络设备所执行的全部接收操作, 例如S402和S404,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1310可以用于执行图5所示的实施例中由第二网络设备所执行的除了收发操作之外的全部操作,例如S504,和/或用于支持本文所描述的技术的其它过程。收发模块1320可以用于执行图5所示的实施例中由第二网络设备所执行的全部接收操作,例如S503和S505,和/或用于支持本文所描述的技术的其它过程。
其中,处理模块1310,用于确定驻留在第二网络设备1300的第二终端设备需驻留在第一网络设备,所述第一网络设备和第二网络设备1300对应于不同的PLMN;
收发模块1320,用于向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
作为一种可选的实施方式,处理模块1310用于通过如下方式确定驻留在第二网络设备1300的第二终端设备需驻留在第一网络设备:
通过收发模块1320接收来自所述第一网络设备的第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备;或,
通过收发模块1320接收来自所述第二终端设备的请求消息,所述请求消息用于请求驻留到所述第一网络设备。
作为一种可选的实施方式,收发模块1320,还用于向所述第一网络设备发送所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
作为一种可选的实施方式,收发模块1320,还用于接收来自所述第一网络设备的第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
图14为本申请实施例提供的通信装置1400的示意性框图。示例性地,通信装置1400例如为第一终端设备1400。
第一终端设备1400包括收发模块1420和处理模块1410。示例性地,第一终端设备1400可以是第一终端设备,也可以是应用于第一终端设备中的芯片或者其他具有上述第一终端设备功能的组合器件、部件等。关于收发模块1420或处理模块1410的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介绍。
其中,处理模块1410可以用于执行图7所示的实施例中由第一终端设备所执行的除了收发操作之外的全部操作,例如S74,和/或用于支持本文所描述的技术的其它过程。收发模块1420可以用于执行图7所示的实施例中由第一终端设备所执行的全部接收操作,例如S72、S77和S78,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1410可以用于执行图8所示的实施例中由第一终端设备所执行的除了收发操作之外的全部操作,例如S85,和/或用于支持本文所描述的技术的其它过程。收发模块1420可以用于执行图8所示的实施例中由第一终端设备所执行的全部接收操作,例如S84、S88和S89,和/或用于支持本文所描述的技术的其它过程。
其中,收发模块1420,用于接收来自第一网络设备的第一消息;
处理模块1410,用于根据所述第一消息确定第一资源;
收发模块1420,还用于在所述第一资源上向第二终端设备发送数据;
收发模块1420,还用于在第二资源上接收来自所述第二终端设备的对应于所述数据的反馈信息,所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
作为一种可选的实施方式,所述第一消息用于指示,所述第二资源用于接收通过所述 第一资源发送的数据的反馈信息。
作为一种可选的实施方式,所述第一消息用于指示,所述第二资源与所述第一资源具有关联关系,所述关联关系指示所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
作为一种可选的实施方式,所述第一消息用于指示所述第一资源池和所述第二资源池,所述第一资源池与所述第二资源池具有关联关系,所述关联关系指示,所述第二资源池所包括的资源,用于接收通过所述第一资源池包括的资源所发送的数据的反馈信息。
作为一种可选的实施方式,处理模块1410用于通过如下方式确定第一资源:
从第一资源池中选择所述第一资源。
作为一种可选的实施方式,
处理模块1410,还用于从第二资源池中选择用于接收通过所述第一资源发送的数据的反馈信息的所述第二资源;
收发模块1420,还用于向所述第二终端设备发送第一指示信息,所述第一指示信息用于指示所述第二资源用于发送通过所述第一资源接收的数据的反馈信息。
图15为本申请实施例提供的通信装置1500的示意性框图。示例性地,通信装置1500例如为第二终端设备1500。
第二终端设备1500包括收发模块1520和处理模块1510。示例性地,第二终端设备1500可以是第二终端设备,也可以是应用于第二终端设备中的芯片或者其他具有上述第二终端设备功能的组合器件、部件等。关于收发模块1520或处理模块1510的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介绍。
其中,处理模块1510可以用于执行图7所示的实施例中由第二终端设备所执行的除了收发操作之外的全部操作,例如S76,和/或用于支持本文所描述的技术的其它过程。收发模块1520可以用于执行图7所示的实施例中由第二终端设备所执行的全部接收操作,例如S75、S77和S78,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1510可以用于执行图8所示的实施例中由第二终端设备所执行的除了收发操作之外的全部操作,例如S87,和/或用于支持本文所描述的技术的其它过程。收发模块1520可以用于执行图8所示的实施例中由第二终端设备所执行的全部接收操作,例如S86、S88和S89,和/或用于支持本文所描述的技术的其它过程。
其中,收发模块1520,用于在所述第一资源上接收来自第一终端设备的数据;
收发模块1520,还用于在第二资源上向所述第一终端设备发送对应于所述数据的反馈信息,所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
作为一种可选的实施方式,处理模块1510,用于确定所述反馈信息。
作为一种可选的实施方式,收发模块1520,还用于:
接收来自所述第一终端设备的第一指示信息,所述第一指示信息用于指示所述第二资源,所述第二资源用于发送通过所述第一资源接收的数据的反馈信息;或,
接收来自第二网络设备的第三消息,所述第三消息用于指示所述第二资源,所述第二资源用于发送通过所述第一资源接收的数据的反馈信息,第二终端设备1500驻留在所述第二网络设备。
作为一种可选的实施方式,所述第三消息用于指示所述第二资源与所述第一资源具有 关联关系,所述关联关系指示所述第二资源用于发送通过所述第一资源接收的数据的反馈信息。
作为一种可选的实施方式,
收发模块1520,还用于接收来自第二网络设备的第三消息,所述第三消息用于指示第一资源池和第二资源池,所述第一资源池与所述第二资源池具有关联关系,所述关联关系指示,所述第二资源池所包括的资源,用于发送通过所述第一资源池包括的资源所接收的数据的反馈信息;
处理模块1510,还用于从所述第二资源池中选择所述第二资源,所述第一资源属于所述第一资源池。
图16为本申请实施例提供的通信装置1600的示意性框图。示例性地,通信装置1600例如为第一网络设备1600。
第一网络设备1600包括收发模块1620和处理模块1610。示例性地,第一网络设备1600可以是第一网络设备,也可以是应用于第一网络设备中的芯片或者其他具有上述第一网络设备功能的组合器件、部件等。关于收发模块1620或处理模块1610的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介绍。
其中,处理模块1610可以用于执行图7所示的实施例中由第一网络设备所执行的除了收发操作之外的全部操作,例如S71,和/或用于支持本文所描述的技术的其它过程。收发模块1620可以用于执行图7所示的实施例中由第一网络设备所执行的全部接收操作,例如S72和S73,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1610可以用于执行图8所示的实施例中由第一网络设备所执行的除了收发操作之外的全部操作,例如S81,和/或用于支持本文所描述的技术的其它过程。收发模块1620可以用于执行图8所示的实施例中由第一网络设备所执行的全部接收操作,例如S82、S83和S84,和/或用于支持本文所描述的技术的其它过程。
其中,处理模块1610,用于确定用于第一终端设备发送数据的发送资源,以及用于所述第一终端设备接收通过所述发送资源所发送的数据的反馈信息的反馈资源,其中,所述发送资源包括第一资源,所述反馈资源包括第二资源,或,所述发送资源包括第一资源池,所述反馈资源包括第二资源池;
收发模块1620,用于向所述第一终端设备发送第一消息,所述第一消息用于指示所述发送资源,以及指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
作为一种可选的实施方式,收发模块1620,还用于向第二网络设备发送第四消息,所述第四消息用于指示所述发送资源和所述反馈资源,所述第二网络设备是第二终端设备驻留的网络设备,所述第二终端设备是所述数据的接收端。
作为一种可选的实施方式,所述第一消息用于指示所述发送资源和所述反馈资源具有关联关系,所述关联关系指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
作为一种可选的实施方式,收发模块1620,还用于:
将所述发送资源的信息发送给所述第二网络设备,所述发送资源的信息用于确定所述反馈资源的信息;
接收来自所述第二网络设备的所述反馈资源的信息。
图17为本申请实施例提供的通信装置1700的示意性框图。示例性地,通信装置1700例如为第二网络设备1700。
第二网络设备1700包括收发模块1720和处理模块1710。示例性地,第二网络设备1700可以是第二网络设备,也可以是应用于第二网络设备中的芯片或者其他具有上述第二网络设备功能的组合器件、部件等。关于收发模块1720或处理模块1710的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介绍。
其中,处理模块1710可以用于执行图7所示的实施例中由第二网络设备所执行的除了收发操作之外的全部操作,例如确定用于第二终端设备发送反馈信息的反馈资源的操作,和/或用于支持本文所描述的技术的其它过程。收发模块1720可以用于执行图7所示的实施例中由第二网络设备所执行的全部接收操作,例如S73和S75,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1710可以用于执行图8所示的实施例中由第二网络设备所执行的除了收发操作之外的全部操作,例如确定用于第二终端设备发送反馈信息的反馈资源的操作,和/或用于支持本文所描述的技术的其它过程。收发模块1720可以用于执行图8所示的实施例中由第二网络设备所执行的全部接收操作,例如S82、S83和S86,和/或用于支持本文所描述的技术的其它过程。
其中,处理模块1710,用于确定用于第二终端设备发送反馈信息的反馈资源,所述反馈资源用于所述第二终端设备发送通过发送资源所发送的数据的反馈信息,其中,所述发送资源包括第一资源,所述反馈资源包括第二资源,或,所述发送资源包括第一资源池,所述反馈资源包括第二资源池;
收发模块1720,用于向所述第二终端设备发送第三消息,所述第三消息用于指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
作为一种可选的实施方式,收发模块1720,还用于接收来自第一网络设备的第四消息,所述第四消息用于指示所述发送资源和所述反馈资源,所述第一网络设备是第一终端设备驻留的网络设备,所述第一终端设备是所述数据的发送端。
作为一种可选的实施方式,所述第三消息用于指示所述发送资源和所述反馈资源具有关联关系,所述关联关系指示所述接收资源用于接收通过所述发送资源所发送的数据的反馈信息。
作为一种可选的实施方式,
收发模块1720,还用于接收来自第一网络设备的所述发送资源的信息,所述第一网络设备是第一终端设备驻留的网络设备,所述第一终端设备是所述数据的发送端;
处理模块1710,还用于根据所述发送资源的信息确定所述反馈资源的信息;
收发模块1720,还用于将所述反馈资源的信息发送给所述第一网络设备。
图18为本申请实施例提供的通信装置1800的示意性框图。示例性地,通信装置1800例如为第一终端设备1800。
第一终端设备1800包括收发模块1820和处理模块1810。示例性地,第一终端设备1800可以是第一终端设备,也可以是应用于第一终端设备中的芯片或者其他具有上述第一终端设备功能的组合器件、部件等。关于收发模块1820或处理模块1810的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介 绍。
其中,处理模块1810可以用于执行图9所示的实施例中由第一终端设备所执行的除了收发操作之外的全部操作,例如确定数据的操作,和/或用于支持本文所描述的技术的其它过程。收发模块1820可以用于执行图9所示的实施例中由第一终端设备所执行的全部接收操作,例如S91和S92,和/或用于支持本文所描述的技术的其它过程。
其中,收发模块1820,用于向第二终端设备发送数据;
收发模块1820,还用于接收来自所述第二终端设备的对应于所述数据的反馈信息,所述反馈信息包括所述数据对应的第一标识。
作为一种可选的实施方式,处理模块1810,用于确定所述数据。
作为一种可选的实施方式,所述第一标识包括如下的一项或多项:
第一终端设备1800的标识;
随机数;或,
所述数据对应的HARQ进程号。
作为一种可选的实施方式,所述第一标识包括所述随机数,收发模块1820,还用于将所述数据对应的所述随机数发送给所述第二终端设备。
图19为本申请实施例提供的通信装置1900的示意性框图。示例性地,通信装置1900例如为第二终端设备1900。
第二终端设备1900包括收发模块1920和处理模块1910。示例性地,第二终端设备1900可以是第一终端设备,也可以是应用于第二终端设备中的芯片或者其他具有上述第二终端设备功能的组合器件、部件等。关于收发模块1920或处理模块1910的实现形式等,可参考图10所示的实施例中对于收发模块1020或处理模块1010的实现形式等内容的介绍。
其中,处理模块1910可以用于执行图9所示的实施例中由第二终端设备所执行的除了收发操作之外的全部操作,例如确定反馈信息的操作,和/或用于支持本文所描述的技术的其它过程。收发模块1920可以用于执行图9所示的实施例中由第二终端设备所执行的全部接收操作,例如S91和S92,和/或用于支持本文所描述的技术的其它过程。
其中,收发模块1920,用于接收来自第一终端设备的数据;
收发模块1920,还用于向所述第一终端设备发送对应于所述数据的反馈信息,所述反馈信息包括所述数据对应的第一标识。
作为一种可选的实施方式,处理模块1910,用于确定所述反馈信息。
作为一种可选的实施方式,所述第一标识包括如下的一项或多项:
所述第一终端设备的标识;
随机数;或,
所述数据对应的HARQ进程号。
作为一种可选的实施方式,所述第一标识包括所述随机数,收发模块1920,还用于接收来自所述第二终端设备的所述数据对应的所述随机数。
本申请实施例还提供一种通信装置,该通信装置可以是终端设备也可以是电路。该通信装置可以用于执行上述方法实施例中由终端设备所执行的动作。
当该通信装置为终端设备时,图20示出了一种简化的终端设备的结构示意图。便于理解和图示方便,图20中,终端设备以手机作为例子。如图20所示,终端设备包括处理 器、存储器、射频电路、天线以及输入输出装置。处理器主要用于对通信协议以及通信数据进行处理,以及对终端设备进行控制,执行软件程序,处理软件程序的数据等。存储器主要用于存储软件程序和数据。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的终端设备可以不具有输入输出装置。
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。为便于说明,图20中仅示出了一个存储器和处理器。在实际的终端设备产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。
在本申请实施例中,可以将具有收发功能的天线和射频电路视为终端设备的收发单元,将具有处理功能的处理器视为终端设备的处理单元。如图20所示,终端设备包括收发单元2010和处理单元2020。收发单元也可以称为收发器、收发机、收发装置等。处理单元也可以称为处理器,处理单板,处理模块、处理装置等。可选的,可以将收发单元2010中用于实现接收功能的器件视为接收单元,将收发单元2010中用于实现发送功能的器件视为发送单元,即收发单元2010包括接收单元和发送单元。收发单元有时也可以称为收发机、收发器、或收发电路等。接收单元有时也可以称为接收机、接收器、或接收电路等。发送单元有时也可以称为发射机、发射器或者发射电路等。
应理解,收发单元2010用于执行上述方法实施例中终端设备侧的发送操作和接收操作,处理单元2020用于执行上述方法实施例中终端设备上除了收发操作之外的其他操作。
例如,在一种实现方式中,收发单元2010可以实现前述的收发模块1020的功能,或实现收发模块1120的功能,或实现收发模块1420的功能,或实现收发模块1520的功能,或实现收发模块1820的功能,或实现收发模块1920的功能。
当该通信装置为芯片类的装置或者电路时,该装置可以包括收发单元和处理单元。其中,所述收发单元可以是输入输出电路和/或通信接口;处理单元为集成的处理器或者微处理器或者集成电路。
本实施例中的通信装置为终端设备时,可以参照图21所示的设备。例如,该设备可以完成类似于图10中处理模块1010的功能,或者可以完成类似于图11中处理模块1110的功能,或者可以完成类似于图14中处理模块1410的功能,或者可以完成类似于图15中处理模块1510的功能,或者可以完成类似于图18中处理模块1810的功能,或者可以完成类似于图19中处理模块1910的功能。在图21中,该设备包括处理器2110,发送数据处理器2120,接收数据处理器2130。上述实施例中的处理模块1010可以是图21中的该处理器2110,并完成相应的功能;上述实施例中的收发模块1020可以是图21中的发送数据处理器2120,和/或接收数据处理器2130。或者,上述实施例中的处理模块1110可以是图21中的该处理器2110,并完成相应的功能;上述实施例中的收发模块1120可以是图21中的发送数据处理器2120,和/或接收数据处理器2130。或者,上述实施例中的处理模 块1410可以是图21中的该处理器2110,并完成相应的功能;上述实施例中的收发模块1420可以是图21中的发送数据处理器2120,和/或接收数据处理器2130。或者,上述实施例中的处理模块1510可以是图21中的该处理器2110,并完成相应的功能;上述实施例中的收发模块1520可以是图21中的发送数据处理器2120,和/或接收数据处理器2130。或者,上述实施例中的处理模块1810可以是图21中的该处理器2110,并完成相应的功能;上述实施例中的收发模块1820可以是图21中的发送数据处理器2120,和/或接收数据处理器2130。或者,上述实施例中的处理模块1910可以是图21中的该处理器2110,并完成相应的功能;上述实施例中的收发模块1920可以是图21中的发送数据处理器2120,和/或接收数据处理器2130。虽然图21中示出了信道编码器、信道解码器,但是可以理解这些模块并不对本实施例构成限制性说明,仅是示意性的。
图22示出本实施例的另一种形式。处理装置2200中包括调制子系统、中央处理子系统、周边子系统等模块。本实施例中的通信装置可以作为其中的调制子系统。具体的,该调制子系统可以包括处理器2203,接口2204。其中,处理器2203完成上述处理模块1010的功能,接口2204完成上述收发模块1020的功能。或者,处理器2203完成上述处理模块1110的功能,接口2204完成上述收发模块1120的功能。或者,处理器2203完成上述处理模块1410的功能,接口2204完成上述收发模块1420的功能。或者,处理器2203完成上述处理模块1510的功能,接口2204完成上述收发模块1520的功能。或者,处理器2203完成上述处理模块1810的功能,接口2204完成上述收发模块1820的功能。或者,处理器2203完成上述处理模块1910的功能,接口2204完成上述收发模块1920的功能。作为另一种变形,该调制子系统包括存储器2206、处理器2203及存储在存储器2206上并可在处理器上运行的程序,该处理器2203执行该程序时实现上述方法实施例中终端设备侧的方法。需要注意的是,所述存储器2206可以是非易失性的,也可以是易失性的,其位置可以位于调制子系统内部,也可以位于处理装置2200中,只要该存储器2206可以连接到所述处理器2203即可。
本申请实施例中的装置为网络设备时,该装置可以如图23所示。装置2300包括一个或多个射频单元,如远端射频单元(remote radio unit,RRU)2310和一个或多个基带单元(baseband unit,BBU)(也可称为数字单元,digital unit,DU)2320。所述RRU2310可以称为收发模块,与图12中的收发模块1220对应,或者与图13中的收发模块1320对应,或者与图16中的收发模块1620对应,或者与图17中的收发模块1720对应。可选地,该收发模块还可以称为收发机、收发电路、或者收发器等等,其可以包括至少一个天线2311和射频单元2312。所述RRU 2310部分主要用于射频信号的收发以及射频信号与基带信号的转换,例如用于向终端设备发送指示信息。所述BBU2310部分主要用于进行基带处理,对基站进行控制等。所述RRU 2310与BBU 2320可以是物理上设置在一起,也可以物理上分离设置的,即分布式基站。
所述BBU 2320为基站的控制中心,也可以称为处理模块,可以与图12中的处理模块1210对应,或者与图13中的处理模块1310对应,或者与图16中的处理模块1610对应,或者与图17中的处理模块1710对应,主要用于完成基带处理功能,如信道编码,复用,调制,扩频等等。例如所述BBU(处理模块)可以用于控制基站执行上述方法实施例中关于网络设备的操作流程,例如,生成上述指示信息等。
在一个示例中,所述BBU 2320可以由一个或多个单板构成,多个单板可以共同支持 单一接入制式的无线接入网(如LTE网络),也可以分别支持不同接入制式的无线接入网(如LTE网络,5G网络或其他网络)。所述BBU 2320还包括存储器2321和处理器2322。所述存储器2321用以存储必要的指令和数据。所述处理器2322用于控制基站进行必要的动作,例如用于控制基站执行上述方法实施例中关于网络设备的操作流程。所述存储器2321和处理器2322可以服务于一个或多个单板。也就是说,可以每个单板上单独设置存储器和处理器。也可以是多个单板共用相同的存储器和处理器。此外每个单板上还可以设置有必要的电路。
图23所示的装置2300,主要是以基站为例。当本申请实施例的网络设备是核心网设备时,结构也可以相应有所不同。
本申请实施例提供第一通信系统。第一通信系统可以包括图3~图6中的任意一个附图所示的实施例中的第二终端设备。第二终端设备例如为图10中的第二终端设备1000。
可选的,第一通信系统还可以包括上述的图3~图6中的任意一个附图所示的实施例中所涉及的第一网络设备。第一网络设备例如为图12中的第一网络设备1200。
可选的,第一通信系统还可以包括图3~图6中的任意一个附图所示的实施例中的第二网络设备。第二网络设备例如为图13中的第二网络设备1300。
可选的,第一通信系统还可以包括图3~图6中的任意一个附图所示的实施例中的第一终端设备。第一终端设备例如为图11中的第一终端设备1100。
本申请实施例提供第二通信系统。第二通信系统可以包括图7所示的实施例或图8所示的实施例中的第二终端设备。第二终端设备例如为图15中的第二终端设备1500。
可选的,第一通信系统还可以包括上述的图7所示的实施例或图8所示的实施例中所涉及的第一网络设备。第一网络设备例如为图16中的第一网络设备1600。
可选的,第一通信系统还可以包括上述的图7所示的实施例或图8所示的实施例中所涉及的第二网络设备。第二网络设备例如为图17中的第二网络设备1700。
可选的,第一通信系统还可以包括上述的图7所示的实施例或图8所示的实施例中所涉及的第一终端设备。第一终端设备例如为图14中的第一终端设备1400。
本申请实施例提供第三通信系统。第三通信系统可以包括图9所示的实施例中的第一终端设备和第二终端设备。第一终端设备例如为图18中的第一终端设备1800。第二终端设备例如为图19中的第二终端设备1900。
第一通信系统、第二通信系统和第三通信系统,可以是同一个通信系统,或者也可以分别是不同的通信系统,或者其中任意两个可以是同一个通信系统。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图3~图6中的任意一个附图所示的实施例中与第一终端设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图3~图6中的任意一个附图所示的实施例中与第二终端设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图3~图6中的任意一个附图所示的实施例中与第一网络设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计 算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图3~图6中的任意一个附图所示的实施例中与第二网络设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实施例或图8所示的实施例中与第一终端设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实施例或图8所示的实施例中与第二终端设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实施例或图8所示的实施例中与第一网络设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实施例或图8所示的实施例中与第二网络设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图9所示的实施例中与第一终端设备相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图9所示的实施例中与第二终端设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图3~图6中的任一个附图所示的实施例中与第一终端设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图3~图6中的任一个附图所示的实施例中与第二终端设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图3~图6中的任一个附图所示的实施例中与第一网络设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图3~图6中的任一个附图所示的实施例中与第二网络设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实施例或图8所示的实施例中与第一终端设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实施例或图8所示的实施例中与第二终端设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实 施例或图8所示的实施例中与第一网络设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实施例或图8所示的实施例中与第二网络设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图9所示的实施例中与第一终端设备相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图9所示的实施例中与第二终端设备相关的流程。
应理解,本申请实施例中提及的处理器可以是CPU,还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)集成在处理器中。
应注意,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通 过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请实施例的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请实施例揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请实施例的保护范围之内。因此,本申请实施例的保护范围应所述以权利要求的保护范围为准。
结合以上,本申请还提供如下实施例:
实施例1、一种通信方法,其中,所述方法包括:
第一终端设备接收来自第一网络设备的第一消息;
所述第一终端设备根据所述第一消息确定第一资源;
第一终端设备在所述第一资源上向第二终端设备发送数据;
所述第一终端设备在第二资源上接收来自所述第二终端设备的对应于所述数据的反馈信息,所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
实施例2、根据实施例1所述的方法,其中,所述第一消息用于指示,所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
实施例3、根据实施例1或实施例2所述的方法,其中,
所述第一消息用于指示,所述第二资源与所述第一资源具有关联关系,所述关联关系指示所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
实施例4、根据实施例1所述的方法,其中,所述第一消息用于指示所述第一资源池和所述第二资源池,所述第一资源池与所述第二资源池具有关联关系,所述关联关系指示,所述第二资源池所包括的资源,用于接收通过所述第一资源池包括的资源所发送的数据的反馈信息。
实施例5、根据实施例4所述的方法,其中,第一终端设备确定第一资源,包括:
所述第一终端设备从第一资源池中选择所述第一资源。
实施例6、根据实施例4或实施例5所述的方法,其中,所述方法还包括:
所述第一终端设备从第二资源池中选择用于接收通过所述第一资源发送的数据的反馈信息的所述第二资源;
所述第一终端设备向所述第二终端设备发送第一指示信息,所述第一指示信息用于指示所述第二资源用于发送通过所述第一资源接收的数据的反馈信息。
实施例7、一种通信方法,其中,所述方法包括:
第二终端设备在所述第一资源上接收来自第一终端设备的数据;
所述第二终端设备在第二资源上向所述第一终端设备发送对应于所述数据的反馈信息,所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
实施例8、根据实施例7所述的方法,其中,所述方法还包括:
所述第二终端设备接收来自所述第一终端设备的第一指示信息,所述第一指示信息用于指示所述第二资源,所述第二资源用于发送通过所述第一资源接收的数据的反馈信息;或,
所述第二终端设备接收来自第二网络设备的第三消息,所述第三消息用于指示所述第二资源,所述第二资源用于发送通过所述第一资源接收的数据的反馈信息,所述第二终端设备驻留在所述第二网络设备。
实施例9、根据实施例8所述的方法,其中,
所述第三消息用于指示所述第二资源与所述第一资源具有关联关系,所述关联关系指示所述第二资源用于发送通过所述第一资源接收的数据的反馈信息。
实施例10、根据实施例7所述的方法,其中,所述方法还包括:
所述第二终端设备接收来自第二网络设备的第三消息,所述第三消息用于指示第一资源池和第二资源池,所述第一资源池与所述第二资源池具有关联关系,所述关联关系指示,所述第二资源池所包括的资源,用于发送通过所述第一资源池包括的资源所接收的数据的反馈信息;
所述第二终端设备从所述第二资源池中选择所述第二资源,所述第一资源属于所述第一资源池。
实施例11、一种通信方法,其中,所述方法包括:
第一网络设备确定用于第一终端设备发送数据的发送资源,以及用于所述第一终端设备接收通过所述发送资源所发送的数据的反馈信息的反馈资源,其中,所述发送资源包括第一资源,所述反馈资源包括第二资源,或,所述发送资源包括第一资源池,所述反馈资源包括第二资源池;
所述第一网络设备向所述第一终端设备发送第一消息,所述第一消息用于指示所述发送资源,以及指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
实施例12、根据实施例11所述的方法,其中,所述方法还包括:
所述第一网络设备向第二网络设备发送第四消息,所述第四消息用于指示所述发送资源和所述反馈资源,所述第二网络设备是第二终端设备驻留的网络设备,所述第二终端设备是所述数据的接收端。
实施例13、根据实施例11所述的方法,其中,
所述第一消息用于指示所述发送资源和所述反馈资源具有关联关系,所述关联关系指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
实施例14、根据实施例11或实施例13所述的方法,其中,所述方法还包括:
所述第一网络设备将所述发送资源的信息发送给所述第二网络设备,所述发送资源的信息用于确定所述反馈资源的信息;
所述第一网络设备接收来自所述第二网络设备的所述反馈资源的信息。
实施例15、一种通信方法,其中,所述方法包括:
第二网络设备确定用于第二终端设备发送反馈信息的反馈资源,所述反馈资源用于所述第二终端设备发送通过发送资源所发送的数据的反馈信息,其中,所述发送资源包括第一资源,所述反馈资源包括第二资源,或,所述发送资源包括第一资源池,所述反馈资源包括第二资源池;
所述第二网络设备向所述第二终端设备发送第三消息,所述第三消息用于指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
实施例16、根据实施例15所述的方法,其中,所述方法还包括:
所述第二网络设备接收来自第一网络设备的第四消息,所述第四消息用于指示所述发送资源和所述反馈资源,所述第一网络设备是第一终端设备驻留的网络设备,所述第一终端设备是所述数据的发送端。
实施例17、根据实施例15所述的方法,其中,
所述第三消息用于指示所述发送资源和所述反馈资源具有关联关系,所述关联关系指示所述接收资源用于接收通过所述发送资源所发送的数据的反馈信息。
实施例18、根据实施例15或实施例17所述的方法,其中,所述方法还包括:
所述第二网络设备接收来自第一网络设备的所述发送资源的信息,所述第一网络设备是第一终端设备驻留的网络设备,所述第一终端设备是所述数据的发送端;
所述第二网络设备根据所述发送资源的信息确定所述反馈资源的信息;
所述第二网络设备将所述反馈资源的信息发送给所述第一网络设备。
实施例19、一种通信方法,其中,包括:
第一终端设备向第二终端设备发送数据;
所述第一终端设备接收来自所述第二终端设备的对应于所述数据的反馈信息,所述反馈信息包括所述数据对应的第一标识。
实施例20、根据实施例19所述的方法,其中,所述第一标识包括如下的一项或多项:
所述第一终端设备的标识;
随机数;或,
所述数据对应的HARQ进程号。
实施例21、根据实施例20所述的方法,其中,所述第一标识包括所述随机数,所述方法还包括:
所述第一终端设备将所述数据对应的所述随机数发送给所述第二终端设备。
实施例22、一种通信方法,其中,所述方法包括:
第二终端设备接收来自第一终端设备的数据;
所述第二终端设备向所述第一终端设备发送对应于所述数据的反馈信息,所述反馈信息包括所述数据对应的第一标识。
实施例23、根据实施例22所述的方法,其中,所述第一标识包括如下的一项或多项:
所述第一终端设备的标识;
随机数;或,
所述数据对应的HARQ进程号。
实施例24、根据实施例23所述的方法,其中,所述第一标识包括所述随机数,所述方法还包括:
所述第二终端设备接收来自所述第一终端设备的所述数据对应的所述随机数。
实施例25、一种通信装置,其中,所述通信装置包括:
收发模块,用于接收来自第一网络设备的第一消息;
处理模块,用于根据所述第一消息确定第一资源;
所述收发模块,还用于在所述第一资源上向第二终端设备发送数据;
所述收发模块,还用于在第二资源上接收来自所述第二终端设备的对应于所述数据的反馈信息,所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
实施例26、根据实施例25所述的通信装置,其中,所述第一消息用于指示,所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
实施例27、根据实施例25或实施例26所述的通信装置,其中,
所述第一消息用于指示,所述第二资源与所述第一资源具有关联关系,所述关联关系指示所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
实施例28、根据实施例27所述的通信装置,其中,所述第一消息用于指示所述第一资源池和所述第二资源池,所述第一资源池与所述第二资源池具有关联关系,所述关联关系指示,所述第二资源池所包括的资源,用于接收通过所述第一资源池包括的资源所发送的数据的反馈信息。
实施例29、根据实施例28所述的通信装置,其中,所述处理模块用于通过如下方式确定第一资源:
从第一资源池中选择所述第一资源。
实施例30、根据实施例28或实施例29所述的通信装置,其中,
所述处理模块,还用于从第二资源池中选择用于接收通过所述第一资源发送的数据的反馈信息的所述第二资源;
所述收发模块,还用于向所述第二终端设备发送第一指示信息,所述第一指示信息用于指示所述第二资源用于发送通过所述第一资源接收的数据的反馈信息。
实施例31、一种通信装置,其中,所述通信装置包括:
收发模块,用于在所述第一资源上接收来自第一终端设备的数据;
处理模块,用于确定对应于所述数据的反馈信息;
所述收发模块,还用于在第二资源上向所述第一终端设备发送所述反馈信息,所述第二资源用于接收通过所述第一资源发送的数据的反馈信息。
实施例32、根据实施例31所述的通信装置,其中,所述收发模块还用于:
接收来自所述第一终端设备的第一指示信息,所述第一指示信息用于指示所述第二资源,所述第二资源用于发送通过所述第一资源接收的数据的反馈信息;或,
接收来自第二网络设备的第三消息,所述第三消息用于指示所述第二资源,所述第二资源用于发送通过所述第一资源接收的数据的反馈信息,所述第二终端设备驻留在所述第二网络设备。
实施例33、根据实施例32所述的通信装置,其中,
所述第三消息用于指示所述第二资源与所述第一资源具有关联关系,所述关联关系指 示所述第二资源用于发送通过所述第一资源接收的数据的反馈信息。
实施例34、根据实施例31所述的通信装置,其中,
所述收发模块,还用于接收来自第二网络设备的第三消息,所述第三消息用于指示第一资源池和第二资源池,所述第一资源池与所述第二资源池具有关联关系,所述关联关系指示,所述第二资源池所包括的资源,用于发送通过所述第一资源池包括的资源所接收的数据的反馈信息;
所述处理模块,还用于从所述第二资源池中选择所述第二资源,所述第一资源属于所述第一资源池。
实施例35、一种网络设备,其中,所述网络设备包括:
处理模块,用于确定用于第一终端设备发送数据的发送资源,以及用于所述第一终端设备接收通过所述发送资源所发送的数据的反馈信息的反馈资源,其中,所述发送资源包括第一资源,所述反馈资源包括第二资源,或,所述发送资源包括第一资源池,所述反馈资源包括第二资源池;
收发模块,用于向所述第一终端设备发送第一消息,所述第一消息用于指示所述发送资源,以及指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
实施例36、根据实施例35所述的网络设备,其中,所述收发模块,还用于向第二网络设备发送第四消息,所述第四消息用于指示所述发送资源和所述反馈资源,所述第二网络设备是第二终端设备驻留的网络设备,所述第二终端设备是所述数据的接收端。
实施例37、根据实施例35所述的网络设备,其中,
所述第一消息用于指示所述发送资源和所述反馈资源具有关联关系,所述关联关系指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
实施例38、根据实施例35或实施例37所述的网络设备,其中,所述收发模块还用于:
将所述发送资源的信息发送给所述第二网络设备,所述发送资源的信息用于确定所述反馈资源的信息;
接收来自所述第二网络设备的所述反馈资源的信息。
实施例39、一种网络设备,其中,所述网络设备包括:
处理模块,用于确定用于第二终端设备发送反馈信息的反馈资源,所述反馈资源用于所述第二终端设备发送通过发送资源所发送的数据的反馈信息,其中,所述发送资源包括第一资源,所述反馈资源包括第二资源,或,所述发送资源包括第一资源池,所述反馈资源包括第二资源池;
收发模块,用于向所述第二终端设备发送第三消息,所述第三消息用于指示所述反馈资源用于接收通过所述发送资源所发送的数据的反馈信息。
实施例40、根据实施例39所述的网络设备,其中,所述收发模块,还用于接收来自第一网络设备的第四消息,所述第四消息用于指示所述发送资源和所述反馈资源,所述第一网络设备是第一终端设备驻留的网络设备,所述第一终端设备是所述数据的发送端。
实施例41、根据实施例39所述的网络设备,其中,
所述第三消息用于指示所述发送资源和所述反馈资源具有关联关系,所述关联关系指示所述接收资源用于接收通过所述发送资源所发送的数据的反馈信息。
实施例42、根据实施例39或实施例41所述的网络设备,其中,
所述收发模块,还用于接收来自第一网络设备的所述发送资源的信息,所述第一网络 设备是第一终端设备驻留的网络设备,所述第一终端设备是所述数据的发送端;
所述处理模块,还用于根据所述发送资源的信息确定所述反馈资源的信息;
所述收发模块,还用于将所述反馈资源的信息发送给所述第一网络设备。
实施例43、一种通信装置,其中,所述通信装置包括:
处理模块,用于确定数据;
收发模块,用于向第二终端设备发送所述数据;
所述收发模块,还用于接收来自所述第二终端设备的对应于所述数据的反馈信息,所述反馈信息包括所述数据对应的第一标识。
实施例44、根据实施例43所述的通信装置,其中,所述第一标识包括如下的一项或多项:
所述通信装置的标识;
随机数;或,
所述数据对应的HARQ进程号。
实施例45、根据实施例44所述的通信装置,其中,所述第一标识包括所述随机数,所述收发模块,还用于将所述数据对应的所述随机数发送给所述第二终端设备。
实施例46、一种通信装置,其中,所述通信装置包括:
收发模块,用于接收来自第一终端设备的数据;
处理模块,用于确定对应于所述数据的反馈信息;
所述收发模块,还用于向所述第一终端设备发送所述反馈信息,所述反馈信息包括所述数据对应的第一标识。
实施例47、根据实施例46所述的通信装置,其中,所述第一标识包括如下的一项或多项:
所述第一终端设备的标识;
随机数;或,
所述数据对应的HARQ进程号。
实施例48、根据实施例47所述的通信装置,其中,所述第一标识包括所述随机数,所述收发模块,还用于接收来自所述第一终端设备的所述数据对应的所述随机数。
实施例49、一种通信装置,其中,所述通信装置包括处理器和收发器,所述处理器和所述收发器耦合,能够执行如实施例1至实施例6中的任一个实施例所述的方法,或执行如实施例7至实施例10中的任一个实施例所述的方法,或执行如实施例11至实施例14中的任一个实施例所述的方法,或执行如实施例15至实施例18中的任一个实施例所述的方法。
实施例50、一种通信装置,其中,所述通信装置包括处理器和收发器,所述处理器和所述收发器耦合,能够执行如实施例19至实施例21中的任一个实施例所述的方法,或执行如实施例22至实施例24中的任一个实施例所述的方法。
实施例51、一种芯片,该芯片包括处理器,当该处理器执行指令时,处理器用于执行上述实施例1至实施例6中的任一个实施例所述的方法,或执行如实施例7至实施例10中的任一个实施例所述的方法,或执行如实施例11至实施例14中的任一个实施例所述的方法,或执行如实施例15至实施例18中的任一个实施例所述的方法。该指令可以来自芯片内部的存储器,也可以来自芯片外部的存储器。可选的,该芯片还包括输入输出电路。
实施例52、一种芯片,该芯片包括处理器,当该处理器执行指令时,处理器用于执行上述实施例19至实施例21中的任一个实施例所述的方法,或执行如实施例22至实施例24中的任一个实施例所述的方法。该指令可以来自芯片内部的存储器,也可以来自芯片外部的存储器。可选的,该芯片还包括输入输出电路。
实施例53、一种通信系统,其中,所述通信系统包括实施例25至实施例30中的任一个实施例所述的通信装置,实施例31至实施例34中的任一个实施例所述的通信装置,实施例35至实施例38中的任一个实施例所述的网络设备,以及实施例39至实施例42中的任一个实施例所述的网络设备。
实施例54、一种通信系统,其中,所述通信系统包括实施例43至实施例45中的任一个实施例所述的通信装置,实施例46至实施例48中的任一个实施例所述的通信装置。
实施例55、一种计算机可读存储介质,其中,所述计算机可读存储介质存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如实施例1至实施例6中的任一个实施例所述的方法,或执行如实施例7至实施例10中的任一个实施例所述的方法,或执行如实施例11至实施例14中的任一个实施例所述的方法,或执行如实施例15至实施例18中的任一个实施例所述的方法。
实施例56、一种计算机可读存储介质,其中,所述计算机可读存储介质存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如实施例19至实施例21中的任一个实施例所述的方法,或执行如实施例22至实施例24中的任一个实施例所述的方法。
实施例57、一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现实施例1至实施例6中的任一个实施例所述的方法,或实现如实施例7至实施例10中的任一个实施例所述的方法,或实现如实施例11至实施例14中的任一个实施例所述的方法,或实现如实施例15至实施例18中的任一个实施例所述的方法。
实施例58、一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现实施例19至实施例21中的任一个实施例所述的方法,或实现如实施例22至实施例24中的任一个实施例所述的方法。
实施例59、一种通信方法,其中,包括:
当第二终端设备驻留在第二网络设备时,接收第一消息,所述第一消息用于指示所述第二终端设备驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
所述第二终端设备驻留到所述第一网络设备。
实施例60、根据实施例59所述的方法,其中,接收第一消息,包括:
接收来自所述第二网络设备的第一消息;或,
接收来自第一终端设备的第一消息,所述第一终端设备驻留在所述第一网络设备;或,
接收来自所述第一网络设备的第一消息。
实施例61、根据实施例60所述的方法,其中,在接收来自所述第二网络设备的第一消息之前,还包括:
所述第二终端设备向所述第二网络设备发送请求消息,所述请求消息用于请求驻留到所述第一网络设备;或,
所述第二终端设备向所述第一网络设备发送第三消息,所述第三消息用于请求驻留到所述第一网络设备。
实施例62、根据实施例59~实施例61任一项所述的方法,其中,所述第二终端设备驻留到所述第一网络设备,包括:
所述第二终端设备根据所述第一网络设备的信息,通过小区重选驻留到所述第一网络设备。
实施例63、根据实施例59~实施例62任一项所述的方法,其中,所述方法还包括:
所述第二终端设备在所述第一网络设备下与第一终端设备建立侧行连接。
实施例64、根据实施例59~实施例63任一项所述的方法,其中,所述第一消息还包括所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
实施例65、根据实施例64所述的方法,其中,所述方法还包括:
所述第二终端设备向第一网络设备发送第五消息,所述第五消息包括所述第二终端设备的验证信息。
实施例66、一种通信方法,其中,包括:
第一终端设备接收来自第一网络设备的第二消息,所述第二消息用于指示第二终端设备驻留到所述第一网络设备,所述第二终端设备当前驻留在第二网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
所述第一终端设备向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
实施例67、根据实施例66所述的方法,其中,所述方法还包括:
所述第一终端设备向所述第一网络设备发送第三消息,所述第三消息用于指示所述第二终端设备驻留在所述第二网络设备。
实施例68、根据实施例66或实施例67所述的方法,其中,所述方法还包括:
所述第一终端设备在所述第一网络设备下与第二终端设备建立侧行连接。
实施例69、一种通信方法,其中,包括:
第一网络设备接收第三消息,所述第三消息用于指示第二终端设备驻留在第二网络设备,或用于指示驻留在第二网络设备的第二终端设备请求驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
所述第一网络设备发送第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备。
实施例70、根据实施例69所述的方法,其中,第一网络设备接收第三消息,包括:
所述第一网络设备接收来自所述第一终端设备的所述第三消息;或,
所述第一网络设备接收来自所述第二网络设备的所述第三消息;或,
所述第一网络设备接收来自所述第二终端设备的所述第三消息。
实施例71、根据实施例69或实施例70所述的方法,其中,所述第一网络设备发送第二消息,包括:
所述第一网络设备向驻留在所述第一网络设备的第一终端设备发送所述第二消息;或,
所述第一网络设备向所述第二网络设备发送所述第二消息。
实施例72、根据实施例69~实施例71任一项所述的方法,其中,所述方法还包括:
所述第一网络设备接收来自所述第二网络设备的所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
实施例73、根据实施例72所述的方法,其中,所述方法还包括:
所述第一网络设备向所述第二网络设备发送第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
实施例74、根据实施例72或实施例73所述的方法,其中,所述方法还包括:
所述第一网络设备接收来自所述第二终端设备的第五消息,所述第五消息包括所述第二终端设备的验证信息;
所述第一网络设备根据所述第五消息包括的所述第二终端设备的验证信息,和来自所述第二网络设备的所述第二终端设备的验证信息,进行验证;
当验证通过时,所述第一网络设备确定所述第二终端设备能够接入所述第一网络设备。
实施例75、一种通信方法,其中,包括:
第二网络设备确定驻留在所述第二网络设备的第二终端设备需驻留在第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
所述第二网络设备向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
实施例76、根据实施例75所述的方法,其中,第二网络设备确定驻留在所述第二网络设备的第二终端设备需驻留在第一网络设备,包括:
所述第二网络设备接收来自所述第一网络设备的第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备;或,
所述第二网络设备接收来自所述第二终端设备的请求消息,所述请求消息用于请求驻留到所述第一网络设备。
实施例77、根据实施例75或实施例76所述的方法,其中,所述方法还包括:
所述第二网络设备向所述第一网络设备发送所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
实施例78、根据实施例77所述的方法,其中,所述方法还包括:
所述第二网络设备接收来自所述第一网络设备的第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
实施例79、一种通信装置,其中,包括:
收发模块,用于当所述通信装置驻留在第二网络设备时,接收第一消息,所述第一消息用于指示所述通信装置驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
处理模块,用于驻留到所述第一网络设备。
实施例80、根据实施例79所述的通信装置,其中,所述收发模块用于通过如下方式接收第一消息:
接收来自所述第二网络设备的第一消息;或,
接收来自第一终端设备的第一消息,所述第一终端设备驻留在所述第一网络设备;或,
接收来自所述第一网络设备的第一消息。
实施例81、根据实施例80所述的通信装置,其中,
所述收发模块,还用于在接收来自所述第二网络设备的第一消息之前,向所述第二网 络设备发送请求消息,所述请求消息用于请求驻留到所述第一网络设备;或,
所述收发模块,还用于在接收来自所述第二网络设备的第一消息之前,向所述第一网络设备发送第三消息,所述第三消息用于请求驻留到所述第一网络设备。
实施例82、根据实施例79~实施例81任一项所述的通信装置,其中,所述处理模块用于通过如下方式使得所述通信装置驻留到所述第一网络设备,包括:
根据所述第一网络设备的信息,通过小区重选驻留到所述第一网络设备。
实施例83、根据实施例79~实施例82任一项所述的通信装置,其中,所述处理模块,还用于在所述第一网络设备下与第一终端设备建立侧行连接。
实施例84、根据实施例79~实施例83任一项所述的通信装置,其中,所述第一消息还包括所述通信装置的验证信息,所述通信装置的验证信息用于验证所述通信装置。
实施例85、根据实施例84所述的通信装置,其中,所述收发模块,还用于向第一网络设备发送第五消息,所述第五消息包括所述通信装置的验证信息。
实施例86、一种通信装置,其中,包括:
收发模块,用于接收来自第一网络设备的第二消息,所述第二消息用于指示第二终端设备驻留到所述第一网络设备,所述第二终端设备当前驻留在第二网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
处理模块,用于确定第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备;
所述收发模块,还用于向所述第二终端设备发送所述第一消息。
实施例87、根据实施例86所述的通信装置,其中,所述收发模块,还用于向所述第一网络设备发送第三消息,所述第三消息用于指示所述第二终端设备驻留在所述第二网络设备。
实施例88、根据实施例86或实施例87所述的通信装置,其中,所述处理模块,还用于在所述第一网络设备下与第二终端设备建立侧行连接。
实施例89、一种网络设备,其中,包括:
收发模块,用于接收第三消息,所述第三消息用于指示第二终端设备驻留在第二网络设备,或用于指示驻留在第二网络设备的第二终端设备请求驻留到所述网络设备,所述网络设备和所述第二网络设备对应于不同的PLMN;
处理模块,用于确定第二消息,所述第二消息用于指示所述第二终端设备驻留到所述网络设备;
所述收发模块,还用于发送所述第二消息。
实施例90、根据实施例89所述的网络设备,其中,所述收发模块用于通过如下方式接收第三消息:
接收来自所述第一终端设备的所述第三消息;或,
接收来自所述第二网络设备的所述第三消息;或,
接收来自所述第二终端设备的所述第三消息。
实施例91、根据实施例89或实施例90所述的网络设备,其中,所述收发模块用于通过如下方式发送第二消息,包括:
向驻留在所述网络设备的第一终端设备发送所述第二消息;或,
向所述第二网络设备发送所述第二消息。
实施例92、根据实施例89~实施例91任一项所述的网络设备,其中,所述收发模块,还用于接收来自所述第二网络设备的所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
实施例93、根据实施例92所述的网络设备,其中,所述收发模块,还用于向所述第二网络设备发送第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
实施例94、根据实施例92或93所述的网络设备,其中,
所述收发模块,还用于接收来自所述第二终端设备的第五消息,所述第五消息包括所述第二终端设备的验证信息;
所述处理模块,还用于根据所述第五消息包括的所述第二终端设备的验证信息,和来自所述第二网络设备的所述第二终端设备的验证信息,进行验证;
所述处理模块,还用于当验证通过时,确定所述第二终端设备能够接入所述网络设备。
实施例95、一种网络设备,其中,包括:
处理模块,用于确定驻留在所述网络设备的第二终端设备需驻留在第一网络设备,所述第一网络设备和所述网络设备对应于不同的PLMN;
收发模块,用于向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
实施例96、根据实施例95所述的网络设备,其中,所述处理模块用于通过如下方式确定驻留在所述网络设备的第二终端设备需驻留在第一网络设备:
通过所述收发模块接收来自所述第一网络设备的第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备;或,
通过所述收发模块接收来自所述第二终端设备的请求消息,所述请求消息用于请求驻留到所述第一网络设备。
实施例97、根据实施例95或96所述的网络设备,其中,所述收发模块,还用于向所述第一网络设备发送所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
实施例98、根据实施例97所述的网络设备,其中,所述收发模块,还用于接收来自所述第一网络设备的第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
实施例99、一种通信装置,其中,所述通信装置包括处理器和收发器,所述处理器和所述收发器耦合,能够执行如实施例59至实施例65中的任一个实施例所述的方法,或执行如实施例66至实施例68中的任一个实施例所述的方法。
实施例100、一种通信装置,其中,所述通信装置包括处理器和收发器,所述处理器和所述收发器耦合,能够执行如实施例69至实施例74中的任一个实施例所述的方法,或执行如实施例75至实施例78中的任一个实施例所述的方法。
实施例101、一种芯片,该芯片包括处理器,当该处理器执行指令时,处理器用于执行上述实施例59至实施例65中的任一个实施例所述的方法,或执行如实施例66至实施例68中的任一个实施例所述的方法,或执行如实施例69至实施例74中的任一个实施例所述的方法,或执行如实施例75至实施例78中的任一个实施例所述的方法。该指令可以来自芯片内部的存储器,也可以来自芯片外部的存储器。可选的,该芯片还包括输入输出电路。
实施例102、一种通信系统,其中,所述通信系统包括实施例79至实施例85中的任 一个实施例所述的通信装置,实施例86至实施例88中的任一个实施例所述的通信装置,实施例89至实施例94中的任一个实施例所述的网络设备,以及实施例95至实施例98中的任一个实施例所述的网络设备。
实施例103、一种计算机可读存储介质,其中,所述计算机可读存储介质存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如实施例59至实施例65中的任一个实施例所述的方法,或执行如实施例66至实施例68中的任一个实施例所述的方法,或执行如实施例69至实施例74中的任一个实施例所述的方法,或执行如实施例75至实施例78中的任一个实施例所述的方法。
实施例104、一种计算机程序产品,所述计算机程序产品用于存储计算机程序,该计算机程序被计算机执行时,所述计算机可以实现如实施例59至实施例65中的任一个实施例所述的方法,或实现如实施例66至实施例68中的任一个实施例所述的方法,或实现如实施例69至实施例74中的任一个实施例所述的方法,或实现如实施例75至实施例78中的任一个实施例所述的方法。
尽管在此结合各实施例对本申请进行了描述,然而,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。

Claims (23)

  1. 一种通信方法,其特征在于,包括:
    当第二终端设备驻留在第二网络设备时,接收第一消息,所述第一消息用于指示所述第二终端设备驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
    所述第二终端设备驻留到所述第一网络设备。
  2. 根据权利要求1所述的方法,其特征在于,接收第一消息,包括:
    接收来自所述第二网络设备的第一消息;或,
    接收来自第一终端设备的第一消息,所述第一终端设备驻留在所述第一网络设备;或,
    接收来自所述第一网络设备的第一消息。
  3. 根据权利要求2所述的方法,其特征在于,在接收来自所述第二网络设备的第一消息之前,还包括:
    所述第二终端设备向所述第二网络设备发送请求消息,所述请求消息用于请求驻留到所述第一网络设备;或,
    所述第二终端设备向所述第一网络设备发送第三消息,所述第三消息用于请求驻留到所述第一网络设备。
  4. 根据权利要求1~3任一项所述的方法,其特征在于,所述第二终端设备驻留到所述第一网络设备,包括:
    所述第二终端设备根据所述第一网络设备的信息,通过小区重选驻留到所述第一网络设备。
  5. 根据权利要求1~4任一项所述的方法,其特征在于,所述方法还包括:
    所述第二终端设备在所述第一网络设备下与第一终端设备建立侧行连接。
  6. 根据权利要求1~5任一项所述的方法,其特征在于,所述第一消息还包括所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    所述第二终端设备向第一网络设备发送第五消息,所述第五消息包括所述第二终端设备的验证信息。
  8. 一种通信方法,其特征在于,包括:
    第一终端设备接收来自第一网络设备的第二消息,所述第二消息用于指示第二终端设备驻留到所述第一网络设备,所述第二终端设备当前驻留在第二网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
    所述第一终端设备向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    所述第一终端设备向所述第一网络设备发送第三消息,所述第三消息用于指示所述第二终端设备驻留在所述第二网络设备。
  10. 根据权利要求8或9所述的方法,其特征在于,所述方法还包括:
    所述第一终端设备在所述第一网络设备下与第二终端设备建立侧行连接。
  11. 一种通信方法,其特征在于,包括:
    第一网络设备接收第三消息,所述第三消息用于指示第二终端设备驻留在第二网络设备,或用于指示驻留在第二网络设备的第二终端设备请求驻留到第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
    所述第一网络设备发送第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备。
  12. 根据权利要求11所述的方法,其特征在于,第一网络设备接收第三消息,包括:
    所述第一网络设备接收来自所述第一终端设备的所述第三消息;或,
    所述第一网络设备接收来自所述第二网络设备的所述第三消息;或,
    所述第一网络设备接收来自所述第二终端设备的所述第三消息。
  13. 根据权利要求11或12所述的方法,其特征在于,所述第一网络设备发送第二消息,包括:
    所述第一网络设备向驻留在所述第一网络设备的第一终端设备发送所述第二消息;或,
    所述第一网络设备向所述第二网络设备发送所述第二消息。
  14. 根据权利要求11~13任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备接收来自所述第二网络设备的所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
  15. 根据权利要求14所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备向所述第二网络设备发送第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
  16. 根据权利要求14或15所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备接收来自所述第二终端设备的第五消息,所述第五消息包括所述第二终端设备的验证信息;
    所述第一网络设备根据所述第五消息包括的所述第二终端设备的验证信息,和来自所述第二网络设备的所述第二终端设备的验证信息,进行验证;
    当验证通过时,所述第一网络设备确定所述第二终端设备能够接入所述第一网络设备。
  17. 一种通信方法,其特征在于,包括:
    第二网络设备确定驻留在所述第二网络设备的第二终端设备需驻留在第一网络设备,所述第一网络设备和所述第二网络设备对应于不同的PLMN;
    所述第二网络设备向所述第二终端设备发送第一消息,所述第一消息用于指示所述第二终端设备驻留到所述第一网络设备。
  18. 根据权利要求17所述的方法,其特征在于,第二网络设备确定驻留在所述第二网络设备的第二终端设备需驻留在第一网络设备,包括:
    所述第二网络设备接收来自所述第一网络设备的第二消息,所述第二消息用于指示所述第二终端设备驻留到所述第一网络设备;或,
    所述第二网络设备接收来自所述第二终端设备的请求消息,所述请求消息用于请求驻留到所述第一网络设备。
  19. 根据权利要求17或18所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备向所述第一网络设备发送所述第二终端设备的验证信息,所述第二终端设备的验证信息用于验证所述第二终端设备。
  20. 根据权利要求19所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备接收来自所述第一网络设备的第四消息,所述第四消息用于请求获得所述第二终端设备的验证信息。
  21. 一种通信装置,其特征在于,包括收发模块和处理模块,所述收发模块和所述处理模块耦合,能够执行如权利要求1~7任一项所述的方法,或执行如权利要求8~10任一项所述的方法。
  22. 一种网络设备,其特征在于,包括收发模块和处理模块,所述收发模块和所述处理模块耦合,能够执行如权利要求11~16任一项所述的方法,或执行如权利要求17~20任一项所述的方法。
  23. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1~7中任意一项所述的方法,或者使得所述计算机执行如权利要求8~10中任意一项所述的方法,或者使得所述计算机执行如权利要求11~16中任意一项所述的方法,或者使得所述计算机执行如权利要求17~20中任意一项所述的方法。
PCT/CN2020/122177 2019-11-07 2020-10-20 一种通信方法、装置及设备 WO2021088638A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP20883830.0A EP4044671A4 (en) 2019-11-07 2020-10-20 COMMUNICATION METHOD AND DEVICE AND DEVICE

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911083630.9A CN112788673B (zh) 2019-11-07 2019-11-07 一种通信方法、装置及设备
CN201911083630.9 2019-11-07

Publications (1)

Publication Number Publication Date
WO2021088638A1 true WO2021088638A1 (zh) 2021-05-14

Family

ID=75747988

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/122177 WO2021088638A1 (zh) 2019-11-07 2020-10-20 一种通信方法、装置及设备

Country Status (3)

Country Link
EP (1) EP4044671A4 (zh)
CN (1) CN112788673B (zh)
WO (1) WO2021088638A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018129875A1 (zh) * 2017-01-10 2018-07-19 华为技术有限公司 一种通信路径转换方法及设备
CN108323242A (zh) * 2017-02-27 2018-07-24 华为技术有限公司 切换方法、设备及系统
CN108432309A (zh) * 2015-11-06 2018-08-21 太阳专利托管公司 在侧行链路控制时段期间的多侧行链路控制传输

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1622678A (zh) * 2003-11-27 2005-06-01 皇家飞利浦电子股份有限公司 在处于不同小区中的用户终端之间建立点到点通信的方法和装置
US20110010533A1 (en) * 2005-09-20 2011-01-13 Matsushita Electric Industrial Co., Ltd. System and Method for Component Trust Model in Peer-to-Peer Service Composition
CN101466127B (zh) * 2008-12-30 2010-06-09 上海无线通信研究中心 一种提高切换成功率的小区切换方法
CN102438294B (zh) * 2010-09-29 2014-02-26 电信科学技术研究院 一种m2m终端接入网络的方法及m2m通信系统
US8711844B2 (en) * 2011-01-10 2014-04-29 Vtech Telecommunications Limited Peer-to-peer, internet protocol telephone system with proxy interface for configuration data
US9706589B2 (en) * 2012-09-18 2017-07-11 Telefonaktiebolaget Lm Ericsson (Publ) Network nodes, devices and methods therein for enabling device to device communication
MX371284B (es) * 2014-05-09 2020-01-24 Deutsche Telekom Ag Método, equipo de usuario, sistema, red de comunicación móvil, programa y producto de programa de computadora para mejorar la comunicación de dispositivo a dispositivo.
US9655039B2 (en) * 2015-06-26 2017-05-16 Qualcomm Incorporated Dynamic cell reselection to improve device-to-device communications
CN106792987B (zh) * 2015-11-20 2020-09-01 小米科技有限责任公司 网络选择方法及装置
WO2018111793A1 (en) * 2016-12-14 2018-06-21 Intel IP Corporation Camping in the context of device-to-device communication capability in a wireless device
EP3588992A4 (en) * 2017-03-10 2020-02-19 Guangdong Oppo Mobile Telecommunications Corp., Ltd. COMMUNICATION METHOD AND TERMINAL DEVICE

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108432309A (zh) * 2015-11-06 2018-08-21 太阳专利托管公司 在侧行链路控制时段期间的多侧行链路控制传输
WO2018129875A1 (zh) * 2017-01-10 2018-07-19 华为技术有限公司 一种通信路径转换方法及设备
CN108323242A (zh) * 2017-02-27 2018-07-24 华为技术有限公司 切换方法、设备及系统

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Multi-Carrier Scenarios for Vehicle-to-Vehicle Communication", 3GPP TSG-RAN WG4 MEETING #78BIS R4-161754, 15 April 2016 (2016-04-15), XP051083752 *
QUALCOMM INC.: "Procedure aspects of inter-PLMN discovery transmission support", SA WG2 MEETING #111 S2-153657, 23 October 2015 (2015-10-23), XP051035223 *
See also references of EP4044671A4 *

Also Published As

Publication number Publication date
EP4044671A4 (en) 2023-01-04
CN112788673A (zh) 2021-05-11
CN112788673B (zh) 2023-05-05
EP4044671A1 (en) 2022-08-17

Similar Documents

Publication Publication Date Title
US10966139B2 (en) Apparatus and method for routing data packet to user equipment in LTE-WLAN aggregation system
US11432220B2 (en) V2X network assisted side-link configuration and data transmission
KR102404125B1 (ko) 실패 처리 방법, 스위칭 방법, 단말 디바이스, 및 네트워크 디바이스
AU2018202590A1 (en) Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network
CN114900547B (zh) 一种通信方法及装置
WO2019019224A1 (zh) 命令接收方法、装置及通信系统
CN113286331B (zh) 重建立的方法和通信装置
WO2020216133A1 (zh) 一种通信方法及设备
US20220417821A1 (en) V2X Network Assisted Side-link Configuration and Data Transmission
WO2021000688A1 (zh) 一种发送、接收能力信息的方法及设备
CN113747516B (zh) 一种实现业务连续性的方法及装置
CN113727342B (zh) 网络注册的方法和装置
CN116491166A (zh) 通信配置的方法和通信装置
WO2020211778A1 (zh) 小区切换方法以及装置
US11991785B2 (en) Communication method and device for use with a packet data convergence protocol (PDCP) duplicate transmission function
WO2021258766A1 (zh) 一种配置终端设备的方法及设备
CN113873492A (zh) 一种通信方法以及相关装置
CN115843125A (zh) 通信方法和通信装置
WO2021088638A1 (zh) 一种通信方法、装置及设备
WO2021134763A1 (zh) 一种恢复传输的方法、装置及设备
WO2021097689A1 (zh) 一种通信方法、装置及设备
WO2021042387A1 (zh) 一种通信方法、装置及设备
CN116250290A (zh) 无线通信方法、终端设备、第一接入网设备以及网元
WO2023273880A1 (zh) 传输方式切换的方法和相关装置
WO2022141298A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20883830

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020883830

Country of ref document: EP

Effective date: 20220510