WO2022067592A1 - 一种数据无损传输的通信方法、装置及系统 - Google Patents

一种数据无损传输的通信方法、装置及系统 Download PDF

Info

Publication number
WO2022067592A1
WO2022067592A1 PCT/CN2020/119118 CN2020119118W WO2022067592A1 WO 2022067592 A1 WO2022067592 A1 WO 2022067592A1 CN 2020119118 W CN2020119118 W CN 2020119118W WO 2022067592 A1 WO2022067592 A1 WO 2022067592A1
Authority
WO
WIPO (PCT)
Prior art keywords
network node
data packet
node
indication information
address
Prior art date
Application number
PCT/CN2020/119118
Other languages
English (en)
French (fr)
Inventor
朱元萍
史玉龙
曹振臻
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to KR1020237014498A priority Critical patent/KR20230078761A/ko
Priority to AU2020470490A priority patent/AU2020470490A1/en
Priority to CN202080105623.9A priority patent/CN116235546A/zh
Priority to PCT/CN2020/119118 priority patent/WO2022067592A1/zh
Priority to JP2023519422A priority patent/JP2023543818A/ja
Priority to EP20955617.4A priority patent/EP4207872A4/en
Publication of WO2022067592A1 publication Critical patent/WO2022067592A1/zh
Priority to US18/192,374 priority patent/US20230247521A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/248Connectivity information update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • H04W36/087Reselecting an access point between radio units of access points
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/02Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/18Performing reselection for specific purposes for allowing seamless reselection, e.g. soft reselection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/047Public Land Mobile systems, e.g. cellular systems using dedicated repeater stations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • H04W88/085Access point devices with remote components

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a communication method, device, and system for lossless data transmission.
  • the fifth-generation mobile communication has put forward more stringent requirements in all aspects of the network performance indicators. For example, the capacity index has been increased by 1000 times, wider coverage requirements, ultra-high reliability and ultra-low latency, etc.
  • the capacity index has been increased by 1000 times, wider coverage requirements, ultra-high reliability and ultra-low latency, etc.
  • the use of high-frequency small stations to form a network is becoming more and more popular.
  • High-frequency carriers have poor propagation characteristics, are severely attenuated by occlusion, and have limited coverage, so a large number of small stations need to be densely deployed. Therefore, an economical and convenient backhaul solution is required; on the other hand, from the perspective of wide coverage requirements, to provide network coverage in some remote areas, the deployment of optical fibers is difficult and costly, and flexible and convenient access and backhaul solutions also need to be designed .
  • the integrated access and backhaul (IAB) technology provides an idea for solving the above two problems: both the access link and the backhaul link use a wireless transmission scheme to avoid Fiber deployment.
  • a relay node RN relay node, RN
  • IAB node IAB node
  • UE user equipment
  • the wireless backhaul link is connected to the donor node (IAB donor) or the donor base station (donor gNodeB, DgNB) for transmission.
  • IAB donor donor node
  • donor base station donor gNodeB, DgNB
  • Using an IAB node can share antennas for access and backhaul, reducing the number of antennas at the base station.
  • the IAB node may have topology updates, which are commonly generated due to handover or wireless link failure recovery process. But after an IAB node performs a topology update across IAB hosts, the problem of packet loss may occur. Therefore, how to reduce the loss of data packets during the topology update process performed by the IAB nodes in the scope of different IAB hosting services has become an urgent problem to be solved. It is understandable that similar problems may exist under other network architectures.
  • the embodiments of the present application provide a communication method, device, and system for lossless data transmission, so that the loss of data packets caused by performing topology update can be reduced, for example, the topology update process performed by IAB nodes within the scope of different IAB hosting services can be reduced loss of packets.
  • an embodiment of the present application provides a communication method for lossless data transmission.
  • the method may be executed by a network node, or may be executed by a component of the network node (for example, a processor, a chip, or a chip system, etc.), including: the first
  • the second network node receives the first data packet from the first network node, the second network node is the target host node distributed unit DU of the first network node, and the destination node of the first data packet is the third network node or the third network node.
  • the above method can support the re-routing and forwarding of data packets across the host DU of the IAB node, avoid data packet loss during the topology update process of the first network node, and reduce the impact on the continuity of the terminal uplink service under the first network node.
  • the second network node updates an Internet Protocol IP address filtering rule for sending the first data packet to the third network node.
  • the updating of the IP address filtering rule by the second network node includes:
  • the second network node obtains a first IP address, where the first IP address is one or more IP addresses obtained by the first network node when connecting to the third network node;
  • the second network node updates the IP address filtering rule according to the first IP address.
  • the first IP address is one or more IP addresses obtained by the first network node when connecting to the source host DU.
  • the second network node adds the first IP address to the whitelist of the source IP address filtering rule, that is, adds the first IP address to the list of source IP addresses of data packets that are allowed to be forwarded.
  • the second network node is allowed to forward the first data packet, which avoids the first data packet being discarded at the second network node.
  • acquiring the first IP address by the second network node includes: the second network node receiving the first IP address from the third network node.
  • obtaining the first IP address by the second network node includes: the second network node receiving the first IP address from a fourth network node, where the fourth network node is a target host set of the first network node. type unit CU.
  • the second network node can obtain the first IP address of the first data, so as to avoid discarding the first data packet.
  • the updating of the IP address filtering rule by the second network node includes: the second network node receives first suspension indication information from the fourth network node, where the first suspension indication information is used to indicate the second network node.
  • the network node suspends the IP address filtering rule, and the fourth network node is the target host CU of the first network node.
  • the second network node is allowed to forward the first data packet, thereby avoiding discarding the first data packet at the second network node due to IP address filtering rules.
  • the second data packet encapsulates the first data packet
  • the second data packet includes a first IP header and a second IP header
  • the target IP address of the first IP header is the IP address of the third network node.
  • address or the IP address of the security gateway on the side of the third network node the target IP address of the second IP header is the IP address of the fourth network node;
  • the second network node sends the information to the third network node according to the second IP header
  • the fourth network node sends the second data packet, so that the fourth network node sends the first data packet to the third network node.
  • the second network node can send the first data packet to the third network node through the fourth network node, which ensures that the first data packet can be transmitted to the source host CU, so that the first data packet can be transmitted to the third network node.
  • Correctly processed at the network node eg integrity verification or decryption.
  • the second data packet further includes first removal indication information, where the first removal indication information is used to instruct the fourth network node to remove the second IP header.
  • the fourth network node can be made to identify which data packets need to do this special processing, that is, remove the outer layer IP header and forward it according to the inner layer IP header.
  • the second IP header is added by the second network node for the first data packet, or the second IP header is added by the first network node for the first data packet.
  • the second IP header is added outside the first IP header, or the second IP header is outside the first IP header.
  • the first data packet can be forwarded to the fourth network node.
  • the first network node completes the topology update.
  • an embodiment of the present application provides a communication method for lossless data transmission.
  • the method may be executed by a network node, or may be executed by a component of the network node (for example, a processor, a chip, or a chip system, etc.), including: the first A network node determines the first data packet, the destination node of the first data packet is a third network node or a security gateway on the side of the third network node, and the third network node is the source host node or source host node of the first network node CU; the first network node sends the first data packet to the second network node, and the second network node is the target host node DU of the first network node.
  • the first network node reroutes the first data packet to be sent to the third network node through the second network node, so that the first data packet can be correctly processed at the third network node, avoiding the need for Loss of data packets when the topology of the first network node is updated.
  • the first network node updates the backhaul adaptation protocol layer configuration of the first data packet to send the first data packet to the second network node.
  • the first network node updates the routing identifier in the first data packet according to the configuration information sent by the fourth network node, which is the target host CU of the first network node.
  • the first network node modifies the header information of the BAP layer of the first data packet so that the first data packet can be successfully sent to the second network node.
  • the first network node adds a second IP header to the first data packet
  • the target IP address of the second IP header is the IP address of the fourth network node
  • the fourth network The node is the target host centralized unit CU of the first network node.
  • the first data packet can be forwarded to the fourth network node.
  • the first data packet further includes first removal indication information, where the first removal indication information is used to instruct the fourth network node to remove the second IP header.
  • the fourth network node can be made to identify which data packets need to do this special processing, that is, remove the outer IP header and forward it according to the inner IP header.
  • the first network node sends a first IP address to the fourth network node, where the first IP address is obtained by the first network node when connecting to the third network node.
  • One or more IP addresses are possible to be used.
  • the fourth network node it is helpful for the fourth network node to obtain the first IP address, and further enables the fourth network node to send the first IP address to the second network node.
  • the first network node before the first network node determines the first data packet, the first network node performs topology update.
  • an embodiment of the present application provides a communication method for lossless data transmission.
  • the method may be executed by a network node, or may be executed by a component of the network node (for example, a processor, a chip, or a chip system, etc.), including:
  • the fourth network node sends a first message to the second network node, where the first message is used for the second network node to update the IP address filtering rule, and the second network node is the target host node of the first network node DU.
  • the fourth network node provides the second network node with the information required to update the IP filtering rules.
  • the fourth network node determines that the first message includes:
  • the fourth network node obtains a first IP address, where the first IP address is one or more IP addresses obtained when the first network node is connected to a third network node, and the third network node is the The source host node or the source host node CU of the first network node; the sending of the first message by the fourth network node to the second network node includes: the first message includes the first IP address.
  • the fourth network node receives the first IP address from the third network node; or,
  • the fourth network node receives the first IP address from the first network node; or,
  • the fourth network node receives said first IP address from the access and mobility management function AMF.
  • the fourth network node provides the first IP address to the second network node for the second network node to update the IP address filtering rule according to the first IP address, which is further beneficial to ensure the successful forwarding of the first data.
  • the fourth network node determining the first message includes: the fourth network node determining first suspension indication information, where the first suspension indication information is used to instruct the second network node to suspend the IP address filtering rule;
  • the sending, by the fourth network node, the first message to the second network node includes: the first message includes the first suspension indication information.
  • the fourth network node instructs the second network node to suspend the IP address filtering rule, so as to prevent the first data packet from being directly discarded at the second network node.
  • the fourth network node receives a second data packet from the second network node, the second data packet includes a first IP header and a second IP header, and the target of the first IP header
  • the IP address is the third network node
  • the target IP address of the second IP header is the IP address of the fourth network node
  • the fourth network node sends a first data packet to the third network node, where the first data packet is a data packet processed by the fourth network node on the second data packet, and the first data packet is The packet does not include the second IP header.
  • the fourth network node forwards the first data packet to the third network node, which ensures that the first data packet can be correctly processed at the third network node and avoids the loss of the first data packet.
  • the first data packet further includes first removal indication information, and the first removal indication information is used to instruct the fourth network node to remove the second IP header according to the The first IP header forwards the first data packet to the third network node.
  • the fourth network node can confirm which data packets need to be processed to remove the IP header.
  • the fourth network node receives data from the third network node about the terminal equipment served by the first network node in the first data packet.
  • the fourth network node can obtain the terminal-related data in the first data packet, and can further process the data, for example, send the terminal-related service data to the terminal.
  • an embodiment of the present application provides a communication method for lossless data transmission.
  • the method can be executed by a network node, or can be executed by a component of the network node (for example, a processor, a chip, or a chip system, etc.), including: the first The third network node obtains a first data packet, where the first data packet is a data packet to be sent to the third network node after the first network node is connected to the second network node; the third network node processes the first data The third network node is the source host node or the source host node CU of the first network node, and the second network node is the target host node DU of the first network node.
  • the third network node can obtain the first data packet to be sent at the first network node, and process the first data packet correctly, which is beneficial to avoid the loss of the first data packet and the impact on the service continuity of the terminal. Influence.
  • acquiring the first data packet by the third network node includes: the third network node receiving the first data packet from the fourth network node, the first data packet being the fourth network node a data packet after the node processes a second data packet from the second network node, the second data packet encapsulates the first data packet; or,
  • the third network node receives the first data packet from the second network node.
  • the third network node can obtain the first data packet through different paths.
  • the third network node processing the first data packet includes: the third network node determining, according to the first data packet, data related to the terminal equipment served by the first network node;
  • the third network node sends the relevant data of the terminal device to the fourth network node.
  • the related data of the terminal device is the packet data convergence layer protocol PDCP service data unit SDU of the terminal device.
  • the third network node can correctly process the first data packet and ensure the service continuity of the terminal device.
  • an embodiment of the present application provides a communication method for lossless data transmission.
  • the method can be executed by a network node or by a component of the network node (for example, a processor, a chip, or a chip system, etc.), including: the first A network node receives a first handover command from a third network node, the first handover command is used to instruct the first network node to perform handover, and the third network node is the source host node of the first network node or the source host node CU; the first network node sends first transmission completion indication information, where the first transmission completion indication information is used to indicate that the transmission of a third data packet is completed, and the third data packet includes information from the first transmission completion indication.
  • Uplink data of the network node and the subordinate nodes of the first network node, where the subordinate nodes include subordinate network nodes and/or subordinate terminals.
  • the method further includes: the first network node performs handover.
  • the first network node determines to perform topology update; the first network node sends first transmission completion indication information, where the first transmission completion indication information is used to indicate the third data packet After the transmission is completed, the third data packet includes uplink data from the first network node and subordinate nodes of the first network node, and the subordinate nodes include subordinate network nodes and/or subordinate terminals.
  • the method further includes: the first network node performs topology update.
  • the sending, by the first network node, the first transmission completion indication information includes:
  • the first network node sends the first transmission completion indication information to the third network node.
  • the sending, by the first network node, the first transmission completion indication information includes:
  • the first network node sends the first transmission completion indication information to a fifth network node, and the fifth network node provides access and backhaul services for the first network node.
  • the first network node ensures that all in-transit uplink data packets buffered by the first network node and its subordinate nodes are sent to the source parent node of the first network node, and send the first network node to the source parent node or the source host node.
  • the topology update is performed only after the completion of the transmission of the indication information, which ensures that no data packets are lost during the topology update process.
  • the first network node sends the third data packet to the third network node.
  • the first network node after determining to perform topology update, the first network node sends the third data packet to the third network node, and performs topology update only after confirming that all transmission of the third data packet is completed.
  • the first network node stops uplink scheduling for a sixth network node
  • the sixth network node is a subordinate network node of the first network node.
  • stopping the uplink scheduling for the sixth network node includes: receiving, by the first network node, second transmission completion indication information from the sixth network node, where the second transmission completion indication information is used to indicate the fourth network node.
  • the data packet transmission is completed, and the fourth data packet includes the uplink data from the sixth network node and the subordinate nodes of the sixth network node; Describe the uplink scheduling of the sixth network node.
  • the stopping the uplink scheduling for the sixth network node includes: the first network node receiving first stop scheduling indication information from the third network node; Stop the scheduling instruction information to stop the uplink scheduling of the sixth network node.
  • the first network node stops the uplink scheduling for the sixth network node after determining to perform topology update and after the transmission of the uplink data packets at the sixth network node is completed.
  • the method further includes: the first network node stops the uplink scheduling of the terminal device, The first network node provides access and backhaul services for the terminal device.
  • the first network node stops uplink scheduling for the terminal device, and the first network node provides access and backhaul services for the terminal device.
  • the first network node After receiving the handover command or determining to perform topology update, the first network node stops the uplink scheduling of the terminal device.
  • the first transmission completion indication information is carried in the third data packet, or the first transmission completion indication information is carried in the control protocol data unit PDU of the BAP layer of the backhaul adaptation protocol. middle.
  • the first transmission completion indication information may be sent together with the last data packet in the third data packet, or may be sent independently.
  • an embodiment of the present application provides a communication method for lossless data transmission.
  • the method can be executed by a network node or by a component of the network node (for example, a processor, a chip, or a chip system, etc.), including: the first The fifth network node receives transmission indication information, where the transmission indication information is used to instruct to stop the uplink scheduling for the first network node, the fifth network node provides access and backhaul services for the first network node; the fifth network node provides access and backhaul services for the first network node; The fifth network node determines to stop the uplink scheduling of the first network node according to the transmission indication information.
  • the receiving, by the fifth network node, the transmission indication information includes: receiving, by the fifth network node, first transmission completion indication information from the first network node, where the first transmission completion indication information is used to indicate the first transmission completion indication information.
  • the transmission of three data packets is completed, and the third data packet includes uplink data from the first network node and subordinate nodes of the first network node, and the subordinate nodes include subordinate network nodes and/or subordinate terminals; the The fifth network node determines to stop uplink scheduling for the first network node according to the first transmission completion indication information.
  • the fifth network node receiving the transmission indication information includes: the fifth network node receiving the second stop scheduling indication information from a third network node, where the third network node is the first network The source host node or source host node CU of the node.
  • the fifth network node may receive transmission completion indication information sent by different network elements in various ways, and the fifth network node determines to stop uplink scheduling to the first network node according to the transmission completion indication information.
  • the second stop scheduling instruction information is included in a second handover command, and the second handover command is used to instruct the fifth network node to perform handover.
  • the fifth network node when the fifth network node is instructed to perform handover, it is instructed to stop the uplink scheduling of the first network node.
  • an embodiment of the present application provides a communication method for lossless data transmission.
  • the method can be executed by a network node, or can be executed by a component of the network node (for example, a processor, a chip, or a chip system, etc.), including: the first The third network node receives the first transmission completion indication information from the first network node, where the first transmission completion indication information is used to indicate that the transmission of the third data packet is completed, and the third data packet includes the information from the first network node and the Uplink data of subordinate nodes of the first network node, where the subordinate nodes include subordinate network nodes and/or subordinate terminals;
  • the third network node sends second stop scheduling instruction information to the fifth network node, where the second stop scheduling instruction information is used to instruct the fifth network node to stop the uplink scheduling of the first network node, the The fifth network node provides access and backhaul services for the first network node.
  • the first transmission completion indication information is carried in the uplink data, or the first transmission completion indication information is carried in an RRC message or an F1AP message.
  • the second stop scheduling instruction information is included in a second handover command, where the second handover command is used to instruct the fifth network node to perform handover.
  • the third network node instructs the fifth network node to stop the uplink scheduling of the first network node after determining that all the uplink data at the first network node to be updated is completed, thereby avoiding the topology update of the first network node. Packet loss during update.
  • an embodiment of the present application provides a communication device for lossless data transmission, where the device may be a network node or a chip used for a network node.
  • the device has the function of implementing the above-mentioned first to seventh aspects, or each possible implementation method of the first to seventh aspects. This function can be implemented by hardware or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • an embodiment of the present application provides a communication device for lossless data transmission, including a processor and a memory; the memory is used to store computer execution instructions, and when the device runs, the processor executes the computer execution stored in the memory.
  • the instructions are used to cause the apparatus to execute the methods of the first aspect to the seventh aspect, and any method among the possible implementation methods of the first aspect to the seventh aspect.
  • an embodiment of the present application provides a communication device for lossless data transmission, including a method for performing the above-mentioned first to seventh aspects, and any method among the possible implementation methods of the first to seventh aspects The units or means of each step of .
  • an embodiment of the present application provides a communication device for lossless data transmission, including a processor and an interface circuit, where the processor is configured to communicate with other devices through the interface circuit, and execute the above-mentioned first to seventh aspects.
  • the method is any of the possible implementation methods of the first aspect to the seventh aspect.
  • the processor includes one or more.
  • an embodiment of the present application provides a communication device for lossless data transmission, including a processor that is connected to a memory and used to call a program stored in the memory to execute the above-mentioned first to seventh aspects
  • the method any of the possible implementation methods of the first aspect to the seventh aspect.
  • the memory may be located within the device or external to the device.
  • the processor includes one or more.
  • embodiments of the present application further provide a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the computer-readable storage medium runs on a computer, the processor causes the processor to execute the above-mentioned first to seventh aspects
  • the method of the aspect is any method among the possible implementation methods of the first aspect to the seventh aspect.
  • an embodiment of the present application further provides a computer program product, the computer product includes a computer program, when the computer program runs, the methods of the first to seventh aspects above, the first to seventh aspects Any of the possible implementations are executed.
  • an embodiment of the present application further provides a chip system, including: a processor configured to execute the methods of the first aspect to the seventh aspect, and one of the possible implementation methods of the first aspect to the seventh aspect. any method.
  • FIG. 1A is a schematic diagram of a communication system to which an embodiment of the present application may be applied;
  • FIG. 1B is a schematic diagram of an IAB network system architecture provided by an embodiment of the present application.
  • FIG. 1C is a schematic diagram of a non-independent networking IAB scenario provided by an embodiment of the present application.
  • 1D is a schematic diagram of a user plane protocol stack in an IAB network according to an embodiment of the present application.
  • 1E is a schematic diagram of a control plane protocol stack in an IAB network according to an embodiment of the present application.
  • 1F is a schematic diagram of topology update across IAB hosts provided by an embodiment of the present application.
  • 1G is a schematic diagram of topology update in an IAB host provided by an embodiment of the present application.
  • FIG. 2A provides a schematic diagram of a communication method for lossless data transmission according to an embodiment of the present application
  • 2B is a schematic diagram of another communication method for data lossless transmission according to an embodiment of the present application.
  • FIG. 2C provides a schematic diagram of another communication method for lossless data transmission according to an embodiment of the present application.
  • FIG. 3 provides a schematic diagram of another communication method for lossless data transmission according to an embodiment of the present application
  • FIG. 4 provides a schematic diagram of another communication method for data lossless transmission according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a communication device for lossless data transmission according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a communication apparatus for lossless data transmission according to an embodiment of the present application.
  • Embodiments of the present application provide a communication method and device for lossless data transmission.
  • the method and the device are based on the same concept. Since the principles of the method and the device for solving the problem are similar, the implementation of the device and the method can be referred to each other, and the repetition will not be repeated.
  • the communication method for data lossless transmission may be applied to a fourth generation (4th generation, 4G) communication system, such as long term evolution (LTE), and may also be applied to a fifth generation (5th generation, 5G) communication system ) communication system, such as 5G new radio (NR), or applied to various communication systems in the future, such as the sixth generation (6th generation, 6G) communication system, such as the seventh generation (7th generation, 7G) communication system.
  • 4G fourth generation
  • 5th generation, 5G) communication system such as long term evolution (LTE
  • 5th generation, 5G) communication system such as 5G new radio (NR)
  • NR 5G new radio
  • 6th generation, 6G communication system such as the seventh generation (7th generation, 7G) communication system.
  • the embodiments of the present application may also be applied to an integrated access and backhaul (integrated access and backhaul, IAB) scenario.
  • IAB integrated access and backhaul
  • the communication system 100 includes at least one IAB node (the IAB node 110 to the IAB node 150 are shown in the figure) and at least one IAB host 160 .
  • the communication system further includes at least one terminal (terminal 170 and terminal 180 are shown in the figure) connected to the IAB node.
  • the communication system further includes a core network device 190 connected to the IAB host 160 .
  • the IAB node 140 may provide a wireless access service for the terminal 170 through an access link (AL), and the service data of the terminal 170 may be connected to the IAB by the IAB node 140 through a wireless backhaul link (BL) Host 160 transmits.
  • AL access link
  • BL wireless backhaul link
  • the terminal in FIG. 1A may be user equipment, mobile terminal (MT), access terminal equipment, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal equipment, mobile equipment, user terminal equipment, Wireless terminal equipment, user agent, or user equipment, etc. It can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a wireless communication capable Handheld devices, computing devices, other processing devices connected to wireless modems, in-vehicle devices, wearable devices (such as smart watches, smart bracelets, etc.), smart furniture or home appliances, terminal devices in 5G networks, future evolution Terminal equipment in public land mobile network (PLMN), or vehicle equipment in vehicle to everything (V2X), customer premises equipment (CPE), etc.
  • the specific implementation form of the device is not limited.
  • the IAB node in Fig. 1A may be composed of a mobile terminal and a distributed unit (DU).
  • DU distributed unit
  • the IAB node faces its parent node it can be regarded as a terminal device, that is, the role of the MT;
  • the subordinate device it can be regarded as a network device, that is, it acts as a DU.
  • this embodiment of the present application will connect to an IAB node (eg, IAB node 140 ) or a terminal (eg, terminal 170 ) of the IAB host 160 via the IAB node 130 , which is referred to as a descendant IAB node (descendent IAB of the IAB node 130 ). node), subordinate node, subordinate network node or subordinate terminal.
  • IAB node eg, IAB node 140
  • terminal 170 e.g., terminal 170
  • the IAB donor (IAB donor) in FIG. 1A may be a donor base station, and the IAB donor may be referred to as a DgNB (ie, a donor gNodeB) for short in a 5G network.
  • the IAB host can be a complete entity, or can be a centralized unit (CU) (for ease of expression, it may be referred to as Donor-CU, CU or gNB-CU in this application) and a distributed unit (distributed unit) , DU) (referred to as Donor-DU, DU or gNB-DU in this application) in the form of separation, as shown in Figure 1B, the IAB host can be located in a 5G radio access network (5G radio access network, 5G RAN) gNB.
  • 5G radio access network 5G radio access network
  • the IAB host may be composed of gNB-CU and gNB-DU.
  • the gNB-CU and the gNB-DU are connected through an F1 interface, and the F1 interface may further include a control plane interface (F1-C) and a user plane interface (F1-U).
  • the CU and the core network are connected through a next generation (NG) interface.
  • the gNB-CU or Donor-CU may also be a user plane (UP) (referred to as CU-UP in this application) and a control plane (CP) (referred to as CU-CP in this application)
  • UP user plane
  • CP control plane
  • One gNB-CU may include one gNB-CU-CP and at least one gNB-CU-UP.
  • one Donor-CU may include one Donor-CU-CP and at least one Donor-CU-UP.
  • the IAB node and the IAB host in the embodiments of the present application may be referred to as network nodes or network devices.
  • the core network device in FIG. 1A may be a network management device, such as an operation, management and maintenance network element (operation, administration and maintenance, OAM).
  • the network management equipment may include a network element management system (element management system, EMS), and a network management system (network management system, NMS).
  • the network management device may be a functional network element located in a next generation core network (Next Generation Core, NGC) or a 5G core network (5G core, 5GC).
  • NGC next generation core network
  • 5G core 5G core
  • the network management device can also be a functional network element deployed in the backbone network behind the 5GC, or the network management device can also be deployed in other locations, and this application does not limit the specific deployment location of the network management device.
  • the IAB node is connected to the core network via the IAB host.
  • the IAB node is connected to the 5GC via the IAB host.
  • the IAB-donor-CU-CP is connected to the control plane network elements (such as access and mobility management functions (AMF)) in the 5GC through the NG control plane interface
  • the IAB-donor-CU- The UP is connected to the user plane network elements (eg, user plane function (UPF)) in the 5GC through the NG user plane interface.
  • UPF user plane function
  • the IAB node can be connected to the evolved packet core (EPC) via an evolved base station (evolved NodeB, eNB) (for example, connected to a service gateway (serving gateway, SGW)), there is a connection between the MeNB and the MT of the IAB node.
  • EPC evolved packet core
  • eNB evolved NodeB
  • SGW serving gateway
  • LTE Uu air interface connection there is an X2-C interface between the MeNB and the IAB-donor-CU-CP, and the MeNB is connected to the EPC through the S1 interface (including the S1 interface user plane and the S1 interface control plane).
  • the 5G core network can be used for authentication, mobility management, protocol data unit (PDU) session management of terminal equipment, etc., including functional entities or network elements such as AMF and UPF.
  • the 4G core network can be used for authentication, mobility management, packet data network connection management, etc. of terminal equipment, including network elements such as mobility management entities and packet data gateways.
  • the IAB network supports the networking of multi-hop IAB nodes and multi-connection IAB nodes. Therefore, there may be multiple transmission paths between the terminal and the IAB host.
  • On a path there is a definite hierarchical relationship between the IAB nodes and between the IAB nodes and the IAB hosts connected to the IAB nodes, and each IAB node regards the node that provides backhaul services for it as a parent node. Accordingly, each IAB node can be regarded as a child node of its parent node.
  • the parent node of the IAB node 110 is the IAB host 160
  • the IAB node 110 is the parent node of the IAB node 120 and the IAB node 130
  • both the IAB node 120 and the IAB node 130 are parent nodes of the IAB node 140
  • the parent node of the IAB node 150 is the IAB node 120 .
  • the uplink data packets of the terminal can be transmitted to the IAB host through one or more IAB nodes, and then sent by the IAB host to the core network device 190 (for example, a user plane function (UPF) network element in the 5G network), and the downlink
  • the data packet will be received by the IAB host 160 from the core network device (eg, mobile gateway device), and then sent to the terminal through one or more IAB nodes.
  • the core network device eg, mobile gateway device
  • There are two available paths for the transmission of data packets between the terminal 170 and the IAB host 160 namely: terminal 170 ⁇ IAB node 140 ⁇ IAB node 130 ⁇ IAB node 110 ⁇ IAB host 160, terminal 170 ⁇ IAB node 140 ⁇ IAB node 120 ⁇ IAB Node 110 ⁇ IAB Host 160.
  • terminal 180 and IAB host 160 There are three available paths for data packet transmission between terminal 180 and IAB host 160, namely: terminal 180 ⁇ IAB node 140 ⁇ IAB node 130 ⁇ IAB node 110 ⁇ IAB host 160, terminal 180 ⁇ IAB node 140 ⁇ IAB node 120 ⁇ IAB node 110 ⁇ IAB host 160 , terminal 180 ⁇ IAB node 150 ⁇ IAB node 120 ⁇ IAB node 110 ⁇ IAB host 160 .
  • the intermediate IAB nodes on the upstream path from the IAB node to the IAB host can be referred to as the upstream nodes of the IAB node.
  • a subordinate device or subordinate node of an IAB node may include a device that directly accesses the IAB node, such as a sub-node of the IAB node or a UE that accesses the IAB node.
  • the IAB node 120 and the IAB node 130 in FIG. 1A may be referred to as subordinate devices of the IAB node 110
  • the terminal 170 and the terminal 180 may be referred to as subordinate devices of the IAB node 140 .
  • a transmission path between a terminal and an IAB host may include one or more IAB nodes.
  • Each IAB node needs to maintain the wireless backhaul link facing the parent node, and also needs to maintain the wireless link with the child node. If an IAB node is a node accessed by a terminal, there is a wireless access link AL between the IAB node and a child node (i.e., a terminal). If an IAB node is a node that provides backhaul services for other IAB nodes, there is a wireless backhaul link BL between the IAB node and child nodes (ie, other IAB nodes).
  • the terminal 170 accesses the IAB node 140 through the wireless access link, and the IAB node 140 passes through the wireless access link.
  • the wireless backhaul link is connected to the IAB node 130, the IAB point 130 is connected to the IAB node 110 through the wireless backhaul link, and the IAB node 110 is connected to the IAB host through the wireless backhaul link.
  • the above IAB networking scenario is just an example.
  • the IAB host and the IAB nodes under another IAB host are composed Dual connections are terminal services, etc., which will not be listed here.
  • the IAB network also supports non-standalone (NSA) networking, also known as EN-DC (E-UTRAN NR dual connectivity) networking scenarios.
  • NSA non-standalone
  • EN-DC E-UTRAN NR dual connectivity
  • FIG. 1C which is a schematic diagram of a non-independent networking IAB scenario provided by an embodiment of the application
  • the IAB node supports dual connections of 4G and 5G networks
  • the LTE base station eNB is the master base station (master eNB, MeNB), which is the IAB
  • the node provides an LTE air interface (LTE Uu) connection, and establishes an S1 interface with the 4G core network evolved packet core (EPC) for user plane and control plane transmission.
  • LTE Uu LTE air interface
  • EPC 4G core network evolved packet core
  • the IAB-donor gNB is the secondary base station, which provides NR air interface (NR Uu) connection for the IAB node, and establishes an S1 interface with the core network EPC for user plane transmission.
  • the UE also supports EN-DC.
  • the UE is connected to the primary base station eNB through the LTE Uu interface, and is connected to the secondary base station IAB node through the NR Uu interface.
  • the secondary base station of the UE can also be an IAB donor gNB.
  • Figure 1C is only an example of networking.
  • the NSA scenario of the IAB network also supports multi-hop IAB networking.
  • the UE in Figure 1C can be another IAB node, that is, the IAB node can pass the multi-hop wireless backhaul chain.
  • the road is connected to the IAB donor gNB.
  • FIG. 1D and FIG. 1E are a schematic diagram of a user plane protocol stack and a schematic diagram of a control plane protocol stack in an IAB network provided by an embodiment of the present application, respectively, which are described below with reference to FIGS. 1D and 1E .
  • the backhaul adaptation protocol (BAP) layer, which is located in the radio link control (radio link control, RLC) layer. ) layer, which can be used to implement the routing of data packets on the wireless backhaul link, as well as bearer mapping and other functions.
  • BAP backhaul adaptation protocol
  • RLC radio link control
  • an F1 interface (or referred to as an F1* interface) needs to be established.
  • the interface supports user plane protocol (F1-U/F1*-U) and control plane protocol (F1-C/F1*-C), wherein the user plane protocol includes one of the following protocol layers or more: general packet radio service (GPRS), tunneling protocol user plane (gPRS tunnelling protocol user plane, GTP-U), user datagram protocol (user datagram protocol, UDP), internet protocol (internet protocol) , IP) and other protocol layers;
  • the control plane protocol of the interface includes one or more of the following: F1 application protocol (F1 application protocol, F1AP), stream control transport protocol (stream control transport protocol, SCTP), IP and other protocol layers .
  • the IAB node and the IAB host can perform functions such as user plane data transmission and downlink transmission status feedback.
  • the IAB node and the IAB host can perform interface management, manage the IAB-DU, and perform UE context-related configuration, etc. .
  • FIG. 1D and FIG. 1E describe the protocol stack in the IAB scenario shown in FIG. 1A as an example.
  • an IAB node may have one or more roles, and the IAB node may have protocol stacks of the one or more roles; or, the IAB node may have a set of protocol stacks, and the protocol stack may Different roles are processed using the protocol layers corresponding to different roles.
  • the following is an example of the protocol stack in which the IAB node has the one or more roles:
  • an IAB node When an IAB node accesses the IAB network, it can act as a common terminal. At this time, the MT of the IAB node has the protocol stack of a common terminal. After the IAB node is connected to the IAB network, the IAB node can still act as a common terminal, for example, transmit its own uplink and/or downlink data with the IAB donor packets (eg OAM packets), measurements are performed through the RRC layer, etc.
  • the IAB donor packets eg OAM packets
  • the IAB node After the IAB node accesses the IAB network, the IAB node can provide access services for the terminal, so as to play the role of an access IAB node. At this time, the IAB node has a protocol stack for accessing the IAB node, such as Figure 1D and Figure 1 The protocol stack of IAB node 2 in 1E.
  • the interface of the IAB node facing its parent node can have two sets of protocol stacks, one set is the protocol stack of the common terminal, and the other set is the protocol stack that provides backhaul services for the terminal (ie: access The protocol stack of the IAB node).
  • the IAB node After the IAB node accesses the IAB network, the IAB node can play the role of an intermediate IAB node. At this time, the IAB node has the protocol stack of the intermediate IAB node, such as the protocol stack of the IAB node 1 in Figure 1D and Figure 1E.
  • the interface of the IAB node facing its parent node can have two sets of protocol stacks, one set is the protocol stack of the common terminal, and the other set is the protocol stack that provides the return service for the child IAB node (ie: The protocol stack of the intermediate IAB node).
  • the IAB node can assume the roles of the access IAB node and the intermediate IAB node at the same time.
  • the IAB node can be the access IAB node for some terminals, and the intermediate IAB node for other terminals.
  • the IAB node There may be three sets of protocol stacks, one set is the protocol stack of the above-mentioned common terminal, the other set is the protocol stack of the access IAB node, and the other set is the protocol stack of the intermediate IAB node.
  • FIG. 1D and FIG. 1E take the IAB network as an example.
  • the contents of FIG. 1D and FIG. 1E are also applicable to other types of relay networks other than the IAB network.
  • the control plane protocol stack architecture of the relay network can be Referring to FIG. 1D
  • the user plane protocol stack architecture of the relay network may refer to FIG. 1E .
  • the IAB node in Figure 1D and Figure 1E can be replaced by a relay, for example, IAB node 1 can be replaced by relay node 1, IAB node 2 can be replaced by relay node 2, IAB donor can be replaced by a host node, the host
  • the node has CU and DU protocol stacks, and other contents are the same as those described in FIG. 1D and FIG. 1E .
  • FIG. 1D and FIG. 1E which will not be repeated here.
  • Topology updates may occur to IAB nodes in the IAB network, such as topology updates that occur during a handover process or a radio link failure recovery process.
  • This embodiment of the present application uses a handover process as an example for introduction, but is not limited to only topology update due to handover.
  • Scenario 1 As shown in FIG. 1F , topology update across IAB hosts, for example, topology update across IAB hosts due to IAB node switching.
  • IAB node 3 (denoted as the first network node) switches from the source parent node (IAB node 1 in FIG. 1F ) to the target parent node (IAB node 2 in FIG. 1F , denoted as the fifth network node), and changes
  • the connected IAB host is switched from the source IAB host (as IAB donor 1 in Figure 1F, denoted as the first host node) to the target IAB host (as in IAB donor 2 in Figure 1F, denoted as the second host node).
  • the first network node is also switched from the source IAB host DU (IAB donor DU1 in Figure 1F) to the target IAB host DU (IAB donor DU2 in Figure 1F, denoted as the second network node), in order to simplify the expression, the source IAB
  • the host CU may be denoted as the third network node
  • the target IAB host CU may be denoted as the fourth network node.
  • This switching may be referred to as a cross-IAB host switching, a cross-IAB host topology update, a cross-IAB host CU topology update, or an inter-donor CU migrating.
  • Scenario 2 As shown in FIG. 1G , the topology update inside the IAB host, for example, the topology update inside the IAB host caused by the handover of the IAB node.
  • IAB node 3 switches from the source parent node (IAB node 1 in Figure 1G) to the target parent node (IAB node 2 in Figure 1G), but does not change the IAB host, that is, from the IAB
  • the source donor DU (referred to as the third network node) under the host CU (as IAB donor DU 1 in Figure 1G, also known as the old donor DU) is switched to the target donor DU (as in IAB donor DU 2 in Figure 1G, Denoted as the second network node, which can also be referred to as the new donor DU).
  • This switching can be referred to as switching within the IAB host, switching across the IAB host DU, switching across DUs or switching within the donor CU (intra-donor CU migrating). It is easy to understand that the above scenarios 1 and 2 introduce the switching scenarios of IAB nodes, and the parent nodes of similar IAB nodes (IAB node 1 in Figure 1F) can also be switched, such as switching from the source IAB host to the target IAB host. , similarly, the child nodes of the IAB node (as shown in IAB node4 in FIG. 1F ) can follow the IAB node to switch, that is, also switch from the source IAB host to the target IAB host.
  • the methods provided in the embodiments of the present application are applicable to the handover of the IAB node, and are also applicable to the scenario in which the child nodes of the IAB node follow the IAB node for handover, and are also applicable to the occurrence of the IAB parent node or host node connected to the IAB node.
  • Other scenarios that have been changed such as the scenario where the IAB node performs link recovery after a wireless link failure, replaces a new parent node, or even replaces the connected IAB host node.
  • the topology update in the IAB network can be understood as the topology update caused by the handover performed by the IAB node, for example, the IAB node performs the handover according to the handover command. It can also be understood as a topology update caused by the IAB node performing the RLF recovery process after a radio link failure (RLF) occurs or after the IAB node receives the BH RLF notification notified by the parent node.
  • RLF radio link failure
  • the MT of the IAB node may be abbreviated as IAB-MT
  • the DU of the IAB node may be abbreviated as IAB-DU
  • the CU of the IAB host may be abbreviated as Donor-CU
  • the DU of the IAB host may be abbreviated as Donor-DU.
  • the IAB host connected to the IAB node may be referred to as the IAB host of the IAB node or the host node of the IAB node, or simply referred to as the IAB host.
  • the IAB node can directly access the cell served by the IAB host (for example, directly access the cell served by the DU of the IAB host, or directly access the cell served by the IAB host where the CU-DU is not separated), or,
  • the IAB node may be connected to the IAB host through other IAB nodes (eg, the parent node of the IAB node is an IAB node that accesses a cell served by the IAB host).
  • the IAB node can first buffer these data packets (for example, in the BAP layer), and after the topology update is completed, these buffered data packets can be sent to the new parent node.
  • these buffered data packets can be sent to the new parent node.
  • the IAB node sends the buffered uplink data packet to the new parent node after the topology update, and the new parent node is the same as the old one.
  • the IAB host DU or become the source IAB host DU
  • the existing technology does not support uplink data packets in different IAB host DUs (For example, rerouting and forwarding between different IAB host DUs under the same IAB donor, or different IAB host DUs under different IAB donors).
  • the The source IP address may be the old IP address obtained by the IAB node when it is connected to the source IAB host node. If the target IAB host DU is configured with the source IP address filtering mechanism, it may be because the old IP address of the IAB node does not belong to the allowed forwarding. The source IP address range of the destination IAB host DU may not forward these packets, or even drop these packets.
  • the target IAB donor CU even after the data packets are forwarded to the target IAB donor CU after the target IAB donor DU, if these data packets are secured according to the security mechanism negotiated with the source IAB donor CU (such as the integrity of the UE at the PDCP layer) protection or encryption, or the encryption measures of the IAB node at the IPsec layer, etc.), these data packets may not be correctly parsed by the target IAB host CU or the integrity protection check fails, so these data packets still need to be transmitted to the source IAB host. CU processing.
  • the security mechanism negotiated with the source IAB donor CU such as the integrity of the UE at the PDCP layer) protection or encryption, or the encryption measures of the IAB node at the IPsec layer, etc.
  • an embodiment of the present application provides a communication method 200A for lossless data transmission, including:
  • the first network node performs topology update.
  • the topology update includes: the first network node replaces the connected IAB host DU.
  • the IAB host DU connected to the first network node is replaced with the second network node, and the second network node is the target IAB host DU of the topology update of the first network node.
  • the first network node sends the first data packet to the second network node.
  • the destination node of the IP layer of the first data packet is the third network node. It is easy to understand that when the source IAB host of the first network node is CU and DU separated, the third network node is the source IAB of the first network node. host CU; in the case where the source IAB host of the first network node is the CU and the DU are not separated, the third network node is the source IAB host of the first network node, that is, the first data packet is to be sent to the third network node. Data packets sent by network nodes.
  • the first data packet may be a data packet that is buffered at the BAP layer and to be sent to the third network node by the first network node before performing the topology update. It is understandable that the destination node of the first data packet may also be a security gateway (security gateway, SeGW) device on the side of the third network node.
  • security gateway security gateway
  • the method S230A further includes S231A: the first network node performs a first processing operation on the first data packet, for example, the first processing The operation is to update the header information of the BAP layer for the first data packet.
  • the first network node receives BAP layer configuration information from the target IAB host CU, and the first network node updates the BAP layer header information of the first data packet according to the BAP layer configuration information.
  • the first network node replaces the BAP routing identifier in the BAP layer header information in the first data packet with the configured new routing identifier according to the BAP layer configuration information, and the new routing identifier points to the second network node. transmission path.
  • the method further includes S220A: the second network node updates the IP address filtering rule to forward the first data packet to the third network node.
  • the second network node updates the IP address filtering rule for sending the first data packet to the third network node.
  • the updating IP address filtering rule may be adding the source IP address of the first data packet to the white code of the source IP address filtering rule. list, or the second network node temporarily disables the source IP address filtering rule. This can avoid a situation where the second network node will not forward the first data packet or even discard the first data packet because the IP address of the first data packet does not belong to the source IP address range allowed to be forwarded.
  • S240A The second network node sends the first data packet to the third network node.
  • the second network node can only see the outer IP header of the first data packet, and the destination node of the IP layer of the first data packet may be the third network node or the third network.
  • the security gateway device deployed on the node side if the second network node is configured with a corresponding IP route, it can be found that the destination node for forwarding the IP layer is the third network node (specifically, the third network node CU-CP or the third network node. network node CU-UP) or a suitable next hop node of the security gateway (referred to as source SeGW) deployed on the side of the third network node, then the first data packet can be sent to the source IAB donor CU or source via the next hop node. SeGW can send it.
  • the IP layer of the target second network node is not configured with an IP route suitable for forwarding the destination node to the third network node, the second network node cannot directly forward the IP layer to the third network node. data pack.
  • the method 240A further includes:
  • the second network node obtains the second data packet.
  • the second data packet encapsulates the first data packet, the second data packet includes a first IP header and a second IP header, and the target IP address of the first IP header is the IP address of the third network node or is connected to the third network node.
  • the IP address of the first security gateway device, and the target IP address of the second IP header is the IP address of the fourth network node.
  • the first security gateway device may be a security gateway device deployed on the node side of the third network.
  • the second IP header may be added by the second network node for the first data packet, or may also be added by the first network node for the first data packet. That is, in a manner in which the second network node obtains the second data packet, after the second network node receives the first data packet sent by the first network node, the second network node adds the second IP header to the first data packet to obtain the first data packet. Two packets.
  • a second IP header is added to the first data packet, that is, the first What the second network node receives from the first network node is the second data packet encapsulated with the first data packet.
  • S242A The second network node sends the second data packet to the fourth network node. It can be understood that the second network node sends the second data packet to the fourth network node according to the second IP header.
  • the second data packet further includes first removal indication information, where the first removal indication information is used to instruct the fourth network node to remove the second IP header.
  • the first removal indication information may be a bit indication or a special field, and the present application does not limit other implementations capable of instructing the fourth network node to remove the second IP header.
  • S243A The fourth network node sends the first data packet to the third network node.
  • the fourth network node determines to send the first data packet to the third network node according to the first IP header of the second data packet. It can be understood that the first IP header is included in the first data packet, and the second data packet can obtain the first data packet after removing the second IP header.
  • the second network node or the first network node encapsulates a new outer IP header (No. two IP headers) to obtain the second data packet, and the destination address of the new IP header is the IP address of the fourth network node.
  • the second network node forwards the second data packet to the fourth network node through IP routing according to the IP address of the destination node in the new IP header of the outer layer, and then the fourth network node removes the new IP header of the outer layer. , forward the first data packet to the destination node (ie, the third network node or the source SeGW) in the IP layer of the data packet through IP routing.
  • the node that adds the outer IP header can , and the first removal indication information is carried in the outer IP header.
  • forwarding or rerouting of upstream data packets between a second network node and a third network node can be allowed, avoiding the upstream data packets during the rerouting process It is discarded by the second network node, so that the data packet is re-routed and forwarded between different host nodes, and the loss of the data packet is reduced.
  • a third network node eg, a cross-IAB home or a cross-IAB home DU
  • the topology update may include a topology update due to a handover or a radio link recovery process.
  • the embodiment of the present application exemplarily cites two situations in which the first network node performs the first processing on the first data packet.
  • Case 1 The first data packet is the SDU of the BAP layer received from the upper-layer protocol layer, and the first processing is: the first network node adds the SDU of the first data packet according to the received configuration of the new BAP layer BAP layer header information.
  • the configurations of these new BAPs are sent by the fourth network node to the first network node.
  • the first network node adds BAP layer header information to these cached SDUs according to the received configuration of the new BAP layer (the BAP layer header information includes a routing ID (BAP routing ID) corresponding to the target path)
  • the target path contains the target parent node (for example, IAB node 1 as shown in Figure 1F)
  • the BAP routing ID consists of a BAP address (BAP address) and a BAP path ID (BAP path ID), where the target path corresponds to The BAP address in the BAP routing ID is used to indicate the destination node of the BAP layer, i.e.
  • the target IAB donor eg, the second host node as shown in Figure 1F
  • the target IAB donor DU eg, as shown in Figure 1F
  • the IAB donor DU2 the BAP path ID is used to indicate a transmission path between the first network node and the target IAB donor or the target IAB donor DU
  • the first network node according to the target IAB donor CU provides the new routing identifier and new routing configuration to transmit the first packet to the destination IAB donor DU.
  • the first data packet is a PDU of the F1 interface protocol layer of the first network node
  • the first data packet is an IP packet of the IP layer included in the F1 interface user plane or control plane protocol stack
  • the F1 interface protocol layer can be seen It is the upper layer of the BAP layer
  • the IP layer header added in the upper layer protocol layer of the BAP layer for example, the IP layer on the DU side of the first network node
  • the IP address filled in the source IP address field is still the first network node.
  • the IP address obtained when connecting to the source IAB host for example, the first host node as shown in FIG.
  • the IP address filled in the target IP address field is the source IAB
  • the IP address of the host specifically, the source IAB donor CU, or the source IAB donor CU CP or the source IAB donor CU UP.
  • the upper layer protocol layer of the BAP layer in the embodiment of the present application may be: the IP layer on the DU side of the first network node.
  • the first data packet is a PDU of the BAP layer, that is, the first data packet already carries the header information of the BAP layer, then the first processing is: the first network node, according to the received configuration of the new BAP layer, is The PDUs of these first data packets update the BAP layer header information.
  • the configurations of these new BAPs are sent by the fourth network node to the first network node.
  • the upstream data packet buffered by the first network node is a PDU of the BAP layer, that is, the header information of the BAP layer has been carried, and the destination node of the BAP layer indicated by the BAP address carried in the routing identifier BAP routing ID is:
  • the source IAB donor DU (for example, the IAB donor DU1 shown in Figure 1F)
  • the path indicated by the BAP path ID carried in the BAP routing ID is still the transmission path to the source IAB host DU, while in the IAB network
  • the routing selection is performed based on the routing identifier in the adaptation layer header, that is, for a node performing routing, when routing a packet carrying a BAP routing ID, if the configured routing table is in the routing table If there is an entry corresponding to the BAP routing ID, and the next hop node specified in the entry is an available next hop node, it will choose to send the data packet to the next hop node specified by this entry.
  • next-hop node for sending the data packet. It can be understood that when the first network node performs the topology update in S210A, if the target IAB donor DU connected via the target parent node is different from the source IAB donor DU it is connected to via the source parent node, not only the transmission path has occurred. Change, even the upstream destination node (upstream) of the BAP layer has also changed.
  • the header information of the BAP layer of the data packets needs to be modified, for example, the first network node receives the target IAB donor CU (for example, as shown in FIG.
  • the configuration information provided by the four network nodes) the configuration information can be sent to the first network node through the RRC message or the F1AP message, and the specific content includes: one or more new routing identifiers (such as a default/defective route identifier) to the target IAB donor DU
  • the national BAP routing ID which can be used to forward all cached packets), optionally, it also contains the next hop node corresponding to each routing ID, and the old routing ID (pointing to the source that maps to each new routing ID) The old transmission path of the IAB donor DU).
  • the first network node replaces the BAP routing ID in the BAP layer header information carried in the BAP PDU in its cache with the configured new routing ID according to the configuration information provided by the target IAB donor CU, and then performs routing according to the new routing ID. Afterwards, the data packet is sent to the next hop node (that is, the target parent node) to ensure that the data packet buffered before the handover is forwarded to the target IAB donor DU after the handover is completed.
  • the next hop node that is, the target parent node
  • the first network node can directly use the BAP control PDU (for example, a BAP control PDU containing a backhaul RLC channel (BH). RLC channel) granularity flow control feedback control PDU) is sent to the target parent node, or the BAP control PDU (for example, the flow control feedback control PDU containing the BAP routing ID granularity) is deleted.
  • a routing identifier for example, a BAP control PDU
  • the first network node can directly use the BAP control PDU (for example, a BAP control PDU containing a backhaul RLC channel (BH). RLC channel) granularity flow control feedback control PDU) is sent to the target parent node, or the BAP control PDU (for example, the flow control feedback control PDU containing the BAP routing ID granularity) is deleted.
  • BH backhaul RLC channel
  • the embodiments of the present application provide several possible ways for the second network node to update the IP address filtering rules:
  • Method 1 Add the source IP address of the first data packet to the whitelist of the source IP address filtering rule.
  • the method S220A further includes:
  • the fourth network node sends a first message to the second network node, where the first message carries a first IP address, and the first IP address is one or more obtained by the first network node when connecting to the third network node. Multiple IP addresses.
  • the second network node After receiving the first message, the second network node updates the IP address filtering rule according to the first message. For example, the second network node adds the first IP address to the whitelist of the source IP address filtering rule.
  • the fourth network node obtains the first IP address in multiple possible ways, for example:
  • S222A the fourth network node receives a second message sent by the third network node, where the second message includes the first IP address.
  • the fourth network node receives a third message (not shown in FIG. 2A ) sent by the first network node, where the third message includes the first IP address, and the third message may be an RRC message.
  • the fourth network node may send one or more IP addresses (referred to as first IP addresses for short) obtained by the first network node when connecting to the third network node to the second network node.
  • the second network node may add the first IP address to the whitelist of its own source IP address filtering rule (ie, the source IP address list of the data packets that are allowed to be forwarded).
  • the first IP address may be sent by the third network node to the fourth network node, for example, the first network node performs handover based on the Xn interface, and the third network node sends the Xn interface message (for example, the Xn interface handover request (Handover Request) message) carrying the first IP addresses of these first network nodes and sent to the fourth network node; or, sent by AMF to the fourth network node, for example, the first network node performs NG interface-based handover, and the third network node is in the The NG interface message (for example, the Handover Required message of the NG interface) carries the first IP addresses of the first network nodes and sends it to the target AMF, and then the AMF sends the first IP addresses of the first network nodes to the NG interface.
  • the NG interface message for example, the Handover Required message of the NG interface
  • NG interface Handover Request message for example, NG interface Handover Request message
  • RRC message for example, NG interface Handover Request message
  • RRC reconfiguration complete message is sent to the fourth network node.
  • Method 2 Temporarily disable the source IP address filtering rule.
  • the method S220A further includes:
  • the fourth network node sends a first message to the second network node, where the first message carries first suspension indication information, where the first suspension indication information is used to instruct the second network node to temporarily close the source IP address filtering rule.
  • the second network node temporarily disables the source IP address filtering rule according to the first suspension instruction information.
  • first pause indication information may be bit indication or timer configuration information, which is not limited in this embodiment of the present application, and the second network node can be instructed to temporarily disable the source IP address filtering rule.
  • the second network node may temporarily disable the source IP address filtering rule in various manners, for example, implementing or waiting for the instruction information of restarting (or restoring) the filtering rule through a timer.
  • the source IP address rule can be closed after receiving the first suspension indication information, the timer can be started, and the reset can be resumed after a preset condition is met.
  • the preset condition can be that the timer expires, or another network node receives
  • the embodiment of the present application is not limited.
  • the third network node obtains the first data packet in two ways, one is to receive the first data packet directly sent by the second network node; the other is that the third network node receives the forwarding from the fourth network node the first data packet, wherein the fourth network node receives the second data packet encapsulated with the first data packet from the second node, and the second data packet is obtained by encapsulating the first data packet at the second network node , which contains a second IP header, and after the fourth network node removes the second IP header of the second data packet, sends the first data packet to the third network node.
  • Data packet processing mode 1 The third network node determines data related to the terminal equipment served by the first network node according to the first data packet, and the data may be data related to the service continuity of the terminal, such as PDCP SDU.
  • the third network node sends data related to the terminal device to the fourth network node.
  • the transmission channel is switched to the fourth network node, if there are still uplink data packets that have not been transmitted), it can also be forwarded by the third network node to the fourth network node via the Xn user plane (Xn-U) interface to ensure the first Service continuity of terminal equipment served by a network node after handover.
  • Xn-U Xn user plane
  • Data packet processing mode 2 The third network node determines, according to the first data packet, data related to the terminal equipment served by the first network node, such as PDCP SDUs.
  • the third network node sends the terminal equipment related data to the UPF.
  • the UPF may serve the UEs serving the first network node (including accessing the first network node) during the topology update performed by the first network node.
  • the UE of the node serving cell, or the UE accessing the subordinate IAB node serving cell of the first network node) maintains the general packet radio service of two N3 interfaces with the third network node and the fourth network node respectively.
  • Tunneling protocol tunnel (general packet radio service tunneling protocol tunnel, GPRS tunneling protocol tunnel, GTP tunnel), UPF can receive UE data packets from two GTP tunnels within a period of time, and the third network node determines that all uplink PDCP SDUs are completed. After the transmission, the UPF may release the GTP user plane tunnel (GTP-User tunnel, GTP-U tunnel) with the N3 interface between the third network node based on the uplink end-marker (UL end-marker) of the third network node.
  • GTP-User tunnel GTP-U tunnel
  • an embodiment of the present application provides a communication method 200B for lossless data transmission, including:
  • the first network node performs topology update.
  • the topology update includes: the first network node replaces the connected IAB host.
  • the IAB host connected to the first network node is replaced with a second network node, the second network node may be called the target IAB host node of the topology update of the first network node, and the DU and CU of the second network node are not separated.
  • S230B The first network node sends the first data packet to the second network node.
  • the target node of the IP layer of the first data packet is the third network node. It is easy to understand that when the source IAB host of the first network node is CU and DU separated, the third network node is the source of the first network node.
  • the IAB hosts the CU; if the source IAB host of the first network node is the CU and the DU are not separated, the third network node is the source IAB host of the first network node, that is, the first data packet is to be sent to the first network node.
  • the first data packet may be a data packet that is buffered at the BAP layer and to be sent to the third network node by the first network node before performing the topology update.
  • the destination node of the first data packet may also be a SeGW device on the side of the third network node.
  • the method S230B further includes S231B: the first network node performs a first processing operation on the first data packet, for example, the first processing The operation is to update the header information of the BAP layer for the first data packet.
  • the first network node receives the BAP layer configuration information from the target IAB host, and the first network node updates the header information of the BAP layer of the first data packet according to the BAP layer configuration information.
  • the first network node replaces the BAP routing identifier in the BAP layer header information in the first data packet with the configured new routing identifier according to the BAP layer configuration information, and the new routing identifier points to the second network node. transmission path. In this way, the first network node can successfully send the first data packet to the second network node.
  • the method further includes S220B: the second network node updates the IP address filtering rule to forward the first data packet to the third network node.
  • the second network node updates the IP address filtering rule for sending the first data packet to the third network node.
  • the updating IP address filtering rule may be adding the source IP address of the first data packet to the white code of the source IP address filtering rule. in the list, or the second network node temporarily disables the source IP address filtering rule. This can avoid a situation where the second network node will not forward the first data packet or even discard the first data packet because the IP address of the first data packet does not belong to the source IP address range allowed to be forwarded.
  • the second network node has multiple possible ways to obtain the source IP address of the first data packet, wherein the source IP address of the first data packet is one or the other when the first network node is connected to the third network node. Multiple IP addresses. Specifically, when the third network node is the IAB host node when the CU and DU are separated, the source IP address of the first data packet is one or more IP addresses when the first network node is connected to the third network node DU.
  • the second network node receives the source IP address sent by the first network node.
  • the second network node receives the source IP address sent by the third network node.
  • the method 200B further includes S221B, where the second network node receives the source IP address or pause indication information of the first data packet sent by the third network node.
  • the suspend instruction information is used to instruct the second network node to suspend the source IP address filtering rule. It is easy to understand that the second network node temporarily disables the source IP address filtering rule by referring to the description in step S221A of the method 200A.
  • the second network node receives the source IP address sent by the AMF.
  • S240B The second network node sends the first data packet to the third network node.
  • forwarding or rerouting of upstream data packets between the second network node and the third network node can be allowed, avoiding the upstream data packets during the rerouting process It is discarded by the second network node, so that the data packet is re-routed and forwarded between different host nodes, and the loss of the data packet is reduced.
  • an embodiment of the present application provides a communication method 200C for lossless data transmission, including:
  • the first network node performs topology update.
  • the topology update includes: the first network node replaces the connected IAB host DU under the same host node, that is, the IAB host DU connected to the first network node is replaced by the second network node, and the second network node may be called The target IAB host DU of the topology update of the first network node, and the second network node is the DU under the source host node of the first network node.
  • S230C The first network node sends the first data packet to the second network node.
  • the target node of the IP layer of the first data packet is the third network node.
  • the third network node is the source IAB host CU of the first network node, that is to say, the first data packet is to be sent to the third network node.
  • Data packets sent by network nodes may be a data packet that is buffered at the BAP layer and to be sent to the third network node by the first network node before performing the topology update.
  • the destination node of the first data packet may also be a SeGW device on the side of the third network node.
  • the method S230C further includes S231C: the first network node performs a first processing operation on the first data packet, for example, the first processing The operation is to update the header information of the BAP layer for the first data packet.
  • the first network node receives the BAP layer configuration information from the third network node, and the first network node updates the BAP layer header information of the first data packet according to the BAP layer configuration information.
  • the first network node replaces the BAP routing identifier in the BAP layer header information in the first data packet with the configured new routing identifier according to the BAP layer configuration information, and the new routing identifier points to the second network node. transmission path. In this way, the first network node can successfully send the first data packet to the second network node.
  • the method further includes S220C: the second network node updates the IP address filtering rule to forward the first data packet to the third network node.
  • the second network node updates the IP address filtering rule for sending the first data packet to the third network node.
  • the updating IP address filtering rule may be adding the source IP address of the first data packet to the white code of the source IP address filtering rule. list, or the second network node temporarily disables the source IP address filtering rule. This can avoid a situation where the second network node will not forward the first data packet or even discard the first data packet because the IP address of the first data packet does not belong to the source IP address range allowed to be forwarded.
  • the second network node has multiple possible ways to obtain the source IP address of the first data packet, wherein the source IP address of the first data packet is one or more of the source IP addresses when the first network node is connected to the source host DU IP addresses.
  • the second network node receives the source IP address sent by the first network node.
  • the second network node receives the source IP address sent by the third network node.
  • the method 200C further includes S221C, where the second network node receives the source IP address of the first data packet sent by the third network node, or pause indication information.
  • the suspend instruction information is used to instruct the second network node to suspend the source IP address filtering rule. It is easy to understand that the second network node temporarily disables the source IP address filtering rule by referring to the description in step S221A of the method 200A.
  • S240C The second network node sends the first data packet to the third network node.
  • the forwarding or rerouting of the uplink data packet between the second network node and the third network node can be allowed to avoid the uplink data packet being discarded by the second network node during the rerouting process, so that the data packet is completed in the Re-routing and forwarding between different host nodes reduces packet loss.
  • FIG. 3 another embodiment of the present application provides a data lossless communication method, which also addresses the problem of how to ensure that data packets are not lost in the process of updating the cross-IAB host topology.
  • the main idea of the design scheme of the method shown in FIG. 3 is to ensure that the IAB node (for example, IAB node 3 in FIG. 1F ) and its subordinate nodes (for example, IAB node 4 in FIG. 1F ) cache the switching After all the upstream data packets on the way are sent to the source parent node of IAB node3, IAB node 3 will carry out topology update across IAB host, this embodiment takes the topology update of IAB node 3 for switching as an example to introduce, Figure 3
  • the illustrated embodiment method 300 includes:
  • S310 The third network node sends a first handover command to the first network node.
  • the first network node receives the first handover command from the third network node, the first handover command instructs the first network node to switch to the second network node, and the second network node is the target host node of the first network node , the third network node is the source host node CU of the first network node, for example, the first handover command may be carried in the RRC reconfiguration message.
  • the first network node stops scheduling subordinate nodes.
  • the subordinate nodes include subordinate network nodes (referred to as the sixth network node) and/or subordinate terminals of the first node.
  • the first network node may immediately stop scheduling the terminal and the sixth network node of the cell accessing the service, and may also immediately stop scheduling the terminal of the cell accessing the service. The scheduling of the sixth network node is not stopped immediately.
  • Stop uplink scheduling method 1 S321: The sixth network node sends the second transmission completion indication information to the first network node, and the second transmission completion indication information is used to indicate that the transmission of the fourth data packet is completed, and the fourth data packet includes information from the sixth network Uplink data of the node and the subordinate nodes of the sixth network node and the corresponding subordinate terminals. It can be understood that the second transmission completion indication information indicates that all uplink data buffered in the sixth network node and its subordinate nodes and subordinate terminals have been sent completely. It is easy to understand that the fourth data packet in this embodiment of the present application may include one or more data packets, and the fourth data packet may be sent once, or may be sent multiple times.
  • the second transmission completion indication information may be carried in the fourth data packet, for example, carried in the data PDU of the last upstream BAP layer in the fourth data packet, or carried in the control PDU of the BAP layer.
  • a special BAP control PDU may be defined to indicate the second transmission completion indication information. It is understandable that the second transmission completion indication information may also be sent together with the last data packet in the fourth data packet; or, the second transmission completion indication information is independent after the transmission of the last data packet in the fourth data packet is completed. Sending, for example, a BAP layer control PDU sent by the sixth network node to the first network node alone carries the second transmission completion indication information.
  • the second transmission completion indication information may be indicated by bits, or indicated by a special field, which is not limited in this application.
  • the sixth network node sends the first network node or through the first network node The node sends one or more of the fourth data packets to the third network node.
  • the first network node stops the uplink scheduling for the sixth network node according to the second transmission indication information.
  • Mode 2 for stopping uplink scheduling S322: The first network node receives first stop scheduling indication information from the third network node, where the first stop scheduling indication information is used to instruct the first network node to stop scheduling the sixth network node.
  • the first network node stops the uplink scheduling of the sixth network node according to the first stop scheduling instruction information.
  • the first network node sends a third data packet to the third network node.
  • the first network node sends the third data packet to the third network node through the fifth network node, and the fifth network node is the parent node of the first network node.
  • the third data packet includes uplink data from the first network node and/or subordinate nodes of the first network node.
  • the third network node is the source IAB host CU.
  • the first network node sends first transmission completion indication information, where the first transmission completion indication information is used to indicate that the transmission of the third data packet is complete, that is, the first transmission completion indication information indicates that the first network node and the All in-transit uplink data packets buffered by its subordinate nodes have been sent to the parent node or host node of the first network node.
  • the second transmission completion indication information may be sent together with the last data packet in the third data packet, or may be sent independently after it is determined that all the third data packets are sent, and the second transmission completion indication information may be sent together with the above-mentioned second transmission completion indication information.
  • the sending timing is similar to the carrying method, and reference may be made to the above related description.
  • the first network node sends first transmission completion indication information to the third network node.
  • the method 300 may further include: S350: The third network node sends the second stop scheduling indication information to the fifth network node, and the second stop scheduling indication information is used to instruct the fifth network node to stop scheduling the first network node.
  • the first network node sends the first transmission completion indication information to the fifth network node.
  • the fifth network node receives the first transmission completion indication information.
  • the method 300 may further include: S360: The fifth network node stops scheduling the first network node. It is easy to understand that the manner in which the fifth network node stops scheduling the first network node may be that after receiving the first transmission completion indication information in S342, the fifth network node stops scheduling the first network node according to the first transmission completion indication information. Alternatively, after receiving the second stop scheduling instruction information in S350, the second network node stops scheduling the first network node according to the second stop scheduling instruction information.
  • S370 The first network node performs handover.
  • the switching is: the host node of the first network node is changed from the third network node to the second network node.
  • the first network node after the first network node receives the first handover command and transmits all the upstream data packets in the buffer to the parent node, the first network node sends the indication information of the completion of the upstream data transmission, so that the first network node determines that the first network
  • the handover is performed only after the upstream data packets of the node and its subordinate nodes are successfully sent, which can ensure the lossless transmission of the upstream data packets during the handover process.
  • the switching IAB node eg, IAB node 3 in Figure 1F
  • the IAB node supports dual connectivity (DC) ) or dual active protocol stack (DAPS)
  • DC dual connectivity
  • DAPS dual active protocol stack
  • the migrating IAB node can maintain data transmission with the two IAB hosts at the same time.
  • the IAB node performs routing on the wireless backhaul link based on the routing identifier of the BAP layer
  • the target node on the wireless backhaul link is identified based on the BAP address
  • the BAP address of the IAB host DU is allocated by the IAB host CU and can only be used.
  • the guarantee is unique within the scope of the CU, so in the case where the IAB node is allowed to connect to the IAB host DUs of multiple different IAB hosts at the same time, it is necessary to avoid the confusion between the two hosts by the IAB node on the one hand, and avoid the Discontinuity of terminal services caused by packet loss in the IAB topology update process.
  • an embodiment of the present application proposes a data lossless transmission method 400, and the method 400 includes:
  • the first network node performs a topology update, where the topology update includes that the first network node replaces the connected IAB host DU.
  • the IAB host DU connected to the first network node is replaced with a second network node, and the second network node may be referred to as the target IAB host node DU of the topology update of the first network node.
  • the first network node receives the handover command sent by the third network node.
  • the first network node has the ability to communicate with multiple host nodes. That is, the first network node has a path for communicating with the third network node (source IAB host CU) at the same time, denoted as the old path or the first path, and the second network node (target IAB host DU) The path for inter-communication is denoted as a new path or a second path. It is easy to understand that the first network node can also communicate with the target IAB host CU through the second path.
  • the IAB host CU such as a third network node, carries identification information used to distinguish the host CU in the BAP address allocated to the IAB host DU, for example, the identification information is associated with the host CU. logo.
  • method 400 proposes two possible implementation manners:
  • the first implementation method to avoid packet loss during the IAB topology update process is the first implementation method to avoid packet loss during the IAB topology update process:
  • S430 The first network node sends the first data packet through the second path.
  • the second network node After the first network node sends the first data packet to be sent to the third network node or the security gateway device on the side of the third network node to the second network node, the second network node sends the first data packet to the third network node.
  • step S430 reference may be made to the introduction in method 200A.
  • the second implementation method to avoid packet loss during the IAB topology update process is the second implementation method to avoid packet loss during the IAB topology update process:
  • S440 The first network node sends the first data packet through the first path.
  • the first network node Because the first network node has the ability to communicate with the third network node after completing the topology update, the first network node can send the first data packet to the third network node through the first path.
  • the method 400 also proposes an implementation manner in which the first network node disconnects the first path, that is, the first network node may disconnect the connection with the third network node (or the source host node, or the source parent node). It is easy to understand that the IAB node needs to successfully send the upstream data packets of the subordinate IAB nodes and all BAP layers cached by itself to the third network node, source host node, source parent node, or source IAB host DU to the source. After the parent node, the disconnection between the IAB node and its source parent node is allowed.
  • Method 400 also includes:
  • the first indication information is sent to the third network node for indicating the uplink data transmission at the IAB node.
  • the third network node determines that the uplink data packets that the first network node and its subordinate IAB nodes need to transmit via the first path have been transmitted. Specifically, the method includes
  • the first network node sends first indication information to the third network node, where the first indication information is used to indicate that the uplink data packet transmission of the first network node is completed.
  • the first indication information is sent through an RRC message, or sent through an F1AP message.
  • the embodiment of this application assumes that the first network node has N subordinate IAB nodes, and each subordinate IAB node of the N subordinate IAB nodes sends first indication information to the third network node after the uplink data transmission is completed.
  • the first indication information is used to indicate that the uplink data packet transmission of the subordinate IAB node is completed, and N is a positive integer.
  • the third network node receives the first indication information from the first network node and the N subordinate IAB nodes of the first network node, and after receiving the N+1 first indication information, the third network node, according to the N+ One piece of first indication information determines that the transmission of the uplink data packets of the first network node and the subordinate nodes of the first network node is completed. That is, the third network node determines that the uplink data packets that the first network node and its subordinate IAB nodes need to transmit via the first path have been transmitted.
  • S460 The third network node determines to disconnect the first path.
  • second indication information is sent to the first network node, which is used to indicate the subordinate IAB node at the IAB node.
  • the first network node determines that the uplink data packets that the subordinate IAB nodes need to transmit via the first path have been transmitted.
  • the first network node determines that the transmission of its own uplink data has been completed, the first network node sends third indication information to the third network node, where the third indication information indicates that the first network node and its subordinate IAB nodes need to pass through the third network node.
  • the upstream data packets transmitted by a path have been transmitted.
  • the method 400 includes:
  • the first network node receives N pieces of second indication information sent by N subordinate IAB nodes, the second indication information has a corresponding relationship with the subordinate IAB node, and the first indication information is used to indicate the uplink data at the subordinate IAB node The transfer is complete.
  • the first network node After the first network node determines that its own uplink data has been transmitted, the first network node sends third indication information to the third network node, where the third indication information indicates that the first network node and its subordinate IAB nodes need to transmit via the first path The upstream data packets have been transmitted.
  • the third network node receives third indication information from the first network node, where the third indication information indicates that the first network node and its subordinate IAB nodes need to transmit the uplink data packets via the first path have been transmitted.
  • S460 The third network node determines to disconnect the first path.
  • the third network node in S460 determines to disconnect the first path, and there are multiple possible implementation manners, for example:
  • the third network node sends fourth indication information to the fifth network node (the source parent node of the first network node), where the fourth indication information is used to instruct to stop scheduling the first network node and release the first network node context. That is, the fifth indication information is used to instruct the fifth network node to release the connection with the first network node.
  • the third network node sends fifth indication information to the first network node, where the fifth indication information is used to notify the first network node to release the connection with the source parent node.
  • the first network node releases the cell served by the source parent node according to the fifth indication information. That is to say, the fifth indication information is used for instructing to release the connection with the fifth network node.
  • the steps in the method 400 do not strictly limit the execution order, and in order to solve different problems, the execution order of the steps can be appropriately adjusted.
  • the method 400 provides a number of optional ways. The corresponding step correspondence is also optional.
  • the lossless data transmission of the IAB node in the cross-CU switching scenario can be guaranteed under the condition that the IAB node supports maintaining multiple connections with multiple host nodes.
  • an embodiment of the present application further provides a communication device, where the communication device is used to implement the above-mentioned various methods.
  • the communication device may be a network node involved in the foregoing method embodiments, or a device including the foregoing network node, or a component (chip or circuit) that can be used for a network node; or, the communication device may be each of the foregoing methods.
  • the communication apparatus includes corresponding hardware structures and/or software modules for executing each function.
  • the present application can be implemented in hardware or a combination of hardware and computer software with the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein. Skilled artisans may use different methods for implementing the described functionality for each particular application, but such implementations should not be considered beyond the scope of this application.
  • the communication device may be divided into functional modules according to the above method embodiments.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules.
  • FIG. 5 is a schematic block diagram of a communication apparatus 500 provided by an embodiment of the present application.
  • the structure and functions of the communication apparatus 500 will be described in detail below with reference to FIG. 5 .
  • the communication apparatus 500 may include: a processing module 510 (or referred to as a processing unit).
  • a transceiving module 520 or referred to as a transceiving unit or a communication interface
  • a storage module 530 or referred to as a storage unit
  • one or more modules as shown in FIG. 5 may be implemented by one or more processors, or by one or more processors and memory; or by one or more processors and a transceiver; or implemented by one or more processors, a memory, and a transceiver, which is not limited in this embodiment of the present application.
  • the processor, memory, and transceiver can be set independently or integrated.
  • each module in the apparatus 500 in the embodiment of the present application may be used to execute the method described in FIG. 2A to FIG. 2C , FIG. 3 , or FIG. 4 in the embodiment of the present application.
  • an apparatus 500 may include: a transceiver module 520 and a processing module 510 .
  • the transceiver module 520 is configured to receive the first data packet from the first network node, the second network node is the target host node distributed unit DU of the first network node, and the destination node of the first data packet is the third network node or the The security gateway on the third network node side, the third network node is the source host node of the first network node or the source host node centralized unit CU; the transceiver module 520 is further configured to send the first data packet to the third network node.
  • the device can support the rerouting and forwarding of data packets across the host DU of the IAB node, avoid data packet loss during the topology update process of the first network node, and reduce the impact on the terminal uplink service continuity under the first network node.
  • the processing module 510 is configured to update the Internet Protocol IP address filtering rule to send the first data packet to the third network node.
  • the transceiver module 520 is further configured to acquire a first IP address, where the first IP address is one or more IP addresses acquired by the first network node when connecting to the third network node.
  • the processing module 510 is further configured to update the IP address filtering rule according to the first IP address.
  • processing module 510 is further configured to add the first IP address to the whitelist of the source IP address filtering rule.
  • the transceiver module 520 is further configured to receive the first IP address from the third network node.
  • the transceiver module 520 is further configured to receive the first IP address from the fourth network node.
  • the transceiver module 520 is further configured to receive first suspension indication information from the fourth network node, where the first suspension indication information is used to instruct the second network node to suspend the IP address filtering rule.
  • processing module 510 is further configured to encapsulate the first data packet.
  • an apparatus 500 may include: a transceiver module 520 and a processing module 510 .
  • the processing module 510 is configured to determine the first data packet, and the destination node of the first data packet is the third network node or the security gateway on the side of the third network node.
  • processing module 510 is further configured to update the backhaul adaptation protocol layer configuration of the first data packet to send the first data packet to the second network node.
  • the processing module 510 is further configured to add a second IP header to the first data packet, where the target IP address of the second IP header is the IP address of the fourth network node.
  • the transceiver module 520 is further configured to send a first IP address to the fourth network node, where the first IP address is one obtained by the first network node when connecting to the third network node. or multiple IP addresses.
  • processing module 510 is further configured to perform topology update.
  • an apparatus 500 may include: a transceiver module 520 and a processing module 510 .
  • the processing module 510 is used to determine the first message.
  • the transceiver module 520 is configured to send a first message to the second network node, where the first message is used for the second network node to update the IP address filtering rule.
  • the processing module 510 is further configured to acquire a first IP address, where the first IP address is one or more IP addresses acquired by the first network node when connecting to a third network node.
  • the transceiver module 520 is further configured to receive the first IP address from the third network node.
  • the transceiver module 520 is further configured to receive the first IP address from the first network node.
  • the transceiver module 520 is further configured to receive the first IP address from the AMF.
  • the processing module 510 is further configured to determine first suspension indication information, where the first suspension indication information is used to instruct the second network node to suspend the IP address filtering rule.
  • the transceiver module 520 is further configured to receive a second data packet from the second network node, where the second data packet includes a first IP header and a second IP header, and the target IP address of the first IP header is The address is the third network node, and the target IP address of the second IP header is the IP address of the fourth network node.
  • an apparatus 500 may include: a transceiver module 520 and a processing module 510 .
  • the transceiver module 520 is configured to acquire a first data packet, where the first data packet is a data packet to be sent to the third network node after the first network node is connected to the second network node.
  • the processing module 510 is configured to process the first data packet.
  • the transceiver module 520 is further configured to receive the first data packet from the fourth network node.
  • an apparatus 500 may include: a transceiver module 520 and a processing module 510 .
  • the transceiver module 520 is configured to receive the first handover command from the third network node.
  • the transceiver module 520 is further configured to send first transmission completion indication information, where the first transmission completion indication information is used to indicate that the transmission of the third data packet is completed.
  • processing module 510 is further configured to determine to perform topology update.
  • the transceiver module 520 is further configured to send the first transmission completion indication information to the fifth network node.
  • the transceiver module 520 is further configured to send the third data packet to the third network node.
  • the processing module 510 is further configured to stop uplink scheduling for the sixth network node.
  • an apparatus 500 may include: a transceiver module 520 and a processing module 510 .
  • the transceiver module 520 is configured to receive transmission indication information, where the transmission indication information is used to instruct to stop uplink scheduling for the first network node.
  • the processing module 510 is configured to determine, according to the transmission indication information, to stop the uplink scheduling of the first network node.
  • the transceiver module 520 is further configured to receive first transmission completion indication information from the first network node.
  • the transceiver module 520 is further configured to receive the second stop scheduling indication information from the third network node.
  • an apparatus 500 may include: a transceiver module 520 and a processing module 510 .
  • the transceiver module 520 is configured to receive the first transmission completion indication information from the first network node.
  • the transceiver module 520 is further configured to send the second stop scheduling indication information to the fifth network node.
  • FIG. 6 shows a schematic structural diagram of a device.
  • the apparatus 600 may be a network device, a terminal device, a server or a centralized controller, or a chip, a chip system, or a processor that supports the network device, terminal device, server or centralized controller to implement the above method.
  • the apparatus can be used to implement the methods described in the foregoing method embodiments, and for details, reference may be made to the descriptions in the foregoing method embodiments.
  • the apparatus 600 may include one or more processors 610, and the processors 610 may also be referred to as processing units, and may implement certain control functions.
  • the processor 610 may be a general-purpose processor or a special-purpose processor, or the like. For example, it may be a baseband processor or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processing unit can be used to control communication devices (such as base stations, baseband chips, terminals, terminal chips, DU or CU, etc.), execute software programs, process software program data.
  • the processor 610 may also store instructions and/or data 630, and the instructions and/or data 630 may be executed by the processor, so that the apparatus 600 performs the above method embodiments method described.
  • the processor 610 may include a transceiver unit for implementing the functions of receiving and transmitting.
  • the transceiver unit may be a transceiver circuit, or an interface, or an interface circuit, or a communication interface.
  • Transceiver circuits, interfaces or interface circuits used to implement receiving and transmitting functions may be separate or integrated.
  • the above-mentioned transceiver circuit, interface or interface circuit can be used for reading and writing code/data, or the above-mentioned transceiver circuit, interface or interface circuit can be used for signal transmission or transmission.
  • the apparatus 600 may include a circuit, and the circuit may implement the function of sending or receiving or communicating in the foregoing method embodiments.
  • the apparatus 600 may include one or more memories 620 on which instructions 640 may be stored, and the instructions may be executed on the processor, so that the apparatus 600 executes the above method embodiments method described.
  • data may also be stored in the memory.
  • instructions and/or data may also be stored in the processor.
  • the processor and the memory can be provided separately or integrated together. For example, the corresponding relationship described in the above method embodiments may be stored in a memory or in a processor.
  • the apparatus 600 may further include a transceiver 650 and/or an antenna 660 .
  • the processor 610 may be referred to as a processing unit, and controls the apparatus 600 .
  • the transceiver 650 may be referred to as a transceiver unit, a transceiver, a transceiver circuit, a transceiver device, or a transceiver module, etc., and is used to implement a transceiver function.
  • the apparatus 600 in this embodiment of the present application may be configured to execute the method described in FIG. 2A to FIG. 2C , FIG. 3 , or FIG. 4 in the embodiment of the present application.
  • the processors and transceivers described in this application can be implemented in integrated circuits (ICs), analog ICs, radio frequency integrated circuits (RFICs), mixed-signal ICs, application specific integrated circuits (ASICs), printed circuit boards ( printed circuit board, PCB), electronic equipment, etc.
  • the processor and transceiver can also be fabricated using various IC process technologies, such as complementary metal oxide semiconductor (CMOS), nMetal-oxide-semiconductor (NMOS), P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (Bipolar Junction Transistor, BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS nMetal-oxide-semiconductor
  • PMOS P-type Metal oxide semiconductor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • the apparatus described in the above embodiments may be network equipment or terminal equipment, but the scope of the apparatus described in this application is not limited thereto, and the structure of the apparatus may not be limited by FIG. 6 .
  • An apparatus may be a stand-alone device or may be part of a larger device.
  • the means may be:
  • a set with one or more ICs may also include storage components for storing data and/or instructions;
  • ASIC such as modem (MSM)
  • the systems, devices and methods described in this application can also be implemented in other ways.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution, and the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .
  • the processor in this embodiment of the present application may be an integrated circuit chip, which has signal processing capability.
  • each step of the above method embodiment may be completed by a hardware integrated logic circuit in a processor or an instruction in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), or other possible Programming logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • a processing unit for performing the techniques at a communication device may be implemented in one or more general purpose processors, DSPs, digital signal processing devices, ASICs, A programmable logic device, FPGA, or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of the above.
  • a general-purpose processor may be a microprocessor, or alternatively, the general-purpose processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented by a combination of computing devices, such as a digital signal processor and a microprocessor, multiple microprocessors, one or more microprocessors in combination with a digital signal processor core, or any other similar configuration. accomplish.
  • the memory in this embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be random access memory (RAM), which acts as an external cache.
  • RAM random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous link dynamic random access memory
  • direct rambus RAM direct rambus RAM
  • the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, implements the functions of any of the foregoing method embodiments.
  • the present application also provides a computer program product, which implements the functions of any of the above method embodiments when the computer program product is executed by a computer.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, optical fiber, digital subscriber line, DSL) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
  • the available media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, high-density digital video discs (DVDs)), or semiconductor media (eg, solid state disks, SSD)) etc.
  • system and “network” are often used interchangeably herein.
  • the terms “at least one of” or “at least one of” herein mean all or any combination of the listed items, eg, "at least one of A, B, and C", It can be expressed as: A alone exists, B alone exists, C alone exists, A and B exist simultaneously, B and C exist simultaneously, and A, B and C exist simultaneously, where A can be singular or plural, and B can be Singular or plural, C can be singular or plural.
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B according to A does not mean that B is only determined according to A, and B may also be determined according to A and/or other information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Reduction Or Emphasis Of Bandwidth Of Signals (AREA)

Abstract

本申请实施例提供一种数据无损传输的通信方法、装置及系统。该方法包括:第一网络节点确定第一数据包,第一数据包的目的节点为第三网络节点或第三网络节点侧的安全网关,第三网络节点为第一网络节点的源宿主节点或源宿主节点集中式单元CU;第一网络节点向第二网络节点发送第一数据包,该第二网络节点为第一网络节点的目标宿主节点分布式单元DU。通过该方法能够避免在第一网络节点拓扑更新过程中数据包的丢失,保证业务的连续性。

Description

一种数据无损传输的通信方法、装置及系统 技术领域
本申请实施例涉及通信技术领域,尤其涉及一种数据无损传输的通信方法、装置及系统。
背景技术
第五代移动通信(5G)针对网络各项性能指标,全方位得都提出了更严苛的要求。例如,容量指标提升1000倍,更广的覆盖需求、超高可靠超低时延等。一方面,考虑到高频载波频率资源丰富,在热点区域,为满足5G超高容量需求,利用高频小站组网愈发流行。高频载波传播特性较差,受遮挡衰减严重,覆盖范围不广,故而需要大量密集部署小站,相应地,为这些大量密集部署的小站提供光纤回传的代价很高,施工难度大,因此需要经济便捷的回传方案;另一方面,从广覆盖需求的角度出发,在一些偏远地区提供网络覆盖,光纤的部署难度大,成本高,也需要设计灵活便利的接入和回传方案。
接入回传一体化(integrated access and backhaul,IAB)技术为解决上述两个问题提供了思路:其接入链路(access link)和回传链路(backhaul link)皆采用无线传输方案,避免光纤部署。在IAB网络中,中继节点RN(relay node,RN)或者叫IAB节点(IAB node),可以为用户设备(user equipment,UE)提供无线接入服务,所述UE的业务数据由IAB节点通过无线回传链路连接到宿主节点(IAB donor)或者说宿主基站(donor gNodeB,DgNB)传输。使用IAB节点,可以使得进行接入和回传共享天线,减少基站的天线数目。
当前的IAB网络中,为了满足不同场景下的通信需求,IAB节点可能存在拓扑更新,常见的有因切换或者无线链路失败恢复过程产生的拓扑更新。但是在IAB节点执行了跨IAB宿主的拓扑更新之后,可能会出现数据包丢失的问题。因此,如何能够在IAB节点在不同的IAB宿主服务的范围内执行拓扑更新过程中,减少数据包的丢失,成为亟需解决的问题。可以理解的是,其他网络架构下也可能存在类似的问题。
发明内容
本申请实施例提供一种数据无损传输的通信方法、装置及系统,从而可以减少因执行拓扑更新导致的数据包的丢失,例如,减少IAB节点在不同的IAB宿主服务的范围内执行拓扑更新过程中数据包的丢失。
第一方面,本申请实施例提供一种数据无损传输的通信方法,该方法可以由网络节点执行,也可以由网络节点的部件(例如处理器、芯片、或芯片系统等)执行,包括:第二网络节点接收来自第一网络节点的第一数据包,第二网络节点为第一网络节点的目标宿主节点分布式单元DU,第一数据包的目的节点为第三网络节点或者为所述第三网络节点侧的 安全网关,第三网络节点为第一网络节点的源宿主节点或源宿主节点集中式单元CU;第二网络节点向所述第三网络节点发送第一数据包。
通过上述方法,可以支持IAB节点的跨宿主DU的数据包重新路由转发,避免了第一网络节点拓扑更新过程中的数据包丢失,减少了对第一网络节点下的终端上行业务连续性的影响。
一种可能的方式中,第二网络节点更新互联网协议IP地址过滤规则用于向所述第三网络节点发送所述第一数据包。
通过该方式,避免第一数据包被第二网络节点丢弃。
一种可能的方式中,第二网络节点更新IP地址过滤规则包括:
第二网络节点获取第一IP地址,第一IP地址为所述第一网络节点在连接到所述第三网络节点时所获取的一个或多个IP地址;
所述第二网络节点根据所述第一IP地址更新所述IP地址过滤规则。
可选的,第一IP地址为第一网络节点在连接到源宿主DU时获取的一个或多个IP地址。
可选的,第二网络节点将该第一IP地址添加到源IP地址过滤规则的白名单中,即将该第一IP地址添加到允许转发的数据包的源IP地址列表中。
通过上述方式,允许第二网络节点转发该第一数据包,避免了第一数据包在第二网络节点处被丢弃。
一种可能的方式中,第二网络节点获取第一IP地址包括:第二网络节点接收来自所述第三网络节点的第一IP地址。
可选的,第二网络节点获取第一IP地址包括:第二网络节点接收来自第四网络节点的所述第一IP地址,所述第四网络节点为所述第一网络节点的目标宿主集中式单元CU。
通过上述方式,第二网络节点可以获取第一数据的第一IP地址,以使得避免将第一数据包丢弃。
一种可能的方式中,所述第二网络节点更新IP地址过滤规则包括:第二网络节点接收来自第四网络节点的第一暂停指示信息,该第一暂停指示信息用于指示所述第二网络节点暂停所述IP地址过滤规则,所述第四网络节点为所述第一网络节点的目标宿主CU。
通过上述方式,允许第二网络节点转发该第一数据包,避免了因IP地址过滤规则将第一数据包在第二网络节点处丢弃。
一种可能的方式中,第二数据包封装了所述第一数据包,第二数据包包括第一IP头和第二IP头,第一IP头的目标IP地址为第三网络节点的IP地址或者第三网络节点侧的安全网关的IP地址,所述第二IP头的目标IP地址为所述第四网络节点的IP地址;第二网络节点根据所述第二IP头向所述第四网络节点发送所述第二数据包,以使得所述第四网络节点向所述第三网络节点发送所述第一数据包。
通过上述方式,第二网络节点可以通过第四网络节点向第三网络节点发送该第一数据包,保证了第一数据包能够被传输到源宿主CU处,使得第一数据包能够在第三网络节点处被正确的处理,例如,完整性验证或解密等。
一种可能的方式中,所述第二数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述第四网络节点移除所述第二IP头。
通过上述方式,可以使得第四网络节点识别出哪些数据包需要做这种特殊的处理,即 移除外层IP头之后根据内层IP头转发。
一种可能的方式中,第二IP头为第二网络节点为第一数据包添加的,或者,第二IP头为第一网络节点为第一数据包添加的。
可选的,第二IP头为添加在第一IP头外的,或者,第二IP头在第一IP头外层。
通过上述方式,可以使得第一数据包能够被转发到第四网络节点处。
一种可能的方式中,第二网络节点接收来自第一网络节点的所述第一数据包之前,第一网络节点完成了拓扑更新。
第二方面,本申请实施例提供一种数据无损传输的通信方法,该方法可以由网络节点执行,也可以由网络节点的部件(例如处理器、芯片、或芯片系统等)执行,包括:第一网络节点确定第一数据包,第一数据包的目的节点为第三网络节点或第三网络节点侧的安全网关,第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU;第一网络节点向第二网络节点发送第一数据包,第二网络节点为第一网络节点的目标宿主节点DU。
通过上述方式,第一网络节点将待向第三网络节点发送的第一数据包,通过第二网络节点重新路由,使得该第一数据包能够在第三网络节点处得到正确的处理,避免了第一网络节点拓扑更新时数据包的丢失。
一种可能的方式中,第一网络节点更新第一数据包的回传适配协议层配置用于向第二网络节点发送所述第一数据包。
可选的,第一网络节点根据第四网络节点发送的配置信息,将第一数据包中的路由标识更新,第四网络节点为第一网络节点的目标宿主CU。
通过上述方式,在第一网络节点转发第一数据包之前,第一网络节点修改第一数据包的BAP层的头信息使得第一数据包能够成功向第二网络节点发送。
一种可能的方式中,所述第一网络节点为所述第一数据包添加第二IP头,所述第二IP头的目标IP地址为第四网络节点的IP地址,所述第四网络节点为所述第一网络节点的目标宿主集中式单元CU。
通过上述方式,可以使得第一数据包能够被转发到第四网络节点处。
一种可能的方式中,第一数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述第四网络节点移除所述第二IP头。
通过上述方式,可以使得第四网络节点识别出哪些数据包需要做这种特殊的处理,即移除外层IP头之后根据内层IP头转发。
一种可能的方式中,第一网络节点向所述第四网络节点发送第一IP地址,所述第一IP地址为所述第一网络节点在连接到所述第三网络节点时所获取的一个或多个IP地址。
通过上述方式,有助于第四网络节点获得该第一IP地址,进一步的使得第四网络节点向第二网络节点发送该第一IP地址。
一种可能的方式中,第一网络节点确定第一数据包之前,第一网络节点执行拓扑更新。
第三方面,本申请实施例提供一种数据无损传输的通信方法,该方法可以由网络节点执行,也可以由网络节点的部件(例如处理器、芯片、或芯片系统等)执行,包括:
第四网络节点确定第一消息,该第四网络节点为第一网络节点的目标宿主节点CU;
第四网络节点向第二网络节点发送第一消息,所述第一消息用于所述第二网络节点更新IP地址过滤规则,所述第二网络节点为所述第一网络节点的目标宿主节点DU。
通过上述方式,第四网络节点向第二网络节点提供了更新IP过滤规则所需的信息。
一种可能的方式中,第四网络节点确定第一消息包括:
第四网络节点获取第一IP地址,所述第一IP地址为所述第一网络节点在连接到第三网络节点时所获取的一个或多个IP地址,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU;所述第四网络节点向第二网络节点发送第一消息包括:所述第一消息包括所述第一IP地址。
可选的,第四网络节点接收来自第三网络节点的所述第一IP地址;或者,
第四网络节点接收来自所述第一网络节点的所述第一IP地址;或者,
第四网络节点接收来自接入和移动性管理功能AMF的所述第一IP地址。
通过上述方式,第四网络节点向第二网络节点提供第一IP地址用于第二网络节点根据该第一IP地址更新IP地址过滤规则,进一步的有利于保证第一数据的成功转发。
一种可能的方式中,第四网络节点确定第一消息包括:第四网络节点确定第一暂停指示信息,所述第一暂停指示信息用于指示所述第二网络节点暂停所述IP地址过滤规则;
所述第四网络节点向第二网络节点发送第一消息包括:所述第一消息包括所述第一暂停指示信息。
通过上述方式,第四网络节点向第二网络节点指示暂停IP地址过滤规则,避免第一数据包在第二网络节点处直接被丢弃。
一种可能的方式中,第四网络节点接收来自所述第二网络节点的第二数据包,所述第二数据包包括第一IP头和第二IP头,所述第一IP头的目标IP地址为所述第三网络节点,所述第二IP头的目标IP地址为所述第四网络节点的IP地址;
所述第四网络节点向所述第三网络节点发送第一数据包,所述第一数据包为所述第四网络节点对所述第二数据包处理后的数据包,所述第一数据包不包括所述第二IP头。
通过上述方式,第四网络节点向第三网络节点转发第一数据包,保证了第一数据包在第三网络节点能够得到正确的处理,避免了第一数据包的丢失。
一种可能的方式中,所述第一数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述第四网络节点移除所述第二IP头后根据所述第一IP头向所述第三网络节点转发所述第一数据包。
通过上述方式,第四网络节点能够确认哪些数据包需要进行移除IP头的处理。
一种可能的方式中,所述第四网络节点接收来自所述第三网络节点的在所述第一数据包中与所述第一网络节点服务的终端设备的相关的数据。
通过上述方式,第四网络节点可以获得第一数据包中与终端相关的数据,进一步的可以对该数据进行处理,例如,向终端发送该与终端业务的数据。
第四方面,本申请实施例提供一种数据无损传输的通信方法,该方法可以由网络节点执行,也可以由网络节点的部件(例如处理器、芯片、或芯片系统等)执行,包括:第三网络节点获取第一数据包,第一数据包为第一网络节点连接到第二网络节点之后待向所述第三网络节点发送的数据包;所述第三网络节点处理所述第一数据包;其中,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU,所述第二网络节点为所述第一网络节点的目标宿主节点DU。
通过上述方式,第三网络节点能够获得第一网络节点处待发送的第一数据包,并对第 一数据包进行正确的处理,有利于避免第一数据包的丢失和对终端业务连续性的影响。
一种可能的方式中,第三网络节点获取第一数据包包括:所述第三网络节点接收来自第四网络节点的所述第一数据包,所述第一数据包为所述第四网络节点对来自所述第二网络节点的第二数据包处理后的数据包,所述第二数据包封装了所述第一数据包;或者,
所述第三网络节点接收来自第二网络节点的所述第一数据包。
通过上述方式,第三网络节点能够通过不同的路径获得第一数据包。
一种可能的方式中,第三网络节点处理所述第一数据包包括:所述第三网络节点根据所述第一数据包确定与所述第一网络节点服务的终端设备的相关的数据;
所述第三网络节点向所述第四网络节点发送所述终端设备的相关的数据。
可选的,终端设备的相关的数据为所述终端设备的分组数据汇聚层协议PDCP业务数据单元SDU。
通过上述方式,第三网络节点能够正确处理第一数据包,并保证了终端设备的业务连续性。
第五方面,本申请实施例提供一种数据无损传输的通信方法,该方法可以由网络节点执行,也可以由网络节点的部件(例如处理器、芯片、或芯片系统等)执行,包括:第一网络节点接收来自第三网络节点的第一切换命令,所述第一切换命令用于指示所述第一网络节点进行切换,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU;所述第一网络节点发送第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端。
可选的,还包括:第一网络节点执行切换。
可选的,另一种可能的方式中,第一网络节点确定进行拓扑更新;所述第一网络节点发送第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端。可选的,还包括:第一网络节点执行拓扑更新。
可选的,所述第一网络节点发送第一传输完成指示信息包括:
所述第一网络节点向所述第三网络节点发送所述第一传输完成指示信息。
可选的,所述第一网络节点发送第一传输完成指示信息包括:
所述第一网络节点向第五网络节点发送所述第一传输完成指示信息,所述第五网络节点为所述第一网络节点提供接入和回传服务。
通过上述方式,第一网络节点在确保发生第一网络节点和其下属节点缓存的所有在途的上行数据包都发送至第一网络节点的源父节点,并且向源父节点或源宿主节点发送第一传输完成指示信息之后才进行拓扑更新,保证了拓扑更新过程中的数据包不丢包。
一种可能的方式中,所述第一网络节点向所述第三网络节点发送所述第三数据包。
通过上述方式,第一网络节点在确定进行拓扑更新后,向第三网络节点发送第三数据包,在确认第三数据包全部传输完成后才进行拓扑更新。
一种可能的方式中,所述第一网络节点停止对第六网络节点的上行调度,所述第六网络节点为所述第一网络节点的下属网络节点。
可选的,停止对第六网络节点的上行调度包括:所述第一网络节点接收来自所述第六网络节点的第二传输完成指示信息,所述第二传输完成指示信息用于指示第四数据包传输完成,所述第四数据包包括来自所述第六网络节点及所述第六网络节点的下属节点的上行数据;所述第一网络节点根据所述第二传输指示信息停止对所述第六网络节点的上行调度。
可选的,所述停止对第六网络节点的上行调度包括:所述第一网络节点接收来自所述第三网络节点的第一停止调度指示信息;所述第一网络节点根据所述第一停止调度指示信息停止对所述第六网络节点的上行调度。
通过上述方式,第一网络节点在确定进行拓扑更新后,和第六网络节点处的上行数据包传输完成之后停止对第六网络节点的上行调度。
一种可能的方式中,所述第一网络节点接收来自所述第三网络节点的所述第一切换命令之后,所述方法还包括:所述第一网络节点停止对终端设备的上行调度,所述第一网络节点为所述终端设备提供接入和回传服务。
可选的,第一网络节点确定进行拓扑更新后,所述第一网络节点停止对终端设备的上行调度,所述第一网络节点为所述终端设备提供接入和回传服务。
通过上述方式,第一网络节点接收到切换命令或确定进行拓扑更新后,停止对终端设备的上行调度。一种可能的方式中,所述第一传输完成指示信息承载于所述第三数据包中,或者,所述第一传输完成指示信息承载于回传适配协议BAP层的控制协议数据单元PDU中。
通过上述方式,第一传输完成指示信息可以和第三数据包中的最后一个数据包一起发送,也可以独立发送。
第六方面,本申请实施例提供一种数据无损传输的通信方法,该方法可以由网络节点执行,也可以由网络节点的部件(例如处理器、芯片、或芯片系统等)执行,包括:第五网络节点接收传输指示信息,所述传输指示信息用于指示停止对第一网络节点的上行调度,所述第五网络节点为所述第一网络节点提供接入和回传服务;所述第五网络节点根据所述传输指示信息确定停止对所述第一网络节点的上行调度。
可选的,所述第五网络节点接收传输指示信息包括:所述第五网络节点接收来自所述第一网络节点的第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端;所述第五网络节点根据所述第一传输完成指示信息确定停止对所述第一网络节点的上行调度。
可选的,所述第五网络节点接收传输指示信息包括:所述第五网络节点接收来自第三网络节点的所述第二停止调度指示信息,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU。
通过上述方式,第五网络节点可以有多种方式收到不同网元发送的传输完成指示信息,第五网络节点根据该传输完成指示信息确定停止对所述第一网络节点的上行调度。
一种可能的方式中,所述第二停止调度指示信息包含于第二切换命令中,所述第二切换命令用于指示所述第五网络节点进行切换。
通过上述方式,在指示第五网络节点进行切换的同时指示停止对第一网络节点的上行调度。
第七方面,本申请实施例提供一种数据无损传输的通信方法,该方法可以由网络节点执行,也可以由网络节点的部件(例如处理器、芯片、或芯片系统等)执行,包括:第三网络节点接收来自第一网络节点的第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端;
所述第三网络节点向第五网络节点发送第二停止调度指示信息,所述第二停止调度指示信息用于指示所述第五网络节点停止对所述第一网络节点的上行调度,所述第五网络节点为所述第一网络节点提供接入和回传服务。
可选的,所述第一传输完成指示信息承载于所述上行数据中,或者,所述第一传输完成指示信息承载于RRC消息或者F1AP消息中。
可选的,所述第二停止调度指示信息包含于第二切换命令中,所述第二切换命令用于指示所述第五网络节点进行切换。
通过上述方式,第三网络节点确定将要进行拓扑更新的第一网络节点处的上行数据全部传输完成之后,再指示第五网络节点停止对第一网络节点的上行调度,避免了第一网络节点拓扑更新过程中的数据包丢失。
第八方面,本申请实施例提供一种数据无损传输的通信装置,该装置可以是网络节点,还可以是用于网路节点的芯片。该装置具有实现上述第一方面至第七方面、或第一方面至第七方面的各可能的实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第九方面,本申请实施例提供一种数据无损传输的通信装置,包括处理器和存储器;该存储器用于存储计算机执行指令,当该装置运行时,该处理器执行该存储器存储的该计算机执行指令,以使该装置执行如上述第一方面至第七方面的方法,第一方面至第七方面的各可能的实现方法中的任意方法。
第十方面,本申请实施例提供一种数据无损传输的通信装置,包括用于执行上述第一方面至第七方面的方法,第一方面至第七方面的各可能的实现方法中的任意方法的各个步骤的单元或手段(means)。
第十一方面,本申请实施例提供一种数据无损传输的通信装置,包括处理器和接口电路,所述处理器用于通过接口电路与其它装置通信,并执行上述第一方面至第七方面的方法,第一方面至第七方面的各可能的实现方法中的任意方法。该处理器包括一个或多个。
第十二方面,本申请实施例提供一种数据无损传输的通信装置,包括处理器,用于与存储器相连,用于调用所述存储器中存储的程序,以执行上述第一方面至第七方面的方法,第一方面至第七方面的各可能的实现方法中的任意方法。该存储器可以位于该装置之内,也可以位于该装置之外。且该处理器包括一个或多个。
第十三方面,本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得处理器执行上述第一方面至第七方面的方法,第一方面至第七方面的各可能的实现方法中的任意方法。
第十四方面,本申请实施例还提供一种计算机程序产品,该计算机产品包括计算机程序,当计算机程序运行时,使得上述第一方面至第七方面的方法,第一方面至第七方面的各可能的实现方法中的任意方法被执行。
第十五方面,本申请实施例还提供一种芯片系统,包括:处理器,用于执行上述第一方面至第七方面的方法,第一方面至第七方面的各可能的实现方法中的任意方法。
附图说明
图1A为本申请实施例可以适用的一种通信系统示意图;
图1B为本申请实施例提供的一种IAB网络系统架构示意图;
图1C为本申请实施例提供的一种非独立组网IAB场景示意;
图1D为本申请实施例提供的一种IAB网络中的用户面协议栈的示意图;
图1E为本申请实施例提供的一种IAB网络中的控制面协议栈的示意图;
图1F为本申请实施例提供的一种跨IAB宿主的拓扑更新示意图;
图1G为本申请实施例提供的一种IAB宿主内的拓扑更新示意图;
图2A为本申请实施例提供一种数据无损传输的通信方法示意图;
图2B为本申请实施例提供又一种数据无损传输的通信方法示意图;
图2C为本申请实施例提供又一种数据无损传输的通信方法示意图;
图3为本申请实施例提供又一种数据无损传输的通信方法示意图;
图4为本申请实施例提供又一种数据无损传输的通信方法示意图;
图5为本申请实施例提供的一种数据无损传输的通信装置示意图;
图6为本申请实施例提供的一种数据无损传输的通信装置的结构示意图。
具体实施方式
本申请实施例提供一种数据无损传输的通信方法及装置。其中,方法和装置是基于同一构思的,由于方法及装置解决问题的原理相似,因此装置与方法的实施可以相互参见,重复之处不再赘述。
本申请实施例的描述中,“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。本申请中所涉及的至少一个是指一个或多个;多个,是指两个或两个以上。另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。
本申请实施例提供的数据无损传输的通信方法可以应用于第四代(4th generation,4G)通信系统,例如长期演进(long term evolution,LTE),也可以应用于第五代(5th generation,5G)通信系统,例如5G新空口(new radio,NR),或应用于未来的各种通信系统,例如第六代(6th generation,6G)通信系统,又例如第七代(7th generation,7G)通信系统。本申请实施例也可以应用于接入回传一体化(integrated access and backhaul,IAB)场景。
下面将结合附图,对本申请实施例进行描述,附图中以虚线标识的特征或内容可理解为本申请实施例的可选操作或者可选结构。
如图1A所示,为本申请实施例所可以应用的一种通信系统示意图。通信系统100中包括至少一个IAB节点(图中示出IAB节点110至IAB节点150)和至少一个IAB宿主160。 可选的,该通信系统还包括与IAB节点连接的至少一个终端(图中示出终端170和终端180)。可选的,该通信系统还包括与IAB宿主160连接的核心网设备190。IAB节点140可以通过接入链路(access link,AL)为终端170提供无线接入服务,该终端170的业务数据可以由IAB节点140通过无线回传链路(backhual link,BL)连接到IAB宿主160传输。
图1A中的终端可以是用户设备、移动终端(mobile termination,MT)、接入终端设备、用户单元、用户站、移动站、移动台、远方站、远程终端设备、移动设备、用户终端设备、无线终端设备、用户代理、或者用户装置等。还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备、连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备(如智能手表、智能手环等)、还可以为智能家具或家电、5G网络中的终端设备、未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备、或者车联网(vehicle to everything,V2X)中的车辆设备,客户前置设备(customer premises equipment,CPE)等,本申请对用户设备的具体实现形式并不做限定。
图1A中的IAB节点可以由移动终端和分布式单元(distributed unit,DU)组成,其中,当IAB节点面向其父节点时,可以被看做是终端设备,即MT的角色;当IAB节点面向其下属设备(下属设备可能是另一IAB子节点,或者普通UE)时,其可被看做网络设备,即作为DU的角色。为了便于表述,本申请实施例将经由IAB节点130连接到IAB宿主160的IAB节点(例如,IAB节点140)或者终端(例如,终端170),称之为IAB节点130的下属IAB节点(descendent IAB node)、下属节点、下属网络节点或下属终端。
图1A中的IAB宿主(IAB donor)可以为宿主基站,IAB宿主在5G网络中可以简称为DgNB(即donor gNodeB)。IAB宿主可以是一个完整的实体,还可以是以集中式单元(centralized unit,CU)(为了便于表述,本申请中可以简称为Donor-CU、CU或者gNB-CU)和分布式单元(distributed unit,DU)(本申请中简称为Donor-DU、DU或者gNB-DU)分离的形态存在,如图1B所示,IAB宿主可以是位于5G无线接入网(5G radio access network,5G RAN)中的gNB。该IAB宿主可以是由gNB-CU和gNB-DU组成。gNB-CU和gNB-DU通过F1接口相连,F1接口又可以进一步包括控制面接口(F1-C)和用户面接口(F1-U)。CU和核心网之间通过下一代(next generation,NG)接口相连。其中,gNB-CU或者Donor-CU还可以是以用户面(user plane,UP)(本申请中简称为CU-UP)和控制面(control plane,CP)(本申请中简称为CU-CP)分离的形态存在,即gNB-CU或者Donor-CU由CU-CP和CU-UP组成。一个gNB-CU可以包括一个gNB-CU-CP和至少一个gNB-CU-UP。或者,一个Donor-CU可以包括一个Donor-CU-CP和至少一个Donor-CU-UP。
容易理解的,本申请实施例中的IAB节点和IAB宿主可以被称为网络节点或者网络设备。
图1A中的核心网设备可以是网管设备,例如为操作、管理和维护网元(operation,administration and maintenance,OAM)。网管设备可以包括网元管理系统(element management system,EMS),网络管理系统(network management system,NMS)。图1B所示,网管设备可以是位于下一代核心网(Next Generation Core,NGC)或者5G核心网(5G core,5GC)中的功能网元。或者,网管设备也可以是部署在5GC后面的骨干网中的功能网 元,或者,网管设备还可以部署在其他位置,本申请并不限定网管设备具体部署的位置。
如图1B所示,IAB节点经IAB宿主连接到核心网。例如,在独立组网(standalone,SA)的5G架构下,IAB节点经IAB宿主连接到5GC。其中IAB-donor-CU-CP与通过NG控制面接口连接到5GC中的控制面网元(例如接入和移动性管理功能(access and mobility management function,AMF)),其中IAB-donor-CU-UP与通过NG用户面接口连接到5GC中的用户面网元(例如用户面功能(user plane function,UPF))。在双连接(dual connectivity,DC)或者多连接(multi-connectivity,MC)的5G架构下(例如:非独立组网(non-standalone,NSA),或者NR-NR DC场景等),主路径上,IAB节点可以经演进型基站(evolved NodeB,eNB)连接到演进分组核心网(evolved packet core,EPC)(例如连接到业务网关(serving gateway,SGW)),MeNB与IAB node的MT之间有LTE Uu空口连接,MeNB与IAB-donor-CU-CP之间有X2-C接口,MeNB通过S1接口连接到EPC(包括S1接口用户面,以及S1接口控制面)。其中,5G核心网,可用于对终端设备进行鉴权、移动性管理、协议数据单元(protocol data unit,PDU)会话管理等,包含AMF、UPF等功能实体或网元。4G核心网,可用于对终端设备进行鉴权、移动性管理、分组数据网连接管理等,包含移动管理实体、分组数据网关等网元。
为了保证业务传输的可靠性,IAB网络支持多跳IAB节点和多连接IAB节点组网。因此,在终端和IAB宿主之间可能存在多条传输路径。在一条路径上,IAB节点之间,以及IAB节点和IAB节点连接的IAB宿主之间有确定的层级关系,每个IAB节点将为其提供回传服务的节点视为父节点。相应地,每个IAB节点可视为其父节点的子节点。
示例性的,参见图1A,IAB节点110的父节点为IAB宿主160,IAB节点110又为IAB节点120和IAB节点130的父节点,IAB节点120和IAB节点130均为IAB节点140的父节点,IAB节点150的父节点为IAB节点120。终端的上行数据包可以经一个或多个IAB节点传输至IAB宿主后,再由IAB宿主发送至核心网设备190(例如5G网络中的用户面功能(user plane function,UPF)网元),下行数据包将由IAB宿主160从核心网设备(例如,移动网关设备)处接收后,再经一个或多个IAB节点发送至终端。终端170和IAB宿主160之间数据包的传输有两条可用的路径,分别为:终端170→IAB节点140→IAB节点130→IAB节点110→IAB宿主160,终端170→IAB节点140→IAB节点120→IAB节点110→IAB宿主160。终端180和IAB宿主160之间数据包的传输有三条可用的路径,分别为:终端180→IAB节点140→IAB节点130→IAB节点110→IAB宿主160,终端180→IAB节点140→IAB节点120→IAB节点110→IAB宿主160,终端180→IAB节点150→IAB节点120→IAB节点110→IAB宿主160。IAB节点到IAB宿主的上行路径上的中间IAB节点都可以称之为IAB节点的上游节点,例如图1A中的IAB节点110和IAB节点120都可以称之为IAB节点150的上游IAB节点。示例性的,IAB节点的下属设备或者下属节点可以包括直接接入该IAB节点的设备,例如IAB节点的子节点或者接入该IAB节点的UE。例如,图1A中的IAB节点120和IAB节点130称之为IAB节点110的下属设备,终端170和终端180可以称之为IAB节点140的下属设备。
可以理解的是,在IAB网络中,终端和IAB宿主之间的一条传输路径上,可以包含一个或多个IAB节点。每个IAB节点需要维护面向父节点的无线回传链路,还需要维护和子节点的无线链路。若一个IAB节点是终端接入的节点,该IAB节点和子节点(即终端)之 间是无线接入链路AL。若一个IAB节点是为其他IAB节点提供回传服务的节点,该IAB节点和子节点(即其他IAB节点)之间是无线回传链路BL。示例性的,参见图1A,在路径“终端170→IAB节点140→IAB节点130→IAB节点110→IAB宿主160”中,终端170通过无线接入链路接入IAB节点140,IAB节点140通过无线回传链路接入IAB节点130,IAB点130通过无线回传链路接入IAB节点110,IAB节点110通过无线回传链路接入IAB宿主。
上述IAB组网场景仅仅是示例性的,在多跳和多连接结合的IAB场景中,IAB组网场景还有更多其他的可能性,例如,IAB宿主和另一IAB宿主下的IAB节点组成双连接为终端服务等,此处不再一一列举。
IAB网络还支持非独立(non-standalone,NSA)组网,也可以称为EN-DC(E-UTRAN NR dual connectivity)组网场景。如图1C所示,为本申请实施例提供的一种非独立组网IAB场景示意图,IAB节点支持4G和5G网络双连接,其中LTE的基站eNB为主基站(master eNB,MeNB),为IAB节点提供LTE的空口(LTE Uu)连接,并与4G核心网演进型分组核心网(evolved packet core,EPC)建立S1接口进行用户面和控制面传输。IAB-donor gNB为辅基站,为IAB节点提供NR的空口(NR Uu)连接,并与核心网EPC建立S1接口进行用户面传输。类似的,UE也支持EN-DC,UE通过LTE Uu接口连接到主基站eNB,通过NR Uu接口连接到辅基站IAB node,UE的辅基站也可以是IAB donor gNB。
容易理解的,图1C仅为组网示例,IAB网络的NSA场景也同样支持多跳IAB组网,例如图1C中的UE可以为另一个IAB节点,即IAB节点可以通过多跳无线回传链路连接到IAB donor gNB。
图1D和图1E分别是本申请实施例提供的IAB网络中的用户面协议栈的示意图和控制面协议栈的示意图,下面结合图1D和图1E进行说明。
当前对IAB网络的讨论中,确定在无线回传链路引入一个新的协议层:回传适配协议(backhaul adaptation protocol,BAP)层,该协议层位于无线链路控制(radio link control,RLC)层之上,可用于实现数据包在无线回传链路的路由,以及承载映射等功能。
在IAB节点(IAB的DU部分)和宿主节点(或者IAB-donor-CU)之间,需要建立F1接口(或者被称为F1*接口,本申请实施例中,可统一称为F1接口,但对名称并不做限定),该接口支持用户面协议(F1-U/F1*-U)和控制面协议(F1-C/F1*-C),其中,用户面协议包括以下协议层的一个或多个:通用分组无线服务(general packet radio service,GPRS),隧道协议用户面(gPRS tunnelling protocol user plane,GTP-U),用户数据报协议(user datagram protocol,UDP)、因特网协议(internet protocol,IP)等协议层;该接口的控制面协议包括以下中的一个或者多个:F1应用协议(F1 application protocol,F1AP)、流控传输协议(stream control transport protocol,SCTP)、IP等协议层。
对于用户面而言,如图1D所示,通过F1/F1*接口的用户面,IAB节点和IAB宿主之间可以执行用户面数据的传输,以及下行传输状态反馈等功能。
对于控制面而言,如图1D所示,通过F1/F1*接口的控制面,IAB节点和IAB宿主之间可以进行执行接口管理、对IAB-DU进行管理,以及执行UE上下文相关的配置等。
图1D和图1E以图1A所示的IAB场景下的协议栈为例进行了描述。需要说明的是,一个IAB节点可能具备一个或者多个角色,该IAB节点可以拥有该一个或者多个角色的协议栈;或者,IAB节点可以具有一套协议栈,该协议栈可以针对IAB节点的不同角色,使用不 同角色对应的协议层进行处理。下面以该IAB节点拥有该一个或者多个角色的协议栈为例进行说明:
(1)普通终端的协议栈
IAB节点在接入IAB网络时,可以充当普通终端的角色。此时,该IAB节点的MT具有普通终端的协议栈,该IAB节点接入IAB网络后,该IAB节点仍然可以充当普通终端的角色,例如,与IAB donor传输自己的上行和/或下行的数据包(例如OAM数据包),通过RRC层执行测量等等。
(2)接入IAB节点的协议栈
IAB节点在接入IAB网络后,该IAB节点可以为终端提供接入服务,从而充当一个接入IAB节点的角色,此时,该IAB节点具有接入IAB节点的协议栈,例如图1D和图1E中的IAB node 2的协议栈。
在这种情况下,该IAB节点面向其父节点的接口上可以有两套协议栈,一套是普通终端的协议栈,另一套是为终端提供回传服务的协议栈(即:接入IAB节点的协议栈)。
(3)中间IAB节点的协议栈
IAB节点在接入IAB网络后,该IAB节点可以充当一个中间IAB节点的角色,此时,该IAB节点具有中间IAB节点的协议栈,例如图1D和图1E中的IAB node 1的协议栈。
在这种情况下,该IAB节点面向其父节点的接口上可以有两套协议栈,一套是普通终端的协议栈,另一套是为子IAB节点提供回传服务的协议栈(即:中间IAB节点的协议栈)。
另外,IAB节点可以同时承担接入IAB节点和中间IAB节点的角色,例如,IAB节点可以针对某些终端是接入IAB节点,针对另一些终端而言,是中间IAB节点,此时该IAB节点可以有三套协议栈,一套为上述普通终端的协议栈,一套为接入IAB节点的协议栈,一套为中间IAB节点的协议栈。
需要说明的是,图1D和图1E以IAB网络为例进行了介绍,图1D和图1E的内容同样适用于IAB网络以外的其他类型中继网络,该中继网络的控制面协议栈架构可以参考图1D,该中继网络的用户面协议栈架构可以参考图1E。图1D和图1E中的IAB节点可以替换成中继(relay),例如IAB node 1可以替换成中继节点1,IAB node 2可以替换成中继节点2,IAB donor可以替换成宿主节点,宿主节点具有CU和DU协议栈,其余内容与图1D和图1E中描述的内容相同,具体可以参考图1D和图1E的描述,在此不再赘述。
IAB网络中的IAB节点可以发生拓扑更新,例如切换过程或者无线链路失败恢复过程中发生的拓扑更新。本申请实施例以切换过程为示例进行介绍,但并不限定仅为因切换产生的拓扑更新。
根据拓扑更新的类型的不同,以下通过附图介绍IAB节点拓扑更新可能存在的几种场景。
场景1:如图1F所示,跨IAB宿主的拓扑更新,例如,因IAB节点切换产生的跨IAB宿主的拓扑更新。
IAB节点3(记为第一网络节点)从源父节点(如图1F中的IAB node 1)切换至目标父节点(如图1F中的IAB node 2,记为第五网络节点),且改变连接的IAB宿主,即从源IAB宿主(如图1F中的IAB donor 1,记为第一宿主节点)切换至目标IAB宿主(如图1F中的IAB donor 2,记为第二宿主节点)。第一网络节点也由源IAB宿主DU(如图1F中的 IAB donor DU1)切换到目标IAB宿主DU(如图1F中的IAB donor DU2,记为第二网络节点),为了简化表述,源IAB宿主CU可以记为第三网络节点,目标IAB宿主CU可以记为第四网络节点。这种切换可以称为跨IAB宿主的切换,跨IAB宿主的拓扑更新,跨IAB宿主CU的拓扑更新或者跨donor CU的切换(inter-donor CU migrating)。
容易理解的,在场景1中,目标IAB宿主的DU和CU也存在不分离的情况。类似的,源宿主的DU和CU也存在不分离的情况。
场景2:如图1G所示,IAB宿主内部的拓扑更新,例如,因IAB节点的切换产生的IAB宿主内部的拓扑更新。
IAB节点3(记为第一网络节点)从源父节点(如图1G中的IAB node 1)切换至目标父节点(如图1G中的IAB node 2),但不改变IAB宿主,即从IAB宿主CU(记为第三网络节点)下的源donor DU(如图1G中的IAB donor DU 1,也可以称为旧donor DU)切换为目标donor DU(如图1G中的IAB donor DU 2,记为第二网络节点,也可称为新donor DU)。这种切换可以称为IAB宿主内部的切换,跨IAB宿主DU的切换,跨DU切换或者donor CU内部的切换(intra-donor CU migrating)。容易理解的,上述场景1和2介绍了IAB节点的切换场景,类似的IAB节点的父节点(如图1F中的IAB node 1)也可以进行切换,例如可以从源IAB宿主切换到目标IAB宿主,类似的,IAB节点的子节点(如图1F中的IAB node4)可以跟随该IAB节点进行切换,即也从源IAB宿主切换到目标IAB宿主。本申请实施例提供的方法适用于该IAB节点的切换,同样也适用于该IAB节点的子节点跟随该IAB节点进行切换的场景,也适用于与该IAB节点连接的IAB父节点或者宿主节点发生改变的其他场景,例如IAB节点发生无线链路失败后执行链路恢复后,更换了新的父节点,甚至更换连接到的IAB宿主节点的场景。也就是说,本申请中,IAB网络中的拓扑更新可以理解为因IAB节点进行切换产生的拓扑更新,例如IAB节点根据切换命令执行切换。也可以理解为IAB节点发生无线链路失败(radio link failure,RLF)或者IAB节点接收到父节点通知的BH RLF通知后,执行RLF恢复过程而导致的拓扑更新。
本申请中,IAB节点的MT可以简称为IAB-MT,IAB节点的DU可以简称为IAB-DU,IAB宿主的CU可以简称为Donor-CU,IAB宿主的DU可以简称为Donor-DU。
本申请中,IAB节点连接的IAB宿主可以称为IAB节点的IAB宿主或者IAB节点的宿主节点,或者简称为IAB宿主。其中,该IAB节点可以直接接入该IAB宿主所服务的小区(例如直接接入IAB宿主的DU所服务的小区,或直接接入CU-DU未分离的IAB宿主所服务的小区),或者,该IAB节点可以通过其他IAB节点连接到该IAB宿主(例如,该IAB节点的父节点,为接入到IAB宿主所服务小区的IAB节点)。
针对上述IAB节点执行拓扑更新后,在IAB节点中有些数据包(例如BAP层的业务数据单元(service data unit,SDU)或者BAP层的PDU)还没成功发送给源父节点,若IAB节点在拓扑更新后更换了连接的宿主DU(例如,IAB节点在拓扑更新前后分别连接到同一个IAB donor下的不同宿主DU,或者,分别连接到不同IAB donor的不同宿主DU)的情况,如何减少数据包的丢失为亟需解决的问题。
为了避免这些数据包的丢失,则IAB节点可以先缓存这些数据包(例如缓存在BAP层中),在拓扑更新完成后,可以将这些缓存的数据包向新的父节点发送。但为了避免这些缓 存数据包的丢失,在上述数据包发送过程中,至少还存在以下两个问题:
问题1)、对于拓扑更新后,更换了连接的IAB宿主DU的情况,例如上述场景1和2,IAB节点在拓扑更新后向新的父节点发送缓存的上行数据包,新的父节点与旧的IAB宿主DU(或者成为源IAB宿主DU)之间没有连接,只能连接到新的IAB宿主DU(或者成为目标IAB宿主DU),但是现有技术并不支持上行数据包在不同IAB宿主DU(例如,同一个IAB donor下的不同IAB宿主DU,或者不同IAB donor的不同IAB宿主DU)之间的重新路由转发。
问题2)、即使问题1被解决,这些缓存的数据包被转发至目标IAB宿主DU,还需要解决目标IAB宿主DU如何正确转发该数据包的问题。
一方面,在IAB节点执行了跨IAB宿主的拓扑更新后,即使在无线回传链路能够将一些原本要向源IAB宿主节点发送的上行数据包发送到了目标IAB宿主DU,这些上行数据包的源IP地址可能是IAB节点在连接到源IAB宿主节点下所获取的旧IP地址,若目标IAB宿主DU配置了源IP地址过滤的机制,则可能由于IAB节点的旧IP地址不属于被允许转发的源IP地址范围,目标IAB宿主DU可能不会转发这些数据包,甚至会将这些数据包丢弃。若这些上行数据包在IAB节点或者在目标IAB宿主DU处无法传输至源IAB宿主CU,而对于传统的终端来说,终端也无法再向目标IAB宿主CU发送这些数据包中对应的分组数据汇聚层协议(packet data convergence protocol,PDCP)SDU,因此,可能会造成拓扑更新过程中,部分数据包的缺失。
另一方面,即使数据包在目标IAB宿主DU被转发至目标IAB宿主CU之后,如果这些数据包按照与源IAB donor CU之间协商的安全机制进行了安全保护(例如UE在PDCP层的完整性保护或加密,或者IAB节点在IPsec层的加密措施等),则这些数据包可能也无法被目标IAB宿主CU正确解析或完整性保护校验失败,因此这些数据包仍需要被传输到源IAB宿主CU处理。
如图2A所示,为解决在上述场景1中目标宿主节点DU和CU分离时出现的上述问题,本申请实施例提供一种数据无损传输的通信方法200A包括:
S210A:第一网络节点执行拓扑更新。该拓扑更新包括:第一网络节点更换了连接的IAB宿主DU。例如,第一网络节点连接的IAB宿主DU更换为第二网络节点,第二网络节点为第一网络节点拓扑更新的目标IAB宿主DU。
S230A:第一网络节点向第二网络节点发送第一数据包。该第一数据包IP层的目的节点为第三网络节点,容易理解的,当第一网络节点的源IAB宿主为CU和DU分离的情况下,第三网络节点为第一网络节点的源IAB宿主CU;在第一网络节点的源IAB宿主为CU和DU不分离的情况下,第三网络节点为第一网络节点的源IAB宿主,也就是说,该第一数据包为待向第三网络节点发送的数据包。例如,第一数据包可以是第一网络节点在执行拓扑更新前缓存在BAP层待向第三网络节点发送的数据包。可理解的,该第一数据包的目的节点也可以是第三网络节点侧的安全网关(security gateway,SeGW)设备。
可选的,第一网络节点在向第二网络节点发送第一数据包前,该方法S230A还包括S231A:第一网络节点对该第一数据包进行第一处理操作,例如,该第一处理操作为第一数据包更新BAP层的头信息。例如,第一网络节点接收来自目标IAB宿主CU的BAP层配置信息,第一网络节点根据该BAP层配置信息更新第一数据包的BAP层的头信息。具体的,第一网络节点根据该BAP层配置信息,将第一数据包中的BAP层头信息中的BAP路由标识替换为配 置的新路由标识,该新的路由标识指向到第二网络节点的传输路径。通过该方式,第一网络节点可以成功将第一数据包发送给第二网络节点。一种可能的实施方式中,在S230A之前,该方法还包括S220A:第二网络节点更新IP地址过滤规则用于向第三网络节点转发该第一数据包。
第二网络节点更新IP地址过滤规则用于向第三网络节点发送该第一数据包,例如,该更新IP地址过滤规则可以为添加第一数据包的源IP地址到源IP地址过滤规则的白名单中,或者第二网络节点暂时关闭源IP地址过滤规则。这样能够避免出现由于第一数据包的IP地址不属于被允许转发的源IP地址范围,第二网络节点不会转发第一数据包,甚至将第一数据包丢弃的情况。
S240A:第二网络节点向第三网络节点发送该第一数据包。
考虑到在一些可能的场景下,第二网络节点只能看到第一数据包的外层IP头,第一数据包的IP层的目的节点可能是第三网络节点,也可能是第三网络节点侧部署的安全网关设备,如果第二网络节点配置了有相应的IP路由,可以找到用于转发IP层的目的节点为第三网络节点(具体可以是第三网络节点CU-CP或者第三网络节点CU-UP)或第三网络节点侧部署的安全网关(简称为源SeGW)的合适的下一跳节点,则可将第一数据包经由该下一跳节点向源IAB donor CU或源SeGW发送即可。但是,如果目标第二网络节点的IP层,没有配置适合用于转发目的节点为第三网络节点的IP路由,则第二网络节点无法直接通过IP层的路由转发向第三网络节点发送第一数据包。
对于如何保证第二网络节点能够将第一数据包发送至第三网络节点的问题,可选的,方法240A还包括:
S241A:第二网络节点获取第二数据包。第二数据包封装了第一数据包,第二数据包包括第一IP头和第二IP头,第一IP头的目标IP地址为第三网络节点的IP地址或者为与第三网络节点连接的第一安全网关设备的IP地址,第二IP头的目标IP地址为第四网络节点的IP地址。可选的,第一安全网关设备可以是第三网络节点侧部署的安全网关设备。
可选的,第二IP头可以是第二网络节点为第一数据包添加的,或者,也可以是第一网络节点为第一数据包添加的。即,第二网络节点获取第二数据包的一种方式中,第二网络节点接收第一网络节点发送的第一数据包后,第二网络节点为第一数据包添加第二IP头得到第二数据包。第二网络节点获取第二数据包的另一种方式中,在S220A中,第一网络节点向第二网络节点发送第一数据包时,为该第一数据包添加第二IP头,即第二网络节点从第一网络节点接收到的是封装有第一数据包的第二数据包。
S242A:第二网络节点向第四网络节点发送第二数据包。可以理解为,第二网络节点根据第二IP头向第四网络节点发送第二数据包。
可选的,第二数据包还包括第一移除指示信息,该第一移除指示信息用于指示第四网络节点移除第二IP头。可选的,第一移除指示信息可以是使用比特位指示或特殊字段,本申请并不限定能够指示第四网络节点移除第二IP头的其他的实现方式。
S243A:第四网络节点向第三网络节点发送第一数据包。
可选的,第四网络节点根据第一移除指示信息移除第二数据包的第二IP头之后,根据第二数据包的第一IP头确定向第三网络节点发送第一数据包。可以理解,第一IP头包含在第一数据包中,该第二数据包在移除第二IP头后即可得到第一数据包。
也就是说,由第二网络节点或者第一网络节点在目标IP地址为第三网络节点(或源SeGW)的IP地址的第一数据包外,再封装一层外层的新IP头(第二IP头)得到第二数据包,新IP头的目标地址为第四网络节点的IP地址。第二网络节点根据外层的新IP头中的目的节点IP地址,将第二数据包通过IP路由转发至第四网络节点后,再由第四网络节点将外层的新IP头移除后,将第一数据包通过IP路由转发至数据包的IP层中的目的节点(即第三网络节点或源SeGW)。为了使第四网络节点能识别出来接收到的哪些IP数据包需要做这种特殊的接收处理(即移除外层IP头后根据内层IP头转发),可以由添加外层IP头的节点,在外层IP头中携带第一移除指示信息。
通过方法200A,可以允许在第二网络节点和第三网络节点(例如,跨IAB宿主或跨IAB宿主DU)之间的上行数据包的转发或重路由,避免在重路由过程中该上行数据包被第二网络节点丢弃,使得数据包完成在不同宿主节点之间的重新路由转发,减少数据包的丢失。
在上述S210A中,拓扑更新可以包括因发生切换或者无线链路恢复过程产生的拓扑更新。
在上述S231A中,本申请实施例示例性的举出了第一网络节点对第一数据包进行第一处理的两种情况。
情况一:第一数据包是从上层协议层中收到的BAP层的SDU,第一处理为:第一网络节点根据收到的新的BAP层的配置,为这些第一数据包的SDU添加BAP层头信息。可选的,这些新的BAP的配置是第四网络节点向第一网络节点发送的。
具体的:如果第一网络节点(例如,如图1F中所示的IAB node 3)缓存的第一数据包是从上层协议层中收到的BAP层的SDU,则可以在拓扑更新后,例如在执行了S210A后,第一网络节点根据收到的新的BAP层的配置,为这些缓存的SDU添加BAP层头信息(BAP层头信息中包含与目标路径对应的路由标识(BAP routing ID),目标路径中包含目标父节点(例如,如图1F中所示的IAB node 1),BAP routing ID由BAP地址(BAP address)和BAP路径标识(BAP path ID)组成,其中该目标路径所对应的BAP routing ID中的BAP address用于指示BAP层的目的节点,即目标IAB donor(例如,如图1F中所示的第二宿主节点)或目标IAB donor DU(例如,如图1F中所示的IAB donor DU2),BAP path ID用于指示第一网络节点与目标IAB donor或目标IAB donor DU之间的一条传输路径),第一网络节点按照目标IAB donor CU提供的新的路由标识和新的路由配置,将第一数据包传输至目标IAB donor DU。若第一数据包是第一网络节点的F1接口协议层的PDU,例如第一数据包为F1接口用户面或控制面协议栈所包含的IP层的IP包,所述F1接口协议层可视为BAP层的上层,则在BAP层上层协议层(例如第一网络节点的DU侧的IP层)中添加的IP层头中,源IP地址字段所填写的IP地址仍然是第一网络节点在连接到源IAB宿主(例如,如图1F中所示的第一宿主节点)时所获取的IP地址(为了简洁,记为第一IP地址),目标IP地址字段所填写的IP地址是源IAB宿主(具体可以是源IAB donor CU,或者源IAB donor CU CP或者源IAB donor CU UP)的IP地址。
可理解的,本申请实施例中的BAP层的上层协议层可以为:第一网络节点的DU侧的IP层。
情况二:第一数据包是BAP层的PDU,即第一数据包中已经携带有BAP层的头信息,则第一处理为:第一网络节点根据收到的新的BAP层的配置,为这些第一数据包的PDU更新 BAP层头信息。可选的,这些新的BAP的配置是第四网络节点向第一网络节点发送的。
具体的:如果第一网络节点缓存的上行数据包为BAP层的PDU,即已经携带了BAP层的头信息,其中的路由标识BAP routing ID中携带的BAP address所指示的BAP层的目的节点为源IAB donor DU(例如,如图1F中所示的IAB donor DU1),BAP rout ing ID中携带的BAP path ID所指示的路径仍然是到源IAB宿主DU之间的传输路径,而IAB网络中的路由选择是基于适配层头中的路由标识来执行,即对于一个执行路由选择的节点来说,在为一个携带有BAP routing ID的数据包选择路由时,如果在配置的路有表中有对应于BAP routing ID的表项,且该表项中所指定的下一跳节点是可用的下一跳节点,则会选择向此表项所指定的下一跳节点发送该数据包,若在路由表中无法找到一个与BAP routing ID对应的表项或者与BAP rouging ID对应表项所指定的下一跳节点不可用,则可以在路由表的表项中,选择任意一个与数据包中携带的BAP address部分相同的表项所指定的一个可用的下一跳节点,作为发送该数据包的下一跳节点。可以理解的是,当第一网络节点执行了S210A中的拓扑更新,若经由目标父节点连接的目标IAB donor DU不同于其经由源父节点连接到的源IAB donor DU,则不仅传输路径发生了变化,连BAP层的上行的目的节点(上行)也发生了变化。因此,在第一网络节点转发这些第一数据包之前,数据包的BAP层的头信息需要被修改,例如,第一网络节点接收到目标IAB donor CU(例如,如图1F中所示的第四网络节点)提供的配置信息,所述配置信息可以通过RRC消息或者F1AP消息发送给第一网络节点,具体内容包括:到目标IAB donor DU的一个或多个新路由标识(例如一个默认/缺省的BAP routing ID,可用于转发所有的缓存数据包),可选的,还包含对应于每个路由标识的下一跳节点,映射到每个新路由标识的旧的路由标识(指向到源IAB donor DU的旧传输路径)。第一网络节点根据目标IAB donor CU提供的配置信息,将其缓存中的BAP PDU中携带的BAP层头信息中的BAP routing ID替换为配置的新路由标识,再根据新的路由标识执行路由选择后向下一跳节点(即目标父节点)发送数据包,以保证在切换前缓存的数据包在切换完成后转发至目标IAB donor DU。可选的,如果第一网络节点缓存的BAP层的PDU中不包含路由标识(例如为BAP控制PDU),则第一网络节点可以直接将该BAP控制PDU(例如包含了回传RLC信道(BH RLC channel)粒度的流控反馈控制PDU)向目标父节点发送,或者将该BAP control PDU(例如包含了BAP routing ID粒度的流控反馈控制PDU)删除。
上述S220A中,如果第一网络节点没有为第一数据包添加第二IP头的情况下,本申请实施例中提供了几种可能的第二网络节点更新IP地址过滤规则的方式:
方式一:添加第一数据包的源IP地址到源IP地址过滤规则的白名单。
可选的,方法S220A还包括:
S221A:第四网络节点向第二网络节点发送第一消息,该第一消息中携带第一IP地址,该第一IP地址为第一网络节点在连接到第三网络节点时所获取的一个或多个IP地址。
第二网络节点接收到该第一消息后,根据该第一消息更新IP地址过滤规则。例如,该第二网络节点将第一IP地址添加到源IP地址过滤规则的白名单中。
可理解的,本申请实施例中,第四网络节点有多种可能的方式获取该第一IP地址,例如:
可选的,S222A:第四网络节点接收第三网络节点发送的第二消息,该第二消息中包括 第一IP地址。
可选的,第四网络节点接收第一网络节点发送的第三消息(图2A中并未示出),该第三消息中包括第一IP地址,该第三消息可以为RRC消息。
具体的,第四网络节点可以将第一网络节点在连接到第三网络节点时所获取的一个或多个IP地址(为了便于表述,简称为第一IP地址),向第二网络节点发送。第二网络节点在收到第一IP地址后,可以将该第一IP地址添加在自己的源IP地址过滤规则的白名单(即被允许转发的数据包的源IP地址列表)中。其中,第一IP地址可以由第三网络节点发送给第四网络节点,例如,第一网络节点执行基于Xn接口的切换,第三网络节点在Xn接口消息(例如Xn接口切换请求(Handover Request)消息)中携带这些第一网络节点的第一IP地址向第四网络节点发送;或者,由AMF发送给第四网络节点,例如,第一网络节点执行基于NG接口的切换,第三网络节点在NG接口消息(例如NG接口的切换要求(Handover required)消息)中携带这些第一网络节点的第一IP地址向目标AMF发送,再由AMF将这些第一网络节点的第一IP地址在NG接口消息(例如NG接口Handover Request消息)中向第四网络节点发送;或者也可以由第一网络节点发送给第四网络节点,例如由第一网络节点在拓扑更新完成后通过RRC消息(具体可以是在RRC重配置完成消息)向第四网络节点发送。
方式二:暂时关闭源IP地址过滤规则。
可选的,方法S220A还包括:
S221A:第四网络节点向第二网络节点发送第一消息,该第一消息中携带第一暂停指示信息,该第一暂停指示信息用于指示第二网络节点暂时关闭源IP地址过滤规则。
第二网络节点根据该第一暂停指示信息暂时关闭源IP地址过滤规则。
可理解的,第一暂停指示信息可以是比特指示或者定时器配置信息,本申请实施例并不限定,能够指示第二网络节点暂时关闭源IP地址过滤规则即可。
本申请实施例中,第二网络节点暂时关闭源IP地址过滤规则的方式也可以有多种,例如,通过定时器实现或等待重新启动(或恢复)过滤规则的指示信息。具体的,例如,可以在接收到第一暂停指示信息后关闭源IP地址规则,启动定时器,在满足预设条件后恢复,该预设条件可以是定时器超时,或者是接收到其他网络节点的指示,本申请实施例并不限定。
上述S240A中,第三网络节点获取第一数据包包括两种获得途径,一种是接收第二网络节点直接发送的第一数据包;另一种是,第三网络节点接收第四网络节点转发的第一数据包,其中,第四网络节点从第二节点接收到封装有第一数据包的第二数据包,第二数据包是在第二网络节点处对第一数据包进行封装后得到的,其中包含第二IP头,在第四网络节点去除第二数据包的第二IP头后,向第三网络节点发送该第一数据包。
本申请实施例中,第三网络节点获取第一数据包后,可以有几种数据包处理方式:
数据包处理方式一:第三网络节点根据第一数据包确定与第一网络节点服务的终端设备相关的数据,该数据可以是与终端的业务连续性相关的数据,例如PDCP SDU。
第三网络节点向第四网络节点发送与该终端设备相关的数据。
具体的:第一数据包经过第三网络节点的接收处理后(例如用户面数据包,经第三网络节点接收处理后得到PDCP SDU),若有需要(例如在与核心网之间的用户面传输通道切换 至第四网络节点后,还有上行数据包没传完的情况下),还可以被第三网络节点经由Xn用户面(Xn-U)接口向第四网络节点转发,以保证第一网络节点切换后其所服务的终端设备的业务连续性。
数据包处理方式二:第三网络节点根据第一数据包确定与第一网络节点服务的终端设备相关的数据,例如PDCP SDU。
第三网络节点向UPF发送该终端设备相关的数据。
具体的,若第三网络节点想将这些PDCP SDU通过NG接口发送发给UPF,则UPF可以在第一网络节点执行拓扑更新期间,为第一网络节点服务的UE(包括接入到第一网络节点服务小区的UE,或者接入到第一网络节点的下属IAB节点服务小区的UE)的PDU session在与第三网络节点和第四网络节点之间分别维护两个N3接口的通用分组无线服务隧道协议隧道(general packet radio service tunneling protocol tunnel,GPRS tunneling protocol tunnel,GTP tunnel),UPF可以在一段时间内从两个GTP tunnel接收UE的数据包,在第三网络节点确定完成所有上行PDCP SDU的传输之后,UPF可以基于第三网络节点的上行结束标识(UL end-marker)释放和第三网络节点之间的N3接口的GTP用户面隧道(GTP-User tunnel,GTP-U tunnel)。
如图2B所示,为解决在上述场景1中目标宿主节点DU和CU不分离时出现的上述问题,本申请实施例提供一种数据无损传输的通信方法200B包括:
S210B:第一网络节点执行拓扑更新。该拓扑更新包括:第一网络节点更换了连接的IAB宿主。例如,第一网络节点连接的IAB宿主更换为第二网络节点,第二网络节点可以称为第一网络节点拓扑更新的目标IAB宿主节点,第二网络节点的DU和CU不分离。
S230B:第一网络节点向第二网络节点发送第一数据包。
该第一数据包IP层的目标的节点为第三网络节点,容易理解的,当第一网络节点的源IAB宿主为CU和DU分离的情况下,第三网络节点为第一网络节点的源IAB宿主CU;在第一网络节点的源IAB宿主为CU和DU不分离的情况下,第三网络节点为第一网络节点的源IAB宿主,也就是说,该第一数据包为待向第三网络节点发送的数据包。例如,第一数据包可以是第一网络节点在执行拓扑更新前缓存在BAP层待向第三网络节点发送的数据包。可理解的,该第一数据包的目的标节点也可以是第三网络节点侧的SeGW设备。可选的,第一网络节点在向第二网络节点发送第一数据包前,该方法S230B还包括S231B:第一网络节点对该第一数据包进行第一处理操作,例如,该第一处理操作为第一数据包更新BAP层的头信息。例如,第一网络节点接收来自目标IAB宿主的BAP层配置信息,第一网络节点根据该BAP层配置信息更新第一数据包的BAP层的头信息。具体的,第一网络节点根据该BAP层配置信息,将第一数据包中的BAP层头信息中的BAP路由标识替换为配置的新路由标识,该新的路由标识指向到第二网络节点的传输路径。通过该方式,第一网络节点可以成功将第一数据包发送给第二网络节点。
一种可能的实施方式中,在S230B之前,该方法还包括S220B:第二网络节点更新IP地址过滤规则用于向第三网络节点转发该第一数据包。
第二网络节点更新IP地址过滤规则用于向第三网络节点发送该第一数据包,例如,该更新IP地址过滤规则可以为添加第一数据包的源IP地址到源IP地址过滤规则的白名单中, 或者第二网络节点暂时关闭源IP地址过滤规则。这样能够避免出现由于第一数据包的IP地址不属于被允许转发的源IP地址范围,第二网络节点不会转发第一数据包,甚至将第一数据包丢弃的情况。
本方法200B中,第二网络节点具有多种可能的方式获取第一数据包的源IP地址,其中,第一数据包的源IP地址为第一网络节点连接到第三网络节点时的一个或多个IP地址。具体的,第三网络节点为CU和DU分离时的IAB宿主节点时,该第一数据包的源IP地址为第一网络节点连接到第三网络节点DU时的一个或多个IP地址。
一种可能的方式中,第二网络节点接收第一网络节点发送的源IP地址。
另一种可能的方式中,第二网络节点接收第三网络节点发送的源IP地址。该情况下,方法200B还包括S221B,第二网络节点接收第三网络节点发送的第一数据包的源IP地址或者暂停指示信息。暂停指示信息用于指示第二网络节点暂停源IP地址过滤规则,容易理解的,第二网络节点暂时关闭源IP地址过滤规则的实现方式可以参考方法200A中步骤S221A中的描述。
再一种可能的方式中,第二网络节点接收AMF发送的源IP地址。
S240B:第二网络节点向第三网络节点发送该第一数据包。
通过方法200B,可以允许在第二网络节点和第三网络节点(例如,跨IAB宿主或跨IAB宿主DU)之间的上行数据包的转发或重路由,避免在重路由过程中该上行数据包被第二网络节点丢弃,使得数据包完成在不同宿主节点之间的重新路由转发,减少数据包的丢失。
如图2C所示,为解决在上述场景2中宿主节点内部拓扑更新时出现的上述问题,本申请实施例提供一种数据无损传输的通信方法200C包括:
S210C:第一网络节点执行拓扑更新。该拓扑更新包括:第一网络节点在同一个宿主节点下更换了连接的IAB宿主DU,也就是说,第一网络节点连接的IAB宿主DU更换为第二网络节点,第二网络节点可以称为第一网络节点拓扑更新的目标IAB宿主DU,第二网络节点为第一网络节点的源宿主节点下的DU。
S230C:第一网络节点向第二网络节点发送第一数据包。
该第一数据包IP层的目标的节点为第三网络节点,容易理解的,第三网络节点为第一网络节点的源IAB宿主CU,也就是说,该第一数据包为待向第三网络节点发送的数据包。例如,第一数据包可以是第一网络节点在执行拓扑更新前缓存在BAP层待向第三网络节点发送的数据包。可理解的,该第一数据包的目的标节点也可以是第三网络节点侧的SeGW设备。可选的,第一网络节点在向第二网络节点发送第一数据包前,该方法S230C还包括S231C:第一网络节点对该第一数据包进行第一处理操作,例如,该第一处理操作为第一数据包更新BAP层的头信息。例如,第一网络节点接收来自第三网络节点的BAP层配置信息,第一网络节点根据该BAP层配置信息更新第一数据包的BAP层的头信息。具体的,第一网络节点根据该BAP层配置信息,将第一数据包中的BAP层头信息中的BAP路由标识替换为配置的新路由标识,该新的路由标识指向到第二网络节点的传输路径。通过该方式,第一网络节点可以成功将第一数据包发送给第二网络节点。
一种可能的实施方式中,在S230C之前,该方法还包括S220C:第二网络节点更新IP地址过滤规则用于向第三网络节点转发该第一数据包。
第二网络节点更新IP地址过滤规则用于向第三网络节点发送该第一数据包,例如,该更新IP地址过滤规则可以为添加第一数据包的源IP地址到源IP地址过滤规则的白名单中,或者第二网络节点暂时关闭源IP地址过滤规则。这样能够避免出现由于第一数据包的IP地址不属于被允许转发的源IP地址范围,第二网络节点不会转发第一数据包,甚至将第一数据包丢弃的情况。
本方法200C中,第二网络节点具有多种可能的方式获取第一数据包的源IP地址,其中,第一数据包的源IP地址为第一网络节点连接到源宿主DU时的一个或多个IP地址。
一种可能的方式中,第二网络节点接收第一网络节点发送的源IP地址。
另一种可能的方式中,第二网络节点接收第三网络节点发送的源IP地址。可选的,方法200C还包括S221C,第二网络节点接收第三网络节点发送的第一数据包的源IP地址,或者暂停指示信息。暂停指示信息用于指示第二网络节点暂停源IP地址过滤规则,容易理解的,第二网络节点暂时关闭源IP地址过滤规则的实现方式可以参考方法200A中步骤S221A中的描述。
S240C:第二网络节点向第三网络节点发送该第一数据包。
通过方法200C,可以允许在第二网络节点和第三网络节点之间的上行数据包的转发或重路由,避免在重路由过程中该上行数据包被第二网络节点丢弃,使得数据包完成在不同宿主节点之间的重新路由转发,减少数据包的丢失。
如图3所示,本申请又一实施例提供了一种数据无损通信方法,同样也针对如何保障跨IAB宿主拓扑更新过程中的数据包不丢包的问题,与图2A-图2C所示的实施例相比,图3所示方法的设计方案的主要思想为在确保发生切换的IAB节点(例如图1F中的IAB node 3)和其下属节点(例如图1F中的IAB node 4)缓存的所有在途的上行数据包都发送至IAB node3的源父节点之后,IAB node 3才会进行跨IAB宿主的拓扑更新,本实施例以IAB node 3的拓扑更新为进行切换为例介绍,图3所示的实施例方法300中包括:
S310:第三网络节点向第一网络节点发送第一切换命令。
相应的,第一网络节点接收来自第三网络节点的第一切换命令,该第一切换命令指示第一网络节点向第二网络节点切换,该第二网络节点为第一网络节点的目标宿主节点,第三网络节点为第一网络节点的源宿主节点CU,例如,第一切换命令可以携带在RRC重配置消息中。
S320:第一网络节点停止调度下属节点。下属节点包括第一节点的下属网络节点(记为第六网络节点)和/或下属终端。在本申请实施例中,第一网络节点在收到第一切换命令后,可以立刻停止调度接入服务的小区的终端和第六网络节点,也可以立刻停止调度接入服务的小区的终端但是不立刻停止调度第六网络节点。
本申请实施例示例性的给出了两种第一网络节点停止对第六网络节点的上行调度的方式:
停止上行调度方式一:S321:第六网络节点向第一网络节点发送第二传输完成指示信息,第二传输完成指示信息用于指示第四数据包传输完成,第四数据包包括来自第六网络 节点及第六网络节点的下属节点及对应的下属终端的上行数据。可以理解为,第二传输完成指示信息指示了第六网络节点及其下属节点及下属终端中缓存中的所有上行数据都已发送完成。容易理解的,本申请实施例中的第四数据包可以包括一个或多个数据包,该第四数据包可以是一次发送完成的,也可以是多次发送完成的。
可选的,第二传输完成指示信息可以携带在第四数据包中,例如携带在第四数据包中最后一个上行BAP层的数据PDU中,或者携带在BAP层的控制PDU中,示例性的,可以定义一种特殊的BAP控制PDU用于指示该第二传输完成指示信息。可理解的,第二传输完成指示信息也可以是与第四数据包中的最后一个数据包一起发送;或者,第二传输完成指示信息在第四数据包中的最后一个数据包发送完成之后独立发送,例如在单独用第六网络节点发送给第一网络节点的一个BAP层的控制PDU携带该第二传输完成指示信息。第二传输完成指示信息可以是用比特位指示,或者是用特殊字段指示,本申请并不限定。在第四数据包中的一个或多个数据包是多次发送完成的情况下,在第六网络节点发送第二传输完成指示信息之前,第六网络节点向第一网络节点或通过第一网络节点向第三网络节点发送该第四数据包中的一个或多个数据包。
相应的,第一网络节点接收该第二传输完成指示信息后,根据第二传输指示信息停止对第六网络节点的上行调度。
停止上行调度方式二:S322:第一网络节点接收来自第三网络节点的第一停止调度指示信息,该第一停止调度指示信息用于指示第一网络节点停止调度第六网络节点。
相应的,第一网络节点接收该第一停止调度指示信息后,根据第一停止调度指示信息停止对第六网络节点的上行调度。
S330:第一网络节点向第三网络节点发送第三数据包。可选的,可以理解为,第一网络节点通过第五网络节点向第三网络节点发送该第三数据包,第五网络节点为第一网络节点的父节点。第三数据包包括来自第一网络节点和/或第一网络节点的下属节点的上行数据。其中,第三网络节点为源IAB宿主CU。
S340:第一网络节点发送第一传输完成指示信息,该第一传输完成指示信息用于指示第三数据包传输完成,也就是说,第一传输完成指示信息指示发生切换的第一网络节点和其下属节点缓存的所有在途的上行数据包都已发送至第一网络节点的父节点或宿主节点。
可选的,第二传输完成指示信息可以与第三数据包中的最后一个数据包中一起发送,也可以在确定第三数据包全部发送完成之后,独立发送,与上述第二传输完成指示信息发送时机和携带方式类似,可参考上述相关描述。
本申请实施例示例性的给出了两种第一网络节点发送第一传输完成指示信息的方式:
发送第一传输完成指示信息方式一:
S341,第一网络节点向第三网络节点发送第一传输完成指示信息。相应的,第三网络节点接收该第一传输完成指示信息后,方法300还可以包括:S350:第三网络节点向第五网络节点发送第二停止调度指示信息,该第二停止调度指示信息用于指示第五网络节点停止调度第一网络节点。
发送第一传输完成指示信息方式二:
S342,第一网络节点向第五网络节点发送第一传输完成指示信息。相应的,第五网络节点接收该第一传输完成指示信息。
方法300还可以包括:S360:第五网络节点停止调度第一网络节点。容易理解的,第五网络节点停止调度第一网络节点的方式可以是接收到S342中的第一传输完成指示信息后,第五网络节点根据该第一传输完成指示信息停止调度第一网络节点。也可以是,接收到S350中的第二停止调度指示信息,第二网络节点根据该第二停止调度指示信息停止调度第一网络节点。
可选的,S370:第一网络节点执行切换。例如,该切换为:第一网络节点的宿主节点由第三网络节点更改为第二网络节点。
通过上述方法300,第一网络节点在接收到第一切换命令并向父节点传输了缓存中的所有的上行数据包后再发送上行数据传输完成的指示信息,使得第一网络节点确定第一网络节点及其下属节点的上行数据包都成功发送之后,才执行切换,可以保障切换过程中上行数据包的无损传输。
如果发生切换的IAB节点(例如,图1F中的IAB node 3)具有同时与切换前连接的IAB宿主和切换后连接的IAB宿主保持通信的能力,例如,IAB节点支持双连接(dual connectivity,DC)或者双激活协议栈(dual active protocol stack,DAPS),且则在切换过程中,迁移IAB节点可以同时保持与两个IAB宿主之间的数据传输。考虑到IAB节点在无线回传链路是基于BAP层的路由标识执行路由,基于BAP address识别无线回传链路上的目标节点,而IAB宿主DU的BAP address是IAB宿主CU分配的且仅能保障在CU范围内唯一,因此在IAB节点被允许同时连接到多个不同IAB宿主的IAB宿主DU的情况下,一方面需要避免IAB节点对两个宿主之间的混淆,另一方面需要避免在IAB拓扑更新过程中的数据包丢失造成的终端业务的不连续。
如图4所示,为了解决IAB节点具有与多个宿主同时通信能力的情况下可能出现的问题,本申请实施例提出一种数据无损传输方法400,该方法400包括:
S410:第一网络节点执行拓扑更新,该拓扑更新包括第一网络节点更换了连接的IAB宿主DU。例如,第一网络节点连接的IAB宿主DU更换为第二网络节点,第二网络节点可以称为第一网络节点拓扑更新的目标IAB宿主节点DU。
可选的,在S410之前,第一网络节点接收第三网络节点发送的切换命令。
S420:第一网络节点具有与多个宿主节点通信的能力。也就是说,第一网络节点具有同时与第三网络节点(源IAB宿主CU)之间进行通信的路径,记为旧路径或第一路径,以及与第二网络节点(目标IAB宿主DU)之间通信的路径,记为新路径或第二路径,容易理解的,第一网络节点通过第二路径也可以与目标IAB宿主CU之间通信。
为避免IAB节点混淆不同的IAB宿主DU,IAB宿主CU,例如第三网络节点,分配给IAB宿主DU的BAP地址中携带用于区分宿主CU的识别信息,例如,该识别信息为宿主CU关联的标识。
为避免IAB拓扑更新过程中的数据包丢失问题,方法400中提出了两种可能的实现方式:
避免IAB拓扑更新过程中的数据包丢失的实现方式一:
S430:第一网络节点通过第二路径发送第一数据包。
第一网络节点将待向第三网络节点或第三网络节点侧的安全网关设备发送的第一数据 包发送至第二网络节点之后,再由第二网络节点向第三网络节点发送。
容易理解的,步骤S430中具体实现的方式可以参考方法200A中的介绍。
避免IAB拓扑更新过程中的数据包丢失的实现方式二:
S440:第一网络节点通过第一路径发送第一数据包。
因为第一网络节点完成拓扑更新后具备与第三网络节点通信的能力,第一网络节点可以通过第一路径向第三网络节点发送该第一数据包。
方法400还提出了第一网络节点断开第一路径的实现方式,也就是说,第一网络节点可以断开和第三网络节点(或源宿主节点,或源父节点)之间的连接。容易理解的,需要在IAB节点将下属IAB节点上以及自己缓存的所有BAP层的目标地址为第三网络节点、源宿主节点、源父节点,或源IAB宿主DU的上行数据包成功发送至源父节点之后,才可以允许IAB节点和其源父节点之间断开连接。
方法400还包括:
一种可能的方式中,第一网络节点及其下属IAB节点中的每个IAB节点上行数据传输完成之后,向第三网络节点发送第一指示信息,用于指示该IAB节点处的上行数据传输完成,第三网络节点接收到第一网络节点及其下属IAB节点发送的第一指示信息后,确定第一网络节点及其下属IAB节点需要经由第一路径传输的上行数据包已经传输完成。具体的,该方法包括
S450A:第一网络节点向第三网络节点发送第一指示信息,该第一指示信息用于指示第一网络节点的上行数据包传输完成。可选的,该第一指示信息通过RRC消息发送,或者通过F1AP消息发送。
为了便于表述,本申请实施例假设,第一网络节点有N个下属IAB节点,N个下属IAB节点中每一个下属IAB节点在上行数据传输完成之后向第三网络节点发送第一指示信息,该第一指示信息用于指示该下属IAB节点的上行数据包传输完成,N为正整数。
相应的,第三网络节点接收来自第一网络节点及第一网络节点的N个下属IAB节点的第一指示信息,第三网络节点接收到N+1个第一指示信息后,根据该N+1个第一指示信息确定第一网络节点和第一网络节点的下属节点的上行数据包传输完成。也就是说,第三网络节点确定第一网络节点及其下属IAB节点需要经由第一路径传输的上行数据包已经传输完成。
S460:第三网络节点确定断开第一路径。
另一种可能的方式中,第一网络节点的N个下属IAB节点中的每个IAB节点上行数据传输完成之后,向第一网络节点发送第二指示信息,用于指示该下属IAB节点处的上行数据传输完成,第一网络节点接收到N个下属IAB节点发送的N个第二指示信息后,确定下属IAB节点需要经由第一路径传输的上行数据包已经传输完成。并且,第一网络节点在确定自身的上行数据已经传输完成之后,第一网络节点向第三网络节点发送第三指示信息,该第三指示信息指示第一网络节点及其下属IAB节点需要经由第一路径传输的上行数据包已经传输完成。具体的,该方式下,方法400包括:
S450B:第一网络节点接收N个下属IAB节点发送的N个第二指示信信息,第二指示信息与下属IAB节点具有对应关系,该第一指示信息用于指示该下属IAB节点处的上行数据 传输完成。
第一网络节点确定自身的上行数据已经传输完成之后,第一网络节点向第三网络节点发送第三指示信息,该第三指示信息指示第一网络节点及其下属IAB节点需要经由第一路径传输的上行数据包已经传输完成。
相应的,第三网络节点接收来自第一网络节点的第三指示信息,该第三指示信息指示第一网络节点及其下属IAB节点需要经由第一路径传输的上行数据包已经传输完成。
S460:第三网络节点确定断开第一路径。
容易理解的,本申请实施例中,S460中第三网络节点确定断开第一路径,有多种可能的实现方式,例如:
断开第一路径的方式一:
S470:第三网络节点向第五网络节点(第一网络节点的源父节点)发送第四指示信息,该第四指示信息用于指示停止对第一网络节点的调度,并释放第一网络节点的上下文。也就是说,第五指示信息用于指示第五网络节点释放与第一网络节点之间的连接。
断开第一路径的方式二:
S480:第三网络节点向第一网络节点发送第五指示信息,该第五指示信息用于通知第一网络节点释放与源父节点的连接。例如,第一网络节点根据该第五指示信息释放源父节点服务的小区。也就是说,第五指示信息用于指示释放与第五网络节点之间的连接。
容易理解的,方法400中的步骤之间并不严格限定执行的顺序,且为了解决不同的问题,可适当调整步骤执行的顺序,另外,方法400中提供了多个可选的方式,该方式对应的步骤对应也是可选的。
通过上述方法400,可以在IAB节点支持与多个宿主节点保持多连接的情况下,保障IAB节点在跨CU的切换场景中的数据无损传输。
可以理解的,本申请上述各个方法实施例中,这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或者各种操作的变形。此外,各个步骤可以按照本申请实施例呈现的不同的顺序来执行,并且有可能并非要执行本申请实施例中的全部操作。
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。相应的,本申请实施例还提供了通信装置,该通信装置用于实现上述各种方法。该通信装置可以为上述各个方法实施例中所涉及到的网络节点,或者包含上述网络节点的装置,或者为可用于网络节点的部件(芯片或者电路);或者,该通信装置可以为上述各个方法实施例中所涉及到的终端设备,或者包含上述终端设备的装置,或者为可用于终端设备的部件;或者,该通信装置还可以为上述各个方法实施例中所涉及到的网关设备,或者为可用于网关设备的部件。可以理解的是,该通信装置为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。本领域技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法实施例中对通信装置进行功能模块的划分,例如,可 以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
图5是本申请实施例提供的一种通信装置500的示意性框图,下面将结合图5,对通信装置500的结构和功能进行具体的描述。该通信装置500,可以包括:处理模块510(或称为处理单元)。可选的还可以包括收发模块520(或称为收发单元或通信接口)和存储模块530(或称为存储单元)。
在一种可能的设计中,如图5中的一个或者多个模块可能由一个或者多个处理器来实现,或者由一个或者多个处理器和存储器来实现;或者由一个或多个处理器和收发器实现;或者由一个或者多个处理器、存储器和收发器实现,本申请实施例对此不作限定。所述处理器、存储器、收发器可以单独设置,也可以集成。
可选的,本申请实施例中的装置500中各个模块可以用于执行本申请实施例中图2A至图2C、图3或图4描述的方法。
在一种可能的设计中,一种装置500可包括:收发模块520和处理模块510。收发模块520用于接收来自第一网络节点的第一数据包,第二网络节点为第一网络节点的目标宿主节点分布式单元DU,第一数据包的目的节点为第三网络节点或者为所述第三网络节点侧的安全网关,第三网络节点为第一网络节点的源宿主节点或源宿主节点集中式单元CU;收发模块520还用于向第三网络节点发送第一数据包。
通过该装置可以支持IAB节点的跨宿主DU的数据包重新路由转发,避免了第一网络节点拓扑更新过程中的数据包丢失,减少了对第一网络节点下的终端上行业务连续性的影响。
可选的,处理模块510用于更新互联网协议IP地址过滤规则用于向所述第三网络节点发送所述第一数据包。
可选的,收发模块520还用于获取第一IP地址,第一IP地址为所述第一网络节点在连接到所述第三网络节点时所获取的一个或多个IP地址。可选的,处理模块510还用于根据所述第一IP地址更新所述IP地址过滤规则。
可选的,处理模块510还用于该第一IP地址添加到源IP地址过滤规则的白名单中。
可选的,收发模块520还用于接收来自所述第三网络节点的第一IP地址。
可选的,收发模块520还用于接收来自第四网络节点的所述第一IP地址。
可选的,收发模块520还用于接收来自第四网络节点的第一暂停指示信息,该第一暂停指示信息用于指示所述第二网络节点暂停所述IP地址过滤规则。
可选的,处理模块510还用于封装第一数据包。
在另一种可能的设计中,一种装置500可包括:收发模块520和处理模块510。处理模块510用于确定第一数据包,第一数据包的目的节点为第三网络节点或第三网络节点侧的安全网关。
可选的,处理模块510还用于更新第一数据包的回传适配协议层配置用于向第二网络节点发送所述第一数据包。
可选的,处理模块510还用于为所述第一数据包添加第二IP头,所述第二IP头的目标IP地址为第四网络节点的IP地址。
可选的,收发模块520还用于向所述第四网络节点发送第一IP地址,所述第一IP地址为所述第一网络节点在连接到所述第三网络节点时所获取的一个或多个IP地址。
可选的,处理模块510还用于执行拓扑更新。
在另一种可能的设计中,一种装置500可包括:收发模块520和处理模块510。处理模块510用于确定第一消息。收发模块520用于向第二网络节点发送第一消息,所述第一消息用于所述第二网络节点更新IP地址过滤规则。可选的,处理模块510还用于获取第一IP地址,所述第一IP地址为所述第一网络节点在连接到第三网络节点时所获取的一个或多个IP地址。
可选的,收发模块520还用于接收来自第三网络节点的第一IP地址。
可选的,收发模块520还用于接收来自所述第一网络节点的第一IP地址。
可选的,收发模块520还用于接收来自AMF的第一IP地址。
可选的,处理模块510还用于确定第一暂停指示信息,所述第一暂停指示信息用于指示所述第二网络节点暂停所述IP地址过滤规则。可选的,收发模块520还用于接收来自所述第二网络节点的第二数据包,所述第二数据包包括第一IP头和第二IP头,所述第一IP头的目标IP地址为所述第三网络节点,所述第二IP头的目标IP地址为所述第四网络节点的IP地址。
可选的,收发模块520还用于向所述第三网络节点发送第一数据包。可选的,收发模块520还用于接收来自所述第三网络节点的在所述第一数据包中与所述第一网络节点服务的终端设备相关的数据。在另一种可能的设计中,一种装置500可包括:收发模块520和处理模块510。收发模块520用于获取第一数据包,第一数据包为第一网络节点连接到第二网络节点之后待向所述第三网络节点发送的数据包。
可选的,处理模块510用于处理第一数据包。可选的,收发模块520还用于接收来自第四网络节点的第一数据包。
可选的,处理模块510还用于根据所述第一数据包确定与所述第一网络节点服务的终端设备相关的数据。可选的,收发模块520还用于向所述第四网络节点发送所述终端设备相关的数据。在另一种可能的设计中,一种装置500可包括:收发模块520和处理模块510。收发模块520用于接收来自第三网络节点的第一切换命令。可选的,收发模块520还用于发送第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成。
可选的,处理模块510还用于确定进行拓扑更新。
可选的,收发模块520还用于向第五网络节点发送所述第一传输完成指示信息。可选的,收发模块520还用于向所述第三网络节点发送所述第三数据包。可选的,处理模块510还用于停止对第六网络节点的上行调度。
在另一种可能的设计中,一种装置500可包括:收发模块520和处理模块510。收发模块520用于接收传输指示信息,所述传输指示信息用于指示停止对第一网络节点的上行调度。处理模块510用于根据所述传输指示信息确定停止对所述第一网络节点的上行调度。可选的,收发模块520还用于接收来自所述第一网络节点的第一传输完成指示信息。
可选的,收发模块520还用于接收来自第三网络节点的所述第二停止调度指示信息。
在另一种可能的设计中,一种装置500可包括:收发模块520和处理模块510。收发模块520用于接收来自第一网络节点的第一传输完成指示信息。收发模块520还用于向第五网络节点发送第二停止调度指示信息。
图6给出了一种装置的结构示意图。所述装置600可以是网络设备、终端设备、服务器或集中控制器,也可以是支持网络设备、终端设备、服务器或集中控制器实现上述方法的芯片、芯片系统、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
所述装置600可以包括一个或多个处理器610,所述处理器610也可以称为处理单元,可以实现一定的控制功能。所述处理器610可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,终端、终端芯片,DU或CU等)进行控制,执行软件程序,处理软件程序的数据。
在一种可选的设计中,处理器610也可以存有指令和/或数据630,所述指令和/或数据630可以被所述处理器运行,使得所述装置600执行上述方法实施例中描述的方法。
在另一种可选的设计中,处理器610中可以包括用于实现接收和发送功能的收发单元。例如该收发单元可以是收发电路,或者是接口,或者是接口电路,或者是通信接口。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在又一种可能的设计中,装置600可以包括电路,所述电路可以实现前述方法实施例中发送或接收或者通信的功能。
可选的,所述装置600中可以包括一个或多个存储器620,其上可以存有指令640,所述指令可在所述处理器上被运行,使得所述装置600执行上述方法实施例中描述的方法。可选的,所述存储器中还可以存储有数据。可选的,处理器中也可以存储指令和/或数据。所述处理器和存储器可以单独设置,也可以集成在一起。例如,上述方法实施例中所描述的对应关系可以存储在存储器中,或者存储在处理器中。
可选的,所述装置600还可以包括收发器650和/或天线660。所述处理器610可以称为处理单元,对所述装置600进行控制。所述收发器650可以称为收发单元、收发机、收发电路、收发装置或收发模块等,用于实现收发功能。
可选的,本申请实施例中的装置600可以用于执行本申请实施例中图2A至图2C、图3或图4中描述的方法。
本申请中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(Bipolar Junction Transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的装置可以是网络设备或者终端设备,但本申请中描述的装置的范围并不限于此,而且装置的结构可以不受图6的限制。装置可以是独立的设备或者可以是较大设备的一部分。例如所述装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片系统或子系统;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据和/或指令的存储部件;
(3)ASIC,例如调制解调器(MSM);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端、智能终端、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备、机器设备、家居设备、医疗设备、工业设备等等;
(6)其他等等。
本领域普通技术人员可以理解,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
可以理解,本申请中描述的系统、装置和方法也可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
可以理解的是,本申请实施例中的一些可选的特征,在某些场景下,可以不依赖于其他特征,比如其当前所基于的方案,而独立实施,解决相应的技术问题,达到相应的效果,也可以在某些场景下,依据需求与其他特征进行结合。相应的,本申请实施例中给出的装置也可以相应的实现这些特征或功能,在此不予赘述。
本领域技术人员还可以理解到本申请实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员对于相应的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本申请实施例保护的范围。
可以理解,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软 件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其它可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。
本申请所描述的方案可通过各种方式来实现。例如,这些技术可以用硬件、软件或者硬件结合的方式来实现。对于硬件实现,用于在通信装置(例如,基站,终端、网络实体、或芯片)处执行这些技术的处理单元,可以实现在一个或多个通用处理器、DSP、数字信号处理器件、ASIC、可编程逻辑器件、FPGA、或其它可编程逻辑装置,离散门或晶体管逻辑,离散硬件部件,或上述任何组合中。通用处理器可以为微处理器,可选地,该通用处理器也可以为任何传统的处理器、控制器、微控制器或状态机。处理器也可以通过计算装置的组合来实现,例如数字信号处理器和微处理器,多个微处理器,一个或多个微处理器联合一个数字信号处理器核,或任何其它类似的配置来实现。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请还提供了一种计算机可读介质,其上存储有计算机程序,该计算机程序被计算机执行时实现上述任一方法实施例的功能。
本申请还提供了一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如, 高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
可以理解,说明书通篇中提到的“实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各个实施例未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。可以理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
可以理解,在本申请中,“当…时”、“若”以及“如果”均指在某种客观情况下装置会做出相应的处理,并非是限定时间,且也不要求装置实现时一定要有判断的动作,也不意味着存在其它限定。
本申请中的“同时”可以理解为在相同的时间点,也可以理解为在一段时间段内,还可以理解为在同一个周期内。
本领域技术人员可以理解:本申请中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围。本申请中的编号(也可被称为索引)的具体取值、数量的具体取值、以及位置仅作为示意的目的,并不是唯一的表示形式,也并不用来限制本申请实施例的范围。本申请中涉及的第一个、第二个等各种数字编号也仅为描述方便进行的区分,并不用来限制本申请实施例的范围。
本申请中对于使用单数表示的元素旨在用于表示“一个或多个”,而并非表示“一个且仅一个”,除非有特别说明。本申请中,在没有特别说明的情况下,“至少一个”旨在用于表示“一个或者多个”,“多个”旨在用于表示“两个或两个以上”。
另外,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“……中的至少一个”或“……中的至少一种”,表示所列出的各项的全部或任意组合,例如,“A、B和C中的至少一种”,可以表示:单独存在A,单独存在B,单独存在C,同时存在A和B,同时存在B和C,同时存在A、B和C这六种情况,其中A可以是单数或者复数,B可以是单数或者复数,C可以是单数或者复数。
可以理解,在本申请各实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
本领域普通技术人员可以理解,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请中各个实施例之间相同或相似的部分可以互相参考。在本申请中各个实施例、以及各实施例中的各个实施方式/实施方法/实现方法中,如果没有特殊说明以及逻辑冲突,不同的实施例之间、以及各实施例中的各个实施方式/实施方法/实现方法之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例、以及各实施例中的各个实施方式/实施方法/实现方法中的技术特征根据其内在的逻辑关系可以组合形成新的实施例、实施方式、实 施方法、或实现方法。以上所述的本申请实施方式并不构成对本申请保护范围的限定。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。

Claims (88)

  1. 一种通信方法,其特征在于,包括:
    第二网络节点接收来自第一网络节点的第一数据包,所述第二网络节点为所述第一网络节点的目标宿主节点分布式单元DU,所述第一数据包的目的节点为第三网络节点或者为所述第三网络节点侧的安全网关,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点集中式单元CU;
    所述第二网络节点向所述第三网络节点发送所述第一数据包。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    所述第二网络节点更新互联网协议IP地址过滤规则用于向所述第三网络节点发送所述第一数据包。
  3. 根据权利要求2所述的方法,其特征在于,所述第二网络节点更新IP地址过滤规则包括:
    所述第二网络节点获取第一IP地址,所述第一IP地址为所述第一网络节点在连接到所述第三网络节点时所获取的一个或多个IP地址;
    所述第二网络节点根据所述第一IP地址更新所述IP地址过滤规则。
  4. 根据权利要求3所述的方法,其特征在于,所述第二网络节点获取第一IP地址包括:
    所述第二网络节点接收来自所述第三网络节点的所述第一IP地址。
  5. 根据权利要求3所述的方法,其特征在于,所述第二网络节点获取第一IP地址包括:
    所述第二网络节点接收来自第四网络节点的所述第一IP地址,所述第四网络节点为所述第一网络节点的目标宿主集中式单元CU。
  6. 根据权利要求2所述的方法,其特征在于,所述第二网络节点更新IP地址过滤规则包括:
    所述第二网络节点接收来自第四网络节点的第一暂停指示信息,所述第一暂停指示信息用于指示所述第二网络节点暂停所述IP地址过滤规则,所述第四网络节点为所述第一网络节点的目标宿主CU。
  7. 根据权利要求1至6任一项所述的方法,其特征在于,第二数据包封装了所述第一数据包,所述第二数据包包括第一IP头和第二IP头,所述第一IP头的目标IP地址为所述第三网络节点的IP地址或者所述第三网络节点侧的安全网关的IP地址,所述第二IP头的目标IP地址为所述第四网络节点的IP地址;
    所述第二网络节点根据所述第二IP头向所述第四网络节点发送所述第二数据包,以使得所述第四网络节点向所述第三网络节点发送所述第一数据包。
  8. 根据权利要求7所述的方法,其特征在于,所述第二数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述第四网络节点移除所述第二IP头。
  9. 根据权利要求7或8所述的方法,其特征在于,所述第二IP头为所述第二网络节点为所述第一数据包添加的,或者所述第二IP头为所述第一网络节点为所述第一数据包添加的。
  10. 根据权利要求1至9任一项所述的方法,其特征在于,所述第二网络节点接收来自所述第一网络节点的所述第一数据包之前,所述第一网络节点完成了拓扑更新。
  11. 一种通信方法,其特征在于,包括:
    第一网络节点确定第一数据包,所述第一数据包的目的节点为第三网络节点或第三网络节点侧的安全网关,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU;
    所述第一网络节点向第二网络节点发送所述第一数据包,所述第二网络节点为所述第一网络节点的目标宿主节点DU。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    所述第一网络节点更新所述第一数据包的回传适配协议BAP层配置用于向所述第二网络节点发送所述第一数据包。
  13. 根据权利要求11或12所述的方法,其特征在于,所述方法还包括:
    所述第一网络节点为所述第一数据包添加第二IP头,所述第二IP头的目标IP地址为第四网络节点的IP地址,所述第四网络节点为所述第一网络节点的目标宿主集中式单元CU。
  14. 根据权利要求13所述的方法,其特征在于,所述第一数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述第四网络节点移除所述第二IP头。
  15. 根据权利要求11至14任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网络节点向所述第四网络节点发送第一IP地址,所述第一IP地址为所述第一网络节点在连接到所述第三网络节点时所获取的一个或多个IP地址。
  16. 根据权利要求11至15任一项所述的方法,其特征在于,所述第一网络节点确定所述第一数据包之前,所述方法还包括:
    所述第一网络节点执行拓扑更新。
  17. 一种通信方法,其特征在于,包括:
    第四网络节点确定第一消息,所述第四网络节点为第一网络节点的目标宿主节点CU;
    所述第四网络节点向第二网络节点发送第一消息,所述第一消息用于所述第二网络节点更新IP地址过滤规则,所述第二网络节点为所述第一网络节点的目标宿主节点DU。
  18. 根据权利要求17所述的方法,其特征在于,所述第四网络节点确定第一消息包括:
    所述第四网络节点获取第一IP地址,所述第一IP地址为所述第一网络节点在连接到第三网络节点时所获取的一个或多个IP地址,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU;
    所述第四网络节点向第二网络节点发送第一消息包括:
    所述第一消息包括所述第一IP地址。
  19. 根据权利要求18所述的方法,所述第四网络节点获取第一IP地址包括:
    所述第四网络节点接收来自所述第三网络节点的所述第一IP地址;或者,
    所述第四网络节点接收来自所述第一网络节点的所述第一IP地址;或者,
    所述第四网络节点接收来自接入和移动性管理功能AMF的所述第一IP地址。
  20. 根据权利要求17所述的方法,其特征在于,所述第四网络节点确定第一消息包括:
    所述第四网络节点确定第一暂停指示信息,所述第一暂停指示信息用于指示所述第二网络节点暂停所述IP地址过滤规则;
    所述第四网络节点向第二网络节点发送第一消息包括:
    所述第一消息包括所述第一暂停指示信息。
  21. 根据权利要求17至20任一项所述的方法,其特征在于,所述方法还包括:
    所述第四网络节点接收来自所述第二网络节点的第二数据包,所述第二数据包包括第一IP头和第二IP头,所述第一IP头的目标IP地址为所述第三网络节点,所述第二IP头的目标IP地址为所述第四网络节点的IP地址;
    所述第四网络节点向所述第三网络节点发送第一数据包,所述第一数据包为所述第四网络节点对所述第二数据包处理后的数据包,所述第一数据包不包括所述第二IP头。
  22. 根据权利要求21所述的方法,其特征在于,所述方法还包括:
    所述第一数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述第四网络节点移除所述第二IP头后根据所述第一IP头向所述第三网络节点转发所述第一数据包。
  23. 根据权利要求17至22任一项所述的方法,其特征在于,所述第四网络节点接收来自所述第三网络节点的在所述第一数据包中与所述第一网络节点服务的终端设备相关的数据。
  24. 一种通信方法,其特征在于,包括:
    第三网络节点获取第一数据包,所述第一数据包为第一网络节点连接到第二网络节点之后待向所述第三网络节点发送的数据包;
    所述第三网络节点处理所述第一数据包;
    其中,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU,所述第二网络节点为所述第一网络节点的目标宿主节点DU。
  25. 根据权利要求24所述的方法,其特征在于,所述第三网络节点获取第一数据包包括:
    所述第三网络节点接收来自第四网络节点的所述第一数据包,所述第一数据包为所述第四网络节点对来自所述第二网络节点的第二数据包处理后的数据包,所述第二数据包封装了所述第一数据包;或者,
    所述第三网络节点接收来自第二网络节点的所述第一数据包。
  26. 根据权利要求24或25所述的方法,其特征在于,所述第三网络节点处理所述第一数据包包括:
    所述第三网络节点根据所述第一数据包确定与所述第一网络节点服务的终端设备相关的数据;
    所述第三网络节点向所述第四网络节点发送所述终端设备相关的数据。
  27. 根据权利要求24至26任一项所述的方法,其特征在于,所述终端设备相关的数据为所述终端设备的分组数据汇聚层协议PDCP业务数据单元SDU。
  28. 一种通信方法,其特征在于,包括:
    第一网络节点接收来自第三网络节点的第一切换命令,所述第一切换命令用于指示所述第一网络节点进行切换,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU;
    所述第一网络节点发送第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端。
  29. 根据权利要求28所述的方法,其特征在于,所述方法还包括:
    所述第一网络节点向所述第三网络节点发送所述第三数据包。
  30. 根据权利要求28或29所述的方法,其特征在于,所述方法还包括:
    所述第一网络节点停止对第六网络节点的上行调度,所述第六网络节点为所述第一网络节点的下属网络节点。
  31. 根据权利要求30所述的方法,其特征在于,所述停止对第六网络节点的上行调度包括:
    所述第一网络节点接收来自所述第六网络节点的第二传输完成指示信息,所述第二传输完成指示信息用于指示第四数据包传输完成,所述第四数据包包括来自所述第六网络节点及所述第六网络节点的下属节点的上行数据;
    所述第一网络节点根据所述第二传输指示信息停止对所述第六网络节点的上行调度。
  32. 根据权利要求30所述的方法,其特征在于,所述停止对第六网络节点的上行调度包括:
    所述第一网络节点接收来自所述第三网络节点的第一停止调度指示信息;
    所述第一网络节点根据所述第一停止调度指示信息停止对所述第六网络节点的上行调度。
  33. 根据权利要求28至32任一项所述的方法,其特征在于,所述第一网络节点发送第一传输完成指示信息包括:
    所述第一网络节点向所述第三网络节点发送所述第一传输完成指示信息。
  34. 根据权利要求30至32任一项所述的方法,其特征在于,所述第一网络节点发送第一传输完成指示信息包括:
    所述第一网络节点向第五网络节点发送所述第一传输完成指示信息,所述第五网络节点为所述第一网络节点提供接入和回传服务。
  35. 根据权利要求28至34任一项所述的方法,其特征在于,所述第一网络节点接收来自所述第三网络节点的所述第一切换命令之后,所述方法还包括:
    所述第一网络节点停止对终端设备的上行调度,所述第一网络节点为所述终端设备提供接入和回传服务。
  36. 根据权利要求28至35任一项所述的方法,其特征在于,所述第一传输完成指示信息承载于所述第三数据包中,或者,所述第一传输完成指示信息承载于回传适配协议BAP层的控制协议数据单元PDU中。
  37. 一种通信方法,其特征在于,包括:
    第五网络节点接收传输指示信息,所述传输指示信息用于指示停止对第一网络节点的上行调度,所述第五网络节点为所述第一网络节点提供接入和回传服务;
    所述第五网络节点根据所述传输指示信息确定停止对所述第一网络节点的上行调度。
  38. 根据权利要求37所述的方法,其特征在于,所述第五网络节点接收传输指示信息 包括:
    所述第五网络节点接收来自所述第一网络节点的第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端;
    所述第五网络节点根据所述第一传输完成指示信息确定停止对所述第一网络节点的上行调度。
  39. 根据权利要求37所述的方法,其特征在于,所述第五网络节点接收传输指示信息包括:
    所述第五网络节点接收来自第三网络节点的所述第二停止调度指示信息,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU。
  40. 根据权利要求39所述的方法,其特征在于,所述第二停止调度指示信息包含于第二切换命令中,所述第二切换命令用于指示所述第五网络节点进行切换。
  41. 一种通信方法,其特征在于,包括:
    第三网络节点接收来自第一网络节点的第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端;
    所述第三网络节点向第五网络节点发送第二停止调度指示信息,所述第二停止调度指示信息用于指示所述第五网络节点停止对所述第一网络节点的上行调度,所述第五网络节点为所述第一网络节点提供接入和回传服务。
  42. 根据权利要求41所述的方法,其特征在于,所述第一传输完成指示信息承载于所述上行数据中,或者,所述第一传输完成指示信息承载于RRC消息或者F1AP消息中。
  43. 根据权利要求41所述的方法,其特征在于,所述第二停止调度指示信息包含于第二切换命令中,所述第二切换命令用于指示所述第五网络节点进行切换。
  44. 一种通信装置,其特征在于,包括:处理模块和收发模块;
    所述收发模块用于接收来自第一网络节点的第一数据包,所述装置为所述第一网络节点的目标宿主节点分布式单元DU,所述第一数据包的目的节点为第三网络节点或者为所述第三网络节点侧的安全网关,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点集中式单元CU;
    所述收发模块还用于向所述第三网络节点发送所述第一数据包。
  45. 根据权利要求44所述的装置,其特征在于:
    所述处理模块用于更新互联网协议IP地址过滤规则用于向所述第三网络节点发送所述第一数据包。
  46. 根据权利要求45所述的装置,其特征在于,所述处理模块更新IP地址过滤规则包括:
    所述收发模块还用于获取第一IP地址,所述第一IP地址为所述第一网络节点在连接到所述第三网络节点时所获取的一个或多个IP地址;
    所述处理模块还用于根据所述第一IP地址更新所述IP地址过滤规则。
  47. 根据权利要求46所述的装置,其特征在于,所述收发模块还用于获取第一IP地址包括:
    所述收发模块还用于接收来自所述第三网络节点的所述第一IP地址。
  48. 根据权利要求46所述的装置,其特征在于,所述收发模块还用于获取第一IP地址包括:
    所述收发模块还用于接收来自第四网络节点的所述第一IP地址,所述第四网络节点为所述第一网络节点的目标宿主集中式单元CU。
  49. 根据权利要求45所述的装置,其特征在于,所述处理模块还用于更新IP地址过滤规则包括:
    所述收发模块还用于接收来自第四网络节点的第一暂停指示信息,所述第一暂停指示信息用于指示所述装置暂停所述IP地址过滤规则,所述第四网络节点为所述第一网络节点的目标宿主CU。
  50. 根据权利要求44至49任一项所述的装置,其特征在于,所述处理模块还用于封装所述第一数据包,所述第二数据包包括第一IP头和第二IP头,所述第一IP头的目标IP地址为所述第三网络节点的IP地址或者所述第三网络节点侧的安全网关的IP地址,所述第二IP头的目标IP地址为所述第四网络节点的IP地址;
    所述收发模块还用于根据所述第二IP头向所述第四网络节点发送所述第二数据包,以使得所述第四网络节点向所述第三网络节点发送所述第一数据包。
  51. 根据权利要求50所述的装置,其特征在于,所述第二数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述第四网络节点移除所述第二IP头。
  52. 根据权利要求50或51所述的装置,其特征在于,所述第二IP头为所述处理模块为所述第一数据包添加的,或者所述第二IP头为所述第一网络节点为所述第一数据包添加的。
  53. 根据权利要求44至52任一项所述的装置,其特征在于,所述收发模块用于接收来自所述第一网络节点的所述第一数据包之前,所述第一网络节点完成了拓扑更新。
  54. 一种通信装置,其特征在于,包括:处理模块和收发模块;
    所述处理模块用于确定第一数据包,所述第一数据包的目的节点为第三网络节点或第三网络节点侧的安全网关,所述第三网络节点为所述装置的源宿主节点或源宿主节点CU;
    所述收发模块用于向第二网络节点发送所述第一数据包,所述第二网络节点为所述装置的目标宿主节点DU。
  55. 根据权利要求54所述的装置,其特征在于,所述处理模块还用于更新所述第一数据包的回传适配协议BAP层配置用于向所述第二网络节点发送所述第一数据包。
  56. 根据权利要求54或55所述的装置,其特征在于,所述处理模块还用于为所述第一数据包添加第二IP头,所述第二IP头的目标IP地址为第四网络节点的IP地址,所述第四网络节点为所述装置的目标宿主集中式单元CU。
  57. 根据权利要求56所述的装置,其特征在于,所述第一数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述第四网络节点移除所述第二IP头。
  58. 根据权利要求54至57任一项所述的装置,其特征在于,所述收发模块还用于向所述第四网络节点发送第一IP地址,所述第一IP地址为所述装置在连接到所述第三网络节 点时所获取的一个或多个IP地址。
  59. 根据权利要求54至58任一项所述的装置,其特征在于,所述处理模块用于确定所述第一数据包之前,所述处理模块还用于执行拓扑更新。
  60. 一种通信装置,其特征在于,包括:处理模块和收发模块;
    所述处理模块用于确定第一消息,所述装置为第一网络节点的目标宿主节点CU;
    所述收发模块用于向第二网络节点发送第一消息,所述第一消息用于所述第二网络节点更新IP地址过滤规则,所述第二网络节点为所述第一网络节点的目标宿主节点DU。
  61. 根据权利要求60所述的装置,其特征在于,所述处理模块用于确定第一消息包括:
    所述收发模块还用于获取第一IP地址,所述第一IP地址为所述第一网络节点在连接到第三网络节点时所获取的一个或多个IP地址,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU;
    所述收发模块还用于向第二网络节点发送第一消息包括:
    所述第一消息包括所述第一IP地址。
  62. 根据权利要求61所述的装置,所述收发模块还用于获取第一IP地址包括:
    所述收发模块还用于接收来自所述第三网络节点的所述第一IP地址;或者,
    所述收发模块还用于接收来自所述第一网络节点的所述第一IP地址;或者,
    所述收发模块还用于接收来自接入和移动性管理功能AMF的所述第一IP地址。
  63. 根据权利要求60所述的装置,其特征在于,所述处理模块用于确定第一消息包括:
    所述处理模块还用于确定第一暂停指示信息,所述第一暂停指示信息用于指示所述第二网络节点暂停所述IP地址过滤规则;
    所述收发模块还用于向第二网络节点发送第一消息包括:
    所述第一消息包括所述第一暂停指示信息。
  64. 根据权利要求60至63任一项所述的装置,其特征在于,所述收发模块还用于接收来自所述第二网络节点的第二数据包,所述第二数据包包括第一IP头和第二IP头,所述第一IP头的目标IP地址为所述第三网络节点,所述第二IP头的目标IP地址为所述装置的IP地址;
    所述收发模块还用于向所述第三网络节点发送第一数据包,所述第一数据包为所述装置对所述第二数据包处理后的数据包,所述第一数据包不包括所述第二IP头。
  65. 根据权利要求64所述的装置,其特征在于,所述第一数据包还包括第一移除指示信息,所述第一移除指示信息用于指示所述装置移除所述第二IP头后根据所述第一IP头向所述第三网络节点转发所述第一数据包。
  66. 根据权利要求60至65任一项所述的装置,其特征在于,所述收发模块还用于接收来自所述第三网络节点的在所述第一数据包中与所述第一网络节点服务的终端设备相关的数据。
  67. 一种通信装置,其特征在于,包括:处理模块和收发模块;
    所述处理模块用于获取第一数据包,所述第一数据包为第一网络节点连接到第二网络节点之后待向所述装置发送的数据包;
    所述处理模块还用于处理所述第一数据包;
    其中,所述装置为所述第一网络节点的源宿主节点或源宿主节点CU,所述第二网络节 点为所述第一网络节点的目标宿主节点DU。
  68. 根据权利要求67所述的装置,其特征在于,所述处理模块用于获取第一数据包包括:
    所述收发模块用于接收来自第四网络节点的所述第一数据包,所述第一数据包为所述第四网络节点对来自所述第二网络节点的第二数据包处理后的数据包,所述第二数据包封装了所述第一数据包;或者,
    所述收发模块还用于接收来自第二网络节点的所述第一数据包。
  69. 根据权利要求67或68所述的装置,其特征在于,所述处理模块用于处理所述第一数据包包括:
    所述处理模块还用于根据所述第一数据包确定与所述第一网络节点服务的终端设备相关的数据;
    所述收发模块还用于向所述第四网络节点发送所述终端设备相关的数据。
  70. 根据权利要求67至69任一项所述的装置,其特征在于,所述终端设备相关的数据为所述终端设备的分组数据汇聚层协议PDCP业务数据单元SDU。
  71. 一种通信装置,其特征在于,包括:处理模块和收发模块;
    所述收发模块用于接收来自第三网络节点的第一切换命令,所述第一切换命令用于指示所述装置进行切换,所述第三网络节点为所述装置的源宿主节点或源宿主节点CU;
    所述收发模块还用于发送第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述装置和所述装置的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端;
    所述处理模块用于进行切换。
  72. 根据权利要求71所述的装置,其特征在于,所述收发模块还用于向所述第三网络节点发送所述第三数据包。
  73. 根据权利要求71或72所述的装置,其特征在于,所述处理模块还用于停止对第六网络节点的上行调度,所述第六网络节点为所述装置的下属网络节点。
  74. 根据权利要求73所述的装置,其特征在于,所述处理模块还用于停止对第六网络节点的上行调度包括:
    所述收发模块还用于接收来自所述第六网络节点的第二传输完成指示信息,所述第二传输完成指示信息用于指示第四数据包传输完成,所述第四数据包包括来自所述第六网络节点及所述第六网络节点的下属节点的上行数据;
    所述处理模块还用于根据所述第二传输指示信息停止对所述第六网络节点的上行调度。
  75. 根据权利要求73所述的装置,其特征在于,所述处理模块还用于停止对第六网络节点的上行调度包括:
    所述收发模块还用于接收来自所述第三网络节点的第一停止调度指示信息;
    所述处理模块还用于根据所述第一停止调度指示信息停止对所述第六网络节点的上行调度。
  76. 根据权利要求71至75任一项所述的装置,其特征在于,所述收发模块还用于发送第一传输完成指示信息包括:
    所述收发模块还用于向所述第三网络节点发送所述第一传输完成指示信息。
  77. 根据权利要求73至75任一项所述的装置,其特征在于,所述收发模块还用于发送第一传输完成指示信息包括:
    所述收发模块还用于向第五网络节点发送所述第一传输完成指示信息,所述第五网络节点为所述装置提供接入和回传服务。
  78. 根据权利要求71至77任一项所述的装置,其特征在于,所述收发模块还用于接收来自所述第三网络节点的所述第一切换命令之后,所述装置还包括:
    所述处理模块还用于停止对终端设备的上行调度,所述装置为所述终端设备提供接入和回传服务。
  79. 根据权利要求71至78任一项所述的装置,其特征在于,所述第一传输完成指示信息承载于所述第三数据包中,或者,所述第一传输完成指示信息承载于回传适配协议BAP层的控制协议数据单元PDU中。
  80. 一种通信装置,其特征在于,包括:处理模块和收发模块;
    所述收发模块用于接收传输指示信息,所述传输指示信息用于指示停止对第一网络节点的上行调度,所述装置为所述第一网络节点提供接入和回传服务;
    所述处理模块用于根据所述传输指示信息确定停止对所述第一网络节点的上行调度。
  81. 根据权利要求80所述的装置,其特征在于,所述收发模块用于接收传输指示信息包括:
    所述收发模块还用于接收来自所述第一网络节点的第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端;
    所述处理模块还用于根据所述第一传输完成指示信息确定停止对所述第一网络节点的上行调度。
  82. 根据权利要求80所述的装置,其特征在于,所述收发模块用于接收传输指示信息包括:
    所述收发模块还用于接收来自第三网络节点的所述第二停止调度指示信息,所述第三网络节点为所述第一网络节点的源宿主节点或源宿主节点CU。
  83. 根据权利要求82所述的装置,其特征在于,所述第二停止调度指示信息包含于第二切换命令中,所述第二切换命令用于指示所述装置进行切换。
  84. 一种通信装置,其特征在于,包括:处理模块和收发模块;
    所述收发模块用于接收来自第一网络节点的第一传输完成指示信息,所述第一传输完成指示信息用于指示第三数据包传输完成,所述第三数据包包括来自所述第一网络节点和所述第一网络节点的下属节点的上行数据,所述下属节点包括下属网络节点和/或下属终端;
    所述收发模块还用于向第五网络节点发送第二停止调度指示信息,所述第二停止调度指示信息用于指示所述第五网络节点停止对所述第一网络节点的上行调度,所述第五网络节点为所述第一网络节点提供接入和回传服务。
  85. 根据权利要求84所述的装置,其特征在于,所述第一传输完成指示信息承载于所述上行数据中,或者,所述第一传输完成指示信息承载于RRC消息或者F1AP消息中。
  86. 根据权利要求84所述的装置,其特征在于,所述第二停止调度指示信息包含于第 二切换命令中,所述第二切换命令用于指示所述第五网络节点进行切换。
  87. 一种通信装置,其特征在于,包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得所述装置执行如权利要求1至10、11至16、17至23、24至27、28至36、37至40或41至43中任一项所述的方法。
  88. 一种计算机可读存储介质,其上存储有计算机程序或指令,其特征在于,所述计算机程序或指令被执行时使得计算机执行如权利要求1至10、11至16、17至23、24至27、28至36、37至40或41至43中任一项所述的方法。
PCT/CN2020/119118 2020-09-29 2020-09-29 一种数据无损传输的通信方法、装置及系统 WO2022067592A1 (zh)

Priority Applications (7)

Application Number Priority Date Filing Date Title
KR1020237014498A KR20230078761A (ko) 2020-09-29 2020-09-29 무손실 데이터 전송 통신 방법, 장치, 및 시스템
AU2020470490A AU2020470490A1 (en) 2020-09-29 2020-09-29 Communication method, device, and system for lossless data transmission
CN202080105623.9A CN116235546A (zh) 2020-09-29 2020-09-29 一种数据无损传输的通信方法、装置及系统
PCT/CN2020/119118 WO2022067592A1 (zh) 2020-09-29 2020-09-29 一种数据无损传输的通信方法、装置及系统
JP2023519422A JP2023543818A (ja) 2020-09-29 2020-09-29 無損失データ送信通信方法、装置、及びシステム
EP20955617.4A EP4207872A4 (en) 2020-09-29 2020-09-29 COMMUNICATION METHOD, DEVICE AND SYSTEM FOR LOSSLESS DATA TRANSMISSION
US18/192,374 US20230247521A1 (en) 2020-09-29 2023-03-29 Lossless data transmission communication method, apparatus, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/119118 WO2022067592A1 (zh) 2020-09-29 2020-09-29 一种数据无损传输的通信方法、装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/192,374 Continuation US20230247521A1 (en) 2020-09-29 2023-03-29 Lossless data transmission communication method, apparatus, and system

Publications (1)

Publication Number Publication Date
WO2022067592A1 true WO2022067592A1 (zh) 2022-04-07

Family

ID=80951020

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/119118 WO2022067592A1 (zh) 2020-09-29 2020-09-29 一种数据无损传输的通信方法、装置及系统

Country Status (7)

Country Link
US (1) US20230247521A1 (zh)
EP (1) EP4207872A4 (zh)
JP (1) JP2023543818A (zh)
KR (1) KR20230078761A (zh)
CN (1) CN116235546A (zh)
AU (1) AU2020470490A1 (zh)
WO (1) WO2022067592A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2605492A (en) * 2021-03-30 2022-10-05 Samsung Electronics Co Ltd Improvements in and relating to data loss due to donor change in a multi-hop network

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4054282A1 (en) * 2021-03-02 2022-09-07 Nokia Solutions and Networks Oy Preventing data outage for user equipment during e-utran new radio dual connectivity procedure

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019001284A1 (zh) * 2017-06-30 2019-01-03 华为技术有限公司 一种数据转发方法和装置
WO2019136891A1 (zh) * 2018-01-09 2019-07-18 Oppo广东移动通信有限公司 中继的路由方法和通信节点
WO2019158053A1 (zh) * 2018-02-13 2019-08-22 华为技术有限公司 一种路由更新方法、调度请求取消方法及设备
CN110536350A (zh) * 2019-02-14 2019-12-03 中兴通讯股份有限公司 Iab链路控制方法、通信单元、计算机可读存储介质
WO2020167186A1 (en) * 2019-02-14 2020-08-20 Telefonaktiebolaget Lm Ericsson (Publ) A central unit (cu), a distributed unit (du) and methods therein for forwarding of data in an integrated access backhaul (iab) network
CN111586744A (zh) * 2019-02-15 2020-08-25 华为技术有限公司 一种iab节点的切换方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11622300B2 (en) * 2018-09-27 2023-04-04 Lg Electronics Inc. Method and apparatus for preventing loss of uplink data in wireless communication system
US20200245223A1 (en) * 2019-01-25 2020-07-30 Industrial Technology Research Institute Packet routing method and communication system
CN111585725B (zh) * 2019-02-15 2022-07-29 华为技术有限公司 标识管理的方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019001284A1 (zh) * 2017-06-30 2019-01-03 华为技术有限公司 一种数据转发方法和装置
WO2019136891A1 (zh) * 2018-01-09 2019-07-18 Oppo广东移动通信有限公司 中继的路由方法和通信节点
WO2019158053A1 (zh) * 2018-02-13 2019-08-22 华为技术有限公司 一种路由更新方法、调度请求取消方法及设备
CN110536350A (zh) * 2019-02-14 2019-12-03 中兴通讯股份有限公司 Iab链路控制方法、通信单元、计算机可读存储介质
WO2020167186A1 (en) * 2019-02-14 2020-08-20 Telefonaktiebolaget Lm Ericsson (Publ) A central unit (cu), a distributed unit (du) and methods therein for forwarding of data in an integrated access backhaul (iab) network
CN111586744A (zh) * 2019-02-15 2020-08-25 华为技术有限公司 一种iab节点的切换方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI: "Routing in IAB network", 3GPP DRAFT; R3-196992, vol. RAN WG3, 8 November 2019 (2019-11-08), Reno, NV, USA, pages 1 - 8, XP051820651 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2605492A (en) * 2021-03-30 2022-10-05 Samsung Electronics Co Ltd Improvements in and relating to data loss due to donor change in a multi-hop network

Also Published As

Publication number Publication date
EP4207872A4 (en) 2023-11-01
CN116235546A (zh) 2023-06-06
US20230247521A1 (en) 2023-08-03
JP2023543818A (ja) 2023-10-18
KR20230078761A (ko) 2023-06-02
EP4207872A1 (en) 2023-07-05
AU2020470490A1 (en) 2023-05-18

Similar Documents

Publication Publication Date Title
US11510131B2 (en) Configuration method, data transmission method, and apparatus
US11425600B2 (en) Wireless backhaul data transmission method and apparatus
JP7303833B2 (ja) 情報伝送方法及び装置
WO2020034909A1 (zh) 通信方法和通信装置
US20100157963A1 (en) Method for providing mobility to mobile node in packet transport network, packet transport network system and gateway switch
US11647561B2 (en) Node and communication method
JP7483898B2 (ja) 通信方法及び装置
KR20220152243A (ko) 데이터 패킷 전송 방법 및 장치, 통신 노드, 그리고 저장 매체
US20230247521A1 (en) Lossless data transmission communication method, apparatus, and system
WO2022082679A1 (zh) 一种通信方法及相关设备
WO2023011245A1 (zh) 通信方法和通信装置
CN113556794A (zh) 通信方法、装置及系统
WO2022001503A1 (zh) 一种用于iab网络通信的方法及相关设备
CN115918244A (zh) 第一节点、第二节点和由其执行的用于处理多跳网络中的分组重复的方法
JP2023547493A (ja) F1接続を解除するための方法、および装置、ならびにシステム
RU2806798C1 (ru) Способ и устройство связи
TWI827186B (zh) 路由方法和通信裝置
WO2022068164A1 (zh) 一种通信方法及相关设备
WO2022068094A1 (zh) 一种通信方法及相关设备
WO2023130989A1 (zh) 一种通信方法及装置
US20240031860A1 (en) Communication method and device
CN106488518B (zh) 一种跨多小区切换下实现用户数据接续传输的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20955617

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2023519422

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2020955617

Country of ref document: EP

Effective date: 20230331

ENP Entry into the national phase

Ref document number: 20237014498

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020470490

Country of ref document: AU

Date of ref document: 20200929

Kind code of ref document: A