WO2022126465A1 - 一种临时抢占资源的方法及装置、网络设备 - Google Patents

一种临时抢占资源的方法及装置、网络设备 Download PDF

Info

Publication number
WO2022126465A1
WO2022126465A1 PCT/CN2020/137069 CN2020137069W WO2022126465A1 WO 2022126465 A1 WO2022126465 A1 WO 2022126465A1 CN 2020137069 W CN2020137069 W CN 2020137069W WO 2022126465 A1 WO2022126465 A1 WO 2022126465A1
Authority
WO
WIPO (PCT)
Prior art keywords
connection
temporarily
network element
preempted
terminal
Prior art date
Application number
PCT/CN2020/137069
Other languages
English (en)
French (fr)
Inventor
许阳
王淑坤
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202080106326.6A priority Critical patent/CN116325886A/zh
Priority to PCT/CN2020/137069 priority patent/WO2022126465A1/zh
Publication of WO2022126465A1 publication Critical patent/WO2022126465A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control

Definitions

  • the embodiments of the present application relate to the field of mobile communication technologies, and in particular, to a method and apparatus for temporarily preempting resources, and network equipment.
  • the transmission time is short and the data volume is large.
  • This type of service data will occupy a large amount of network resources in a short period of time, but it does not require such a large amount of network resources after the transmission is completed. How to design a resource preemption mechanism for this type of business data to improve resource utilization efficiency needs to be improved.
  • Embodiments of the present application provide a method and apparatus for temporarily preempting resources, and a network device.
  • the network device determines whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the device for temporarily preempting resources provided by the embodiment of the present application is applied to network equipment, and the device includes:
  • a determination unit configured to determine whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the network device provided by the embodiments of the present application includes a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the above-mentioned method for temporarily preempting resources.
  • the chip provided by the embodiment of the present application is used to implement the above-mentioned method for temporarily preempting resources.
  • the chip includes: a processor for invoking and running a computer program from the memory, so that the device on which the chip is installed executes the above-mentioned method for temporarily preempting resources.
  • the computer-readable storage medium provided by the embodiment of the present application is used for storing a computer program, and the computer program enables a computer to execute the above-mentioned method for temporarily preempting resources.
  • the computer program product provided by the embodiments of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the above-mentioned method for temporarily preempting resources.
  • the computer program provided by the embodiments of the present application when running on the computer, enables the computer to execute the above-mentioned method for temporarily preempting resources.
  • a mechanism of temporary preemption and temporary preemption through which the first connection can temporarily preempt the resources of other connections, thereby realizing the purpose of rapidly increasing the throughput of the first connection in a short time, or, Through this mechanism, the resources of the first connection can be temporarily preempted by other connections, thereby realizing the purpose of rapidly increasing the throughput of other connections in a short period of time. Since resource preemption or preemption is temporary, resource utilization efficiency is provided, and the impact on user experience is minimized.
  • FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram 1 of data interaction between a terminal and a network side provided by an embodiment of the present application;
  • FIG. 3 is a schematic diagram 2 of data interaction between a terminal and a network side provided by an embodiment of the present application;
  • FIG. 5 is a schematic flowchart of a method for temporarily preempting resources provided by an embodiment of the present application
  • FIG. 6 is a schematic diagram of temporary preemption/temporary preemption of multiple connections provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a temporary preemption time provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of sending first indication information and/or first time information provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a device for temporarily preempting resources provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • FIG. 12 is a schematic block diagram of a communication system provided by an embodiment of the present application.
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • 5G communication systems or future communication systems etc.
  • the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal 120 (or referred to as a communication terminal, a terminal).
  • the network device 110 may provide communication coverage for a particular geographic area and may communicate with terminals located within the coverage area.
  • the network device 110 may be an evolved base station (Evolutional Node B, eNB or eNodeB) in an LTE system, or a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN), or the
  • the network device can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, a wearable device, a hub, a switch, a bridge, a router, a network-side device in a 5G network, or a network device in a future communication system.
  • the communication system 100 also includes at least one terminal 120 located within the coverage of the network device 110 .
  • Terminal includes, but is not limited to, connections via wired lines, such as via Public Switched Telephone Networks (PSTN), Digital Subscriber Line (DSL), digital cable, direct cable connections; and/or another data connection/network; and/or via a wireless interface, e.g. for cellular networks, Wireless Local Area Networks (WLAN), digital television networks such as DVB-H networks, satellite networks, AM-FM A broadcast transmitter; and/or a device of another terminal configured to receive/transmit a communication signal; and/or an Internet of Things (IoT) device.
  • PSTN Public Switched Telephone Networks
  • DSL Digital Subscriber Line
  • WLAN Wireless Local Area Networks
  • WLAN Wireless Local Area Networks
  • digital television networks such as DVB-H networks, satellite networks, AM-FM A broadcast transmitter
  • IoT Internet of Things
  • a terminal arranged to communicate through a wireless interface may be referred to as a "wireless communication terminal", “wireless terminal” or “mobile terminal”.
  • mobile terminals include, but are not limited to, satellite or cellular telephones; Personal Communications System (PCS) terminals that may combine cellular radio telephones with data processing, facsimile, and data communication capabilities; may include radio telephones, pagers, Internet/Intranet PDAs with networking access, web browsers, memo pads, calendars, and/or Global Positioning System (GPS) receivers; and conventional laptop and/or palmtop receivers or others including radiotelephone transceivers electronic device.
  • PCS Personal Communications System
  • GPS Global Positioning System
  • a terminal may refer to an access terminal, user equipment (UE), subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or user device.
  • the access terminal may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminals in 5G networks or terminals in future evolved PLMNs, etc.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • direct terminal (Device to Device, D2D) communication may be performed between the terminals 120 .
  • the 5G communication system or the 5G network may also be referred to as a new radio (New Radio, NR) system or an NR network.
  • New Radio NR
  • NR New Radio
  • FIG. 1 exemplarily shows one network device and two terminals.
  • the communication system 100 may include multiple network devices, and the coverage of each network device may include other numbers of terminals. This embodiment of the present application This is not limited.
  • the communication system 100 may further include other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the present application.
  • network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the present application.
  • a device having a communication function in the network/system may be referred to as a communication device.
  • the communication device may include a network device 110 and a terminal 120 with a communication function, and the network device 110 and the terminal 120 may be the specific devices described above, which will not be repeated here;
  • the device may further include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the present application.
  • AI Artificial intelligence
  • An important feature of AI business is the large amount of data exchange and short time. Data interaction includes but is not limited to AI model download (usually downlink data), AI analysis Transmission of results/intermediate results (usually uplink data), etc.
  • the model of Convolutional Neural Networks is divided into two parts, one part is located on the terminal side, and the other part is located on the network side.
  • the terminal After processing the image through some models on the terminal side, the terminal will get The intermediate result of the image is uploaded to the network side, and then the intermediate data is processed by some models of the network side, and the processing result of the image is finally output (for example, the object in the image is recognized as a tree).
  • the upload of the intermediate data needs to be completed in a few milliseconds to several seconds, and the data volume of the intermediate data is as much as several megabytes (M) to several gigabytes (G), so the upload of the intermediate data needs to be completed in a short time. It occupies a lot of air interface resources.
  • the following table 1 gives the corresponding latency requirements (Latency requirements) and uplink data rate requirements (Required UL data rate) of different user applications (User application):
  • one or more terminals and a network server jointly train a deep neural network (Deep Neural Networks, DNN).
  • the process of jointly training a DNN is called a federated learning process.
  • the network server needs to deliver several G of model data to the group members (ie terminals), and the group members need to upload several G of training data to the network server.
  • the upload and delivery time needs to be completed within tens to hundreds of milliseconds, which requires a very high rate and has the characteristics of periodicity, that is, each iteration training needs to be performed once.
  • Table 2 below shows the required latency and required data rate for different mini-batch sizes and different GPU computation times:
  • QoS Quality of Service
  • QoS Flows In a mobile communication network, in order to be able to transmit user plane data, one or more QoS flows (QoS Flows) need to be established.
  • QoS parameters are usually used to indicate the characteristics of QoS Flow, and different QoS Flows correspond to different QoS parameters.
  • QoS parameters may include but are not limited to: 5G Quality of Service Identifier (5G QoS Identifier, 5QI), Allocation Retension Priority (ARP), Guaranteed Flow Bit Rate (GFBR), Maximum Flow Bit Rate ( Maximum Flow Bit Rate, MFBR), uplink/downlink maximum packet loss rate (UL/DL Maximum Packet Loss Rate, UL/DL MPLR), end-to-end packet delay budget (Packet Delay Budget, PDB), AN-PDB, Packet Error Rate (PER), Priority Level (Priority Level), Average Window (Averaging Window), Resource Type (Resource Type), Maximum Data Burst Volume (Maximum Data Burst Volume), UE aggregated maximum bit rate ( UE Aggregate Maximum Bit Rate, UE-AMBR), Session Aggregate Maximum Bit Rate (Session Aggregate Maximum Bit Rate, Session-AMBR), etc.
  • 5G QoS Identifier, 5QI 5G Quality of Service Identifier
  • ARP Allocation Retension
  • Filter contains characteristic parameters describing data packets (such as some related parameters of IP data packets, some related parameters of Ethernet data packets), and is used to filter out specific data packets to bind to specific QoS Flows.
  • the core network user plane network element such as UPF
  • the terminal will form a filter according to the combination of characteristic parameters of the data packet (the leftmost trapezoid and the rightmost parallelogram in Figure 4 represent the filter), through filtering
  • the filter filters the uplink or downlink data packets transmitted on the user plane that conform to the characteristic parameters of the data packets, and binds them to a certain QoS Flow.
  • the uplink QoS Flow is bound by the terminal, and the downlink QoS Flow is bound by the core network user plane network element (such as UPF).
  • one or more QoS Flows can be mapped to a Data Resource Bearer (DRB) for transmission.
  • DRB Data Resource Bearer
  • the base station will establish a DRB according to the QoS parameters and bind the QoS Flow to a specific DRB.
  • the data exchange of AI services has the characteristics of short time and large amount of data, that is, it takes up a lot of network resources in a short period of time, but it does not require such huge network resources after the transmission is completed.
  • Under the current QoS mechanism to complete the service transmission, it is necessary to preempt the resources of other QoS Flows. This preemption is permanent.
  • the transmission of AI service data only needs to be completed in a short time, and permanent preemption will affect the data transmission in other QoS Flows. Therefore, the technical solutions of the embodiments of the present application introduce a temporary preemption mechanism, and the technical solutions of the embodiments of the present application are described below.
  • FIG. 5 is a schematic flowchart of a method for temporarily preempting resources provided by an embodiment of the present application. As shown in FIG. 5 , the method for temporarily preempting resources includes:
  • Step 501 The network device determines whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the first connection is a data plane connection; or, the first connection is an air interface connection; wherein, there is a mapping relationship between the data plane connection and the air interface connection.
  • the data plane connection refers to the connection between the terminal and the user plane network element of the core network.
  • the core network user plane network element is UPF
  • the data plane connection can be QoS Flow (also called QoS data flow) or PDU session.
  • QoS Flow also called QoS data flow
  • PDU session There is a mapping relationship between the QoS Flow and the PDU session.
  • a PDU session may have one or more QoS Flows, which can be understood as one PDU session corresponding to one or more QoS Flows.
  • the air interface connection refers to the connection between the terminal and the network element of the access network.
  • the access network element is gNB
  • the data plane connection is Data Radio Bearer (DRB).
  • DRB Data Radio Bearer
  • a connection is temporarily preempted means: the resources of the connection are preempted by other connections within a certain period of time, and after a certain period of time, the resources are released for the connection to reuse; during the period when the resources of the connection are preempted, the connection will not is released, data can still be transmitted, but the original QoS parameters (such as GFBR, PER, etc.) of the connection cannot be guaranteed.
  • Temporary preemption of a connection means that the connection can preempt the resources of other connections within a certain period of time, and after a certain period of time, the resources are released for reuse by other connections.
  • the network device is an access network element.
  • an example of an access network element may be, but is not limited to, a base station.
  • the following describes how the network element of the access network determines whether the resource of the first connection is allowed to be temporarily preempted and/or temporarily preempted.
  • the access network element receives the first indication information sent by the core network element, where the first indication information is used to indicate whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the core network element sends the first indication information to the access network element through the interface between the core network element and the access network element.
  • the core network element is an AMF
  • the access network element is a base station
  • the AMF sends the first indication information to the base station through the N2 interface between the AMF and the base station.
  • the access network element receives the first indication information sent by the core network element, the first indication information is sent by the terminal to the core network element, and the first indication information is used to indicate whether the resources of the first connection are Temporary preemption and/or temporary preemption are allowed.
  • the terminal sends the first indication information to the core network element through the NAS message, and the core network element sends the first indication information to the access network element through the interface between the core network element and the access network element .
  • the core network element includes an AMF
  • the access network element is a base station
  • the terminal directly or indirectly sends the first indication information to the AMF through a NAS message
  • the AMF passes the N2 interface between the AMF and the base station. Send the first indication information to the base station.
  • the first indication information is carried in a session establishment request message or a session modification request message sent by the terminal to the core network element.
  • the first indication information and the attribute parameter of the first connection are sent by the core network element to the access network element together; or, the first indication information is carried in the The attribute parameters of the first connection are sent by the core network element to the access network element together.
  • the attribute parameter of the first connection is, for example, a QoS parameter.
  • the access network element receives the first indication information sent by the terminal, where the first indication information is used to indicate whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the terminal sends the first indication information to the access network element through the interface between the terminal and the access network element.
  • the access network element is a base station, and the terminal can send the first indication information to the access network element through RRC signaling.
  • the network element of the access network determines whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted according to the preconfigured information or the attribute parameter of the first connection.
  • the attribute parameter is, for example, a QoS parameter.
  • QoS Flow with temporary preemption capability means that QoS Flow resources are allowed to be temporarily preempted
  • QoS Flow with temporary preemption capability means that QoS Flow resources are allowed to be temporarily preempted.
  • the first indication information is further used to indicate at least one of the following:
  • the preemption priority and/or the preempted priority of the first connection are the preemption priority and/or the preempted priority of the first connection.
  • the resource information includes, but is not limited to, the rate, bandwidth, packet loss rate, and the like of the resource.
  • the access network element may select one or more target connections from other connections that are allowed to be temporarily preempted according to the resource information temporarily preempted by the first connection, and use the resources of the target connection as the first connection. Connection to temporarily preempted resources. If the first connection is allowed to be temporarily preempted, the network element of the access network can determine whether the resource of the first connection can be used as the resource temporarily preempted by the target connection according to the information of the temporarily preempted resource of the first connection, and The resource is temporarily preempted by the target connection.
  • the network element of the access network may allocate one or more target connections to the temporarily preempted connection according to the preemption priority and/or the preempted priority of each connection, and use the resources of the target connection as the resources temporarily preempted by the first connection.
  • connection 1 is allowed to be temporarily preempted, while connections 2 to 4 are allowed to be temporarily preempted.
  • the priority level of the preempted priority of 4 is 3, wherein, the smaller the value of the priority level is, the higher the preempted priority represented by the priority level is, and the connection 1 preferentially preempts the resources of the connection 2. It should be noted that the description here is based on the example of "the smaller the value of the priority level, the higher the preempted priority represented by the priority level”. The larger the value, the higher the preempted priority represented by the priority level.”
  • connections 1 to 3 are allowed to be temporarily preempted, and connection 4 is allowed to be temporarily preempted, the preemption priority of connection 1 has a priority level of 1, the preemption priority of connection 2
  • the priority level of the preemption priority is 3, wherein the smaller the value of the priority level is, the higher the preemption priority represented by the priority level is, and the connection 1 preferentially preempts the resources of the connection 4. It should be noted that the description here is based on the example of "the smaller the value of the priority level, the higher the preemption priority represented by the priority level”. The larger the value, the higher the preemption priority represented by that priority level".
  • connection 1 is allowed to be temporarily preempted, while connections 2 to 5 are allowed to be temporarily preempted. Then, connection 1 can temporarily preempt the resources of at least one of the connections 2 to 5, so as to increase the connection 1’s resources in a short time. Transmission rate. After a period of time, connection 1 releases its preempted resources, and at least one connection restores the capability corresponding to its original QoS parameters.
  • the network element of the access network may select at least one connection from the connections 2 to 5 according to the resource information temporarily preempted by the connection 1 and/or the preempted priorities of the connections 2 to 5, and use the resource of the at least one connection as the connection 1 Temporarily preempted resources.
  • multiple connections shown in FIG. 6 may be of the same terminal or of different terminals, and may be in the same PDU session or in different PDU sessions, which are not limited in this embodiment of the present application .
  • the network device determines the first time information, so The first time information is used to determine the temporary preemption time and/or the temporary preemption time of the first connection.
  • the first time information includes at least one of the following: the start time of temporary preemption, the time length of temporary preemption, and the time period of temporary preemption; and/or, the first time information includes the following: At least one of: the start time of the temporary preemption, the length of the temporary preemption, and the time period of the temporary preemption.
  • time unit of each piece of information included in the first time information may be milliseconds, or seconds, or minutes, or the like.
  • the embodiment of the present application does not limit the time unit.
  • connection 1 is capable of temporary preemption, and the temporary preemption time of connection 1 is determined by the start time of temporary preemption (ie time point-1), the time length of temporary preemption (ie 5 seconds) and the temporary preemption time The time period (that is, 100 seconds) is determined, and connection 1 can preempt the resources of other connections for 5 seconds at time point -1 and subsequent time points every 100 seconds.
  • the following describes how the network element of the access network determines the first time information.
  • the access network element receives the first time information sent by the core network element, where the first time information is used to determine the temporary preemption time and/or the temporary preemption time of the first connection.
  • the core network element sends the first time information to the access network element through the interface between the core network element and the access network element.
  • the core network element is an AMF
  • the access network element is a base station
  • the AMF sends the first time information to the base station through the N2 interface between the AMF and the base station.
  • the access network element receives the first time information sent by the core network element, the first time information is sent by the terminal to the core network element, and the first time information is used to determine the first time information. Temporary preemption time and/or temporary preemption time for the connection.
  • the terminal sends the first time information to the core network element through the NAS message, and the core network element sends the first time information to the access network element through the interface between the core network element and the access network element .
  • the core network element includes an AMF
  • the access network element is a base station
  • the terminal directly or indirectly sends the first time information to the AMF through a NAS message
  • the AMF passes the N2 interface between the AMF and the base station. Send the first time information to the base station.
  • the first time information is carried in a session establishment request message or a session modification request message sent by the terminal to the core network element.
  • the first time information and the attribute parameter of the first connection are sent by the core network element to the access network element together; or, the first time information is carried in the
  • the attribute parameters of the first connection are sent by the core network element to the access network element together.
  • the attribute parameter of the first connection is, for example, a QoS parameter.
  • the access network element receives the first time information sent by the terminal, where the first time information is used to determine the temporary preemption time and/or the temporary preemption time of the first connection.
  • the terminal sends the first time information to the access network element through the interface between the terminal and the access network element.
  • the access network element is a base station, and the terminal can send the first time information to the access network element through RRC signaling.
  • the access network element determines the first time information according to the preconfigured information or the attribute parameter of the first connection, where the first time information is used to determine the temporary preemption time and/or the temporary access time of the first connection. Take time.
  • the attribute parameter is, for example, a QoS parameter.
  • the temporary preemption time of some QoS Flows with 5QI values and/or the temporary preemption time of some QoS Flows with 5QI values can be agreed or preconfigured.
  • the first indication information and/or the first time information in the above solution in this embodiment of the present application may be sent to the access network element together with the QoS parameters as part of the QoS parameters, as shown in FIG. 8
  • the terminal sends a PDU session establishment/modification request message to the core network control plane network element, optionally, the PDU session establishment/modification request message carries first indication information and/or first time information.
  • the core network control plane network element delivers QoS parameters to the core network user plane network element.
  • the core network control plane network element delivers QoS parameters to the access network network element, where the QoS parameters include first indication information and/or first time information.
  • the core network control plane network element delivers QoS parameters to the terminal, where the QoS parameters include first indication information and/or first time information.
  • the network element of the access network in Figure 8 is the base station
  • the network element of the control plane of the core network is the AMF
  • the network element of the user plane of the core network is the UPF.
  • the network device further performs the following steps:
  • Step 502 The network device performs a temporary preemption behavior or a temporary preemption behavior for the first connection according to whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the following describes how the network device performs the temporary preemption behavior or the temporarily preempted behavior for the first connection.
  • a temporary preemption behavior for the first connection is performed.
  • a second connection that is temporarily preempted is determined, and the resources of the second connection are temporarily used by the first connection.
  • the second connection is set to the suspension mode or the terminal to which the second connection belongs is set to the RRC inactive mode or the RRC idle mode, so that the second connection The resources are temporarily used by the first connection.
  • the mode of the second connection or the mode of the terminal to which the second connection belongs may be switched by the first timer.
  • a first timer is configured on the access network element and/or the terminal; during the running of the first timer, the second connection is in a suspended mode or the terminal to which the second connection belongs is in an RRC Inactive mode or RRC idle mode; after the first timer expires, the second connection returns to the normal mode or the terminal to which the second connection belongs returns to the RRC connection state.
  • the mode of the second connection or the mode of the terminal to which the second connection belongs may be switched through RRC signaling exchanged between the terminal and the network element of the access network.
  • the network element of the access network indicates to the terminal through the first RRC signaling that the second connection enters the suspension mode or that the terminal to which the second connection belongs enters the RRC inactive mode or the RRC idle mode; the access The network element indicates to the terminal through the second RRC signaling that the second connection is restored to the normal mode or that the terminal to which the second connection belongs is restored to the RRC connection state.
  • the second connection is set to a temporarily preempted state, so that the resources of the second connection are temporarily used by the first connection.
  • the state of the second connection may be switched by the first timer.
  • a first timer is configured on the access network element and/or terminal; during the running of the first timer, the second connection is in a temporarily preempted state; after the first timer expires , the second connection is restored to the normal state.
  • the state of the second connection may be switched through RRC signaling exchanged between the terminal and the network element of the access network.
  • the access network element indicates to the terminal through the first RRC signaling that the second connection is temporarily preempted; the access network element indicates to the terminal through the second RRC signaling that the second connection is temporarily preempted; The connection returns to normal.
  • a temporary preemption behavior for the first connection is performed.
  • a temporarily preempted second connection is determined, and the resources of the first connection are temporarily used by the second connection.
  • the first connection is set to the suspended mode or the terminal to which the first connection belongs is set to the RRC inactive mode or the RRC idle mode, so that the resources of the first connection are temporarily for the second connection.
  • the mode of the first connection or the mode of the terminal to which the first connection belongs may be switched by a second timer.
  • a second timer is configured on the access network element and/or the terminal; during the running of the second timer, the first connection is in a suspended mode or the terminal to which the first connection belongs is in an RRC Inactive mode or RRC idle mode; after the second timer expires, the first connection returns to the normal mode or the terminal to which the first connection belongs returns to the RRC connection state.
  • the mode of the first connection or the mode of the terminal to which the first connection belongs may be switched through RRC signaling exchanged between the terminal and the network element of the access network.
  • the network element of the access network indicates to the terminal through the first RRC signaling that the first connection enters the suspension mode or that the terminal to which the first connection belongs enters the RRC inactive mode or the RRC idle mode; the access The network element indicates to the terminal through the second RRC signaling that the first connection is restored to the normal mode or that the terminal to which the first connection belongs is restored to the RRC connection state.
  • the first connection is set to be temporarily preempted, so that the resources of the first connection are temporarily used by the second connection.
  • the state of the first connection may be switched by a second timer.
  • a second timer is configured on the network element and/or terminal of the access network; while the second timer is running, the first connection is temporarily preempted; after the second timer expires , the first connection is restored to the normal state.
  • the state of the first connection may be switched through RRC signaling exchanged between the terminal and the network element of the access network.
  • the access network element indicates to the terminal through the first RRC signaling that the first connection is temporarily preempted; the access network element indicates to the terminal through the second RRC signaling that the first connection is temporarily preempted; The connection returns to normal.
  • the DRB1 whose resources are preempted is set to the suspended mode or the terminal whose resources are preempted is set to the RRC inactive mode or the RRC idle mode model.
  • a timer is configured on the terminal and/or the base station. During the running of the timer, the DRB1 is maintained in the hanging mode or the terminal is maintained in the RRC inactive mode or the RRC idle mode. When the timer expires, the DRB1 or the terminal will automatically Return to the original mode.
  • the terminal and the base station can exchange RRC signaling to adjust the mode of DRB1 or the terminal.
  • the base station After the base station interacts with the terminal through RRC signaling, the base station sets the DRB1 to the hanging mode, and after waiting for a certain period of time (such as 5 seconds), The base station then interacts with the terminal through RRC signaling to release the suspension mode of the DRB1 (ie, the DRB1 returns to the normal mode).
  • a certain period of time such as 5 seconds
  • DRB1 taking the connection as DRB as an example, according to the solutions described in B1 and B2), a new DRB state "temporarily preempted" is introduced. If DRB1 is in a temporarily preempted state, it represents the resources of the DRB1 It is temporarily preempted. It should be noted that the DRB1 in the temporarily preempted state can still transmit data, but it is transmitted in a "best effort" manner. During the period when DRB1 is temporarily preempted, DRB1 will not be released, but The original QoS parameters (such as GFBR, PER, etc.) of DRB1 cannot be guaranteed.
  • QoS parameters such as GFBR, PER, etc.
  • DRB2 that preempts resources of other DRBs is in a "temporary preemption state", and DRB2 is in a temporary preemption state for a certain period of time (eg, 5 seconds), and then DRB-2 releases the preempted resources.
  • a timer is configured on the terminal and/or the base station. During the running of the timer, the DRB1 is maintained in a temporarily preempted state, and when the timer expires, the DRB1 automatically returns to the original state.
  • the state of DRB1 can be adjusted by exchanging RRC signaling between the terminal and the base station.
  • the DRB1 is set to be temporarily preempted, and after waiting for a certain period of time (for example, 5 seconds), The base station then interacts with the terminal through RRC signaling to release the temporarily preempted state of the DRB1 (ie, the DRB1 returns to a normal state).
  • a certain period of time for example, 5 seconds
  • temporary preemption/temporary preemption for QoS Flows can also be understood as temporary preemption/temporary preemption for DRBs corresponding to QoS Flows .
  • whether the resources of the first connection are allowed to be temporarily preempted/temporarily preempted may refer to: whether the resources of the QoS Flow or the DRB corresponding to the QoS Flow are allowed to be temporarily preempted/temporarily preempted .
  • Executing the temporary preemption behavior/temporary preemption behavior for the first connection may refer to: performing the temporary preemption behavior/temporary preemption behavior for the DRB corresponding to the QoS Flow, that is, the base station needs to operate the DRB.
  • the technical solutions of the embodiments of the present application can rapidly increase the throughput of the first connection in a short period of time, and at the same time, other connections will not be released, thereby minimizing the impact on user experience.
  • the technical solutions of the embodiments of the present application make full use of existing mechanisms (such as adding first indication information and/or first time information to existing QoS parameters, enhancing PDU session modification/establishment procedures, reusing suspension states, etc.), The demand for temporary high-throughput transmission of business data is realized.
  • FIG. 9 is a schematic structural diagram of an apparatus for temporarily preempting resources provided by an embodiment of the present application, which is applied to a network device. As shown in FIG. 9 , the apparatus for temporarily preempting resources includes:
  • a determining unit 901 configured to determine whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the network device is an access network element
  • the apparatus further includes:
  • the receiving unit 902 is configured to receive first indication information sent by a core network element, where the first indication information is used to indicate whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the first indication information is sent by the terminal to the core network element.
  • the first indication information is carried in a session establishment request message or a session modification request message sent by the terminal to the core network element.
  • the first indication information and the attribute parameter of the first connection are sent by the core network element to the access network element together; or,
  • the first indication information is carried in the attribute parameter of the first connection, and is sent by the core network element to the access network element together.
  • the network device is an access network element
  • the apparatus further includes:
  • the receiving unit 902 is configured to receive first indication information sent by the terminal, where the first indication information is used to indicate whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the first indication information is further used to indicate resource information temporarily preempted by the first connection and/or resource information temporarily preempted by the first connection.
  • the network device is an access network element
  • the determining unit 901 is configured to determine whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted according to the pre-configured information or the attribute parameters of the first connection.
  • the determining unit 901 is further configured to determine first time information, where the first time information is used to determine the temporary preemption time and/or the temporary preemption time of the first connection.
  • the first time information includes at least one of the following: start time of temporary preemption, time length of temporary preemption, and time period of temporary preemption; and/or,
  • the first time information includes at least one of the following: the start time of the temporary preemption, the time length of the temporary preemption, and the time period of the temporary preemption.
  • the network device is an access network element
  • the apparatus further includes:
  • the receiving unit 902 is configured to receive the first time information sent by the core network element.
  • the first time information is sent by the terminal to the core network element.
  • the first time information is carried in a session establishment request message or a session modification request message sent by the terminal to the core network element.
  • the first time information and the attribute parameter of the first connection are sent by the core network element to the access network element together; or,
  • the first time information is carried in the attribute parameter of the first connection, and is sent by the core network element to the access network element together.
  • the network device is an access network element
  • the apparatus further includes:
  • the receiving unit 902 is configured to receive the first time information sent by the terminal.
  • the network device is an access network element
  • the determining unit 901 is configured to determine the first time information according to the pre-configured information or the attribute parameter of the first connection.
  • the first connection is a data plane connection; or,
  • the first connection is an air interface connection
  • the device further includes:
  • the processing unit 903 is configured to perform a temporary preemption behavior or a temporary preemption behavior for the first connection according to whether the resources of the first connection are allowed to be temporarily preempted and/or temporarily preempted.
  • the processing unit 903 is configured to execute a temporary preemption behavior for the first connection if the first connection is allowed to be temporarily preempted; if the first connection is allowed to be temporarily preempted, then A temporary preempted behavior for the first connection is performed.
  • the processing unit 903 is configured to, if the first connection allows temporary preemption, determine a temporarily preempted second connection, and temporarily provide the resources of the second connection to the first connection. use.
  • the processing unit 903 is configured to set the second connection to a suspended mode, or to set the terminal to which the second connection belongs to an RRC inactive mode or an RRC idle mode, or to set the second connection to an RRC inactive mode or an RRC idle mode.
  • the connection is set to be temporarily preempted, so that the resources of the second connection are temporarily used by the first connection.
  • the processing unit 903 is configured to, if the first connection is allowed to be temporarily preempted, determine a temporarily preempted second connection, and temporarily provide the resources of the first connection to the second connection. use.
  • the processing unit 903 is configured to set the first connection to a suspended mode or to set the terminal to which the first connection belongs to an RRC inactive mode or an RRC idle mode
  • the connection is set to a temporarily preempted state, so that the resources of the first connection are temporarily used by the second connection.
  • the network device is an access network element, and a first timer is configured on the access network element and/or the terminal;
  • the second connection is in a suspended mode or the terminal to which the second connection belongs is in an RRC inactive mode or an RRC idle mode, or the second connection is in a temporarily preempted state;
  • the second connection After the first timer expires, the second connection returns to the normal mode or the terminal to which the second connection belongs returns to the RRC connection state or the second connection returns to the normal state.
  • the network device is an access network element, and the method further includes:
  • the access network element indicates to the terminal through the first RRC signaling that the second connection enters the suspension mode or that the terminal to which the second connection belongs enters the RRC inactive mode or the RRC idle mode, or the second connection enters the temporary mode. preempted state;
  • the access network element indicates to the terminal through the second RRC signaling that the second connection is restored to the normal mode or that the terminal to which the second connection belongs is restored to the RRC connection state or the second connection is restored to the normal state.
  • the network device is an access network element, and a second timer is configured on the access network element and/or the terminal;
  • the first connection is in a suspended mode or the terminal to which the first connection belongs is in an RRC inactive mode or an RRC idle mode, or the first connection is in a temporarily preempted state;
  • the first connection After the second timer expires, the first connection returns to the normal mode or the terminal to which the first connection belongs returns to the RRC connection state or the first connection returns to the normal state.
  • the network device is an access network element, and the method further includes:
  • the access network element indicates to the terminal through the first RRC signaling that the first connection enters the suspension mode or the terminal to which the first connection belongs enters the RRC inactive mode or the RRC idle mode, or the first connection enters the temporary mode. preempted state;
  • the access network element indicates to the terminal through the second RRC signaling that the first connection is restored to the normal mode or the terminal to which the first connection belongs is restored to the RRC connection state or the first connection is restored to the normal state.
  • FIG. 10 is a schematic structural diagram of a communication device 1000 provided by an embodiment of the present application.
  • the communication device may be a terminal or a network device.
  • the communication device 1000 shown in FIG. 10 includes a processor 1010, and the processor 1010 can call and run a computer program from a memory to implement the methods in the embodiments of the present application.
  • the communication device 1000 may further include a memory 1020 .
  • the processor 1010 may call and run a computer program from the memory 1020 to implement the methods in the embodiments of the present application.
  • the memory 1020 may be a separate device independent of the processor 1010, or may be integrated in the processor 1010.
  • the communication device 1000 may further include a transceiver 1030, and the processor 1010 may control the transceiver 1030 to communicate with other devices, specifically, may send information or data to other devices, or receive other devices Information or data sent by a device.
  • the processor 1010 may control the transceiver 1030 to communicate with other devices, specifically, may send information or data to other devices, or receive other devices Information or data sent by a device.
  • the transceiver 1030 may include a transmitter and a receiver.
  • the transceiver 1030 may further include antennas, and the number of the antennas may be one or more.
  • the communication device 1000 may specifically be the network device in this embodiment of the present application, and the communication device 1000 may implement the corresponding processes implemented by the network device in each method in the embodiment of the present application. For the sake of brevity, details are not repeated here. .
  • the communication device 1000 may specifically be the mobile terminal/terminal of the embodiment of the present application, and the communication device 1000 may implement the corresponding processes implemented by the mobile terminal/terminal in each method of the embodiment of the present application. This will not be repeated here.
  • FIG. 11 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 1100 shown in FIG. 11 includes a processor 1110, and the processor 1110 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 1100 may further include a memory 1120 .
  • the processor 1110 may call and run a computer program from the memory 1120 to implement the methods in the embodiments of the present application.
  • the memory 1120 may be a separate device independent of the processor 1110, or may be integrated in the processor 1110.
  • the chip 1100 may further include an input interface 1130 .
  • the processor 1110 may control the input interface 1130 to communicate with other devices or chips, and specifically, may acquire information or data sent by other devices or chips.
  • the chip 1100 may further include an output interface 1140 .
  • the processor 1110 may control the output interface 1140 to communicate with other devices or chips, and specifically, may output information or data to other devices or chips.
  • the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the network device in each method of the embodiment of the present application, which is not repeated here for brevity.
  • the chip can be applied to the mobile terminal/terminal in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the mobile terminal/terminal in each method of the embodiments of the present application. Repeat.
  • the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.
  • FIG. 12 is a schematic block diagram of a communication system 1200 provided by an embodiment of the present application. As shown in FIG. 12 , the communication system 1200 includes a terminal 1210 and a network device 1220 .
  • the terminal 1210 can be used to implement the corresponding functions implemented by the terminal in the above method
  • the network device 1220 can be used to implement the corresponding functions implemented by the network device in the above method. For brevity, details are not repeated here.
  • the processor in this embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
  • each step of the above method embodiments may be completed by a hardware integrated logic circuit in a processor or an instruction in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other available Programming logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memory in this embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be Random Access Memory (RAM), which acts as an external cache.
  • RAM Static RAM
  • DRAM Dynamic RAM
  • SDRAM Synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • synchronous link dynamic random access memory Synchlink DRAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, the memory in the embodiments of the present application is intended to include but not limited to these and any other suitable types of memory.
  • Embodiments of the present application further provide a computer-readable storage medium for storing a computer program.
  • the computer-readable storage medium can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application.
  • the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application.
  • the computer-readable storage medium can be applied to the mobile terminal/terminal in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the mobile terminal/terminal in each method of the embodiments of the present application, in order to It is concise and will not be repeated here.
  • Embodiments of the present application also provide a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the network device in each method of the embodiments of the present application. Repeat.
  • the computer program product can be applied to the mobile terminal/terminal in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the mobile terminal/terminal in each method of the embodiments of the present application, for the sake of brevity. , and will not be repeated here.
  • the embodiments of the present application also provide a computer program.
  • the computer program can be applied to the network device in the embodiments of the present application.
  • the computer program runs on the computer, the computer executes the corresponding processes implemented by the network device in each method of the embodiments of the present application. For the sake of brevity. , and will not be repeated here.
  • the computer program may be applied to the mobile terminal/terminal in the embodiments of the present application, and when the computer program runs on the computer, the computer executes the corresponding functions implemented by the mobile terminal/terminal in each method of the embodiments of the present application.
  • the process for the sake of brevity, will not be repeated here.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种临时抢占资源的方法及装置、网络设备,该方法包括:网络设备确定第一连接的资源是否允许临时抢占和/或临时被抢占。

Description

一种临时抢占资源的方法及装置、网络设备 技术领域
本申请实施例涉及移动通信技术领域,具体涉及一种临时抢占资源的方法及装置、网络设备。
背景技术
对于一些类型的业务数据,具有传输时间短、数据量大的特点,这种类型的业务数据会在短期内占用大量的网络资源,但传输完成后又不需要如此大量的网络资源。如何为这种类型的业务数据设计资源抢占机制以提高资源利用效率,有待完善。
发明内容
本申请实施例提供一种临时抢占资源的方法及装置、网络设备。
本申请实施例提供的临时抢占资源的方法,包括:
网络设备确定第一连接的资源是否允许临时抢占和/或临时被抢占。
本申请实施例提供的临时抢占资源的装置,应用于网络设备,所述装置包括:
确定单元,用于确定第一连接的资源是否允许临时抢占和/或临时被抢占。
本申请实施例提供的网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的临时抢占资源的方法。
本申请实施例提供的芯片,用于实现上述的临时抢占资源的方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的临时抢占资源的方法。
本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的临时抢占资源的方法。
本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的临时抢占资源的方法。
本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的临时抢占资源的方法。
通过上述技术方案,提出了临时抢占和临时被抢占的机制,通过该机制使得第一连接能够临时抢占其他连接的资源,从而实现在短时间内迅速增加第一连接的吞吐量的目的,或者,通过该机制使得第一连接的资源能够被其他连接临时抢占,从而实现在短时间内迅速增加其他连接的吞吐量的目的。由于资源的抢占或被抢占是临时的,因而提供资源利用效率,最小程度减少用户体验的影响。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1是本申请实施例提供的一种通信系统架构的示意性图;
图2是本申请实施例提供的终端与网络侧进行数据交互的示意图一;
图3是本申请实施例提供的终端与网络侧进行数据交互的示意图二;
图4是申请实施例提供的QoS Flow绑定的原理图;
图5是本申请实施例提供的临时抢占资源的方法的流程示意图;
图6是本申请实施例提供的多条连接的临时抢占/临时被抢占示意图;
图7是本申请实施例提供的临时抢占时间的示意图;
图8是本申请实施例提供的第一指示信息和/或第一时间信息的下发示意图;
图9是本申请实施例提供的临时抢占资源的装置的结构组成示意图;
图10是本申请实施例提供的一种通信设备示意性结构图;
图11是本申请实施例的芯片的示意性结构图;
图12是本申请实施例提供的一种通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、系统、5G通信系统或未来的通信系统等。
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端进行通信。可选地,该网络设备110可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来通信系统中的网络设备等。
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端120。作为在此使用的“终端”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop, WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端或者未来演进的PLMN中的终端等。
可选地,终端120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G通信系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。
图1示例性地示出了一个网络设备和两个终端,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端,本申请实施例对此不做限定。
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端120,网络设备110和终端120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例相关的技术方案进行说明。
●终端与网络之间的数据交互
人工智能(Artifact Intelligence,AI)是未来的发展趋势,AI业务的一个重要特点就是数据的交换量大、时间短,数据的交互包括但不限于AI模型的下载(一般是下行数据)、AI分析结果/中间结果的传递(一般是上行数据)等。
如图2所示,卷积神经网络(Convolutional Neural Networks,CNN)的模型分为了两部分,一部分位于终端侧,另一部分位于网络侧,通过终端侧的部分模型对图像进行处理后,终端将得到的中间结果上传给网络侧,再通过网络侧的部分模型对中间数据进行处理,最终输出图像的处理结果(例如识别出图像中的对象为树)。一般,中间数据的上传需要在几毫秒到几秒的时间内完成,且中间数据的数据量多达几兆(M)到几吉(G)的数据量,因此中间数据的上传需要在短时间内占用大量的空口资源。
以下表1给出了不同用户应用(User application)对应的延迟需求(Latency requirement)和上行数据速率需求(Required UL data rate):
Figure PCTCN2020137069-appb-000001
Figure PCTCN2020137069-appb-000002
表1
如图3所示,一个或多个终端与网络服务器联合训练深度神经网络(Deep Neural Networks,DNN),将联合训练DNN的过程称为联邦学习过程中。在联邦学习过程中的每次迭代训练中,网络服务器需要向组成员(即终端)下发几个G的模型数据,并且组成员需要向网络服务器上传几个G的训练数据。这种上传和下发的时间需要在几十到几百毫秒内完成,对于速率要求非常高,且具有周期性的特点,即每次迭代训练都需要进行一次。
以下表2给出了不同微批量尺寸(Mini-batch size)和不同GPU计算时间(GPU computation time)对应的延迟需求(Required latency)和数据速率需求(Required data rate):
Figure PCTCN2020137069-appb-000003
表2
从上面的描述可以看出,终端和网络之间需要通信来保证数据的交换,这里通信质量就显得非常重要,如果终端不能及时将计算的数据发送给网络服务器,那么网络服务器就需要一直等待,造成网络服务器的计算资源的闲置,无法达到最佳的大数据分析效率。因此,需要一种可靠、快速且灵活的方式来实现终端和网络服务器之间的通信。
●服务质量(Quality of Service,QoS)机制
在移动通信网络中,为了能够传输用户面数据,需要建立一个或多个QoS流(QoS Flow)。作为通信质量的重要衡量标准,通常使用QoS参数来指示QoS Flow的特征,不同的QoS Flow对应不同的QoS参数。QoS参数可以包括但不限于:5G服务质量标识(5G QoS Identifier,5QI)、分配保留优先级(Allocation Retension Priority,ARP)、保证流比特率(Guaranteed Flow Bit Rate,GFBR)、最大流比特率(Maximum Flow Bit Rate,MFBR)、上/下行最大丢包率(UL/DL Maximum Packet Loss Rate,UL/DL MPLR)、端到端数据包时延预算(Packet Delay Budget,PDB)、AN-PDB、包误差率(Packet Error Rate,PER)、优先等级(Priority Level)、平均窗口(Averaging Window)、资源类型(Resource Type)、最大数据突发量(Maximum Data Burst Volume)、UE聚合最大比特率(UE Aggregate Maximum Bit Rate,UE-AMBR)、会话聚合最大比特率(Session Aggregate Maximum Bit Rate,Session-AMBR)等。
过滤器(Filter)包含描述数据包的特征参数(例如IP数据包的一些相关参数,以太网数据包的一些相关参数),用于过滤出特定的数据包以绑定到特定的QoS Flow上。
参照图4,核心网用户面网元(如UPF)和终端会根据数据包的特征参数组合来形成过滤器(如图4中最左边的梯形和最右边的平行四边形代表过滤器),通过过滤器过滤在用户面传递的符合数据包的特征参数的上行或下行数据包,并将其绑定到某一个QoS Flow上。上行QoS Flow是由终端进行绑定的,下行QoS Flow是由核心网用户面网元(如UPF)进行绑定的。在QoS机制中,一个或多个QoS Flow可以映射到一个数据无线承载(Data Resource Bearer,DRB)上进行传输。对于一个QoS Flow来说,对应一套QoS参数,基站会根据QoS参数来建立DRB并将QoS Flow绑定到特定的DRB上。
AI业务的数据交换具有时间短、数据量大的特点,也就是要在短期内占用大量的网络资源,但传输完成后又不需要如此庞大的网络资源。目前的QoS机制下,完成该业务传输需要抢占其它QoS Flow的资源,这种抢占是永久抢占。然而,AI业务数据的传输只需要短时间内完成,永久抢占会造成其它QoS Flow中的数据传输受到影响。为此,本申请实施例的技术方案引入了一种临时抢占的机制,以下对本申请实施例的技术方案进行说明。
需要说明的是,本申请实施例的技术方案可以应用于任何需要临时进行大规模数据传输的场景,包括但不限于AI业务传输场景。
需要说明的是,本申请实施例的技术方案可以应用于任何通信系统,包括但不限于5G系统(5GS)、6G系统(6GS)等。
图5是本申请实施例提供的临时抢占资源的方法的流程示意图,如图5所示,所述临时抢占资源的方法包括:
步骤501:网络设备确定第一连接的资源是否允许临时抢占和/或临时被抢占。
本申请实施例中,所述第一连接为数据面连接;或者,所述第一连接为空口连接;其中,所述数据面连接与所述空口连接之间具有映射关系。
这里,数据面连接是指终端与核心网用户面网元之间的连接。以5GS为例,核心网用户面网元为UPF,数据面连接可以是QoS Flow(也可以称为QoS数据流)或者PDU会话。其中,QoS Flow与PDU会话之间具有映射关系,具体地,一个PDU会话可以有一个或多个QoS Flow,可以理解为一个PDU会话对应一个或多个QoS Flow。
这里,空口连接是指终端与接入网网元之间的连接。以5GS为例,接入网网元为gNB,数据面连接为数据无线承载(Data Radio Bearer,DRB)。其中,DRB与QoS Flow之间具有映射关系,具体地,一个或多个QoS Flow可以映射到(或者说绑定到)一个DRB上。
本申请实施例中,提出临时抢占和临时被抢占的机制。其中,一个连接临时被抢占是指:该连接的资源在一定时间内被其他连接抢占,一定时间过后,资源被释放供该连接重新使用;在该连接的资源被抢占的期间,该连接不会被释放,仍可以传输数据,但该连接原有的QoS参数(如GFBR、PER等)不能被保障。一个连接临时抢占是指:该连接在一定时间内可以抢占其他连接的资源,一定时间过后,资源被释放供其他连接重新使用。
在本申请一可选方式中,所述网络设备是接入网网元,这里,接入网网元例可以但不局限于是基站。
以下对接入网网元如何确定第一连接的资源是否允许临时抢占和/或临时被抢占,进行说明。
●方式一
接入网网元接收核心网网元发送的第一指示信息,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
这里,核心网网元通过该核心网网元与接入网网元之间的接口将第一指示信息发送给接入网网元。以5GS为例,所述核心网网元为AMF,所述接入网网元为基站,AMF通过AMF与基站之间的N2接口将第一指示信息发送给基站。
●方式二
接入网网元接收核心网网元发送的第一指示信息,所述第一指示信息是终端发送给所述核心网网元的,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
这里,终端通过NAS消息将第一指示信息发送给核心网网元,核心网网元通过该核心网网元与接入网网元之间的接口将第一指示信息发送给接入网网元。以5GS为例,所述核心网网元包括AMF,所述接入网网元为基站,终端通过NAS消息将第一指示信息直接或者间接发送给AMF,AMF通过AMF与基站之间的N2接口将第一指示信息发送给基站。
在一可选方式中,所述第一指示信息携带在终端发送给所述核心网网元的会话建立请求消息或者会话修改请求消息中。
在一可选方式中,所述第一指示信息和所述第一连接的属性参数由所述核心网网元一起发送给所述接入网网元;或者,所述第一指示信息携带在所述第一连接的属性参数中,由所述核心网网元一起发送给所述接入网网元。这里,所述第一连接的属性参数例如是QoS参数。
●方式三
接入网网元接收终端发送的第一指示信息,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
这里,终端通过终端与接入网网元之间的接口将第一指示信息发送给接入网网元。以5GS为例,所述接入网网元为基站,终端可以通过RRC信令将第一指示信息发送给接入网网元。
●方式四
接入网网元根据预配置信息或者所述第一连接的属性参数,确定第一连接的资源是否允许临时抢占和/或临时被抢占。
这里,所述属性参数例如是QoS参数。以QoS参数中的5QI为例,可以约定或者预配置某些5QI取值的QoS Flow具备临时抢占能力,和/或某些5QI取值的QoS Flow具备临时被抢占能力。这里,QoS Flow具备临时抢占能力是指即QoS Flow的资源允许临时抢占,QoS Flow具备临时被抢占能力是指QoS Flow的资源允许临时被抢占。
对于上述方式一至方式三中的任意一种方式来说,可选地,所述第一指示信息还用于指示以下至少之一:
所述第一连接临时抢占的资源信息和/或所述第一连接临时被抢占的资源信息;
所述第一连接的抢占优先级和/或被抢占优先级。
这里,资源信息包括但不局限于资源的速率、带宽、丢包率等。若第一连接允许临时抢占,则接入网网元可以根据第一连接临时抢占的资源信息,从其他允许临时被抢占的连接中选取一个或多个目标连接,将目标连接的资源作为第一连接临时抢占的资源。若第一连接允许临时被抢占,则接入网网元可以根据第一连接临时被抢占的资源信息确定第一连接的资源是否可以作为目标连接临时抢占的资源,若是,则将第一连接的资源作为该目标连接临时抢占的资源。
这里,若一个连接的抢占优先级越高,则表明该连接的抢占能力越强;若一个连接 的被抢占优先级越高,则表明该连接的被抢占能力越强。接入网网元可以根据各个连接的抢占优先级和/或被抢占优先级,为临时抢占的连接分配一个或多个目标连接,将目标连接的资源作为第一连接临时抢占的资源。
在一个示例中,连接1允许临时抢占,而连接2~4允许临时被抢占,连接2的被抢占优先级的优先级等级为1,连接3的被抢占优先级的优先级等级为2,连接4的被抢占优先级的优先级等级为3,其中,优先级等级的取值越小,代表该优先级等级表征的被抢占优先级越高,连接1优先抢占连接2的资源。需要说明的是,这里是以“优先级等级的取值越小,代表该优先级等级表征的被抢占优先级越高”为例进行说明,不局限于此,还可以是“优先级等级的取值越大,代表该优先级等级表征的被抢占优先级越高”。
在一个示例中,连接1~3允许临时抢占,而连接4允许临时被抢占,连接1的抢占优先级的优先级等级为1,连接2的抢占优先级的优先级等级为2,连接3的抢占优先级的优先级等级为3,其中,优先级等级的取值越小,代表该优先级等级表征的抢占优先级越高,连接1优先抢占连接4的资源。需要说明的是,这里是以“优先级等级的取值越小,代表该优先级等级表征的抢占优先级越高”为例进行说明,不局限于此,还可以是“优先级等级的取值越大,代表该优先级等级表征的抢占优先级越高”。
在一个示例中,参照图6,连接1允许临时抢占,而连接2~5允许临时被抢占,那么,连接1可以临时抢占连接2~5中至少一个连接的资源,以短时间提高连接1的传输速率。待一段时间后,连接1释放其抢占的资源,至少一个连接恢复其原有的QoS参数对应的能力。这里,接入网网元可以根据连接1临时抢占的资源信息和/或连接2~5的被抢占优先级,从连接2~5中选取至少一个连接,将所述至少一个连接的资源作为连接1临时抢占的资源。
需要说明的是,图6所示的多个连接可以是同一终端的也可以是不同终端的,可以是同一PDU会话中的也可以是不同PDU会话中的,本申请实施例对此不做限定。
需要说明的是,本申请实施例上述方案中所描述的资源是指空口资源。
本申请实施例中,由于临时抢占和临时被抢占是指在一定时间内的抢占和被抢占,因此,需要对所述一定时间进行明确,为此,所述网络设备确定第一时间信息,所述第一时间信息用于确定所述第一连接的临时抢占时间和/或临时被抢占时间。
在一可选方式中,所述第一时间信息包括以下至少之一:临时抢占的起始时间、临时抢占的时间长度、临时抢占的时间周期;和/或,所述第一时间信息包括以下至少之一:临时被抢占的起始时间、临时被抢占的时间长度、临时被抢占的时间周期。
需要说明的是,所述第一时间信息所包括的各个信息的时间单位可以是毫秒、或者秒、或者分钟等。本申请实施例对时间单位不做限制。
在一个示例中,参照图7,连接1具备临时抢占能力,连接1的临时抢占时间通过临时抢占的起始时间(即时间点-1)、临时抢占的时间长度(即5秒)和临时抢占的时间周期(即100秒)确定,连接1可以在时间点-1以及后续每隔100秒周期的时间点上抢占其他连接的资源5秒。
以下对接入网网元如何确定第一时间信息进行说明。
●方式I
所述接入网网元接收核心网网元发送的第一时间信息,所述第一时间信息用于确定所述第一连接的临时抢占时间和/或临时被抢占时间。
这里,核心网网元通过该核心网网元与接入网网元之间的接口将第一时间信息发送给接入网网元。以5GS为例,所述核心网网元为AMF,所述接入网网元为基站,AMF通过AMF与基站之间的N2接口将第一时间信息发送给基站。
●方式II
所述接入网网元接收核心网网元发送的第一时间信息,所述第一时间信息是终端发送给所述核心网网元的,所述第一时间信息用于确定所述第一连接的临时抢占时间和/或临时被抢占时间。
这里,终端通过NAS消息将第一时间信息发送给核心网网元,核心网网元通过该核心网网元与接入网网元之间的接口将第一时间信息发送给接入网网元。以5GS为例,所述核心网网元包括AMF,所述接入网网元为基站,终端通过NAS消息将第一时间信息直接或者间接发送给AMF,AMF通过AMF与基站之间的N2接口将第一时间信息发送给基站。
在一可选方式中,所述第一时间信息携带在终端发送给所述核心网网元的会话建立请求消息或者会话修改请求消息中。
在一可选方式中,所述第一时间信息和所述第一连接的属性参数由所述核心网网元一起发送给所述接入网网元;或者,所述第一时间信息携带在所述第一连接的属性参数中,由所述核心网网元一起发送给所述接入网网元。这里,所述第一连接的属性参数例如是QoS参数。
●方式III
所述接入网网元接收终端发送的第一时间信息,所述第一时间信息用于确定所述第一连接的临时抢占时间和/或临时被抢占时间。
这里,终端通过终端与接入网网元之间的接口将第一时间信息发送给接入网网元。以5GS为例,所述接入网网元为基站,终端可以通过RRC信令将第一时间信息发送给接入网网元。
●方式IV
所述接入网网元根据预配置信息或者所述第一连接的属性参数,确定第一时间信息,所述第一时间信息用于确定所述第一连接的临时抢占时间和/或临时被抢占时间。
这里,所述属性参数例如是QoS参数。以QoS参数中的5QI为例,可以约定或者预配置某些5QI取值的QoS Flow的临时抢占时间,和/或某些5QI取值的QoS Flow的临时被抢占时间。
在一个示例中,参照图8,本申请实施例上述方案中的第一指示信息和/或第一时间信息,可以作为QoS参数的一部分与QoS参数一起发送给接入网网元,如图8所示:1、终端向核心网控制面网元发送PDU会话建立/修改请求消息,可选地,该PDU会话建立/修改请求消息中携带第一指示信息和/或第一时间信息。2、核心网控制面网元向核心网用户面网元下发QoS参数。3、核心网控制面网元向接入网网元下发QoS参数,QoS参数中包含第一指示信息和/或第一时间信息。4、核心网控制面网元向终端下发QoS参数,QoS参数中包含第一指示信息和/或第一时间信息。
以5GS为例,图8中的接入网网元为基站,核心网控制面网元为AMF,核心网用户面网元为UPF。
本申请实施例中,可选地,网络设备确定第一连接的资源是否允许临时抢占和/或临时被抢占后,还执行如下步骤:
步骤502:所述网络设备根据所述第一连接的资源是否允许临时抢占和/或临时被抢占,执行针对所述第一连接的临时抢占行为或者临时被抢占行为。
以下对网络设备如何执行针对所述第一连接的临时抢占行为或者临时被抢占行为,进行说明。
●临时抢占行为
本申请实施例中,若所述第一连接允许临时抢占,则执行针对所述第一连接的临时抢占行为。
具体地,若所述第一连接允许临时抢占,则确定临时被抢占的第二连接,将所述第二连接的资源临时供所述第一连接使用。
A1)在一可选方式中,将所述第二连接设置为悬挂(suspension)模式或者将所述第二连接所属的终端设置为RRC非激活模式或者RRC空闲模式,以使所述第二连接的资源临时供所述第一连接使用。
本申请实施例中,可选地,第二连接的模式或者第二连接所属的终端的模式,可以通过第一定时器来切换。具体地,所述接入网网元和/或终端上配置有第一定时器;所述第一定时器运行期间,所述第二连接处于悬挂模式或者所述第二连接所属的终端处于RRC非激活模式或者RRC空闲模式;所述第一定时器超时后,所述第二连接恢复到正常模式或者所述第二连接所属的终端恢复到RRC连接态。
本申请实施例中,可选地,第二连接的模式或者第二连接所属的终端的模式,可以通过终端与接入网网元之间交互的RRC信令来切换。具体地,所述接入网网元通过第一RRC信令向终端指示所述第二连接进入悬挂模式或者所述第二连接所属的终端进入RRC非激活模式或者RRC空闲模式;所述接入网网元通过第二RRC信令向终端指示所述第二连接恢复到正常模式或者所述第二连接所属的终端恢复到RRC连接态。
B1)在一可选方式中,将所述第二连接设置为临时被抢占状态,以使所述第二连接的资源临时供所述第一连接使用。
本申请实施例中,可选地,第二连接的状态可以通过第一定时器来切换。具体地,所述接入网网元和/或终端上配置有第一定时器;所述第一定时器运行期间,所述第二连接处于临时被抢占状态;所述第一定时器超时后,所述第二连接恢复到正常状态。
本申请实施例中,可选地,第二连接的状态可以通过终端与接入网网元之间交互的RRC信令来切换。具体地,所述接入网网元通过第一RRC信令向终端指示所述第二连接进入临时被抢占状态;所述接入网网元通过第二RRC信令向终端指示所述第二连接恢复到正常状态。
●临时被抢占行为
本申请实施例中,若所述第一连接允许临时被抢占,则执行针对所述第一连接的临时被抢占行为。
具体地,若所述第一连接允许临时被抢占,则确定临时抢占的第二连接,将所述第一连接的资源临时供所述第二连接使用。
A2)在一可选方式中,将所述第一连接设置为悬挂模式或者将所述第一连接所属的终端设置为RRC非激活模式或者RRC空闲模式,以使所述第一连接的资源临时供所述第二连接使用。
本申请实施例中,可选地,第一连接的模式或者第一连接所属的终端的模式,可以通过第二定时器来切换。具体地,所述接入网网元和/或终端上配置有第二定时器;所述第二定时器运行期间,所述第一连接处于悬挂模式或者所述第一连接所属的终端处于RRC非激活模式或者RRC空闲模式;所述第二定时器超时后,所述第一连接恢复到正常模式或者所述第一连接所属的终端恢复到RRC连接态。
本申请实施例中,可选地,第一连接的模式或者第一连接所属的终端的模式,可以通过终端与接入网网元之间交互的RRC信令来切换。具体地,所述接入网网元通过第一RRC信令向终端指示所述第一连接进入悬挂模式或者所述第一连接所属的终端进入RRC非激活模式或者RRC空闲模式;所述接入网网元通过第二RRC信令向终端指示所述第一连接恢复到正常模式或者所述第一连接所属的终端恢复到RRC连接态。
B2)在一可选方式中,将所述第一连接设置为临时被抢占状态,以使所述第一连接的资源临时供所述第二连接使用。
本申请实施例中,可选地,第一连接的状态可以通过第二定时器来切换。具体地,所述接入网网元和/或终端上配置有第二定时器;所述第二定时器运行期间,所述第一连接处于临时被抢占状态;所述第二定时器超时后,所述第一连接恢复到正常状态。
本申请实施例中,可选地,第一连接的状态可以通过终端与接入网网元之间交互的RRC信令来切换。具体地,所述接入网网元通过第一RRC信令向终端指示所述第一连接进入临时被抢占状态;所述接入网网元通过第二RRC信令向终端指示所述第一连接恢复到正常状态。
在一个示例中,以连接为DRB为例,按照上述A1)和A2)所描述的方案,将资源被抢占的DRB1设置为悬挂模式或者将资源被抢占的终端设置为RRC非激活模式或RRC空闲模式。可选地,终端和/或基站上配置有一个定时器,定时器运行期间,DRB1维持在悬挂模式或者终端维持在RRC非激活模式或RRC空闲模式,当定时器超时时,DRB1或者终端会自动恢复到原来的模式。可选地,终端和基站之间可以通过交互RRC信令来调整DRB1或者终端的模式,例如基站通过RRC信令与终端交互后将DRB1设置成悬挂模式,等待一定时间(如5秒)后,基站再通过RRC信令与终端交互将该DRB1的悬挂模式解除(即DRB1恢复到正常模式)。
在一个示例中,以连接为DRB为例,按照上述B1和B2)所描述的方案,引入一个新的DRB状态“临时被抢占状态”,若DRB1处于临时被抢占状态,则代表该DRB1的资源被临时抢占,需要说明的是,处于临时被抢占状态的DRB1仍可以传输数据,但是以“尽力(best effort)”方式进行传输,在DRB1处于临时被抢占状态期间,DRB1不会被释放,但DRB1原有的QoS参数(如GFBR、PER等)不能被保障。相对应的,抢占其它DRB的资源的DRB2处于“临时抢占状态”,DRB2处于临时抢占状态可以持续一定时间(如5秒),然后DRB-2将其抢占的资源释放。可选地,终端和/或基站上配置有一个定时器,定时器运行期间,DRB1维持在临时被抢占状态,当定时器超时时,DRB1自动恢复到原来的状态。可选地,终端和基站之间可以通过交互RRC信令来调整DRB1的状态,例如基站通过RRC信令与终端交互后将DRB1设置成临时被抢占状态,等待一定时间(如5秒)后,基站再通过RRC信令与终端交互将该DRB1的临时被抢占状态解除(即DRB1恢复到正常状态)。
需要说明的是,一个或多个QoS Flow会绑定到DRB上进行传输,因此,针对QoS Flow的临时抢占/临时被抢占,也可以理解为针对QoS Flow对应的DRB的临时抢占/临时被抢占。本申请实施例的技术方案中,以5GS为例,第一连接的资源是否允许临时抢占/临时被抢占,可以是指:QoS Flow或者QoS Flow对应的DRB的资源是否允许临时抢占/临时被抢占。执行针对第一连接的临时抢占行为/临时被抢占行为,可以是指:执行针对QoS Flow对应的DRB的临时抢占行为/临时被抢占行为,也即基站需要对DRB进行操作。
本申请实施例的技术方案,可使得第一连接的吞吐量在短时间内迅速增加,同时其他连接也不会被释放,最小程度减少用户体验的影响。本申请实施例的技术方案,充分利用了现有机制(如在现有的QoS参数中增加第一指示信息和/或第一时间信息、增强PDU会话修改/建立流程、重用悬挂状态等),实现了业务数据临时大吞吐量传输的需求。
图9是本申请实施例提供的临时抢占资源的装置的结构组成示意图,应用于网络设备,如图9所示,所述临时抢占资源的装置包括:
确定单元901,用于确定第一连接的资源是否允许临时抢占和/或临时被抢占。
在一可选方式中,所述网络设备为接入网网元,所述装置还包括:
接收单元902,用于接收核心网网元发送的第一指示信息,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
在一可选方式中,所述第一指示信息是终端发送给所述核心网网元的。
在一可选方式中,所述第一指示信息携带在终端发送给所述核心网网元的会话建立请求消息或者会话修改请求消息中。
在一可选方式中,所述第一指示信息和所述第一连接的属性参数由所述核心网网元一起发送给所述接入网网元;或者,
所述第一指示信息携带在所述第一连接的属性参数中,由所述核心网网元一起发送给所述接入网网元。
在一可选方式中,所述网络设备为接入网网元,所述装置还包括:
接收单元902,用于接收终端发送的第一指示信息,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
在一可选方式中,所述第一指示信息还用于指示所述第一连接临时抢占的资源信息和/或所述第一连接临时被抢占的资源信息。
在一可选方式中,所述网络设备为接入网网元,
所述确定单元901,用于根据预配置信息或者所述第一连接的属性参数,确定第一连接的资源是否允许临时抢占和/或临时被抢占。
在一可选方式中,所述确定单元901,还用于确定第一时间信息,所述第一时间信息用于确定所述第一连接的临时抢占时间和/或临时被抢占时间。
在一可选方式中,所述第一时间信息包括以下至少之一:临时抢占的起始时间、临时抢占的时间长度、临时抢占的时间周期;和/或,
所述第一时间信息包括以下至少之一:临时被抢占的起始时间、临时被抢占的时间长度、临时被抢占的时间周期。
在一可选方式中,所述网络设备为接入网网元,所述装置还包括:
接收单元902,用于接收核心网网元发送的第一时间信息。
在一可选方式中,所述第一时间信息是终端发送给所述核心网网元的。
在一可选方式中,所述第一时间信息携带在终端发送给所述核心网网元的会话建立请求消息或者会话修改请求消息中。
在一可选方式中,所述第一时间信息和所述第一连接的属性参数由所述核心网网元一起发送给所述接入网网元;或者,
所述第一时间信息携带在所述第一连接的属性参数中,由所述核心网网元一起发送给所述接入网网元。
在一可选方式中,所述网络设备为接入网网元,所述装置还包括:
接收单元902,用于接收终端发送的第一时间信息。
在一可选方式中,所述网络设备为接入网网元,
所述确定单元901,用于根据预配置信息或者所述第一连接的属性参数,确定第一时间信息。
在一可选方式中,所述第一连接为数据面连接;或者,
所述第一连接为空口连接;
其中,所述数据面连接与所述空口连接之间具有映射关系。
在一可选方式中,所述装置还包括:
处理单元903,用于根据所述第一连接的资源是否允许临时抢占和/或临时被抢占,执行针对所述第一连接的临时抢占行为或者临时被抢占行为。
在一可选方式中,所述处理单元903,用于若所述第一连接允许临时抢占,则执 行针对所述第一连接的临时抢占行为;若所述第一连接允许临时被抢占,则执行针对所述第一连接的临时被抢占行为。
在一可选方式中,所述处理单元903,用于若所述第一连接允许临时抢占,则确定临时被抢占的第二连接,将所述第二连接的资源临时供所述第一连接使用。
在一可选方式中,所述处理单元903,用将所述第二连接设置为悬挂模式或者将所述第二连接所属的终端设置为RRC非激活模式或者RRC空闲模式或者将所述第二连接设置为临时被抢占状态,以使所述第二连接的资源临时供所述第一连接使用。
在一可选方式中,所述处理单元903,用于若所述第一连接允许临时被抢占,则确定临时抢占的第二连接,将所述第一连接的资源临时供所述第二连接使用。
在一可选方式中,所述处理单元903,用于将所述第一连接设置为悬挂模式或者将所述第一连接所属的终端设置为RRC非激活模式或者RRC空闲模式将所述第一连接设置为临时被抢占状态,以使所述第一连接的资源临时供所述第二连接使用。
在一可选方式中,所述网络设备为接入网网元,所述接入网网元和/或终端上配置有第一定时器;
所述第一定时器运行期间,所述第二连接处于悬挂模式或者所述第二连接所属的终端处于RRC非激活模式或者RRC空闲模式或者所述第二连接处于临时被抢占状态;
所述第一定时器超时后,所述第二连接恢复到正常模式或者所述第二连接所属的终端恢复到RRC连接态或者所述第二连接恢复到正常状态。
在一可选方式中,所述网络设备为接入网网元,所述方法还包括:
所述接入网网元通过第一RRC信令向终端指示所述第二连接进入悬挂模式或者所述第二连接所属的终端进入RRC非激活模式或者RRC空闲模式或者所述第二连接进入临时被抢占状态;
所述接入网网元通过第二RRC信令向终端指示所述第二连接恢复到正常模式或者所述第二连接所属的终端恢复到RRC连接态或者所述第二连接恢复到正常状态。
在一可选方式中,所述网络设备为接入网网元,所述接入网网元和/或终端上配置有第二定时器;
所述第二定时器运行期间,所述第一连接处于悬挂模式或者所述第一连接所属的终端处于RRC非激活模式或者RRC空闲模式或者所述第一连接处于临时被抢占状态;
所述第二定时器超时后,所述第一连接恢复到正常模式或者所述第一连接所属的终端恢复到RRC连接态或者所述第一连接恢复到正常状态。
在一可选方式中,所述网络设备为接入网网元,所述方法还包括:
所述接入网网元通过第一RRC信令向终端指示所述第一连接进入悬挂模式或者所述第一连接所属的终端进入RRC非激活模式或者RRC空闲模式或者所述第一连接进入临时被抢占状态;
所述接入网网元通过第二RRC信令向终端指示所述第一连接恢复到正常模式或者所述第一连接所属的终端恢复到RRC连接态或者所述第一连接恢复到正常状态。
本领域技术人员应当理解,本申请实施例的上述临时抢占资源的装置的相关描述可以参照本申请实施例的临时抢占资源的方法的相关描述进行理解。
图10是本申请实施例提供的一种通信设备1000示意性结构图。该通信设备可以是终端,也可以是网络设备,图10所示的通信设备1000包括处理器1010,处理器1010可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图10所示,通信设备1000还可以包括存储器1020。其中,处理器1010 可以从存储器1020中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1020可以是独立于处理器1010的一个单独的器件,也可以集成在处理器1010中。
可选地,如图10所示,通信设备1000还可以包括收发器1030,处理器1010可以控制该收发器1030与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器1030可以包括发射机和接收机。收发器1030还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备1000具体可为本申请实施例的网络设备,并且该通信设备1000可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备1000具体可为本申请实施例的移动终端/终端,并且该通信设备1000可以实现本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
图11是本申请实施例的芯片的示意性结构图。图11所示的芯片1100包括处理器1110,处理器1110可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图11所示,芯片1100还可以包括存储器1120。其中,处理器1110可以从存储器1120中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1120可以是独立于处理器1110的一个单独的器件,也可以集成在处理器1110中。
可选地,该芯片1100还可以包括输入接口1130。其中,处理器1110可以控制该输入接口1130与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片1100还可以包括输出接口1140。其中,处理器1110可以控制该输出接口1140与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的移动终端/终端,并且该芯片可以实现本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
图12是本申请实施例提供的一种通信系统1200的示意性框图。如图12所示,该通信系统1200包括终端1210和网络设备1220。
其中,该终端1210可以用于实现上述方法中由终端实现的相应的功能,以及该网络设备1220可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的 各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流 程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (61)

  1. 一种临时抢占资源的方法,所述方法包括:
    网络设备确定第一连接的资源是否允许临时抢占和/或临时被抢占。
  2. 根据权利要求1所述的方法,其中,所述网络设备确定第一连接的资源是否允许临时抢占和/或临时被抢占,包括:
    接入网网元确定第一连接的资源是否允许临时抢占和/或临时被抢占。
  3. 根据权利要求2所述的方法,其中,所述接入网网元确定第一连接的资源是否允许临时抢占和/或临时被抢占,包括:
    接入网网元接收核心网网元发送的第一指示信息,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
  4. 根据权利要求3所述的方法,其中,所述第一指示信息是终端发送给所述核心网网元的。
  5. 根据权利要求4所述的方法,其中,所述第一指示信息携带在终端发送给所述核心网网元的会话建立请求消息或者会话修改请求消息中。
  6. 根据权利要求3至5中任一项所述的方法,其中,
    所述第一指示信息和所述第一连接的属性参数由所述核心网网元一起发送给所述接入网网元;或者,
    所述第一指示信息携带在所述第一连接的属性参数中,由所述核心网网元一起发送给所述接入网网元。
  7. 根据权利要求2所述的方法,其中,所述接入网网元确定第一连接的资源是否允许临时抢占和/或临时被抢占,包括:
    接入网网元接收终端发送的第一指示信息,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
  8. 根据权利要求3至7中任一项所述的方法,其中,所述第一指示信息还用于指示所述第一连接临时抢占的资源信息和/或所述第一连接临时被抢占的资源信息。
  9. 根据权利要求2所述的方法,其中,所述接入网网元确定第一连接的资源是否允许临时抢占和/或临时被抢占,包括:
    接入网网元根据预配置信息或者所述第一连接的属性参数,确定第一连接的资源是否允许临时抢占和/或临时被抢占。
  10. 根据权利要求1至9中任一项所述的方法,其中,所述方法还包括:
    所述网络设备确定第一时间信息,所述第一时间信息用于确定所述第一连接的临时抢占时间和/或临时被抢占时间。
  11. 根据权利要求10所述的方法,其中,
    所述第一时间信息包括以下至少之一:临时抢占的起始时间、临时抢占的时间长度、临时抢占的时间周期;和/或,
    所述第一时间信息包括以下至少之一:临时被抢占的起始时间、临时被抢占的时间长度、临时被抢占的时间周期。
  12. 根据权利要求9或10所述的方法,其中,所述网络设备确定第一时间信息,包括:
    接入网网元确定第一时间信息。
  13. 根据权利要12所述的方法,其中,所述接入网网元确定第一时间信息,包括:
    所述接入网网元接收核心网网元发送的第一时间信息。
  14. 根据权利要求13所述的方法,其中,所述第一时间信息是终端发送给所述核心网网元的。
  15. 根据权利要求14所述的方法,其中,所述第一时间信息携带在终端发送给所述核心网网元的会话建立请求消息或者会话修改请求消息中。
  16. 根据权利要求13至15中任一项所述的方法,其中,
    所述第一时间信息和所述第一连接的属性参数由所述核心网网元一起发送给所述接入网网元;或者,
    所述第一时间信息携带在所述第一连接的属性参数中,由所述核心网网元一起发送给所述接入网网元。
  17. 根据权利要求12所述的方法,其中,所述接入网网元确定第一时间信息,包括:
    所述接入网网元接收终端发送的第一时间信息。
  18. 根据权利要求12所述的方法,其中,所述接入网网元确定第一时间信息,包括:
    所述接入网网元根据预配置信息或者所述第一连接的属性参数,确定第一时间信息。
  19. 根据权利要求1至18中任一项所述的方法,其中,
    所述第一连接为数据面连接;或者,
    所述第一连接为空口连接;
    其中,所述数据面连接与所述空口连接之间具有映射关系。
  20. 根据权利要求1至19中任一项所述的方法,其中,所述方法还包括:
    所述网络设备根据所述第一连接的资源是否允许临时抢占和/或临时被抢占,执行针对所述第一连接的临时抢占行为或者临时被抢占行为。
  21. 根据权利要求20所述的方法,其中,所述执行针对所述第一连接的临时抢占行为或者临时被抢占行为,包括:
    若所述第一连接允许临时抢占,则执行针对所述第一连接的临时抢占行为;
    若所述第一连接允许临时被抢占,则执行针对所述第一连接的临时被抢占行为。
  22. 根据权利要求21所述的方法,其中,所述若所述第一连接允许临时抢占,则执行针对所述第一连接的临时抢占行为,包括:
    若所述第一连接允许临时抢占,则确定临时被抢占的第二连接,将所述第二连接的资源临时供所述第一连接使用。
  23. 根据权利要求22所述的方法,其中,所述将所述第二连接的资源临时供所述第一连接使用,包括:
    将所述第二连接设置为悬挂模式或者将所述第二连接所属的终端设置为无线资源控制RRC非激活模式或者RRC空闲模式或者将所述第二连接设置为临时被抢占状态,以使所述第二连接的资源临时供所述第一连接使用。
  24. 根据权利要求21所述的方法,其中,所述若所述第一连接允许临时被抢占,则执行针对所述第一连接的临时被抢占行为,包括:
    若所述第一连接允许临时被抢占,则确定临时抢占的第二连接,将所述第一连接的资源临时供所述第二连接使用。
  25. 根据权利要求24所述的方法,其中,所述将所述第一连接的资源临时供所述第二连接使用,包括:
    将所述第一连接设置为悬挂模式或者将所述第一连接所属的终端设置为RRC非 激活模式或者RRC空闲模式将所述第一连接设置为临时被抢占状态,以使所述第一连接的资源临时供所述第二连接使用。
  26. 根据权利要求23所述的方法,其中,所述网络设备为接入网网元,所述接入网网元和/或终端上配置有第一定时器;
    所述第一定时器运行期间,所述第二连接处于悬挂模式或者所述第二连接所属的终端处于RRC非激活模式或者RRC空闲模式或者所述第二连接处于临时被抢占状态;
    所述第一定时器超时后,所述第二连接恢复到正常模式或者所述第二连接所属的终端恢复到RRC连接态或者所述第二连接恢复到正常状态。
  27. 根据权利要求23所述的方法,其中,所述网络设备为接入网网元,所述方法还包括:
    所述接入网网元通过第一RRC信令向终端指示所述第二连接进入悬挂模式或者所述第二连接所属的终端进入RRC非激活模式或者RRC空闲模式或者所述第二连接进入临时被抢占状态;
    所述接入网网元通过第二RRC信令向终端指示所述第二连接恢复到正常模式或者所述第二连接所属的终端恢复到RRC连接态或者所述第二连接恢复到正常状态。
  28. 根据权利要求26所述的方法,其中,所述网络设备为接入网网元,所述接入网网元和/或终端上配置有第二定时器;
    所述第二定时器运行期间,所述第一连接处于悬挂模式或者所述第一连接所属的终端处于RRC非激活模式或者RRC空闲模式或者所述第一连接处于临时被抢占状态;
    所述第二定时器超时后,所述第一连接恢复到正常模式或者所述第一连接所属的终端恢复到RRC连接态或者所述第一连接恢复到正常状态。
  29. 根据权利要求26所述的方法,其中,所述网络设备为接入网网元,所述方法还包括:
    所述接入网网元通过第一RRC信令向终端指示所述第一连接进入悬挂模式或者所述第一连接所属的终端进入RRC非激活模式或者RRC空闲模式或者所述第一连接进入临时被抢占状态;
    所述接入网网元通过第二RRC信令向终端指示所述第一连接恢复到正常模式或者所述第一连接所属的终端恢复到RRC连接态或者所述第一连接恢复到正常状态。
  30. 一种临时抢占资源的装置,应用于网络设备,所述装置包括:
    确定单元,用于确定第一连接的资源是否允许临时抢占和/或临时被抢占。
  31. 根据权利要求30所述的装置,其中,所述网络设备为接入网网元,所述装置还包括:
    接收单元,用于接收核心网网元发送的第一指示信息,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
  32. 根据权利要求31所述的装置,其中,所述第一指示信息是终端发送给所述核心网网元的。
  33. 根据权利要求32所述的装置,其中,所述第一指示信息携带在终端发送给所述核心网网元的会话建立请求消息或者会话修改请求消息中。
  34. 根据权利要求31至33中任一项所述的装置,其中,
    所述第一指示信息和所述第一连接的属性参数由所述核心网网元一起发送给所述接入网网元;或者,
    所述第一指示信息携带在所述第一连接的属性参数中,由所述核心网网元一起发 送给所述接入网网元。
  35. 根据权利要求30所述的装置,其中,所述网络设备为接入网网元,所述装置还包括:
    接收单元,用于接收终端发送的第一指示信息,所述第一指示信息用于指示第一连接的资源是否允许临时抢占和/或临时被抢占。
  36. 根据权利要求31至35中任一项所述的装置,其中,所述第一指示信息还用于指示所述第一连接临时抢占的资源信息和/或所述第一连接临时被抢占的资源信息。
  37. 根据权利要求30所述的装置,其中,所述网络设备为接入网网元,
    所述确定单元,用于根据预配置信息或者所述第一连接的属性参数,确定第一连接的资源是否允许临时抢占和/或临时被抢占。
  38. 根据权利要求30至37中任一项所述的装置,其中,所述确定单元,还用于确定第一时间信息,所述第一时间信息用于确定所述第一连接的临时抢占时间和/或临时被抢占时间。
  39. 根据权利要求38所述的装置,其中,
    所述第一时间信息包括以下至少之一:临时抢占的起始时间、临时抢占的时间长度、临时抢占的时间周期;和/或,
    所述第一时间信息包括以下至少之一:临时被抢占的起始时间、临时被抢占的时间长度、临时被抢占的时间周期。
  40. 根据权利要求38或39所述的装置,其中,所述网络设备为接入网网元,所述装置还包括:
    接收单元,用于接收核心网网元发送的第一时间信息。
  41. 根据权利要求40所述的装置,其中,所述第一时间信息是终端发送给所述核心网网元的。
  42. 根据权利要求41所述的装置,其中,所述第一时间信息携带在终端发送给所述核心网网元的会话建立请求消息或者会话修改请求消息中。
  43. 根据权利要求40至42中任一项所述的装置,其中
    所述第一时间信息和所述第一连接的属性参数由所述核心网网元一起发送给所述接入网网元;或者,
    所述第一时间信息携带在所述第一连接的属性参数中,由所述核心网网元一起发送给所述接入网网元。
  44. 根据权利要求38或39所述的装置,其中,所述网络设备为接入网网元,所述装置还包括:
    接收单元,用于接收终端发送的第一时间信息。
  45. 根据权利要求38或39所述的装置,其中,所述网络设备为接入网网元,
    所述确定单元,用于根据预配置信息或者所述第一连接的属性参数,确定第一时间信息。
  46. 根据权利要求30至45中任一项所述的装置,其中,
    所述第一连接为数据面连接;或者,
    所述第一连接为空口连接;
    其中,所述数据面连接与所述空口连接之间具有映射关系。
  47. 根据权利要求30至46中任一项所述的装置,其中,所述装置还包括:
    处理单元,用于根据所述第一连接的资源是否允许临时抢占和/或临时被抢占,执行针对所述第一连接的临时抢占行为或者临时被抢占行为。
  48. 根据权利要求47所述的装置,其中,所述处理单元,用于若所述第一连接允许临时抢占,则执行针对所述第一连接的临时抢占行为;若所述第一连接允许临时被抢占,则执行针对所述第一连接的临时被抢占行为。
  49. 根据权利要求48所述的装置,其中,所述处理单元,用于若所述第一连接允许临时抢占,则确定临时被抢占的第二连接,将所述第二连接的资源临时供所述第一连接使用。
  50. 根据权利要求49所述的装置,其中,所述处理单元,用将所述第二连接设置为悬挂模式或者将所述第二连接所属的终端设置为RRC非激活模式或者RRC空闲模式或者将所述第二连接设置为临时被抢占状态,以使所述第二连接的资源临时供所述第一连接使用。
  51. 根据权利要求48所述的装置,其中,所述处理单元,用于若所述第一连接允许临时被抢占,则确定临时抢占的第二连接,将所述第一连接的资源临时供所述第二连接使用。
  52. 根据权利要求51所述的装置,其中,所述处理单元,用于将所述第一连接设置为悬挂模式或者将所述第一连接所属的终端设置为RRC非激活模式或者RRC空闲模式将所述第一连接设置为临时被抢占状态,以使所述第一连接的资源临时供所述第二连接使用。
  53. 根据权利要求50所述的装置,其中,所述网络设备为接入网网元,所述接入网网元和/或终端上配置有第一定时器;
    所述第一定时器运行期间,所述第二连接处于悬挂模式或者所述第二连接所属的终端处于RRC非激活模式或者RRC空闲模式或者所述第二连接处于临时被抢占状态;
    所述第一定时器超时后,所述第二连接恢复到正常模式或者所述第二连接所属的终端恢复到RRC连接态或者所述第二连接恢复到正常状态。
  54. 根据权利要求50所述的装置,其中,所述网络设备为接入网网元,所述方法还包括:
    所述接入网网元通过第一RRC信令向终端指示所述第二连接进入悬挂模式或者所述第二连接所属的终端进入RRC非激活模式或者RRC空闲模式或者所述第二连接进入临时被抢占状态;
    所述接入网网元通过第二RRC信令向终端指示所述第二连接恢复到正常模式或者所述第二连接所属的终端恢复到RRC连接态或者所述第二连接恢复到正常状态。
  55. 根据权利要求52所述的装置,其中,所述网络设备为接入网网元,所述接入网网元和/或终端上配置有第二定时器;
    所述第二定时器运行期间,所述第一连接处于悬挂模式或者所述第一连接所属的终端处于RRC非激活模式或者RRC空闲模式或者所述第一连接处于临时被抢占状态;
    所述第二定时器超时后,所述第一连接恢复到正常模式或者所述第一连接所属的终端恢复到RRC连接态或者所述第一连接恢复到正常状态。
  56. 根据权利要求52所述的装置,其中,所述网络设备为接入网网元,所述方法还包括:
    所述接入网网元通过第一RRC信令向终端指示所述第一连接进入悬挂模式或者所述第一连接所属的终端进入RRC非激活模式或者RRC空闲模式或者所述第一连接进入临时被抢占状态;
    所述接入网网元通过第二RRC信令向终端指示所述第一连接恢复到正常模式或 者所述第一连接所属的终端恢复到RRC连接态或者所述第一连接恢复到正常状态。
  57. 一种网络设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至29中任一项所述的方法。
  58. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至29中任一项所述的方法。
  59. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至29中任一项所述的方法。
  60. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至29中任一项所述的方法。
  61. 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至29中任一项所述的方法。
PCT/CN2020/137069 2020-12-17 2020-12-17 一种临时抢占资源的方法及装置、网络设备 WO2022126465A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080106326.6A CN116325886A (zh) 2020-12-17 2020-12-17 一种临时抢占资源的方法及装置、网络设备
PCT/CN2020/137069 WO2022126465A1 (zh) 2020-12-17 2020-12-17 一种临时抢占资源的方法及装置、网络设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/137069 WO2022126465A1 (zh) 2020-12-17 2020-12-17 一种临时抢占资源的方法及装置、网络设备

Publications (1)

Publication Number Publication Date
WO2022126465A1 true WO2022126465A1 (zh) 2022-06-23

Family

ID=82059919

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/137069 WO2022126465A1 (zh) 2020-12-17 2020-12-17 一种临时抢占资源的方法及装置、网络设备

Country Status (2)

Country Link
CN (1) CN116325886A (zh)
WO (1) WO2022126465A1 (zh)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327542A (zh) * 2013-05-28 2013-09-25 中国电子科技集团公司第七研究所 一种应用于MANET网络的QoS保障方法及装置
US20200127733A1 (en) * 2018-10-23 2020-04-23 Xieon Networks S.A.R.L. Method and system for assigning spectral resources

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327542A (zh) * 2013-05-28 2013-09-25 中国电子科技集团公司第七研究所 一种应用于MANET网络的QoS保障方法及装置
US20200127733A1 (en) * 2018-10-23 2020-04-23 Xieon Networks S.A.R.L. Method and system for assigning spectral resources

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
APPLE INC.: "QoS Flow based Data Split between Licensed and Unlicensed", 3GPP DRAFT; R2-1812713, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Gothenburg, Sweden; 20180820 - 20180824, 10 August 2018 (2018-08-10), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051522307 *

Also Published As

Publication number Publication date
CN116325886A (zh) 2023-06-23

Similar Documents

Publication Publication Date Title
US10966222B2 (en) Method, device, and system for processing reflective QoS characteristics
JP6980836B2 (ja) データ送信方法、ユーザ機器、および基地局
JP7396768B2 (ja) グラントフリー伝送のためのアップリンクデータスケジューリングのためのシステムおよび方法
WO2018141284A1 (zh) 一种QoS流处理方法、设备和通信系统
WO2019228214A1 (zh) 一种无线承载建立、业务流的监测方法及装置
WO2017117968A1 (zh) 数据接口分流方法、装置、终端设备和计算机存储介质
WO2018059518A1 (zh) 一种数据传输方法、装置和系统
WO2019057154A1 (zh) 数据传输方法、终端设备和网络设备
WO2015158004A1 (zh) 一种功率配置方法、用户设备及基站
WO2021184263A1 (zh) 一种数据传输方法及装置、通信设备
WO2015180157A1 (zh) 承载建立装置和方法
WO2020252710A1 (zh) 无线通信方法和设备
CN109804663B (zh) 一种数据传输的方法及其装置
WO2021114107A1 (zh) 一种数据传输方法及装置
WO2020051745A1 (zh) 一种数据传输方法及装置、通信设备
WO2018014704A1 (zh) 一种基于harq的传输方法和装置
WO2021159272A1 (zh) 通信方法、装置、设备及可读存储介质
WO2022126465A1 (zh) 一种临时抢占资源的方法及装置、网络设备
CN109474956B (zh) 上行数据传输方法、定时器配置方法及相关设备
WO2022012361A1 (zh) 一种通信方法及装置
WO2022155916A1 (zh) 一种属性参数的调整方法及装置、通信设备
WO2023184545A1 (zh) 一种数据传输方法及装置、通信设备
WO2019127334A1 (zh) 建立缺省数据无线承载的方法和装置
WO2023102754A1 (zh) 一种通信方法及装置、通信设备
WO2023184552A1 (zh) 一种数据传输方法及装置、通信设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20965482

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20965482

Country of ref document: EP

Kind code of ref document: A1