WO2022110229A1 - 数据丢失检测方法、装置、通信设备及存储介质 - Google Patents

数据丢失检测方法、装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2022110229A1
WO2022110229A1 PCT/CN2020/132958 CN2020132958W WO2022110229A1 WO 2022110229 A1 WO2022110229 A1 WO 2022110229A1 CN 2020132958 W CN2020132958 W CN 2020132958W WO 2022110229 A1 WO2022110229 A1 WO 2022110229A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
data packet
time
packet
transmission
Prior art date
Application number
PCT/CN2020/132958
Other languages
English (en)
French (fr)
Inventor
江小威
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202080003764.XA priority Critical patent/CN114930898A/zh
Priority to PCT/CN2020/132958 priority patent/WO2022110229A1/zh
Publication of WO2022110229A1 publication Critical patent/WO2022110229A1/zh

Links

Images

Definitions

  • the present invention relates to the technical field of mobile communication, and in particular, to a data loss detection method, device, communication device and storage medium.
  • the transmission of data packets will have an expected arrival time or time-to-live. If the receiving end of the data does not receive the data at the expected arrival time of the specific data, it is considered that the data packet is lost. If multiple consecutive data packets are lost, the receiving end of the data thinks that the application service will be in an unavailable state, so it takes a longer time to restore the normal application service.
  • the data packet of the application service will be segmented in the process of transmission (for example, the Transmission Control Protocol (Transmission Control Protocol, TCP)/Internet Protocol (Internet Protocol, IP) protocol is segmented), then the wireless
  • the air interface protocol stack of the network may send multiple data packets that have been fragmented (for example, one application data packet can be fragmented into n IP packets, and one Packet Data Convergence Protocol (PDCP)
  • PDCP Packet Data Convergence Protocol
  • SDU Service Data Unit
  • the embodiment of the first aspect of the present invention proposes a data loss detection method, device, communication device and storage medium.
  • the loss of service application data packets is determined by transmitting data packets, so as to improve service service performance.
  • the embodiment of the first aspect of the present invention provides a data loss detection method.
  • the method is applied to a data sending end and includes: detecting at least one transmission data packet associated with the application data packet according to application data packet arrival information of a target application ; If it is detected that at least one of the transmission data packets is lost, determining that at least one of the application data packets is lost.
  • the application identifier of the target application includes at least one of the following: session identifier, service flow identifier, data radio bearer DRB identifier, logical channel identifier, radio link control RLC identifier, and cell group identifier.
  • the application data packet arrival information includes: application data packet arrival time and/or application data packet arrival quantity.
  • the arrival time of the application data packets and the arrival quantity of the application data packets are agreed by the protocol or configured by the network.
  • the arrival time of the application data packet includes any one of the following: the absolute arrival time of the application data packet; the arrival start time and arrival period of the application data packet; the initial arrival of the application data packet Time; the arrival time interval of the application data packet.
  • the detecting at least one transmission data packet associated with the application data packet according to the application data packet arrival information of the target application includes: if the number of arrivals of the application data packet corresponding to the application data packet arrival time is For one, the arrival of one or more transport packets associated with one of the application packets is detected at a target time or a target time period.
  • the determining that at least one of the application data packets is lost if it is detected that at least one of the transmission data packets is lost includes: if any one of the one or more transmission data packets is detected If it is lost, it is determined that one of the application data packets is lost.
  • the detecting at least one transmission data packet associated with the application data packet according to the application data packet arrival information of the target application includes: if the number of arrivals of the application data packet corresponding to the application data packet arrival time is For a plurality, a plurality of incoming transport data packets associated with a plurality of said application data packets are detected at a target time or a target time period.
  • determining that at least one of the application data packets is lost if it is detected that at least one of the transmission data packets is lost, including: if the first or last one of the multiple transmission data packets is detected If the transmission data packet is lost, it is determined that one of the application data packets associated with the first or the last transmission data packet is lost.
  • determining that at least one of the application data packets is lost if it is detected that at least one of the transmission data packets is lost, including: if the first and last of the multiple transmission data packets are detected If the transmission data packets are all lost, it is determined that two of the application data packets are lost.
  • the transmission data packet that arrives at the target time includes any one of the following: a transmission data packet that arrives at the arrival time of the application data packet; a time difference between the arrival time of the application data packet and the arrival time of the application data packet is less than or Transmission data packets arriving at a time equal to a preset time offset; transmission data packets arriving at a time when the time difference from the arrival time of the specified transmission data packet is less than or equal to the preset threshold value.
  • the transmission data packets arriving in the target time period include any one of the following: transmission data packets arriving in the time period from the first absolute time to the second absolute time; Transport packets arriving in a time period between time and a second time, wherein the first time is before the application packet arrival time, the second time is after the application packet arrival time, and all The time difference between the arrival time of the application data packet and the first time is less than or equal to a preset threshold value, and the time difference between the second time and the arrival time of the application data packet or the first time is less than or equal to a preset value Threshold value.
  • the type of the transmission data packet includes any one of the following: Service Data Unit SDAP SDU of Service Data Adaptation Protocol, Protocol Data Unit SDAP PDU of Service Data Adaptation Protocol, Service Data Unit PDCP of Packet Data Convergence Protocol SDU, the protocol data unit PDCP PDU of the Packet Data Convergence Protocol.
  • the method for detecting the loss of the transmission data packet includes any one of the following: starting from the arrival time of the transmission data packet, the transmission data packet is not sent within a preset time; from the arrival time of the transmission data packet At the beginning, the transmission success confirmation message was not received within the preset time; the time difference from the arrival time of the transmission data packet to the successful transmission time of the transmission data packet is greater than or equal to the preset threshold value; the transmission data packet The number of sending failures exceeds the threshold.
  • the sending success confirmation message includes any one of the following: a sending success indication in a packet data convergence protocol PDCP status report; a sending success indication in a radio link control RLC status report; hybrid automatic repeat request HARQ feedback Send success indication in .
  • the method further includes: when it is detected that the loss of the application data packet satisfies a preset trigger condition, triggering the transmission recovery process of the target application.
  • the loss of the application data packet satisfies a preset trigger condition, including: the application data packet loss timer exceeds a preset duration, and/or reaches a preset threshold value.
  • the preset duration is an integer multiple of the application data packet sending period.
  • the start condition of the application data packet loss timer includes any one of the following: in response to detecting a loss of the application data packet, start the application data packet loss timer, in response to detecting a loss of the application data packet, start the application data packet loss timer. If the application packet is lost, and the application packet loss timer of the target application is not running, the application packet loss timer is started.
  • the stopping condition of the application data packet loss timer includes any one of the following: in response to detecting that one application data packet is sent, stop the application data packet loss timer, in response to detecting one of the application data packet loss timers.
  • the application data packet has a probability of successful transmission, and the application data packet loss timer is stopped.
  • the loss condition of the application data packet satisfies a preset trigger condition, including: the application data packet loss counter is greater than or equal to a preset threshold value.
  • the counting conditions of the application packet loss counter include:
  • the application data packet loss counter is incremented by 1.
  • the reset condition of the application data packet loss counter includes: in response to detecting that one of the application data packets is sent, resetting the application data packet loss counter, and/or, in response to detecting one of the application data packets.
  • the data packet has a probability of successful transmission, and the application data packet loss counter is reset.
  • the triggering the transmission recovery process of the target application includes: sending indication information for the target application to perform transmission recovery to the network side.
  • the indication information includes at least one of the following: data packet transmission failure indication information of the target application; sending a data packet transmission failure indication signal through an uplink transmission resource associated with the data sending end; The data packet transmission failure indication signal is sent using the uplink resources associated with the data sending end.
  • the triggering the transmission recovery process of the target application includes: changing a data transmission mode of an application data packet of the target application.
  • the changing the data sending mode of the application data packet of the target application includes any one of the following: activating the data replication function carried by the application data packet of the target application; increasing the application data packet bearing of the target application The number of activated RLC entities for the data replication function; change the type of uplink grant that can be used by the logical channel carried by the application data packet of the target application.
  • the number of activated RLC entities is a network configuration or a protocol agreement.
  • the types of the available uplink grants include any one of the following: uplink grants of all SCS types can be used, and uplink grants with a larger SCS value can be used; the duration of the PUSCH corresponding to the available uplink grants is All PUSCH durations; configurable uplink grant type-1 can be used; uplink grants of all cells can be used; uplink grants of specified cells can be used; all configured uplink grant types-2 can be used; uplink grants of all physical priorities can be used .
  • the embodiment of the second aspect of the present invention provides a data loss detection device, which is applied to a data sending end and includes: a detection module, configured to detect, according to application data packet arrival information of a target application, a data loss associated with the application data packet at least one transmission data packet; and a determining module, configured to determine that at least one of the application data packets is lost when the loss of at least one of the transmission data packets is detected.
  • An embodiment of a third aspect of the present invention provides a communication device, including a processor, a transceiver, a memory, and a computer program stored on the memory, where the processor runs the computer program to implement the implementation of the first aspect Example of the proposed data loss detection method.
  • Embodiments of the fourth aspect of the present invention provide a processor-readable storage medium, where the processor-readable storage medium stores a computer program, and the computer program is used to cause the processor to execute the storage medium provided by the embodiment of the first aspect. Data loss detection method.
  • the data loss detection method, device and communication equipment proposed by the present invention have at least the following technical effects:
  • At least one transmission data packet associated with the application data packet is detected according to the application data packet arrival information of the target application, and if at least one transmission data packet is detected to be lost, it is determined that at least one application data packet is lost. Therefore, the loss of the application data packet is determined according to the loss of the transmission data packet associated with the application data packet, and the continuous loss of the application data packet is counted in a cross-layer manner, which provides technical support for improving business service performance.
  • FIG. 1 is a schematic flowchart of a data loss detection method according to an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of a data loss detection scenario according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a data loss detection scenario according to another embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of a data loss detection method according to another embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a data loss detection apparatus according to an embodiment of the present invention.
  • FIG. 6 is a structural block diagram of a communication device according to an embodiment of the present invention.
  • the present invention proposes a method based on the arrival time of the deterministic service and the number of arrivals of the data packets, so that the continuously lost application data packets can be counted in a cross-layer manner, and then the corresponding processing is performed to meet the application requirements.
  • quality of service requirements eg, to avoid application service unavailability due to loss of continuous application data packets.
  • FIG. 1 is a flowchart of a data loss detection method provided according to an embodiment of the present invention, wherein the execution body of the data loss detection method may be any communication device corresponding to a data sending end, such as a base station, a user terminal Etc., the data loss detection method, for the convenience of description, in the following embodiments, the data sending end is usually used as an example for the user terminal UE, including:
  • Step 101 Detect at least one transmission data packet associated with the application data packet according to the application data packet arrival information of the target application.
  • the target application is any application whose service performance is to be evaluated, including but not limited to social applications, tool applications, and the like.
  • the sending of application data packets will have expected arrival time or survival time. If the receiving end of the data does not receive the corresponding application data packet at the expected arrival time of the specific data, it is considered The application data packet is lost. If multiple consecutive application data packets are lost, the receiving end of the data considers that the application service will be in an unavailable state, so that it takes a longer time to restore the normal application service.
  • the detection is performed based on the reaching information of the target application data packet, wherein the reaching information may be any information that reflects the reaching situation of the application data packet.
  • an application data packet includes at least one associated transmission data packet. Therefore, in the actual execution process, the service availability of the target application can be judged by detecting the transmission data.
  • the types of data transmission packets vary according to different services, including but not limited to the service data unit SDAP SDU of the service data adaptation protocol, the protocol data unit SDAP PDU of the service data adaptation protocol, and the service data unit of the packet data convergence protocol.
  • PDCP SDU Protocol Data Unit PDCP PDU of Packet Data Convergence Protocol, etc.
  • Step 102 If it is detected that at least one transmission data packet is lost, determine that at least one application data packet is lost.
  • the data receiving end may receive application data packets of multiple target applications at the same time. Therefore, in order to facilitate differentiation, the target application also has an application identifier that marks its uniqueness, and the application identifier can be used to The corresponding application data packets are identified, etc.
  • the application identifier of the target application includes a session identifier (eg, PDU Session-1), a service flow identifier (eg, Quality of Service (QoS) flow-1), a data radio bearer DRB identifier (eg, DRB-1) ), logical channel identifier (eg, LCID-1), radio link control RLC identifier (eg, RLC entity-1), cell group identifier (eg, master cell group (MCG) or secondary cell group (Master Cell group, MCG) At least one of Cell group, SCG)).
  • a session identifier eg, PDU Session-1
  • a service flow identifier eg, Quality of Service (QoS) flow-1
  • a data radio bearer DRB identifier eg, DRB-1)
  • logical channel identifier eg, LCID-1
  • radio link control RLC identifier eg, RLC entity-1
  • cell group identifier eg, master cell group (MCG
  • At least one transmission data packet associated with the application data packet is detected according to the application data packet arrival information of the target application, and further, if the loss of at least one transmission data packet is detected, it is determined that at least one transmission data packet is lost. An application packet was lost. Therefore, the loss of the application data packet is determined according to the loss of the transmission data packet associated with the application data packet, and the continuous loss of the application data packet is counted in a cross-layer manner, which provides technical support for improving business service performance.
  • the arrival information of the application data packet may include different contents.
  • the following uses the arrival information of the application data packet, including: the application data packet Arrival time and/or number of application packets arriving.
  • the arrival time of the application data packet may include the absolute arrival time of the application data packet, for example, the arrival time of the application data packet is 1 minute and 1 second on January 1;
  • it can include the arrival start time and arrival period of the application data packet, for example, the application data packet arrives every 10ms;
  • the initial arrival time starts to arrive, for example, the application data packet 1 starts to arrive at 1 minute and 1 second on January 1, etc.;
  • the two application data packets whose arrival time interval of the application data packets is greater than or equal to 10ms are: Two independent application data packets, for example, the arrival time of application data packet 1 is t, and the arrival time of transmission data packet 1 of the application data packet 1 is also t, then for the transmission data packet x that arrives at time t2, if t2 - t1 is greater than or equal to the preset time threshold, then the transmission data packet x arriving at time t2 belongs to the application data packet 2, and the arrival time of the application data packet 2 is t2.
  • the above-mentioned "application data packet arrival time" and “application data packet arrival quantity” may be determined by protocol agreement or network configuration, or determined by protocol agreement and network configuration. (For example, network configuration If the UE detects the loss of continuous application data packets of DRB-1 (or QoS flow-1), the protocol stipulates that the number of application data packets arriving at a specific time for this service (eg, periodic service) is 1).
  • At least one transmission data packet associated with the application data packet is detected according to the application data packet arrival information of the target application, wherein the type of the data transmission packet is different according to different services, including but not limited to service data adaptation
  • the service data unit SDAP SDU of the protocol, the protocol data unit SDAP PDU of the business data adaptation protocol, the service data unit PDCP SDU of the packet data convergence protocol, the protocol data unit PDCP PDU of the packet data convergence protocol, etc. and then, if at least one is detected. If the transmission data packet is lost, it is determined that at least one application data packet is lost.
  • the following describes how to detect at least one transmission data packet associated with the application data packet according to the application data packet arrival information of the target application in combination with the application data packet arrival information including the application data packet arrival time and the application data packet arrival quantity.
  • the number of application data packets arriving corresponding to the application data packet arrival time is one, one or more transmission data packets that arrive and are associated with one application data packet are detected at the target time or the target time period.
  • Packet is an application data packet in Figure 2
  • SDU is a possible transmission data packet
  • the target time or target time can be The segment detects the arrival of arriving SDU-1 to SDU-3.
  • any one of the transmission data packets is lost, it is determined that one application data packet is lost.
  • the service is sent through QoS flow-1 or DRB-1, the arrival period of application data packets is T (eg, 10ms), and the application data arriving in each arrival period The number of packs is 1.
  • the UE's PDCP or Service Data Adaptation Protocol (Service Data Adaptation Protocol, SDAP) entity receives one or more SDUs (eg, SDU-1, SDU-2 for a specific data packet arrival time or a specific data packet arrival time period).
  • SDUs Service Data Adaptation Protocol, SDAP
  • the UE considers that the 1 or more SDUs belong to the same application data packet (eg, APP Packet-1), when any 1 of the 1 or more SDUs
  • the UE considers that one application data packet is lost (or, when all SDUs in the one or more SDUs are successfully sent, the UE considers that the application data packet is sent successfully.
  • SDU-1 , SDU-2, and SDU-3 are all sent successfully, then the UE considers that the application data packet of APP Packet-1 is sent successfully.
  • the arrival of multiple transmission data associated with multiple application data packets is detected at the target time or the target time period Bag.
  • Packet is an application data packet in Figure 3, and SDU is a possible transmission data packet
  • SDU-1 to SDU-3 belong to the application data packet Packet-1
  • SDU-4 to SDU-6 are all
  • the arrival situation of the arriving SDU-1 to SDU-6 can be detected at the target time or the target time period.
  • the service is sent through QoS flow-1, or DR B-1, the arrival period of application data packets is T (eg, 10ms), and the arrival period of each period The number of application packets is 2.
  • the PDCP or SDAP entity of the UE starts to receive 1 or more SDUs (eg, SDU-1, SDU-2, SDU3, SDU-4, SDU-5 according to the arrival time of the specific data packet or the specific data packet arrival time period).
  • SDU-6 (that is, corresponding to the transmission data packet)
  • the UE can determine that SDU-1 and SDU-6 belong to different application data packets, when the first or last data packet in the multiple SDUs When it is lost, the UE considers that 1 application data packet is lost. If SDU-1 is lost, it is considered that APP Packet-1 is lost.
  • SDU-6 If SDU-6 is lost, it is considered that APP Packet-2 is lost, or, if the first and last packets are lost When all data packets are lost, the UE considers that two application data packets are lost, or, when all SDUs in the multiple SDUs are successfully sent, the UE considers that the two application data packets are successfully sent.
  • the target time is an important boundary condition for judging whether the packet is lost, wherein the target time or the target time period corresponds to the above-mentioned arrival time of the application data packet.
  • the transmission data packets arriving at the target time may include any of the following:
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets.
  • the arrival time of the transmission data packet determined according to the specific application data packet arrival period and the application data packet arrival time is used as the target time. If the expected arrival time of the application data packet in the transmission data packet sending period is tx, the UE considers that the transmission data packet arriving at this time tx belongs to the same application data packet, otherwise it does not belong to the same application data packet.
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets. It is easy to understand that, in order to compensate for the complex communication environment in the communication process, if the time difference between the arrival times of the transmission data packets is less than the preset time offset, the transmission data packets are considered to belong to the corresponding application data packets.
  • the "application packet arrival time" tx corresponding to the specific "application packet arrival period”, and the tx time offset is less than or equal to the time Toffset, for example, for the application
  • the expected arrival time of the application data packet for a specific transmission data packet transmission period is tx
  • the transmission data packet SDU-1 arrives at time t1
  • (t1-tx) is less than or equal to Toffset ( or (tx-t1) is less than or equal to Toffset)
  • the UE considers that the transmission data packets arriving at this time t1 belong to the same application data packets, otherwise, the UE considers that the transmission data packets arriving at this time t1 do not belong to the same application data packet.
  • the specified transmission data packet may be the first arriving transmission data packet among multiple transmission data packets belonging to the same application data packet.
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets. It is easy to understand that, in order to compensate for the complex communication environment in the communication process, if the time difference between the arrival times of the transmission data packets is less than the preset threshold value, it is considered that the transmission data packets still belong to the corresponding application data packets.
  • the arrival interval of the transmission data packet is used as the target time, and the arrival interval of the transmission data packet is less than or equal to the arrival time of the transmission data packet of the preset threshold value (for example, reaching SDU-1 at time t1, reaching SDU-2 at time t2, and ( If t2-t1) is less than the threshold value Tx, the UE considers that SDU-1 and SDU-2 belong to the same application data packet).
  • the preset threshold value for example, reaching SDU-1 at time t1, reaching SDU-2 at time t2, and ( If t2-t1) is less than the threshold value Tx, the UE considers that SDU-1 and SDU-2 belong to the same application data packet).
  • the target time is also an important boundary condition for judging whether the packet is lost, wherein the target time or the target time period corresponds to the above-mentioned arrival time of the application data packet.
  • the transmission data packets reached in the target time period may include any of the following:
  • the transmission data packets arriving in the time period between the first absolute time and the second absolute time should belong to the same application data packet, wherein the first absolute time and the second absolute time can be calibrated according to the service, Usually, the time difference between the first absolute time and the second absolute time is shorter.
  • the UE considers that the data packets belong to the same application.
  • a time period is demarcated according to the arrival time of the application data packet to compensate for complex communication scenarios in communication, and the time period is defined from the first time to the second time, wherein the first time is when the application data packet arrives Before the time, the second time is after the arrival time of the application data packet, and the time difference between the arrival time of the application data packet and the first time is less than or equal to the preset threshold value, the second time is between the arrival time of the application data packet or the first time
  • the time difference is less than or equal to the preset threshold.
  • the larger the preset threshold value is, the stronger the compensation ability of the time period is, and the possibility of misjudgment is also increased. Therefore, in some possible examples, in order to improve the accuracy of judgment , the preset threshold value may also be set to 0, that is, only the transmission data packets considered to be reached at the arrival time of the application data packets belong to the corresponding application data packets.
  • the arrival time of the application data packet in this example includes: the application data packet arrives at the absolute arrival time; or, the application data packet arrives within the arrival period from the arrival start time; or, the application data packet arrives at the initial arrival time Begin to arrive; alternatively, the inter-arrival interval of application packets.
  • the time range between the time t1 before and the time t2 after the "application packet arrival time” corresponding to the specific "application packet arrival period” is the time period of Ty.
  • t1 and t2 are values greater than or equal to 0.
  • the expected data arrival time for a specific application data packet sending cycle is tx
  • t1 is the arrival time of the transmission data packet SDU-1 before tx
  • t2 is the arrival time of the transmission data packet SDU-2 after tx.
  • t1 After t1, if a transmission data packet SDU-2 is reached at t2, if (t2-t1) is less than or equal to the threshold value Ty, the UE considers that the transmission data packet belongs to the application data packet expected to be received at tx. Or, if a transmission packet SDU-2 arrives at t2, and no data packet arrives before this, if (t2-tx) is less than or equal to the threshold value Ty, the UE considers the transmission packet to belong to the application expected to be received at tx data pack.
  • the data loss detection method can detect the transmission data packet associated with the application data packet according to the arrival time of the application data packet and the arrival quantity of the application data packet directly related to the arrival of the application data packet, and, When detecting the transmission data packet, the target time or the target time period can be used as the time limit of the detection.
  • the target time and the target time period can be flexibly determined according to the needs of the scene, taking into account the detection accuracy and reliability.
  • the application data packet contains one or more transmission data packets, if the transmission data packet is lost, it means that the corresponding application data packet may be lost, so the target application has the risk of being unavailable. Therefore, it is necessary to detect whether the transmission data packet is lost, is of great significance.
  • At least one transmission data packet associated with the application data packet is detected according to the application data packet arrival information of the target application, wherein the type of the data transmission packet varies according to different services, including but not limited to service data
  • the service data unit SDAP SDU of the adaptation protocol, the protocol data unit SDAP PDU of the business data adaptation protocol, the service data unit PDCP SDU of the packet data convergence protocol, the protocol data unit PDCP PDU of the packet data convergence protocol, etc. and then, if detected If at least one transmission data packet is lost, it is determined that at least one application data packet is lost.
  • the arrival of multiple transmission data associated with multiple application data packets is detected at the target time or the target time period Bag.
  • the target time is an important boundary condition for judging whether the packet is lost, wherein the target time or the target time period corresponds to the above-mentioned arrival time of the application data packet.
  • the transmission data packets arriving at the target time may include any of the following:
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets.
  • the arrival time of the transmission data packet determined according to the specific application data packet arrival period and the application data packet arrival time is used as the target time. If the expected arrival time of the application data packet in the transmission data packet sending period is tx, the UE considers that the transmission data packet arriving at this time tx belongs to the same application data packet, otherwise it does not belong to the same application data packet.
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets. It is easy to understand that, in order to compensate for the complex communication environment in the communication process, if the time difference between the arrival times of the transmission data packets is less than the preset time offset, the transmission data packets are considered to belong to the corresponding application data packets.
  • the "application packet arrival time" tx corresponding to the specific "application packet arrival period”, and the tx time offset is less than or equal to the time Toffset, for example, for the application
  • the expected arrival time of the application data packet for a specific transmission data packet transmission period is tx
  • the transmission data packet SDU-1 arrives at time t1
  • (t1-tx) is less than or equal to Toffset ( or (tx-t1) is less than or equal to Toffset)
  • the UE considers that the transmission data packets arriving at this time t1 belong to the same application data packets, otherwise, the UE considers that the transmission data packets arriving at this time t1 do not belong to the same application data packet.
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets. It is easy to understand that, in order to compensate for the complex communication environment in the communication process, if the time difference between the arrival times of the transmission data packets is less than the preset threshold value, it is considered that the transmission data packets still belong to the corresponding application data packets.
  • the arrival interval of the transmission data packet is used as the target time, and the arrival interval of the transmission data packet is less than or equal to the arrival time of the transmission data packet of the preset threshold value (for example, reaching SDU-1 at time t1, reaching SDU-2 at time t2, and ( If t2-t1) is less than the threshold value Tx, the UE considers that SDU-1 and SDU-2 belong to the same application data packet).
  • the preset threshold value for example, reaching SDU-1 at time t1, reaching SDU-2 at time t2, and ( If t2-t1) is less than the threshold value Tx, the UE considers that SDU-1 and SDU-2 belong to the same application data packet).
  • the target time is also an important boundary condition for judging whether the packet is lost, wherein the target time or the target time period corresponds to the above-mentioned arrival time of the application data packet.
  • the transmission data packets arriving in the target time period may include any of the following:
  • the transmission data packets arriving in the time period between the first absolute time and the second absolute time should belong to the same application data packet, wherein the first absolute time and the second absolute time can be calibrated according to the service, Usually, the time difference between the first absolute time and the second absolute time is shorter.
  • the UE considers that the data packets belong to the same application.
  • a time period is demarcated according to the arrival time of the application data packet to compensate for complex communication scenarios in communication, and the time period is defined from the first time to the second time, wherein the first time is when the application data packet arrives Before the time, the second time is after the arrival time of the application data packet, and the time difference between the arrival time of the application data packet and the first time is less than or equal to the preset threshold value, the second time is between the arrival time of the application data packet or the first time
  • the time difference is less than or equal to the preset threshold.
  • the larger the preset threshold value is, the stronger the compensation ability of the time period is, and the possibility of misjudgment is also increased. Therefore, in some possible examples, in order to improve the accuracy of judgment , the preset threshold value may also be set to 0, that is, only the transmission data packets considered to be reached at the arrival time of the application data packets belong to the corresponding application data packets.
  • the arrival time of the application data packet in this example includes: the application data packet arrives at the absolute arrival time; or, the application data packet arrives within the arrival period from the arrival start time; or, the application data packet arrives at the initial arrival time Begin to arrive; alternatively, the inter-arrival interval of application packets.
  • the time range between the time t1 before and the time t2 after the "application packet arrival time” corresponding to the specific "application packet arrival period” is the time period of Ty.
  • t1 and t2 are values greater than or equal to 0.
  • the expected data arrival time for a specific application data packet sending cycle is tx
  • t1 is the arrival time of the transmission data packet SDU-1 before tx
  • t2 is the arrival time of the transmission data packet SDU-2 after tx.
  • the UE After t1, if there is a transmission data packet SDU-2 reached at t2, if (t2-t1) is less than or equal to the threshold value Ty, the UE considers that the transmission data packet belongs to the application data packet expected to be received at tx. Or, if a transmission packet SDU-2 arrives at t2, and no data packet arrives before this, if (t2-tx) is less than or equal to the threshold value Ty, the UE considers the transmission packet to belong to the application expected to be received at tx data pack.
  • the detection method for the transmission data packet loss includes any one of the following:
  • the transmission data packet from the moment when the transmission data packet arrives, if no data packet is sent within a preset time, it is considered that the transmission data packet is lost.
  • the preset time can be calibrated according to experimental data.
  • the sender considers the SDU lost.
  • the transmission data packet is also considered to be lost, wherein the preset time can be calibrated according to the experimental data, and the successful confirmation message It can be any agreed message indicating that the transmission data packet is successfully sent, and the success confirmation message can be an agreed string of codes, a predetermined text, or the like.
  • the PDCP entity or SDAP entity receives the SDU to be sent from the upper layer, it starts the timer tlost. Before the tlost expires, that is, before the preset time, if the PDCP entity or SDAP entity has not After receiving the confirmation message of sending the SDU successfully, the sender considers that the SDU of the transmission data packet is lost.
  • the preset threshold value can be calibrated according to experiments.
  • the sending success confirmation message includes any one of the following:
  • a success indication can be sent in the PDCP status report, and the specific form of the success indication can be configured according to a pre-agreed arrangement.
  • the successful sending indication includes but is not limited to the agreed text information , or, the agreed-upon digitally encoded information, etc.
  • a success indication can be sent in the RLC status report, and the specific form of the success indication can be configured according to a pre-agreed agreement.
  • the successful sending indication includes but is not limited to the agreed text information , or, the agreed-upon digitally encoded information, etc.
  • a success indication can be sent in the HARQ feedback, and the specific form of the success indication can be configured according to a pre-agreed configuration.
  • the successful sending indication includes but is not limited to the agreed text information , or, the agreed-upon digitally encoded information, etc.
  • the period of time is greater than or equal to the threshold value T.
  • a PDCP entity or an SDAP entity receives an SDU-1 to be sent from a higher layer at a time of t1, and receives a successful confirmation message of the transmission data packet at a time of tx, and the transmission data packet is successfully sent.
  • the confirmation message is for Transmission confirmation message of SDU-1 sent at time t2. If (t2-t1) is greater than or equal to the threshold value, the transmission packet is lost. Or, if (t2-t1) is less than or equal to the threshold value, the packet is sent successfully.
  • the failure to send a single transmission data packet does not directly consider that the transmission data packet is lost, but determines that the number of transmission data packets exceeds the threshold. It is considered that the corresponding transmission packet is lost.
  • the threshold value can be calibrated according to the experimental data.
  • the transmission of the transmission data packet 1 fails once, retransmission is performed.
  • the number of retransmissions reaches the threshold and still fails to transmit successfully (for example, a successful confirmation message from the data receiving end is not received), it is considered that the transmission data packet 1 is lost.
  • a detection method for detecting transmission data packet loss can be selected flexibly according to the needs of the scenario, which improves the practicability of data loss detection.
  • the purpose of detecting whether the application data packet is successfully sent is to judge whether the target application is available. Therefore, the main purpose is to improve the service performance of the target application. Therefore, it can also be carried out according to the loss of application data packets. Transmission recovery, so that the target application can meet the relevant business requirements.
  • the data loss detection method includes:
  • Step 401 Detect at least one transmission data packet associated with the application data packet according to the application data packet arrival information of the target application.
  • the target application is any application whose service performance is to be evaluated, including but not limited to social applications, tool applications, and the like.
  • the sending of application data packets will have expected arrival time or survival time. If the receiving end of the data does not receive the corresponding application data packet at the expected arrival time of the specific data, it is considered The application data packet is lost. If multiple consecutive application data packets are lost, the receiving end of the data considers that the application service will be in an unavailable state, so that it takes a longer time to restore the normal application service.
  • the detection is performed based on the reaching information of the target application data packet, wherein the reaching information may be any information that reflects the reaching situation of the application data packet.
  • an application data packet includes at least one associated transmission data packet. Therefore, in the actual execution process, the service availability of the target application can be judged by detecting the transmission data.
  • the types of data transmission packets vary according to different services, including but not limited to the service data unit SDAP SDU of the service data adaptation protocol, the protocol data unit SDAP PDU of the service data adaptation protocol, and the service data unit of the packet data convergence protocol.
  • PDCP SDU Protocol Data Unit PDCP PDU of Packet Data Convergence Protocol, etc.
  • Step 402 if it is detected that at least one transmission data packet is lost, determine that at least one application data packet is lost.
  • the data receiving end may receive application data packets of multiple target applications at the same time. Therefore, in order to facilitate differentiation, the target application also has an application identifier that marks its uniqueness, and the application identifier can be used to The corresponding application data packets are identified, etc.
  • the application identifier of the target application includes a session identifier (eg, PDU Session-1), a service flow identifier (eg, Quality of Service (QoS) flow-1), a data radio bearer DRB identifier (eg, DRB-1) ), logical channel identifier (eg, LCID-1), radio link control RLC identifier (eg, RLC entity-1), cell group identifier (eg, master cell group (MCG) or secondary cell group (Master Cell group, MCG) At least one of Cell group, SCG)).
  • a session identifier eg, PDU Session-1
  • a service flow identifier eg, Quality of Service (QoS) flow-1
  • a data radio bearer DRB identifier eg, DRB-1)
  • logical channel identifier eg, LCID-1
  • radio link control RLC identifier eg, RLC entity-1
  • cell group identifier eg, master cell group (MCG
  • the arrival of multiple transmission data associated with multiple application data packets is detected at the target time or the target time period Bag.
  • an application associated with the first or the last transmission data packet is determined Packet loss.
  • the target time is an important boundary condition for judging whether the packet is lost, wherein the target time or the target time period corresponds to the above-mentioned arrival time of the application data packet.
  • the transmission data packet arriving at the target time may include any of the following:
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets.
  • the arrival time of the transmission data packet determined according to the specific application data packet arrival period and the application data packet arrival time is used as the target time. If the expected arrival time of the application data packet in the transmission data packet sending period is tx, the UE considers that the transmission data packet arriving at this time tx belongs to the same application data packet, otherwise it does not belong to the same application data packet.
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets. It is easy to understand that, in order to compensate for the complex communication environment in the communication process, if the time difference between the arrival times of the transmission data packets is less than the preset time offset, the transmission data packets are considered to belong to the corresponding application data packets.
  • the "application packet arrival time" tx corresponding to the specific "application packet arrival period”, and the tx time offset is less than or equal to the time Toffset, for example, for the application
  • the expected arrival time of the application data packet for a specific transmission data packet transmission period is tx
  • the transmission data packet SDU-1 arrives at time t1
  • (t1-tx) is less than or equal to Toffset ( or (tx-t1) is less than or equal to Toffset)
  • the UE considers that the transmission data packets arriving at this time t1 belong to the same application data packets, otherwise, the UE considers that the transmission data packets arriving at this time t1 do not belong to the same application data packet.
  • the arrival time of the application packet in this example includes: the application packet arrives at the absolute arrival time; or, the application packet arrives within the arrival period from the arrival start time; or the application packet arrives at the start arrival time ; or, the inter-arrival interval of application packets. It is easy to understand that, in order to compensate for the complex communication environment in the communication process, if the time difference between the arrival times of the transmission data packets is less than the preset threshold value, it is considered that the transmission data packets still belong to the corresponding application data packets.
  • the arrival interval of the transmission data packet is used as the target time, and the arrival interval of the transmission data packet is less than or equal to the arrival time of the transmission data packet of the preset threshold value (for example, reaching SDU-1 at time t1, reaching SDU-2 at time t2, and ( If t2-t1) is less than the threshold value Tx, the UE considers that SDU-1 and SDU-2 belong to the same application data packet).
  • the preset threshold value for example, reaching SDU-1 at time t1, reaching SDU-2 at time t2, and ( If t2-t1) is less than the threshold value Tx, the UE considers that SDU-1 and SDU-2 belong to the same application data packet).
  • the target time is also an important boundary condition for judging whether the packet is lost, wherein the target time or the target time period corresponds to the above-mentioned arrival time of the application data packet.
  • the transmission data packets arriving in the target time period may include any of the following:
  • the transmission data packets arriving in the time period between the first absolute time and the second absolute time should belong to the same application data packet, wherein the first absolute time and the second absolute time can be calibrated according to the service, Usually, the time difference between the first absolute time and the second absolute time is shorter.
  • the UE considers that the data packets belong to the same application.
  • a time period is demarcated according to the arrival time of the application data packet to compensate for complex communication scenarios in communication, and the time period is defined from the first time to the second time, wherein the first time is when the application data packet arrives Before the time, the second time is after the arrival time of the application data packet, and the time difference between the arrival time of the application data packet and the first time is less than or equal to the preset threshold value, the second time is between the arrival time of the application data packet or the first time
  • the time difference is less than or equal to the preset threshold.
  • the larger the preset threshold value is, the stronger the compensation ability of the time period is, and the possibility of misjudgment is also increased. Therefore, in some possible examples, in order to improve the accuracy of judgment , the preset threshold value may also be set to 0, that is, only the transmission data packets considered to be reached at the arrival time of the application data packets belong to the corresponding application data packets.
  • the arrival time of the application data packet in this example includes: the application data packet arrives at the absolute arrival time; or, the application data packet arrives within the arrival period from the arrival start time; or, the application data packet arrives at the initial arrival time Begin to arrive; alternatively, the inter-arrival interval of application packets.
  • the time range between the time t1 before and the time t2 after the "application packet arrival time” corresponding to the specific "application packet arrival period” is the time period of Ty.
  • t1 and t2 are values greater than or equal to 0.
  • the expected data arrival time for a specific application data packet sending cycle is tx
  • t1 is the arrival time of the transmission data packet SDU-1 before tx
  • t2 is the arrival time of the transmission data packet SDU-2 after tx.
  • the UE After t1, if there is a transmission data packet SDU-2 reached at t2, if (t2-t1) is less than or equal to the threshold value Ty, the UE considers that the transmission data packet belongs to the application data packet expected to be received at tx. Or, if a transmission packet SDU-2 arrives at t2, and no data packet arrives before this, if (t2-tx) is less than or equal to the threshold value Ty, the UE considers the transmission packet to belong to the application expected to be received at tx data pack.
  • the detection method for the transmission data packet loss includes any one of the following:
  • the transmission data packet from the moment when the transmission data packet arrives, if no data packet is sent within a preset time, it is considered that the transmission data packet is lost.
  • the preset time can be calibrated according to experimental data.
  • the sender considers the SDU lost.
  • the transmission data packet is also considered to be lost, wherein the preset time can be calibrated according to the experimental data, and the successful confirmation message It can be any agreed message indicating that the transmission data packet is successfully sent, and the success confirmation message can be an agreed string of codes, a predetermined text, or the like.
  • the PDCP entity or SDAP entity receives the SDU to be sent from the upper layer, it starts the timer tlost. Before the tlost expires, that is, before the preset time, if the PDCP entity or SDAP entity has not After receiving the confirmation message of sending the SDU successfully, the sender considers that the SDU of the transmission data packet is lost.
  • the preset threshold value can be calibrated according to experiments.
  • the sending success confirmation message includes any one of the following:
  • a success indication can be sent in the PDCP status report, and the specific form of the success indication can be configured according to a pre-agreed arrangement.
  • the successful sending indication includes but is not limited to the agreed text information , or, the agreed-upon digitally encoded information, etc.
  • a success indication can be sent in the RLC status report, and the specific form of the success indication can be configured according to a pre-agreed agreement.
  • the successful sending indication includes but is not limited to the agreed text information , or, the agreed-upon digitally encoded information, etc.
  • a success indication can be sent in the HARQ feedback, and the specific form of the success indication can be configured according to a pre-agreed configuration.
  • the successful sending indication includes but is not limited to the agreed text information , or, the agreed-upon digitally encoded information, etc.
  • the period of time is greater than or equal to the threshold value T.
  • a PDCP entity or an SDAP entity receives an SDU-1 to be sent from a higher layer at a time of t1, and receives a successful confirmation message of the transmission data packet at a time of tx, and the transmission data packet is successfully sent.
  • the confirmation message is for Transmission confirmation message of SDU-1 sent at time t2. If (t2-t1) is greater than or equal to the threshold value, the transmission packet is lost. Or, if (t2-t1) is less than or equal to the threshold value, the packet is sent successfully.
  • the failure to send a single transmission data packet does not directly consider that the transmission data packet is lost, but determines that the number of transmission data packets exceeds the threshold. It is considered that the corresponding transmission packet is lost.
  • the threshold value can be calibrated according to the experimental data.
  • the transmission of the transmission data packet 1 fails once, retransmission is performed.
  • the number of retransmissions reaches the threshold and still fails to transmit successfully (for example, a successful confirmation message from the data receiving end is not received), it is considered that the transmission data packet 1 is lost.
  • Step 403 when it is detected that the loss of the application data packet satisfies the preset trigger condition, the transmission recovery process of the target application is triggered.
  • a trigger condition is preset, and only when the loss of application data packets meets the preset trigger condition, the transmission recovery process of the target application is performed.
  • the loss of the application data packet satisfies a preset trigger condition and is determined according to the timing of the timer, which specifically includes any of the following:
  • the preset duration is specified by network configuration or protocol.
  • the preset duration is an integer multiple of the application data packet sending cycle.
  • the preset duration of the "application data packet loss timer” can be set to N times the T value, so as to better detect the loss of application data packets.
  • the preset threshold value may also be stipulated by the network configuration or the protocol.
  • the packet loss timer if the preset threshold value is reached by the packet loss timer, it is considered that there have been multiple consecutive application packet losses.
  • the application data packet loss timer reaches the preset threshold value, and the application data packet loss timer exceeds the preset time period, it is considered that a plurality of consecutive application data packets have been lost.
  • the loss timer is started when the application data packet loss situation may occur, and the start condition of the application data packet loss timer includes any one of the following
  • the application data packet loss timer is started, and the loss of the application data packet is determined according to the timer.
  • the stopper can also be stopped in time, that is, when the application data packet loss timer satisfies the stopping condition, the corresponding timer is closed.
  • the stopping conditions for applying the packet loss timer include any of the following:
  • the second type stop the application packet loss timer in response to detecting that there is a probability of successful transmission of an application packet.
  • the application data packet loss timer is stopped.
  • the data sending end stops the "application data packet loss timer".
  • 3 application data packets eg, APP Packet-1/APP Packet Extra/APP Packet-2
  • SDU-1 and SDU-6 are lost, the UE can know that the APP Packet-1 and APP Packet-2 are lost.
  • SDU-2 is lost, but other SDUs are not lost, the UE cannot determine whether the APP Packet Extra is lost.
  • SDU-2 to SDU-5 are all successfully sent, then the UE It can be judged that the Packet Extra is successfully sent, and thus, the corresponding timer is stopped.
  • the loss of the application data packet satisfies a preset trigger condition and is determined according to the count of the counter, which specifically includes: the application data packet loss counter is greater than or equal to a preset threshold value.
  • the preset threshold value is specified by a network configuration or a protocol.
  • the counter is used to count the lost application data packets, and each time an application data packet is lost, the counter is incremented by 1, that is, when an application data packet loss is detected, the application data packet loss counter is incremented by 1.
  • the reset condition of the counter is preset.
  • the counter meets the corresponding reset condition, the counter is directly reset to 0, so as to facilitate the next round of application data packets. loss count.
  • the reset condition of the application packet loss counter includes any one or more of the following:
  • the sending when it is detected that an application data packet is sent, the sending includes the case where the sending is not successful, and also includes the case where the sending is successful, the application data packet loss counter is reset.
  • the data sending end stops the “application data packet loss” timer".
  • 3 application data packets eg, APP Packet-1/APP Packet Extra/APP Packet-2
  • SDU-1 and SDU-6 are lost, the UE can know that the APP Packet-1 and APP Packet-2 are lost. If SDU-2 is lost, but other SDUs are not lost, the UE cannot determine whether the APP Packet Extra is lost. Among them, if SDU-2 to SDU-5 are all successfully sent, then the UE It can be judged that the Packet Extra is successfully sent, so the application packet loss counter is reset.
  • the above embodiment is used to trigger the transmission recovery process of the target application.
  • the following describes how to recover the transmission of the target application.
  • the triggered transmission recovery process of the target application includes: sending indication information for the target application to perform transmission recovery to the network side.
  • the indication information includes at least one of the following:
  • the indication information may be an explicit indication, or an implicit failure indication indicating "carrying identification information of the target application".
  • the UE indicates that the application data transmission failure occurs by sending an uplink signal.
  • the UE-specific uplink resource may be associated with a specific specific application, so that the UE sends an uplink signal to indicate that the specific application has failed to transmit application data.
  • the triggered transmission recovery process of the target application includes changing the data transmission mode of the application data packet of the target application.
  • the data transmission mode of the application data packet of the target application to be changed includes any one of the following:
  • the data copy function carried by the application data package of the target application is directly activated, and the relevant application data package is also copied.
  • the UE activates the data replication of this DRB1 Function.
  • the number of activated RLC entities is a network configuration or a protocol agreement.
  • one bearer (eg, DRB or SRB) of the UE may be associated with multiple RLC entities (eg, leg), and the multiple RLC entities may belong to one MAC entity (ie, CA Duplication) or two MAC entities (ie, CA Duplication) , DC Duplication).
  • the UE copies one PDCP PDU into multiple copies and sends them through different RLC entities.
  • the network side can control which RLC entities are used for the PDCP data replication function through activation/deactivation commands.
  • the PDCP entity sends the replicated data to each activated RLC entity for transmission.
  • the DCP data sender starts a timer for each PDCP SDU (Service Data Unit) received from the upper layer.
  • PDCP SDU Service Data Unit
  • the UE discards the PDCP SDU and the corresponding PDCP PDU, and the transmission of the PDCP SDU transmission packet fails.
  • the UE adds an additional activated RLC entity, then the total number of activated RLC entities for the DRB-1 is 3.
  • the type of uplink grant that can be used by the logical channel carried by the application data packet of the target application is changed.
  • the network side can configure the available uplink grant type for a specific logical channel of the UE, and the UE can use the uplink grant type only when the type of uplink grant received by the UE matches the uplink grant type that can be used by the logical channel.
  • the logical channel is authorized to send data.
  • the types of uplink grants that can be used include any of the following:
  • the second type Uplink grants with larger SCS values can be used.
  • the third type the duration of the PUSCH corresponding to the available uplink grant is the duration of all PUSCHs.
  • LCH-1 of DRB-1 can use all uplink grants of PUSCH duration.
  • LCH-1 of DRB-1 can use the configuration uplink grant type-1.
  • the fifth type Uplink grants of all cells can be used.
  • LCH-1 of DRB-1 can use uplink grants of all cells.
  • the sixth type the uplink grant of the designated cell can be used.
  • LCH-1 of DRB-1 can use the uplink grant of the designated cell x (eg, PCell or PSCell).
  • the designated cell may be a network configuration or a protocol agreement.
  • the network configures the UE with multiple sets of resources for configuring uplink grant type-2 (for example, configuring uplink grant type-2 resource-1 and configuring uplink grant type-2 resource-2), if the LCH- 1 can use the configuration uplink grant type-2 resource-1, then when the number of continuously lost application data packets of DRB-1 (or QoS flow-1 belonging to DRB-1) reaches the threshold, the LCH of DRB-1 -1 can use all configuration uplink grant type-2 (eg, including configuration uplink grant type-2 resource-1 and configuration uplink grant type-2 resource-2.
  • uplink grant type-2 for example, configuring uplink grant type-2 resource-1 and configuring uplink grant type-2 resource-2
  • Type 8 Uplink grants of all physical priorities can be used.
  • LCH-1 of DRB-1 can use uplink resources of physical priority-1, when the number of continuously lost application packets of DRB-1 (or QoS flow-1 belonging to DRB-1) reaches the threshold When the limit is reached, LCH-1 of DRB-1 can use uplink grants of all physical priorities.
  • the data loss detection method of the embodiment of the present invention by counting the loss of continuous service application data packets, when the transmission will not meet the service quality requirements, the data sending end restores by changing the data sending mode, so as to meet the service requirements. Quality requirements.
  • the present invention also provides a data loss detection device.
  • the implementation of the data loss detection method is also applicable to the data loss detection apparatus provided in this embodiment, and will not be described in detail in this embodiment.
  • FIG. 5 is a schematic structural diagram of a data loss detection device according to the present invention.
  • FIG. 5 is a schematic structural diagram of a data loss detection apparatus according to an embodiment of the present invention.
  • the apparatus is applied to a data sending end.
  • the data loss detection apparatus includes: a detection module 501 and a determination module 502, wherein,
  • a detection module 501 configured to detect at least one transmission data packet associated with the application data packet according to the application data packet arrival information of the target application;
  • the determining module 502 is configured to determine that at least one application data packet is lost when at least one transmission data packet is detected to be lost.
  • the data loss detection apparatus detects at least one transmission data packet associated with the application data packet according to the application data packet arrival information of the target application, and further, if it is detected that at least one transmission data packet is lost, it is determined that at least one transmission data packet is lost. An application packet was lost. Therefore, the loss of the application data packet is determined according to the loss of the transmission data packet associated with the application data packet, and the continuous loss of the application data packet is counted in a cross-layer manner, which provides technical support for improving business service performance.
  • the present invention also provides a communication device and a readable storage medium.
  • FIG. 6 it is a block diagram of a communication device for data loss detection according to an embodiment of the present invention.
  • Communication devices are intended to represent various forms of digital computers, such as laptop computers, desktop computers, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers.
  • Communication devices may also represent various forms of mobile devices, such as personal digital processors, cellular phones, smart phones, wearable devices, and other similar computing devices.
  • the components shown herein, their connections and relationships, and their functions are by way of example only, and are not intended to limit implementations of the inventions described and/or claimed herein.
  • the communication device includes: one or more processors 601, a memory 602, and interfaces for connecting various components, including a high-speed interface and a low-speed interface.
  • the various components are interconnected using different buses and may be mounted on a common motherboard or otherwise as desired.
  • the processor may process instructions executed within the communication device, including instructions stored in or on memory to display graphical information of the GUI on an external input/output device, such as a display device coupled to the interface.
  • multiple processors and/or multiple buses may be used with multiple memories and multiple memories, if desired.
  • multiple communication devices may be connected, with each device providing some of the necessary operations (eg, as a server array, a group of blade servers, or a multi-processor system).
  • a processor 601 is taken as an example in FIG. 6 .
  • the memory 602 is the non-transitory computer-readable storage medium provided by the present invention.
  • the memory stores instructions executable by at least one processor, so that the at least one processor executes the data loss detection method provided by the present invention.
  • the non-transitory computer-readable storage medium of the present invention stores computer instructions, and the computer instructions are used to make the computer execute the data loss detection method provided by the present invention.
  • the memory 602 can be used to store non-transitory software programs, non-transitory computer-executable programs and modules, such as program instructions/modules corresponding to the data loss detection method in the embodiment of the present invention.
  • the processor 601 executes various functional applications and data processing of the server by running the non-transitory software programs, instructions and modules stored in the memory 602, ie, implements the data loss detection method in the above method embodiments.
  • the memory 602 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the positioning communication device, and the like. Additionally, memory 602 may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. Optionally, memory 602 may optionally include memory located remotely relative to processor 601, and these remote memories may be connected to the positioning communication device via a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • the communication device performing the data loss detection method may further include: an input device 603 and an output device 604 .
  • the processor 601 , the memory 602 , the input device 603 and the output device 604 may be connected by a bus or in other ways, and the connection by a bus is taken as an example in FIG. 6 .
  • the input device 603 can receive input numerical or character information and generate key signal input related to user settings and functional control of the positioning communication device, such as a touch screen, keypad, mouse, trackpad, touchpad, pointing stick, one or more Input devices such as mouse buttons, trackballs, joysticks, etc.
  • Output devices 604 may include display devices, auxiliary lighting devices (eg, LEDs), haptic feedback devices (eg, vibration motors), and the like.
  • the display device may include, but is not limited to, a liquid crystal display (LCD), a light emitting diode (LED) display, and a plasma display. In some implementations, the display device may be a touch screen.
  • Various implementations of the systems and techniques described herein can be implemented in digital electronic circuitry, integrated circuit systems, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include being implemented in one or more computer programs executable and/or interpretable on a programmable system including at least one programmable processor that The processor, which may be a special purpose or general-purpose programmable processor, may receive data and instructions from a storage system, at least one input device, and at least one output device, and transmit data and instructions to the storage system, the at least one input device, and the at least one output device an output device.
  • the processor which may be a special purpose or general-purpose programmable processor, may receive data and instructions from a storage system, at least one input device, and at least one output device, and transmit data and instructions to the storage system, the at least one input device, and the at least one output device an output device.
  • machine-readable medium and “computer-readable medium” refer to any computer program product, apparatus, and/or apparatus for providing machine instructions and/or data to a programmable processor ( For example, magnetic disks, optical disks, memories, programmable logic devices (PLDs), including machine-readable media that receive machine instructions as machine-readable signals.
  • machine-readable signal refers to any signal used to provide machine instructions and/or data to a programmable processor.
  • the systems and techniques described herein may be implemented on a computer having a display device (eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user ); and a keyboard and pointing device (eg, a mouse or trackball) through which a user can provide input to the computer.
  • a display device eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • a keyboard and pointing device eg, a mouse or trackball
  • Other kinds of devices can also be used to provide interaction with the user; for example, the feedback provided to the user can be any form of sensory feedback (eg, visual feedback, auditory feedback, or tactile feedback); and can be in any form (including acoustic input, voice input, or tactile input) to receive input from the user.
  • the systems and techniques described herein may be implemented on a computing system that includes back-end components (eg, as a data server), or a computing system that includes middleware components (eg, an application server), or a computing system that includes front-end components (eg, a user's computer having a graphical user interface or web browser through which a user may interact with implementations of the systems and techniques described herein), or including such backend components, middleware components, Or any combination of front-end components in a computing system.
  • the components of the system may be interconnected by any form or medium of digital data communication (eg, a communication network). Examples of communication networks include: Local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
  • a computer system can include clients and servers.
  • Clients and servers are generally remote from each other and usually interact through a communication network.
  • the relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提出了一种数据丢失检测方法、装置、通信设备及存储介质,涉及移动通信技术领域,其中,方法包括:根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包;如果检测到至少一个传输数据包丢失,则确定至少一个应用数据包丢失。由此,根据应用数据包关联的传输数据包的丢失,确定应用数据包的丢失,实现了通过跨层方式统计连续丢失的应用数据包,为提高业务服务性能提供了技术支撑。

Description

数据丢失检测方法、装置、通信设备及存储介质 技术领域
本发明涉及移动通信技术领域,特别涉及一种数据丢失检测方法、装置、通信设备及存储介质。
背景技术
通常,对于有更高可靠性需求的业务,数据包的发送会有预期到达时间或生存时间,如果数据的接收端在特定数据的预期到达时间没有接收到,则认为该数据包丢失,如果出现连续的多个数据包丢失,则数据的接收端认为应用服务会处于不可用的状态,从而需要更长的时间进行正常应用服务的恢复过程。
相关技术中,应用服务的数据包在传输的过程中会进行分段(如,传输控制协议(Transmission Control Protocol,TCP)/网络互连协议(Internet Protocol,IP)协议进行分段),则无线网络的空口协议栈发送的有可能是经过分段的多个数据包(如,1个应用数据包可以分段成n个IP包,而1个包数据汇聚协议(Packet Data Convergence Protocol,PDCP)的服务数据单元(Service Data Unit,SDU)对应为1个IP包。因此如何在空口统计连续多个应用服务数据包的丢失是亟待解决的问题。
发明内容
本发明第一方面实施例提出了一种数据丢失检测方法、装置、通信设备及存储介质,通过跨层的方法,通过传输数据包丢失从而判断出业务应用数据包的丢失,为提高业务服务性能提供了技术支撑。
本发明第一方面实施例提出了一种数据丢失检测方法,所述方法应用于数据发送端,包括:根据目标应用的应用数据包到达信息检测与所述应用数据包关联的至少一个传输数据包;如果检测到至少一个所述传输数据包丢失,则确定至少一个所述应用数据包丢失。
可选地,所述目标应用的应用标识包括以下至少一项:会话标识、业务流标识、数据无线承载DRB标识、逻辑信道标识、无线链路控制RLC标识、小区组标识。
可选地,所述应用数据包到达信息,包括:应用数据包到达时间和/或应用数据包到达数量。
可选地,还包括:所述应用数据包到达时间和应用数据包到达数量由协议约定或者网络配置。
可选地,所述应用数据包到达时间包括以下任意一种:所述应用数据包的绝对到达时间;所述应用数据包的到达起始时间和到达周期;所述应用数据包的起始到达时间;所述应用数据包的到达时间间隔。
可选地,所述根据目标应用的应用数据包到达信息检测与所述应用数据包关联的至少一个传输数据包,包括:如果与所述应用数据包到达时间对应的所述应用数据包到达数量为一个,在目标时间或者目标时间段检测到达的与一个所述应用数据包关联的一个或者多个传输数据包。
可选地,所述如果检测到至少一个所述传输数据包丢失,则确定至少一个所述应用数据包丢失,包括:如果检测到所述一个或者多个传输数据包中的任意一个传输数据包丢失,则确定一个所述应用数据包丢失。
可选地,所述根据目标应用的应用数据包到达信息检测与所述应用数据包关联的至少一个传输数据包,包括:如果与所述应用数据包到达时间对应的所述应用数据包到达数量为多个,在目标时间或者目标时间段检测到达的与多个所述应用数据包关联的多个传输数据包。
可选地,所述如果检测到至少一个所述传输数据包丢失,则确定至少一个所述应用数据包丢失,包括:如果检测到所述多个传输数据包中的第1个或最后1个传输数据包丢失,则确定与所述第1个或与所述最后1个传输数据包关联的一个所述应用数据包丢失。
可选地,所述如果检测到至少一个所述传输数据包丢失,则确定至少一个所述应用数据包丢失,包括:如果检测到所述多个传输数据包中的第1个和最后1个传输数据包都丢失,则确定两个所述应用数 据包丢失。
可选地,在所述目标时间达到的所述传输数据包,包括以下任意一种:在所述应用数据包到达时间到达的传输数据包;在与所述应用数据包到达时间的时间差小于或等于预设的时间偏移量的时间到达的传输数据包;在与指定传输数据包到达时间的时间差小于或等于预设门限值的时间到达的传输数据包。
可选地,在所述目标时间段到达的所述传输数据包,包括以下任意一种:在从第一绝对时间到第二绝对时间之间的时间段到达的传输数据包;在从第一时间到第二时间之间的时间段到达的传输数据包,其中,所述第一时间在所述应用数据包到达时间之前,所述第二时间在所述应用数据包到达时间之后,且所述应用数据包到达时间与所述第一时间的时间差小于等于预设门限值,所述第二时间与所述应用数据包到达时间或者与所述第一时间之间的时间差小于等于预设门限值。
可选地,所述传输数据包的类型包括以下任意一种:业务数据适配协议的服务数据单元SDAP SDU、业务数据适配协议的协议数据单元SDAP PDU、包数据汇聚协议的服务数据单元PDCP SDU、包数据汇聚协议的协议数据单元PDCP PDU。
可选地,所述传输数据包丢失的检测方法包括以下任意一种:从所述传输数据包到达时刻开始,在预设时间内没有发送所述传输数据包;从所述传输数据包到达时刻开始,在预设时间内没有收到发送成功确认消息;从所述传输数据包到达时刻开始到所述传输数据包成功发送时刻的时间差大于或等于预设门限值;所述传输数据包的发送失败次数超过门限值。
可选地,所述发送成功确认消息,包括以下任意一种:包数据汇聚协议PDCP状态报告中的发送成功指示;无线链路控制RLC状态报告中的发送成功指示;混合自动重传请求HARQ反馈中的发送成功指示。
可选地,还包括:当检测到所述应用数据包的丢失情况满足预设的触发条件,则触发所述目标应用的传输恢复过程。
可选地,所述应用数据包的丢失情况满足预设的触发条件,包括:应用数据包丢失定时器超过预设时长,和/或,达到预设门限值。
可选地,所述预设时长为应用数据包发送周期的整数倍。
可选地,所述应用数据包丢失定时器的启动条件包括以下任意一种:响应于检测到一个所述应用数据包丢失,启动所述应用数据包丢失定时器,响应于检测到一个所述应用数据包丢失,且所述目标应用的应用数据包丢失定时器没有运行,启动所述应用数据包丢失定时器。
可选地,所述应用数据包丢失定时器的停止条件包括以下任意一种:响应于检测到一个所述应用数据包发送,停止所述应用数据包丢失定时器,响应于检测到一个所述应用数据包存在发送成功概率,停止所述应用数据包丢失定时器。
可选地,所述应用数据包的丢失情况满足预设的触发条件,包括:应用数据包丢失计数器大于或者等于预设门限值。
可选地,所述应用数据包丢失计数器的计数条件包括:
当检测到一个所述应用数据包丢失时,所述应用数据包丢失计数器加1。
可选地,所述应用数据包丢失计数器的复位条件包括:响应于检测到一个所述应用数据包发送,对所述应用数据包丢失计数器复位,和/或,响应于检测到一个所述应用数据包存在发送成功概率,对所述应用数据包丢失计数器复位。
可选地,所述触发所述目标应用的传输恢复过程,包括:向网络侧发送用于所述目标应用进行传输恢复的指示信息。
可选地,所述指示信息包括以下至少一项:所述目标应用的数据包传输失败指示信息;通过所述数据发送端关联的上行传输资源发送数据包传输失败指示信号;通过与所述目标应用和所述数据发送端关联的上行资源发送数据包传输失败指示信号。
可选地,所述触发所述目标应用的传输恢复过程,包括:变更所述目标应用的应用数据包的数据发送方式。
可选地,所述变更所述目标应用的应用数据包的数据发送方式包括以下任意一种:激活所述目标应 用的应用数据包承载的数据复制功能;增加所述目标应用的应用数据包承载的数据复制功能的激活RLC实体数量;变更所述目标应用的应用数据包承载的逻辑信道可使用的上行授权的类型。
可选地,所述激活RLC实体数量为网络配置或协议约定。
可选地,所述可使用的上行授权的类型包括以下任意一种:可使用所有SCS类型的上行授权,可使用SCS数值更大的上行授权;可使用的上行授权对应的PUSCH的持续时长为所有PUSCH持续时长;可使用配置上行授权类型-1;可使用所有小区的上行授权;可使用指定小区的上行授权;可使用所有的配置上行授权类型-2;可使用所有物理优先级的上行授权。
本发明第二方面实施例提出了一种数据丢失检测装置,所述装置应用于数据发送端,包括:检测模块,用于根据目标应用的应用数据包到达信息检测与所述应用数据包关联的至少一个传输数据包;确定模块,用于在检测到至少一个所述传输数据包丢失时,确定至少一个所述应用数据包丢失。
本发明第三方面实施例提出了一种通信设备,包括处理器、收发器、存储器以及存储在所述存储器上的计算机程序,所述处理器运行所述计算机程序,以实现如第一方面实施例提出的数据丢失检测方法。
本发明第四方面实施例提出了一种处理器可读存储介质,所述处理器可读存储介质存储有计算机程序,所述计算机程序用于使所述处理器执行第一方面实施例提出的数据丢失检测方法。
本发明提出的数据丢失检测方法、装置和通信设备,至少具有如下技术效果:
根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包,如果检测到至少一个传输数据包丢失,则确定至少一个应用数据包丢失。由此,根据应用数据包关联的传输数据包的丢失,确定应用数据包的丢失,实现了通过跨层方式统计连续丢失的应用数据包,为提高业务服务性能提供了技术支撑。
本发明附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本发明的实践了解到。
附图说明
本发明上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1是根据本发明一个实施例的数据丢失检测方法的流程示意图;
图2是根据本发明一个实施例的数据丢失检测场景示意图;
图3是根据本发明另一个实施例的数据丢失检测场景示意图;
图4是根据本发明另一个实施例的数据丢失检测方法的流程示意图;
图5是根据本发明一个实施例的数据丢失检测装置的结构示意图;以及
图6是根据本发明一个实施例的通信设备的结构框图。
具体实施方式
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本发明,而不能理解为对本发明的限制。
相关技术中,无法确定出应用数据包的丢失,从而,无法及发现目标应用不可用,影响目标应用的服务性能。
为了解决该技术问题,本发明提出了一种根据确定性业务的数据包到达时间以及数据包到达数量,从而可以通过跨层方式统计连续丢失的应用数据包,进而进行对应的处理,以满足应用的业务质量要求(如,避免连续应用数据包的丢失而导致的应用服务不可用)。
具体而言,图1是根据本发明实施例提供的一种数据丢失检测方法的流程图,其中,数据丢失检测方法的执行主体可以是任意数据发送端对应的通信设备,比如,基站、用户终端等,数据丢失检测方法,为了便于说明,下述实施例中,通常以数据发送端为用户终端UE举例说明,包括:
步骤101,根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包。
其中,目标应用为待评估服务性能的任意应用,包括但不限于社交应用、工具应用等。
可以理解,对于有更高可靠性需求的业务,应用数据包的发送会有预期到达时间或生存时间,如果数据的接收端在特定数据的预期到达时间没有接收到对应的应用数据包,则认为该应用数据包丢失,如果出现连续的多个应用数据包丢失,则数据的接收端认为应用服务会处于不可用的状态,从而需要更长的时间进行正常应用服务的恢复过程。
因此,在本实施例中,通过目标应用数据包的达到信息进行检测,其中,达到信息可以为任意体现应用数据包达到情况的信息。
在本发明的实施例中,一个应用数据包包括至少一个关联的传输数据包,因此,在实际执行过程中,可以通过检测传输数据进行目标应用的服务可用性的判断。
其中,数据传输包的类型根据业务的不同而不同,包括但不限于业务数据适配协议的服务数据单元SDAP SDU、业务数据适配协议的协议数据单元SDAP PDU、包数据汇聚协议的服务数据单元PDCP SDU、包数据汇聚协议的协议数据单元PDCP PDU等。
步骤102,如果检测到至少一个传输数据包丢失,则确定至少一个应用数据包丢失。
在本实施例中,若检测到至少一个传输数据包丢失,则由于传输数据包与应用数据包关联,因此,认为至少一个应用数据包丢失,从而,根据应用数据包丢失的情况进行有关处理,也满足业务质量的处理,比如,更换目标应用的连接网络等。
在本发明的一个实施例中,数据接收端可能同时接收多个目标应用的应用数据包,因此,为了便于区分,目标应用还具有标志其唯一性的应用标识,该应用标识可以用来对其对应的应用数据包进行标识等。
其中,目标应用的应用标识包括会话标识(比如,PDU Session-1)、业务流标识(比如,业务质量(Quality of Service,QoS)flow-1)、数据无线承载DRB标识(比如,DRB-1)、逻辑信道标识(比如,LCID-1)、无线链路控制RLC标识(比如,RLC实体-1)、小区组标识(比如,主小区组(Master Cell group,MCG)或辅小区组(Master Cell group,SCG))中的至少一项。
综上,本发明实施例的数据丢失检测方法,根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包,进而,如果检测到至少一个传输数据包丢失,则确定至少一个应用数据包丢失。由此,根据应用数据包关联的传输数据包的丢失,确定应用数据包的丢失,实现了通过跨层方式统计连续丢失的应用数据包,为提高业务服务性能提供了技术支撑。
正如以上提到的,在不同的应用场景中,应用数据包的达到信息可以包括不同的内容,为了更清楚的描述本发明的实施例中,下面以应用数据包到达信息,包括:应用数据包到达时间和/或应用数据包到达数量进行说明。
其中,应用数据包到达时间可以包括应用数据包的绝对到达时间,比如,应用数据包的达到时间为在1月1日1分1秒到达;
或者,可以包括应用数据包的到达起始时间和到达周期,比如应用数据包每10ms到达1次;
或者,还可以包括应用数据包的到达起始时间,比如,系统帧(System Frame Number,SFN)的所在时隙,比如,应用数据包SFN=1,slot=1,可以包括应用数据包在起始到达时间开始到达,比如,应用数据包1在1月1日1分1秒开始到达等;
或者,可以包括应用数据包的到达时间间隔,比如,应用数据包1和应用数据包2的到达时间的间隔为10ms,则应用数据包的到达时间间隔大于或等于10ms的2个应用数据包为2个独立的应用数据包,又比如应用数据包1的到达时间为t,该应用数据包1的传输数据包1的到达时间也为t,则对于t2时间到达的传输数据包x,如果t2-t1大于或等于预设时间阈值,则t2时间到达的传输数据包x属于应用数据包2,则应用数据包2的到达时间为t2。
在一些可能的实施例中,上述提到的,应用数据包到达时间”和“应用数据包到达数量”可以由协议约定或网络配置,或者由协议约定和网络配置共同确定。(如,网络配置UE检测DRB-1(或QoS flow-1) 的连续应用数据包丢失,则协议约定对于该业务(如,周期业务)在特定时间每次到达的应用数据包数量为1)。
在本实施例中,根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包,其中,数据传输包的类型根据业务的不同而不同,包括但不限于业务数据适配协议的服务数据单元SDAP SDU、业务数据适配协议的协议数据单元SDAP PDU、包数据汇聚协议的服务数据单元PDCP SDU、包数据汇聚协议的协议数据单元PDCP PDU等,进而,如果检测到至少一个传输数据包丢失,则确定至少一个应用数据包丢失。
下面,结合应用数据包达到信息包括应用数据包到达时间和应用数据包到达数量,说明如何根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包。在本发明的一个实施例中,如果与应用数据包到达时间对应的应用数据包到达数量为一个,在目标时间或者目标时间段检测到达的与一个应用数据包关联的一个或者多个传输数据包。
即参照图2(图2中Packet为应用数据包,SDU为一种可能的传输数据包),当SDU-1到SDU-3均属于应用数据包Packet-1时,可以在目标时间或者目标时间段检测到达的SDU-1到SDU-3的达到情况。
在本实施例中,如果检测到一个或者多个传输数据包中的任意一个传输数据包丢失,则确定一个应用数据包丢失。
举例而言,继续参照图2,对于特定时间或特定时间段的1个或多个传输数据包,如果其中任意1个传输数据包丢失,则判断为1个应用数据包丢失。如上图2示,对于周期性的业务-1,该业务通过QoS flow-1或DRB-1发送,应用数据包的到达周期为T(如,10ms),且每个达到周期中到达的应用数据包的数量为1。则UE的PDCP或业务数据适配协议(Service Data Adaptation Protocol,SDAP)实体对于特定数据包到达时间或特定数据包到达时间段收到1个或多个SDU(如,SDU-1,SDU-2,SDU3)(即,对应传输数据包),则UE认为该1个或多个SDU属于同1个应用数据包(如,APP Packet-1),当该1个或多个SDU中的任意1个SDU丢失的时候,则UE认为丢失了1个应用数据包(或,当该1个或多个SDU中的所有SDU都成功发送的时候,UE认为该应用数据包发送成功。如SDU-1、SDU-2、SDU-3都发送成功了,则UE认为APP Packet-1的应用数据包发送成功。
在本发明的另一个实施例中,如果与应用数据包到达时间对应的应用数据包到达数量为多个,在目标时间或者目标时间段检测到达的与多个应用数据包关联的多个传输数据包。
即参照图3(图3中Packet为应用数据包,SDU为一种可能的传输数据包),当SDU-1到SDU-3均属于应用数据包Packet-1,SDU-4到SDU-6均属于应用数据包Packet-5时,可以在目标时间或者目标时间段检测到达的SDU-1到SDU-6的达到情况。
在本实施例中,如果检测到多个传输数据包中的第1个或最后1个传输数据包丢失,则确定与第1个或与所述最后1个传输数据包关联的一个应用数据包丢失。
举例而言,继续参照图3,对于特定时间或特定时间段的多个传输数据包,如果其中第1个或最后1个传输数据包丢失,则判断与所述第1个或与所述最后1个传输数据包关联的1个应用数据包丢失。如上图3所示,对于周期性的业务-1,该业务通过QoS flow-1,或DR B-1发送,应用数据包的到达周期为T(如,10ms),且每个周期中到达的应用数据包的数量为2。则UE的PDCP或SDAP实体根据对于特定数据包到达时间或特定数据包到达时间段开始收到1个或多个SDU(如,SDU-1,SDU-2,SDU3,SDU-4,SDU-5,SDU-6)(即,对应传输数据包),则UE可以判断得知SDU-1和SDU-6属于不同的应用数据包,当该多个SDU中的第1个或最后1个数据包丢失的时候,则UE认为丢失了1个应用数据包,如SDU-1丢失则认为APP Packet-1丢失,SDU-6丢失则认为APP Packet-2丢失,或,如果第1个和最后1个数据包都丢失的时候,则UE认为丢失了2个应用数据包,或,当该多个SDU中的所有SDU都成功发送的时候,UE认为该2个应用数据包发送成功。
基于上述描述,目标时间是判断是否丢包的重要边界条件,其中,目标时间或者目标时间段与上述应用数据包到达时间对应。在本发明的实施例中,在目标时间到达的传输数据包可以包括以下任意一种:
(1)在应用数据包到达时间到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。
比如,在本示例中,按照特定的应用数据包到达周期和应用数据包到达时间确定的传输数据包到达时间作为目标时间,如,对于应用数据包发送周期为10ms的业务,对于1个特定的传输数据包发送周期的应用数据包预期到达时间为tx,则UE认为在该时间tx到达的传输数据包为属于相同的应用数据包,否则不属于相同的应用数据包。
(2)在与应用数据包到达时间的时间差小于或等于预设的时间偏移量的时间到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。容易理解的是,为了补偿通信过程中复杂的通信环境,若是传输数据包达到时间的时间差小于预设的时间偏移量,则认为传输数据包还是属于对应的应用数据包的。
比如,按照特定的应用数据包到达周期作为目标时间,在特定“应用数据包到达周期”对应的“应用数据包到达时间”tx,与该tx时间偏移小于等于Toffset的时间,如,对于应用数据包发送周期为10ms的业务,对于1个特定的传输数据包发送周期的应用数据包预期到达时间为tx,在时间t1到达传输数据包SDU-1,(t1-tx)小于或等于Toffset(或(tx-t1)小于或等于Toffset),则UE认为在该时间t1到达的传输数据包为属于相同的应用数据包,否则,UE认为在该时间t1到达的传输数据包为不属于相同的应用数据包
(3)在与指定传输数据包到达时间的时间差小于或等于预设门限值的时间到达的传输数据包。
其中,指定传输数据包可以为属于同1个应用数据包的多个传输数据包中的第1个到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。容易理解的是,为了补偿通信过程中复杂的通信环境,若是传输数据包达到时间的时间差小于预设门限值,则认为传输数据包还是属于对应的应用数据包的。
比如,传输数据包到达间隔作为目标时间,传输数据包的达到间隔小于或等于预设门限值的传输数据包到达时间(如,t1时刻到达SDU-1,t2时刻到达SDU-2,而(t2-t1)小于门限值Tx,则UE认为SDU-1和SDU-2属于相同的应用数据包)。
当然,基于上述描述,目标时间也是判断是否丢包的重要边界条件,其中,目标时间或者目标时间段与上述应用数据包到达时间对应。在本发明的实施例中,在目标时间段达到的传输数据包可以包括以下任意一种:
(1)在从第一绝对时间到第二绝对时间之间的时间段到达的传输数据包。
在本示例中,认为在第一绝对时间到第二绝对时间之间的时间段达到的传输数据包应当属于同一个应用数据包,其中,第一绝对时间和第二绝对时间可以根据业务标定,通常,第一绝对时间和第二绝对时间的时间差较短一些。
举例而言,在第一绝对时间t1和第二绝对时间t2之间的时间段,如,对于t1和t2之间到达的数据包,UE认为属于相同的应用数据包。
(2)在从第一时间到第二时间之间的时间段到达的传输数据包,其中,第一时间在应用数据包到达时间之前,第二时间在应用数据包到达时间之后,且应用数据包到达时间与第一时间的时间差小于等于预设门限值,第二时间与应用数据包到达时间或者与第一时间之间的时间差小于等于预设门限值。
在本实施例中,根据应用数据包达到时间标定一个时间段,以补偿通信中复杂的通信场景,该时间段为第一时间到第二时间限定的,其中,第一时间在应用数据包到达时间之前,第二时间在应用数据包到达时间之后,且应用数据包到达时间与第一时间的时间差小于等于预设门限值,第二时间与应用数据包到达时间或者与第一时间之间的时间差小于等于预设门限值。其中,预设门限值越大,则认为时间段的补偿能力越强,同时带来的误判的可能性也随之增大,因此,在一些可能的示例中,为了提高判断的 精确度,也可以将预设门限值设置为0,即只有认为在应用数据包到达时间达到的传输数据包才属于对应的应用数据包。
其中,本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。
举例而言,对于特定的应用数据包到达周期,在特定“应用数据包到达周期”对应的“应用数据包到达时间”之前的时间t1和之后的时间t2间的时间范围为Ty的时间段。其中,t1和t2为大于或等于0的数值。
比如,对于数据包发送周期(或间隔)为10ms的业务,对于1个特定的应用数据包发送周期的数据预期到达时间为tx,t1为tx之前的传输数据包SDU-1的到达时间,t2为tx之后的传输数据包SDU-2的到达时间。当t1有传输数据包SDU-1到达的时候,如果(tx-t1)小于等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。在t1之后,如果在t2有传输数据包SDU-2达到,如果(t2-t1)小于或等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。或,如果在t2有传输数据包SDU-2达到,这之前没有数据包到达,如果(t2-tx)小于或等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。
综上,本发明实施例的数据丢失检测方法,可根据与应用数据包的达到直接关联的应用数据包到达时间和应用数据包到达数量,来检测与应用数据包关联的传输数据包,并且,在检测传输数据包的时候,可以目标时间或目标时间段作为检测的时间限制,该目标时间和目标时间段可以根据场景需要灵活确定,兼顾了检测精确度和可靠性。
由于应用数据包中包含一个或多个传输数据包,因此,若是传输数据包丢失,则意味着对应的应用数据包可能丢失,从而,目标应用具有不可用的风险,因此,检测传输数据包是否丢失,具有重要意义。
在本发明的实施例中,根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包,其中,数据传输包的类型根据业务的不同而不同,包括但不限于业务数据适配协议的服务数据单元SDAP SDU、业务数据适配协议的协议数据单元SDAP PDU、包数据汇聚协议的服务数据单元PDCP SDU、包数据汇聚协议的协议数据单元PDCP PDU等,进而,如果检测到至少一个传输数据包丢失,则确定至少一个应用数据包丢失。
首先,结合应用数据包达到信息包括应用数据包到达时间和应用数据包到达数量,说明如何根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包。在本发明的一个实施例中,如果与应用数据包到达时间对应的应用数据包到达数量为一个,在目标时间或者目标时间段检测到达的与一个应用数据包关联的一个或者多个传输数据包。
在本实施例中,如果检测到一个或者多个传输数据包中的任意一个传输数据包丢失,则确定一个应用数据包丢失。
在本发明的另一个实施例中,如果与应用数据包到达时间对应的应用数据包到达数量为多个,在目标时间或者目标时间段检测到达的与多个应用数据包关联的多个传输数据包。
在本实施例中,如果检测到多个传输数据包中的第1个或最后1个传输数据包丢失,则确定与该第1个或最后1个传输数据包关联的一个应用数据包丢失。
基于上述描述,目标时间是判断是否丢包的重要边界条件,其中,目标时间或者目标时间段与上述应用数据包到达时间对应。在本发明的实施例中,在目标时间到达的传输数据包可以包括以下任意一种:
(1)在应用数据包到达时间到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。
比如,在本示例中,按照特定的应用数据包到达周期和应用数据包到达时间确定的传输数据包到达时间作为目标时间,如,对于应用数据包发送周期为10ms的业务,对于1个特定的传输数据包发送周 期的应用数据包预期到达时间为tx,则UE认为在该时间tx到达的传输数据包为属于相同的应用数据包,否则不属于相同的应用数据包。
(2)在与应用数据包到达时间的时间差小于或等于预设的时间偏移量的时间到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。容易理解的是,为了补偿通信过程中复杂的通信环境,若是传输数据包达到时间的时间差小于预设的时间偏移量,则认为传输数据包还是属于对应的应用数据包的。
比如,按照特定的应用数据包到达周期作为目标时间,在特定“应用数据包到达周期”对应的“应用数据包到达时间”tx,与该tx时间偏移小于等于Toffset的时间,如,对于应用数据包发送周期为10ms的业务,对于1个特定的传输数据包发送周期的应用数据包预期到达时间为tx,在时间t1到达传输数据包SDU-1,(t1-tx)小于或等于Toffset(或(tx-t1)小于或等于Toffset),则UE认为在该时间t1到达的传输数据包为属于相同的应用数据包,否则,UE认为在该时间t1到达的传输数据包为不属于相同的应用数据包
(3)在与指定传输数据包到达时间的时间差小于或等于预设门限值的时间到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。容易理解的是,为了补偿通信过程中复杂的通信环境,若是传输数据包达到时间的时间差小于预设门限值,则认为传输数据包还是属于对应的应用数据包的。
比如,传输数据包到达间隔作为目标时间,传输数据包的达到间隔小于或等于预设门限值的传输数据包到达时间(如,t1时刻到达SDU-1,t2时刻到达SDU-2,而(t2-t1)小于门限值Tx,则UE认为SDU-1和SDU-2属于相同的应用数据包)。
当然,基于上述描述,目标时间也是判断是否丢包的重要边界条件,其中,目标时间或者目标时间段与上述应用数据包到达时间对应。在本发明的实施例中,在目标时间段到达的传输数据包可以包括以下任意一种:
(1)在从第一绝对时间到第二绝对时间之间的时间段到达的传输数据包。
在本示例中,认为在第一绝对时间到第二绝对时间之间的时间段达到的传输数据包应当属于同一个应用数据包,其中,第一绝对时间和第二绝对时间可以根据业务标定,通常,第一绝对时间和第二绝对时间的时间差较短一些。
举例而言,在第一绝对时间t1和第二绝对时间t2之间的时间段,如,对于t1和t2之间到达的数据包,UE认为属于相同的应用数据包。
(2)在从第一时间到第二时间之间的时间段到达的传输数据包,其中,第一时间在应用数据包到达时间之前,第二时间在应用数据包到达时间之后,且应用数据包到达时间与第一时间的时间差小于等于预设门限值,第二时间与应用数据包到达时间或者与第一时间之间的时间差小于等于预设门限值。
在本实施例中,根据应用数据包达到时间标定一个时间段,以补偿通信中复杂的通信场景,该时间段为第一时间到第二时间限定的,其中,第一时间在应用数据包到达时间之前,第二时间在应用数据包到达时间之后,且应用数据包到达时间与第一时间的时间差小于等于预设门限值,第二时间与应用数据包到达时间或者与第一时间之间的时间差小于等于预设门限值。其中,预设门限值越大,则认为时间段的补偿能力越强,同时带来的误判的可能性也随之增大,因此,在一些可能的示例中,为了提高判断的精确度,也可以将预设门限值设置为0,即只有认为在应用数据包到达时间达到的传输数据包才属于对应的应用数据包。
其中,本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。
举例而言,对于特定的应用数据包到达周期,在特定“应用数据包到达周期”对应的“应用数据包到达时间”之前的时间t1和之后的时间t2间的时间范围为Ty的时间段。其中,t1和t2为大于或等于 0的数值。
比如,对于数据包发送周期(或间隔)为10ms的业务,对于1个特定的应用数据包发送周期的数据预期到达时间为tx,t1为tx之前的传输数据包SDU-1的到达时间,t2为tx之后的传输数据包SDU-2的到达时间。当t1有传输数据包SDU-1到达的时候,如果(tx-t1)小于等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。在t1之后,如果在t2有传输数据包SDU-2达到,如果(t2-t1)小于或等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。或,如果在t2有传输数据包SDU-2达到,这之前没有数据包到达,如果(t2-tx)小于或等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。
其次,在检测传输数据包时,传输数据包丢失的检测方法包括以下任意一种:
(1)从传输数据包到达时刻开始,在预设时间内没有发送传输数据包。
在本实施例中,从传输数据包达到时刻开始,在预设时间内没有发送数据包,则认为传输数据包丢失。其中,预设时间可以根据实验数据标定。
举例而言,从传输数据包到达时刻开始,在时间T内没有发送(如,PDCP实体或SDAP实体,在从高层接收到待发送的SDU的时候,启动定时器tlost,在该tlost超时之前,即没有超过预设时间之前,如果PDCP实体或SDAP实体还没有发送该SDU,则发送端认为该SDU丢失。)
(2)从传输数据包到达时刻开始,在预设时间内没有收到发送成功确认消息。
在本示例中,从传输数据包达到时刻开始,在预设时间内没有收到发送成功的确认消息,则也认为传输数据包丢失,其中,预设时间可以根据实验数据标定,该成功确认消息可以是任意约定的表示传输数据包发送成功的消息,该成功确认消息可以是约定的一串编码,可以为预定的文字等。
举例而言,从传输数据包到达时刻开始,在时间T内没有收到发送成功确认。如,PDCP实体或SDAP实体,在从高层接收到待发送的SDU的时候,启动定时器tlost,在该tlost超时之前,即没有超过预设时间之前,如果PDCP实体或SDAP实体还没有从接收端接收到发送该SDU的发送成功确认消息,则发送端认为该传输数据包SDU丢失。
(3)从传输数据包到达时刻开始到传输数据包成功发送时刻的时间差大于或等于预设门限值。
在本示例中,从传输数据包达到时刻开始到传输数据包成功发送时刻的时间差大于等于预设门限值,则认为该成功发送的传输数据包可能很大程度上不属于对应的应用数据包,因此,认为对应的传输数据包丢失,其中,预设门限值可以根据实验标定。
其中,在一些可能的实施例中,该发送成功确认消息包括以下任意一种:
(1)包数据汇聚协议PDCP状态报告中的发送成功指示。
在本示例中,根据通信机制,可以在PDCP状态报告中发送成功指示,该成功指示的具体形式可以根据预先约定配置,在不同的应用场景中,该发送成功指示包括但不限于约定的文字信息,或者,约定的数字编码信息等。
(2)无线链路控制RLC状态报告中的发送成功指示。
在本示例中,根据通信机制,可以在RLC状态报告中发送成功指示,该成功指示的具体形式可以根据预先约定配置,在不同的应用场景中,该发送成功指示包括但不限于约定的文字信息,或者,约定的数字编码信息等。
(3)混合自动重传请求HARQ反馈中的发送成功指示。
在本示例中,根据通信机制,可以在HARQ反馈中中发送成功指示,该成功指示的具体形式可以根据预先约定配置,在不同的应用场景中,该发送成功指示包括但不限于约定的文字信息,或者,约定的数字编码信息等。
举例而言,从传输数据包到达时刻开始,到传输数据包成功发送时刻,该段时间大于或等于门限值T。比如,PDCP实体或SDAP实体,在从高层接收到待发送的SDU-1的时间为t1,接收到该传输数据包发送成功确认消息的时间为tx,而该传输数据包发送成功确认消息是对于在t2时间发送的SDU-1的传输确认消息。如果(t2-t1)大于或等于门限值,则该传输数据包丢失。或,如果(t2-t1)小于或等于门限值,则该数据包发送成功。
(4)传输数据包的发送失败次数超过门限值。
在本实施例中,考虑到在很多通信场景下具有重传机制,因此,单次传输数据包发送失败并不直接认为传输数据包丢失,而是判断传输数据包的发送次数超过门限值,才认为对应的传输数据包丢失。其中,门限值可以根据实验数据标定。
举例而言,如,传输数据包1发送失败1次之后,进行重传。当该重传的次数达到门限值仍然没有发送成功(如,没有收到数据接收端的成功确认消息),则认为该传输数据包1丢失。
综上,本发明实施例的数据丢失检测方法,根据灵活根据场景需要选择检测传输数据包丢失的检测方式,提高了数据丢失检测的实用性。
在实际执行过程中,检测应用数据包是否发送成功的目的是为了判断目标应用的是否可用,因此,主要目的是为了提高目标应用的服务性能,因此,还可以根据应用数据包的丢失情况,进行传输恢复,以使得目标应用提供可以满足有关业务需求。
在本发明的一个实施例中,如图4所示,该数据丢失检测方法,包括:
步骤401,根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包。
其中,目标应用为待评估服务性能的任意应用,包括但不限于社交应用、工具应用等。
可以理解,对于有更高可靠性需求的业务,应用数据包的发送会有预期到达时间或生存时间,如果数据的接收端在特定数据的预期到达时间没有接收到对应的应用数据包,则认为该应用数据包丢失,如果出现连续的多个应用数据包丢失,则数据的接收端认为应用服务会处于不可用的状态,从而需要更长的时间进行正常应用服务的恢复过程。
因此,在本实施例中,通过目标应用数据包的达到信息进行检测,其中,达到信息可以为任意体现应用数据包达到情况的信息。
在本发明的实施例中,一个应用数据包包括至少一个关联的传输数据包,因此,在实际执行过程中,可以通过检测传输数据进行目标应用的服务可用性的判断。
其中,数据传输包的类型根据业务的不同而不同,包括但不限于业务数据适配协议的服务数据单元SDAP SDU、业务数据适配协议的协议数据单元SDAP PDU、包数据汇聚协议的服务数据单元PDCP SDU、包数据汇聚协议的协议数据单元PDCP PDU等。
步骤402,如果检测到至少一个传输数据包丢失,则确定至少一个应用数据包丢失。
在本实施例中,若检测到至少一个传输数据包丢失,则由于传输数据包与应用数据包关联,因此,认为至少一个应用数据包丢失,从而,根据应用数据包丢失的情况进行有关处理,也满足业务质量的处理,比如,更换目标应用的连接网络等。
在本发明的一个实施例中,数据接收端可能同时接收多个目标应用的应用数据包,因此,为了便于区分,目标应用还具有标志其唯一性的应用标识,该应用标识可以用来对其对应的应用数据包进行标识等。
其中,目标应用的应用标识包括会话标识(比如,PDU Session-1)、业务流标识(比如,业务质量(Quality of Service,QoS)flow-1)、数据无线承载DRB标识(比如,DRB-1)、逻辑信道标识(比如,LCID-1)、无线链路控制RLC标识(比如,RLC实体-1)、小区组标识(比如,主小区组(Master Cell group,MCG)或辅小区组(Master Cell group,SCG))中的至少一项。
在本实施例中,如果检测到一个或者多个传输数据包中的任意一个传输数据包丢失,则确定一个应用数据包丢失。
在本发明的另一个实施例中,如果与应用数据包到达时间对应的应用数据包到达数量为多个,在目标时间或者目标时间段检测到达的与多个应用数据包关联的多个传输数据包。
在本实施例中,如果检测到多个传输数据包中的第1个或最后1个传输数据包丢失,则确定与所述第1个或与所述最后1个传输数据包关联的一个应用数据包丢失。
基于上述描述,目标时间是判断是否丢包的重要边界条件,其中,目标时间或者目标时间段与上述应用数据包到达时间对应。在本发明的实施例中,目标时间到达的传输数据包可以包括以下任意一种:
(1)在应用数据包到达时间到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。
比如,在本示例中,按照特定的应用数据包到达周期和应用数据包到达时间确定的传输数据包到达时间作为目标时间,如,对于应用数据包发送周期为10ms的业务,对于1个特定的传输数据包发送周期的应用数据包预期到达时间为tx,则UE认为在该时间tx到达的传输数据包为属于相同的应用数据包,否则不属于相同的应用数据包。
(2)在与应用数据包到达时间的时间差小于或等于预设的时间偏移量的时间到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。容易理解的是,为了补偿通信过程中复杂的通信环境,若是传输数据包达到时间的时间差小于预设的时间偏移量,则认为传输数据包还是属于对应的应用数据包的。
比如,按照特定的应用数据包到达周期作为目标时间,在特定“应用数据包到达周期”对应的“应用数据包到达时间”tx,与该tx时间偏移小于等于Toffset的时间,如,对于应用数据包发送周期为10ms的业务,对于1个特定的传输数据包发送周期的应用数据包预期到达时间为tx,在时间t1到达传输数据包SDU-1,(t1-tx)小于或等于Toffset(或(tx-t1)小于或等于Toffset),则UE认为在该时间t1到达的传输数据包为属于相同的应用数据包,否则,UE认为在该时间t1到达的传输数据包为不属于相同的应用数据包
(3)在与指定传输数据包到达时间的时间差小于或等于预设门限值的时间到达的传输数据包。
本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。容易理解的是,为了补偿通信过程中复杂的通信环境,若是传输数据包达到时间的时间差小于预设门限值,则认为传输数据包还是属于对应的应用数据包的。
比如,传输数据包到达间隔作为目标时间,传输数据包的达到间隔小于或等于预设门限值的传输数据包到达时间(如,t1时刻到达SDU-1,t2时刻到达SDU-2,而(t2-t1)小于门限值Tx,则UE认为SDU-1和SDU-2属于相同的应用数据包)。
当然,基于上述描述,目标时间也是判断是否丢包的重要边界条件,其中,目标时间或者目标时间段与上述应用数据包到达时间对应。在本发明的实施例中,在目标时间段到达的传输数据包可以包括以下任意一种:
(1)在从第一绝对时间到第二绝对时间之间的时间段到达的传输数据包。
在本示例中,认为在第一绝对时间到第二绝对时间之间的时间段达到的传输数据包应当属于同一个应用数据包,其中,第一绝对时间和第二绝对时间可以根据业务标定,通常,第一绝对时间和第二绝对时间的时间差较短一些。
举例而言,在第一绝对时间t1和第二绝对时间t2之间的时间段,如,对于t1和t2之间到达的数据包,UE认为属于相同的应用数据包。
(2)在从第一时间到第二时间之间的时间段到达的传输数据包,其中,第一时间在应用数据包到达时间之前,第二时间在应用数据包到达时间之后,且应用数据包到达时间与第一时间的时间差小于等于预设门限值,第二时间与应用数据包到达时间或者与第一时间之间的时间差小于等于预设门限值。
在本实施例中,根据应用数据包达到时间标定一个时间段,以补偿通信中复杂的通信场景,该时间段为第一时间到第二时间限定的,其中,第一时间在应用数据包到达时间之前,第二时间在应用数据包到达时间之后,且应用数据包到达时间与第一时间的时间差小于等于预设门限值,第二时间与应用数据包到达时间或者与第一时间之间的时间差小于等于预设门限值。其中,预设门限值越大,则认为时间段的补偿能力越强,同时带来的误判的可能性也随之增大,因此,在一些可能的示例中,为了提高判断的精确度,也可以将预设门限值设置为0,即只有认为在应用数据包到达时间达到的传输数据包才属于对 应的应用数据包。
其中,本示例中的应用数据包到达时间到达包括:应用数据包在绝对到达时间到达;或者,应用数据包从到达起始时间开始的到达周期内到达;或者,应用数据包在起始到达时间开始到达;或者,应用数据包的到达时间间隔。
举例而言,对于特定的应用数据包到达周期,在特定“应用数据包到达周期”对应的“应用数据包到达时间”之前的时间t1和之后的时间t2间的时间范围为Ty的时间段。其中,t1和t2为大于或等于0的数值。
比如,对于数据包发送周期(或间隔)为10ms的业务,对于1个特定的应用数据包发送周期的数据预期到达时间为tx,t1为tx之前的传输数据包SDU-1的到达时间,t2为tx之后的传输数据包SDU-2的到达时间。当t1有传输数据包SDU-1到达的时候,如果(tx-t1)小于等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。在t1之后,如果在t2有传输数据包SDU-2达到,如果(t2-t1)小于或等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。或,如果在t2有传输数据包SDU-2达到,这之前没有数据包到达,如果(t2-tx)小于或等于门限值Ty,则UE认为该传输数据包属于预期在tx收到的应用数据包。
其次,在检测传输数据包时,传输数据包丢失的检测方法包括以下任意一种:
(1)从传输数据包到达时刻开始,在预设时间内没有发送传输数据包。
在本实施例中,从传输数据包达到时刻开始,在预设时间内没有发送数据包,则认为传输数据包丢失。其中,预设时间可以根据实验数据标定。
举例而言,从传输数据包到达时刻开始,在时间T内没有发送(如,PDCP实体或SDAP实体,在从高层接收到待发送的SDU的时候,启动定时器tlost,在该tlost超时之前,即没有超过预设时间之前,如果PDCP实体或SDAP实体还没有发送该SDU,则发送端认为该SDU丢失。)
(2)从传输数据包到达时刻开始,在预设时间内没有收到发送成功确认消息。
在本示例中,从传输数据包达到时刻开始,在预设时间内没有收到发送成功的确认消息,则也认为传输数据包丢失,其中,预设时间可以根据实验数据标定,该成功确认消息可以是任意约定的表示传输数据包发送成功的消息,该成功确认消息可以是约定的一串编码,可以为预定的文字等。
举例而言,从传输数据包到达时刻开始,在时间T内没有收到发送成功确认。如,PDCP实体或SDAP实体,在从高层接收到待发送的SDU的时候,启动定时器tlost,在该tlost超时之前,即没有超过预设时间之前,如果PDCP实体或SDAP实体还没有从接收端接收到发送该SDU的发送成功确认消息,则发送端认为该传输数据包SDU丢失。
(3)从传输数据包到达时刻开始到传输数据包成功发送时刻的时间差大于或等于预设门限值。
在本示例中,从传输数据包达到时刻开始到传输数据包成功发送时刻的时间差大于等于预设门限值,则认为该成功发送的传输数据包可能很大程度上不属于对应的应用数据包,因此,认为对应的传输数据包丢失,其中,预设门限值可以根据实验标定。
其中,在一些可能的实施例中,该发送成功确认消息包括以下任意一种:
(1)包数据汇聚协议PDCP状态报告中的发送成功指示。
在本示例中,根据通信机制,可以在PDCP状态报告中发送成功指示,该成功指示的具体形式可以根据预先约定配置,在不同的应用场景中,该发送成功指示包括但不限于约定的文字信息,或者,约定的数字编码信息等。
(2)无线链路控制RLC状态报告中的发送成功指示。
在本示例中,根据通信机制,可以在RLC状态报告中发送成功指示,该成功指示的具体形式可以根据预先约定配置,在不同的应用场景中,该发送成功指示包括但不限于约定的文字信息,或者,约定的数字编码信息等。
(3)混合自动重传请求HARQ反馈中的发送成功指示。
在本示例中,根据通信机制,可以在HARQ反馈中中发送成功指示,该成功指示的具体形式可以根据预先约定配置,在不同的应用场景中,该发送成功指示包括但不限于约定的文字信息,或者,约定 的数字编码信息等。
举例而言,从传输数据包到达时刻开始,到传输数据包成功发送时刻,该段时间大于或等于门限值T。比如,PDCP实体或SDAP实体,在从高层接收到待发送的SDU-1的时间为t1,接收到该传输数据包发送成功确认消息的时间为tx,而该传输数据包发送成功确认消息是对于在t2时间发送的SDU-1的传输确认消息。如果(t2-t1)大于或等于门限值,则该传输数据包丢失。或,如果(t2-t1)小于或等于门限值,则该数据包发送成功。
(4)传输数据包的发送失败次数超过门限值。
在本实施例中,考虑到在很多通信场景下具有重传机制,因此,单次传输数据包发送失败并不直接认为传输数据包丢失,而是判断传输数据包的发送次数超过门限值,才认为对应的传输数据包丢失。其中,门限值可以根据实验数据标定。
举例而言,如,传输数据包1发送失败1次之后,进行重传。当该重传的次数达到门限值仍然没有发送成功(如,没有收到数据接收端的成功确认消息),则认为该传输数据包1丢失。
步骤403,当检测到应用数据包的丢失情况满足预设的触发条件,则触发目标应用的传输恢复过程。
可以理解,为了兼顾资源的消耗和传输的恢复,预先设置触发条件,只有当应用数据包的丢失情况符合该预设的触发条件,则进行目标应用的传输恢复过程。
在本发明的一个实施例中,应用数据包的丢失满足预设的触发条件,根据定时器的计时来确定,具体包括以下任意一种:
(一)应用数据包丢失定时器超过预设时长。
其中,预设时长由网络配置或协议约定。
在本示例中,若是应用数据包丢失定时器超过预设时长,则认为对应的应用数据包丢失。
在本发明的一个实施例中,预设时长为应用数据包发送周期的整数倍,比如,“应用数据包发送周期”为T,则“应用数据包丢失定时器”的预设时长可以设置为N倍T值,从而,以更好的发现应用数据包的丢失情况。
(二)应用数据包丢失定时器达到预设门限值。
其中,预设门限值也可以由网络配置或协议约定。
在本示例中,若是用数据包丢失定时器达到预设门限值,则认为已经有连续多个应用数据包丢失。
(三)应用数据包丢失定时器超过预设时长和应用数据包丢失定时器达到预设门限值。
在本示例中,若是应用数据包丢失定时器达到预设门限值,并且,应用数据包丢失定时器超过预设时长,则认为已经有连续多个应用数据包丢失。
在一些可能的示例中,为了避免资源的浪费,丢失定时器的在可能发生应用数据包丢失情况时启动,应用数据包丢失定时器的启动条件包括以下任意一种
(1)响应于检测到一个应用数据包丢失,启动应用数据包丢失定时器。
在本示例中,当检测到一个应用数据包丢失时,启动应用数据包丢失定时器,开始根据定时器确定应用数据包的丢失情况。
(2)响应于检测到一个应用数据包丢失,且目标应用的应用数据包丢失定时器没有运行,启动应用数据包丢失定时器。
在本实施例中,为了避免定时器的重复启动,当检测到一个应用数据包丢失时,比如,没有在预设时间内接收到对应的应用数据包,且目标应用的应用数据包丢失定时器没有运行,启动应用数据包丢失定时器。
当然,为了避免资源的浪费,当应用数据包成功发送时,还可及时停止停止器,即当应用数据包丢失定时器满足停止条件,则关闭对应的定时器。
在本示例中,应用数据包丢失定时器的停止条件包括以下任意一种:
第一种:响应于检测到一个应用数据包发送,停止应用数据包丢失定时器。
在本示例中,当检测到一个应用数据包发送时,比如,在预设时间内接收到对应的应用数据包,则认为应用数据包的丢失故障排除,从而,停止应用数据包丢失定时器。
第二种:响应于检测到一个应用数据包存在发送成功概率,停止应用数据包丢失定时器。
在本示例中,当检测到一个应用数据包存在发送成功的概率时,则停止应用数据包丢失定时器。
举例而言,判断“可能有”其他应用数据包发送(或成功发送)的时候,则数据发送端停止该“应用数据包丢失定时器”。(如上图3,如果每个发送周期有3个应用数据包(如,APP Packet-1/APP Packet Extra/APP Packet-2)到达,如果SDU-1和SDU-6丢失,则UE可以知道APP Packet-1和APP Packet-2丢失。如果在SDU-2丢失,而其他SDU没有丢失,则UE无法判断APP Packet Extra是否丢失。其中,如果SDU-2到SDU-5都是发送成功,则UE可以判断出Packet Extra是发送成功的,从而,停止对应的定时器。
在本发明的另一个实施例中,应用数据包的丢失满足预设的触发条件,根据计数器的计数来确定,具体包括:应用数据包丢失计数器大于或者等于预设门限值。
其中,在本发明的实施例中,预设门限值由网络配置或协议约定。
在本发明的一个实施例中,计数器用于对发送丢失的应用数据包计数,每丢失一个应用数据包,则计数器加1,即当检测到一个应用数据包丢失时,应用数据包丢失计数器加1。
同样的,为了避免资源的浪费以及计数的准确性,预先设置计数器的复位条件,当计数器满足对应的复位条件,则直接对计数器进行复位到0的处理,以便于进行下一轮的应用数据包的丢失计数。
在本发明的一个实施例中,应用数据包丢失计数器的复位条件包括以下任意一种或多种:
(1)当检测到一个应用数据包发送时,对应用数据包丢失计数器复位。
在本实施中,当检测到一个应用数据包发送,该发送包括发送但未发送成功的情况,也包括发送成功的情况,则对应用数据包丢计数器复位。
(2)当检测到一个应用数据包存在发送成功概率时,对应用数据包丢失计数器复位。
在本实施例中,当检测到一个应用数据包存在发送成功概率时,比如,判断“可能有”其他应用数据包发送(或成功发送)的时候,则数据发送端停止该“应用数据包丢失定时器”。(如上图3,如果每个发送周期有3个应用数据包(如,APP Packet-1/APP Packet Extra/APP Packet-2)到达,如果SDU-1和SDU-6丢失,则UE可以知道APP Packet-1和APP Packet-2丢失。如果在SDU-2丢失,而其他SDU没有丢失,则UE无法判断APP Packet Extra是否丢失。其中,如果SDU-2到SDU-5都是发送成功,则UE可以判断出Packet Extra是发送成功的,从而,对应用数据包丢失计数器复位。
上述实施例用于触发目标应用的传输恢复过程,下面介绍如何对目标应用的传输进行恢复。
在本发明的一个实施例中,触发的目标应用的传输恢复过程,包括:向网络侧发送用于目标应用进行传输恢复的指示信息。其中,指示信息包括以下至少一项:
(1)目标应用的数据包传输失败指示信息。
在本示例中,目标应用的数据包传输失败指示信息,该指示信息可以显示的指示,或通过指示“携带目标应用的标识信息”的隐含失败指示。
(2)通过数据发送端关联的上行传输资源发送数据包传输失败指示信号。
比如,在UE专属PUCCH或PRACH或SRS或PUSCH资源,UE通过发送上行信号,从而指示出发生应用数据传输失败。
(3)通过与目标应用和数据发送端关联的上行资源发送数据包传输失败指示信号。
在本示例中,比如,可将该UE专属上行资源关联特定的特定应用,从而UE通过发送上行信号,从而指示特定应用发生了应用数据传输失败。
在本发明的另一个实施例中,触发的目标应用的传输恢复过程,包括变更目标应用的应用数据包的数据发送方式。
在本实施例中,变更目标应用的应用数据包的数据发送方式包括以下任意一种:
(1)激活目标应用的应用数据包承载的数据复制功能。
在本实施中,直接激活目标应用的应用数据包承载的数据复制功能,也复制有关应用数据包。
比如,DRB-1或属于DRB-1的QoS flow-1)的丢失的应用数据包数量达到门限值,如果该DRB的PDCP数据复制功能当前为去激活状态,则UE激活该DRB1的数据复制功能。
(2)增加目标应用的应用数据包承载的数据复制功能的激活RLC实体数量。
其中,在一些可能的示例中,该激活RLC实体数量为网络配置或协议约定。
其中,UE的1个承载(如,DRB或SRB)可以关联多个RLC实体(如,leg),该多个RLC实体可以属于1个MAC实体(即,CA Duplication)或2个MAC实体(即,DC Duplication)。在该PDCP数据复制功能激活的时候,UE将1个PDCP PDU复制成多份,并通过不同的RLC实体发送。如果UE有超过2个RLC实体(如,4个RLC实体)与1个PDCP实体关联,网络侧可以通过激活/或去激活命令控制采用哪几个RLC实体用于PDCP数据复制功能,则UE的PDCP实体将复制的数据分别发送给各个激活的RLC实体发送,其中,DCP数据发送端,对于每一个从高层接收到的PDCP SDU(Service Data Unit,服务数据单元)会启动1个定时器,当该定时器超时的时候,UE将该PDCP SDU以及对应PDCP PDU丢弃,则该PDCP SDU传输数据包的发送失败。
在本实施例中,举例而言,如果DRB-1的PDCP关联的RLC实体数量为4,而当前该DRB-1的激活的RLC实体数量为2,则当DRB-1(或属于DRB-1的QoS flow-1)的丢失的应用数据包数量达到门限值的时候,UE额外增加1个激活RLC实体,则,该DRB-1总的激活RLC实体数量为3。
(3)变更目标应用的应用数据包承载的逻辑信道可使用的上行授权的类型。
在本示例中,变更目标应用的应用数据包承载的逻辑信道可使用的上行授权的类型。其中,网络侧可以给UE的特定逻辑信道配置可以使用的上行授权类型,则只有当UE接收到的上行授权的类型与该逻辑信道可以使用的上行授权类型匹配的时候,UE才可以使用该上行授权给该逻辑信道发送数据。
在一些可能的示例中,可使用的上行授权的类型包括以下任意一种:
第一种:可使用所有SCS类型的上行授权。
在本示例中,可以使用所有SCS类型的上行授权,如,如果DRB-1的LCH-1的可用上行授权为只能是SCS=15KHz的上行授权,则当DRB-1(或属于DRB-1的QoS flow-1)的连续丢失的应用数据包数量达到门限值的时候,DRB-1的LCH-1可以使用所有SCS类型的上行授权。
第二种:可使用SCS数值更大的上行授权。
举例而言,如果DRB-1的LCH-1的可用上行授权为只能是SCS=15KHz的上行授权,则当DRB-1(或属于DRB-1的QoS flow-1)的连续丢失的应用数据包数量达到门限值的时候,DRB-1的LCH-1可以使用SCS=30KHz,即,大于15KHz的上行授权。
第三种:可使用的上行授权对应的PUSCH的持续时长为所有PUSCH持续时长。
举例而言,如果DRB-1的LCH-1的可用上行授权为只能是PUSCH的持续时长小于等于7个OFDM符号的上行授权,则当DRB-1或属于DRB-1的QoS flow-1的连续丢失的应用数据包数量达到门限值的时候,DRB-1的LCH-1可以使用所有PUSCH持续时长的上行授权。
第四种:可使用配置上行授权类型-1。
举例而言,如果DRB-1的LCH-1的可用上行授权为不能使用配置上行授权类型-1,则当DRB-1(或属于DRB-1的QoS flow-1)的连续丢失的应用数据包数量达到门限值的时候,DRB-1的LCH-1可以使用配置上行授权类型-1。
第五种:可使用所有小区的上行授权。
举例而言,如果DRB-1的LCH-1的可用上行授权为只能是小区-1的上行授权,则当DRB-1(或属于DRB-1的QoS flow-1)的连续丢失的应用数据包数量达到门限值的时候,DRB-1的LCH-1可以使用所有小区的上行授权。
第六种:可使用指定小区的上行授权。
举例而言,如果DRB-1的LCH-1的可用上行授权为只能是小区-1的上行授权,则当DRB-1(或属于DRB-1的QoS flow-1)的丢失的应用数据包数量达到门限值的时候,DRB-1的LCH-1可以使用指定小区x(如,PCell或PSCell)的上行授权。其中,该指定小区可以为网络配置或协议约定。
第七种:可使用所有的配置上行授权类型-2。
举例而言,网络给UE配置了多套配置上行授权类型-2的资源(如,配置上行授权类型-2资源-1和配置上行授权类型-2资源-2),如果DRB-1的LCH-1可以使用配置上行授权类型-2资源-1,则当DRB-1 (或属于DRB-1的QoS flow-1)的连续丢失的应用数据包数量达到门限值的时候,DRB-1的LCH-1可以使用所有的配置上行授权类型-2(如,包括了配置上行授权类型-2资源-1和配置上行授权类型-2资源-2。
第八种:可使用所有物理优先级的上行授权。
举例而言,如果DRB-1的LCH-1可以使用物理优先级-1的上行资源,则当DRB-1(或属于DRB-1的QoS flow-1)的连续丢失的应用数据包数量达到门限值的时候,DRB-1的LCH-1可以使用所有物理优先级的上行授权。
综上,本发明实施例的数据丢失检测方法,通过统计连续的业务应用数据包的丢失,当传输将要达不到业务质量要求的时候,数据发送端通过变更数据发送方式进行恢复,从而满足业务质量要求。
与上述几种实施例提供的数据丢失检测方法相对应,本发明还提供一种数据丢失检测装置,由于本发明实施例提供的数据丢失检测装置与上述几种实施例提供的数据丢失检测方法相对应,因此在数据丢失检测方法的实施方式也适用于本实施例提供的数据丢失检测装置,在本实施例中不再详细描述。
图5是根据本发明提出的一种数据丢失检测装置的结构示意图。
图5是根据本发明一个实施例的数据丢失检测装置的结构示意图,该装置应用在数据发送端,如图5所示,该数据丢失检测装置包括:检测模块501和确定模块502,其中,
检测模块501,用于根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包;
确定模块502,用于在检测到至少一个传输数据包丢失时,确定至少一个应用数据包丢失。
综上,本发明实施例的数据丢失检测装置,根据目标应用的应用数据包到达信息检测与应用数据包关联的至少一个传输数据包,进而,如果检测到至少一个传输数据包丢失,则确定至少一个应用数据包丢失。由此,根据应用数据包关联的传输数据包的丢失,确定应用数据包的丢失,实现了通过跨层方式统计连续丢失的应用数据包,为提高业务服务性能提供了技术支撑。
根据本发明的实施例,本发明还提供了一种通信设备和一种可读存储介质。
如图6所示,是根据本发明实施例的数据丢失检测的通信设备的框图。通信设备旨在表示各种形式的数字计算机,诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。通信设备还可以表示各种形式的移动装置,诸如,个人数字处理、蜂窝电话、智能电话、可穿戴设备和其它类似的计算装置。本文所示的部件、它们的连接和关系、以及它们的功能仅仅作为示例,并且不意在限制本文中描述的和/或者要求的本发明的实现。
如图6所示,该通信设备包括:一个或多个处理器601、存储器602,以及用于连接各部件的接口,包括高速接口和低速接口。各个部件利用不同的总线互相连接,并且可以被安装在公共主板上或者根据需要以其它方式安装。处理器可以对在通信设备内执行的指令进行处理,包括存储在存储器中或者存储器上以在外部输入/输出装置(诸如,耦合至接口的显示设备)上显示GUI的图形信息的指令。在其它实施方式中,若需要,可以将多个处理器和/或多条总线与多个存储器和多个存储器一起使用。同样,可以连接多个通信设备,各个设备提供部分必要的操作(例如,作为服务器阵列、一组刀片式服务器、或者多处理器系统)。图6中以一个处理器601为例。
存储器602即为本发明所提供的非瞬时计算机可读存储介质。其中,所述存储器存储有可由至少一个处理器执行的指令,以使所述至少一个处理器执行本发明所提供的数据丢失检测方法。本发明的非瞬时计算机可读存储介质存储计算机指令,该计算机指令用于使计算机执行本发明所提供的数据丢失检测方法。
存储器602作为一种非瞬时计算机可读存储介质,可用于存储非瞬时软件程序、非瞬时计算机可执行程序以及模块,如本发明实施例中的数据丢失检测方法对应的程序指令/模块。处理器601通过运行存储在存储器602中的非瞬时软件程序、指令以及模块,从而执行服务器的各种功能应用以及数据处理,即实现上述方法实施例中的数据丢失检测方法。
存储器602可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据定位通信设备的使用所创建的数据等。此外,存储器602可以包括高速随机存取存储器,还可以包括非瞬时存储器,例如至少一个磁盘存储器件、闪存器件、或其他非瞬时固态存储器件。可选地,存储器602可选包括相对于处理器601远程设置的存储器,这些远程存储器可以通过网络连接至定位通信设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
执行数据丢失检测方法的通信设备还可以包括:输入装置603和输出装置604。处理器601、存储器602、输入装置603和输出装置604可以通过总线或者其他方式连接,图6中以通过总线连接为例。
输入装置603可接收输入的数字或字符信息,以及产生与定位通信设备的用户设置以及功能控制有关的键信号输入,例如触摸屏、小键盘、鼠标、轨迹板、触摸板、指示杆、一个或者多个鼠标按钮、轨迹球、操纵杆等输入装置。输出装置604可以包括显示设备、辅助照明装置(例如,LED)和触觉反馈装置(例如,振动电机)等。该显示设备可以包括但不限于,液晶显示器(LCD)、发光二极管(LED)显示器和等离子体显示器。在一些实施方式中,显示设备可以是触摸屏。
此处描述的系统和技术的各种实施方式可以在数字电子电路系统、集成电路系统、专用ASIC(专用集成电路)、计算机硬件、固件、软件、和/或它们的组合中实现。这些各种实施方式可以包括:实施在一个或者多个计算机程序中,该一个或者多个计算机程序可在包括至少一个可编程处理器的可编程系统上执行和/或解释,该可编程处理器可以是专用或者通用可编程处理器,可以从存储系统、至少一个输入装置、和至少一个输出装置接收数据和指令,并且将数据和指令传输至该存储系统、该至少一个输入装置、和该至少一个输出装置。
这些计算程序(也称作程序、软件、软件应用、或者代码)包括可编程处理器的机器指令,并且可以利用高级过程和/或面向对象的编程语言、和/或汇编/机器语言来实施这些计算程序。如本文使用的,术语“机器可读介质”和“计算机可读介质”指的是用于将机器指令和/或数据提供给可编程处理器的任何计算机程序产品、设备、和/或装置(例如,磁盘、光盘、存储器、可编程逻辑装置(PLD)),包括,接收作为机器可读信号的机器指令的机器可读介质。术语“机器可读信号”指的是用于将机器指令和/或数据提供给可编程处理器的任何信号。
为了提供与用户的交互,可以在计算机上实施此处描述的系统和技术,该计算机具有:用于向用户显示信息的显示装置(例如,CRT(阴极射线管)或者LCD(液晶显示器)监视器);以及键盘和指向装置(例如,鼠标或者轨迹球),用户可以通过该键盘和该指向装置来将输入提供给计算机。其它种类的装置还可以用于提供与用户的交互;例如,提供给用户的反馈可以是任何形式的传感反馈(例如,视觉反馈、听觉反馈、或者触觉反馈);并且可以用任何形式(包括声输入、语音输入或者、触觉输入)来接收来自用户的输入。
可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:局域网(LAN)、广域网(WAN)和互联网。
计算机系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。
应该理解,可以使用上面所示的各种形式的流程,重新排序、增加或删除步骤。例如,本发申请中记载的各步骤可以并行地执行也可以顺序地执行也可以不同的次序执行,只要能够实现本发明公开的技术方案所期望的结果,本文在此不进行限制。
上述具体实施方式,并不构成对本发明保护范围的限制。本领域技术人员应该明白的是,根据设计 要求和其他因素,可以进行各种修改、组合、子组合和替代。任何在本发明的精神和原则之内所作的修改、等同替换和改进等,均应包含在本发明保护范围之内。

Claims (32)

  1. 一种数据丢失检测方法,其特征在于,所述方法应用于数据发送端,包括:
    根据目标应用的应用数据包到达信息检测与所述应用数据包关联的至少一个传输数据包;
    如果检测到至少一个所述传输数据包丢失,则确定至少一个所述应用数据包丢失。
  2. 根据权利要求1所述的方法,其特征在于,所述目标应用的应用标识包括以下至少一项:
    会话标识、业务流标识、数据无线承载DRB标识、逻辑信道标识、无线链路控制RLC标识、小区组标识。
  3. 根据权利要求1所述的方法,其特征在于,所述应用数据包到达信息,包括:
    应用数据包到达时间和/或应用数据包到达数量。
  4. 根据权利要求3所述的方法,其特征在于,还包括:
    所述应用数据包到达时间和应用数据包到达数量由协议约定或者网络配置。
  5. 根据权利要求3所述的方法,其特征在于,所述应用数据包到达时间包括以下任意一种:
    所述应用数据包的绝对到达时间;
    所述应用数据包的到达起始时间和到达周期;
    所述应用数据包的起始到达时间;
    所述应用数据包的到达时间间隔。
  6. 根据权利要求3所述的方法,其特征在于,所述根据目标应用的应用数据包到达信息检测与所述应用数据包关联的至少一个传输数据包,包括:
    如果与所述应用数据包到达时间对应的所述应用数据包到达数量为一个,在目标时间或者目标时间段检测到达的与一个所述应用数据包关联的一个或者多个传输数据包。
  7. 根据权利要求6所述的方法,其特征在于,所述如果检测到至少一个所述传输数据包丢失,则确定至少一个所述应用数据包丢失,包括:
    如果检测到所述一个或者多个传输数据包中的任意一个传输数据包丢失,则确定一个所述应用数据包丢失。
  8. 根据权利要求3所述的方法,其特征在于,所述根据目标应用的应用数据包到达信息检测与所述应用数据包关联的至少一个传输数据包,包括:
    如果与所述应用数据包到达时间对应的所述应用数据包到达数量为多个,在目标时间或者目标时间段检测到达的与多个所述应用数据包关联的多个传输数据包。
  9. 根据权利要求8所述的方法,其特征在于,所述如果检测到至少一个所述传输数据包丢失,则确定至少一个所述应用数据包丢失,包括:
    如果检测到所述多个传输数据包中的第1个或最后1个传输数据包丢失,则确定与所述第1个或与所述最后1个传输数据包关联的一个所述应用数据包丢失。
  10. 根据权利要求8所述的方法,其特征在于,所述如果检测到至少一个所述传输数据包丢失,则确定至少一个所述应用数据包丢失,包括:
    如果检测到所述多个传输数据包中的第1个和最后1个传输数据包都丢失,则确定两个所述应用数据包丢失。
  11. 根据权利要求6或8所述的方法,其特征在于,在所述目标时间到达的所述传输数据包,包括以下任意一种:
    在所述应用数据包到达时间到达的传输数据包;
    在与所述应用数据包到达时间的时间差小于或等于预设的时间偏移量的时间到达的传输数据包;
    在与指定传输数据包到达时间的时间差小于或等于预设门限值的时间到达的传输数据包。
  12. 根据权利要求6或8所述的方法,其特征在于,在所述目标时间段到达的所述传输数据包,包括以下任意一种:
    在从第一绝对时间到第二绝对时间之间的时间段到达的传输数据包;
    在从第一时间到第二时间之间的时间段到达的传输数据包,其中,所述第一时间在所述应用数据包到达时间之前,所述第二时间在所述应用数据包到达时间之后,且所述应用数据包到达时间与所述第一时间的时间差小于等于预设门限值,所述第二时间与所述应用数据包到达时间或者与所述第一时间之间的时间差小于等于预设门限值。
  13. 根据权利要求1所述的方法,其特征在于,所述传输数据包的类型包括以下任意一种:
    业务数据适配协议的服务数据单元SDAP SDU、业务数据适配协议的协议数据单元SDAP PDU、包数据汇聚协议的服务数据单元PDCP SDU、包数据汇聚协议的协议数据单元PDCP PDU。
  14. 根据权利要求1所述的方法,其特征在于,所述传输数据包丢失的检测方法包括以下任意一种:
    从所述传输数据包到达时刻开始,在预设时间内没有发送所述传输数据包;
    从所述传输数据包到达时刻开始,在预设时间内没有收到发送成功确认消息;
    从所述传输数据包到达时刻开始到所述传输数据包成功发送时刻的时间差大于或等于预设门限值;
    所述传输数据包的发送失败次数超过门限值。
  15. 根据权利要求14所述的方法,其特征在于,所述发送成功确认消息,包括以下任意一种:
    包数据汇聚协议PDCP状态报告中的发送成功指示;
    无线链路控制RLC状态报告中的发送成功指示;
    混合自动重传请求HARQ反馈中的发送成功指示。
  16. 根据权利要求1所述的方法,其特征在于,还包括:
    当检测到所述应用数据包的丢失情况满足预设的触发条件,则触发所述目标应用的传输恢复过程。
  17. 根据权利要求16所述的方法,其特征在于,所述应用数据包的丢失情况满足预设的触发条件,包括:
    应用数据包丢失定时器超过预设时长,和/或,达到预设门限值。
  18. 根据权利要求17所述的方法,其特征在于,所述预设时长为应用数据包发送周期的整数倍。
  19. 根据权利要求17所述的方法,其特征在于,所述应用数据包丢失定时器的启动条件包括以下任意一种:
    响应于检测到一个所述应用数据包丢失,启动所述应用数据包丢失定时器,
    响应于检测到一个所述应用数据包丢失,且所述目标应用的应用数据包丢失定时器没有运行,启动所述应用数据包丢失定时器。
  20. 根据权利要求19所述的方法,其特征在于,所述应用数据包丢失定时器的停止条件包括以下任意一种:
    响应于检测到一个所述应用数据包发送,停止所述应用数据包丢失定时器,
    响应于检测到一个所述应用数据包存在发送成功概率,停止所述应用数据包丢失定时器。
  21. 根据权利要求16所述的方法,其特征在于,所述应用数据包的丢失情况满足预设的触发条件,包括:
    应用数据包丢失计数器大于或者等于预设门限值。
  22. 根据权利要求21所述的方法,其特征在于,所述应用数据包丢失计数器的计数条件包括:
    当检测到一个所述应用数据包丢失时,所述应用数据包丢失计数器加1。
  23. 根据权利要求22所述的方法,其特征在于,所述应用数据包丢失计数器的复位条件包括:
    当检测到一个所述应用数据包发送时,对所述应用数据包丢失计数器复位,和/或,
    当检测到一个所述应用数据包存在发送成功概率时,对所述应用数据包丢失计数器复位。
  24. 根据权利要求16所述的方法,其特征在于,所述触发所述目标应用的传输恢复过程,包括:
    向网络侧发送用于所述目标应用进行传输恢复的指示信息。
  25. 根据权利要求24所述的方法,其特征在于,所述指示信息包括以下至少一项:
    所述目标应用的数据包传输失败指示信息;
    通过所述数据发送端关联的上行传输资源发送数据包传输失败指示信号;
    通过与所述目标应用和所述数据发送端关联的上行资源发送数据包传输失败指示信号。
  26. 根据权利要求16所述的方法,其特征在于,所述触发所述目标应用的传输恢复过程,包括:
    变更所述目标应用的应用数据包的数据发送方式。
  27. 根据权利要求26所述的方法,其特征在于,所述变更所述目标应用的应用数据包的数据发送方式包括以下任意一种:
    激活所述目标应用的应用数据包承载的数据复制功能;
    增加所述目标应用的应用数据包承载的数据复制功能的激活RLC实体数量;
    变更所述目标应用的应用数据包承载的逻辑信道可使用的上行授权的类型。
  28. 根据权利要求27所述的方法,其特征在于,
    所述激活RLC实体数量为网络配置或协议约定。
  29. 根据权利要求27所述的方法,其特征在于,所述可使用的上行授权的类型包括以下任意一种:
    可使用所有SCS类型的上行授权,
    可使用SCS数值更大的上行授权;
    可使用的上行授权对应的PUSCH的持续时长为所有PUSCH持续时长;
    可使用配置上行授权类型-1;
    可使用所有小区的上行授权;
    可使用指定小区的上行授权;
    可使用所有的配置上行授权类型-2;
    可使用所有物理优先级的上行授权。
  30. 一种数据丢失检测装置,其特征在于,所述装置应用于数据发送端,包括:
    检测模块,用于根据目标应用的应用数据包到达信息检测检测与所述应用数据包关联的至少一个传输数据包;
    确定模块,用于在检测到至少一个所述传输数据包丢失时,确定至少一个所述应用数据包丢失。
  31. 一种通信设备,其特征在于,包括处理器、收发器、存储器以及存储在所述存储器上的计算机程序,所述处理器运行所述计算机程序,以实现如权利要求1-29任一项所述的数据丢失检测方法。
  32. 一种处理器可读存储介质,其特征在于,所述处理器可读存储介质存储有计算机程序,所述计算机程序用于使所述处理器执行权利要求1-29任一项所述的数据丢失检测方法。
PCT/CN2020/132958 2020-11-30 2020-11-30 数据丢失检测方法、装置、通信设备及存储介质 WO2022110229A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080003764.XA CN114930898A (zh) 2020-11-30 2020-11-30 数据丢失检测方法、装置、通信设备及存储介质
PCT/CN2020/132958 WO2022110229A1 (zh) 2020-11-30 2020-11-30 数据丢失检测方法、装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/132958 WO2022110229A1 (zh) 2020-11-30 2020-11-30 数据丢失检测方法、装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2022110229A1 true WO2022110229A1 (zh) 2022-06-02

Family

ID=81753899

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/132958 WO2022110229A1 (zh) 2020-11-30 2020-11-30 数据丢失检测方法、装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN114930898A (zh)
WO (1) WO2022110229A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118019055A (zh) * 2022-11-10 2024-05-10 维沃移动通信有限公司 确定丢包的方法、装置、通信设备及可读存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136312A1 (en) * 2005-12-12 2007-06-14 Imperva, Inc System and method for correlating between http requests and sql queries
CN101132412A (zh) * 2007-09-26 2008-02-27 杭州华三通信技术有限公司 iSCSI系统中的报文长度协商方法、装置和系统
CN101631122A (zh) * 2009-08-03 2010-01-20 杭州安恒信息技术有限公司 一种丢包环境下提升tds协议解析正确率的方法
CN106452689A (zh) * 2016-11-28 2017-02-22 畅捷通信息技术股份有限公司 客户端和服务端的数据传输装置和方法
CN109348508A (zh) * 2013-11-11 2019-02-15 华为技术有限公司 数据传输方法及装置
CN111371533A (zh) * 2020-03-09 2020-07-03 腾讯科技(深圳)有限公司 数据传输方法、装置、存储介质及设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136312A1 (en) * 2005-12-12 2007-06-14 Imperva, Inc System and method for correlating between http requests and sql queries
CN101132412A (zh) * 2007-09-26 2008-02-27 杭州华三通信技术有限公司 iSCSI系统中的报文长度协商方法、装置和系统
CN101631122A (zh) * 2009-08-03 2010-01-20 杭州安恒信息技术有限公司 一种丢包环境下提升tds协议解析正确率的方法
CN109348508A (zh) * 2013-11-11 2019-02-15 华为技术有限公司 数据传输方法及装置
CN106452689A (zh) * 2016-11-28 2017-02-22 畅捷通信息技术股份有限公司 客户端和服务端的数据传输装置和方法
CN111371533A (zh) * 2020-03-09 2020-07-03 腾讯科技(深圳)有限公司 数据传输方法、装置、存储介质及设备

Also Published As

Publication number Publication date
CN114930898A (zh) 2022-08-19

Similar Documents

Publication Publication Date Title
US11533651B2 (en) Transmission control method and device
US10440614B2 (en) Interruptions in wireless communications
US9900798B2 (en) Polling and reporting mechanism
EP3823411B1 (en) Control method for user equipment, and user equipment for mcg failure processing
US8817806B2 (en) Method and apparatus for flow control between RLC and PDCP in a communication
US8743896B2 (en) Method and related communication device for radio link control reconfiguration in a wireless communications system
KR102141389B1 (ko) 다중 무선 접속 기술 기반 통신 시스템에서의 무선 링크 제어 상태 보고 전송 방법 및 장치
JP2012165420A (ja) 無線通信システムにおけるエラー制御メッセージを処理するための方法及び装置
US10932159B2 (en) Data transmission method, data receiving device, and data sending device
WO2022147699A1 (zh) 随机接入方法、装置和电子设备
WO2011113378A2 (zh) 一种用户面缓冲器内存的恢复方法及装置
WO2015042911A1 (zh) 寻呼方法、网络设备和通信系统
KR20130065619A (ko) 송신 노드로부터 목적지 노드로의 데이터 전송 방법
WO2011000236A1 (zh) 报文传输方法及系统
WO2023179538A1 (zh) 数据传输方法、装置、电子设备和存储介质
WO2022110229A1 (zh) 数据丢失检测方法、装置、通信设备及存储介质
CN113765626B (zh) 一种移动通信系统的数据传输方法和装置
CN112789892B (zh) 无线通信方法、装置及系统
CN100372278C (zh) 一种数据单元重传的方法
WO2019178818A1 (zh) 一种信息传输的方法、装置及计算机存储介质
WO2023179365A1 (zh) 一种通信方法和通信装置
JP7494064B2 (ja) 端末装置、基地局装置、方法、および、集積回路
WO2022133924A1 (zh) 一种数据重传确定方法及设备
WO2023050798A1 (zh) 信息配置方法、电子设备和存储介质
WO2023061588A1 (en) Radio access retransmission control

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20963117

Country of ref document: EP

Kind code of ref document: A1