WO2022151079A1 - 无线通信的方法、终端设备和网络设备 - Google Patents

无线通信的方法、终端设备和网络设备 Download PDF

Info

Publication number
WO2022151079A1
WO2022151079A1 PCT/CN2021/071564 CN2021071564W WO2022151079A1 WO 2022151079 A1 WO2022151079 A1 WO 2022151079A1 CN 2021071564 W CN2021071564 W CN 2021071564W WO 2022151079 A1 WO2022151079 A1 WO 2022151079A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
identifier
information
party
configuration information
Prior art date
Application number
PCT/CN2021/071564
Other languages
English (en)
French (fr)
Inventor
范江胜
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2021/071564 priority Critical patent/WO2022151079A1/zh
Priority to CN202180070417.3A priority patent/CN116368865A/zh
Publication of WO2022151079A1 publication Critical patent/WO2022151079A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • the embodiments of the present application relate to the field of communications, and more particularly, to a wireless communication method, terminal device, and network device.
  • New Radio (NR) version 16 introduces a non-public network (NPN).
  • NPN non-public network
  • operators authorize third-party entities to establish their own NPN networks.
  • the deployed NPN network may have its own network identifier configuration method. In this case, how to determine the logical number corresponding to the network identifier in the third-party network identifier configuration information is an urgent problem to be solved.
  • Embodiments of the present application provide a wireless communication method, terminal device, and network device.
  • the terminal device can determine the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side, thereby optimizing the third-party network.
  • a method for wireless communication comprising:
  • the terminal device determines the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side;
  • the terminal device selects the access control parameter configuration and/or system resource configuration associated with the logical number information according to the logical number information; and/or, the terminal device generates a message including network routing parameters according to the logical number information.
  • a method for wireless communication comprising:
  • the network device sends target information to the terminal device, where the target information is used by the terminal device to determine the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side;
  • the logical number information is used to select the associated access control parameter configuration and/or system resource configuration; and/or the logical number information is used to generate a message including network routing parameters.
  • a terminal device for executing the method in the above-mentioned first aspect.
  • the terminal device includes functional modules for executing the method in the first aspect.
  • a network device for executing the method in the second aspect.
  • the network device includes functional modules for executing the method in the second aspect above.
  • a terminal device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the first aspect.
  • a network device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the second aspect.
  • an apparatus for implementing the method in any one of the above-mentioned first to second aspects.
  • the apparatus includes: a processor for invoking and running a computer program from a memory, so that a device on which the apparatus is installed executes the method in any one of the first to second aspects above.
  • a computer-readable storage medium for storing a computer program, the computer program causing a computer to execute the method in any one of the first to second aspects above.
  • a computer program product comprising computer program instructions, the computer program instructions causing a computer to perform the method in any one of the first to second aspects above.
  • a computer program which, when run on a computer, causes the computer to perform the method of any one of the above-mentioned first to second aspects.
  • the terminal device can determine the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side, and select the access control parameter configuration and/or system associated with the logical number information according to the logical number information Resource configuration, and/or, generating messages containing network routing parameters based on logical numbering information.
  • operations such as access control parameter configuration, system resource configuration, and network routing control can be performed on the third-party network to avoid access congestion, non-isolation of resource configuration, and network routing errors caused by the introduction of the third-party network, thereby optimizing the third-party network.
  • FIG. 1 is a schematic diagram of a communication system architecture to which an embodiment of the present application is applied.
  • FIG. 2 is a schematic flowchart of a method for wireless communication according to an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of another wireless communication method provided according to an embodiment of the present application.
  • FIG. 4 is a schematic block diagram of a terminal device provided according to an embodiment of the present application.
  • FIG. 5 is a schematic block diagram of a network device provided according to an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of a communication device provided according to an embodiment of the present application.
  • Fig. 7 is a schematic block diagram of an apparatus provided according to an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a communication system provided according to an embodiment of the present application.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • CDMA Wideband Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • LTE-A Advanced Long Term Evolution
  • NR New Radio
  • NTN Non-Terrestrial Networks
  • UMTS Universal Mobile Telecommunication System
  • WLAN Wireless Local Area Networks
  • Wireless Fidelity Wireless Fidelity
  • WiFi fifth-generation communication
  • D2D Device to Device
  • M2M Machine to Machine
  • MTC Machine Type Communication
  • V2V Vehicle to Vehicle
  • V2X Vehicle to everything
  • the communication system in this embodiment of the present application may be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, or a standalone (Standalone, SA) distribution. web scene.
  • Carrier Aggregation, CA Carrier Aggregation, CA
  • DC Dual Connectivity
  • SA standalone
  • the communication system in the embodiment of the present application may be applied to an unlicensed spectrum, where the unlicensed spectrum may also be considered as a shared spectrum; or, the communication system in the embodiment of the present application may also be applied to a licensed spectrum, where, Licensed spectrum can also be considered unshared spectrum.
  • the embodiments of the present application describe various embodiments in conjunction with network equipment and terminal equipment, where the terminal equipment may also be referred to as user equipment (User Equipment, UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc.
  • user equipment User Equipment, UE
  • access terminal subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device, etc.
  • the terminal device may be a station (STATION, ST) in the WLAN, and may be a cellular phone, a cordless phone, a Session Initiation Protocol (Session Initiation Protocol, SIP) phone, a Wireless Local Loop (WLL) station, a personal digital assistant (Personal Digital Assistant, PDA) devices, handheld devices with wireless communication capabilities, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, next-generation communication systems such as end devices in NR networks, or future Terminal equipment in the evolved public land mobile network (Public Land Mobile Network, PLMN) network, etc.
  • PLMN Public Land Mobile Network
  • the terminal device can be deployed on land, including indoor or outdoor, handheld, wearable, or vehicle-mounted; it can also be deployed on water (such as ships, etc.); it can also be deployed in the air (such as airplanes, balloons, and satellites) superior).
  • the terminal device may be a mobile phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (Virtual Reality, VR) terminal device, and an augmented reality (Augmented Reality, AR) terminal Equipment, wireless terminal equipment in industrial control, wireless terminal equipment in self driving, wireless terminal equipment in remote medical, wireless terminal equipment in smart grid , wireless terminal equipment in transportation safety, wireless terminal equipment in smart city or wireless terminal equipment in smart home, etc.
  • a mobile phone Mobile Phone
  • a tablet computer Pad
  • a computer with a wireless transceiver function a virtual reality (Virtual Reality, VR) terminal device
  • augmented reality (Augmented Reality, AR) terminal Equipment wireless terminal equipment in industrial control, wireless terminal equipment in self driving, wireless terminal equipment in remote medical, wireless terminal equipment in smart grid , wireless terminal equipment in transportation safety, wireless terminal equipment in smart city or wireless terminal equipment in smart home, etc.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices, which are the general term for the intelligent design of daily wear and the development of wearable devices using wearable technology, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-scale, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which needs to cooperate with other devices such as smart phones.
  • the network device may be a device for communicating with a mobile device, and the network device may be an access point (Access Point, AP) in WLAN, or a base station (Base Transceiver Station, BTS) in GSM or CDMA , it can also be a base station (NodeB, NB) in WCDMA, it can also be an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or an access point, or a vehicle-mounted device, a wearable device, and an NR network
  • the network device may have a mobile feature, for example, the network device may be a mobile device.
  • the network device may be a satellite or a balloon station.
  • the satellite may be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geostationary earth orbit (GEO) satellite, a High Elliptical Orbit (HEO) ) satellite etc.
  • the network device may also be a base station set in a location such as land or water.
  • a network device may provide services for a cell, and a terminal device communicates with the network device through transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell, and the cell may be a network device (
  • the cell can belong to the macro base station, or it can belong to the base station corresponding to the small cell (Small cell).
  • Pico cell Femto cell (Femto cell), etc.
  • These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or referred to as a communication terminal, a terminal).
  • the network device 110 may provide communication coverage for a particular geographic area, and may communicate with terminal devices located within the coverage area.
  • FIG. 1 exemplarily shows one network device and two terminal devices.
  • the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. This application The embodiment does not limit this.
  • the communication system 100 may further include other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the present application.
  • network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the present application.
  • a device having a communication function in the network/system may be referred to as a communication device.
  • the communication device may include a network device 110 and a terminal device 120 with a communication function, and the network device 110 and the terminal device 120 may be the specific devices described above, which will not be repeated here.
  • the communication device may also include other devices in the communication system 100, such as other network entities such as a network controller, a mobility management entity, etc., which are not limited in this embodiment of the present application.
  • the "instruction" mentioned in the embodiments of the present application may be a direct instruction, an indirect instruction, or an associated relationship.
  • a indicates B it can indicate that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indicates B indirectly, such as A indicates C, and B can be obtained through C; it can also indicate that there is an association between A and B relation.
  • corresponding may indicate that there is a direct or indirect corresponding relationship between the two, or may indicate that there is an associated relationship between the two, or indicate and be instructed, configure and be instructed configuration, etc.
  • predefinition may be implemented by pre-saving corresponding codes, forms, or other means that can be used to indicate relevant information in devices (for example, including terminal devices and network devices).
  • the implementation method is not limited.
  • predefined may refer to the definition in the protocol.
  • the "protocol” may refer to a standard protocol in the communication field, for example, may include the LTE protocol, the NR protocol, and related protocols applied in future communication systems, which are not limited in this application.
  • RRC_INACTIVE deactivated
  • RRC_IDLE Mobility is UE-based cell selection reselection, paging is initiated by the Core Network (CN), and the paging area is configured by the CN.
  • CN Core Network
  • AS Access Stratum
  • RRC_CONNECTED There is an RRC connection, and the UE AS context exists between the base station and the UE; the network device knows that the location of the UE is at the specific cell level. Mobility is the mobility of network device control. Unicast data can be transmitted between the UE and the base station.
  • RRC_INACTIVE Mobility is UE-based cell selection reselection, there is a connection between CN-NR, UE AS context exists on a base station, paging is triggered by Radio Access Network (RAN), RAN-based The paging area is managed by the RAN, and the network equipment knows the location of the UE based on the paging area level of the RAN.
  • RAN Radio Access Network
  • NPN can be divided into independent non-public networks (Stand-alone Non-public Networks, SNPN) and closed access group (Closed Access Group, CAG) network
  • SNPN Sed Access Group
  • CAG Closed Access Group
  • PLMN ID and NID PLMN ID and CAG ID
  • PLMN ID and CAG ID PLMN ID and CAG ID
  • SUPI Subscriber Permanent Identifier
  • subscription information which are stored in the terminal device and core. network side.
  • a user who has subscribed to the SNPN service needs to support the SNPN access mode (SNPN access mode).
  • the user configured in the SNPN access mode can only access the network through the SNPN, and the user who is not configured in the SNPN access mode can perform the PLMN selection process.
  • the configuration mode (activation, deactivation, etc.) of the SNPN access mode is implemented by the terminal device. In the process of initial access and cell reselection, the access network equipment needs to broadcast the NID and corresponding PLMN ID information supported by itself. Users who have configured the SNPN access mode can select an accessible SNPN cell according to their own subscription information.
  • the core network device may also authenticate the user's identity according to the user's subscription information.
  • a PLMN can support any combination mode of network sharing in common public network, SNPN and CAG network at the same time.
  • a PLMN can support the common public network, SNPN or CAG network alone, can also support the network sharing combined mode of common public network and SNPN, and even support the network sharing combined mode of common public network, SNPN and CAG network.
  • the common public network, SNPN or CAG network can be supported by a PLMN, or the common public network and the SNPN can share a PLMN network at the same time, or even the common public network, SNPN and CAG network can share a PLMN network at the same time.
  • the following table 1 can more clearly reflect the logical deployment relationship between the common public network, the SNPN and the CAG network.
  • a cell can be configured with public network PLMN ID list information and non-public network NPN network identification list information at the same time, and non-public network NPN network identification list information is an optional parameter introduced by NR R16 , for a CAG-type NPN network, a PLMN ID is allowed to be associated with a CAG ID list; for an SNPN-type NPN network, a PLMN ID is allowed to be associated with a NID list.
  • the parameter N/M/W in Table 1 is a positive integer greater than or equal to 1.
  • suitable cell may refer to a cell where the terminal device can normally camp.
  • the frequency point priority value ranges from 0 to 7. 0 represents the lowest priority, and 7 represents the highest priority.
  • the standard stipulates that each value from 0 to 7 can be associated with a decimal value.
  • the value range of the decimal place is ⁇ 0.2, 0.4, 0.6, 0.8 ⁇ .
  • the frequency point priority can be configured through system information or dedicated signaling.
  • the frequency point priority configured by the dedicated signaling will be associated with a valid duration.
  • the dedicated frequency point priority always covers the public frequency point priority of system information broadcasting. level; when the valid time expires, the terminal can only use the public frequency priority.
  • the frequency point priority of the frequency point configured at the same time is the absolute frequency point priority of the frequency point.
  • Cell selection The cell selected by the terminal satisfies the appropriate cell criterion, and the terminal can choose to camp in the cell to complete the cell selection.
  • Cell reselection The reselected target cell satisfies the appropriate cell criterion and the reselection criterion condition defined based on the absolute frequency point priority, then the terminal reselects to the corresponding cell that satisfies the foregoing conditions to complete the cell reselection.
  • the same-priority frequency point reselection criterion or the same-frequency reselection criterion also known as the R criterion;
  • ANR Automatic Neighbor Relationship
  • the newly deployed cell will have an impact on the neighbor relationship.
  • the surrounding neighbor cells cannot always obtain the latest neighbor relationship information from Operation Administration and Maintenance (OAM).
  • OAM Operation Administration and Maintenance
  • NR allows the terminal to report under the network configuration. Neighbor-related information obtained by itself, such as Cell Global Identity (CGI)/System Frame Number and Frame Timing Difference (SFTD).
  • CGI Cell Global Identity
  • SFTD System Frame Number and Frame Timing Difference
  • the emergency communication service indication information on the network side is configured at the cell granularity, that is to say, all PLMNs supported by the cell share the same emergency communication service indication information, and these PLMNs either support emergency communication or do not support it; while the SNPN The network does not support emergency communication services in NR R16.
  • AMF Access and Mobility Management Function
  • NR version 15 (release15, R15) specifies that a Next Generation Radio Access Network (NG-RAN) may be connected to one or more AMF entities, and different AMF entities may provide different services or be operated by different In order to route the non-access stratum (Non-Access Stratum, NAS) data of the terminal to the appropriate AMF entity, the terminal equipment in the fifth message of the four-step random access process or the two-step random access process
  • the third message needs to provide one of the following information to assist the Radio Access Network (RAN) side to select an appropriate AMF entity:
  • Existing cell network identifiers include public network PLMN network identifiers (using PLMN ID identifiers) and/or non-public network NPN identifiers, wherein non-public network NPNs include SNPN networks (using PLMN ID+NID ID identifiers) or CAG networks (using PLMN ID+NID ID identifiers) PLMN ID+CAG ID identification), the terminal obtains the original data information of the network identification supported by the cell by reading the system information block (System Information Block, SIB) 1 of the cell system broadcast information.
  • SIB System Information Block
  • the network type is also used in other network configuration or terminal processes, such as: the configuration of cell access control parameters and the process of adding network identification parameters in the fifth message of the four-step random access process sent by the terminal.
  • An original PLMN ID or SNPN ID identifier occupies a large number of bits (one PLMN ID occupies 20 bits or 24 bits, and one SNPN ID occupies 64 bits or 68 bits).
  • the protocol stipulates that PLMN needs to be used in cell or terminal related processes. In the case of ID or SNPN ID, an index is used to represent the original PLMN ID or SNPN ID of the cell system information broadcast, thereby saving system overhead. Because the protocol stipulates that during configuration, the total number of public network PLMN and non-public network NPN networks cannot exceed 12, so usually 4 bits can be used to represent any public network PLMN or non-public network NPN network broadcast by the cell. Compared with the original PLMN ID or SNPN ID identification broadcast by the cell system information, a lot of overhead is saved.
  • All public network PLMN network identifiers form a public network PLMN identifier set, and all non-public network NPN network identifiers form a non-public network NPN identifier set.
  • Each PLMN ID in all public network PLMN identification sets is independently counted for the number of networks, while for the non-public network NPN identification set, each SNPN ID in the set is independently counted (even if multiple NIDs are associated with each other).
  • the same PLMN ID also needs to be counted separately), but for a CAG-type NPN network, if multiple CAG IDs are associated with the same PLMN ID, only one can be counted during network counting; the protocol further stipulates that the public network PLMN identifier of the same cell
  • the set is uniformly numbered with the network identity in the non-public network NPN identity set, and the network identity number in the non-public network NPN identity set is always continued after the network identity number in the public network PLMN identity set is completed, such as the public network PLMN identity.
  • the set includes 5 PLMN ID network identifiers, which are numbered from 1 to 5 according to the logical sequence of the configuration.
  • the network identifiers in the non-public network NPN identifier set can only be numbered from 6.
  • NPN-only (NPN-only) cell the protocol specifies that the network identifiers in the non-public network NPN identifier set are numbered from 1. No matter how the network is configured, the total number of public network PLMN and non-public network NPN networks cannot exceed 12, that is to say, the maximum number is 12.
  • NPN networks such as SNPN and CAG are becoming more and more flexible.
  • third-party entities can even deploy their own NPN networks.
  • the NPN networks deployed by these third-party entities may have their own network identification configuration methods.
  • the logical relationship between the newly introduced network identification configuration and the existing public network PLMN ID list configuration information and the non-public network NPN network identification list configuration information is undefined, so these newly introduced network identification numbering rules cannot be defined, so Other parameters that need to be associated with these newly introduced network identities cannot be defined, such as access control, AMF routing functions, etc.
  • Access control rule constraints cause resource congestion or terminal messages are incorrectly routed to an inappropriate AMF by the network side, resulting in increased communication delay.
  • the present application proposes a network identification numbering scheme.
  • the terminal device can determine the logical number information corresponding to the network identification in the third-party network identification configuration information configured on the network side, thereby optimizing the third-party network.
  • FIG. 2 is a schematic flowchart of a method 200 for wireless communication according to an embodiment of the present application. As shown in FIG. 2 , the method 200 may include at least part of the following contents:
  • the terminal device determines the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side;
  • the terminal device selects, according to the logical number information, an access control parameter configuration and/or system resource configuration associated with the logical number information; and/or, the terminal device generates a message including network routing parameters according to the logical number information .
  • the logical relationship between the third-party network identification configuration information, the public network PLMN ID list configuration information, and the non-public network NPN network identification list configuration information is defined, so that the access control parameters for the third-party network can be implemented. Operations such as configuration, system resource configuration, and network routing control can avoid access congestion, non-isolation of resource configuration, and network routing errors caused by the introduction of third-party networks, thereby optimizing third-party networks.
  • the third-party network identification configuration information includes at least one of the following information:
  • PLMN network identifier PLMN network identifier
  • SNPN network identifier temporary network identifier
  • access control-related network identifier PLMN network identifier
  • first functional group identifier PLMN network identifier
  • the first functional group identifier is a group identifier that allows the terminal to perform third-party authentication through the cell; or, the first functional group identifier is a group identifier that allows the terminal to obtain its own subscription data through the cell network.
  • the access control-related network identifier is similar to the PLMN ID or SNPN ID, that is, the actual meaning is the same, but the length of the access control-related network identifier may be different from the PLMN ID or SNPN ID.
  • the temporary network identifier is similar to the PLMN ID or SNPN ID, that is, the actual meaning is the same, except that the temporary network identifier is the temporary identifier of the PLMN or SNPN.
  • the first functional group identifier includes at least one of the following configuration granularities:
  • PLMN identity or SNPN identity granularity PLMN identity or SNPN identity granularity, CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
  • an optional cell granularity configuration format of the first functional group identifier may be as shown in Table 2. Since the public network PLMN network identifier or the non-public network NPN network identifier is configured at cell granularity, the first functional group identifier It is configured in parallel with the public network PLMN network identifier or the non-public network NPN network identifier, so the first functional group identifier is also configured at cell granularity.
  • an optional PLMN identity or SNPN identity granularity or an access control-related network identity granularity or a temporary network identity granularity configuration format of the first functional group identity can be as shown in Table 3, since the first functional group identity is The next level configuration of PLMN identity/SNPN identity/access control related network identity/temporary network identity, so the first functional group identity is configured by PLMN identity/SNPN identity/access control related network identity/temporary network identity granularity.
  • the access control-related network identifiers and temporary network identifiers in the above Table 3 may also be side by side with the public network PLMN network identifier/non-public network NPN network identifier, or as shown in Table 3, the access control-related network identifier
  • the identification and temporary network identification configuration information is the next-level configuration of the non-public network NPN network identification.
  • an optional CAG identification granularity configuration format of the first functional group identification can be as shown in Table 4. Since the first functional group identification is a lower-level configuration of the CAG identification, the first functional group identification is Configuration of CAG identity granularity.
  • the third-party network identification configuration information may also be associated with first configuration information, where the first configuration information includes at least one of the following information:
  • the terminal is allowed to initiate a third-party network authentication request under the condition that the SNPN or PLMN network identity maintained by itself for third-party network authentication does not match any SNPN or PLMN network identity broadcast by the cell system information;
  • the terminal is allowed to obtain or update the indication information of its own subscription data through the cell network;
  • the first configuration information includes at least one of the following configuration granularities:
  • PLMN identity or SNPN identity granularity PLMN identity or SNPN identity granularity, CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
  • an optional cell granularity configuration format of the first configuration information and the first functional group identifier may be as shown in Table 5. Since the public network PLMN network identifier or the non-public network NPN network identifier is configured at the cell granularity, The first configuration information and the first functional group identifier are configured in parallel with the public network PLMN network identifier or the non-public network NPN network identifier, so the first configuration information and the first functional group identifier are also configured at cell granularity.
  • an optional PLMN identity or SNPN identity granularity or an access control-related network identity granularity or a temporary network identity granularity configuration format of the first configuration information can be as shown in Table 6, since the first configuration information is a PLMN identity /SNPN identifier/access control related network identifier/temporary network identifier is the next-level configuration, so the first configuration information is PLMN identifier/SNPN identifier/access control related network identifier/temporary network identifier granularity configuration.
  • the access control-related network identifiers and temporary network identifiers in the above Table 6 may also be side by side with the public network PLMN network identifier/non-public network NPN network identifier, or as shown in Table 6, access control-related network identifiers
  • the identification and temporary network identification configuration information is the next-level configuration of the non-public network NPN network identification.
  • an optional CAG identification granularity configuration format of the first configuration information may be as shown in Table 7. Since the first configuration information is the next-level configuration of the CAG identification, the first configuration information is the CAG identification granularity Configuration.
  • the above S210 may specifically be:
  • the terminal device determines the logical number information corresponding to the network identifier in the third-party network identifier configuration information according to the first information; wherein the first information is used to indicate the network identifier and the PLMN network identifier in the third-party network identifier configuration information
  • the network identifiers in the configuration information and/or the NPN network identifier configuration information are numbered uniformly.
  • the number of the network identity in the third-party network identity configuration information is after the number of the network identity in the PLMN network identity configuration information and/or the NPN network identity configuration information.
  • PLMN network identification configuration information may also be referred to as “public network PLMN network identification configuration information”
  • NPN network identification configuration information may also be referred to as “non-public network NPN network identification configuration information”.
  • the total number of network identifiers in the third-party network identifier configuration information and/or the PLMN network identifier configuration information and/or the NPN network identifier configuration information is a positive integer M;
  • M does not exceed 16, or M does not exceed 32, or M does not exceed 64.
  • the first information is pre-configured or agreed in a protocol, or the first information is configured by a network device.
  • the number of network identities contained in the PLMN network identity configuration information is 3, the number of network identities contained in the NPN network identity configuration information is 4, and the number of network identities contained in the third-party network identity configuration information is 5 . Then the numbering is performed according to the unified numbering method: PLMN network identifiers are numbered 1 to 3 in the logical order of configuration; NPN network identifiers are numbered 4 to 7 in order of configuration; .
  • the third-party network identification configuration information may be included in the NPN network identification configuration information, or may be configured in parallel with the NPN network identification configuration information, which is not limited in this embodiment of the present application.
  • the above S210 may specifically be:
  • the terminal device determines the logical number information corresponding to the network identifier in the third-party network identifier configuration information according to the second information; wherein the second information is used to indicate the network identifier and the PLMN network identifier in the third-party network identifier configuration information
  • the network identifiers in the configuration information and/or the NPN network identifier configuration information are independently numbered.
  • the logical number of the network identifier in the third-party network identifier configuration information starts from 0 or 1.
  • the number of network identifiers in the third-party network identifier configuration information is a positive integer N;
  • N does not exceed 12, or, N does not exceed 16, or, N does not exceed 32, or, N does not exceed 64.
  • the second information is pre-configured or agreed in a protocol, or the second information is configured by a network device.
  • the number of network identities contained in the PLMN network identity configuration information is 3, the number of network identities contained in the NPN network identity configuration information is 4, and the number of network identities contained in the third-party network identity configuration information is 5 .
  • the numbering is carried out according to the independent numbering method: PLMN network identifiers are numbered 1 to 3 in the logical order of configuration; NPN network identifiers are numbered 4 to 7 in order of configuration; Or 1 to 5.
  • the association relationship between the logical number of the third-party network identifier and the access control parameter configuration includes but is not limited to one of the following:
  • the logical number of a third-party network identifier is associated with a set of access control parameter configurations
  • a set of logical numbers of third-party network identifiers is associated with a set of access control parameter configurations
  • All logical numbers of third-party network identities are associated with a set of access control parameter configurations.
  • the association relationship between the logical number of the third-party network identifier and the system resource configuration includes one of the following:
  • a logical number of a set of third-party network identifiers is associated with a set of system resource configurations
  • the logical numbers of all third-party network identities are associated with a set of system resource configurations.
  • an optional association between the logical number of the third-party network identifier and the access control parameter configuration or the system resource configuration may be as shown in Table 8. That is, a logical number identified by a third-party network is associated with a set of access control parameter configurations or a set of system resource configurations.
  • an optional association relationship between the logical number of the third-party network identifier and the access control parameter configuration or the system resource configuration may be as shown in Table 9. That is, a set of logical numbers of third-party network identifiers is associated with a set of access control parameter configurations or a set of system resource configurations.
  • an optional association relationship between the logical number of the third-party network identifier and the access control parameter configuration or the system resource configuration may be as shown in Table 10.
  • the third-party network identification logic number 1 and the third-party network identification logic number 2 are independently associated with a set of access control parameter configurations or a set of system resource configurations; and the third-party network identification logic number 3 and the third-party network identification logic number 4 are combined.
  • a set of access control parameter configurations or a set of system resource configurations is associated, and subsequently two third-party network identification logic codes are combined to associate a set of access control parameter configurations or a set of system resource configurations.
  • an optional association relationship between the logical number of the third-party network identifier and the access control parameter configuration or the system resource configuration may be as shown in Table 11. That is, the logical numbers of all third-party network identifiers are associated with a set of access control parameter configurations or a set of system resource configurations.
  • system resource configuration includes at least one of the following configurations:
  • BWP Band Width Part
  • the message including the network routing parameter generated by the terminal device according to the logical number information is terminal uplink dedicated signaling.
  • the RRC connection establishment complete message Another example is the RRC connection reconfiguration complete message.
  • the RRC connection re-establishment complete message Another example is the RRC connection recovery complete message.
  • the network routing parameter is represented by a value of a logical number identified by a third-party network.
  • the value of the third-party network identification logical number is less than or equal to 16, 4 bits are used to represent the network routing parameter.
  • the value of the third-party network identification logical number is greater than 16 but less than or equal to 32, 5 bits are used to represent the network routing parameter.
  • the value of the third-party network identification logical number is greater than 32 but less than or equal to 64, 6 bits are used to represent the network routing parameter.
  • the network routing parameters are represented by network routing parameters defined for the PLMN network identification configuration information and/or the NPN network identification configuration information in conjunction with network routing parameters specific to the third-party network identification.
  • the standard defines 4 bits to represent network routing parameters
  • the third-party network identification adopts a unified numbering method for logic Numbering. If all third-party network identification numbers are below 12, the 4 bits defined by the multiplexing standard for representing network routing parameters represent values from 1 to 12, that is, 4 bits represent values from 1 to 12.
  • a new bit can be defined to combine with the standard-defined 4 bits used to represent network routing parameters to form 5 bits Indicates the value of all third-party network identification numbers; if all third-party network identification numbers are above 33 and below 64 (greater than or equal to 33 and less than or equal to 64), 2 new bits can be defined and the standard defined for indicating The combination of 4 bits of the network routing parameter constitutes 6 bits to represent the values of all third-party network identification numbers.
  • the standard defines 4 bits to represent network routing parameters
  • the third-party network identification adopts an independent numbering method for logic Numbering. If all third-party network identification numbers are below 12, the 4 bits defined by the multiplexing standard to represent network routing parameters represent values from 1 to 12, that is, 4 bits represent values from 1 to 12, but need An extra bit indicates that the network routing parameter is associated with a third-party network ID; if all third-party network ID numbers are above 13 and below 32 (greater than or equal to 13 and less than or equal to 32), a new bit can be defined with The standard-defined 4 bits used to represent network routing parameters form 5 bits to indicate the value of all third-party network identification numbers; if all third-party network identification numbers are above 33 and below 64 (greater than or equal to 33 and less than or equal to 64), 2 new bits can be defined in combination with 4 bits defined by the standard for representing network routing parameters to form 6 bits representing all third-party
  • the terminal device can determine the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side, and select the access control parameter configuration associated with the logical number information according to the logical number information. and/or system resource configuration, and/or, generating a message containing network routing parameters based on the logical number information.
  • operations such as access control parameter configuration, system resource configuration, and network routing control can be performed on the third-party network to avoid access congestion caused by the introduction of the third-party network, resource configuration is not isolated, and network routing errors, and then optimize the third-party network. .
  • terminal-side embodiment of the present application is described in detail above with reference to FIG. 2
  • network-side embodiment of the present application is described in detail below with reference to FIG. 3 . It should be understood that the network-side embodiment and the terminal-side embodiment correspond to each other, and similar descriptions Refer to the terminal side embodiment.
  • FIG. 3 is a schematic flowchart of a method 300 for wireless communication according to an embodiment of the present application. As shown in FIG. 3 , the method 300 may include at least part of the following contents:
  • the network device sends target information to the terminal device, where the target information is used by the terminal device to determine the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side; wherein, the logical number information is used to select the associated access control parameter configuration and/or system resource configuration; and/or, the logical number information is used to generate a message containing network routing parameters.
  • the logical relationship between the third-party network identification configuration information, the public network PLMN ID list configuration information, and the non-public network NPN network identification list configuration information is defined, so that access control parameters can be implemented for the third-party network.
  • Operations such as configuration, system resource configuration, and network routing control can avoid access congestion, non-isolation of resource configuration, and network routing errors caused by the introduction of third-party networks, thereby optimizing third-party networks.
  • the third-party network identification configuration information includes at least one of the following information:
  • PLMN network identifier PLMN network identifier
  • SNPN network identifier temporary network identifier
  • access control-related network identifier PLMN network identifier
  • first functional group identifier PLMN network identifier
  • the first functional group identifier is a group identifier that allows the terminal to perform third-party authentication through the cell; or, the first functional group identifier is a group identifier that allows the terminal to obtain its own subscription data through the cell network.
  • the access control-related network identifier is similar to the PLMN ID or SNPN ID, that is, the actual meaning is the same, but the length of the access control-related network identifier can be different from the PLMN ID or SNPN ID.
  • the temporary network identifier is similar to the PLMN ID or SNPN ID, that is, the actual meaning is the same, except that the temporary network identifier is the temporary identifier of the PLMN or SNPN.
  • the first functional group identifier includes at least one of the following configuration granularities:
  • PLMN identity or SNPN identity granularity PLMN identity or SNPN identity granularity, CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
  • the third-party network identification configuration information may also be associated with first configuration information, where the first configuration information includes at least one of the following information:
  • the terminal is allowed to initiate a third-party network authentication request under the condition that the SNPN or PLMN network identity maintained by itself for third-party network authentication does not match any SNPN or PLMN network identity broadcast by the cell system information;
  • the terminal is allowed to obtain or update the indication information of its own subscription data through the cell network;
  • the first configuration information includes at least one of the following configuration granularities:
  • PLMN identity or SNPN identity granularity PLMN identity or SNPN identity granularity, CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
  • the target information is used to indicate that the network identifier in the third-party network identifier configuration information is numbered uniformly with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
  • the number of the network identity in the third-party network identity configuration information is after the number of the network identity in the PLMN network identity configuration information and/or the NPN network identity configuration information.
  • PLMN network identification configuration information may also be referred to as “public network PLMN network identification configuration information”
  • NPN network identification configuration information may also be referred to as “non-public network NPN network identification configuration information”.
  • the total number of network identifiers in the third-party network identifier configuration information and/or the PLMN network identifier configuration information and/or the NPN network identifier configuration information is a positive integer M;
  • M does not exceed 16, or M does not exceed 32, or M does not exceed 64.
  • the first information is pre-configured or agreed in a protocol, or the first information is configured by a network device.
  • the number of network identities contained in the PLMN network identity configuration information is 3, the number of network identities contained in the NPN network identity configuration information is 4, and the number of network identities contained in the third-party network identity configuration information is 5 . Then the numbering is performed according to the unified numbering method: PLMN network identifiers are numbered 1 to 3 in the logical order of configuration; NPN network identifiers are numbered 4 to 7 in order of configuration; .
  • the third-party network identification configuration information may be included in the NPN network identification configuration information, or may be configured in parallel with the NPN network identification configuration information, which is not limited in this embodiment of the present application.
  • the target information is used to indicate that the network identifier in the third-party network identifier configuration information is independently numbered with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
  • the logical number of the network identifier in the third-party network identifier configuration information starts from 0 or 1.
  • the number of network identifiers in the third-party network identifier configuration information is a positive integer N;
  • N does not exceed 12, or, N does not exceed 16, or, N does not exceed 32, or, N does not exceed 64.
  • the second information is pre-configured or agreed in a protocol, or the second information is configured by a network device.
  • the number of network identities contained in the PLMN network identity configuration information is 3, the number of network identities contained in the NPN network identity configuration information is 4, and the number of network identities contained in the third-party network identity configuration information is 5 .
  • the numbering is carried out according to the independent numbering method: PLMN network identifiers are numbered 1 to 3 in the logical order of configuration; NPN network identifiers are numbered 4 to 7 in order of configuration; Or 1 to 5.
  • the association relationship between the logical number of the third-party network identifier and the access control parameter configuration includes but is not limited to one of the following:
  • the logical number of a third-party network identifier is associated with a set of access control parameter configurations
  • a set of logical numbers of third-party network identifiers is associated with a set of access control parameter configurations
  • All logical numbers of third-party network identities are associated with a set of access control parameter configurations.
  • the association relationship between the logical number of the third-party network identifier and the system resource configuration includes one of the following:
  • a logical number of a set of third-party network identifiers is associated with a set of system resource configurations
  • the logical numbers of all third-party network identities are associated with a set of system resource configurations.
  • system resource configuration includes at least one of the following configurations:
  • the message including the network routing parameter generated by the terminal device according to the logical number information is terminal uplink dedicated signaling.
  • the RRC connection establishment complete message Another example is the RRC connection reconfiguration complete message.
  • the RRC connection re-establishment complete message Another example is the RRC connection recovery complete message.
  • the network routing parameter is represented by a value of a logical number identified by a third-party network.
  • the value of the third-party network identification logical number is less than or equal to 16, 4 bits are used to represent the network routing parameter.
  • the value of the third-party network identification logical number is greater than 16 but less than or equal to 32, 5 bits are used to represent the network routing parameter.
  • the value of the third-party network identification logical number is greater than 32 but less than or equal to 64, 6 bits are used to represent the network routing parameter.
  • the network routing parameters are represented by network routing parameters defined for the PLMN network identification configuration information and/or the NPN network identification configuration information in conjunction with network routing parameters specific to the third-party network identification.
  • the standard defines 4 bits to represent network routing parameters
  • the third-party network identification adopts a unified numbering method for logic Numbering. If all third-party network identification numbers are below 12, the 4 bits defined by the multiplexing standard for representing network routing parameters represent values from 1 to 12, that is, 4 bits represent values from 1 to 12.
  • a new bit can be defined to combine with the standard-defined 4 bits used to represent network routing parameters to form 5 bits Indicates the value of all third-party network identification numbers; if all third-party network identification numbers are above 33 and below 64 (greater than or equal to 33 and less than or equal to 64), 2 new bits can be defined with the standard defined for indicating The combination of 4 bits of the network routing parameter constitutes 6 bits to represent the values of all third-party network identification numbers.
  • the standard defines 4 bits to represent network routing parameters
  • the third-party network identification adopts an independent numbering method for logic Numbering. If all third-party network identification numbers are below 12, the 4 bits defined by the multiplexing standard to represent the network routing parameters represent the values from 1 to 12, that is: 4 bits represent the values from 1 to 12, but need to An extra bit indicates that the network routing parameter is associated with a third-party network ID; if all third-party network ID numbers are above 13 and below 32 (greater than or equal to 13 and less than or equal to 32), a new bit can be defined with The standard-defined 4 bits used to represent network routing parameters form 5 bits to indicate the value of all third-party network identification numbers; if all third-party network identification numbers are above 33 and below 64 (greater than or equal to 33 and less than or equal to 64), 2 new bits can be defined in combination with 4 bits defined by the standard for representing network routing parameters to form 6 bits representing
  • the terminal device can determine the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side based on the indication of the network device, and select the logical number information associated with the logical number information according to the logical number information. Access control parameter configuration and/or system resource configuration, and/or, generating a message containing network routing parameters according to the logical number information. In this way, operations such as access control parameter configuration, system resource configuration, and network routing control can be performed on the third-party network to avoid access congestion caused by the introduction of the third-party network, resource configuration is not isolated, and network routing errors, and then optimize the third-party network. .
  • FIG. 4 shows a schematic block diagram of a terminal device 400 according to an embodiment of the present application.
  • the terminal device 400 includes:
  • a processing unit 410 configured to determine logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side;
  • the processing unit 410 is further configured to select, according to the logical number information, an access control parameter configuration and/or a system resource configuration associated with the logical number information; and/or, the terminal device generates a network route including a network route according to the logical number information parameter message.
  • the third-party network identification configuration information includes at least one of the following information:
  • Public land mobile network PLMN network identification independent non-public network SNPN network identification, temporary network identification, access control related network identification, first functional group identification.
  • the first functional group identifier is a group identifier that allows the terminal to perform third-party authentication through a cell; or, the first functional group identifier is a group identifier that allows the terminal to obtain or update its own subscription data through a cell network.
  • the first functional group identifier includes at least one of the following configuration granularities:
  • PLMN identity or SNPN identity granularity PLMN identity or SNPN identity granularity, closed access group CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
  • the processing unit 410 is specifically used for:
  • the first information is used to indicate the network identifier in the third-party network identifier configuration information and the PLMN network identifier configuration information and PLMN network identifier configuration information and /or the network identifiers in the NPN network identifier configuration information are numbered uniformly.
  • the number of the network identity in the third-party network identity configuration information is after the number of the network identity in the PLMN network identity configuration information and/or the NPN network identity configuration information.
  • the total number of network identifiers in the third-party network identifier configuration information and/or the PLMN network identifier configuration information and/or the NPN network identifier configuration information is a positive integer M;
  • M does not exceed 16, or M does not exceed 32, or M does not exceed 64.
  • the first information is pre-configured or agreed in a protocol, or the first information is configured by a network device.
  • the processing unit 410 is specifically used for:
  • the second information is used to indicate the network identifier in the third-party network identifier configuration information and the PLMN network identifier configuration information and PLMN network identifier configuration information and /Or independently number the network identifiers in the NPN network identifier configuration information.
  • the logical number of the network identifier in the third-party network identifier configuration information starts from 0 or 1.
  • the number of network identifiers in the third-party network identifier configuration information is a positive integer N;
  • N does not exceed 12, or, N does not exceed 16, or, N does not exceed 32, or, N does not exceed 64.
  • the second information is pre-configured or agreed in a protocol, or the second information is configured by a network device.
  • the association relationship between the logical number of the third-party network identifier and the access control parameter configuration includes one of the following:
  • the logical number of a third-party network identifier is associated with a set of access control parameter configurations
  • a set of logical numbers of third-party network identifiers is associated with a set of access control parameter configurations
  • All logical numbers of third-party network identities are associated with a set of access control parameter configurations.
  • the association relationship between the logical number of the third-party network identifier and the system resource configuration includes one of the following:
  • a logical number of a set of third-party network identifiers is associated with a set of system resource configurations
  • the logical numbers of all third-party network identities are associated with a set of system resource configurations.
  • system resource configuration includes at least one of the following configurations:
  • the message including the network routing parameters is dedicated uplink signaling of the terminal.
  • the network routing parameter is represented by a value of a logical number identified by a third-party network; or,
  • the network routing parameters are expressed jointly by the network routing parameters defined for the PLMN network identification configuration information and/or the NPN network identification configuration information and the network routing parameters specific to the third-party network identification.
  • the aforementioned processing units may be one or more processors.
  • terminal device 400 may correspond to the terminal device in the method embodiment of the present application, and the above-mentioned and other operations and/or functions of the various units in the terminal device 400 are respectively for realizing the method shown in FIG. 2 .
  • the corresponding process of the terminal device in 200 is not repeated here for brevity.
  • FIG. 5 shows a schematic block diagram of a network device 500 according to an embodiment of the present application.
  • the network device 500 includes:
  • the communication unit 510 is configured to send target information to the terminal device, where the target information is used for the terminal device to determine the logical number information corresponding to the network identifier in the third-party network identifier configuration information configured on the network side;
  • the logical number information is used to select the associated access control parameter configuration and/or system resource configuration; and/or the logical number information is used to generate a message including network routing parameters.
  • the third-party network identification configuration information includes at least one of the following information:
  • Public land mobile network PLMN network identification independent non-public network SNPN network identification, temporary network identification, access control related network identification, first functional group identification.
  • the first functional group identifier is a group identifier that allows the terminal to perform third-party authentication through a cell; or, the first functional group identifier is a group identifier that allows the terminal to obtain or update its own subscription data through a cell network.
  • the first functional group identifier includes at least one of the following configuration granularities:
  • PLMN identity or SNPN identity granularity PLMN identity or SNPN identity granularity, closed access group CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
  • the target information is used to indicate that the network identifier in the third-party network identifier configuration information is numbered uniformly with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
  • the number of the network identity in the third-party network identity configuration information is after the number of the network identity in the PLMN network identity configuration information and/or the NPN network identity configuration information.
  • the total number of network identifiers in the third-party network identifier configuration information and/or the PLMN network identifier configuration information and/or the NPN network identifier configuration information is a positive integer M;
  • M does not exceed 16, or M does not exceed 32, or M does not exceed 64.
  • the target information is used to indicate that the network identifier in the third-party network identifier configuration information is independently numbered with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
  • the logical number of the network identifier in the third-party network identifier configuration information starts from 0 or 1.
  • the number of network identifiers in the third-party network identifier configuration information is a positive integer N;
  • N does not exceed 12, or, N does not exceed 16, or, N does not exceed 32, or, N does not exceed 64.
  • the association relationship between the logical number of the third-party network identifier and the access control parameter configuration includes one of the following:
  • the logical number of a third-party network identifier is associated with a set of access control parameter configurations
  • a set of logical numbers of third-party network identifiers is associated with a set of access control parameter configurations
  • All logical numbers of third-party network identities are associated with a set of access control parameter configurations.
  • the association relationship between the logical number of the third-party network identifier and the system resource configuration includes one of the following:
  • a logical number of a set of third-party network identifiers is associated with a set of system resource configurations
  • the logical numbers of all third-party network identities are associated with a set of system resource configurations.
  • system resource configuration includes at least one of the following configurations:
  • the message including the network routing parameters is dedicated uplink signaling of the terminal.
  • the network routing parameter is represented by a value of a logical number identified by a third-party network; or,
  • the network routing parameters are expressed jointly by the network routing parameters defined for the PLMN network identification configuration information and/or the NPN network identification configuration information and the network routing parameters specific to the third-party network identification.
  • the above-mentioned communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system-on-chip.
  • the network device 500 may correspond to the network device in the method embodiment of the present application, and the above-mentioned and other operations and/or functions of each unit in the network device 500 are for realizing the method shown in FIG. 3 respectively.
  • the corresponding process of the network device in 300 is not repeated here for brevity.
  • FIG. 6 is a schematic structural diagram of a communication device 600 provided by an embodiment of the present application.
  • the communication device 600 shown in FIG. 6 includes a processor 610, and the processor 610 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
  • the communication device 600 may further include a memory 620 .
  • the processor 610 may call and run a computer program from the memory 620 to implement the methods in the embodiments of the present application.
  • the memory 620 may be a separate device independent of the processor 610 , or may be integrated in the processor 610 .
  • the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, specifically, may send information or data to other devices, or receive other devices Information or data sent by a device.
  • the transceiver 630 may include a transmitter and a receiver.
  • the transceiver 630 may further include antennas, and the number of the antennas may be one or more.
  • the communication device 600 may specifically be the network device in this embodiment of the present application, and the communication device 600 may implement the corresponding processes implemented by the network device in each method in the embodiment of the present application. For the sake of brevity, details are not repeated here. .
  • the communication device 600 may specifically be a terminal device in this embodiment of the present application, and the communication device 600 may implement the corresponding processes implemented by the terminal device in each method in the embodiment of the present application. For the sake of brevity, details are not repeated here. .
  • FIG. 7 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
  • the apparatus 700 shown in FIG. 7 includes a processor 710, and the processor 710 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
  • the apparatus 700 may further include a memory 720 .
  • the processor 710 may call and run a computer program from the memory 720 to implement the methods in the embodiments of the present application.
  • the memory 720 may be a separate device independent of the processor 710 , or may be integrated in the processor 710 .
  • the apparatus 700 may further include an input interface 730 .
  • the processor 710 may control the input interface 730 to communicate with other devices or chips, and specifically, may acquire information or data sent by other devices or chips.
  • the apparatus 700 may further include an output interface 740 .
  • the processor 710 can control the output interface 740 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
  • the apparatus can be applied to the network equipment in the embodiments of the present application, and the apparatus can implement the corresponding processes implemented by the network equipment in the various methods of the embodiments of the present application, which are not repeated here for brevity.
  • the apparatus may be applied to the terminal equipment in the embodiments of the present application, and the apparatus may implement the corresponding processes implemented by the terminal equipment in each method of the embodiments of the present application, which will not be repeated here for brevity.
  • the device mentioned in the embodiment of the present application may also be a chip.
  • it can be a system-on-chip, a system-on-a-chip, a system-on-a-chip, or a system-on-a-chip.
  • FIG. 8 is a schematic block diagram of a communication system 800 provided by an embodiment of the present application. As shown in FIG. 8 , the communication system 800 includes a terminal device 810 and a network device 820 .
  • the terminal device 810 can be used to implement the corresponding functions implemented by the terminal device in the above method
  • the network device 820 can be used to implement the corresponding functions implemented by the network device in the above method. For brevity, details are not repeated here. .
  • the processor in this embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
  • each step of the above method embodiments may be completed by a hardware integrated logic circuit in a processor or an instruction in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other available Programming logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memory in this embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be Random Access Memory (RAM), which acts as an external cache.
  • RAM Static RAM
  • DRAM Dynamic RAM
  • SDRAM Synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • synchronous link dynamic random access memory Synchlink DRAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, the memory in the embodiments of the present application is intended to include but not limited to these and any other suitable types of memory.
  • Embodiments of the present application further provide a computer-readable storage medium for storing a computer program.
  • the computer-readable storage medium can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application.
  • the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application.
  • the computer-readable storage medium can be applied to the terminal device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the terminal device in each method of the embodiments of the present application.
  • the computer program enables the computer to execute the corresponding processes implemented by the terminal device in each method of the embodiments of the present application.
  • Embodiments of the present application also provide a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the network device in each method of the embodiments of the present application. Repeat.
  • the computer program product can be applied to the terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the terminal device in each method of the embodiments of the present application. Repeat.
  • the embodiments of the present application also provide a computer program.
  • the computer program can be applied to the network device in the embodiments of the present application.
  • the computer program When the computer program is run on the computer, it causes the computer to execute the corresponding processes implemented by the network device in each method of the embodiments of the present application. For the sake of brevity. , and will not be repeated here.
  • the computer program may be applied to the terminal device in the embodiments of the present application, and when the computer program runs on the computer, the computer executes the corresponding processes implemented by the terminal device in the various methods of the embodiments of the present application, for the sake of brevity. , and will not be repeated here.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种无线通信的方法、终端设备和网络设备,终端设备能够确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息,从而优化第三方网络。该无线通信的方法包括:终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;该终端设备根据该逻辑编号信息,选择与该逻辑编号信息关联的接入控制参数配置和/或系统资源配置;和/或,该终端设备根据该逻辑编号信息生成包含网络路由参数的消息。

Description

无线通信的方法、终端设备和网络设备 技术领域
本申请实施例涉及通信领域,并且更具体地,涉及一种无线通信的方法、终端设备和网络设备。
背景技术
新空口(New Radio,NR)版本16(release16,R16)引入了非公共网络(Non-public Network,NPN),在一些场景下,运营商授权允许第三方实体建立自己的NPN网络,第三方实体部署的NPN网络可能拥有自己的网络标识配置方式,此种情况下,如何确定第三方网络标识配置信息中的网络标识对应的逻辑编号,是一个亟待解决的问题。
发明内容
本申请实施例提供了一种无线通信的方法、终端设备和网络设备,终端设备能够确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息,从而优化第三方网络。
第一方面,提供了一种无线通信的方法,该方法包括:
终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
该终端设备根据该逻辑编号信息,选择与该逻辑编号信息关联的接入控制参数配置和/或系统资源配置;和/或,该终端设备根据该逻辑编号信息生成包含网络路由参数的消息。
第二方面,提供了一种无线通信的方法,该方法包括:
网络设备向终端设备发送目标信息,该目标信息用于该终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
其中,该逻辑编号信息用于选择与其关联的接入控制参数配置和/或系统资源配置;和/或,该逻辑编号信息用于生成包含网络路由参数的消息。
第三方面,提供了一种终端设备,用于执行上述第一方面中的方法。
具体地,该终端设备包括用于执行上述第一方面中的方法的功能模块。
第四方面,提供了一种网络设备,用于执行上述第二方面中的方法。
具体地,该网络设备包括用于执行上述第二方面中的方法的功能模块。
第五方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第一方面中的方法。
第六方面,提供了一种网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第二方面中的方法。
第七方面,提供了一种装置,用于实现上述第一方面至第二方面中的任一方面中的方法。
具体地,该装置包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该装置的设备执行如上述第一方面至第二方面中的任一方面中的方法。
第八方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第一方面至第二方面中的任一方面中的方法。
第九方面,提供了一种计算机程序产品,包括计算机程序指令,所述计算机程序指令使得计算机执行上述第一方面至第二方面中的任一方面中的方法。
第十方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第二方面中的任一方面中的方法。
通过上述技术方案,终端设备能够确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息,以及根据逻辑编号信息选择与逻辑编号信息关联的接入控制参数配置和/或系统资源配置,和/或,根据逻辑编号信息生成包含网络路由参数的消息。从而可以对第三方网络进行接入控制参数配置、系统资源配置以及网络路由控制等操作,避免由于第三方网络的引入造成的接入拥塞、资源配置不隔离以及网络路由错误,进而优化第三方网络。
附图说明
图1是本申请实施例应用的一种通信系统架构的示意性图。
图2是根据本申请实施例提供的一种无线通信的方法的示意性流程图。
图3是根据本申请实施例提供的另一种无线通信的方法的示意性流程图。
图4是根据本申请实施例提供的一种终端设备的示意性框图。
图5是根据本申请实施例提供的一种网络设备的示意性框图。
图6是根据本申请实施例提供的一种通信设备的示意性框图。
图7是根据本申请实施例提供的一种装置的示意性框图。
图8是根据本申请实施例提供的一种通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。针对本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新空口(New Radio,NR)系统、NR系统的演进系统、非授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、非地面通信网络(Non-Terrestrial Networks,NTN)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、第五代通信(5th-Generation,5G)系统或其他通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),车辆间(Vehicle to Vehicle,V2V)通信,或车联网(Vehicle to everything,V2X)通信等,本申请实施例也可以应用于这些通信系统。
可选地,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。
可选地,本申请实施例中的通信系统可以应用于非授权频谱,其中,非授权频谱也可以认为是共享频谱;或者,本申请实施例中的通信系统也可以应用于授权频谱,其中,授权频谱也可以认为是非共享频谱。
本申请实施例结合网络设备和终端设备描述了各个实施例,其中,终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。
终端设备可以是WLAN中的站点(STATION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字助理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、下一代通信系统例如NR网络中的终端设备,或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端设备等。
在本申请实施例中,终端设备可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。
在本申请实施例中,终端设备可以是手机(Mobile Phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self driving)中的无线终端设备、远程医疗(remote medical)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备或智慧家庭(smart home)中的无线终端设备等。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
在本申请实施例中,网络设备可以是用于与移动设备通信的设备,网络设备可以是WLAN中的接入点(Access Point,AP),GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA中的基站(NodeB,NB),还可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB), 或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的网络设备或者基站(gNB)或者未来演进的PLMN网络中的网络设备或者NTN网络中的网络设备等。
作为示例而非限定,在本申请实施例中,网络设备可以具有移动特性,例如网络设备可以为移动的设备。可选地,网络设备可以为卫星、气球站。例如,卫星可以为低地球轨道(low earth orbit,LEO)卫星、中地球轨道(medium earth orbit,MEO)卫星、地球同步轨道(geostationary earth orbit,GEO)卫星、高椭圆轨道(High Elliptical Orbit,HEO)卫星等。可选地,网络设备还可以为设置在陆地、水域等位置的基站。
在本申请实施例中,网络设备可以为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端设备120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。
图1示例性地示出了一个网络设备和两个终端设备,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端设备120,网络设备110和终端设备120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
本申请的实施方式部分使用的术语仅用于对本申请的具体实施例进行解释,而非旨在限定本申请。本申请的说明书和权利要求书及所述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。
应理解,在本申请的实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。
在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。
本申请实施例中,“预定义”可以通过在设备(例如,包括终端设备和网络设备)中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其具体的实现方式不做限定。比如预定义可以是指协议中定义的。
本申请实施例中,所述“协议”可以指通信领域的标准协议,例如可以包括LTE协议、NR协议以及应用于未来的通信系统中的相关协议,本申请对此不做限定。
在5G网络环境中,为了降低空口信令和快速恢复无线连接,快速恢复数据业务的目的,定了一个新的无线资源控制(Radio Resource Control,RRC)状态,即RRC_INACTIVE(去激活)状态。这种状态有别于RRC_IDLE(空闲)和RRC_CONNECTED(连接)状态。RRC_IDLE:移动性为基于UE的小区选择重选,寻呼由核心网(Core Network,CN)发起,寻呼区域由CN配置。基站侧不存在UE接入层(Access Stratum,AS)上下文,也不存在RRC连接。RRC_CONNECTED:存在RRC连接,基站和UE存在UE AS上下文;网络设备知道UE的位置是具体小区级别的。移动性是网络设备控制的移动性。UE和基站之间可以传输单播数据。RRC_INACTIVE:移动性为基于UE的小区选择重选,存在CN-NR之间的连接,UE AS上下文存在某个基站上,寻呼由无线接入网(Radio Access Network,RAN)触发,基于RAN的寻呼区域由RAN管理,网络设备知道UE的位置是基于RAN的寻呼区域级别的。
为便于更好的理解本申请实施例,对本申请相关的NPN网络进行说明。
NR版本16(release16,R16)引入了NPN,为了增加NPN部署的灵活性,NPN又可以分为独立非公共网络(Stand-alone Non-public Networks,SNPN)及闭合接入组(Closed Access Group,CAG)网络,通过PLMN ID和NID确定一个SNPN,通过PLMN ID和CAG标识(CAG ID)确定一个CAG网络。以SNPN为例,可以使用PLMN ID和NID作为一个SNPN的标识,签约了某一SNPN业务的用户会配置相应的用户永久标识符(Subscriber Permanent Identifier,SUPI)和签约信息,存储在终端设备和核心网络侧。一个签约了SNPN业务的用户需要支持SNPN接入模式(SNPN access mode),配置为SNPN接入模式的用户只能通过SNPN接入网络,未配置为SNPN接入模式的用户可以执行PLMN选择流程。其中SNPN接入模式的配置方式(激活、去激活等)由终端设备来实现。在初始接入和小区重选过程中,接入网设备需要广播自身支持的NID和相应的PLMN ID信息,配置了SNPN接入模式的用户可以根据自己的签约信息选择可接入的SNPN小区,核心网络设备也可以根据用户的签约信息对用户的身份进行认证。
一个PLMN可以同时支持普通公共网络、SNPN及CAG网络中的任意网络共享组合模式。例如,一个PLMN可以单独支持普通公共网络、SNPN或CAG网络,也可以支持普通公共网络与SNPN的网络共享组合模式,甚至支持普通公共网络、SNPN及CAG网络的网络共享组合模式。换言之,可以是普通公共网络、SNPN或CAG网络被一个PLMN支持,也可以是普通公共网络与SNPN同时共享一个PLMN网络,甚至普通公共网络、SNPN及CAG网络同时共享一个PLMN网络。下面结合表1可以更加清晰反映普通公共网络、SNPN及CAG网络之间的逻辑部署关系。
表1
Figure PCTCN2021071564-appb-000001
如表1所示,从网络配置角度来看,一个小区可以同时配置公共网络PLMN ID列表信息和非公共网NPN网络标识列表信息,非公共网NPN网络标识列表信息是NR R16引入的可选参数,对于CAG类型的NPN网络,允许一个PLMN ID关联一个CAG ID列表;对于SNPN类型的NPN网络,允许一个PLMN ID关联一个NID列表。
表1中的参数N/M/W为大于等于1的正整数。
需要说明的是,“合适小区”可以是指终端设备可以正常驻留的小区。
为便于更好的理解本申请实施例,对本申请相关的频点优先级进行说明。
网络侧在配置一个频点时可以同时配置该频点优先级信息,频点优先级取值0~7,0代表优先级最低,7表示优先级最高,为了频点优先级配置的多样性,标准规定0~7每一个值又可以关联一个小数位取值,小数位取值范围为{0.2,0.4,0.6,0.8},整数位和小数位配合总共有40种频点优先级组合。
频点优先级可以通过系统信息或者专用信令配置,专用信令配置的频点优先级会关联一个有效时长,在有效时长内,专用频点优先级总是覆盖系统信息广播的公共频点优先级;当有效时长超时后,终端只能使用公共频点优先级。
需要说明的是,网络侧在配置一个频点时同时配置的该频点的频点优先级为该频点的绝对频点优先级。
为便于更好的理解本申请实施例,对本申请相关的NPN网络中终端的小区选择重选规则进行说明。
小区选择:终端选择的小区满足合适小区准则,则终端可以选择在该小区驻留,完成小区选择。
小区重选:重选的目标小区满足合适小区准则且满足基于绝对频点优先级定义的重选准则条件,则终端重选到对应满足前述条件的小区,完成小区重选。
上述基于绝对频点优先级定义的重选准则包括如下三种:
高优先级频点重选准则;
同等优先级频点重选准则或者同频重选准则,也称作R准则;
低优先级频点重选准则。
为便于更好的理解本申请实施例,对本申请相关的自动邻区关系(Auto Neighbor Relationship,ANR)进行说明。
新部署的小区会对邻区关系产生影响,周围的邻区并不能总是从操作管理维护(Operation Administration and Maintenance,OAM)获取最新的邻区关系信息,NR允许在网络侧配置下,终端上报自身获取的邻区相关信息,比如小区全球识别码(Cell Global Identity,CGI)/系统帧号与帧时间差异(System Frame Number and Frame Timing Difference,SFTD)。
为便于更好的理解本申请实施例,对本申请相关的网络侧紧急通信业务指示进行说明。
目前网络侧紧急通信业务指示信息是小区(cell)粒度配置的,也就是说该小区的支持的所有PLMN共用一个紧急通信业务指示信息,这些PLMN要么都支持紧急通信,要么都不支持;而SNPN网络在NR R16规定不支持紧急通信业务。
为便于更好的理解本申请实施例,对本申请相关的接入与移动性管理功能(Access and Mobility Management Function,AMF)路由机制进行说明。
NR版本15(release15,R15)规定一个下一代无线接入网(Next Generation Radio Access Network,NG-RAN)可能连接一个或者多个AMF实体,不同的AMF实体可能提供不同的服务或者由不同的运营商维护,为了将终端的非接入层(Non-Access Stratum,NAS)数据路由到合适的AMF实体,终端设备在四步随机接入过程的第五条信息中或者两步随机接入过程的第三条消息需要提供如下信息之一来辅助无线接入网(Radio Access Network,RAN)侧选择合适的AMF实体:
终端设备NAS选择的PLMN/SNPN网络标识编号;
终端设备请求的切片列表信息;
终端设备已经注册的AMF标识信息。
为便于更好的理解本申请实施例,对本申请相关的小区网络标识编码的方法进行说明。
现有的小区网络标识包括公共网PLMN网络标识(使用PLMN ID标识)和/或非公共网NPN标识,其中非公共网NPN又包括SNPN网络(使用PLMN ID+NID ID标识)或者CAG网络(使用PLMN ID+CAG ID标识),终端通过读取小区系统广播信息系统信息块(System Information Block,SIB)1来获取该小区支持的网络标识原始数据信息,上述网络标识不仅用于表征当前小区支持的网络类型,同时还被用于其它网络配置或者终端过程中,比如:小区接入控制参数的配置以及终端发送的四步随机接入过程的第五条信息中网络标识参数的添加过程等,由于一个原始的PLMN ID或者SNPN ID标识占用的比特数较多(其中一个PLMN ID占用20比特或者24比特,一个SNPN ID占用64比特或者68比特),协议规定,在小区或者终端相关过程需要使用PLMN ID或者SNPN ID时使用索引的方式来代表小区系统信息广播的原始PLMN ID或者SNPN ID标识,从而节省系统开销。因为协议规定,在进行配置时,公共网PLMN与非公共网NPN网络个数合起来不能超过12,所以通常使用4个比特位就能代表该小区广播的任意公共网PLMN或者非公共网NPN网络标识,相比使用小区系统信息广播的原始PLMN ID或者SNPN ID标识节省了大量开销。
网络标识索引的具体规则如下:
所有的公共网PLMN网络标识组成一个公共网PLMN标识集合,所有的非公共网NPN网络标识组成一个非公共网NPN标识集合。
所有的公共网PLMN标识集合中的每一个PLMN ID都单独进行网络个数计数,而对于非公共网NPN标识集合,该集合中每一个SNPN ID都单独进行网络个数计数(即使多个NID关联同一个PLMN ID也需要分开计数),但是对于CAG类型的NPN网络,如果多个CAG ID关联同一个PLMN ID,在进行网络计数时只能算一个;协议进一步规定,同一小区的公共网PLMN标识集合与非公共网NPN标识集合中的网络标识统一编号,且非公共网NPN标识集合中的网络标识编号总是在公共网PLMN标识集合中的网络标识编号完成后接续进行,例如公共网PLMN标识集合中包括5个PLMN ID网络标识,按照配置上的逻辑先后顺序分别编号1~5,则非公共网NPN标识集合中的网络标识只能从6开始编号。对于仅NPN(NPN-only)小区,协议规定非公共网NPN标识集合中的网络标识从1开始编号。不论网络怎样配置,公共网PLMN与非公共网NPN网络个数合起来不能超过12,也就是说编号最大到12。
SNPN和CAG等NPN网络的部署越来越灵活,在运营商授权下,第三方实体甚至可以部署自己的NPN网络,这些第三方实体部署的NPN网络可能拥有自己的网络标识配置方式,但是目前这些新引入的网络标识配置与现有的公共网PLMN ID列表配置信息以及非公共网NPN网络标识列表配置信 息之间的逻辑关系未定义,那么这些新引入的网络标识编号规则也就无法定义,从而影响了其他需要通过索引方式关联这些新引入的网络标识的参数也无法进行定义,比如接入控制、AMF路由功能等,造成的后果是终端通过这些新引入的网络标识接入网络时不受系统接入控制规则约束造成资源拥塞或者终端消息被网络侧错误路由到一个不合适的AMF造成通信时延增加。
基于上述问题,本申请提出了一种网络标识编号的方案,终端设备能够确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息,从而优化第三方网络。
以下通过具体实施例详述本申请的技术方案。
图2是根据本申请实施例的无线通信的方法200的示意性流程图,如图2所示,该方法200可以包括如下内容中的至少部分内容:
S210,终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
S220,该终端设备根据该逻辑编号信息,选择与该逻辑编号信息关联的接入控制参数配置和/或系统资源配置;和/或,该终端设备根据该逻辑编号信息生成包含网络路由参数的消息。
在本申请实施例中,定义了第三方网络标识配置信息与公共网PLMN ID列表配置信息以及非公共网NPN网络标识列表配置信息之间的逻辑关系,从而可以对第三方网络进行接入控制参数配置、系统资源配置以及网络路由控制等操作,避免由于第三方网络的引入造成的接入拥塞、资源配置不隔离以及网络路由错误,进而优化第三方网络。
在一些实施例中,该第三方网络标识配置信息包括以下信息中的至少一项:
PLMN网络标识、SNPN网络标识、临时网络标识、接入控制相关网络标识、第一功能组标识。
其中,该第一功能组标识为允许终端通过小区进行第三方鉴权的组标识;或者,该第一功能组标识为允许终端通过小区网络获取自身签约数据的组标识。
需要说明的是,接入控制相关网络标识与PLMN ID或者SNPN ID类似,即实际意义相同,但是接入控制相关网络标识的长度可以与PLMN ID或者SNPN ID不同。类似的,临时网络标识与PLMN ID或者SNPN ID类似,即实际意义相同,只是临时网络标识是PLMN或者SNPN的临时标识。
在一些实施例中,该第一功能组标识包括以下配置粒度中的至少一种:
PLMN标识或SNPN标识粒度,CAG标识粒度,小区粒度,接入控制相关网络标识粒度,临时网络标识粒度。
例如,该第一功能组标识的一种可选地小区粒度配置格式可以如表2所示,由于公共网PLMN网络标识或非公共网NPN网络标识是小区粒度配置的,该第一功能组标识与公共网PLMN网络标识或非公共网NPN网络标识并列配置,所以该第一功能组标识也是小区粒度配置的。
表2
公共网PLMN网络标识
非公共网NPN网络标识
第一功能组标识
例如,该第一功能组标识的一种可选地PLMN标识或SNPN标识粒度或接入控制相关网络标识粒度或临时网络标识粒度配置格式可以如表3所示,由于该第一功能组标识是PLMN标识/SNPN标识/接入控制相关网络标识/临时网络标识的下一级配置,所以该第一功能组标识是PLMN标识/SNPN标识/接入控制相关网络标识/临时网络标识粒度配置的。
表3
Figure PCTCN2021071564-appb-000002
需要说明的是,上述表3中的接入控制相关网络标识和临时网络标识也可能与公共网PLMN网络标识/非公共网NPN网络标识并列,也可能如表3所示,接入控制相关网络标识和临时网络标识配置信息是非公共网NPN网络标识的下一级配置。
例如,该第一功能组标识的一种可选地CAG标识粒度配置格式可以如表4所示,由于该第一功能组标识是CAG标识的下一级配置,所以该第一功能组标识是CAG标识粒度的配置。
表4
Figure PCTCN2021071564-appb-000003
在一些实施例中,该第三方网络标识配置信息还可以关联一个第一配置信息,该第一配置信息包括如下信息中的至少一项:
是否允许终端通过小区网络进行鉴权的指示信息;
是否允许终端在自身维护的用于第三方网络鉴权使用的SNPN或PLMN网络标识与小区系统信息广播的任一SNPN或PLMN网络标识不匹配条件下发起第三方网络鉴权请求的指示信息;
是否允许终端通过小区网络获取或者更新自身签约数据的指示信息;
是否允许紧急通信的指示信息。
在一些实施例中,该第一配置信息包括以下配置粒度中的至少一种:
PLMN标识或SNPN标识粒度,CAG标识粒度,小区粒度,接入控制相关网络标识粒度,临时网络标识粒度。
例如,该第一配置信息和该第一功能组标识的一种可选地小区粒度配置格式可以如表5所示,由于公共网PLMN网络标识或非公共网NPN网络标识是小区粒度配置的,该第一配置信息和该第一功能组标识与公共网PLMN网络标识或非公共网NPN网络标识并列配置,所以该第一配置信息和该第一功能组标识也是小区粒度配置的。
表5
公共网PLMN网络标识
非公共网NPN网络标识
第一功能组标识
第一配置信息
例如,该第一配置信息的一种可选地PLMN标识或SNPN标识粒度或接入控制相关网络标识粒度或临时网络标识粒度配置格式可以如表6所示,由于该第一配置信息是PLMN标识/SNPN标识/接入控制相关网络标识/临时网络标识的下一级配置,所以该第一配置信息是PLMN标识/SNPN标识/接入控制相关网络标识/临时网络标识粒度配置的。
表6
Figure PCTCN2021071564-appb-000004
需要说明的是,上述表6中的接入控制相关网络标识和临时网络标识也可能与公共网PLMN网络标识/非公共网NPN网络标识并列,也可能如表6所示,接入控制相关网络标识和临时网络标识配置信息是非公共网NPN网络标识的下一级配置。
例如,该第一配置信息的一种可选地CAG标识粒度配置格式可以如表7所示,由于该第一配置信息是CAG标识的下一级配置,所以该第一配置信息是CAG标识粒度的配置。
表7
Figure PCTCN2021071564-appb-000005
在一些实施例中,上述S210具体可以是:
该终端设备根据第一信息确定该第三方网络标识配置信息中的网络标识对应的该逻辑编号信息;其中,该第一信息用于指示该第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行统一编号。
例如,该第三方网络标识配置信息中的网络标识的编号在该PLMN网络标识配置信息和/或该NPN网络标识配置信息中的网络标识的编号之后。
需要说明的是,“PLMN网络标识配置信息”也可以称之为“公共网PLMN网络标识配置信息”,“NPN网络标识配置信息”也可以称之为“非公共网NPN网络标识配置信息”。
在一些实施例中,该第三方网络标识配置信息中的网络标识和/或该PLMN网络标识配置信息和/或该NPN网络标识配置信息中的网络标识的总数为正整数M;
其中,M不超过16,或者,M不超过32,或者,M不超过64。
在一些实施例中,该第一信息为预配置或协议约定的,或者,该第一信息为网络设备配置的。
作为一个示例,假设PLMN网络标识配置信息中包含的网络标识的数量为3,NPN网络标识配置信息中包含的网络标识的数量为4,第三方网络标识配置信息中包含的网络标识的数量为5。则按照统一编号方式进行编号:PLMN网络标识按照配置的逻辑顺序依次标号1~3;NPN网络标识按照配置的逻辑顺序依次标号4~7;第三方网络标识按照配置的逻辑顺序依次标号8~12。
需要注意的是,第三方网络标识配置信息可能包含在NPN网络标识配置信息中,也可能在配置上与NPN网络标识配置信息并列,本申请实施例对此并不限定。
在一些实施例中,上述S210具体可以是:
该终端设备根据第二信息确定该第三方网络标识配置信息中的网络标识对应的该逻辑编号信息;其中,该第二信息用于指示该第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行独立编号。
例如,该第三方网络标识配置信息中的网络标识的逻辑编号从0或1开始。
在一些实施例中,该第三方网络标识配置信息中的网络标识的数量为正整数N;
其中,N不超过12,或者,N不超过16,或者,N不超过32,或者,N不超过64。
在一些实施例中,该第二信息为预配置或协议约定的,或者,该第二信息为网络设备配置的。
作为一个示例,假设PLMN网络标识配置信息中包含的网络标识的数量为3,NPN网络标识配置信息中包含的网络标识的数量为4,第三方网络标识配置信息中包含的网络标识的数量为5。则按照独立编号方式进行编号:PLMN网络标识按照配置的逻辑顺序依次标号1~3;NPN网络标识按照配置的逻辑顺序依次标号4~7;第三方网络标识按照配置的逻辑顺序依次标号0~4或者1~5。
在一些实施例中,第三方网络标识的逻辑编号与接入控制参数配置之间的关联关系包括但不限于以下之一:
一个第三方网络标识的逻辑编号与一组接入控制参数配置关联;
一组第三方网络标识的逻辑编号与一组接入控制参数配置关联;
全部的第三方网络标识的逻辑编号与一组接入控制参数配置关联。
在一些实施例中,第三方网络标识的逻辑编号与系统资源配置之间的关联关系包括以下之一:
一个第三方网络标识的逻辑编号与一组系统资源配置关联;
一组第三方网络标识的逻辑编号与一组系统资源配置关联;
全部的第三方网络标识的逻辑编号与一组系统资源配置关联。
例如,该第三方网络标识的逻辑编号和该接入控制参数配置或该系统资源配置的一种可选地关联 关系可以如表8所示。即,一个第三方网络标识的逻辑编号与一组接入控制参数配置或一组系统资源配置关联。
表8
Figure PCTCN2021071564-appb-000006
又例如,该第三方网络标识的逻辑编号和该接入控制参数配置或该系统资源配置的一种可选地关联关系可以如表9所示。即,一组第三方网络标识的逻辑编号与一组接入控制参数配置或一组系统资源配置关联。
表9
Figure PCTCN2021071564-appb-000007
又例如,该第三方网络标识的逻辑编号和该接入控制参数配置或该系统资源配置的一种可选地关联关系可以如表10所示。第三方网络标识逻辑编号1和第三方网络标识逻辑编号2分别独立关联一组接入控制参数配置或者一组系统资源配置;而第三方网络标识逻辑编号3和第三方网络标识逻辑编号4合起来关联一组接入控制参数配置或者一组系统资源配置,后续也是两个第三方网络标识逻辑编码合起来关联一组接入控制参数配置或者一组系统资源配置。
表10
Figure PCTCN2021071564-appb-000008
再例如,该第三方网络标识的逻辑编号和该接入控制参数配置或该系统资源配置的一种可选地关联关系可以如表11所示。即全部的第三方网络标识的逻辑编号与一组接入控制参数配置或一组系统资源配置关联。
表11
Figure PCTCN2021071564-appb-000009
在一些实施例中,该系统资源配置包括以下配置中的至少一项:
随机接入资源配置;
带宽部分(Band Width Part,BWP)资源配置;
支持的切片类型配置;
频带资源配置;
功率等级配置。
在一些实施例中,该终端设备根据该逻辑编号信息生成的包含网络路由参数的消息为终端上行专用信令。
例如,RRC连接建立完成消息。又例如,RRC连接重配完成消息。再例如,RRC连接重建完成消息。再例如,RRC连接恢复完成消息。
在一些实施例中,该网络路由参数通过第三方网络标识的逻辑编号取值表示。
例如,如果第三方网络标识逻辑编号数值小于等于16,则使用4个比特表示该网络路由参数。
又例如,如果第三方网络标识逻辑编号数值大于16但小于等于32,则使用5个比特表示该网络路由参数。
再例如,如果第三方网络标识逻辑编号数值大于32但小于等于64,则使用6个比特表示该网络路由参数。
在一些实施例中,该网络路由参数通过针对PLMN网络标识配置信息和/或NPN网络标识配置信息定义的网络路由参数与第三方网络标识特有的网络路由参数联合表示。
作为一个示例,假设PLMN网络标识配置信息和/或NPN网络标识配置信息编号取值范围为1~12,标准定义了4个比特来表示网络路由参数,且第三方网络标识采用统一编号方式进行逻辑编号。如果所有的第三方网络标识编号都在12以下,则复用标准定义的用于表示网络路由参数的4个比特表示1~12取值,即:4个比特表示1~12取值。如果所有的第三方网络标识编号都在13以上32以下(大于等于13且小于等于32),可以定义一个新的比特位与标准定义的用于表示网络路由参数的4个比特联合构成5个比特表示所有的第三方网络标识编号取值;如果所有的第三方网络标识编号都在33以上64以下(大于等于33且小于等于64),可以定义2个新的比特位与标准定义的用于表示网络路由参数的4个比特联合构成6个比特表示所有的第三方网络标识编号取值。
作为一个示例,假设PLMN网络标识配置信息和/或NPN网络标识配置信息编号取值范围为1~12,标准定义了4个比特来表示网络路由参数,且第三方网络标识采用独立编号方式进行逻辑编号。如果所有的第三方网络标识编号都在12以下,则复用标准定义的用于表示网络路由参数的4个比特表示1~12取值,即:4个比特表示1~12取值,但是需要1个额外的比特表示该网络路由参数关联的是第三方网络标识;如果所有的第三方网络标识编号都在13以上32以下(大于等于13且小于等于32),可以定义一个新的比特位与标准定义的用于表示网络路由参数的4个比特联合构成5个比特表示所有的第三方网络标识编号取值;如果所有的第三方网络标识编号都在33以上64以下(大于等于33且小于等于64),可以定义2个新的比特位与标准定义的用于表示网络路由参数的4个比特联合构成6个比特表示所有的第三方网络标识编号取值。
因此,在本申请实施例中,终端设备能够确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息,以及根据逻辑编号信息选择与逻辑编号信息关联的接入控制参数配置和/或系统资源配置,和/或,根据逻辑编号信息生成包含网络路由参数的消息。从而可以对第三方网络进行接入控制参数配置、系统资源配置以及网络路由控制等操作,避免由于第三方网络的引入造成的接入拥塞、资源配置不隔离以及网络路由错误,进而优化第三方网络。
上文结合图2,详细描述了本申请的终端侧实施例,下文结合图3,详细描述本申请的网络侧实施例,应理解,网络侧实施例与终端侧实施例相互对应,类似的描述可以参照终端侧实施例。
图3是根据本申请实施例的无线通信的方法300的示意性流程图,如图3所示,该方法300可以包括如下内容中的至少部分内容:
S310,网络设备向终端设备发送目标信息,该目标信息用于该终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;其中,该逻辑编号信息用于选择与其关联的接入控制参数配置和/或系统资源配置;和/或,该逻辑编号信息用于生成包含网络路由参数的消息。
在本申请实施例中,定义了第三方网络标识配置信息与公共网PLMN ID列表配置信息以及非公共网NPN网络标识列表配置信息之间的逻辑关系,从而可以对第三方网络进行接入控制参数配置、系统资源配置以及网络路由控制等操作,避免由于第三方网络的引入造成的接入拥塞、资源配置不隔离以及网络路由错误,进而优化第三方网络。
在一些实施例中,该第三方网络标识配置信息包括以下信息中的至少一项:
PLMN网络标识、SNPN网络标识、临时网络标识、接入控制相关网络标识、第一功能组标识。
其中,该第一功能组标识为允许终端通过小区进行第三方鉴权的组标识;或者,该第一功能组标识为允许终端通过小区网络获取自身签约数据的组标识。
需要说明的是,接入控制相关网络标识与PLMN ID或者SNPN ID类似,即实际意义相同,但是 接入控制相关网络标识的长度可以与PLMN ID或者SNPN ID不同。类似的,临时网络标识与PLMN ID或者SNPN ID类似,即实际意义相同,只是临时网络标识是PLMN或者SNPN的临时标识。
在一些实施例中,该第一功能组标识包括以下配置粒度中的至少一种:
PLMN标识或SNPN标识粒度,CAG标识粒度,小区粒度,接入控制相关网络标识粒度,临时网络标识粒度。
在一些实施例中,该第三方网络标识配置信息还可以关联一个第一配置信息,该第一配置信息包括如下信息中的至少一项:
是否允许终端通过小区网络进行鉴权的指示信息;
是否允许终端在自身维护的用于第三方网络鉴权使用的SNPN或PLMN网络标识与小区系统信息广播的任一SNPN或PLMN网络标识不匹配条件下发起第三方网络鉴权请求的指示信息;
是否允许终端通过小区网络获取或者更新自身签约数据的指示信息;
是否允许紧急通信的指示信息。
在一些实施例中,该第一配置信息包括以下配置粒度中的至少一种:
PLMN标识或SNPN标识粒度,CAG标识粒度,小区粒度,接入控制相关网络标识粒度,临时网络标识粒度。
在一些实施例中,该目标信息用于指示该第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行统一编号。
例如,该第三方网络标识配置信息中的网络标识的编号在该PLMN网络标识配置信息和/或该NPN网络标识配置信息中的网络标识的编号之后。
需要说明的是,“PLMN网络标识配置信息”也可以称之为“公共网PLMN网络标识配置信息”,“NPN网络标识配置信息”也可以称之为“非公共网NPN网络标识配置信息”。
在一些实施例中,该第三方网络标识配置信息中的网络标识和/或该PLMN网络标识配置信息和/或该NPN网络标识配置信息中的网络标识的总数为正整数M;
其中,M不超过16,或者,M不超过32,或者,M不超过64。
在一些实施例中,该第一信息为预配置或协议约定的,或者,该第一信息为网络设备配置的。
作为一个示例,假设PLMN网络标识配置信息中包含的网络标识的数量为3,NPN网络标识配置信息中包含的网络标识的数量为4,第三方网络标识配置信息中包含的网络标识的数量为5。则按照统一编号方式进行编号:PLMN网络标识按照配置的逻辑顺序依次标号1~3;NPN网络标识按照配置的逻辑顺序依次标号4~7;第三方网络标识按照配置的逻辑顺序依次标号8~12。
需要注意的是,第三方网络标识配置信息可能包含在NPN网络标识配置信息中,也可能在配置上与NPN网络标识配置信息并列,本申请实施例对此并不限定。
在一些实施例中,该目标信息用于指示该第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行独立编号。
例如,该第三方网络标识配置信息中的网络标识的逻辑编号从0或1开始。
在一些实施例中,该第三方网络标识配置信息中的网络标识的数量为正整数N;
其中,N不超过12,或者,N不超过16,或者,N不超过32,或者,N不超过64。
在一些实施例中,该第二信息为预配置或协议约定的,或者,该第二信息为网络设备配置的。
作为一个示例,假设PLMN网络标识配置信息中包含的网络标识的数量为3,NPN网络标识配置信息中包含的网络标识的数量为4,第三方网络标识配置信息中包含的网络标识的数量为5。则按照独立编号方式进行编号:PLMN网络标识按照配置的逻辑顺序依次标号1~3;NPN网络标识按照配置的逻辑顺序依次标号4~7;第三方网络标识按照配置的逻辑顺序依次标号0~4或者1~5。
在一些实施例中,第三方网络标识的逻辑编号与接入控制参数配置之间的关联关系包括但不限于以下之一:
一个第三方网络标识的逻辑编号与一组接入控制参数配置关联;
一组第三方网络标识的逻辑编号与一组接入控制参数配置关联;
全部的第三方网络标识的逻辑编号与一组接入控制参数配置关联。
在一些实施例中,第三方网络标识的逻辑编号与系统资源配置之间的关联关系包括以下之一:
一个第三方网络标识的逻辑编号与一组系统资源配置关联;
一组第三方网络标识的逻辑编号与一组系统资源配置关联;
全部的第三方网络标识的逻辑编号与一组系统资源配置关联。
在一些实施例中,该系统资源配置包括以下配置中的至少一项:
随机接入资源配置;
BWP资源配置;
支持的切片类型配置;
频带资源配置;
功率等级配置。
在一些实施例中,该终端设备根据该逻辑编号信息生成的包含网络路由参数的消息为终端上行专用信令。
例如,RRC连接建立完成消息。又例如,RRC连接重配完成消息。再例如,RRC连接重建完成消息。再例如,RRC连接恢复完成消息。
在一些实施例中,该网络路由参数通过第三方网络标识的逻辑编号取值表示。
例如,如果第三方网络标识逻辑编号数值小于等于16,则使用4个比特表示该网络路由参数。
又例如,如果第三方网络标识逻辑编号数值大于16但小于等于32,则使用5个比特表示该网络路由参数。
再例如,如果第三方网络标识逻辑编号数值大于32但小于等于64,则使用6个比特表示该网络路由参数。
在一些实施例中,该网络路由参数通过针对PLMN网络标识配置信息和/或NPN网络标识配置信息定义的网络路由参数与第三方网络标识特有的网络路由参数联合表示。
作为一个示例,假设PLMN网络标识配置信息和/或NPN网络标识配置信息编号取值范围为1~12,标准定义了4个比特来表示网络路由参数,且第三方网络标识采用统一编号方式进行逻辑编号。如果所有的第三方网络标识编号都在12以下,则复用标准定义的用于表示网络路由参数的4个比特表示1~12取值,即:4个比特表示1~12取值。如果所有的第三方网络标识编号都在13以上32以下(大于等于13且小于等于32),可以定义一个新的比特位与标准定义的用于表示网络路由参数的4个比特联合构成5个比特表示所有的第三方网络标识编号取值;如果所有的第三方网络标识编号都在33以上64以下(大于等于33且小于等于64),可以定义2个新的比特位与标准定义的用于表示网络路由参数的4个比特联合构成6个比特表示所有的第三方网络标识编号取值。
作为一个示例,假设PLMN网络标识配置信息和/或NPN网络标识配置信息编号取值范围为1~12,标准定义了4个比特来表示网络路由参数,且第三方网络标识采用独立编号方式进行逻辑编号。如果所有的第三方网络标识编号都在12以下,则复用标准定义的用于表示网络路由参数的4个比特表示1~12取值,即:4个比特表示1~12取值,但是需要1个额外的比特表示该网络路由参数关联的是第三方网络标识;如果所有的第三方网络标识编号都在13以上32以下(大于等于13且小于等于32),可以定义一个新的比特位与标准定义的用于表示网络路由参数的4个比特联合构成5个比特表示所有的第三方网络标识编号取值;如果所有的第三方网络标识编号都在33以上64以下(大于等于33且小于等于64),可以定义2个新的比特位与标准定义的用于表示网络路由参数的4个比特联合构成6个比特表示所有的第三方网络标识编号取值。
因此,在本申请实施例中,终端设备能够基于网络设备的指示确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息,以及根据逻辑编号信息选择与逻辑编号信息关联的接入控制参数配置和/或系统资源配置,和/或,根据逻辑编号信息生成包含网络路由参数的消息。从而可以对第三方网络进行接入控制参数配置、系统资源配置以及网络路由控制等操作,避免由于第三方网络的引入造成的接入拥塞、资源配置不隔离以及网络路由错误,进而优化第三方网络。
上文结合图2至图3,详细描述了本申请的方法实施例,下文结合图4至图8,详细描述本申请的装置实施例,应理解,装置实施例与方法实施例相互对应,类似的描述可以参照方法实施例。
图4示出了根据本申请实施例的终端设备400的示意性框图。如图4所示,该终端设备400包括:
处理单元410,用于确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
该处理单元410,还用于根据该逻辑编号信息,选择与该逻辑编号信息关联的接入控制参数配置和/或系统资源配置;和/或,该终端设备根据该逻辑编号信息生成包含网络路由参数的消息。
在一些实施例中,该第三方网络标识配置信息包括以下信息中的至少一项:
公共陆地移动网络PLMN网络标识、独立非公共网络SNPN网络标识、临时网络标识、接入控制相关网络标识、第一功能组标识。
在一些实施例中,该第一功能组标识为允许终端通过小区进行第三方鉴权的组标识;或者,该第一功能组标识为允许终端通过小区网络获取或者更新自身签约数据的组标识。
在一些实施例中,该第一功能组标识包括以下配置粒度中的至少一种:
PLMN标识或SNPN标识粒度,闭合接入组CAG标识粒度,小区粒度,接入控制相关网络标识 粒度,临时网络标识粒度。
在一些实施例中,该处理单元410具体用于:
根据第一信息确定该第三方网络标识配置信息中的网络标识对应的该逻辑编号信息;其中,该第一信息用于指示该第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行统一编号。
在一些实施例中,该第三方网络标识配置信息中的网络标识的编号在该PLMN网络标识配置信息和/或该NPN网络标识配置信息中的网络标识的编号之后。
在一些实施例中,该第三方网络标识配置信息中的网络标识和/或该PLMN网络标识配置信息和/或该NPN网络标识配置信息中的网络标识的总数为正整数M;
其中,M不超过16,或者,M不超过32,或者,M不超过64。
在一些实施例中,该第一信息为预配置或协议约定的,或者,该第一信息为网络设备配置的。
在一些实施例中,该处理单元410具体用于:
根据第二信息确定该第三方网络标识配置信息中的网络标识对应的该逻辑编号信息;其中,该第二信息用于指示该第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行独立编号。
在一些实施例中,该第三方网络标识配置信息中的网络标识的逻辑编号从0或1开始。
在一些实施例中,该第三方网络标识配置信息中的网络标识的数量为正整数N;
其中,N不超过12,或者,N不超过16,或者,N不超过32,或者,N不超过64。
在一些实施例中,该第二信息为预配置或协议约定的,或者,该第二信息为网络设备配置的。
在一些实施例中,第三方网络标识的逻辑编号与接入控制参数配置之间的关联关系包括以下之一:
一个第三方网络标识的逻辑编号与一组接入控制参数配置关联;
一组第三方网络标识的逻辑编号与一组接入控制参数配置关联;
全部的第三方网络标识的逻辑编号与一组接入控制参数配置关联。
在一些实施例中,第三方网络标识的逻辑编号与系统资源配置之间的关联关系包括以下之一:
一个第三方网络标识的逻辑编号与一组系统资源配置关联;
一组第三方网络标识的逻辑编号与一组系统资源配置关联;
全部的第三方网络标识的逻辑编号与一组系统资源配置关联。
在一些实施例中,该系统资源配置包括以下配置中的至少一项:
随机接入资源配置;
带宽部分BWP资源配置;
支持的切片类型配置;
频带资源配置;
功率等级配置。
在一些实施例中,该包含网络路由参数的消息为终端上行专用信令。
在一些实施例中,该网络路由参数通过第三方网络标识的逻辑编号取值表示;或者,
该网络路由参数通过针对PLMN网络标识配置信息和/或NPN网络标识配置信息定义的网络路由参数与第三方网络标识特有的网络路由参数联合表示。
在一些实施例中,上述处理单元可以是一个或多个处理器。
应理解,根据本申请实施例的终端设备400可对应于本申请方法实施例中的终端设备,并且终端设备400中的各个单元的上述和其它操作和/或功能分别为了实现图2所示方法200中终端设备的相应流程,为了简洁,在此不再赘述。
图5示出了根据本申请实施例的网络设备500的示意性框图。如图5所示,该网络设备500包括:
通信单元510,用于向终端设备发送目标信息,该目标信息用于该终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
其中,该逻辑编号信息用于选择与其关联的接入控制参数配置和/或系统资源配置;和/或,该逻辑编号信息用于生成包含网络路由参数的消息。
在一些实施例中,该第三方网络标识配置信息包括以下信息中的至少一项:
公共陆地移动网络PLMN网络标识、独立非公共网络SNPN网络标识、临时网络标识、接入控制相关网络标识、第一功能组标识。
在一些实施例中,该第一功能组标识为允许终端通过小区进行第三方鉴权的组标识;或者,该第一功能组标识为允许终端通过小区网络获取或者更新自身签约数据的组标识。
在一些实施例中,该第一功能组标识包括以下配置粒度中的至少一种:
PLMN标识或SNPN标识粒度,闭合接入组CAG标识粒度,小区粒度,接入控制相关网络标识粒度,临时网络标识粒度。
在一些实施例中,该目标信息用于指示该第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行统一编号。
在一些实施例中,该第三方网络标识配置信息中的网络标识的编号在该PLMN网络标识配置信息和/或该NPN网络标识配置信息中的网络标识的编号之后。
在一些实施例中,该第三方网络标识配置信息中的网络标识和/或该PLMN网络标识配置信息和/或该NPN网络标识配置信息中的网络标识的总数为正整数M;
其中,M不超过16,或者,M不超过32,或者,M不超过64。
在一些实施例中,该目标信息用于指示该第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行独立编号。
在一些实施例中,该第三方网络标识配置信息中的网络标识的逻辑编号从0或1开始。
在一些实施例中,该第三方网络标识配置信息中的网络标识的数量为正整数N;
其中,N不超过12,或者,N不超过16,或者,N不超过32,或者,N不超过64。
在一些实施例中,第三方网络标识的逻辑编号与接入控制参数配置之间的关联关系包括以下之一:
一个第三方网络标识的逻辑编号与一组接入控制参数配置关联;
一组第三方网络标识的逻辑编号与一组接入控制参数配置关联;
全部的第三方网络标识的逻辑编号与一组接入控制参数配置关联。
在一些实施例中,第三方网络标识的逻辑编号与系统资源配置之间的关联关系包括以下之一:
一个第三方网络标识的逻辑编号与一组系统资源配置关联;
一组第三方网络标识的逻辑编号与一组系统资源配置关联;
全部的第三方网络标识的逻辑编号与一组系统资源配置关联。
在一些实施例中,该系统资源配置包括以下配置中的至少一项:
随机接入资源配置;
带宽部分BWP资源配置;
支持的切片类型配置;
频带资源配置;
功率等级配置。
在一些实施例中,该包含网络路由参数的消息为终端上行专用信令。
在一些实施例中,该网络路由参数通过第三方网络标识的逻辑编号取值表示;或者,
该网络路由参数通过针对PLMN网络标识配置信息和/或NPN网络标识配置信息定义的网络路由参数与第三方网络标识特有的网络路由参数联合表示。
可选地,在一些实施例中,上述通信单元可以是通信接口或收发器,或者是通信芯片或者片上系统的输入输出接口。
应理解,根据本申请实施例的网络设备500可对应于本申请方法实施例中的网络设备,并且网络设备500中的各个单元的上述和其它操作和/或功能分别为了实现图3所示方法300中网络设备的相应流程,为了简洁,在此不再赘述。
图6是本申请实施例提供的一种通信设备600示意性结构图。图6所示的通信设备600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图6所示,通信设备600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。
可选地,如图6所示,通信设备600还可以包括收发器630,处理器610可以控制该收发器630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器630可以包括发射机和接收机。收发器630还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备600具体可为本申请实施例的网络设备,并且该通信设备600可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备600具体可为本申请实施例的终端设备,并且该通信设备600可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
图7是本申请实施例的装置的示意性结构图。图7所示的装置700包括处理器710,处理器710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图7所示,装置700还可以包括存储器720。其中,处理器710可以从存储器720中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器720可以是独立于处理器710的一个单独的器件,也可以集成在处理器710中。
可选地,该装置700还可以包括输入接口730。其中,处理器710可以控制该输入接口730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该装置700还可以包括输出接口740。其中,处理器710可以控制该输出接口740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该装置可应用于本申请实施例中的网络设备,并且该装置可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该装置可应用于本申请实施例中的终端设备,并且该装置可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,本申请实施例提到的装置也可以是芯片。例如可以是系统级芯片,系统芯片,芯片系统或片上系统芯片等。
图8是本申请实施例提供的一种通信系统800的示意性框图。如图8所示,该通信系统800包括终端设备810和网络设备820。
其中,该终端设备810可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备820可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。针对这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (44)

  1. 一种无线通信的方法,其特征在于,包括:
    终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
    所述终端设备根据所述逻辑编号信息,选择与所述逻辑编号信息关联的接入控制参数配置和/或系统资源配置;和/或,所述终端设备根据所述逻辑编号信息生成包含网络路由参数的消息。
  2. 如权利要求1所述的方法,其特征在于,所述第三方网络标识配置信息包括以下信息中的至少一项:
    公共陆地移动网络PLMN网络标识、独立非公共网络SNPN网络标识、临时网络标识、接入控制相关网络标识、第一功能组标识。
  3. 如权利要求2所述的方法,其特征在于,所述第一功能组标识为允许终端通过小区进行第三方鉴权的组标识;或者,所述第一功能组标识为允许终端通过小区网络获取或者更新自身签约数据的组标识。
  4. 如权利要求2或3所述的方法,其特征在于,所述第一功能组标识包括以下配置粒度中的至少一种:
    PLMN标识或SNPN标识粒度,闭合接入组CAG标识粒度,小区粒度,接入控制相关网络标识粒度,临时网络标识粒度。
  5. 如权利要求1至4中任一项所述的方法,其特征在于,所述终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息,包括:
    所述终端设备根据第一信息确定所述第三方网络标识配置信息中的网络标识对应的所述逻辑编号信息;其中,所述第一信息用于指示所述第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行统一编号。
  6. 如权利要求5所述的方法,其特征在于,所述第三方网络标识配置信息中的网络标识的编号在所述PLMN网络标识配置信息和/或所述NPN网络标识配置信息中的网络标识的编号之后。
  7. 如权利要求5或6所述的方法,其特征在于,所述第三方网络标识配置信息中的网络标识和/或所述PLMN网络标识配置信息和/或所述NPN网络标识配置信息中的网络标识的总数为正整数M;
    其中,M不超过16,或者,M不超过32,或者,M不超过64。
  8. 如权利要求5至7中任一项所述的方法,其特征在于,所述第一信息为预配置或协议约定的,或者,所述第一信息为网络设备配置的。
  9. 如权利要求1至4中任一项所述的方法,其特征在于,所述终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息,包括:
    所述终端设备根据第二信息确定所述第三方网络标识配置信息中的网络标识对应的所述逻辑编号信息;其中,所述第二信息用于指示所述第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行独立编号。
  10. 如权利要求9所述的方法,其特征在于,所述第三方网络标识配置信息中的网络标识的逻辑编号从0或1开始。
  11. 如权利要求9或10所述的方法,其特征在于,所述第三方网络标识配置信息中的网络标识的数量为正整数N;
    其中,N不超过12,或者,N不超过16,或者,N不超过32,或者,N不超过64。
  12. 如权利要求9至11中任一项所述的方法,其特征在于,所述第二信息为预配置或协议约定的,或者,所述第二信息为网络设备配置的。
  13. 如权利要求1至12中任一项所述的方法,其特征在于,第三方网络标识的逻辑编号与接入控制参数配置之间的关联关系包括以下之一:
    一个第三方网络标识的逻辑编号与一组接入控制参数配置关联;
    一组第三方网络标识的逻辑编号与一组接入控制参数配置关联;
    全部的第三方网络标识的逻辑编号与一组接入控制参数配置关联。
  14. 如权利要求1至13中任一项所述的方法,其特征在于,第三方网络标识的逻辑编号与系统资源配置之间的关联关系包括以下之一:
    一个第三方网络标识的逻辑编号与一组系统资源配置关联;
    一组第三方网络标识的逻辑编号与一组系统资源配置关联;
    全部的第三方网络标识的逻辑编号与一组系统资源配置关联。
  15. 如权利要求1至14中任一项所述的方法,其特征在于,所述系统资源配置包括以下配置中的至少一项:
    随机接入资源配置;
    带宽部分BWP资源配置;
    支持的切片类型配置;
    频带资源配置;
    功率等级配置。
  16. 如权利要求1至15中任一项所述的方法,其特征在于,所述包含网络路由参数的消息为终端上行专用信令。
  17. 如权利要求1至16中任一项所述的方法,其特征在于,
    所述网络路由参数通过第三方网络标识的逻辑编号取值表示;或者,
    所述网络路由参数通过针对PLMN网络标识配置信息和/或NPN网络标识配置信息定义的网络路由参数与第三方网络标识特有的网络路由参数联合表示。
  18. 一种无线通信的方法,其特征在于,包括:
    网络设备向终端设备发送目标信息,所述目标信息用于所述终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
    其中,所述逻辑编号信息用于选择与其关联的接入控制参数配置和/或系统资源配置;和/或,所述逻辑编号信息用于生成包含网络路由参数的消息。
  19. 如权利要求18所述的方法,其特征在于,所述第三方网络标识配置信息包括以下信息中的至少一项:
    公共陆地移动网络PLMN网络标识、独立非公共网络SNPN网络标识、临时网络标识、接入控制相关网络标识、第一功能组标识。
  20. 如权利要求19所述的方法,其特征在于,所述第一功能组标识为允许终端通过小区进行第三方鉴权的组标识;或者,所述第一功能组标识为允许终端通过小区网络获取或者更新自身签约数据的组标识。
  21. 如权利要求19或20所述的方法,其特征在于,所述第一功能组标识包括以下配置粒度中的至少一种:
    PLMN标识或SNPN标识粒度,闭合接入组CAG标识粒度,小区粒度,接入控制相关网络标识粒度,临时网络标识粒度。
  22. 如权利要求18至21中任一项所述的方法,其特征在于,所述目标信息用于指示所述第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行统一编号。
  23. 如权利要求22所述的方法,其特征在于,所述第三方网络标识配置信息中的网络标识的编号在所述PLMN网络标识配置信息和/或所述NPN网络标识配置信息中的网络标识的编号之后。
  24. 如权利要求22或23所述的方法,其特征在于,
    所述第三方网络标识配置信息中的网络标识和/或所述PLMN网络标识配置信息和/或所述NPN网络标识配置信息中的网络标识的总数为正整数M;
    其中,M不超过16,或者,M不超过32,或者,M不超过64。
  25. 如权利要求18至21中任一项所述的方法,其特征在于,所述目标信息用于指示所述第三方网络标识配置信息中的网络标识与PLMN网络标识配置信息和/或NPN网络标识配置信息中的网络标识进行独立编号。
  26. 如权利要求25所述的方法,其特征在于,所述第三方网络标识配置信息中的网络标识的逻辑编号从0或1开始。
  27. 如权利要求25或26所述的方法,其特征在于,所述第三方网络标识配置信息中的网络标识的数量为正整数N;
    其中,N不超过12,或者,N不超过16,或者,N不超过32,或者,N不超过64。
  28. 如权利要求18至27中任一项所述的方法,其特征在于,第三方网络标识的逻辑编号与接入控制参数配置之间的关联关系包括以下之一:
    一个第三方网络标识的逻辑编号与一组接入控制参数配置关联;
    一组第三方网络标识的逻辑编号与一组接入控制参数配置关联;
    全部的第三方网络标识的逻辑编号与一组接入控制参数配置关联。
  29. 如权利要求18至28中任一项所述的方法,其特征在于,第三方网络标识的逻辑编号与系统资源配置之间的关联关系包括以下之一:
    一个第三方网络标识的逻辑编号与一组系统资源配置关联;
    一组第三方网络标识的逻辑编号与一组系统资源配置关联;
    全部的第三方网络标识的逻辑编号与一组系统资源配置关联。
  30. 如权利要求18至29中任一项所述的方法,其特征在于,所述系统资源配置包括以下配置中的至少一项:
    随机接入资源配置;
    带宽部分BWP资源配置;
    支持的切片类型配置;
    频带资源配置;
    功率等级配置。
  31. 如权利要求18至30中任一项所述的方法,其特征在于,所述包含网络路由参数的消息为终端上行专用信令。
  32. 如权利要求18至31中任一项所述的方法,其特征在于,
    所述网络路由参数通过第三方网络标识的逻辑编号取值表示;或者,
    所述网络路由参数通过针对PLMN网络标识配置信息和/或NPN网络标识配置信息定义的网络路由参数与第三方网络标识特有的网络路由参数联合表示。
  33. 一种终端设备,其特征在于,包括:
    处理单元,用于确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
    所述处理单元,还用于根据所述逻辑编号信息,选择与所述逻辑编号信息关联的接入控制参数配置和/或系统资源配置;和/或,所述终端设备根据所述逻辑编号信息生成包含网络路由参数的消息。
  34. 一种网络设备,其特征在于,包括:
    通信单元,用于向终端设备发送目标信息,所述目标信息用于所述终端设备确定网络侧配置的第三方网络标识配置信息中的网络标识对应的逻辑编号信息;
    其中,所述逻辑编号信息用于选择与其关联的接入控制参数配置和/或系统资源配置;和/或,所述逻辑编号信息用于生成包含网络路由参数的消息。
  35. 一种终端设备,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至17中任一项所述的方法。
  36. 一种网络设备,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求18至32中任一项所述的方法。
  37. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至17中任一项所述的方法。
  38. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求18至32中任一项所述的方法。
  39. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至17中任一项所述的方法。
  40. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求18至32中任一项所述的方法。
  41. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至17中任一项所述的方法。
  42. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求18至32中任一项所述的方法。
  43. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求1至17中任一项所述的方法。
  44. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求18至32中任一项所述的方法。
PCT/CN2021/071564 2021-01-13 2021-01-13 无线通信的方法、终端设备和网络设备 WO2022151079A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2021/071564 WO2022151079A1 (zh) 2021-01-13 2021-01-13 无线通信的方法、终端设备和网络设备
CN202180070417.3A CN116368865A (zh) 2021-01-13 2021-01-13 无线通信的方法、终端设备和网络设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/071564 WO2022151079A1 (zh) 2021-01-13 2021-01-13 无线通信的方法、终端设备和网络设备

Publications (1)

Publication Number Publication Date
WO2022151079A1 true WO2022151079A1 (zh) 2022-07-21

Family

ID=82446707

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/071564 WO2022151079A1 (zh) 2021-01-13 2021-01-13 无线通信的方法、终端设备和网络设备

Country Status (2)

Country Link
CN (1) CN116368865A (zh)
WO (1) WO2022151079A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100215026A1 (en) * 2009-02-26 2010-08-26 Qualcomm Incorporated Methods and systems using unified operator and rat mapping and selection scheme
CN110086681A (zh) * 2014-11-27 2019-08-02 华为技术有限公司 虚拟网络策略的配置方法、系统及其虚拟网元和网管系统
CN110213808A (zh) * 2019-05-06 2019-09-06 腾讯科技(深圳)有限公司 网络接入控制方法、装置、计算机可读介质及电子设备
WO2020102292A1 (en) * 2018-11-14 2020-05-22 Apple Inc. Network selection and service continuity in non-public networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100215026A1 (en) * 2009-02-26 2010-08-26 Qualcomm Incorporated Methods and systems using unified operator and rat mapping and selection scheme
CN110086681A (zh) * 2014-11-27 2019-08-02 华为技术有限公司 虚拟网络策略的配置方法、系统及其虚拟网元和网管系统
WO2020102292A1 (en) * 2018-11-14 2020-05-22 Apple Inc. Network selection and service continuity in non-public networks
CN110213808A (zh) * 2019-05-06 2019-09-06 腾讯科技(深圳)有限公司 网络接入控制方法、装置、计算机可读介质及电子设备

Also Published As

Publication number Publication date
CN116368865A (zh) 2023-06-30

Similar Documents

Publication Publication Date Title
US11611929B2 (en) Network slice selection method, radio access device, and terminal
JP7290193B2 (ja) 無線端末及び無線端末における方法
WO2022027488A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022027811A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022021131A1 (zh) 重选初始带宽部分bwp的方法、终端设备和网络设备
CN113692033B (zh) 信息传输方法和设备
WO2022021165A1 (zh) 中继发现方法和终端
WO2022198569A1 (zh) 测量配置方法、终端设备、网络设备、芯片和存储介质
WO2022141309A1 (zh) 授权配置方法、终端设备和网络设备
WO2022151079A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022126641A1 (zh) 无线通信方法、终端设备、第一接入网设备以及网元
CN115516927B (zh) 无线通信方法、终端设备和网络设备
WO2022141210A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022151274A1 (zh) 寻呼方法和网络节点
WO2022178767A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022147681A1 (zh) 辅助路由方法、终端设备和网络设备
WO2022147796A1 (zh) 无线通信方法和终端设备
WO2022094804A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022160272A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022094935A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022000311A1 (zh) 无线通信的方法、终端设备和网络设备
CN117917175A (zh) 连接控制方法、终端设备和网络设备
CN117242824A (zh) 无线通信方法、终端设备和网络设备
CN117412387A (zh) 通信方法与通信装置
CN117062055A (zh) 安全保护方法及通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21918294

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21918294

Country of ref document: EP

Kind code of ref document: A1