WO2022006725A1 - 一种通信方法及装置 - Google Patents

一种通信方法及装置 Download PDF

Info

Publication number
WO2022006725A1
WO2022006725A1 PCT/CN2020/100506 CN2020100506W WO2022006725A1 WO 2022006725 A1 WO2022006725 A1 WO 2022006725A1 CN 2020100506 W CN2020100506 W CN 2020100506W WO 2022006725 A1 WO2022006725 A1 WO 2022006725A1
Authority
WO
WIPO (PCT)
Prior art keywords
data packet
data packets
communication device
data
time information
Prior art date
Application number
PCT/CN2020/100506
Other languages
English (en)
French (fr)
Inventor
黄曲芳
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2020/100506 priority Critical patent/WO2022006725A1/zh
Priority to CN202080102563.5A priority patent/CN116134846A/zh
Priority to EP20944764.8A priority patent/EP4167527A4/en
Publication of WO2022006725A1 publication Critical patent/WO2022006725A1/zh
Priority to US18/150,975 priority patent/US20230164626A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/28Flow control; Congestion control in relation to timing considerations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • H04W28/065Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information using assembly or disassembly of packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/65Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/80Responding to QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • H04W28/09Management thereof
    • H04W28/0958Management thereof based on metrics or performance parameters
    • H04W28/0967Quality of Service [QoS] parameters
    • H04W28/0975Quality of Service [QoS] parameters for reducing delays

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a communication method and apparatus.
  • the R16 version of 5G introduces the characteristics of the industrial internet of things (IIoT).
  • various functional nodes in the industrial control system are connected, including the industrial controller that issues control commands, the operating arm that receives control commands, and the configuration unit that configures the nodes such as the controller and the operating arm.
  • the 5G system provides flexible routing methods, and various industrial controllers and operating arms can be quickly organized into different production lines, so as to achieve the purpose of flexible deployment and adapt to small batches and diversified production needs. How to transmit data packets among multiple communication devices is a technical problem to be solved in the embodiments of the present application.
  • Embodiments of the present application provide a communication method and device to solve the technical problem of transmitting data packets between different communication devices.
  • a communication method where the execution body of the method is a first communication device, and the first communication device may be a communication device, or a component (chip, circuit or other, etc.) in a communication device, including: a first communication device.
  • a communication device receives a plurality of data packets from a second communication device, the plurality of data packets are data packets of the first service, the plurality of data packets are data packets of a plurality of periods, and the plurality of data packets are The period is less than the maximum delay of the first service; the first communication device reports the plurality of data packets to the third communication device after the end time of the first period, and the length of the first period is not greater than the The maximum delay of the first service.
  • the first communication device centrally reports a plurality of data packets to the third communication device, thereby improving the transmission efficiency and reducing the complexity of data scheduling.
  • the above-mentioned first period of time is implemented by a timer.
  • the first communication device starts a timer when receiving the first data packet from the second communication device, and reports the received multiple data packets to the third communication device after the timer expires.
  • the duration of the timer is less than or equal to the maximum delay of the first service.
  • the above-mentioned first period of time is implemented by a counter.
  • the first communication device receives the first data packet from the third communication device, it starts the counter, and each time the counter receives a data packet, the count value is incremented by 1, and when the count value reaches the threshold or threshold, the counter is sent to the third communication device.
  • the communication device reports the plurality of data packets; wherein, the threshold or the threshold is determined according to the period of the data packets and the maximum delay of the first service. For example, if the maximum delay of the first service is 200ms and the period is 5ms, the value of the above threshold or threshold is 40.
  • the counter method can also be used, and the implementation methods are diversified to meet the needs of different scenarios.
  • the first communication device may delete time information of a second data packet in the plurality of data packets, and the second data packet is a data packet of the plurality of data packets whose time information needs to be deleted;
  • the third communication device reports the plurality of data packets.
  • the deleting the time information of the second data packet in the plurality of data packets specifically includes: the first communication device determines the second data packet according to the parameters of the plurality of data packets ; the first communication device deletes the time information at the first position of the second data packet, and the first position is pre-configured.
  • the deleting the time information of the second data packet in the plurality of data packets includes: the first communication device determines the second data packet through an artificial intelligence AI algorithm; the first communication device determines the second data packet through an artificial intelligence AI algorithm; The communication device determines the first position of the time information in the second data packet through the AI algorithm; the first communication device deletes the time information in the second data packet at the first position.
  • the AI algorithm is used to determine the second data packet of the time information to be deleted and the position of the time information to be deleted in the second data packet, and the accuracy is high through long-term AI training.
  • the second data packet includes first indication information, where the first indication information is used to indicate the data packet from which the time information has been deleted.
  • the first indication information is directly carried in the data packet that needs to delete the time information, and other parameters of the data packet, such as MAC address, source address, destination port, source port number, etc., are no longer limited.
  • the first communication device can delete the time information in any data packet by carrying the first indication information in the data packet, with high flexibility.
  • a communication method where the execution body of the method is a third communication device, and the third communication device may be a communication device, or a component (chip, circuit, or others) configured in the communication device, including : the third communication device receives a plurality of data packets from the first communication device after the end time of the first period, the plurality of data packets are data packets of the first service, and the plurality of data packets are of a plurality of cycles and the period of the plurality of data packets is less than the maximum delay of the first service, and the length of the first period is not greater than the maximum delay of the first service.
  • the overhead required for data transmission is reduced and the efficiency of wireless transmission is improved by centrally transmitting multiple data packets.
  • the third communication device adds time information to a second data packet in the plurality of data packets, and the second data packet is the deleted time in the plurality of data packets packet of information.
  • adding time information to a second data packet in the plurality of data packets includes: the third communication device determining the second data packet according to parameters of the plurality of data packets packet; the third communication apparatus adds the time information at a first position in the second data packet, where the first position is pre-configured.
  • the adding time information to the second data packet in the plurality of data packets includes: the third communication device determines to carry the first indication in the plurality of data packets The second data packet of the information, the first indication information is used to indicate that the data packet of the time information is deleted; the third communication device adds the time information at the first position in the second data packet, so The first location is preconfigured.
  • the adding time information to the second data packet in the plurality of data packets includes: the third communication device determines, through an artificial intelligence (AI) algorithm, whether the time information is in the plurality of data packets.
  • AI artificial intelligence
  • the method further includes: the third communication device determining the time information of the second data packet according to the transmission periods of the plurality of data packets. Or, determine the receiving time of the first data packet, where the first data packet is the first data packet in the plurality of data packets; according to the receiving time and transmission delay of the first data packet, determine the the time information of the second data packet.
  • a communication method where the execution body of the method is a first communication device, and the first communication device may be a communication device, or a component (chip, circuit, or others) in a communication device, including: the first communication device. a communication device, receiving a third data packet from a second communication device; the first communication device deletes the time information in the third data packet; the first communication device sends a fourth data packet to the third communication device, the first communication device The fourth data packet is the data packet after the time information of the third data packet is deleted.
  • the deleting the time information in the third data packet includes: the first communication device acquires the parameter of the third data packet; when the parameter meets a preset condition, the first communication device A communication device deletes the time information at a first position in the third data packet, where the first position is pre-configured.
  • the deleting the time information in the third data packet includes: the first communication device determines, through an artificial intelligence AI algorithm, that the third data packet contains the time information to be deleted; The first communication device determines, through the AI algorithm, the first position of the time information in the third data packet; the first communication device is at the first position and deletes the time information.
  • the fourth data packet carries first indication information, where the first indication information is used to indicate time information that the fourth data packet has been deleted.
  • a communication method is provided, and the execution body of the method is a third communication device, and the third communication device may be a communication device, or a component (chip, circuit or others) in the communication device, including: the first communication device.
  • the third communication device receives the fourth data packet from the first communication device, and the time information is deleted from the fourth data packet; the third communication device adds the time information in the fourth data packet.
  • the sender i.e. the first communication device
  • the receiver i.e. the third communication device
  • the operation of complementing the time information after receiving the data packet which can reduce the data transmission rate in the air interface. Packet overhead and improve spectrum utilization.
  • the adding the time information in the fourth data packet includes: a third communication device obtains a parameter of the fourth data packet; when the parameter meets a preset condition, the third communication The device adds the time information at a first position in the fourth data packet, where the first position is pre-configured.
  • the adding the time information in the fourth data packet includes: when the fourth data packet includes the first indication information, the third communication device adds the time information in the fourth data packet In the first position of , add the time information, the first indication information is used to indicate that the fourth data packet has been deleted time information, and the first position is specified by the protocol.
  • the adding the time information in the fourth data packet includes: the third communication device determines, through an artificial intelligence AI algorithm, that the fourth data packet is a data packet with time information deleted; The communication device determines the first position in the fourth data packet through the AI algorithm; the third communication device adds the time information at the first position in the fourth data packet.
  • the method further includes: the third communication apparatus determining the time information according to the sending period of the fourth data packet. Or, determine the reception time of the fourth data packet; and determine the time information according to the reception time of the fourth data packet and the transmission delay.
  • a communication method where the execution subject of the method is a first communication device, and the first communication device may be a communication device, or a component (chip, circuit or others, etc.) in a communication device, including: the first communication device.
  • a communication device generates a fifth data packet; the first communication device sends the fifth data packet to the second communication device; the first communication device receives the sixth data packet from the third communication device; Five data packets and the sixth data packet, it is determined whether to transmit the sixth data packet to the second communication device.
  • the sender that is, the first communication device, predicts the content of the packet, and generates the predicted packet. Before the actual data packet arrives, the predicted data packet is sent first, which can reduce the data transmission delay.
  • the determining whether to transmit the sixth data packet to the second communication device according to the fifth data packet and the sixth data packet includes: if the fifth data packet and the sixth data packet are If they are the same, the first communication device will no longer transmit the sixth data packet to the second communication device; or, if the fifth data packet is not the same as the sixth data packet, the first communication device will transmit the sixth data packet to the second communication device.
  • the second communication device transmits the sixth data packet.
  • the sender only sends data packets that are different from the actual packet and the predicted packet, and the air interface overhead can be further reduced on the basis of reducing the data transmission delay.
  • the number of the fifth data packets is N1
  • the number of the sixth data packets is N2
  • the N1 and N2 are both positive integers, when the N1 fifth data packets and N2
  • a sixth data packet different from the fifth data packet is transmitted to the second communication device.
  • the sender when multiple data packets are sent together, the sender only sends some different data packets instead of re-sending the entire data packet, which can reduce air interface overhead.
  • the method further includes: if the number of the fifth data packets is greater than the number of the sixth data packets, the first communication device sends a notification message to the second communication device, where the notification message is used to notify The second communication device deletes the redundant fifth data packet.
  • the sender when the predicted data packets are more than the real data packets, the sender notifies the receiver to delete the redundant data packets, which can prevent the receiver from performing wrong operations and ensure the safety of industrial control.
  • a communication method is provided, the execution subject of the method is a second communication device, and the second communication device may be a communication device, or a component (chip, circuit or other, etc.) in the communication device, including: the first communication device.
  • the second communication device receives the fifth data packet from the first communication device; when receiving the sixth data packet, the second communication device submits the sixth data packet to the application layer, otherwise submits the fifth data packet to the application layer .
  • the receiver that is, the third communication device, receives the real data packet, it submits the real data packet to the corresponding layer, otherwise it submits the predicted data packet. Since the data packets are predicted to arrive earlier, the data transmission delay can be reduced.
  • the method further includes: the second communication device deletes the fifth data packet.
  • a communication method is provided, the execution subject of the method is a first communication device, and the first communication device may be a communication device, or a component (chip, circuit or others) in the communication device, including: the first communication device.
  • a communication device generates the seventh data packet; the first communication device receives the eighth data packet from the second communication device; the first communication device determines whether to communicate with the third data packet according to the seventh data packet and the eighth data packet
  • the apparatus transmits the eighth data packet.
  • the sender and the receiver that is, the first communication device and the third communication device simultaneously activate the data packet prediction function, and both perform data packet prediction.
  • both parties only need to transmit the real data packets that are different from the predicted data packets, and do not need to transmit the predicted data packets, which further reduces the signaling overhead and data delay.
  • the first communication device and the second communication device may use an AI algorithm to predict data packets.
  • the determining, according to the seventh data packet and the eighth data packet, whether to transmit the eighth data packet to the third communication device includes: if the eighth data packet is the same as the seventh data packet If the data packets are the same, the first communication device will no longer transmit the eighth data packet to the third communication device; or, if the eighth data packet is different from the seventh data packet, the first communication device will transmit the eighth data packet to the third communication device.
  • the third communication device transmits the eighth data packet.
  • a communication method is provided, the execution subject of the method is a third communication device, and the third communication device may be a communication device, or a component (chip, circuit or others, etc.) in the communication device, including: the first communication device.
  • the third communication device generates the seventh data packet; if receiving the eighth data packet from the first communication device, the third communication device submits the eighth data packet to the application layer, otherwise submits the seventh data packet to the application layer .
  • the receiver's third communication device introduces a data packet prediction function, which further reduces the amount of data transmitted in the network and improves system efficiency.
  • the method further includes: the third communication device deletes the seventh data packet.
  • an embodiment of the present application further provides a device, and reference may be made to the description of the first aspect for beneficial effects.
  • the apparatus has the function of implementing the behavior in the method embodiment of the first aspect.
  • the functions can be implemented by executing corresponding hardware or software.
  • the hardware or software may include one or more units corresponding to the above functions.
  • the device includes: a communication unit, configured to receive a plurality of data packets from the second communication device, where the plurality of data packets are data packets of the first service, and the plurality of data packets are data packets of multiple cycles, and the cycles of the multiple data packets are less than the maximum delay of the first service; the communication unit is further configured to communicate with a third party after the end time of the first time period The device reports the multiple data packets, and the length of the first period is not greater than the maximum delay of the first service.
  • These units may perform the corresponding functions in the method examples of the first aspect. For details, refer to the detailed descriptions in the method examples, which will not be repeated here.
  • an embodiment of the present application further provides a device, and for beneficial effects, reference may be made to the description of the second aspect.
  • the apparatus has the function of implementing the behavior in the method embodiment of the second aspect.
  • the functions can be performed by executing corresponding hardware or software.
  • the hardware or software may include one or more modules corresponding to the above functions.
  • the device includes: a communication unit, configured to receive a plurality of data packets from the first communication device after the end time of the first period, where the plurality of data packets are data of the first service
  • the multiple data packets are data packets of multiple periods, and the period of the multiple data packets is less than the maximum delay of the first service, and the length of the first period is not greater than the first service. maximum delay.
  • an embodiment of the present application further provides a device, and for beneficial effects, reference may be made to the description of the third aspect.
  • the apparatus has the function of implementing the behavior in the method embodiment of the second aspect.
  • the functions can be performed by executing corresponding hardware or software.
  • the hardware or software may include one or more modules corresponding to the above functions.
  • the device includes: a communication unit for receiving a third data packet from the second communication device; a processing unit for deleting time information in the third data packet; a communication unit, further It is used for sending a fourth data packet to a third communication device, where the fourth data packet is a data packet after the time information of the third data packet is deleted.
  • an embodiment of the present application further provides a device, and for beneficial effects, reference may be made to the description of the fourth aspect.
  • the apparatus has the function of implementing the behavior in the method embodiment of the second aspect.
  • the functions can be implemented by corresponding hardware or software.
  • the hardware or software may include one or more modules corresponding to the above functions.
  • the device includes: a communication unit for receiving a fourth data packet from the first communication device, the fourth data packet is deleted with time information; a processing unit for in the fourth data packet In the data packet, the time information is added.
  • an embodiment of the present application further provides a device, and for beneficial effects, reference may be made to the description of the fifth aspect.
  • the apparatus has the function of implementing the behavior in the method embodiment of the fifth aspect.
  • the functions can be performed by executing corresponding hardware or software.
  • the hardware or software may include one or more modules corresponding to the above functions.
  • the device includes: a processing unit, configured to generate a fifth data packet; a communication unit, configured to send the fifth data packet to a second communication device; and a communication unit, further configured to receive data from a second communication device The sixth data packet of the third communication device; the processing unit is further configured to determine whether to transmit the sixth data packet to the second communication device according to the fifth data packet and the sixth data packet.
  • an embodiment of the present application further provides a device, and for beneficial effects, reference may be made to the description of the sixth aspect.
  • the apparatus has the function of implementing the behavior in the method embodiment of the sixth aspect.
  • the functions can be performed by executing corresponding hardware or software.
  • the hardware or software may include one or more modules corresponding to the above functions.
  • the apparatus includes: the communication unit receives the fifth data packet from the first communication apparatus; the communication unit is configured to deliver the sixth data packet to the application layer when the sixth data packet is received , otherwise the fifth data packet is delivered to the application layer.
  • an embodiment of the present application further provides a device, and for beneficial effects, reference may be made to the description of the seventh aspect.
  • the apparatus has the function of implementing the behavior in the method embodiment of the seventh aspect.
  • the functions can be performed by executing corresponding hardware or software.
  • the hardware or software may include one or more modules corresponding to the above functions.
  • the apparatus includes: a processing unit for generating a seventh data packet; a communication unit for receiving an eighth data packet from the second communication apparatus; and a processing unit for according to the seventh data packet The data packet and the eighth data packet, determine whether to transmit the eighth data packet to the third communication device.
  • These units may perform the corresponding functions in the method example of the seventh aspect. For details, please refer to the detailed description in the method example, which will not be repeated here.
  • an embodiment of the present application further provides a device, and the beneficial effects can be found in the description of the eighth aspect.
  • the apparatus has the function of implementing the behavior in the method embodiment of the second aspect.
  • the functions can be performed by executing corresponding hardware or software.
  • the hardware or software may include one or more modules corresponding to the above functions.
  • the device includes: a processing unit, configured to generate a seventh data packet; a communication unit, configured to deliver the first data packet to the application layer if the eighth data packet from the first communication device is received Eight data packets, otherwise the seventh data packet is submitted to the application layer.
  • a seventeenth aspect provides an apparatus, and the apparatus may be the first communication apparatus in the method embodiment of the first aspect.
  • the apparatus includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled to the memory and the communication interface, and when the processor executes the computer program or instructions, the device is made to execute the first communication device in the method embodiment of the first aspect. method of execution.
  • an apparatus may be the third communication apparatus in the method embodiment of the second aspect.
  • the apparatus includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled with the memory and the communication interface, and when the processor executes the computer program or instructions, the device is made to execute the method performed by the third communication device in the method embodiment of the second aspect. method of execution.
  • a nineteenth aspect provides an apparatus, and the apparatus may be the first communication apparatus in the method embodiment of the third aspect.
  • the apparatus includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled with the memory and the communication interface, and when the processor executes the computer program or instructions, the device is made to execute the method performed by the first communication device in the method embodiment of the third aspect. method of execution.
  • an apparatus in a twentieth aspect, is provided, and the apparatus may be the fourth communication apparatus in the method embodiment of the fourth aspect.
  • the apparatus includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled with the memory and the communication interface, and when the processor executes the computer program or instructions, the device is made to execute the method described by the third communication device in the method embodiment of the fourth aspect. method of execution.
  • a twenty-first aspect provides an apparatus, where the apparatus may be the first communication apparatus in the method embodiment of the fifth aspect.
  • the apparatus includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled with the memory and the communication interface, and when the processor executes the computer program or instructions, it causes the apparatus to execute the method executed by the terminal device in the method embodiment of the fifth aspect. method.
  • a twenty-second aspect provides an apparatus, where the apparatus may be the second communication apparatus in the method embodiment of the sixth aspect.
  • the apparatus includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled with the memory and the communication interface, and when the processor executes the computer program or instructions, the device is made to execute the method described in the sixth aspect above by the second communication device. method of execution.
  • a twenty-third aspect provides an apparatus, and the apparatus may be the first communication apparatus in the method embodiment of the seventh aspect.
  • the apparatus includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled with the memory and the communication interface, and when the processor executes the computer program or instructions, the device is made to perform the method performed by the first communication device in the method embodiment of the seventh aspect. method of execution.
  • a twenty-fourth aspect provides an apparatus, and the apparatus may be the third communication apparatus in the method embodiment of the eighth aspect.
  • the apparatus includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled to the memory and the communication interface, and when the processor executes the computer program or instructions, the device is made to execute the third communication device in the method embodiment of the eighth aspect above. method of execution.
  • a twenty-fifth aspect provides a computer program product, the computer program product comprising: computer program code, when the computer program code is executed, the method performed by the first communication device in the above-mentioned first aspect is implement.
  • a computer program product comprising: computer program code, when the computer program code is executed, the method performed by the third communication device in the above second aspect is implement.
  • a twenty-seventh aspect provides a computer program product, the computer program product comprising: computer program code, when the computer program code is executed, the method performed by the first communication device in the above third aspect is implement.
  • a computer program product comprising: computer program code, when the computer program code is executed, the method performed by the third communication device in the above fourth aspect is implement.
  • a twenty-ninth aspect provides a computer program product, the computer program product comprising: computer program code, when the computer program code is executed, the method performed by the first communication device in the fifth aspect is implement.
  • a computer program product comprising: computer program code, when the computer program code is executed, the method performed by the second communication device in the sixth aspect above is executed .
  • a computer program product comprising: computer program code, when the computer program code is executed, the method performed by the first communication device in the above seventh aspect is implement.
  • a thirty-second aspect provides a computer program product, the computer program product comprising: computer program code, when the computer program code is executed, the method performed by the third communication device in the above eighth aspect is implement.
  • the present application provides a chip system, where the chip system includes a processor for implementing the function of the first communication device in the method of the first aspect.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present application provides a chip system, where the chip system includes a processor for implementing the function of the third communication device in the method of the second aspect.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present application provides a chip system, where the chip system includes a processor for implementing the function of the first communication device in the method of the third aspect.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present application provides a chip system, where the chip system includes a processor for implementing the function of the third communication device in the method of the fourth aspect.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present application provides a chip system, where the chip system includes a processor for implementing the function of the first communication device in the method of the fifth aspect.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present application provides a chip system, where the chip system includes a processor for implementing the function of the second communication device in the method of the sixth aspect.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present application provides a chip system, where the chip system includes a processor for implementing the function of the first communication device in the method of the seventh aspect.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present application provides a chip system, where the chip system includes a processor for implementing the function of the third communication device in the method of the eighth aspect.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed, the above-mentioned first aspect executed by the first communication device is implemented. method.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed, the above-mentioned second aspect is executed by the third communication device. method.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed, the above third aspect is executed by the first communication device. method.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed, the above-mentioned fourth aspect is executed by the third communication device. method.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed, the above-mentioned fifth aspect is executed by the first communication device. method.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed, the above-mentioned sixth aspect is executed by the second communication device. method.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed, the above-mentioned seventh aspect is executed by the first communication device. method.
  • the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed, the above-mentioned eighth aspect executed by the third communication device is implemented. method.
  • FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of an access network device provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a 5G clock and a TSN clock provided by an embodiment of the present application
  • FIG. 4 is a schematic flowchart of a communication method provided by Embodiment 1 of the present application.
  • FIG. 5 is a schematic flowchart of a communication method provided by Embodiment 2 of the present application.
  • FIG. 6 is a schematic flowchart of a communication method provided by Embodiment 3 of the present application.
  • FIG. 7 is a schematic flowchart of a communication method provided by Embodiment 4 of the present application.
  • FIG. 8 is a schematic flowchart of a communication method provided by Embodiment 5 of the present application.
  • Embodiment 9 is a schematic flowchart of a communication method provided by Embodiment 6 of the present application.
  • FIG. 10 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 11 is another schematic structural diagram of a communication apparatus provided by an embodiment of the present application.
  • FIG. 1 it is a system architecture diagram of the Industrial Internet of Things (industry IoT, internet of things, IIoT), including at least one of the following: a time-sensitive network (TSN) system, a communication system and a data network (data network, DN).
  • TSN time-sensitive network
  • DN data network
  • the above communication system includes access network equipment and core network equipment.
  • An access network device may also be referred to as a radio access network (RAN) device.
  • RAN radio access network
  • Different access network devices can be connected through the Xn interface, and the access network device and the core network device can be connected through the NG interface.
  • An access network device is a device that connects a terminal device to a wireless network, and can provide functions such as wireless resource management, quality of service management, data encryption, and compression for the terminal device.
  • the access network equipment may include the following types:
  • the next generation nodeB provides terminal equipment with protocols and functions of the new radio (new radio, NR) control plane and/or user plane, and accesses the core network.
  • new radio new radio
  • NR new radio
  • 5G core network 5th generation core, 5GC
  • ng-eNB Next generation evolved Node B
  • E-UTRA evolved universal terrestrial radio access
  • the access network equipment may be composed of a centralized unit (CU) and a distributed unit (DU), and the functions of the original access network equipment can be split, and the functions of the original access network equipment can be split.
  • Some functions of the original access network equipment are placed in the CU, and the rest of the functions are deployed in the DU.
  • Multiple DUs share one CU, which saves costs and facilitates network expansion.
  • the functions of the CU and DU may be divided according to the protocol stack. For example, the Radio Resource Control (RRC) layer, the Service Data Adaptation Protocol (SDAP) layer and the Packet Data Convergence Protocol (PDCP) layer are deployed in the CU.
  • RRC Radio Resource Control
  • SDAP Service Data Adaptation Protocol
  • PDCP Packet Data Convergence Protocol
  • the rest of the radio link control (radio link control, RLC) layer, medium access control (medium access control, MAC) layer and physical layer (physical, PHY) layer is deployed in the DU.
  • the CU and DU can be connected through the FI interface.
  • the CU can be connected to the core network on behalf of the access network device through the NG interface, and the CU can also be connected to other access network devices on behalf of the access network device through the Xn interface. Further, the functions of CU can also be divided into:
  • CU-CP Central unit-control plane: mainly includes the RRC layer in the CU and the control plane in the PDCP layer;
  • CU-UP Central unit-user plane: mainly includes the SDAP layer in the CU and the user plane in the PDCP layer.
  • Core network equipment is mainly used to manage terminal equipment and provide gateways for communication with external networks.
  • Core network equipment which may include one or more of the following network elements:
  • UPF User plane function
  • the UPF network element can receive user data from the data network (DN) and transmit it to the terminal equipment through the access network equipment; in the uplink transmission, the UPF network element can receive the user data from the terminal equipment through the access network equipment User data, forward the user data to the DN.
  • the transmission resources and scheduling functions in the UPF network element that provide services for the terminal equipment may be managed and controlled by the SMF network element.
  • the PCF network element mainly supports the provision of a unified policy framework to control network behavior, provides policy rules to the control layer network functions, and is responsible for acquiring user subscription information related to policy decisions.
  • Access and mobility management function (AMF) network element It is mainly responsible for the mobility management in the mobile network, such as user location update, user registration network, user switching, etc.
  • Session management function session management function, SMF
  • SMF session management function
  • Specific functions include assigning IP addresses to users and selecting UPF network elements that provide packet forwarding functions.
  • PCF Policy control function
  • TSN application function (AF) network element mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side.
  • Unified data management (UDM) network element It is mainly used for generating authentication credential, user identification processing (such as storing and managing user permanent identity, etc.), access authorization control and contract data management, etc.
  • Network exposure function used to provide frameworks, authentications and interfaces related to network capability exposure, and to transfer information between 5G system network functions and other network functions.
  • the network elements in the above-mentioned core network may have different names.
  • the fifth-generation mobile communication system is used as an example for description, which is not intended to limit the present application.
  • the communication system shown in FIG. 1 may further include: a terminal device.
  • Terminal equipment which can be referred to as terminal for short, is a device with wireless transceiver functions. Terminal equipment can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; it can also be deployed on water (such as ships, etc.); In the air (eg on airplanes, balloons and satellites, etc.).
  • the terminal device may be a mobile phone, a tablet computer, a computer with a wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, and a wireless terminal in industrial control (industrial control).
  • VR virtual reality
  • AR augmented reality
  • the terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a wireless communication functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future fifth generation (5G) networks or future evolved public land mobile communication networks ( Terminal equipment in public land mobile network, PLMN), etc.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • 5G fifth generation
  • PLMN future evolved public land mobile communication networks
  • Terminal equipment may also sometimes be referred to as user equipment (UE), access terminal equipment, in-vehicle terminal equipment, industrial control terminal equipment, UE unit, UE station, mobile station, mobile station, remote station, remote terminal equipment, mobile equipment, wireless communication equipment, UE proxy or UE device, etc.
  • Terminal devices can also be stationary or mobile. This embodiment of the present application does not limit this.
  • the IIoT feature was introduced in the R16 version of 5G.
  • various functional nodes in the industrial control system are connected, including industrial controllers that issue control commands, industrial terminals that receive and execute control commands, such as operating arms, configuration controllers, and nodes such as operating arms hive, etc.
  • the 5G system provides flexible routing methods, and various industrial controllers and industrial terminals can be quickly organized into different production lines, so as to achieve the purpose of flexible deployment and adapt to small batches and diversified production needs.
  • the data packets involved in the industrial control system except the log data packets, most of the control data packets require real-time and determinism.
  • the real-time property may also be referred to as ultra-short latency.
  • Real-time is the requirement for the length of the transmission delay of the data packet, that is, the transmission delay of the data packet is required to be no greater than T_delay;
  • determinism is the requirement for the jitter of the transmission delay of the data packet, that is, the transmission delay of the data is required.
  • T_delay In order to meet the deterministic requirements, it is necessary to increase the buffer on the receiver side. If the receiving time is earlier than the expected time, it will be buffered first and then submitted.
  • wireless networks need to use more wireless resources, more robust modulation and demodulation methods for transmission, or design special scheduling methods to reduce transmission delay, such as uplink scheduling-free mode.
  • the DN may be a service network that provides data service services for users.
  • the DN may be an IP multimedia service (IP multi-media service) network or the Internet or the like.
  • the terminal device may establish a protocol data unit (protocol data unit, PDU) session from the terminal device to the DN to access the DN.
  • protocol data unit protocol data unit
  • the part inside the thick-line box in the middle part of FIG. 1 belongs to the communication system, and the part outside the thick-line box in the middle part of FIG. 1 belongs to the industrial control system.
  • the communication system is connected to the industrial control system through two interfaces.
  • the above-mentioned two interfaces may be respectively a terminal-side TSN translator (DS-TT) on the terminal device side and a network-side TSN translator (NW-TT) on the UPF side.
  • DS-TT terminal-side TSN translator
  • NW-TT network-side TSN translator
  • the cooperation of these two interfaces can calculate the transmission delay experienced by the IIoT control information through the 5G communication system, that is, the delay of the IIoT control information passing through these two interfaces.
  • both the UPF and the UE maintain the same clock, which is called the 5G clock.
  • the 5G clock on the UPF side is synchronized with the 5G clock on the UE side. Therefore, when an IIoT control information passes through the NW-TT on the UPF side, the UPF records the time corresponding to this moment. When the IIoT control information passes through the 5G network and reaches the DS-TT on the UE side, the UE records the time corresponding to this moment. According to the time information recorded by the UPF and the UE, the transmission delay of the IIoT control information through the 5G network can be calculated.
  • TSN time-sensitive network
  • the accuracy of the TSN clock is related to the specific requirements of the industrial control system.
  • Each specific production line can use its own TSN clock, and the TSN clocks used by different production lines are independent of each other.
  • the control information of these production lines can be based on different TSN clocks.
  • the 5G network transmits these control information transparently, but it is necessary to measure the transmission of these control information through the 5G network.
  • a 5G network as an example for description, and is not intended to limit the embodiments of the present application.
  • a 4G or future 6G communication system may be used to transmit data information and/or control information of an industrial control system.
  • FIG. 3 it is a clock synchronization system applied to industrial control for 5G network.
  • the middle part in Figure 3 belongs to the 5G network.
  • Network elements such as UPF, gNB, and UE in the 5G network maintain a common clock, that is, the 5G clock.
  • the 5G clocks of each 5G network element in Figure 3 come from the same master clock "5G master clock (5th generation grand master clock, 5G GM)", 5G GM can be a global positioning system (global position system, GPS) module, Maintaining GPS time is also other types of high-precision clocks, which are not limited.
  • both the NW-TT on the UPF side and the DS-TT on the UE side maintain a common TSN clock.
  • NW-TT is an interface module embedded in UPF, which can be regarded as UPF or NW-TT maintaining two clocks at the same time: 5G clock and TSN clock.
  • the UE side is similar. It can be regarded as the UE or DS-TT maintaining two clocks at the same time: the 5G clock and the TSN clock.
  • TSN1, TSN2. the number of TSN clocks maintained by the UE and the UPF
  • the number of industrial terminals maintained by the UE is usually related to the number of production lines.
  • NW-TT can add a timestamp to the data packet, indicating the moment when the data packet passes through NW-TT, and the timestamp is used 5G time representation, such as 15:32:45 438 milliseconds.
  • the DS-TT on the UE side reads the 5G clock maintained by itself. For example, at 15:32:45, 458 milliseconds, the delay of the data packet through the 5G system is considered to be 20 milliseconds.
  • the industrial control data may also contain the execution time of the packet, which is based on the TSN clock and is not visible to the 5G system.
  • At least one item (a) of a, b, or c may represent: a, b, c, ab, ac, bc, or abc, where a, b, and c may be single or multiple .
  • words such as “first” and “second” are used to distinguish the same or similar items with basically the same function and effect. Those skilled in the art can understand that the words “first”, “second” and the like do not limit the quantity and execution order, and the words “first”, “second” and the like are not necessarily different.
  • the network elements involved in the embodiments of this application include access network equipment, terminal equipment, core network network elements, industrial controllers, and the like.
  • the access network device may be of a CU/DU architecture, and in this case, the access network device includes two network elements, CU and DU.
  • the access network device may also be of a CP-UP architecture, in which case the access network device includes three network elements: CU-CP, CU-UP, and DU.
  • the access network equipment may also be of an Open Radio Access Network (ORAN) architecture.
  • the access network equipment includes CU-CP, CU-UP, DU, and a near real-time access network intelligent controller (RAN intelligent controller, RIC) four network elements or even more network elements.
  • RAN intelligent controller a near real-time access network intelligent controller
  • the DU can also be separated into DU-H and DU-L, etc., to support the separation of lower layers such as the remote physical layer.
  • the core network element may be responsible for admission and session management, etc.
  • the industrial controller can be responsible for generating industrial control data, maintaining the TSN clock, etc.
  • Embodiment 1 of the present application provides a communication method.
  • the method includes: a first communication device receives a plurality of data packets from a second communication device. At the end of the first period of time, the first communication device reports the plurality of data packets to the third communication device.
  • a terminal device eg, UE
  • the industrial terminal may include a sensor and a robotic arm, etc.
  • a core network element eg, a UPF network element
  • the terminal device receives the report data packet sent by the industrial terminal, and transmits it centrally to the core network element, and then transmits it to the industrial controller.
  • the above-mentioned first communication device may be a terminal device
  • the second communication device may be an industrial terminal
  • the third communication device may be an access network device.
  • the terminal equipment is connected to the industrial controller
  • the core network element is connected to the industrial terminal
  • the core network element receives the data sent by the industrial terminal and transmits it to the terminal equipment in a centralized manner.
  • the above-mentioned first communication device may be a core network element
  • the second communication device may be an industrial terminal
  • the third communication device may be an access network device or the like. It can be understood that the above communication device may be an industrial terminal, terminal equipment, access network equipment or core network element, etc., or may be an industrial terminal, terminal equipment, access network equipment or a component in a core network element, such as Chips, circuits or others, etc., are not limited.
  • a flow of a communication method is provided.
  • the flow is described by taking the first communication device as UE, the second communication device as industrial terminal X, and the third communication device as gNB as an example.
  • the flow includes but is not limited to :
  • the S400, industrial terminal, UE, gNB, UPF, computer numerical control (CNC) or industrial controller, etc. determines the delay report of the data packet from the industrial terminal X through signaling interaction.
  • the delayed reporting means that the UE collectively reports to the gNB multiple data packets reported by the industrial terminal X to the UE in multiple cycles.
  • the UE receives multiple data packets from the industrial terminal X.
  • the multiple data packets of the industrial terminal X are data packets of multiple periods, and the periods of the multiple data packets are less than the maximum delay of the first service.
  • the period here may refer to the period in which the industrial terminal X reports data packets to the UE.
  • the UE may determine according to one or more of information such as the DS-TT port number of the data packet, the MAC address of the industrial terminal, the type identifier (TYPE ID) in the data packet, and the destination MAC address in the data packet.
  • This is the report packet from industrial terminal X. According to the above conclusion of S400, it is identified that the data packet belongs to delayed reporting.
  • the UE at the end of the first period, the UE collectively reports the above-mentioned multiple data packets to the gNB.
  • the length of the first time period is not greater than the maximum delay of the first service.
  • Embodiment A The UE manages multiple data packets reported centrally through a timer.
  • the first period of time is equal to the duration of the timer, and the end time of the first period of time is the time-out time of the timer.
  • the UE receives the first data packet from the industrial terminal X, and starts the timer, where the first data packet is the first data packet in the above-mentioned multiple data packets. During the running of the timer, the UE receives other data packets from the industrial terminal X, where the other data packets are the remaining data packets except the first data packet in the above-mentioned multiple data packets. After the timer expires, the UE collectively reports the multiple data packets to the gNB.
  • each time the UE receives a data packet from the industrial terminal X determines whether the timer has been started. If the timer has not been started or has timed out, start the timer and store the received report data packet from the industrial terminal X. Each subsequent report data packet from the industrial terminal X is received, if the timer has not expired, the received report data packet is stored, for example, the received report data packets are stored in the order of reception. If the timer expires, all the stored unreported data packets will be transmitted centrally. The centralized transmission package is finally transmitted to the industrial controller through gNB and UPF. For example, if the reporting period of the industrial terminal X is 4 ms and the maximum delay is 200 ms, the duration of the timer only needs to be less than or equal to 200 ms.
  • Embodiment B The UE manages multiple data packets reported centrally through a counter.
  • the end time of the first time period is equal to the time when the count value of the counter reaches a threshold or threshold, where the threshold or threshold is determined according to the period of the data packet and the maximum delay of the first service.
  • the threshold or threshold of the counter can be configured to be 40 or a value less than 40. There is no distinction between the threshold and the threshold, and they can be replaced with each other.
  • the threshold is used as an example in the subsequent description.
  • the UE After receiving the first data packet from the industrial terminal X, the UE starts the counter, where the first data packet is the first data packet in the above-mentioned multiple data packets. Subsequently, each time the UE receives a data packet from the industrial terminal X, the value of the counter is incremented by 1. When the count value of the counter reaches the threshold or the threshold, the UE reports the multiple data packets to the gNB.
  • each time the UE receives a data packet from the industrial terminal X determines whether the counter has been started. If the UE has not started the counter or has timed out, it will start and store the received report data packet from the industrial terminal X.
  • the counter timeout refers to a state in which the count value of the counter is greater than a threshold or a threshold.
  • Each subsequent report data packet from the industrial terminal X is received, if the count value of the counter has not reached the threshold, the received report data packets are stored in the order of reception. If the count value reaches the threshold, all the stored unreported data packets will be collectively transmitted.
  • the centrally transmitted data packets are finally transmitted to the industrial controller through gNB and UPF. After receiving multiple report data packets at one time, the industrial controller saves it into its own log file, or performs other processing.
  • each reported data packet carries time information
  • the UE may group packets according to the time information carried in each data packet, or the UE may group packets in the order in which each reported data packet is received, Alternatively, the packets may be grouped in reverse order according to the order in which each reported data packet is received, which is not limited. Which way the UE specifically uses to form a package may be determined by the industrial controller, or determined by the interaction between the industrial controller and other network elements. And in the above S400, the UE is notified as one of the configuration parameters.
  • the industrial terminal, the UE and the network elements such as the gNB interact through signaling, and the determined parameters may include one or more of the following parameters: the timer duration for centralized reporting, the counter threshold, and the UE receiving The forward or reverse order of each reported data packet, the corresponding industrial terminal MAC address, the UE side DS-TT port number corresponding to the industrial terminal, the destination MAC address carried in the data packet, and the UPF side NW-TT port number Wait.
  • the following implementations are included.
  • Implementation A The industrial terminal interacts with the industrial controller to determine the timer duration or counter threshold for centralized reporting.
  • the timer duration or counter threshold is notified to the UE by the industrial terminal.
  • the industrial terminal may also notify the UE of "the corresponding MAC address of the industrial terminal", "the DS-TT port number on the UE side corresponding to the industrial terminal", "destination MAC address NW-TT port number” etc.
  • Embodiment B1 The industrial terminal interacts with the industrial controller to determine the timer duration or the counter threshold for centralized reporting, and the industrial controller notifies the UE. Specifically, the industrial controller notifies the UE of the above two parameters through TSN AF->PCF->SMF->AMF->UE. Optionally, the industrial controller may also notify the UE of "the MAC address of the corresponding industrial terminal", "the DS-TT port number on the UE side corresponding to the industrial terminal", “destination MAC address carried in the data packet", "UPF side NW-TT port number” etc. The UE can be notified through a (non-access stratum, NAS) message between the AMF and the UE. During the whole notification process, each network element can transparently transmit the above parameters, or can read and then transmit, which is not limited.
  • NAS non-access stratum
  • Embodiment B2 The industrial terminal interacts with the industrial controller to determine the timer duration or the counter threshold for centralized reporting, and the industrial controller notifies the UE. Specifically, the industrial controller notifies the UE of the above two parameters through TSN AF->PCF->SMF->AMF->RAN->UE. Optionally, the industrial controller may also notify the UE of "the corresponding MAC address of the industrial terminal", "the port number of the industrial terminal corresponding to the DS-TT on the UE side", “the MAC address carried in the data packet", "corresponding to the industrial terminal” The port number of the DS-TT on the UE side”, etc.
  • Embodiment B2 the RAN, that is, the base station, notifies the UE through a radio resource control (radio resource control, RRC) message.
  • RRC radio resource control
  • other network elements may transparently transmit the above parameters, or may read and then transmit, which is not limited in this embodiment.
  • Embodiment C The industrial controller independently determines the timer duration or counter threshold for centralized reporting according to the reporting period and the maximum transmission delay of the industrial terminal, and does not interact with the industrial terminal.
  • the industrial controller notifies the UE of the determined parameters.
  • the notification method may be the same as the above-mentioned embodiment B1 or B2.
  • Embodiment D The industrial controller interacts with one or more network elements in a communication system (eg, a 5G system) to determine the timer duration or counter threshold for centralized reporting.
  • the UE is notified by a network element in a communication system (eg, a 5G system).
  • the communication system network elements participating in the interaction process may include but are not limited to: TSN AF, PCF, SMF, AMF, base station, etc.
  • Embodiment E The network element in the communication system (eg, 5G system) determines the timer duration or counter threshold for centralized reporting according to the reporting period and the maximum delay requirement, and notifies the UE.
  • the SMF can determine at least one of the following parameters: timer duration for centralized reporting, counter threshold, whether to group packets in the forward or reverse order of the order in which each reported data is received, the MAC address of the corresponding industrial terminal, the corresponding industrial terminal The DS-TT port number on the UE side, the destination MAC address carried in the data packet, and the NW-TT port number on the UPF side.
  • SMF determines the above parameters, it notifies the base station and UE through SMF->AMF->gNB->UE; and notifies UPF through SMF->UPF.
  • an industrial terminal is used as an example for description.
  • the data generated and reported is not limited to industrial terminals.
  • regular uploading and services that require a maximum data delay longer than the uploading period, the above scheme can be used to optimize transmission.
  • the data is transmitted in a centralized manner. Improve transmission efficiency and reduce scheduling complexity.
  • the second embodiment of the present application provides a communication method.
  • the method includes: a first communication device receives a third data packet from a second communication device.
  • the first communication device deletes the time information in the third data packet to obtain a fourth data packet, where the fourth data packet is a data packet from which the time information has been deleted.
  • the first communication device sends the fourth data packet to the third communication device.
  • the third communication device After receiving the fourth data packet, performs an operation of adding or supplementing time information.
  • addition and complementation are not distinguished and can be replaced with each other. Since the time information is not transmitted through the wireless interface, the data transmission volume of the wireless communication system, especially the wireless interface, is reduced.
  • the method can be applied to uplink data transmission, where the terminal device deletes the time information in the data packet, and the access network device, core network element or industrial controller, etc. operate.
  • the first communication device may be an industrial device
  • the second communication device may be a terminal device
  • the third terminal device may be an access network device, a core network element, an industrial controller, or the like.
  • the method can be applied to downlink data transmission, the core network element or the access network device deletes the time information, and the terminal device or the industrial terminal supplements the time information.
  • the first communication device may be a core network element or an access network device
  • the second communication device may be a core network network element
  • the third communication device may be a terminal device or an industrial terminal or the like.
  • the method for obtaining the fourth data packet may include: the first communication device obtains parameters of the third data packet, and when the parameters meet preset conditions , in the first position in the third data packet, delete the time information to obtain the fourth data packet, the first position is pre-configured, which is described in detail in the second embodiment.
  • the first communication device may use an artificial intelligence (artificial intelligence, AI) learning algorithm to determine that the third data packet contains time information to be deleted. The first communication device determines the first position of the time information in the third data packet through the AI algorithm.
  • AI artificial intelligence
  • the first communication device deletes the time information at the first position in the third data packet to obtain a fourth data packet, which will be described in detail in Embodiment 3 below. Further, the above-mentioned fourth data packet may carry first indication information, and the first indication information is used to indicate the time information of the deletion of the fourth data packet.
  • a flow of a communication method in which the first communication device is an industrial terminal X, the second communication device is a UE, and the operation of deleting time information is performed, and the third communication device is a gNB, UPF or an industrial terminal.
  • the controller performs an operation of supplementing time information, where the time information is a TSN timestamp, and is described as an example.
  • the S500, the industrial terminal X, the UE, the SMF, the UPF or the industrial controller, etc. interact together to determine one or more of the following parameters:
  • the NE that deletes the TSN timestamp For the NE that deletes the TSN timestamp, which bits of the TSN timestamp to be deleted correspond to in the data packet, determine which bits in the packet to delete according to which bit in the data packet, and perform the TSN timestamp complement for the NE , the transmission delay value used when complementing the TSN timestamp, etc.
  • the UE receives a third data packet from the industrial terminal X.
  • the UE deletes the TSN timestamp in the third data packet to obtain a fourth data packet, where the fourth data packet is the data packet with the deleted TSN timestamp; the UE reports the fourth data packet to the network device.
  • the network device may be gNB, UPF, or the like.
  • the UE may acquire parameters of the third data packet.
  • the parameters include but are not limited to: the port number of the DS-TT, or the MAC address of the industrial terminal contained in the third data packet, or one or more of the information such as the TYPE ID contained in the third data packet.
  • delete the TSN timestamp in the first position in the third data packet to obtain the fourth data packet, and the first position may be preconfigured.
  • the UE uses the DS-TT port number, the MAC address contained in the third data packet, and/or the TYPE contained in the third data packet
  • One or more of the information such as ID identifies that the third data packet contains a TSN timestamp. Delete the TSN timestamp according to the bit position of the TSN timestamp obtained in the above S500 in the data packet.
  • the fourth data packet whose TSN timestamp is deleted may be transmitted by using a predetermined wireless data bearer (DRB) or a data flow (flow). Alternatively, the same DRB or flow can be used to transmit the above two types of data packets.
  • DRB wireless data bearer
  • first indication information may be added to the fourth data packet from which the TSN timestamp is deleted, and the first indication information may indicate that the TSN timestamp has been deleted from the fourth data packet. According to the first indication information, the receiver may determine whether to perform the operation of complementing the TSN timestamp.
  • the network device after receiving the fourth data packet from the UE, the network device adds a TSN timestamp to the fourth data packet.
  • the network device may identify that the TSN timestamp of the fourth data packet has been deleted according to the DRB or flow where the fourth data packet is located, or the first indication information in the fourth data packet, and supplement the TSN timestamp. to the industrial controller. Due to factors such as time drift, the supplemented TSN timestamp may be different from the original TSN timestamp. Therefore, the solution in Embodiment 2 is more suitable for data that does not require high TSN timestamp accuracy, such as log reporting, and data that does not require precise time. control messages, etc. In the above S503, the TSN timestamp may be added in the following implementation manner:
  • the gNB may acquire the parameters in the fourth data packet.
  • the parameters in the fourth data packet include but are not limited to the DRB or flow for transmitting the fourth data packet.
  • a TSN timestamp is added to the first position in the fourth data packet.
  • the gNB may identify, according to the DRB or flow that transmits the fourth data packet, that the TSN timestamp has been deleted in the fourth data packet. To the bit position determined in the above S500, add the TSN time stamp calculated by itself, transmit it to the UPF, and then transmit it to the industrial controller. Alternatively, the gNB may read the value of some characteristic bit positions in the fourth data packet, and determine the position for complementing the TSN timestamp according to the value of the specific bit position. Alternatively, after receiving the fourth data packet from the UE, the gNB may determine whether the fourth data packet includes the first indication information for indicating that the TSN timestamp has been deleted. If the first indication information is included, the bit position determined in the above S500 is added with the TSN time stamp calculated by itself in the fourth data packet, transmitted to the UPF, and further transmitted to the industrial controller.
  • the gNB only maintains the 5G clock and does not maintain the TSN clock.
  • UPF maintains both the 5G clock and the TSN clock.
  • the industrial controller only maintains the TSN clock, not the 5G clock. Therefore, there are three ways for the gNB to supplement the TSN timestamp: first, the gNB generates the TSN timestamp based on the 5G clock, and adds it to the fourth data packet.
  • the fourth data packet is sent to the UPF, and the TSN timestamp is converted by the UPF. into a TSN timestamp based on the TSN clock.
  • the industrial controller periodically synchronizes the 5G clock with 5G network elements such as UPF, obtains the 5G clock, and maintains it.
  • the gNB generates a TSN timestamp based on the 5G clock, and adds it to the fourth data packet.
  • the fourth data packet is transmitted to the industrial controller through the UPF, and the industrial controller converts the TSN timestamp into a TSN timestamp based on the TSN clock.
  • the gNB periodically synchronizes the TSN clock with the UPF, obtains the TSN clock, and maintains it. After the gNB receives the fourth data packet, the gNB generates a TSN timestamp based on the TSN clock, and adds the timestamp to the fourth data packet.
  • Embodiment B UPF adds TSN timestamp
  • the gNB receives the fourth data packet from the UE, and transmits the fourth data packet to the UPF.
  • the UPF determines the fourth data packet according to the parameters of the fourth data packet, such as the DRB or fow that transmits the fourth data packet, or the first indication information carried in the fourth data packet If the TSN timestamp has been deleted, the TSN timestamp is supplemented based on the TSN clock maintained by itself and transmitted to the industrial controller.
  • the industrial controller may also add TSN time stamps.
  • the gNB receives the fourth data packet from the UE, and the fourth data packet is transmitted to the industrial controller via the UPF.
  • the industrial controller identifies that the TSN timestamp has been deleted in the fourth data packet, and the industrial controller supplements the TSN timestamp, and then goes further deal with.
  • the parameters of the fourth data packet include one or more of source port number, destination port number, source MAC address, destination MAC address, or TYPE ID and other information.
  • the above-mentioned device performing adding a TSN timestamp may determine the TSN timestamp according to the sending period of the data packet.
  • gNB, UPF or industrial controller, etc. can obtain the traffic pattern of the data packet sent by the industrial terminal through the pre-configuration process, which specifically includes: the TSN timestamp corresponding to the first data packet is X, the period is K.
  • the TSN timestamp corresponding to the second data packet is X+K
  • the TSN timestamp corresponding to the third data packet is X+2K, etc. .
  • the UPF, gNB, or industrial controller, etc. can obtain the cycle of sending data packets by the industrial terminal through a pre-configured process.
  • the UE may not delete its TSN timestamp, and starting from the second data packet, the UE deletes its TSN timestamp.
  • the UPF, gNB or industrial controller can deduce the TSN timestamp of each subsequent packet by adding the period to the TSN timestamp of the first packet.
  • This way of supplementing the time stamp requires the UE to group packets in the order in which they are received, and transmit them to the gNB in a centralized manner.
  • UPFs, gNBs, or industrial controllers, etc. do not need to determine timestamps based on their own clocks, but only need to infer them based on the sequence of packets.
  • the TSN timestamp is carried in the first data packet as an example for description. In actual deployment, in order to prevent the transmission of the first data packet from being unsuccessful, the TSN timestamp can also be carried in the first N data packets, starting from the N+1th data packet, and no longer carrying the TSN time stamp.
  • the above-mentioned device for adding TSN timestamp may determine the TSN timestamp and the like according to the reception time and transmission delay of the data packet. Since IIoT adopts deterministic transmission, the delay experienced by each hop can be pre-determined or determined by the network management platform, so the network element that adds the TSN timestamp can receive the data packet according to the time when the data packet is received from the source. The time delay to the local network element is calculated and the value of the supplemented TSN timestamp is calculated.
  • UPF performs TSN time stamp supplementation
  • UPF receives the fourth data packet at TSN time "11:38:34, 345ms" and it is known in advance that the transmission delay from the source to UPF is fixed at 20ms, then UPF infers: The fourth data packet is sent from the source at the TSN time "11:38:34, 325ms", so the TSN timestamp "11:38:34,325ms" is supplemented for the fourth data packet.
  • Parameter transmission method A The industrial terminal X interacts with the industrial controller, determines the parameters, and deletes the TSN timestamp to complement the network element of the operation.
  • the industrial terminal X informs the UE, and the industrial controller informs the network elements on the network side, such as UPF, gNB, etc.
  • the industrial controller informs the base station through TSN AF-PCF-SMF-AMF-gNB, and the industrial controller informs the UPF through TSN AF-PCF-SMF-UPF.
  • Parameter transmission mode B1 The industrial terminal X interacts with the industrial controller to determine the parameters. All network elements are notified by the industrial controller, including the network element UE that performs TSN timestamp deletion, and the network element gNB or UPF that performs TSN timestamp complementation. Specifically, the industrial controller notifies the UE through TSN AF->PCF->SMF->AMF->UE. Among them, the AMF and the UE notify the UE through the NAS message, and the industrial controller notifies the UPF through the TSN AF->PCF->SMF->UPF. During the whole notification process, each network element can transparently transmit parameters, or can read and then transmit, which is not limited.
  • Parameter transmission mode B2 The industrial terminal X interacts with the industrial controller to determine the parameters. All network elements are notified by the industrial controller, including the network element UE that performs TSN timestamp deletion, and the network element gNB or UPF that performs TSN timestamp complementation. Specifically, the parameters are notified to the UE through TSN AF->PCF->SMF->AMF->RAN->UE.
  • the difference from Embodiment B1 is that the base station in Embodiment B2, that is, the RAN, notifies the UE through an RRC message.
  • the path for the industrial controller to notify the UPF is the same as that in the embodiment B1. During the whole notification process, except the base station, other network elements can transparently transmit parameters, or can read and then transmit, which is not limited.
  • Parameter transfer method C The industrial control network element provides the service characteristics and the location of the TSN timestamp in the data packet, and the 5G network element determines who will perform the behavior of deleting the TSN timestamp and who will perform the behavior of complementing the TSN timestamp.
  • the network element that deletes the TSN timestamp or complements the TSN timestamp is determined by the PCF or SMF in the 5G network. For example, TSN timestamp deletion is performed by the UE, and TSN timestamp complementation is performed by the gNB or UPF. It is worth noting that when this parameter transmission method is adopted, when corresponding to the implementation of S503, it can only correspond to the "complement TSN timestamp by gNB" in implementation A, or "complement the TSN timestamp by UPF" in implementation B, The "Industrial Controller Complement TSN Timestamp" in Embodiment C cannot be used. The specific parameter transfer path is the same as the previous mode B, and will not be described again.
  • Parameter transmission mode D The industrial control network element provides service characteristics and the location of the TSN timestamp in the data packet, and the industrial control network element performs the complementation of the TSN timestamp.
  • the 5G network element determines the specific network element that deletes the TSN timestamp.
  • the CNC also provides information: the 5G network selects the network element that deletes the TSN timestamp, and the industrial controller executes the TSN timestamp.
  • PCF or SMF in 5G network can determine: TSN timestamp deletion is performed by UE.
  • the specific parameter transfer path is the same as the previous mode B, and will not be described again.
  • the UE deletes the TSN timestamp in the data packet, and the base station/UPF/industrial controller supplements the TSN timestamp.
  • the UPF/base station deletes the TSN timestamp in the data packet, and the UE/industrial control terminal supplements the TSN timestamp. Since the TSN time stamp is not transmitted through the wireless interface, the data transmission amount of the wireless communication system, especially the wireless interface, is reduced.
  • the overhead required for data transmission is reduced, such as the DCI required by the base station to allocate uplink resources, the padding added to the physical layer when the UE transmits a small amount of uplink data, etc. transmission efficiency.
  • Embodiment 3 The difference between Embodiment 3 and Embodiment 2 is that, for the sender, the first communication device determines, through an AI algorithm, that the third data packet contains time information to be deleted. The first communication device determines the first position of the above-mentioned time information in the third data packet through the AI algorithm. The first communication device deletes the above-mentioned time information at the first position in the third data packet, and generates a fourth data packet. Or, for the sender, the first communication device determines, through the AI algorithm, that the third data packet contains time information to be deleted, and the first position of the time information in the third data packet. The first communication device deletes the above-mentioned time information at the first position in the third data packet.
  • the first communication device sends a fourth data packet to the second communication device, where the fourth data packet is a data packet from which time information has been deleted. And the first communication device sends a notification message to the second communication device as the receiver, the notification message is used to notify the second communication device that the time information of the fourth data packet has been deleted, the time information needs to be supplemented, and the supplemented time information is in The position in the fourth packet.
  • the notification message may indicate the second communication device implicitly, or may indicate the second communication device explicitly.
  • the first communication apparatus may send the above-mentioned fourth data packet through a specific DRB or flow.
  • the second communication device can determine that the time information of the fourth data packet has been deleted, and the time information needs to be supplemented.
  • the location where the second communication device supplements the time information may be pre-configured, or notified to the first communication device by the sender through a notification message, etc., which will not be described again.
  • the receiver that is, the second communication device
  • the notification sender is the first communication device, and the process is similar to the above, and will not be described one by one.
  • the first communication device is UE
  • the second communication device is industrial terminal X
  • the third communication device is UPF or gNB
  • the time information is TSN timestamp
  • the sender uses AI algorithm prediction as an example for description , including but not limited to:
  • the AI module in the UE learns through the AI algorithm whether a certain data packet from the industrial terminal X contains a TSN timestamp.
  • the AI module in the UE can acquire a large number of data packets, and according to the characteristics of the data packets, for example, the MAC source address, the MAC destination address, and/or the TYPE ID in the data packet, etc. Train a neural network. Then, every time a data packet from the industrial terminal X is obtained, it can be judged by the AI model whether the data packet can include a TSN timestamp.
  • the AI model may be a recurrent neural network (RNN), a convolutional neural network (CNN), or the like.
  • the above AI model can be continuously updated over time.
  • the UE sends a notification message to the gNB.
  • This notification message is used to notify the gNB of the data packets transmitted by flow XX or DRB XX. Please add the TSN timestamp after receiving it.
  • the notification message may include one or more of the following configuration parameters: the supplementary time stamp is a time stamp based on the 5G clock, or, the time stamp based on the TSN clock, the supplementary time stamp is in the original data packet bit position, etc.
  • the notification message may be transmitted through an RRC message, and the gNB receives a reply response message.
  • the UE receives the third data packet from the industrial terminal X. According to the content described in the above S600, it is determined whether the third data packet meets the condition for deleting the TSN timestamp. If so, delete the TSN timestamp in the third data packet. Of course, the position of the TSN timestamp in the third data packet may also be obtained through learning and prediction through an AI module in the UE.
  • the third data packet with the TSN timestamp deleted, that is, the fourth data packet, is sent to the gNB.
  • the gNB After receiving the fourth data packet, the gNB supplements the TSN timestamp in the corresponding bit position according to the configuration parameters in S602, and transmits it to the UPF and the industrial controller.
  • the UPF does not need to perform further processing and continues to transmit it to the industrial controller. If the gNB is supplemented with a 5G-based timestamp, it needs to be converted into a TSN clock-based timestamp by the UPF.
  • the transformation method is the same as that in the second embodiment, and will not be repeated here.
  • S601 is the same as the above, and the difference between S602 and the above is that the UE sends a notification message to the UPF, which is used to notify the UPF to perform TSN timestamp supplementation.
  • the configuration parameters included in the notification message are the same as those described above. However, the UPF only needs to supplement the timestamp based on the TSN clock and does not have to supplement the timestamp based on the 5G clock.
  • the transmission path of the configuration parameters in the above notification message is: UE-gNB-AMF-SMF-UPF, and the configuration parameters can be fed back hop-by-hop or shared by multiple hops.
  • the intermediate node can transparently transmit the configuration information, or can read the configuration information and then regenerate the message and transmit it through the next hop. Specifically, an RRC message can be transmitted between the UE and the gNB (the gNB can read the content of the message), and the NAS message can also be transparently transmitted (the gNB cannot read the content of the message).
  • the AI module on the UE side learns data features and deletes the TSN timestamp, and the gNB, UPF or industrial controller supplements the TSN timestamp.
  • the AI module on the UPF or gNB side can learn data features and delete the TSN timestamp, and the UE or industrial terminal can supplement the TSN timestamp. If the AI module on the UPF side learns the characteristics of the downlink data and deletes the TSN timestamp, the configuration parameters determined by the UPF are transmitted to the UE via the UPF-SMF-AMF-gNB-UE to notify the UE to perform TSN timestamp complementing. If the AI module on the gNB side learns the features of the downlink data and deletes the TSN timestamp, the configuration parameters determined by the gNB are transmitted to the UE via the gNB-UE.
  • the AI module of the sender of the data performs learning to delete the TSN timestamp
  • the AI module of the receiver of the data supplements the TSN timestamp.
  • the AI module of the receiver of the data can learn and then notify the sender.
  • the AI module of the UE learns the characteristics of the downlink data according to the received downlink, and then the UE notifies the gNB or the UPF to delete the TSN timestamp and the location of the TSN timestamp in the data packet.
  • the gNB or UPF deletes the TSN timestamp when receiving the downlink data packet.
  • the UE supplements the TSN timestamp when receiving the downlink data.
  • the AI module of the UE or the UPF or the gNB learns the data features, and triggers the deletion and complementation of the TSN timestamp. It can reduce the amount of data transmitted by the 5G communication system, especially the amount of data transmitted by the air interface.
  • the first embodiment describes in detail the process of the sender centrally transmits data packets.
  • the second and third embodiments describe in detail the process that the sender deletes the time information in the data packet and then transmits it, and the receiver supplements the time information in the data packet.
  • the data source sends out one or more data packets at an interval, and the above two technical features can be implemented in combination, specifically:
  • the first communication device receives a plurality of data packets from the second communication device, the plurality of data packets are data packets of the first service, the plurality of data packets are data packets of a plurality of cycles, and the cycles of the plurality of data packets are less than the maximum delay of the first service. After that, the first communication device determines, among the above-mentioned multiple data packets, a second data packet whose time information needs to be deleted. Delete time information in the second data packet. At the end of the first time period, the first communication device reports the above-mentioned multiple data packets to the third communication device, and the length of the first time period is not greater than the maximum delay of the first service. On the other hand, after receiving the plurality of data packets, the third communication device adds time information to the second data packet among the plurality of data.
  • the first communication apparatus may determine the second data packet according to the parameters of the multiple data packets.
  • the parameters include but are not limited to: source port number, destination port number, source MAC address, destination MAC address or TYPE ID in the data, etc.
  • the third communication device may determine the second data packet according to the parameters of the plurality of data packets. At the first position in the second data packet, the time position is added.
  • the first communication device determines, through an AI algorithm, the second data packet including time information to be deleted.
  • the sender i.e. the first communication device
  • the receiver i.e. the third communication device, can determine the second data packet through the AI algorithm, and then notify the first communication device, No longer.
  • the first position where the first communication device deletes time information and the first position where the third communication device adds time information may be preconfigured, or determined by the receiver or sender through an AI algorithm, and details are not repeated here.
  • the second data packet of the deleted time information may further include first indication information, where the first indication information is used to indicate the data packet of the deleted time information.
  • the first communication device is UE
  • the second communication device is industrial terminal X
  • the third communication device is gNB
  • the time information is TSN timestamp as an example, including but not limited to:
  • S701 Configuration parameters, including service characteristics, such as source port number, destination port number, source MAC address, destination MAC address, TYPE ID in the data packet, service period, maximum delay requirement, actual transmission Delay (deterministic transmission delay), which network element performs timestamp deletion, and which network element performs timestamp complementing, etc.
  • service characteristics such as source port number, destination port number, source MAC address, destination MAC address, TYPE ID in the data packet, service period, maximum delay requirement, actual transmission Delay (deterministic transmission delay), which network element performs timestamp deletion, and which network element performs timestamp complementing, etc.
  • the UE periodically receives data packets from the industrial terminal X, and the data packets include a TSN timestamp. For periodic services, the TSN timestamp in each periodic data packet also changes periodically.
  • the UE collects data packets for a period of time and transmits them collectively to the gNB.
  • the UE can use a timer or a counter to determine the timing of collectively transmitting data packets to the gNB. The specific mechanism has been described in detail in Embodiment 1 and will not be repeated.
  • the UE deletes the TSN timestamp in each data packet, and then arranges the data packets with the TSN timestamp deleted in the order of reception time, generates a reported data packet, and transmits it to the gNB.
  • the sequence of the reported data packets may be consistent with the sequence in which the UE receives the data packets, or may not be consistent. However, in this embodiment, the sequence of the data packets reported centrally by the UE must be consistent with the sequence in which the UE receives the data packets.
  • the gNB After receiving multiple data packets, the gNB generates a corresponding TSN timestamp for each data packet in the order of the multiple data packets, inserts the pre-configured bit position in the data packet, transmits it to the UPF, and then transmits it to the industry controller.
  • the UE receives data packet 1 at TSN time T1, data packet 2 at TSN time T2, and data packet 3 at TSN time T3.
  • the interval between T1 and T2 is the period T_P
  • the interval between T2 and T3 is also the period T_P.
  • the UE transmits the data packet 1, the data packet 2 and the data packet 3 centrally to the gNB, and the transmission delay is a deterministic delay value T_tans.
  • the gNB receives three packets at TSN time T4.
  • the gNB maintains the TSN clock, and the gNB directly complements the TSN timestamp based on the TSN clock.
  • the time stamp can also be supplemented, and the conversion process is the same as that of Embodiment A in S503 in the second embodiment above, and details are not repeated here.
  • the above process is described by taking the gNB supplementing the timestamp of the data packet as an example. In fact, the supplementary timestamp can also be performed by the UPF, and the process is similar, which will not be repeated here.
  • the sender removes the TSN timestamp in the data packet and retransmits it, thereby reducing the amount of data transmitted by the 5G system, especially the air interface; at the same time, it transmits multiple data packets in a centralized manner, reducing the extra overhead of transmission and improving the spectral efficiency.
  • Embodiment 5 of the present application provides a communication method.
  • the method includes: a sender, that is, a first communication device, predicts the content of a data packet, and generates a predicted data packet. Before the actual data packet arrives, the predicted data packet is sent first, which can reduce the delay of the data.
  • the above-mentioned fifth data packet may be predicted and generated by the first communication device through an AI algorithm.
  • the AI algorithm is used to learn that a specific bit in a data packet of a specific service is a TSN timestamp, and further optimization is performed.
  • the overall content of the data packet can be learned and predicted, so as to optimize the transmission behavior. Due to the inherent characteristics of industrial production, industrial terminals (for example, operating arms) usually perform the same production process, and data packets with the same content are repeatedly transmitted. After the introduction of AI algorithms, data can be learned and predicted to optimize transmission.
  • the AI module of the gNB predicts the data packet as an example.
  • the AI module on the UPF side can also perform the prediction; or, the AI module in the UE can perform the prediction, and then notify the gNB of the predicted algorithm and parameters.
  • the first communication device is a gNB
  • the second communication device is a UPF
  • the third communication device is a UE as an example, including but not limited to:
  • the gNB generates a prediction data packet.
  • the AI module in the gNB can learn the content of downlink data packets, predict the content and transmission timing of the next downlink data packet based on the already transmitted downlink data packets, and generate predicted data packets.
  • the white box represents the transmission window of the predicted data packet.
  • the gNB receives the real downlink data packet at the beginning of the window and must transmit it to the receiver at the end of the window.
  • the gNB transmits the prediction data packet to the UE.
  • the gNB may transmit the predicted data packet to the UE before the data packet transmission window, that is, before receiving the real downlink data packet.
  • the gNB receives the real data packet from the UPF.
  • the gNB may receive real data packets from the UPF at the beginning of the transmission window. Compare the content of the real packets with the predicted packets. If the contents of the two are different, the real data packet is transmitted to the UE. If the contents of the two are the same, there is no need to transmit the real data packet to the UE.
  • the gNB transmits real data packets to the UE.
  • the air interface PDCP layer processing is different from the existing mechanism.
  • the PDCP SN allocated to the real data packet is the same as the predicted data packet, and both are K.
  • the layer delivers previously received packets.
  • the receiver discards the previously received data packet and submits the later received data packet to the application layer, that is, the receiver discards the predicted data packet received first, and submits the real data packet to the application layer.
  • the above description is described by taking the number of both the predicted data packet and the real data packet as an example. If the number of the predicted data packet and the real data packet is multiple, it is similar to the above process and will not be repeated.
  • the PDCP serial number (SN) is incremented by 1. If the receiver receives multiple data packets with the same PDCP SN, it discards the following data packets and only retains the first data packet received first. In the process of this embodiment, when the sender PDCP transmits the real data packet, it uses the same PDCP SN as the predicted data packet, that is, the sender sends two packets with the same PDCP SN. The difference is that if the receiver receives two data packets with the same PDCP SN, it discards the data packets received first, and retains the data packets received later, that is, discards the predicted data packets and retains the real data packets.
  • each prediction and transmission of one data packet are described as an example, and it is also applicable to the scenario of each prediction and generation of multiple data packets.
  • the sender only transmits different parts. data package.
  • the sender predicts that the number of data packets generated is N1, and the actual number of data packets that arrive is N2.
  • N1 and N2 are the same or different, and both are positive integers.
  • the sender may transmit some of the different data packets to the receiver. For example, three data packets are predicted and transmitted in advance, and the corresponding PDCP SNs are 3, 4, and 5 respectively.
  • the gNB compares and finds that the three real data packets received are different from the predicted data packets. , then three real data packets are transmitted, and the corresponding PDCP SNs are 3, 4, and 5; if it is found that the real data packet No. 3 is the same as the predicted data packet, but the real data packets No. 4 and 5 are different from the predicted data packet, the transmission For two real data packets, the corresponding PDCP SNs are 4 and 5 respectively; if the number of predicted data packets is less than the real data packets, the sender will retransmit the real data packets.
  • the sender sends a notification message to the receiver to notify the receiver to delete the redundant predicted data packets.
  • the receiver can delete redundant prediction packets and no longer submit them to the application layer.
  • the PDCP SN allocated for the next data packet is 6), or the same PDCP SN can be allocated again (in the above example, after the receiver is notified to delete the No. 5 data packet, the PDCP SN allocated for the next data packet is still 5 ).
  • the specific allocation mode to be adopted may be determined by the protocol, or configured by the RRC, etc., and is not limited.
  • the UPF can predict the data packet to be transmitted, and then notify the gNB.
  • GPRS tunnel protocol general packet radio service
  • the scenario where UPF predicts and transmits multiple data packets at a time is similar to the gNB prediction process described in the previous paragraph, and will not be repeated here.
  • UDC uplink data compression
  • the UDC compression algorithm requires both parties to maintain the exact same cache content, and compresses and decompresses data packets by referring to the cache content. As data is transferred, the cached content is updated according to the transferred data content. For the flow shown in Figure 8, the behavior of updating the UDC cache can be performed in the following two scenarios:
  • the sender transmits the predicted packet, and updates its own UDC cache according to the predicted packet.
  • the receiver receives the predicted data packet, and updates its own UDC cache according to the predicted data packet.
  • Scenario 1 The content of the predicted data packet is inconsistent with the real data packet, the air interface transmits the real data packet, and both the gNB and the UE update the UDC cache according to the real data packet.
  • Scenario 2 The content of the predicted data packet is consistent with the real data packet, the air interface does not transmit the real data packet, and both the gNB and the UE do not update the UDC cache.
  • the two communicating parties update the UDC cache according to the predicted data packet and the real data packet, and finally the receiver only submits the real data packet to the application layer.
  • both parties in the communication update the UDC cache only once according to the predicted data packet.
  • the sender first predicts and transmits 3 data packets, the PDCP SNs are 3, 4, and 5 respectively, and there are only 2 real data packets.
  • the above-mentioned process in FIG. 8 is described with downlink data as an example. The same process is also applicable to uplink data.
  • the AI module on the UE side generates the predicted data packet and transmits it in advance. The process is similar and will not be repeated.
  • the delay budget of the 5G system transmitting the predicted data packet is longer than the actual delay. If the budget is longer, hybrid automatic repeat request (HARQ) retransmission, automatic repeat request (ARQ) retransmission, etc. can be used to reduce the requirements for the block error rate of the underlying transmission.
  • HARQ hybrid automatic repeat request
  • ARQ automatic repeat request
  • the prediction accuracy of the AI module improves. In most cases, the content of the predicted data packet is the same as the real data packet, and there is no need to transmit the real data packet. For a small number of inaccurate predictions, the 5G system transmits real data packets. Since the probability of transmitting real data packets is low, the system can transmit in a more robust way and use more wireless resources to ensure the correctness and real-time transmission.
  • Embodiment 6 of the present application provides a communication method.
  • the communication method includes: a sender and a receiver, that is, a first communication device and a third communication device jointly predict and generate a seventh data packet, where the seventh data packet is prediction data Bag.
  • the first communication device receives an eighth data packet from the second communication device, where the eighth data packet is a real data packet.
  • the first communication device determines whether to transmit the eighth data packet to the third communication device according to the seventh data packet and the eighth data packet. For example, if the seventh data packet is the same as the eighth data packet, that is, the real data packet is the same as the predicted data packet, the eighth data packet is not sent to the third communication device. Otherwise, the eighth data packet is sent to the third communication device.
  • the third communication device receives the real data packet, that is, the eighth data packet, it submits the eighth data packet to the application layer; otherwise, it submits the seventh data packet to the application layer.
  • the third communication apparatus delivers the real eighth data packet to the application layer, delete the predicted seventh data packet.
  • the first communication device and the second communication device may use an AI algorithm to predict data packets.
  • the sender starts the AI algorithm for prediction, and the receiver does not start the AI algorithm for prediction, so as to meet the requirements of increasing the capacity and reducing the real-time data requirements.
  • the AI algorithm of the receiver is introduced in the sixth embodiment for prediction, which further reduces the amount of data transmitted in the network and improves the system efficiency.
  • a flow of a communication method is provided, which can be applied to downlink data packet transmission.
  • the first communication device as a gNB
  • the second communication device as a UPF
  • the third communication device as a UE
  • S901 the AI module of the gNB learns the data packets, and determines the algorithm and specific parameters of the AI module. Including but not limited to: sending timing of data packets, transmission window, etc.
  • the AI module of the UE learns the data packets, and determines the algorithm and specific parameters of the AI module.
  • Optional S902 the gNB and the UE exchange algorithms, parameters, etc. of the AI module, so that the gNB and the AI module in the UE are synchronized.
  • the gNB generates a prediction data packet.
  • the gNB may generate the predicted data packet by the AI module in the gNB before each transmission window (ie, the white box in the figure), that is, before the real data packet arrives at the gNB.
  • gNB receives real packets from UPF.
  • the gNB may receive real data packets from the UPF at the start of the transmission window.
  • gNB compares real packets with predicted packets. If the two are different, the gNB transmits the real data packet to the UE. If the two are the same, the gNB no longer transmits real data packets to the UE.
  • a prediction packet is generated for the receiver, ie the UE.
  • the AI module of the UE generates prediction packets. If the UE receives the real data packet from the gNB, it submits the real data packet to the application layer and deletes the predicted data packet. Otherwise, deliver the prediction packet to the application layer.
  • the UE that is, the receiver, can use the following two implementations to generate the predicted data packet.
  • the external behavior of the two implementations is the same, except that the time when the internal AI module generates the predicted data packet is different.
  • Implementation A At the beginning of each transmission window, the receiver generates a predicted packet. If the real data packet is received within the transmission window, the receiver submits the real data packet to the application layer at the end of the transmission window; if the real data packet is not received within the transmission window, the receiver sends the application layer to deliver prediction packets.
  • Embodiment B If the real data packet is received in the transmission window, the receiver submits the real data packet to the application layer at the end of the transmission window; if the real data packet is not received in the transmission window, the receiver ends in the transmission window. At the moment, the prediction data packet is generated and submitted to the application layer.
  • the "access layer” may include one or more of the SDAP layer, the PDCP layer, the RLC layer, the MAC layer, or the PHY layer; the upper layer may include an application (application, APP) layer.
  • the access layer and the upper layer may be adjacent protocol layers or non-adjacent protocol layers, which are not limited.
  • the sender and the receiver may use a data compression algorithm to compress the data packets actually transmitted by the air interface, so as to reduce the amount of data transmitted by the air interface.
  • Typical data compression algorithms include UDC and so on.
  • the UDC compression algorithm requires both parties to maintain the exact same cache content, and compresses and decompresses the data packet by referring to the cache content. With the data transmission, the cache content will be updated according to the transmitted data content. For example, the following two ways to update the UDC cache are provided:
  • Update method A Only when the real data packet is transmitted over the air interface, both the sender and the receiver will update the UDC cache according to the real data packet, otherwise both parties will not update the UDC cache.
  • Update method B The UDC cache is updated for each transmission window. If the air interface transmits real data packets, the receiver and the sender update the UDC cache according to the real data packets. If the air interface does not transmit real data packets, the sender and receiver update the UDC cache according to the predicted data packets.
  • the downlink data transmission is taken as an example for description, and this process is also applicable to the uplink data transmission, and details are not repeated here.
  • Both sides of the communication predict packets at the same time. If the predicted packet is the same as the real packet, no more packets are transmitted. If the predicted data packet is different from the real data packet, then the real data packet is transmitted, which further reduces the amount of data transmitted by the system in the 5G system.
  • network elements such as UE, gNB, or UPF can use AI algorithm to determine the location of the TSN timestamp in the data packet, or generate predicted data packets, and the like. It can be understood that network elements such as UE, gNB or UPF can directly use AI algorithm to perform the above operations. Alternatively, when an AI module is included in a network element such as a UE, a gNB or a UPF, the AI module can be used to perform the above operations. In the embodiments of the present application, the above two descriptions can be replaced with each other, and no distinction is made.
  • FIG. 10 is a schematic block diagram of an apparatus 1000 provided by an embodiment of the present application, which is used to implement the function of the first communication apparatus in the foregoing method embodiment.
  • the apparatus may be a software unit or a system-on-a-chip.
  • the system-on-chip may consist of chips, or may include chips or other discrete devices.
  • the apparatus may include a communication unit 1001 for communicating with the outside.
  • the apparatus may also include a processing unit 1002 for processing.
  • the above apparatus 1000 is used to implement the steps of the first communication apparatus in the above method embodiments.
  • the first communication apparatus may be a communication device, or may be a chip or circuit configured in the communication device.
  • the communication unit 1001 is configured to perform the transceiving related operations of the first communication apparatus in the above method embodiments.
  • the processing unit 1002 is configured to perform processing-related operations of the first communication apparatus in the above method embodiments.
  • the communication unit 1001 is configured to receive a plurality of data packets from the second communication device, the plurality of data packets are data packets of the first service, the plurality of data packets are data packets of a plurality of cycles, and the plurality of data packets are data packets of a plurality of periods.
  • the period of the data packet is less than the maximum delay of the first service.
  • the communication unit 1001 is further configured to report the above-mentioned multiple data packets to the third communication device at the end of the first period, and the maximum delay of the first service is not greater than, that is, less than or equal to the length of the first period.
  • the above apparatus 1000 is used to implement the steps of the third communication apparatus in the above method embodiments.
  • the third communication device may be a communication device, or may be a chip or circuit configured in the communication device.
  • the communication unit 1001 is configured to perform the transceiving related operations of the third communication apparatus in the above method embodiments.
  • the processing unit 1002 is configured to perform processing-related operations of the third communication apparatus in the above method embodiments.
  • the communication unit 1001 is configured to receive, after the end time of the first period, a plurality of data packets from the first communication device, where the plurality of data packets are data packets of the first service, and the plurality of data packets are Data packets of multiple periods, and the periods of the multiple data packets are less than the maximum delay of the first service, and the length of the first period is not greater than the maximum delay of the first service.
  • the division of units in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be other division methods.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit. In the device, it can also exist physically alone, or two or more units can be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the function of the communication unit in the above embodiments may be implemented by a transceiver, and the function of the processing unit may be implemented by a processor.
  • the transceiver may include a transmitter and/or a receiver, etc., for respectively implementing the functions of the transmitting unit and/or the receiving unit.
  • FIG. 11 The following description is given with reference to FIG. 11 as an example.
  • the communication apparatus 1100 shown in FIG. 11 includes at least one processor 1101 .
  • Communication apparatus 1100 may also include at least one memory 1102 for storing program instructions and/or data.
  • Memory 1102 and processor 1101 are coupled.
  • the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • the processor 1101 may cooperate with the memory 1102 , the processor 1101 may execute program instructions stored in the memory 1102 , and at least one of the at least one memory 1102 may be included in the processor 1101 .
  • the apparatus 1100 may also include a communication interface 1103 for communicating with other devices through a transmission medium, so that the communication apparatus 1100 may communicate with other devices.
  • the communication interface may be a transceiver, a circuit, a bus, a module, or other types of communication interfaces.
  • the transceiver when the communication interface is a transceiver, the transceiver may include an independent receiver and an independent transmitter; it may also be a transceiver integrating a transceiver function, or an interface circuit.
  • connection medium between the above-mentioned processor 1101 , the memory 1102 , and the communication interface 1103 is not limited in the embodiments of the present application.
  • the memory 1102, the processor 1101, and the communication interface 1103 are connected through a communication bus 1104 in FIG. 11.
  • the bus is represented by a thick line in FIG. 11, and the connection mode between other components is only a schematic illustration. , not as a limitation.
  • the bus may include an address bus, a data bus, a control bus, and the like. For convenience of presentation, only one thick line is used in FIG. 11 , but it does not mean that there is only one bus or one type of bus or the like.
  • the apparatus 1100 is configured to implement the steps performed by the first communication apparatus in the above method embodiments.
  • the communication interface 1103 is configured to perform the transceiving-related operations of the first communication device in the above method embodiments
  • the processor 1101 is configured to perform the processing-related operations of the first communication device in the above method embodiments.
  • the communication interface 1103 is used to receive a plurality of data packets from the second communication device, the plurality of data packets are data packets of the first service, the plurality of data packets are data packets of a plurality of cycles, and the plurality of data packets are data packets of a plurality of cycles.
  • the period of the data packet is less than the maximum delay of the first service; the communication interface 1103 is also used to report the above-mentioned multiple data packets to the third communication device after the end time of the first period, wherein the length of the first period is not greater than The maximum delay of the first service.
  • the apparatus 1100 is configured to implement the steps performed by the third communication apparatus in the above method embodiments.
  • the communication interface 1103 is configured to perform the transceiving-related operations of the third communication device in the above method embodiments
  • the processor 1101 is configured to perform the processing-related operations of the third communication device in the above method embodiments.
  • the communication interface 1103 is configured to receive, after the end time of the first period, a plurality of data packets from the first communication device, where the plurality of data packets are data packets of the first service, and the plurality of data packets are a plurality of data packets.
  • Periodic data packets, and the periods of the plurality of data packets are less than the maximum delay of the first service, and the length of the first period is not greater than the maximum delay of the first service.
  • an embodiment of the present application further provides an apparatus, where the apparatus is configured to execute the method in the above method embodiment.
  • a computer-readable storage medium comprising a program, when the program is executed by a processor, the methods in the above method embodiments are performed.
  • a computer program product comprising computer program code, when the computer program code is run on a computer, causes the computer to implement the methods in the above method embodiments.
  • a chip comprising: a processor, the processor is coupled with a memory, the memory is used for storing a program or an instruction, when the program or instruction is executed by the processor, the device causes the apparatus to perform the above method embodiments Methods.
  • the processor may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, which can be implemented or executed
  • a general purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
  • the memory may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., and may also be a volatile memory (volatile memory), for example Random-access memory (RAM).
  • Memory is, but is not limited to, any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • the memory in this embodiment of the present application may also be a circuit or any other device capable of implementing a storage function, for storing program instructions and/or data.
  • the methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software When implemented in software, it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, network equipment, user equipment, or other programmable apparatus.
  • the computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server or data center by wire (eg coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg infrared, wireless, microwave, etc.).
  • the computer-readable storage medium can be any available media that can be accessed by a computer, or a data storage device such as a server, data center, etc. that includes one or more available media integrated.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, digital video discs (DVD)), or semiconductor media (eg, SSDs), and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

一种通信方法及装置,该方法包括:第一通信装置接收来自第二通信装置的多个数据包,上述多个数据包为第一业务的数据包,上述多个数据包为多个周期的数据包,且上述多个数据包的周期小于第一业务的最大时延,在第一时段的结束时刻,第一通信装置集中向第三通信装置上报上述多个数据包,其中,第一时段的长度不大于第一业务的最大时延。通过实施该集中上报的方法,可以提高数据包的传输效率,降低数据调度复杂度。

Description

一种通信方法及装置 技术领域
本申请实施例涉及通信技术领域,尤其涉及一种通信方法及装置。
背景技术
随着移动通信系统的不断演进,移动通信系统能提供的传输容量越来越大,数据包传输时延越来越小,客观上具备了承担工业控制系统中信息传递的能力。另一方面,随着工业自动化的不断进步,工业生产逐步向灵活产能、小批量生产的方向演进,传统工业场景中使用有线系统传输控制信息,生产系统灵活性差,无法灵活适应小批量、多样化的生产需求。所以,工业场景对无线网络系统的需求变得越来越迫切。
针对第三代合作伙伴计划(3rd generation partnership project,3GPP)网络在工业控制系统中的应用,5G的R16版本引入了工业物联网(industry internet of things,IIoT)特性。通过5G通信系统,将工业控制系统中的各种功能节点连接起来,包括发出控制命令的工业控制器、接收控制命令的操作臂、配置控制器和操作臂等节点的配置单元等。5G系统提供灵活的路由方式,各类工业控制器和操作臂可以快速地组织成为不同的生产线,从而达到灵活部署的目的,适应用小批量,多样化的生产需求。如何在多个通信装置间传输数据包是本申请实施例待解决的技术问题。
发明内容
本申请实施例提供一种通信方法及装置,以解决在不同通信装置间传输数据包的技术问题。
第一方面,提供一种通信方法,该方法的执行主体为第一通信装置,该第一通信装置可以为通信设备,或者为通信设备中的部件(芯片、电路或其它等),包括:第一通信装置接收来自第二通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延;第一通信装置在第一时段的结束时刻后,向第三通信装置上报所述多个数据包,所述第一时段的长度不大于所述第一业务的最大时延。
通过实施上述方法,第一通信装置集中向第三通信装置上报多个数据包,提高传输效率,降低数据调度复杂度。
在一种可能的实现方式中,上述第一时段通过定时器实现。第一通信装置在接收到来自第二通信装置的第一个数据包时,启动定时器,在定时器超时后,向第三通信装置上报所接收的多个数据包。所述定时器的时长小于或等于第一业务的最大时延。
在另一种可能的实现方式中,上述第一时段通过计数器实现。第一通信装置在接收到来自第三通信装置的第一个数据包时,启动计数器,且计数器每接收到一个数据包时,计数值加1,当计数值达到阈值或门限时,向第三通信装置上报所述多个数据包;其中,阈值或门限是根据数据包的周期以及第一业务的最大时延所确定。比如,第一业务的最时延为200ms,周期为5ms,则上述阈值或门限的取值为40。
通过实施上述方法,除了采用定时器的方式外,还可采用计数器的方式,实现方式多 样化,满足不同场景的需求。
可选的,第一通信装置可删除所述多个数据包中的第二数据包的时间信息,所述第二数据包为所述多个数据包中需要删除时间信息的数据包;向第三通信装置上报所述多个数据包。
通过实施上述方法,由于时间信息不通过无线接口传输,降低无线通信系统特别是无线接口的数据传输量。
在一种可能的实现方式中,所述删除所述多个数据包中的第二数据包的时间信息,具体包括:第一通信装置根据所述多个数据包的参数,确定第二数据包;第一通信装置在所述第二数据包的第一位置,删除所述时间信息,所述第一位置为预配置的。
通过数据包的参数,即可确定需要删除时间信息的第二数据包,无需额外发送指示信息,降低开销。
在一种可能的实现方式中,所述删除所述多个数据包中的第二数据包的时间信息,包括:第一通信装置通过人工智能AI算法,确定所述第二数据包;第一通信装置通过所述AI算法,确定所述时间信息在所述第二数据包中的第一位置;第一通信装置在所述第一位置,删除所述第二数据包中的时间信息。
通过实施上述方法,利用AI算法,确定待删除时间信息的第二数据包,以及待删除时间信息在第二数据包中的位置,通过长时间的AI训练,准确度较高。
可选的,所述第二数据包中包括第一指示信息,所述第一指示信息用于指示已经被删除所述时间信息的数据包。
通过实施上述方法,直接在需要删除时间信息的数据包中携带第一指示信息,而数据包的其它参数,例如,MAC地址、源地址、目的端口、源端口号等都不再受限。第一通信装置可通过在数据包中携带第一指示信息,删除任何数据包中的时间信息,灵活度较高。
第二方面,提供一种通信方法,该方法的执行主体为第三通信装置,该第三通信装置可以为通信设备,或者为配置于通信设备中的部件(芯片、电路或其它等),包括:第三通信装置在第一时段的结束时刻后接收来自第一通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延,所述第一时段的长度不大于所述第一业务的最大时延。
通过实施上述方法,通过将多份数据包集中传输,降低了数据传输所需的开销,提高了无线传输的效率。
在一种可能的实现方式中,第三通信装置在所述多个数据包中的第二数据包中,添加时间信息,所述第二数据包为所述多个数据包中,被删除时间信息的数据包。
在一种可能的实现方式中,在所述多个数据包中的第二数据包中,添加时间信息,包括:第三通信装置根据所述多个数据包的参数,确定所述第二数据包;第三通信装置在所述第二数据包中的第一位置,添加所述时间信息,所述第一位置为预配置的。
在一种可能的实现方式中,所述在所述多个数据包中的第二数据包中,添加时间信息,包括:第三通信装置在所述多个数据包中,确定携带第一指示信息的第二数据包,所述第一指示信息用于指示被删除所述时间信息的数据包;第三通信装置在所述第二数据包中的第一位置,添加所述时间信息,所述第一位置为预配置的。
在一种可能的实现方式中,所述在所述多个数据包中的第二数据包中,添加时间信息,包括:第三通信装置通过人工智能AI算法,确定所述多个数据包中被删除时间信息的第 二数据包;第三通信装置通过所述AI算法,确定所述第二数据包中的第一位置;第三通信装置在所述第二数据包中的第一位置,添加所述时间信息。
可选的,所述方法还包括:第三通信装置根据所述多个数据包的发送周期,确定所述第二数据包的时间信息。或者,确定第一数据包的接收时间,所述第一数据包中为所述多个数据包中的第一个数据包;根据所述第一数据包的接收时间以及传输时延,确定所述第二数据包的时间信息。
第三方面,提供一种通信方法,该方法的执行主体为第一通信装置,该第一通信装置可以为通信设备,或者为通信设备中的部件(芯片、电路或其它等),包括:第一通信装置,接收来自第二通信装置的第三数据包;第一通信装置删除所述第三数据包中的时间信息;第一通信装置向第三通信装置发送第四数据包,所述第四数据包为所述第三数据包被删除时间信息后的数据包。
通过实施上述方法,由于时间信息不通过无线接口传输,降低无线通信系统特别是无线接口的数据传输量。
在一种可能的实现方式中,所述删除所述第三数据包中的时间信息,包括:第一通信装置获取所述第三数据包的参数;当所述参数满足预设条件时,第一通信装置在所述第三数据包中的第一位置,删除所述时间信息,所述第一位置为预配置的。
在一种可能的实现方式中,所述删除所述第三数据包中的时间信息,包括:第一通信装置通过人工智能AI算法,确定所述第三数据包中包含待删除的时间信息;第一通信装置通过所述AI算法,确定所述时间信息在所述第三数据包中的第一位置;第一通信装置在所述第一位置,删除所述时间信息。
可选的,所述第四数据包中携带有第一指示信息,所述第一指示信息用于指示所述第四数据包已经被删除时间信息。
第四方面,提供一种通信方法,该方法的执行主体为第三通信装置,该第三通信装置可以为通信设备,或者为通信设备中的部件(芯片、电路或其它等),包括:第三通信装置接收来自第一通信装置的第四数据包,所述第四数据包被删除时间信息;第三通信装置在所述第四数据包中,添加所述时间信息。
通过实施上述方法,发送方即第一通信装置删除数据包中的时间信息再传输,而接收方即第三通信装置接收到数据包后,再执行时间信息补足的操作,可降高空口中传输数据包的开销,提高频谱利用率。
可选的,所述在所述第四数据包中,添加所述时间信息,包括:第三通信装置获取所述第四数据包的参数;当所述参数满足预设条件时,第三通信装置在所述第四数据包中的第一位置,添加所述时间信息,所述第一位置为预配置的。
可选的,所述在所述第四数据包中,添加所述时间信息,包括:当所述第四数据包中包括第一指示信息时,第三通信装置在所述第四数据包中的第一位置,添加所述时间信息,所述第一指示信息用于指示所述第四数据包已被删除时间信息,所述第一位置为协议规定的。
可选的,所述在所述第四数据包中,添加所述时间信息,包括:第三通信装置通过人工智能AI算法,确定所述第四数据包为删除时间信息的数据包;第三通信装置通过所述AI算法,确定所述第四数据包中的第一位置;第三通信装置在所述第四数据包中的第一位置,添加所述时间信息。
可选的,所述方法还包括:第三通信装置根据所述第四数据包的发送周期,确定所述时间信息。或者,确定所述第四数据包的接收时间;根据所述第四数据包的接收时间以及传输时延,确定所述时间信息。
第五方面,提供一种通信方法,该方法的执行主体为第一通信装置,该第一通信装置可以为通信设备,或者为通信设备中的部件(芯片、电路或其它等),包括:第一通信装置生成第五数据包;第一通信装置向第二通信装置发送所述第五数据包;第一通信装置接收来自第三通信装置的第六数据包;第一通信装置根据所述第五数据包和所述第六数据包,确定是否向第二通信装置传输所述第六数据包。
通过实施上述方法,发送方即第一通信装置预测数据包内容,生成预测数据包。在真实数据包到来之前,先发送预测数据包,可降低数据的传输时延。
可选的,所述根据所述第五数据包和所述第六数据包,确定是否向第二通信装置传输所述第六数据包,包括:若所述第五数据包与第六数据包相同,则第一通信装置不再向所述第二通信装置传输所述第六数据包;或者,若所述第五数据包与第六数据包不相同,则第一通信装置向所述第二通信装置传输所述第六数据包。
通过实施上述方法,发送方仅发送真实包与预测包不同的数据包,在降低数据传输时延的基础上,可进一步降低空口开销。
可选的,所述第五数据包的数量为N1个,所述第六数据包的数量为N2个,所述N1与N2均为正整数,当所述N1个第五数据包与N2个第六数据包中有部分数据包不同时,向所述第二通信装置传输与所述第五数据包不同的第六数据包。
通过实施上述方法,当多个数据包共同发送时,发送方仅发送部分不同的数据包,而不是将整个数据包重新发送,可降低空口开销。
可选的,所述方法还包括:若所述第五数据包的数量大于第六数据包的数量,则第一通信装置向所述第二通信装置发送通知消息,所述通知消息用于通知所述第二通信装置删除多余的第五数据包。
通过实施上述方法,当预测的数据包多于真实数据包时,发送方通知接收方删除多余的数据包,可避免接收方执行错误的操作,保证工业控制的安全。
第六方面,提供一种通信方法,该方法的执行主体为第二通信装置,该第二通信装置可以为通信设备,或者为通信设备中的部件(芯片、电路或其它等),包括:第二通信装置接收来自第一通信装置的第五数据包;当接收到第六数据包时,第二通信装置向应用层递交所述第六数据包,否则向应用层递交所述第五数据包。
通过实施上述方法,接收方即第三通信装置若接收到真实的数据包,则向应层递交真实数据包,否则递交预测数据包。由于预测数据包更早到达,可降少数据的传输时延。
可选的,若接收到所述第六数据包,所述方法还包括:第二通信装置删除所述第五数据包。
第七方面,提供一种通信方法,该方法的执行主体为第一通信装置,该第一通信装置可以为通信设备,或者为通信设备中的部件(芯片、电路或其它等),包括:第一通信装置生成第七数据包;第一通信装置接收来自第二通信装置的第八数据包;第一通信装置根据所述第七数据包和所述第八数据包,确定是否向第三通信装置传输所述第八数据包。
通过实施上述方法,发送方与接收方,即第一通信装置与第三通信装置同时启动对数据包的预测功能,均进行数据包预测。此时,双方只需要传输真实数据包与预测数据包不 同的真实数据包即可,无需传输预测数据包,进一步降低了信令开销和数据时延。可选的,第一通信装置和第二通信装置可通过AI算法,预测数据包。
可选的,所述根据所述第七数据包和所述第八数据包,确定是否向第三通信装置传输所述第八数据包,包括:若所述第八数据包与所述第七数据包相同,则第一通信装置不再向所述第三通信装置传输所述第八数据包;或者,若所述第八数据包与所述第七数据包不同,则第一通信装置向所述第三通信装置传输所述第八数据包。
第八方面,提供一种通信方法,该方法的执行主体为第三通信装置,该第三通信装置可以为通信设备,或者为通信设备中的部件(芯片、电路或其它等),包括:第三通信装置生成第七数据包;若接收到来自第一通信装置的第八数据包,则第三通信装置向应用层递交所述第八数据包,否则向应用层递交所述第七数据包。
通过实施上述方法,接收方第三通信装置引入数据包的预测功能,进一步降低网络内传输的数据量,提升系统效率。
可选的,若向应用层递交所述第八数据包,所述方法还包括:第三通信装置删除所述第七数据包。
第九方面,本申请实施例还提供一种装置,有益效果可参见第一方面的描述。所述装置具有实现上述第一方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件实现。所述硬件或软件可包括一个或多个上述功能相对应的单元。在一种可能的设计中,该装置包括:通信单元,用于接收来自第二通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延;所述通信单元,还用于在所述第一时段的结束时刻后,向第三通信装置上报所述多个数据包,所述第一时段的长度不大于所述第一业务的最大时延。这些单元可以执行上述第一方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第十方面,本申请实施例还提供一种装置,有益效果可参见第二方面的描述。所述装置具有实现上述第二方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件。所述硬件或软件可包括一个或多个上述功能相对应的模块。在一种可能的设计中,该装置包括:通信单元,用于在第一时段的结束时刻后,接收来自第一通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延,所述第一时段的长度不大于所述第一业务的最大时延。这些单元可以执行上述第二方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第十一方面,本申请实施例还提供一种装置,有益效果可参见第三方面的描述。所述装置具有实现上述第二方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件。所述硬件或软件可包括一个或多个上述功能相对应的模块。在一种可能的设计中,该装置包括:通信单元,用于接收来自第二通信装置的第三数据包;处理单元,用于删除所述第三数据包中的时间信息;通信单元,还用于向第三通信装置发送第四数据包,所述第四数据包为所述第三数据包被删除时间信息后的数据包。这些单元可以执行上述第三方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第十二方面,本申请实施例还提供一种装置,有益效果可参见第四方面的描述。所述装置具有实现上述第二方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬 件或软件。所述硬件或软件可包括一个或多个上述功能相对应的模块。在一种可能的设计中,该装置包括:通信单元,用于接收来自第一通信装置的第四数据包,所述第四数据包被删除时间信息;处理单元,用于在所述第四数据包中,添加所述时间信息。这些单元可以执行上述第四方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第十三方面,本申请实施例还提供一种装置,有益效果可参见第五方面的描述。所述装置具有实现上述第五方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件。所述硬件或软件可包括一个或多个上述功能相对应的模块。在一种可能的设计中,该装置包括:处理单元,用于生成第五数据包;通信单元,用于向第二通信装置发送所述第五数据包;通信单元,还用于接收来自第三通信装置的第六数据包;处理单元,还用于根据所述第五数据包和所述第六数据包,确定是否向第二通信装置传输所述第六数据包。这些单元可以执行上述第五方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第十四方面,本申请实施例还提供一种装置,有益效果可参见第六方面的描述。所述装置具有实现上述第六方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件。所述硬件或软件可包括一个或多个上述功能相对应的模块。在一种可能的设计中,该装置包括:通信单元接收来自第一通信装置的第五数据包;通信单元,用于当接收到第六数据包时,向应用层递交所述第六数据包,否则向应用层递交所述第五数据包。这些单元可以执行上述第六方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第十五方面,本申请实施例还提供一种装置,有益效果可参见第七方面的描述。所述装置具有实现上述第七方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件。所述硬件或软件可包括一个或多个上述功能相对应的模块。在一种可能的设计中,该装置包括:处理单元,用于生成第七数据包;通信单元,用于接收来自第二通信装置的第八数据包;处理单元,用于根据所述第七数据包和所述第八数据包,确定是否向第三通信装置传输所述第八数据包。这些单元可以执行上述第七方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第十六方面,本申请实施例还提供一种装置,有益效果可参见第八方面的描述。所述装置具有实现上述第二方面的方法实施例中行为的功能。所述功能可以通过执行相应的硬件或软件。所述硬件或软件可包括一个或多个上述功能相对应的模块。在一种可能的设计中,该装置包括:处理单元,用于生成第七数据包;通信单元,用于若接收到来自第一通信装置的第八数据包,则向应用层递交所述第八数据包,否则向应用层递交所述第七数据包。这些单元可以执行上述第八方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第十七方面提供了一种装置,该装置可以为上述第一方面方法实施例中的第一通信装置。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使装置执行上述第一方面方法实施例中由第一通信装置所执行的方法。
第十八方面,提供了一种装置,该装置可以为上述第二方面方法实施例中的第三通信装置。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存 储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使装置执行上述第二方面方法实施例中由第三通信装置所执行的方法。
第十九方面提供了一种装置,该装置可以为上述第三方面方法实施例中的第一通信装置。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使装置执行上述第三方面方法实施例中由第一通信装置所执行的方法。
第二十方面,提供了一种装置,该装置可以为上述第四方面方法实施例中的第四通信装置。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使装置执行上述第四方面方法实施例中由第三通信装置所执行的方法。
第二十一方面,提供了一种装置,该装置可以为上述第五方面方法实施例中的第一通信装置。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使装置执行上述第五方面方法实施例中由终端设备所执行的方法。
第二十二方面,提供了一种装置,该装置可以为上述第六方面方法实施例中的第二通信装置。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使装置执行上述第六方面方法实施例中由第二通信装置所执行的方法。
第二十三方面提供了一种装置,该装置可以为上述第七方面方法实施例中的第一通信装置。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使装置执行上述第七方面方法实施例中由第一通信装置所执行的方法。
第二十四方面,提供了一种装置,该装置可以为上述第八方面方法实施例中的第三通信装置。该装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使装置执行上述第八方面方法实施例中由第三通信装置所执行的方法。
第二十五方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码并运行时,使得上述第一方面中由第一通信装置执行的方法被执行。
第二十六方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码被运行时,使得上述第二方面中由第三通信装置执行的方法被执行。
第二十七方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码并运行时,使得上述第三方面中由第一通信装置执行的方法被执行。
第二十八方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码被运行时,使得上述第四方面中由第三通信装置执行的方法被执行。
第二十九方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码并运行时,使得上述第五方面中由第一通信装置执行的方法 被执行。
第三十方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码被运行时,使得上述第六方面中由第二通信装置执行的方法被执行。
第三十一方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码并运行时,使得上述第七方面中由第一通信装置执行的方法被执行。
第三十二方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码被运行时,使得上述第八方面中由第三通信装置执行的方法被执行。
第三十三方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述第一方面的方法中第一通信装置的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第三十四方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述第二方面的方法中第三通信装置的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第三十五方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述第三方面的方法中第一通信装置的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第三十六方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述第四方面的方法中第三通信装置的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第三十七方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述第五方面的方法中第一通信装置的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第三十八方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述第六方面的方法中第二通信装置的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第三十九方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述第七方面的方法中第一通信装置的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第四十方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述第八方面的方法中第三通信装置的功能。在一种可能的设计中,所述芯片系统还包括存储器, 用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第四十一方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第一方面中由第一通信装置执行的方法。
第四十二方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第二方面中由第三通信装置执行的方法。
第四十三方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第三方面中由第一通信装置执行的方法。
第四十四方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第四方面中由第三通信装置执行的方法。
第四十五方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第五方面中由第一通信装置执行的方法。
第四十六方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第六方面中由第二通信装置执行的方法。
第四十七方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第七方面中由第一通信装置执行的方法。
第四十八方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第八方面中由第三通信装置执行的方法。
附图说明
图1为本申请实施例提供的网络架构的一示意图;
图2为本申请实施例提供的接入网设备的一示意图;
图3为本申请实施例提供的5G时钟和TSN时钟的示意图;
图4为本申请实施例一提供的通信方法的一流程示意图;
图5为本申请实施例二提供的通信方法的一流程示意图;
图6为本申请实施例三提供的通信方法的一流程示意图;
图7为本申请实施例四提供的通信方法的一流程示意图;
图8为本申请实施例五提供的通信方法的一流程示意图;
图9为本申请实施例六提供的通信方法的一流程示意图;
图10为本申请实施例提供的通信装置的一结构示意图;
图11为本申请实施例提供的通信装置的另一结构示意图。
具体实施方式
如图1所示,为工业物联网(industry IoT,internet of things,IIOT)的系统架构图,包括以下中的至少一个:时间敏感网络(time-sensitive network,TSN)系统、通信系统和数据网络(data network,DN)。
一、通信系统
其中,上述通信系统包括接入网设备和核心网设备。接入网设备还可称为无线接入网络(radio access network,RAN)设备。不同接入网设备之间可通过Xn接口连接,接入网设备与核心网设备之间可通过NG接口连接。
接入网设备是一种将终端设备接入到无线网络的设备,可以为终端设备提供无线资源管理、服务质量管理、数据加密和压缩等功能。示例性地,接入网设备可以包括以下几种类型:
1、下一代节点(next generation nodeB,gNB),为终端设备提供新无线(new radio,NR)的控制面和/或用户面的协议和功能,并且接入到核心网。例如,5G核心网(5th generation core,5GC)。
2、下一代演进型节点(next generation evolved Node B,ng-eNB),为终端设备提供演进的通用陆地无线接入(evolved universal terrestrial radio access,E-UTRA)的控制面和/或用户面的协议和功能,并且接入到核心网。例如,5GC等。
进一步,如图2所示,接入网设备可以由集中式单元(central unit,CU)和分布式单元(distributed unit,DU)构成,即可对原接入网设备的功能进行拆分,将原接入网设备的部分功能部置在CU,剩余的部分功能部署在DU,多个DU共用一个CU,节省成本,易于网络扩展。可选的,CU和DU的功能可能按照协议栈划分。例如,将无线资源控制(radio resource control,RRC)层,业务数据适配协议(service data adaptation protocol,SDAP)层和分组数据汇聚协议(packet data convergence protocol,PDCP)层部署在CU。其余的无线链路控制(radio link control,RLC)层,媒体接入控制(medium access control,MAC)层和物理层(physical,PHY)层部署在DU。CU和DU之间可通过FI接口连接。CU可以代表接入网设备通过NG接口与核心网相连,CU还可以代表接入网设备通过Xn接口和其它接入网设备相连。更进一步的,CU的功能还可被划分为:
1、集中单元-控制平面(central unit–control plane,CU-CP):主要包括了CU中的RRC层,以及PDCP层中的控制面;
2、集中单元-用户平面(central unit–user plane,CU-UP):主要包括了CU中的SDAP层,以及PDCP层中的用户面。
核心网设备主要用于对终端设备进行管理并提供与外网通信的网关。核心网设备,可以包括以下中的一个或多个网元:
用户面功能(user plane function,UPF)网元:主要负责用户数据的转发和接收。在下行传输中,UPF网元可以从数据网络(data network,DN)接收用户数据,通过接入网设备传输给终端设备;在上行传输中,UPF网元可以通过接入网设备从终端设备接收用户数据,向DN转发该用户数据。可选的,UPF网元中为终端设备提供服务的传输资源和调度功能可以由SMF网元管理控制。PCF网元,主要支持提供统一的策略框架来控制网络行为,提供策略规则给控制层网络功能,同时负责获取与策略决策相关的用户签约信息。
接入和移动管理功能(access and mobility management function,AMF)网元:主要负 责移动网络中的移动性管理,如用户位置更新、用户注册网络、用户切换等。
会话管理功能(session management function,SMF)网元:主要负责移动网络中的会话管理,如会话建立、修改、释放。具体功能如为用户分配IP地址、选择提供报文转发功能的UPF网元等。
策略控制功能(policy control function,PCF)网元:主要支持提供统一的策略框架来控制网络行为,提供策略规则给控制层网络功能,同时负责获取与策略决策相关的用户签约信息。
TSN应用功能(application function,AF)网元:主要支持与3GPP核心网交互来提供服务,例如影响数据路由决策,策略控制功能或者向网络侧提供第三方的一些服务。
统一数据管理(unified data management,UDM)网元:主要用于生成认证信任状,用户标识处理(如存储和管理用户永久身份等),接入授权控制和签约数据管理等。
网络开放功能(network exposure function,NEF)网元:用于提供网络能力开放相关的框架、鉴权和接口,在5G系统网络功能和其他网络功能之间传递信息。
需要说明的是,在不同的通信系统中,上述核心网中的网元可以有不同的名称。在上述图1所示的示意图中,是以第五代移动通信系统为例进行说明的,并不作为对本申请的限定。
可选的,图1所示的通信系统中,还可包括:终端设备。终端设备可以简称为终端,是一种具有无线收发功能的设备,终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。所述终端设备可以是手机、平板电脑、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶中的无线终端设备、远程医疗中的无线终端设备、智能电网中的无线终端设备、运输安全中的无线终端设备、智慧城市中的无线终端设备、或智慧家庭中的无线终端设备等。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来第五代(the 5th generation,5G)网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等。终端设备有时也可以称为用户设备(user equipment,UE)、接入终端设备、车载终端设备、工业控制终端设备、UE单元、UE站、移动站、移动台、远方站、远程终端设备、移动设备、无线通信设备、UE代理或UE装置等。终端设备也可以是固定的或者移动的。本申请实施例对此并不限定。
二、TSN系统
针对第三代合代伙伴计划(3rd generation partnership project,3GPP)网络在工业控制系统中的应用,5G的R16版本中引入了IIOT特性。通过5G通信系统,将工业控制系统中的各种功能节点连接起来,包括发出控制命令的工业控制器、接收控制命令并执行的工业终端,例如,操作臂等、配置控制器和操作臂等节点的配置单元等。5G系统提供灵活的路由方式,各类工业控制器和工业终端可以快速地组织成不同的生产线,从而达到灵活部署的目的,适应小批量、多样化的生产需求。
工业控制系统中涉及的数据包,除了日志数据包外,大部分控制数据包要求实时性和 确定性。所述实时性还可称为超短时延。实时性是对数据包的传输时延的长短的要求,即要求数据包的传输时延不能大于T_delay;确定性是对数据包的传输时延的抖动性的要求,即要求数据的传输时延必须等于T_delay。为达到确定性要求,需要在接收方增加缓存,如果接收时间比预期时间更早,则先缓存再递交。为达到实时性要求,无线网络需要使用更多的无线资源、更鲁棒的调制解调方式传输,或者设计特殊的调度方式降低传输时延,如上行免调度模式等。
三、DN
DN可以是为用户提供数据业务服务的服务网络。例如,DN可以是IP多媒体业务(IP multi-media service)网络或互联网等。其中,终端设备可以建立从终端设备到DN的协议数据单元(protocol data unit,PDU)会话,来访问DN。
参见图1,图1中的中间部分粗线方框内的部分属通信系统,图1中间部分粗线方框外的部分属于工业控制系统,通信系统通过两个接口与工业控制系统相连。上述两个接口可分别为终端设备侧的终端侧TSN转换器(destination side TSN translator,DS-TT)和UPF侧的网络侧TSN转换器(network-side TSN translator,NW-TT)。这两个接口合作,可计算IIOT的控制信息经过5G通信系统所经历的传输时延,即IIOT的控制信息经过这两个接口的时延。实际部署时,UPF和UE都维护同一个时钟,称作5G时钟。同一时刻,UPF侧的5G时钟与UE侧的5G时钟同步。所以,当一个IIOT控制信息经过UPF侧的NW-TT时,UPF记录这一时刻对应的时间。该IIOT控制信息经过5G网络,到达UE侧的DS-TT时,UE记录这一时刻对应的时间。根据UPF和UE记录的时间信息,即可计算该IIOT控制信息经过5G网络的传输时延。
其中,在工业控制系统中,各个设备协同工作,需要基于共同的时钟进行控制,即时间敏感网络(time-sensitive network,TSN)时钟。TSN时钟的精度与工业控制系统的具体需求有关,每一条具体的生产线可以使用自己的TSN时钟,不同生产线所使用的TSN时钟相互独立。以图1为例,如果不同生产线都通过5G网络传输控制信息,这些生产线的控制信息可以基于不同的TSN时钟,5G网络对这些控制信息透明传输,但是需要测量这些控制信息经过5G网络的传输时延,以便工业控制信息的接收方将5G网络的传输时延计算在内,从而可以精确管理每条消息的执行时间。上述描述,以5G网络为例进行描述,并不作为对本申请实施例的限定。比如,在本申请实施例中,可利用4G或未来的6G通信系统,传输工业控制系统的数据信息和/或控制信息等。
如图3所示,为5G网络应用于工业控制的时钟同步系统。图3中的中间部分属于5G网络,5G网络中的UPF、gNB、UE等网元都维护着共同的时钟,即5G时钟。图3中的各个5G网元的5G时钟都来自同一个主时钟“5G主时钟(5th generation grand master clock,5G GM)”,5G GM可以是一个全球定位系统(global position system,GPS)模块,维护GPS时间,也是其它类型的高精度时钟,不作限定。除此之外,UPF侧的NW-TT和UE侧的DS-TT都维护着共同的TSN时钟。由于UPF和NW-TT属于同一个物理实体,NW-TT是嵌入UPF的一个接口模块,可以看作UPF或NW-TT同时维护着两个时钟:5G时钟和TSN时钟。UE侧也类似,可以看作UE或DS-TT同时维护两个时钟:5G时钟和TSN时钟。如果5G系统同时传输多条生产线的控制信息,每条生产线使用各自的TSN时钟:TSN1、TSN2……。则UPF和UE同时维护5G时钟和多个TSN时钟。可选的,UE和UPF所维护的TSN时钟的数量通常不同。进一步,UE所维护工业终端的数量通常和生产线的数量 相关。
基于上述图3的时钟同步系统,工业控制数据包通过NW-TT进入5G系统时,NW-TT可为该数据包增加一个时间戳,表示该数据包经过NW-TT的时刻,该时间戳用5G时间表示,如15时32分45秒438毫秒。当该数据包经过5G系统到达UE时,UE侧的DS-TT读取自己维护的5G时钟,如15时32分45秒458毫秒,则认为该数据包经过5G系统的时延为20毫秒。通常,工业控制数据中可能还包含了该数据包的执行时间,该执行时间基于TSN时钟,对5G系统不可见。
上述图1、图2和图3所描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
本申请实施例中涉及的网元包括接入网设备、终端设备、核心网网元、工业控制器等。其中,接入网设备可以是CU/DU架构的,这时接入网设备包括CU和DU两个网元。或者,接入网设备也可以是CP-UP架构的,这时接入网设备包含CU-CP、CU-UP和DU三个网元。或者,接入网设备还可以是开放无线接入网(Open radio access network,ORAN)架构的,这时接入网设备包括CU-CP、CU-UP、DU、近实时接入网智能控制器(RAN intelligent controller,RIC)四个网元甚至更多网元。进一步,DU还可被分离成DU-H和DU-L等,以支持远端物理层等低层分离。核心网网元可负责准入和会话管理等。工业控制器可负责生成工业控制数据,维护TSN时钟等。
实施例一
本申请实施例一提供一种通信方法,该方法包括:第一通信装置接收来自第二通信装置的多个数据包。在第一时段的结束时刻,第一通信装置向第三通信装置上报所述多个数据包。
在一种可能的实现方式中,终端设备(例如UE)与工业终端相连,所述工业终端可包括传感器和机械臂等,核心网网元(例如UPF网元)与工业控制器相连。由终端设备接收工业终端发来的上报数据包,集中传输至核心网网元,进而传输至工业控制器。则上述第一通信装置可以为终端设备,第二通信装置可以为工业终端,或者与工业终端相连的通信设备,第三通信装置可为接入网设备。在后续描述中,“工业终端”与“工业终端相连 的通信设备”两者不作区分,可相互替换。后续,以“工业终端”为例进行描述。
在另一种可能的实现方式中,终端设备与工业控制器相连,核心网网元与工业终端相连,由核心网网元接收工业终端发来的数据,集中传输至终端设备。则上述第一通信装置可以为核心网网元,第二通信装置可以为工业终端,第三通信装置可以为接入网设备等。可以理解的是,上述通信装置可以为工业终端、终端设备、接入网设备或核心网网元等,还可以是工业终端、终端设备、接入网设备或核心网网元中的部件,例如芯片、电路或其它等,不作限定。
如图4所示,提供一种通信方法的流程,该流程以第一通信装置为UE,第二通信装置为工业终端X,第三通信装置为gNB为例进行介绍,该流程包括但不限于:
可选的,S400,工业终端、UE、gNB、UPF、电脑数控(computer numerical control CNC)或工业控制器等,通过信令交互,确定来自工业终端X的数据包延迟上报。该延迟上报是指UE将工业终端X在多个周期中上报给UE的多个数据包集中上报给gNB。
S401,UE接收来自工业终端X的多个数据包。其中,工业终端X的多个数据包为多个周期的数据包,该多个数据包的周期小于第一业务的最大时延。示例性地,这里的周期可以指工业终端X向UE上报数据包的周期。
可选的,UE可根据数据包的DS-TT端口号、工业终端的MAC地址、数据包中的类型标识(TYPE ID)、数据包中的目的MAC地址等信息中的一个或多个,确定这是来自工业终端X的上报数据包。根据上述S400的结论,识别出该数据包属于延迟上报。
S402,在第一时段的结束时刻,UE向gNB集中上报上述多个数据包。其中,第一时段的长度不大于第一业务的最大时延。
实施方式A:UE通过定时器管理集中上报的多个数据包。示例性地,上述第一时段等于定时器的时长,上述第一时段的结束时刻为定时器超时时刻。
UE接收到来自工业终端X的第一数据包,启动定时器,该第一数据包为上述多个数据包中的第一个数据包。在定时器的运行期间,UE接收来自工业终端X的其它数据包,该其它数据包为上述多个数据包中,除第一数据包之外的剩余数据包。在定时器超时后,UE向gNB集中上报所述多个数据包。
在一种具体的实现方式中,UE每接收到来自工业终端X的一个数据包之后,则判断定时器是否已启动。如果定时器尚未启动或者已经超时,则启动定时器,并存储收到的来自工业终端X的上报数据包。后续每次收到来自工业终端X的上报数据包,如果定时器尚未超时,则存储接收到的上报数据包,例如按接收顺序存储收到的上报数据包等。如果定时器超时,则将存储的所有未上报过的数据包集中传输。集中传输的包,经gNB、UPF,最终传至工业控制器等。例如,工业终端X的上报周期为4ms,最大时延为200ms,则定时器的时长只要满足小于或等于200ms即可。
实施方式B:UE通过计数器管理集中上报的多个数据包。示例性地,上述第一时段的结束时刻等于计数器的计数值达到阈值或门限的时刻,该阈值或门限是根据数据包的周期以及第一业务的最大时延所确定的。例如,工业终端X的上报周期为5ms,最大时延为200ms,则计数器的阈值或门限可以配置为40,或者小于40的值。阈值与门限两者不作区分,两者可相互替换,后续描述中以门限为例。
UE接收到来自工业终端X的第一数据包后,启动计数器,该第一数据包为上述多个数据包中的第一个数据包。后续,UE每接收到来自工业终端X的一个数据包后,则计数 器的值加1。当计数器的计数值达到阈值或门限时,UE向gNB上报所述多个数据包。
在一种具体的实现方式中,UE每接收到来自工业终端X的一个数据包之后,则判断计数器是否已启动。如果UE尚未启动计数器或者已经超时,则启动,并存储收到的来自工业终端X的上报数据包。所述计数器超时是指计数器的计数值大于门限或阈值的状态。后续每次收到来自工业终端X的上报数据包,如果计数器的计数值尚未达到门限,则按照接收顺序存储收到的上报数据包。如果计数值达到门限,则将存储的所有未上报过的数据包集中传输。集中传输的数据包,经gNB、UPF,最终传至工业控制器。工业控制器一次性收到多个上报数据包后,存入自己的日志文件中,或者进行其它处理。
可选的,由于每份上报数据包中都携带时间信息,因此UE可以按照每个数据包中携带的时间信息进行组包,或者,UE可以按接收各个上报数据包的顺序正序组包,或者可以按照接收各个上报数据包的顺序倒序组包等,不作限定。UE具体采用哪种方式组包,可以由工业控制器确定,或者,工业控制器与其它网元交互确定。且在上述S400中作为配置参数之一,通知UE。
可选的,在上述S400中,工业终端、UE与gNB等网元通过信令交互,确定的参数可以包括以下参数中的一个或多个:集中上报的定时器时长,计数器门限,UE按接收各个上报数据包的顺序正序组包或倒序组包,对应的工业终端MAC地址、工业终端对应的UE侧DS-TT端口号、数据包中携带的目的MAC地址、UPF侧NW-TT端口号等。具体包括以下几种实现方式。
实现方式A:工业终端与工业控制器交互,确定集中上报的定时器时长,或计数器门限等。由工业终端将定时器时长或计数器门限通知UE。可选的,工业终端还可以通知UE“对应的工业终端的MAC地址”,“工业终端对应的UE侧的DS-TT端口号”,“数据包中携带的目的MAC地址”,“UPF侧的NW-TT端口号”等。
实施方式B1:工业终端与工业控制器交互,确定集中上报的定时器时长,或计数器门限,由工业控制器通知UE。具体的,工业控制器通过TSN AF->PCF->SMF->AMF->UE,将上述两个参数通知到UE。可选的,工业控制器还可以通知UE“对应的工业终端的MAC地址”,“工业终端对应的UE侧的DS-TT端口号”,“数据包中携带的目的MAC地址”,“UPF侧的NW-TT端口号”等。其中,AMF与UE之间可通过(non-accessstratum,NAS)消息通知UE。整个通知过程中,各网元可以透明传输上述参数,也可以读取后再传输,不予限定。
实施方式B2:工业终端与工业控制器交互,确定集中上报的定时器时长,或计数器门限,由工业控制器通知UE。具体的,工业控制器通过TSN AF->PCF->SMF->AMF->RAN->UE,将上述两个参数通知到UE。可选的,工业控制器还可以通知UE“对应的工业终端的MAC地址”,“工业终端对应UE侧的DS-TT的端口号”,“数据包中携带的MAC地址”,“工业终端对应UE侧DS-TT的端口号”等。与实施方式B1的不同点在于,在实施方式B2中,RAN即基站,通过无线资源控制(radio resource control,RRC)消息通知UE。整个通知过程中,除基站外,其它各网元可以透明传输上述参数,也可以读取再传输,本实施例不予限定。
实施方式C:工业控制器独自根据工业终端的上报周期以及最大传输时延,确定集中上报的定时器时长,或计数器门限等,不与工业终端交互。工业控制器将确定的参数通知UE。通知方式,可与上述实施方式B1或B2相同。
实施方式D:工业控制器与通信系统(例如5G系统)中的一个或多个网元交互,确定集中上报的定时器时长,或计数器门限等。由通信系统(例如,5G系统)中的网元通知UE。参与交互过程的通信系统网元可以包括但不限于:TSN AF、PCF、SMF、AMF、基站等。上述网元通知UE的方式,可参考实施方式B1或B2中的记载。
实施方式E:通信系统(例如,5G系统)中的网元独自根据上报周期以及最大时延要求,确定集中上报的定时器时长,或计数器门限,通知UE。具体的,SMF可确定下列参数中的至少一个:集中上报的定时器时长、计数器门限、是否按接收各个上报数据的顺序正序或倒序组包、对应的工业终端的MAC地址、工业终端对应的UE侧DS-TT端口号、数据包中携带的目的MAC地址、UPF侧NW-TT端口号。SMF确定上述参数后,经SMF->AMF->gNB->UE,通知基站和UE;经SMF->UPF,通知UPF。
在上述图4的流程中,以工业终端为例进行描述。具体实施过程中,生成并上报数据的不限定为工业终端。只要符合以下两个条件:定期上传,数据最大时延要求大于上传周期的业务,都可以采用上述方案优化传输。对于符合“定期上传”,“数据最大时延要求大于上传周期特征的业务”,其数据集中传输。提高传输效率,降低调度复杂度。
实施例二
本申请实施例二提供一种通信方法,该方法包括:第一通信装置接收来自第二通信装置的第三数据包。第一通信装置删除第三数据包中的时间信息,得到第四数据包,所述第四数据包为被删除时间信息的数据包。第一通信装置向第三通信装置发送所述第四数据包。第三通信装置在接收到第四数据包后,执行添加或补足时间信息的操作。在本申请的描述中,添加与补足两者不作区分,可相互替换。由于时间信息不通过无线接口传输,降低无线通信系统特别是无线接口的数据传输量。
在一种可能的实现方式中,该方法可应用于上行数据传输中,由终端设备删除数据包中的时间信息,由接入网设备、核心网网元或工业控制器等执行补足时间信息的操作。第一通信装置可以为工业设备,第二通信装置可以为终端设备,第三终端装置可以为接入网设备、核心网网元或工业控制器等。
在另一种可能的实现方式中,该方法可应用于下行数据传输中,由核心网网元,或接入网设备执行删除时间信息,由终端设备或工业终端补足时间信息。第一通信装置可以为核心网网元或接入网设备,第二通信装置可以为核心网网元,第三通信装置可以为终端设备或工业终端等。
可选的,关于第一通信装置删除第三数据包中的时间信息,得到第四数据包的方法可包括:第一通信装置获取第三数据包的参数,当所述参数满足预设条件时,在第三数据包中第一位置,删除所述时间信息,得到第四数据包,第一位置为预配置的,在本实施例二中详细介绍。或者,第一通信装置可通过人工智能(artificialintelligence,AI)学习算法,确定第三数据包中包含待删除的时间信息。第一通信装置通过AI算法,确定时间信息在第三数据包中的第一位置。第一通信装置在第三数据包中的第一位置,删除所述时间信息,得到第四数据包,在下述实施例三中详细介绍。进一步,上述第四数据包中可携带有第一指示信息,第一指示信息用于指示所述第四数据包被删除时间信息。
如图5所示,提供一种通信方法的流程,该流程以第一通信装置为工业终端X,第二通信装置为UE,执行删除时间信息的操作,第三通信装置为gNB、UPF或工业控制器, 执行补足时间信息的操作,时间信息为TSN时间戳,为例进行描述。
可选的,S500,工业终端X、UE、SMF、UPF或工业控制器等共同交互,确定以下参数中的一个或多个:
来自工业终端X的数据包,包含TSN时间戳,可以删除该TSN时间戳再传输;针对源端口号为A的数据包执行TSN时间戳删除;针对目的端口号为B的数据包执行TSN时间戳删除;针对源MAC地址为C的数据包执行TSN时间戳删除;针对目的MAC地址为D的数据包执行TSN时间戳删除;针对TYPE ID=E的数据包执行TSN时间戳删除。执行TSN时间戳删除的网元,需要删除的TSN时间戳在数据包中对应哪些位置的比特,根据数据包中的哪个比特确定删除数据包中哪些位置的比特,执行TSN时间戳补足的网元、补足TSN时间戳时使用的传输时延值等。
S501,UE接收来自工业终端X的第三数据包。
S502,UE删除第三数据包中的TSN时间戳,得到第四数据包,第四数据包为被删除TSN时间戳的数据包;UE向网络设备上报第四数据包。所述网络设备可以为gNB、UPF等。
例如,UE可获取第三数据包的参数。所述参数包括但不限于:DS-TT的端口号、或第三数据包中包含的工业终端的MAC地址、或第三数据包中包含的TYPE ID等信息中的一个或多个。当所述参数满足预设条件时,在第三数据包中的第一位置,删除TSN时间戳,得到第四数据包,所述第一位置可为预配置的。
在一种具体的实现方式中,UE从工业终端X收到第三数据包后,通过DS-TT端口号、第三数据包中包含的MAC地址、和/或第三数据包中包含的TYPE ID等信息中的一个或多个,识别出第三数据包中包含TSN时间戳。根据上述S500中获取的TSN时间戳在数据包中的比特位置,删除TSN时间戳。
可选的,为了便于区别“已删除TSN时间戳的数据包”和“未删除TSN时间戳的数据包”。可采用预定的无线数据承载(data radio bearer,DRB)或数据流(flow)传输被删除TSN时间戳的第四数据包。或者,可采用相同的DRB或flow传输上述两类数据包。但在上述删除TSN时间戳的第四数据包中可添加第一指示信息,该第一指示信息可指示第四数据包已被删除TSN时间戳。接收方根据该第一指示信息,可确定是否执行补足TSN时间戳的操作。
S503,网络设备从UE接收第四数据包后,在第四数据包中添加TSN时间戳。
在本申请实施例中,网络设备可根据第四数据包所在的DRB或flow,或第四数据包中的第一指示信息,识别出第四数据包已经被删除TSN时间戳,且补足该TSN时间戳。传至工业控制器。由于时间漂移等因素,补足的TSN时间戳可能与原始的TSN时间戳不同,所以,实施例二的方案更适用于对TSN时间戳精度要求不高的数据,如上报日志、不要求精度时间的控制消息等。在上述S503中,可具体采用以下实现方式添加TSN时间戳:
实现方式A:gNB添加TSN时间戳
例如,在上述S503中,gNB在从UE接收到第四数据包后,可获取第四数据包中的参数。可选的,第四数据包中的参数包括但不限于传输第四数据包的DRB或flow。当所述参数满足预设条件时,在第四数据包中的第一位置,添加TSN时间戳。
在一种具体的实现方式中,gNB可根据传输第四数据包的DRB或flow,识别出第四数据包已经被删除了TSN时间戳。在上述S500中所确定的比特位置,添加自己推算出的 TSN时间戳,传输至UPF,再进一步传输至工业控制器。或者,gNB可读取第四数据包中某些特征比特位置的值,根据该特定比特位置的值确定补足TSN时间戳的位置。或者,gNB在接收到来自UE的第四数据包后,可确定第四数据包中是否包括用于指示已被删除TSN时间戳的第一指示信息。如果包含第一指示信息,则在上述S500中确定的比特位置,在第四数据包中添加自己推算出的TSN时间戳,传输至UPF,再进一步传输至工业控制器。
参见图2的TSN同步时间架构,gNB只维护5G时钟,不维护TSN时钟。UPF同时维护5G时钟和TSN时钟。工业控制器只维护TSN时钟,不维护5G时钟。所以,gNB补足TSN时间戳,有三种方式:第一种,gNB基于5G时钟,生成TSN时间戳,补入第四数据包中,第四数据包传至UPF,由UPF将该TSN时间戳转换成基于TSN时钟的TSN时间戳。第二种,工业控制器定期与UPF等5G网元进行5G时钟同步,获取5G时钟,并维护。gNB基于5G时钟生成TSN时间戳,补入第四数据包中,第四数据包经UPF传至工业控制器,由工业控制器将该TSN时间戳转换成基于TSN时钟的TSN时间戳。第三种,gNB定期与UPF进行TSN时钟同步,获取TSN时钟,并维护。gNB收到第四数据包后,gNB基于TSN时钟生成TSN时间戳,并将时间戳添加到第四数据包中。
实施方式B:UPF添加TSN时间戳
例如,在上述S503中,gNB接收来自UE的第四数据包,且将该第四数据包传输至UPF。UPF从gNB接收到第四数据包后,根据第四数据包的参数,例如传输第四数据包的DRB或fow等,或者,第四数据包中携带的第一指示信息,确定第四数据包已经被删除TSN时间戳,则基于自己维护的TSN时钟,补充TNS时间戳,且传输至工业控制器。
可选的,除了上述gNB、UPF等网络设备添加TSN时间戳外,还可由工业控制器添加TSN时间戳。例如,gNB接收到来自UE的第四数据包,且该第四数据包经UPF传输至工业控制器。工业控制器根据第四数据包的参数,或者第四数据包中包括的第一指示信息,识别出第四数据包被删除了TSN时间戳,则工业控制器则补足TSN时间戳,再做进一步处理。可选的,第四数据包的参数包括源端口号、目的端口号、源MAC地址、目的MAC地址,或TYPE ID等信息中的一个或多个。
需要说明的是,上述三种实施方式,具体使用哪一种实施方式,可通过S500协商确定,并通知对应的网元执行添加TSN时间戳的操作。
可选的,上述执行添加TSN时间戳的设备,例如,gNB、UPF或工业控制器等,可根据数据包的发送周期,确定TSN时间戳。比如,gNB、UPF或工业控制器等,可通过预先的配置流程,获取工业终端发送数据包的传输图样(traffic pattern),具体包括:第一个数据包所对应的TSN时间戳是X,周期是K。则gNB、UPF或工业控制等,根据上述传输图样,可以推算出:第二个数据包所对应的TSN时间戳是X+K,第三个数据包所对应的TSN时间戳是X+2K等。以此类推,不再赘述。或者,UPF、gNB或工业控制器等可通过预先的配置流程,获取工业终端发送数据包的周期。工业终端发送第一个数据包时,UE可不删除其TSN时间戳,从第二个数据包开始,UE删除其TSN时间戳。这样,UPF、gNB或工业控制器通过第一个数据包的TSN时间戳,再加上周期,就能推断出后续每一个数据包的TSN时间戳。这种补足时间戳的方式,要求UE按接收数据包的顺序组包,集中传输给gNB。UPF、gNB或工业控制器等不需要根据自己的时钟确定时间戳,只需要根据数据包的顺序就能推断了。可以理解的是,在上述示例中,以在第一个数据包中携带TSN时间戳为例进行说明。实际部署时,为了防止第一个数据包传输不成功,也可以在前N个数据 包中都携带TSN时间戳,从第N+1个数据包开始,不再携带TSN时间戳。
或者,上述执行添加TSN时间戳的设备,可根据数据包的接收时间和传输时延,确定TSN时间戳等。由于IIOT采用确定性传输,每一跳所经历的时延可以预先确定,或者通过网管平台确定,所以添加TSN时间戳的网元可根据自己收到该数据包的时刻,结合数据包从信源至本网元的时延,推算出补足的TSN时间戳的值。如:UPF执行补足TSN时间戳,UPF于TSN时间“11时38分34秒345毫秒”收到第四数据包,且预先获知信源至UPF的传输时延固定为20毫秒,则UPF推断:该第四数据包于TSN时间“11时38分34秒325毫秒”从信源发出,所以为第四数据包补足TSN时间戳“11时38分34秒325毫秒”。
上述实施例重点描述了TSN时间戳删除或补足所涉及的参数,但对参数传递的流程细节没有涉及,下面详细描述参数传递的四种实施方式。
参数传递方式A:工业终端X与工业控制器交互,确定参数,以及执行TSN时间戳删除,补足操作的网元。由工业终端X通知UE,由工业控制器通知网络侧网元,如UPF、gNB等。工业控制器通过TSN AF-PCF-SMF-AMF-gNB通知至基站,通过工业控制器通过TSN AF-PCF-SMF-UPF通知到UPF。
参数传递方式B1:工业终端X与工业控制器交互,确定参数。由工业控制器通知所有网元,包括执行TSN时间戳删除的网元UE、执行TSN时间戳补足的网元gNB或UPF。具体的,工业控制器通过TSN AF->PCF->SMF->AMF->UE,通知到UE。其中,AMF与UE之间通过NAS消息通知UE,工业控制器通过TSN AF->PCF->SMF->UPF通知到UPF。整个通知过程中,各网元可以透明传输参数,也可以读取后再传输,不作限定。
参数传递方式B2:工业终端X与工业控制器交互,确定参数。由工业控制器通知所有网元,包括执行TSN时间戳删除的网元UE,执行TSN时间戳补足的网元gNB或UPF。具体的,通过TSN AF->PCF->SMF->AMF->RAN->UE,将参数通知到UE。与实施方式B1不同点在于,实施例方式B2中的基站即RAN,通过RRC消息通知UE。工业控制器通知UPF的路径与实施方式B1相同。整个通知过程中,除基站外,其它各网元可以透明传输参数,也可以读取后再传输,不予限定。
参数传递方式C:由工业控制网元提供业务特征和TSN时间戳在数据包中的位置,由5G网元自行确定由谁执行删除TSN时间戳的行为,由谁执行补足TSN时间戳的行为。具体的,由中央网络控制网元(central network control,CNN)提供信息:上行/下行数据,只要符合“源端口号=A,目的端口号=B,源MAC地址=C,目的MAC地址=D,数据包中的TYPE ID=E”中一个或多个条件的数据包,其数据包中某些比特位置为TSN时间戳。由5G网络中的PCF或SMF确定删除TSN时间戳或补足TSN时间戳的网元。例如:由UE执行TSN时间戳删除,由gNB或UPF执行TSN时间戳补足。值得注意的是,采用这种参数传递方式时,对应S503的实施方式时,只能对应实施方式A“由gNB补足TSN时间戳”,或实施方式B中的“由UPF补足TSN时间戳”,不能对应实施方式C中的“工业控制器补足TSN时间戳”。具体参数传递路径与前面的方式B相同,不再描述。
参数传递方式D:由工业控制网元提供业务特征和TSN时间戳在数据包中的位置,由工业控制网元执行补足TSN时间戳。由5G网元自行确定具体执行删除TSN时间戳的网元。具体的,工业控制网元CNC提供信息:上行\下行数据,只要符合“源端口号=A,目的端口号=B,源MAC地址=C,目的MAC地址=D,数据包中的TYPE ID=E”中的一个 或多个条件的数据包,其数据包中某些比特位置是TSN时间戳。除此之外,CNC还提供信息:5G网络选定执行删除TSN时间戳的网元,由工业控制器执行补足TSN时间戳。5G网络中的PCF或SMF可确定:由UE执行TSN时间戳删除。具体参数传递路径与前面的方式B相同,不再描述。
采用上述图5传输工业控制数据或工业日志数据时,上行数据,由UE删除数据包中的TSN时间戳,由基站/UPF/工业控制器补足TSN时间戳。对于下行数据,由UPF/基站删除数据包中的TSN时间戳,由UE/工业控制端补足TSN时间戳。由于TSN时间戳不通过无线接口传输,降低无线通信系统特别是无线接口的数据传输量。另一方面,通过将多份工业日志数据集中传输,降低了数据传输所需的开销,如基站分配上行资源所需的DCI,UE传输少量上行数据时物理层所增加的padding等,提高了无线传输的效率。
实施例三
实施三与实施例二的区别在于,对于发送方,第一通信装置通过AI算法,确定第三数据包中包含待删除的时间信息。第一通信装置通过AI算法,确定上述时间信息在第三数据包中的第一位置。第一通信装置在第三数据包中的第一位置,删除上述时间信息,生成第四数据包。或者,对于发送方,第一通信装置通过AI算法,确定第三数据包中包含待删除的时间信息,以及时间信息在第三数据包中的第一位置。第一通信装置在第三数据包中的第一位置,删除上述时间信息。第一通信装置向第二通信装置发送第四数据包,该第四数据包为被删除时间信息的数据包。且第一通信装置向作为接收方的第二通信装置发送通知消息,该通知消息用于通知第二通信装置上述第四数据包已经被删除时间信息,需要补足时间信息,以及补足的时间信息在第四数据包中的位置。该通知消息可以隐示指示第二通信装置,也可以显示指示第二通信装置。比如,在一种示例中,第一通信装置可通过特定的DRB或flow发送上述第四数据包。那么第二通信装置在通过特定的DRB或flow接收到上述第四数据包后,即可确定第四数据包已被删除时间信息,需要补足时间信息。而第二通信装置补足时间信息的位置,可以为预配置的,或者,发送方通过通知消息通知给第一通信装置的等,不再赘述。
当然,在本申请实施例中,也可以接收方,即第二通信装置通过AI算法,确定包括待删除时间信息的第三数据包,以及待删除的时间信息在第三数据包的位置,然后通知发送方即第一通信装置,过程与上述相似,不再一一说明。
如图6所示,以第一通信装置为UE,第二通信装置为工业终端X,第三通信装置为UPF或gNB,时间信息为TSN时间戳,且发送方通过AI算法预测为例进行说明,包括但不限于:
S601:UE内的AI模块通过AI算法获知,来自工业终端X的某个数据包内是否包含TSN时间戳。
在一种可能的实现方式中,UE内的AI模块通过学习获得,来自工业终端X的数据包,只要满足以下条件的一个或多个,就可以推断该数据包内包含TSN时间戳。条件包括但不限于:源端口号=A,目的端口号=B,MAC源地址=C,MAC目的地址=D,数据包内TYPE ID=E。
在另一种可能的实现方式中,UE内的AI模块可以获取大量的数据包,根据数据包的特征,例如,MAC源地址、MAC目的地址,和/或数据包内的TYPE ID等,预先训练出 一个神经网络。然后,每获取到来自工业终端X的一个数据包,就可以通过该AI模型判断该数据包中是否可包括TSN时间戳。可选的,该AI模型可以是循环神经网络(recurrent neural network,RNN)、卷积神经网络(convolutional neural networks,CNN)等。可选的,上述AI模型可以随着时间的推移持续更新。
S602:UE向gNB发送通知消息。该通知消息用于通知gNB对于flow XX或DRB XX传输的数据包,收到后请补充TSN时间戳。可选的,所述通知消息中可以包括以下配置参数中的一个或多个:补充的时间戳是基于5G时钟的时间戳,或者,基于TSN时钟的时间戳,补充的时间戳在原数据包中的比特位置等。可选的,该通知消息可以通过RRC消息传输,gNB收到回复响应消息。
S603:UE接收来自工业终端X的第三数据包。根据上述S600记载的内容,判断第三数据包是否符合删除TSN时间戳的条件。如果符合,则在第三数据包中删除TSN时间戳。当然,所述TSN时间戳在第三数据包中的位置,也可以是通过UE内的AI模块,通过学习预测得出的。向gNB发送删除TSN时间戳的第三数据包,即第四数据包。
S604:gNB收到第四数据包后,根据S602中的配置参数,在对应的比特位置补充TSN时间戳,传输给UPF和工业控制器。
可选的,如果gNB补充的是基于TSN时钟的时间戳,则UPF收到第四数据包后无需做进一步处理,继续传输到工业控制器。如果gNB补充的是基于5G的时间戳,则需要由UPF将其转化为基于TSN时钟的时间戳。转化方式与实施例二相同,此处不再赘述。
需要说明的是,上述S604中以gNB补充TSN时间戳为例进行说明,实际上,也可以由UPF网元补充TSN时间戳,具体流程如下:
S601与前面所述相同,S602与前述的区别在于:UE向UPF发送通知消息,用于通知UPF执行TSN时间戳补充。所述通知消息中包括配置参数与前面所述相同。但是,UPF只需补充基于TSN时钟的时间戳,不必补充基于5G时钟的时间戳。上述通知消息中配置参数的传输路径为:UE-gNB-AMF-SMF-UPF,配置参数可以逐跳反馈,也可以多跳共同反馈。中间节点可以透传该配置信息,也可以读取该配置信息后再重新生成消息通过下一跳传输。具体的,UE-gNB间可以传输RRC消息(gNB能读取消息内容),也可以透传NAS消息(gNB不读取消息内容)。
对于上行数据,由UE侧的AI模块学习数据特征并删除TSN时间戳,由gNB、UPF或工业控制器补足TSN时间戳。对于下行数据,可以由UPF或gNB侧的AI模块学习数据特征并删除TSN时间戳,由UE或工业终端补足TSN时间戳。如果由UPF侧的AI模块学习下行数据的特征并删除TSN时间戳,则UPF确定的配置参数经UPF-SMF-AMF-gNB-UE传至UE,以通知UE执行补足TSN时间戳。如果由gNB侧的AI模块学习下行数据的特征并删除TSN时间戳,则gNB确定的配置参数经gNB-UE传至UE。
在上述图6的流程中,由数据的发送方AI模块进行学习删除TSN时间戳,由数据的接收方AI模块补足TSN时间戳。实际部署中,可以由数据的接收方的AI模块进行学习,然后通知发送方。例如,由UE的AI模块根据收到的下行学习下行数据特征,然后UE通知gNB或UPF,进行TSN时间戳删除,以及TSN时间戳在数据包的位置。gNB或UPF在接收到下行数据包时,删除TSN时间戳。UE在接收到下行数据时,补足TSN时间戳。在本申请实施例中,UE或UPF或gNB的AI模块学习数据特征,触发TSN时间戳的删除和补足。可减少5G通信系统传输的数据量,特别是空口传输的数据量。
实施例四
实施例一详细描述了发送方集中传输数据包的流程,实施例二和实施例三详细描述了发送方删除数据包中的时间信息再传输,接收方补足数据包中的时间信息的流程。对于周期性业务,数据源每间隔一个周期发出一个或多个数据包,上述两项技术特征可以结合实现,具体为:
第一通信装置接收来自第二通信装置的多个数据包,上述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且多个数据包的周期小于第一业务的最大时延。之后,第一通信装置在上述多个数据包中,确定需要删除时间信息的第二数据包。在第二数据包中删除时间信息。在第一时段的结束时刻,第一通信装置向第三通信装置上报上述多个数据包,所述第一时段的长度不大于第一业务的最大时延。而第三通信装置在接收到上述多个数据包后,在上述多个数据中的第二数据包中,添加时间信息。
关于如何确定上述多个数据包中包括待删除时间信息的第二数据包。在一种可能的实现方式中:第一通信装置可根据多个数据包的参数,确定第二数据包。所述参数包括但不限于:源端口号、目的端口号、源MAC地址、目的MAC地址或数据中的TYPE ID等。相应的,第三通信装置可根据多个数据包的参数,确定第二数据包。在第二数据包中的第一位置,添加所述时间位置。或者,第一通信装置通过AI算法,确定包括待删除时间信息的第二数据包。当然,通过前述可以知得,可以发送方即第一通信装置通过AI算法确定第二数据包,也可以接收方即第三通信装置通过AI算法确定第二数据包,然后通知第一通信装置,不再赘述。
关于第一通信装置删除时间信息的第一位置,以及第三通信装置添加时间信息的第一位置,可以为预配置的,或者,接收方或发送方通过AI算法确定的,不再赘述。可选的,所述被删除时间信息的第二数据包中还可包括第一指示信息,第一指示信息用于指示被删除时间信息的数据包。
如图7所示,以第一通信装置为UE,第二通信装置为工业终端X,第三通信装置为gNB,时间信息为TSN时间戳为例,包括但不限于:
可选的,S701:配置参数,包括业务的特征,如源端口号、目的端口号、源MAC地址、目的MAC地址,数据包中的TYPE ID、业务的周期、最大时延要求、实际的传输时延(确定性传输时延)、哪个网元执行时间戳删除,哪个网元执行时间戳补足等。详细参数配置可参见实施例二的记载。
下面以上行数据为例,详细说明数据的处理流程。
S702:UE定期从工业终端X接收数据包,数据包内包含TSN时间戳。对于周期性业务,每个周期的数据包内的TSN时间戳也是周期性变化的。UE每收集一段时间的数据包,集中向gNB传输,UE可以使用定时器或计数器确定向gNB集中传输数据包的时机,具体机制已在实施例一中详细描述过,不再赘述。UE将每个数据包中的TSN时间戳删除,再将删除TSN时间戳的数据包按接收的时间顺序排好,生成上报的数据包,向gNB传输。值得注意的是,在实施例一中,UE集中向gNB传输多个数据包时,上报的数据包顺序可以与UE接收数据包的顺序一致,也可以不一致。但是,在本实施例中,UE集中上报的数据包的顺序必须与UE接收数据包的顺序一致。
S703:gNB接收到多个数据包后,按多个数据包的顺序,为每个数据包生成对应的 TSN时间戳,插入数据包中预先配置好的比特位置,传输至UPF,进而传至工业控制器。
例如,UE在TSN时间T1时刻接收到数据包1,在TSN时间T2时刻接收到数据包2,在TSN时间T3时刻接收到数据包3。T1与T2的间隔为周期T_P,T2与T3的间隔同样为周期T_P。假设UE接收到数据包3后,集中向gNB传输数据包1、数据包2和数据包3,传输时延为确定性的时延值T_tans。gNB于TSN时间T4时刻收到三个数据包。gNB根据T4和T_trans,推断出数据3的时间戳为TSN时间T3=T4-T-trans,再根据业务周期,推断出数据2的时间戳TSN时间T2=T3-T_p,数据1的时间戳为TSN时间T1=T2-T_p。之后,gNB在上述3个数据包中分别补足推断出的TSN时间戳即可。
在上述图7的流程中,假定gNB维护TSN时钟,gNB直接补足基于TSN时钟的TSN时间戳。在实际系统中,如果基站未维护TSN时钟,也可以进行时间戳补足,转换过程同上述实施二中的S503中的实施方式A,不再赘述。上述流程以gNB补足数据包的时间戳为例进行说明。实际上,补足时间戳也可以由UPF执行,流程类似,此处不再赘述。
在本申请实施例中,发送方去除数据包中的TSN时间戳再传输,减少5G系统特别是空口传输的数据量;同时集中传输多个数据包,减少传输的额外开销,提高频谱效率。
实施例五
本申请实施例五提供一种通信方法,该方法包括:发送方即第一通信装置预测数据包内容,生成预测数据包。在真实数据包到来之前,先发送预测数据包,可减少数据的时延。
可选的,上述第五数据包即预测数据包,可为第一通信装置通过AI算法,预测生成的。在上述实施例三中,通过AI算法,获知特定业务的数据包中的特定比特是TSN时间戳,进而进行优化。而在本申请实施例中,可对数据包整体内容进行学习预测,进而优化传输行为。由于工业生产的固有特点,工业终端(例如,操作臂)通常执行相同的生产流程,相同内容的数据包重复传输,引入AI算法后,可以对数据进行学习预测,从而优化传输。
以下行数据包为例,gNB的AI模块对数据包进行预测为例描述。实际实施中也可以:由UPF侧的AI模块进行预测;或者,由UE内的AI模块进行预测,再将预测的算法、参数等通知gNB。
如图8所示,提供一种通信方法的流程,该流程中以第一通信装置为gNB,第二通信装置为UPF,第三通信装置为UE为例,包括但不限于:
S801:gNB生成预测数据包。比如,gNB内的AI模块可学习下行数据包的内容,根据已经传输的下行数据包,预测下一个下行数据包的内容、传输时机等,生成预测数据包。图8中,白色方框表示预测数据包的传输窗口,gNB在该窗口起始时刻收到真实的下行数据包,必须在窗口结束时刻传输到接收方。
S802:gNB向UE传输预测数据包。可选的,gNB可在数据包传输窗口之前,即接收到真实的下行数据包之前,向UE传输预测数据包。
S803:gNB从UPF接收真实数据包。可选的,gNB可在传输窗口的起始时刻,从UPF接收真实数据包。将真实数据包与预测数据包进行内容比较。如果二者内容不同,则向UE传输真实数据包。如果二者内容相同,则不需向UE传输真实数据包。
可选的,如果gNB向UE传输真实数据包。则进一步的,空口PDCP层处理与现有机制不同。发送方:在现有机制中,PDCP层收到预测数据包,为该预测数据包分配PDCP  SN=K。后续收到真实数据包,为真实数据包分配PDCP SN=K+1。在本申请实施例中,对真实数据包分配的PDCP SN与预测数据包相同,均为K。对于接收方,在现有机制中PDCP层先接收到一个PDCP SN=K的数据包的,后续收到另一个PDCP SN=K的数据包,则接收方丢弃后面收到的数据包,向应用层递交前面收到的数据包。而在本申请实施例中,接收方丢弃前面接收的数据包,向应用层递交后面接收的数据包,即接收方丢弃先收到的预测数据包,向应用层递交后收到的真实数据包。当然,上述描述是以预测数据包和真实数据包的数量均为一个为例进行描述的,如果预测数据包和真实数据包的数量为多个,与上述流程相似,不再赘述。
现有机制中,发送方每传输一个数据包,PDCP序列号(serial number,SN)加1。接收方如果收到多个PDCP SN相同的数据包,则丢弃后面的数据包,只保留先接收的第一个数据包。本实施例的流程中,发送方PDCP传输真实数据包时,使用与预测数据包相同的PDCP SN,即发送方发出两个PDCP SN相同的包。不同的是,接收方如果收到两个PDCP SN相同的数据包,则丢弃先收到的数据包,保留后收到的数据包,即丢弃预测数据包,保留真实数据包。
可选的,上述图8中的流程中,是以每次预测、传输一个数据包为例描述的,也适用于每次预测、生成多个数据包的场景,此时发送方仅传输部分不同的数据包即可。比如,发送方预测生成的数据包的数量为N1个,真实到来的数据包的数量为N2个,N1与N2相同或不同,均为正整数。当所述N1个数据包与N2个数据包中有部分数据包不同时,则发送方可向接收方传输部分不同的数据包。比如:预测并预先传输三个数据包,对应的PDCP SN分别是3、4、5,等到真实数据包到达gNB时,gNB通过比较,如果发现接收的三个真实数据包都与预测数据包不同,则传输三个真实数据包,对应的PDCP SN分别是3、4、5;如果发现3号真实数据包与预测数据包相同,但4、5号真实数据包与预测数据包不同,则传输两个真实数据包,对应的PDCP SN分别是4、5;若预测数据包数量小于真实数据包,则发送方补传真实数据包。比如,gNB收到的真实数据包数量大于3个,以4个包为例,且前三个真实数据包内容与预测数据包相同,则补传真实数据包,PDCP SN为6。若预测数据包的数量大于真实数据包,则发送方向接收方发送通知消息,以通知接收方删除多余的预测数据包。接收方可删除多余的预测数据包,不再向应用层递交。比如,如果gNB收到的真实数据包数小于3个,以2个真实数据包为例,且与前2个预测数据包的内容相同,则发送方PDCP生成一个控制PDU,通知接收方:删除PDCP SN=5的数据包,且不再向应用层递交。这种删除数据包的情况下,发送方发送下一个数据包时,无论下一个数据包是预测数据包还是真实数据包,PDCP SN可以继续编号(上述例子中,通知接收方删除5号数据包后,为下一个数据包分配的PDCP SN为6),也可以再次分配相同的PDCP SN(上述例子中,通知接收方删除5号数据包后,为下一个数据包分配的PDCP SN仍为5)。具体采用哪一种分配方式,可以由协议确定,或由RRC配置等,不作限定。
需要说明的是,如果AI模块位于UPF侧,由可UPF预测即将传输的数据包,然后通知gNB,上述流程需要修改为:UPF向gNB传输预测数据包时,该预测数据包的通用无线分组业务隧道协议(GPRS tunnel protocol,general packet radio service,GTP-U)中的GTP SN为K,gNB的PDCP实体为该预测数据包分配PDCP SN=M;如果后续UPF向gNB传输真实数据包,则该真实数据包中的GTP-U中的GTP SN仍然为K,gNB收到两个GTP SN相同的包,则认为UPF需要传真实的数据包,则为该真实数据包分配PDCP SN=M。UPF每次预测、传输多个 数据包的场景,同上一段的描述的gNB预测流程相似,不再赘述。
进一步地,如果发送方和接收方使用数据压缩算法,对空口实际传输的数据包进行压缩,可以进一步降低空口传输的数据量,典型的数据压缩算法如上行数据压缩(uplink data compression,UDC)。UDC压缩算法需要通信双方保持完全相同的缓存内容,通过参考缓存内容对数据包进行压缩和解压缩。随着数据传输,该缓存内容会根据传输的数据内容进行更新。对图8中所示的流程,可在以下两种场景下执行更新UDC缓存的行为:
以下两种场景的共同行为:发送方传输预测数据包,并根据预测数据包,更新自身的UDC缓存。接收方接收预测数据包,根据预测数据包,更新自身的UDC缓存。
场景一:预测数据包与真实数据包内容不一致,空口传输真实数据包,gNB和UE双方根据真实数据包对UDC缓存进行更新。
场景二:预测数据包与真实数据包内容一致,空口不传输真实数据包,gNB和UE双方不对UDC缓存进行更新。
在上述场景一中,通信双方先后根据预测数据包和真实数据包更新UDC缓存,最终接收方只向应用层递交真实数据包。在上述场景二中,通信双方只根据预测数据包更新一次UDC缓存。
针对前面所述的一种场景,比如发送方先预测并传输3个数据包,PDCP SN分别为3、4、5,真实数据包只有2个。这种情况下,发送方PDCP生成一个控制PDU,通知接收方:删除PDCP SN=5的数据包,不向应用层递交。但是,通信双方已经使用PDCP SN=5的预测数据包对UDC缓存做过更新,即使5号数据包不再向应用层递交,也不再需要对已经更新的UDC缓存做进一步更新。
上述图8的流程以下行数据为例进行说明,同样的流程也适用于上行数据,由UE侧的AI模块生成预测数据包,并提前传输,过程相似,不再赘述。
在上述图8的流程中,由于5G系统先传输预测数据包,后传输真实数据包(如果真实数据包与预测数据包不一致),所以5G系统传输预测数据包的时延预算比真实的时延预算更长,可以采用混合自动重传请求(hybrid automatic repeat request,HARQ)重传、自动重传请求(automatic repeat request,ARQ)重传等方式,降低对底层传输误块率的要求。经过一段时间学习,AI模块预测准确度提升,大部分情况下预测数据包与真实数据包内容相同,不需要再传输真实数据包。对于少量预测不准的情况,5G系统传输真实数据包,由于传输真实数据包的概率较低,系统可以采用更加健壮的方式传输,使用更多的无线资源,保证传输正确性、实时性。
实施例六
本申请实施例六提供一种通信方法,该通信方法包括:发送方和接收方,即第一通信装置和第三通信装置共同预测,生成第七数据包,所述第七数据包为预测数据包。第一通信装置接收来自第二通信装置的第八数据包,所述第八数据包为真实数据包。第一通信装置根据第七数据包和第八数据包,确定是否向第三通信装置传输所述第八数据包。例如,若第七数据包与第八数据包相同,即真实数据包与预测数据包相同,则不再向第三通信装置发送第八数据包。否则,向第三通信装置发送第八数据包。相应的,对于接收方,第三通信装置若接收到真实数据包,即第八数据包,则向应用层递交第八数据包,否则向应用层递交第七数据包。可选的,若第三通信装置向应用层递交真实的第八数据包,则删除预 测的第七数据包。
可选的,第一通信装置和第二通信装置可通过AI算法,预测数据包。在上述实施例五的方案中,只有发送方启动AI算法进行预测,接收方不启动AI算法进行预测,从而达到提升容量,降低数据实时性要求的要求。而在此基础上,在实施例六中引入接收方的AI算法进行预测,进一步降低网络内传输的数据量,提升系统效率。
如图9所示,提供一种通信方法的流程,该流程可应用于下行数据包传输中,以第一通信装置为gNB,第二通信装置为UPF,第三通信装置为UE为例,进行说明:
可选的,S901:gNB的AI模块对数据包进行学习,确定AI模块的算法、具体参数等。包括但不限于:数据包的发送时机,传输窗口等。或者,UE的AI模块对数据包进行学习,确定AI模块的算法,具体参数等。
可选的S902:gNB与UE交互AI模块的算法、参数等,使得gNB与UE内的AI模块同步。
S903:gNB生成预测数据包。可选的,gNB可在每次传输窗口(即图中的白色方框)前,即真实数据包到达gNB之前,gNB内的AI模块生成预测数据包。gNB从UPF接收真实数据包。可选的,gNB可在传输窗口起始时刻,gNB从UPF接收真实数据包。gNB比较真实数据包与预测数据包。如果两者不同,则gNB向UE传输真实数据包。如果两者相同,则gNB不再向UE传输真实数据包。
针对接收方,即UE生成预测数据包。比如,UE的AI模块生成预测数据包。如果UE接收到来自gNB的真实数据包,则向应用层递交真实数据包,且删除预测数据包。否则,向应用层递交预测数据包。
在本申请实施例中,UE即接收方可采用以下两种实现方式生成预测数据包,两种实施方式对外的行为相同,仅是内部AI模块生成预测数据包的时刻不同,具体的:实施方式A:每次传输窗口起始时刻,接收方生成预测数据包。如果在传输窗口内接收到真实数据包,则接收方在传输窗口结束时刻,向应用层递交真实数据包;如果传输窗口内未收到真实数据包,则接收方在传输窗口结束时刻,向应用层递交预测数据包。
实施方式B:如果在传输窗口内接收到真实数据包,则接收方在传输窗口结束时刻,向应用层递交真实数据包;如果传输窗口内未收到真实数据包,则接收方在传输窗口结束时刻,生成预测数据包并向应用层递交。
需要说明的是,在本申请的描述中,所涉及的“应用层”,还可替换为“上层”。“接入层”可包括:SDAP层、PDCP层、RLC层、MAC层或PHY层中的一个或多个;上层可包括应用(application,APP)层。接入层和上层之间可为相邻的协议层,也可为非相邻的协议层,不作限定。比如,在上层和接入层之间还可IP层、TCP层或用户数据报协议(user datagram protocol,UDP)层等,不作限定。
可选的,发送方和接收方可使用数据压缩算法,对空口实际传输的数据包进行压缩,以降低空口传输的数据量。典型的数据压缩算法包括UDC等。其中,UDC压缩算法需要通信双方保持完全相同的缓存内容,通过参考缓存内容对数据包进行压缩和解压缩,随着数据传输,该缓存内容会根据传输的数据内容进行更新。示例的,提供以下两种更新UDC缓存的方式:
更新方式A:只有当空口传输真实数据包时,发送方和接收方双方才根据真实数据包对UDC缓存进行更新,否则双方都不更新UDC缓存。
更新方式B:每个传输窗口都对UDC缓存进行更新。如果空口传输真实数据包,则接收方和发送方根据真实数据包,对UDC缓存进行更新。如果空口没有传输真实数据包,则发送方和接收方根据预测数据包对UDC缓存进行更新。
需要说明的是,上述实施例中,以下行数据传输为例进行说明,该流程对上行数据传输同样适用,不再赘述。通信双方同时预测数据包。如果预测的数据包与真实数据包相同,则不再传输任何数据包。如果预测的数据包与真实数据包不同,则再传输真实数据包,进一少减少5G系统中系统传输的数据量。
需要说明的是,在上述方法实施例中,UE、gNB或UPF等网元,可利用AI算法,确定TSN时间戳在数据包的位置,或生成预测数据包等。可以理解的是,UE、gNB或UPF等网元,可直接利用AI算法,执行上述操作。或者,当UE、gNB或UPF等网元内包括AI模块时,可利用AI模块执行上述操作。在本申请实施例中,上述两种描述,可相互替换,不作区分。
以上结合图1至图9详细说明了本申请实施例描述的方法。以下结合图10和图11详细说明本申请实施例提供的装置。应理解,装置实施例的描述与方法实施例的描述相互对应,未详细描述的内容可参见上文方法实施例中的描述。
图10是本申请实施例提供的装置1000的示意性框图,用于实现上述方法实施例中的第一通信装置的功能。该装置可以为软件单元或芯片系统。芯片系统可以由芯片构成,也可以包括芯片或其它分立器件。该装置可以包括通信单元1001,用于与外部进行通信。该装置还可以包括处理单元1002,用于进行处理。
在一种示例中,上述装置1000用于实现上文方法实施例中第一通信装置的步骤。第一通信装置可以是通信设备,也可以是配置于通信设备中的芯片或电路。通信单元1001,用于执行上文方法实施例中第一通信装置的收发相关操作。处理单元1002,用于执行上文方法实施例中第一通信装置的处理相关操作。
例如,通信单元1001,用于接收来自第二通信装置的多个数据包,上述多个数据包为第一业务的数据包,上述多个数据包为多个周期的数据包,且上述多个数据包的周期小于第一业务的最大时延。通信单元1001,还用于在第一时段的结束时刻,向第三通信装置上报上述多个数据包,第一业务的最大时延不大于,即小于或等于第一时段的长度。
在另一种示例中,上述装置1000用于实现上文方法实施例中第三通信装置的步骤。第三通信装置可以是通信设备,也可以是配置于通信设备的芯片或电路。通信单元1001,用于执行上文方法实施例中第三通信装置的收发相关操作。处理单元1002,用于执行上文方法实施例中第三通信装置的处理相关操作。
例如,通信单元1001,用于在第一时段的结束时刻后,接收来自第一通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延,所述第一时段的长度不大于所述第一业务的最大时延。
本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个实施例中的各功能单元可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
可以理解的是,上述实施例中的通信单元的功能可以由收发器实现,处理单元的功能可以由处理器实现。收发器可以包括发射器和/或接收器等,分别用于实现发送单元和/或接收单元的功能。以下结合图11举例进行说明。
图11所示的通信装置1100包括至少一个处理器1101。通信装置1100还可以包括至少一个存储器1102,用于存储程序指令和/或数据。存储器1102和处理器1101耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性、机械性或其它的形式,用于装置、单元或模块之间的信息交互。处理器1101可以和存储器1102协同操作,处理器1101可以执行存储器1102中存储的程序指令,所述至少一个存储器中1102中的至少一个可以包括于处理器1101中。
装置1100还可以包括通信接口1103,用于通过传输介质和其它设备进行通信,从而用于通信装置1100可以和其它设备进行通信。在本申请实施例中,通信接口可以是收发器、电路、总线、模块或其它类型的通信接口。在本申请实施例中,通信接口为收发器时,收发器可以包括独立的接收器、独立的发射器;也可以集成收发功能的收发器、或者是接口电路。
应理解,本申请实施例中不限定上述处理器1101、存储器1102以及通信接口1103之间的连接介质。本申请实施例在图11中以存储器1102、处理器1101以及通信接口1103之间通过通信总线1104连接,总线在图11中以粗线表示,其它部件之间的连接方式,仅是示意性说明,并不作为限定。所述总线可以包括地址总线、数据总线、控制总线等。为了便于表示,图11中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线等。
在一种示例中,装置1100用于实现上文方法实施例中第一通信装置执行的步骤。通信接口1103用于执行上文方法实施例中第一通信装置的收发相关操作,处理器1101用于执行上文方法实施例中第一通信装置的处理相关操作。
例如,通信接口1103,用于接收来自第二通信装置的多个数据包,上述多个数据包为第一业务的数据包,上述多个数据包为多个周期的数据包,且上述多个数据包的周期小于第一业务的最大时延;通信接口1103,还用于在第一时段的结束时刻后,向第三通信装置上报上述多个数据包,其中,第一时段的长度不大于第一业务的最大时延。
在另一种示例中,装置1100用于实现上文方法实施例中第三通信装置执行步骤。通信接口1103用于执行上文方法实施例中第三通信装置的收发相关操作,处理器1101用于执行上文方法实施例中第三通信装置的处理相关操作。
例如,通信接口1103,用于在第一时段的结束时刻后,接收来自第一通信装置的多个数据包,该多个数据包为第一业务的数据包,该多个数据包为多个周期的数据包,且该多个数据包的周期小于第一业务的最大时延,上述第一时段的长度不大于所述第一业务的最大时延。
进一步的,本申请实施例还提供一种装置,所述装置用于执行上文方法实施例中的方法。一种计算机可读存储介质,包括程序,当所述程序被处理器运行时,上文方法实施例中的方法被执行。一种计算机程序产品,所述计算机程序产品包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机实现上文方法实施例中的方法。一种芯片,包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得装置执行上文方法实施例中的方法。
本申请实施例中,处理器可以是通用处理器、数字信号处理器、专用集成电路、现场 可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。
在本申请实施例中,存储器可以是非易失性存储器,比如硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等,还可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM)。存储器是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本申请实施例中的存储器还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。
本申请实施例提供的方法中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,简称DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机可以存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,数字视频光盘(digital video disc,简称DVD))、或者半导体介质(例如,SSD)等。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (32)

  1. 一种通信方法,其特征在于,所述方法适用于第一通信装置,所述方法包括:
    接收来自第二通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延;
    在第一时段的结束时刻后,向第三通信装置上报所述多个数据包,所述第一时段的长度不大于所述第一业务的最大时延。
  2. 如权利要求1所述的方法,其特征在于,所述第一时段等于定时器的时长,所述接收来自第二通信装置的多个数据包,具体包括:
    接收来自第二通信装置的第一数据包,启动所述定时器,所述第一数据包为所述多个数据包中的第一个数据包;
    在所述第一时段的结束时刻后,向第三通信装置上报所述多个数据包,具体包括:
    在所述定时器超时后,向所述第三通信装置上报所述多个数据包。
  3. 如权利要求1所述的方法,其特征在于,所述接收来自第二通信装置的数据包,具体包括:
    接收来自第二通信装置的第一数据包,启动计数器,所述第一数据包为所述多个数据包中的第一个数据包;
    在所述第一时段的结束时刻后,向第三通信装置上报所述多个数据包,具体包括:
    在所述计数器的计数值达到阈值后,向所述第三通信装置上报所述多个数据包,所述阈值是根据所述数据包的周期以及所述第一业务的最大时延确定的。
  4. 如权利要求1至3中任一项所述的方法,其特征在于,所述向第三通信装置上报所述多个数据包,具体包括:
    删除所述多个数据包中的第二数据包的时间信息,所述第二数据包为所述多个数据包中需要删除时间信息的数据包;
    向第三通信装置上报所述多个数据包。
  5. 如权利要求4所述的方法,其特征在于,所述删除所述多个数据包中的第二数据包的时间信息,具体包括:
    根据所述多个数据包的参数,确定第二数据包;
    在所述第二数据包的第一位置,删除所述时间信息,所述第一位置为预配置的。
  6. 如权利要求4所述的方法,其特征在于,所述删除所述多个数据包中的第二数据包的时间信息,包括:
    通过人工智能AI算法,确定所述第二数据包;
    通过所述AI算法,确定所述时间信息在所述第二数据包中的第一位置;
    在所述第一位置,删除所述第二数据包中的时间信息。
  7. 如权利要求4至6中任一项所述的方法,其特征在于,所述第二数据包中包括第一指示信息,所述第一指示信息用于指示已经被删除所述时间信息的数据包。
  8. 一种通信方法,其特征在于,所述方法适用于第三通信装置,包括:
    在第一时段的结束时刻后,接收来自第一通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延,所述第一时段的长度不大于所述第一业务的最大时延。
  9. 如权利要求8所述的方法,其特征在于,还包括:
    在所述多个数据包中的第二数据包中,添加时间信息,所述第二数据包为所述多个数据包中,被删除时间信息的数据包。
  10. 如权利要求9所述的方法,其特征在于,在所述多个数据包中的第二数据包中,添加时间信息,包括:
    根据所述多个数据包的参数,确定所述第二数据包;
    在所述第二数据包中的第一位置,添加所述时间信息,所述第一位置为预配置的。
  11. 如权利要求9所述的方法,其特征在于,所述在所述多个数据包中的第二数据包中,添加时间信息,包括:
    在所述多个数据包中,确定携带第一指示信息的第二数据包,所述第一指示信息用于指示被删除所述时间信息的数据包;
    在所述第二数据包中的第一位置,添加所述时间信息,所述第一位置为预配置的。
  12. 如权利要求9所述的方法,其特征在于,所述在所述多个数据包中的第二数据包中,添加时间信息,包括:
    通过人工智能AI算法,确定所述多个数据包中被删除时间信息的第二数据包;
    通过所述AI算法,确定所述第二数据包中的第一位置;
    在所述第二数据包中的第一位置,添加所述时间信息。
  13. 如权利要求9至12中任一项所述的方法,其特征在于,还包括:
    根据所述多个数据包的发送周期,确定所述第二数据包的时间信息。
  14. 如权利要求9至12中任一项所述的方法,其特征在于,还包括:
    确定第一数据包的接收时间,所述第一数据包中为所述多个数据包中的第一个数据包;
    根据所述第一数据包的接收时间以及传输时延,确定所述第二数据包的时间信息。
  15. 一种通信装置,其特征在于,包括:
    通信单元,用于接收来自第二通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延,所述第一业务的最大时延不小于第一时段的长度;
    所述通信单元,还用于在第一时段的结束时刻后,向第三通信装置上报所述多个数据包,所述第一时段的长度不大于所述第一业务的最大时延。
  16. 如权利要求15所述的装置,其特征在于,所述第一时段等于定时器的时长,所述接收来自第二通信装置的多个数据包,具体包括:
    接收来自第二通信装置的第一数据包,所述第一数据包为所述多个数据包中的第一个数据包;
    所述装置还包括处理单元,用于启动所述定时器;
    在所述第一时段的结束时刻后,向第三通信装置上报所述多个数据包,具体包括:
    在所述定时器超时后,向所述第三通信装置上报所述多个数据包。
  17. 如权利要求15所述的装置,其特征在于,所述接收来自第二通信装置的数据包,具体包括:
    接收来自第二通信装置的第一数据包,所述第一数据包为所述多个数据包中的第一个数据包;
    所述装置还包括处理单元,用于启动计数器;
    在所述第一时段的结束时刻后,向第三通信装置上报所述多个数据包,具体包括:
    在所述计数器的计数值达到阈值后,向所述第三通信装置上报所述多个数据包,所述阈值是根据所述数据包的周期以及所述第一业务的最大时延确定的。
  18. 如权利要求15至17中任一项所述的装置,其特征在于,所述向第三通信装置上报所述多个数据包,具体包括:
    删除所述多个数据包中的第二数据包的时间信息,所述第二数据包为所述多个数据包中需要删除时间信息的数据包;
    向第三通信装置上报所述多个数据包。
  19. 如权利要求18所述的装置,其特征在于,所述删除所述多个数据包中的第二数据包的时间信息,具体包括:
    根据所述多个数据包的参数,确定第二数据包;
    在所述第二数据包的第一位置,删除所述时间信息,所述第一位置为预配置的。
  20. 如权利要求18所述的装置,其特征在于,所述删除所述多个数据包中的第二数据包的时间信息,包括:
    通过人工智能AI算法,确定所述第二数据包;
    通过所述AI算法,确定所述时间信息在所述第二数据包中的第一位置;
    在所述第一位置,删除所述第二数据包中的时间信息。
  21. 如权利要求18至20中任一项所述的装置,其特征在于,所述第二数据包中包括第一指示信息,所述第一指示信息用于指示已经被删除所述时间信息的数据包。
  22. 一种通信装置,其特征在于,包括:
    通信单元,用于在第一时段的结束时刻后,接收来自第一通信装置的多个数据包,所述多个数据包为第一业务的数据包,所述多个数据包为多个周期的数据包,且所述多个数据包的周期小于所述第一业务的最大时延,所述第一时段的长度不大于所述第一业务的最大时延。
  23. 如权利要求22所述的装置,其特征在于,所述处理单元还用于:
    在所述多个数据包中的第二数据包中,添加时间信息,所述第二数据包为所述多个数据包中,被删除时间信息的数据包。
  24. 如权利要求23所述的装置,其特征在于,在所述多个数据包中的第二数据包中,添加时间信息,包括:
    根据所述多个数据包的参数,确定所述第二数据包;
    在所述第二数据包中的第一位置,添加所述时间信息,所述第一位置为预配置的。
  25. 如权利要求23所述的装置,其特征在于,所述在所述多个数据包中的第二数据包中,添加时间信息,包括:
    在所述多个数据包中,确定携带第一指示信息的第二数据包,所述第一指示信息用于指示被删除所述时间信息的数据包;
    在所述第二数据包中的第一位置,添加所述时间信息,所述第一位置为预配置的。
  26. 如权利要求23所述的装置,其特征在于,所述在所述多个数据包中的第二数据包中,添加时间信息,包括:
    通过人工智能AI算法,确定所述多个数据包中被删除时间信息的第二数据包;
    通过所述AI算法,确定所述第二数据包中的第一位置;
    在所述第二数据包中的第一位置,添加所述时间信息。
  27. 如权利要求23至26中任一项所述的装置,其特征在于,所述处理单元还用于:
    根据所述多个数据包的发送周期,确定所述第二数据包的时间信息。
  28. 如权利要求23至26中任一项所述的装置,其特征在于,所述处理单元还用于:
    确定第一数据包的接收时间,所述第一数据包中为所述多个数据包中的第一个数据包;
    根据所述第一数据包的接收时间以及传输时延,确定所述第二数据包的时间信息。
  29. 一种通信装置,其特征在于,包括处理器,所述处理器与至少一个存储器耦合,所述处理器用于实现如权利要求1至7中任一项所述的方法,或用于实现如权利要求8至14中任一项所述的方法。
  30. 一种通信装置,其特征在于,包括用于执行如权利要求1至7中任一项所述方法的模块,或,用于执行如权利要求8至14中任一项所述方法的模块。
  31. 一种通信装置,其特征在于,包括处理器和接口电路,所述接口电路用于接收来自所述通信装置之外的其它通信装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述通信装置之外的其它通信装置,所述处理器通过逻辑电路或执行代码指令用于实现如权利要求1至7中任一项所述的方法,或用于实现如权利要求8至14中任一项所述的方法。
  32. 一种计算机可读存储介质,其特征在于,包括程序,当所述程序被处理器运行时,如权利要求1至7中任一项所述的方法被执行,或如权利要求8至14中任一项所述的方法被执行。
PCT/CN2020/100506 2020-07-06 2020-07-06 一种通信方法及装置 WO2022006725A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2020/100506 WO2022006725A1 (zh) 2020-07-06 2020-07-06 一种通信方法及装置
CN202080102563.5A CN116134846A (zh) 2020-07-06 2020-07-06 一种通信方法及装置
EP20944764.8A EP4167527A4 (en) 2020-07-06 2020-07-06 COMMUNICATION METHOD AND DEVICE
US18/150,975 US20230164626A1 (en) 2020-07-06 2023-01-06 Communication method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/100506 WO2022006725A1 (zh) 2020-07-06 2020-07-06 一种通信方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/150,975 Continuation US20230164626A1 (en) 2020-07-06 2023-01-06 Communication method and apparatus

Publications (1)

Publication Number Publication Date
WO2022006725A1 true WO2022006725A1 (zh) 2022-01-13

Family

ID=79553542

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/100506 WO2022006725A1 (zh) 2020-07-06 2020-07-06 一种通信方法及装置

Country Status (4)

Country Link
US (1) US20230164626A1 (zh)
EP (1) EP4167527A4 (zh)
CN (1) CN116134846A (zh)
WO (1) WO2022006725A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742430A (zh) * 2008-11-20 2010-06-16 华为技术有限公司 数据包处理方法、装置以及基站
WO2012103701A1 (zh) * 2011-06-23 2012-08-09 华为技术有限公司 发送数据的方法和网关设备
CN102843344A (zh) * 2011-06-24 2012-12-26 中怡(苏州)科技有限公司 微型基地台的信号传输方法
CN108616462A (zh) * 2017-01-10 2018-10-02 中兴通讯股份有限公司 一种数据传输方法及装置
CN109088867A (zh) * 2018-08-08 2018-12-25 浙江天地人科技有限公司 一种减小数据上传连接频次的方法
US10425508B1 (en) * 2017-06-02 2019-09-24 Amazon Technologies, Inc. System for identifying idle time of a protocol to facilitate communication using multiple protocols

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742430A (zh) * 2008-11-20 2010-06-16 华为技术有限公司 数据包处理方法、装置以及基站
WO2012103701A1 (zh) * 2011-06-23 2012-08-09 华为技术有限公司 发送数据的方法和网关设备
CN102843344A (zh) * 2011-06-24 2012-12-26 中怡(苏州)科技有限公司 微型基地台的信号传输方法
CN108616462A (zh) * 2017-01-10 2018-10-02 中兴通讯股份有限公司 一种数据传输方法及装置
US10425508B1 (en) * 2017-06-02 2019-09-24 Amazon Technologies, Inc. System for identifying idle time of a protocol to facilitate communication using multiple protocols
CN109088867A (zh) * 2018-08-08 2018-12-25 浙江天地人科技有限公司 一种减小数据上传连接频次的方法

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "TSC AI clarifications - meaning of arrival time", 3GPP DRAFT; R2-2000790, vol. RAN WG2, 13 February 2020 (2020-02-13), pages 1 - 5, XP051848594 *
NOKIA, NOKIA SHANGHAI BELL, TENCENT, HUAWEI: "Vertical_LAN TSN related CR for non-FASMO corrections", 3GPP DRAFT; S2-2002570, vol. SA WG2, 29 February 2020 (2020-02-29), Elbonia, pages 1 - 22, XP051857417 *
See also references of EP4167527A4 *

Also Published As

Publication number Publication date
EP4167527A4 (en) 2023-08-09
CN116134846A (zh) 2023-05-16
EP4167527A1 (en) 2023-04-19
US20230164626A1 (en) 2023-05-25

Similar Documents

Publication Publication Date Title
JP2017508364A (ja) セカンダリ基地局及びマスター基地局によって実行される通信方法、並びに対応する基地局
WO2020114391A1 (zh) 通信方法及装置
CN109548096A (zh) 通信方法、基站、终端设备和系统
CN111264079B (zh) 数据传输方法、电子设备、系统及存储介质
CN115699624A (zh) 通信系统中传输同步信息的装置和方法
KR102371921B1 (ko) 이동통신 시스템에서 시간에 민감한 통신 지원 정보 갱신 방법 및 장치
WO2018176419A1 (zh) 一种数据迁移方法和装置
WO2019062725A1 (zh) 一种上行数据传输方法及装置
WO2022006725A1 (zh) 一种通信方法及装置
WO2022223031A1 (zh) 一种数据传输的通信处理方法和相关设备
JP5662779B2 (ja) 通信システム及びノード装置
WO2018014688A1 (zh) 一种帧流控制方法和装置、计算机存储介质
KR102179212B1 (ko) 제어 정보에 대한 송신 방법 및 장치
WO2022027311A1 (zh) 一种通信方法及装置
CN115250506A (zh) 一种通信方法及设备
CN115250537A (zh) 一种通信方法及设备
US20220294881A1 (en) Industrial automation with cellular network
WO2021128100A1 (zh) 一种通信方法及装置
WO2024012205A1 (zh) 一种通信方法、装置及系统
WO2023174198A1 (zh) 一种时延控制方法、应用服务器及通信系统
WO2024032434A1 (zh) 业务控制方法、装置、通信设备及可读存储介质
WO2024055692A1 (zh) 通信方法、通信装置和通信系统
WO2022056863A1 (zh) 一种切换方法及装置
WO2023071946A1 (zh) 一种通信方法及装置
WO2022213848A1 (zh) 一种通信方法及设备

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2020944764

Country of ref document: EP

Effective date: 20230110

NENP Non-entry into the national phase

Ref country code: DE