WO2022193225A1 - 一种突发监测的方法和装置 - Google Patents
一种突发监测的方法和装置 Download PDFInfo
- Publication number
- WO2022193225A1 WO2022193225A1 PCT/CN2021/081513 CN2021081513W WO2022193225A1 WO 2022193225 A1 WO2022193225 A1 WO 2022193225A1 CN 2021081513 W CN2021081513 W CN 2021081513W WO 2022193225 A1 WO2022193225 A1 WO 2022193225A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- delay
- time
- network device
- uplink
- downlink
- Prior art date
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 387
- 238000000034 method Methods 0.000 title claims abstract description 321
- 230000005540 biological transmission Effects 0.000 claims abstract description 168
- 230000004044 response Effects 0.000 claims description 177
- 238000004891 communication Methods 0.000 claims description 40
- 238000012545 processing Methods 0.000 claims description 36
- 230000001934 delay Effects 0.000 claims description 33
- 230000000737 periodic effect Effects 0.000 claims description 26
- 238000013475 authorization Methods 0.000 claims description 23
- 238000011144 upstream manufacturing Methods 0.000 claims description 15
- 230000008569 process Effects 0.000 abstract description 66
- 230000006870 function Effects 0.000 description 50
- 238000007726 management method Methods 0.000 description 25
- 238000010586 diagram Methods 0.000 description 21
- 238000005259 measurement Methods 0.000 description 20
- 239000013256 coordination polymer Substances 0.000 description 12
- 230000011218 segmentation Effects 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- 230000003139 buffering effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 2
- 238000007430 reference method Methods 0.000 description 2
- 241001465754 Metazoa Species 0.000 description 1
- 208000003028 Stuttering Diseases 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000005641 tunneling Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
Definitions
- the present application relates to the field of communications, and more particularly, to a method and apparatus for burst monitoring.
- network equipment In data transmission, network equipment (eg, access network equipment or core network equipment) generally monitors performance parameters such as transmission delay, packet loss rate and other performance parameters with data packets as the granularity. Packet performance parameters to evaluate data transfer performance. Specifically, the network device monitors the performance parameters of a data packet between the terminal device and the access network device, and monitors the performance parameters of a data packet between the terminal device and the core network device.
- the transmission of the service flow is performed in a burst (burst) transmission unit, and a burst includes one or more data packets, and the performance parameters obtained by monitoring at the granularity of the data packets cannot be Accurately evaluate the transmission performance of data, resulting in poor user experience.
- a video frame is a burst, and the terminal can display the image of the frame only if all the data packets in a video frame are received correctly within the preset delay. Otherwise, frame loss will cause Video freezes and user experience is poor.
- Embodiments of the present application provide a method and apparatus for burst monitoring.
- a network device for example, an access network device monitors when a burst (uplink burst or downlink burst) occurs between a terminal device and an access network device.
- delay and network equipment (eg, core network equipment) monitors the time delay between the terminal equipment and the core network equipment in a burst (uplink burst or downlink burst). Therefore, a network device (eg, an access network device or a core network device) can more accurately evaluate the data transmission performance based on the burst-oriented delay, so as to improve user experience.
- network equipment eg, access network equipment
- a method for burst monitoring including:
- the access network device receives a delay monitoring request from the core network device, where the delay monitoring request is used to instruct to perform delay monitoring on periodic bursts;
- the access network device determines the uplink delay of the uplink burst between the terminal device and the access network device, wherein the uplink burst is between the terminal device and the access network device.
- the uplink delay between the access network devices includes a first uplink delay, and the first uplink delay includes a duration from a first time to a second time, and the first time is the first time in the uplink burst.
- an authorization time for a data packet arriving at the media access control MAC layer of the terminal device, and the second time is the last one in the uplink burst sent from the packet data convergence protocol PDCP layer of the access network device The time when the packet was sent.
- the uplink burst is periodic
- the delay monitoring request is used to instruct to perform delay monitoring on the uplink burst of each cycle in one or more cycles, so as to determine whether the periodic uplink burst is in the terminal equipment.
- the transmission delay with the access network equipment.
- the method for burst monitoring provides a method for monitoring the delay of an uplink burst. Based on the delay monitoring request for the uplink burst sent by the core network device, the access network device determines that the uplink burst is in Uplink delay of terminal equipment and access network equipment.
- the uplink delay includes a first uplink delay from a first time to a second time, where the first time is the authorization time for the first data packet in the uplink burst to reach the MAC layer of the terminal device, and the first time The second time is the sending time of the last data packet sent from the PDCP layer of the access network device in the uplink burst.
- the first uplink delay includes a second uplink delay and a third uplink delay, wherein the second uplink delay includes a duration from the first time to a third time, and the third The three uplink delays include the duration from the third time to the second time, where the third time is the last time in the uplink burst from the radio link control RLC layer of the access network device to the The sending time of the data packet sent by the PDCP layer of the access network device.
- the uplink delay between the terminal device and the access network device of the uplink burst further includes a fourth uplink delay, and the fourth uplink delay includes the time from the fourth time to the fifth time.
- the duration of the time, or, the fourth uplink delay includes the duration from the fourth time to the first time, where the fourth time is the first time in the uplink burst to reach the PDCP layer of the terminal device.
- the arrival time of the data packet, and the fifth time is the arrival time of the first data packet in the uplink burst that reaches the MAC layer of the terminal device.
- the uplink delay between the terminal device and the access network device for the uplink burst further includes the fourth uplink delay delivered by the uplink burst at each protocol layer of the terminal device, and then the The network access device can more accurately monitor the uplink delay of the uplink burst, so that the access network device can more accurately evaluate the data transmission performance based on the uplink delay for the uplink burst, so as to further improve the user experience.
- the access network device determines, in response to the delay monitoring request, an uplink delay of an uplink burst between the terminal device and the access network device, including:
- the access network device determines the second uplink delay and the third uplink delay in response to the delay monitoring request;
- the access network device determines, according to the second uplink delay, the third uplink delay, and the fourth uplink delay, that the uplink burst occurs between the terminal device and the access network device. Upstream delay between.
- the access network device can count the second uplink delay and the third uplink delay of the uplink burst at the terminal device and the access network device in sections, and determine the uplink burst At the fourth uplink delay generated by the terminal equipment due to submitting data, according to the second uplink delay, the third uplink delay and the fourth uplink delay, it is determined that the uplink burst occurs at the terminal equipment and the access network equipment. the uplink delay.
- the DU can determine the second uplink delay of the uplink burst between the terminal device and the DU, and the CU can determine the third uplink delay of the uplink burst between the DU and the CU.
- the second uplink delay, the third uplink delay and the determined fourth uplink delay determine the uplink delay of the uplink burst in the terminal device and the access network device, so as to monitor the uplink burst in the scenario where the DU and CU are separated.
- the uplink delay sent by the device can also obtain a more accurate uplink delay.
- the access network device determines, in response to the delay monitoring request, an uplink delay of an uplink burst between the terminal device and the access network device, including:
- the access network device determines the first time and the second time in response to the delay monitoring request
- the access network device determines, according to the fourth uplink delay, the first time and the second time, the uplink time of the uplink burst between the terminal device and the access network device extension.
- the access network device determines the first time (ie, the start time) of the uplink burst transmission on the air interface, and the second time (ie, the uplink burst) of the access network device. end time) and the fourth uplink delay generated by the uplink burst at the terminal device due to data submission, based on the first time, the second time and the fourth uplink delay, determine the uplink burst at the terminal device and the access network device the uplink delay.
- this method can obtain a more accurate uplink delay of the uplink burst, so that the access network equipment can more accurately evaluate the data transmission performance, so as to further improve the user experience.
- this embodiment can be applied not only to the scenario where the DU and the CU are separated, but also to the scenario where the DU and the CU are not separated, and the flexibility is higher.
- the access network device determines, in response to the delay monitoring request, an uplink delay of an uplink burst between the terminal device and the access network device, including:
- the access network device determines the second uplink delay and the third uplink delay in response to the delay monitoring request;
- the access network device determines, according to the second uplink delay and the third uplink delay, an uplink delay of the uplink burst between the terminal device and the access network device.
- the access network device can count the second uplink delay and the third uplink delay of the uplink burst at the terminal device and the access network device in sections, so that according to the second uplink delay and the third uplink delay
- the uplink delay and the third uplink delay determine the uplink delay of the uplink burst at the terminal equipment and the access network equipment.
- the DU can determine the second uplink delay of the uplink burst between the terminal device and the DU
- the CU can determine the third uplink delay of the uplink burst between the DU and the CU.
- the second uplink delay and the third uplink delay determine the uplink delay of the uplink burst at the terminal device and the access network device, so as to monitor the uplink delay of the uplink burst in the scenario of separation of the DU and the CU.
- the access network device determines, in response to the delay monitoring request, an uplink delay of an uplink burst between the terminal device and the access network device, including:
- the access network device determines the first time and the second time in response to the delay monitoring request
- the access network device determines, according to the first time and the second time, an uplink time delay of the uplink burst between the terminal device and the access network device.
- the access network device determines the first time (ie, the start time) of the uplink burst transmission on the air interface and the second time (ie, the uplink burst) of the access network device. end time), and the uplink time delay of the uplink burst at the terminal device and the access network device is determined based on the first time and the second time.
- this method can obtain a more accurate uplink delay of the uplink burst, so that the access network equipment can more accurately evaluate the data transmission performance, so as to further improve the user experience.
- this embodiment can be applied not only to the scenario where the DU and the CU are separated, but also to the scenario where the DU and the CU are not separated, and the flexibility is higher.
- the method further includes:
- the access network device sends response information to the core network device, where the response information includes the uplink time delay of the uplink burst between the terminal device and the access network device.
- the access network device can further determine the uplink burst by sending the uplink delay of the uplink burst between the terminal device and the access network device to the core network device. Uplink delay between terminal equipment and core network equipment.
- a second aspect a method for burst monitoring, comprising:
- the core network device sends a delay monitoring request to the access network device, where the delay monitoring request is used to instruct to perform delay monitoring on periodic bursts;
- the core network device receives response information from the access network device, where the response information is information in response to the delay monitoring request, and the response information includes uplink bursts between the terminal device and the access network.
- the uplink delay between devices wherein the uplink delay of the uplink burst between the terminal device and the access network device includes a first uplink delay, and the first uplink delay includes The duration from one time to a second time, where the first time is the authorization time of the first data packet in the uplink burst that reaches the media access control MAC layer of the terminal device, and the second time is the The sending time of the last data packet sent from the PDCP layer of the packet data convergence protocol of the access network device in the uplink burst;
- the core network device determines a fifth uplink delay, where the fifth uplink delay is the last data packet sent from the PDCP layer of the access network device in the uplink burst between the access network device and the device. the delay between the core network devices;
- the core network device determines that the uplink burst is between the terminal device and the access network device. The uplink delay between the core network devices.
- the burst monitoring method provided by the embodiment of the present application provides a method for monitoring the delay of an uplink burst.
- the core network device receives the uplink burst sent by the access network device between the terminal device and the access network device. Delay, based on the uplink delay and the fifth uplink delay of the uplink burst between the access network device and the core network device determined by the core network device itself, it is finally determined that the uplink burst is between the terminal device and the core network device. the uplink delay.
- the process of monitoring the uplink delay of the uplink burst between the terminal device and the core network device is realized, so that the core network device can more accurately evaluate the data transmission performance based on the uplink delay for the uplink burst, so as to improve the performance of the data transmission. Improve user experience.
- the uplink delay between the terminal device and the access network device of the uplink burst further includes a fourth uplink delay, and the fourth uplink delay includes the time from the fourth time to the fifth time.
- the duration of the time, or, the fourth uplink delay includes the duration from the fourth time to the first time, where the fourth time is the first time in the uplink burst to reach the PDCP layer of the terminal device.
- the arrival time of the data packet, and the fifth time is the arrival time of the first data packet in the uplink burst that reaches the MAC layer of the terminal device.
- a third aspect a method for burst monitoring, comprising:
- the core network device sends a delay monitoring request to the access network device, where the delay monitoring request is used to instruct to perform delay monitoring on periodic bursts;
- the core network device receives response information from the access network device, where the response information is information in response to the delay monitoring request, and the response information includes a first time, and the first time is the The authorization time of the first data packet in the uplink burst that reaches the media access control MAC layer of the terminal device;
- the core network device determines the arrival time of the last data packet in the uplink burst that reaches the core network device;
- the core network device determines, according to the first time and the arrival time, an uplink delay of the uplink burst between the terminal device and the core network device.
- the authorization time ie, the first time
- the authorization time ie, the first time
- An arrival time to the core network equipment determines the uplink delay of the uplink burst between the terminal equipment and the core network equipment.
- the response information further includes a fourth uplink delay, and the fourth uplink delay includes the duration from the fourth time to the fifth time, or the fourth uplink delay includes the time from the fourth time to the fifth time.
- the duration of the first time, the fourth time is the arrival time of the first data packet in the uplink burst that reaches the PDCP layer of the terminal device, and the fifth time is the time in the uplink burst. The arrival time of the first data packet to arrive at the MAC layer of the end device; and,
- the core network device determines, according to the first time and the arrival time, the uplink delay of the uplink burst between the terminal device and the core network device, including:
- the core network device determines the uplink delay of the uplink burst between the terminal device and the core network device according to the first time, the arrival time and the fourth uplink delay.
- a method for burst monitoring including:
- the access network device receives a delay monitoring request from the core network device, where the delay monitoring request is used to instruct to perform delay monitoring on periodic bursts;
- the access network device determines the downlink delay between the terminal device and the access network device in a downlink burst, and the downlink burst is between the terminal device and the access network device.
- the downlink delay between network access devices includes a first downlink delay, and the first downlink delay includes a duration from a first time to a second time, and the first time is the first time in the downlink burst.
- the arrival time of a data packet arriving at the PDCP layer of the packet data convergence protocol of the access network device, and the second time is the arrival time of the last feedback information arriving at the media access control MAC layer of the access network device , or, the second time is the sending time of the last feedback information sent from the physical layer of the terminal device, where the feedback information is used to indicate that the terminal device successfully receives a data packet in the downlink burst.
- the burst monitoring method provides a method for monitoring the delay of a downlink burst.
- the access network device determines that the downlink burst is in the downlink burst based on the delay monitoring request for the downlink burst sent by the core network device.
- Downlink delay of access network equipment and terminal equipment includes the first downlink delay from the first time to the second time, and the first time is the first time in the downlink burst that reaches the PDCP layer of the packet data convergence protocol of the access network device
- the arrival time of the data packet, the second time is the arrival time of the last feedback information arriving at the MAC layer of the access network device or the sending time of sending the last feedback information from the physical layer of the terminal device.
- the process of monitoring the downlink delay between the terminal device and the access network device for the downlink burst through the access network device is implemented, so that the access network device can more accurately determine the downlink delay based on the downlink burst for the downlink burst. Evaluate data transfer performance to improve user experience.
- the first downlink delay includes a second downlink delay and a third downlink delay
- the second downlink delay includes a duration from a third time to the second time
- the third The downlink delay includes the duration from the first time to the third time, where the third time is the first data in the downlink burst that reaches the radio link control RLC layer of the access network device The arrival time of the package.
- the access network device determines the downlink delay between the terminal device and the access network device in a downlink burst, including:
- the access network device determines the second downlink delay and the third downlink delay in response to the delay monitoring request;
- the access network device determines, according to the second downlink delay and the third downlink delay, the downlink delay of the downlink burst between the terminal device and the access network device.
- the access network device can count the second downlink delay and the third downlink delay of the downlink burst at the terminal device and the access network device in sections, so that according to the second downlink delay and the third downlink delay
- the downlink delay and the third downlink delay determine the downlink delay of the downlink burst at the terminal equipment and the access network equipment.
- the DU can determine the second downlink delay related to the DU between the terminal equipment and the DU
- the CU can determine the third downlink delay between the CU and the DU.
- the CU determines the downlink delay of the downlink burst between the terminal device and the access network device according to the second downlink delay and the third downlink delay, so as to monitor the downlink of the downlink burst in the scenario where the DU and CU are separated time delay.
- the access network device determines the downlink delay between the terminal device and the access network device in a downlink burst, including:
- the access network device determines the first time and the second time in response to the delay monitoring request
- the access network device determines, according to the first time and the second time, the downlink delay of the downlink burst between the terminal device and the access network device.
- the access network device determines the first time (ie, the start time) and the second time (ie, the end time) of the downlink burst transmission between the access network device and the terminal device. , and determine the downlink delay of the downlink burst at the terminal device and the access network device based on the first time and the second time.
- this method can obtain a more accurate downlink delay of the downlink burst, so that the access network device can more accurately evaluate the data transmission performance, so as to further improve the user experience.
- this embodiment can be applied not only to the scenario where the DU and the CU are separated, but also to the scenario where the DU and the CU are not separated, and the flexibility is higher.
- the downlink delay between the terminal device and the access network device of the downlink burst further includes a fourth downlink delay, and the fourth downlink delay includes the time from the fourth time to the fifth time.
- the duration of time, the fourth time is the arrival time of the last data packet in the downlink burst that reaches the MAC layer of the terminal device, and the fifth time is the last time in the downlink burst from the The sending time of the data packet sent by the PDCP layer of the terminal device.
- the downlink delay between the terminal device and the access network device for the downlink burst also includes the fourth downlink delay delivered by the downlink burst at each protocol layer of the terminal device, which may be
- the access network device can monitor the downlink delay of the downlink burst more accurately, so that the access network device can more accurately evaluate the data transmission performance based on the downlink delay for the downlink burst, so as to further improve the user experience.
- the access network device determines the downlink delay between the terminal device and the access network device in a downlink burst, including:
- the access network device determines the second downlink delay and the third downlink delay in response to the delay monitoring request;
- the access network device determines, according to the second downlink delay, the third downlink delay, and the fourth downlink delay, that the downlink burst occurs between the terminal device and the access network device. downlink delay.
- the access network device can count the second downlink delay and the third downlink delay of the downlink burst at the terminal device and the access network device in sections, and determine the downlink burst
- the fourth downlink delay is generated at each protocol layer of the terminal device due to data submission, so, according to the second downlink delay, the third downlink delay and the fourth downlink delay, it is determined that the downlink burst occurs at the terminal device and the receiver.
- Downlink delay of the network access device In this way, in the scenario where the DU and CU are separated, the DU can determine the second downlink delay between the terminal device and the DU, and the CU can determine the third downlink delay between the DU and the CU.
- the second downlink delay, the third downlink delay, and the determined fourth downlink delay determine the downlink delay of the downlink burst at the terminal equipment and the access network equipment, so as to monitor the downlink burst in the scenario where the DU and CU are separated.
- the downlink delay sent can also get a more accurate downlink delay.
- the access network device determines the downlink delay between the terminal device and the access network device in a downlink burst, including:
- the access network device determines the first time and the second time in response to the delay monitoring request
- the access network device determines, according to the first time, the second time and the fourth downlink delay, the downlink time of the downlink burst between the terminal device and the access network device extension.
- the access network device determines the first time (ie, the start time) and the second time (ie, the end time) of the downlink burst transmission between the access network device and the terminal device. , and determine and determine the fourth downlink delay generated by the downlink burst at each protocol layer of the terminal device due to data submission, based on the first time, the second time and the fourth downlink delay to determine the downlink burst between the terminal device and the terminal device. Downlink delay of access network equipment.
- this method can obtain a more accurate downlink delay of the downlink burst, so that the access network equipment can more accurately evaluate the data transmission performance, so as to further improve the user experience.
- this embodiment can be applied not only to the scenario where the DU and the CU are separated, but also to the scenario where the DU and the CU are not separated, and the flexibility is higher.
- the method further includes:
- the access network device sends response information to the core network device, where the response information includes a downlink delay of the downlink burst between the terminal device and the access network device.
- the access network device can make the core network device further determine the downlink burst by sending the downlink delay of the downlink burst between the terminal device and the access network device to the core network device. Downlink delay between terminal equipment and core network equipment.
- a method for burst monitoring including:
- the core network device sends a delay monitoring request to the access network device
- the core network device receives response information from the access network device, the response information is information in response to the delay monitoring request, and the response information includes downlink bursts between the terminal device and the access network.
- the downlink delay between devices, the downlink delay between the terminal device and the access network device of the downlink burst includes the first downlink delay, and the first downlink delay includes the first downlink delay from the first
- the duration from a time to a second time the first time is the arrival time of the first data packet in the downlink burst that reaches the PDCP layer of the packet data convergence protocol of the access network device, and the second time is the arrival time of the last feedback information arriving at the media access control MAC layer of the access network device, or, the second time is the sending time of the last feedback information sent from the physical layer of the terminal device, the The feedback information is used to indicate that the terminal device successfully receives a data packet in the downlink burst;
- the core network device determines a fifth downlink delay, and the fifth downlink delay is the first data packet sent from the core network device in the downlink burst between the access network device and the core network device. delay between network devices;
- the core network device determines that the downlink burst is between the terminal device and the access network device. Downlink delay between the core network devices.
- the burst monitoring method provides a method for monitoring the delay of a downlink burst.
- the core network device receives the downlink burst sent by the access network device between the terminal device and the access network device. Delay, based on the downlink delay and the fifth downlink delay of the downlink burst between the access network device and the core network device determined by the core network device itself, it is finally determined that the downlink burst is between the terminal device and the core network device. downlink delay. In this way, the process of monitoring the downlink delay between the terminal device and the core network device of the downlink burst is realized, so that the core network device can more accurately evaluate the data transmission performance based on the downlink delay for the downlink burst. to improve user experience.
- the downlink delay between the terminal device and the core network device of the downlink burst further includes a fourth downlink delay, and the fourth downlink delay includes from the fourth time to the fifth time
- the fourth time is the arrival time of the last data packet in the downlink burst that reaches the MAC layer of the terminal device
- the fifth time is the last time in the downlink burst that is sent from the The sending time of the data packet sent by the PDCP layer of the terminal device.
- a method for burst monitoring including:
- the core network device sends a delay monitoring request to the access network device
- the core network device receives response information from the access network device, where the response information is information in response to the delay monitoring request, the response information includes a second time, and the second time is the arrival time at the destination.
- the arrival time of the last feedback information of the media access control MAC layer of the access network device, or, the second time is the sending time of the last feedback information sent from the physical layer of the terminal device, and the feedback information is used instructing the terminal device to successfully receive a data packet in the downlink burst;
- the core network device determines the sending time of the first data packet sent from the core network device in the downlink burst
- the core network device determines, according to the second time and the sending time, a downlink delay of the downlink burst between the terminal device and the core network device.
- the core network device reaches the access network device through the sending time of the first data packet sent from the core network device and the last feedback information in the uplink burst sent by the access network device Or the second time when the last feedback information is sent from the terminal device, to determine the downlink delay of the downlink burst between the terminal device and the core network device.
- the process of monitoring the downlink delay between the terminal equipment and the core network equipment for downlink bursts is realized, but also a more accurate downlink delay can be obtained, so that the core network equipment can update the downlink delay based on the downlink bursts In order to accurately evaluate the data transmission performance to improve the user experience.
- the response information further includes a fourth downlink delay
- the fourth downlink delay includes a duration between a fourth time and a fifth time
- the fourth time is the last one in the downlink burst the arrival time of the data packet arriving at the MAC layer of the terminal device
- the fifth time is the transmission time of the last data packet sent from the PDCP layer of the terminal device in the downlink burst
- the core network device determines, according to the second time and the sending time, the downlink delay of the downlink burst between the terminal device and the core network device, including:
- the core network device determines the downlink delay of the downlink burst between the terminal device and the core network device according to the second time, the sending time and the fourth downlink delay.
- a method for burst monitoring including:
- the access network device receives the false burst monitoring request from the core network device;
- the access network device determines a false burst rate, where the false burst rate represents the number of the first type of bursts in the multiple bursts and the number of the multiple bursts The relationship of the first type of burst indicates that at least one data packet in a burst is not successfully received by the receiving end within the preset delay;
- the access network device sends response information to the core network device, where the response information includes the burst error rate.
- the burst may be an uplink burst or a downlink burst, which is not limited in any embodiment of the present application.
- the multiple bursts represent multiple bursts within a period of time, for example, the period of time may be predefined by a protocol, or may be set or configured by an access network device.
- the preset delay may be predefined by a protocol, or may be set or configured by an access network device.
- the first type of burst indicates that at least one data packet in a burst is not successfully received by the access network device within the preset time delay, and the access network device is the receiving end.
- the first type of burst indicates that at least one data packet in a burst is not successfully received by the terminal device within the preset delay, and the terminal device is the receiving end. It should be understood that, in the downlink transmission, if the access network device receives the feedback information that the data packet is successfully received, it is considered that the data packet is successfully received by the terminal device.
- the method for burst monitoring provides a method for determining the error burst rate of a burst, where the error burst rate indicates that among the multiple bursts, the multiple bursts and the first one that is not successfully received by the receiving end
- the access network device determines the false burst rate of the multiple bursts based on the false burst monitoring request of the core network device, and sends the false burst rate to the core network device.
- the process of monitoring the burst error rate between the terminal device and the access network device through the access network device is implemented, so that the data transmission can be more accurately evaluated based on the burst error rate for the burst. performance to improve user experience.
- the false burst rate is a ratio of the number of bursts of the first type to the number of the plurality of bursts.
- the first type of burst indicates that at least one data packet of the first type of data in a burst is not successfully received by the receiving end within the preset time delay, and the first type of data is: Base layer data.
- the data of the base layer is the data referenced for decoding the burst or other bursts to which the data of the base layer belongs.
- an apparatus for burst monitoring is provided, the apparatus is configured to perform the method provided in any one of the first to seventh aspects above.
- the apparatus may include a module for performing any one of the possible implementation manners of any one of the above-mentioned first to seventh aspects.
- an apparatus for burst monitoring including a processor.
- the processor is coupled to the memory and can be used to execute instructions in the memory, so as to implement the method in any one of the possible implementations of any one of the first to seventh aspects above.
- the apparatus further includes a memory.
- the apparatus further includes a communication interface to which the processor is coupled.
- a tenth aspect provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by an apparatus, causes the apparatus to implement any one of the first to seventh aspects above methods in possible implementations.
- An eleventh aspect provides a computer program product comprising instructions, which when executed by a computer cause an apparatus to implement the method in any one of the possible implementations of any one of the first to seventh aspects above.
- a twelfth aspect provides a chip, comprising: an input interface, an output interface, a processor, and a memory, wherein the input interface, the output interface, the processor, and the memory are connected through an internal connection path, and the processing
- the processor is configured to execute the code in the memory, and when the code is executed, the processor is configured to execute the method in any one of the possible implementation manners of any one of the first to seventh aspects above.
- FIG. 1 is a schematic diagram of a possible network architecture applied to an embodiment of the present application.
- FIG. 2 is an example diagram of two possible protocol architectures provided by an embodiment of the present application.
- FIG. 3 is a schematic diagram of transmission of an uplink burst provided by an embodiment of the present application in a scenario where each protocol layer is sequentially submitted.
- FIG. 4 is a schematic diagram of uplink burst transmission in a scenario of RLC layer segmentation provided by an embodiment of the present application.
- FIG. 5 is a schematic diagram of transmission in a scenario in which an uplink burst arrives out of sequence during an air interface transmission process provided by an embodiment of the present application.
- FIG. 6 is a schematic diagram of transmission of an uplink burst provided in an embodiment of the present application in a scenario where packets are lost and arrive out of sequence.
- FIG. 7 is a schematic flowchart of a method 100 for burst monitoring of uplink transmission provided by an embodiment of the present application.
- FIG. 8 is a schematic flowchart of a method 200 for burst monitoring of uplink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- FIG. 9 is a schematic flowchart of a method 300 for burst monitoring of uplink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- FIG. 10 is a schematic flowchart of a method 400 for burst monitoring of uplink transmission provided by an embodiment of the present application.
- FIG. 11 is a schematic flowchart of a method 500 for burst monitoring of uplink transmission in a scenario where DUs and CUs are separated, provided by an embodiment of the present application.
- FIG. 12 is a schematic diagram of transmission of a downlink burst provided by an embodiment of the present application in a scenario where each protocol layer is sequentially delivered.
- FIG. 13 is a schematic diagram of transmission of a downlink burst provided in an embodiment of the present application in a scenario where the RLC layer is segmented.
- FIG. 14 is a schematic diagram of transmission in a scenario where downlink bursts arrive out of sequence during air interface transmission according to an embodiment of the present application.
- FIG. 15 is a schematic diagram of transmission of an uplink burst provided in an embodiment of the present application in a scenario where packets are lost and arrive out of sequence.
- FIG. 16 is a schematic flowchart of a method 600 for burst monitoring of downlink transmission provided by an embodiment of the present application.
- FIG. 17 is a schematic flowchart of a method 700 for burst monitoring of downlink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- FIG. 18 is a schematic flowchart of a method 800 for burst monitoring of downlink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- FIG. 19 is a schematic flowchart of a method 900 for burst monitoring of downlink transmission provided by an embodiment of the present application.
- FIG. 20 is a schematic flowchart of a method 1000 for burst monitoring of downlink transmission in a scenario where DUs and CUs are separated according to an embodiment of the present application.
- FIG. 21 is a schematic flowchart of a method 1100 for burst monitoring provided by an embodiment of the present application.
- FIG. 22 is a schematic flowchart of a method 1200 for burst monitoring of downlink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- FIG. 23 is a schematic block diagram of an apparatus 1300 for burst monitoring provided by an embodiment of the present application.
- FIG. 24 is a schematic structural diagram of an apparatus 1400 for hair monitoring provided by an embodiment of the present application.
- LTE Long Term Evolution
- FDD Frequency Division Duplex
- TDD Time Division Duplex
- 5G New Radio
- FIG. 1 is a possible network architecture applied to the embodiment of the present application.
- the network architecture includes servers, core network equipment, access network equipment and terminal equipment.
- the core network equipment includes: user plane network elements, access management network elements, and session management network elements.
- the access network device, the core network device, and the server may be collectively referred to as the network device in the embodiments of the present application.
- User plane network element used for packet routing and forwarding, quality of service (QoS) processing of user plane data, packet detection, policy rule execution, etc., and for forwarding user plane data, and CDRs are generated based on traffic conditions and serve as data plane anchors.
- QoS quality of service
- a user plane network element may be a user plane function (UPF) network element.
- UPF user plane function
- future communications such as 6G communications, the user plane network element may still be a UPF network element, or have other names, which are not limited in this application.
- the user plane network element is a UPF network element as an example for description, and the UPF network element is abbreviated as UPF.
- the UPF network elements described later in this application can all be replaced with user plane network elements.
- Access management network element mainly used for mobility management and access management, such as user location update, user registration network, user handover, legal interception, and access authorization/authentication functions.
- the access management network element may be an access and mobility management function (AMF) network element.
- AMF access and mobility management function
- future communications such as 6G communications, the access management network element may still be an AMF network element, or have other names, which are not limited in this application.
- the access management network element is an AMF network element as an example for description, and the AMF network element is abbreviated as AMF.
- AMF Access Management network element
- Session management network elements mainly used for session management, Internet Protocol (IP) address allocation and management of terminal equipment, selection of manageable UPF network elements, and realization of access network-related sessions through AMF network elements The endpoint of information exchange, policy control and charging function interface, and downlink data notification, etc.
- the session management network element may be a session management function (session management function, SMF) network element.
- SMF session management function
- the session management function network element may still be an SMF network element, or have other names, which are not limited in this application.
- the session management function network element is an SMF network element as an example for description, and the SMF network element is abbreviated as SMF.
- SMF SMF network elements
- the SMF network elements described later in this application can all be replaced with network elements with a session management function.
- Server a network used to provide data transmission, such as the Internet network, etc.
- the server may be a data network authentication, authorization, and accounting (data network authentication, authorization, and accounting) server, or an application server (application function).
- the server may also be referred to as a data network (data network, DN) network element.
- Terminal device It is a device with wireless communication function, which can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted, or deployed on water (such as ships, etc.), and can also be deployed in the air (such as airplanes, balloons, and satellites).
- the terminal device can be a mobile phone (mobile phone), a tablet computer (Pad), a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal in industrial control, Vehicle terminal equipment, wireless terminal in self driving, wireless terminal in remote medical, wireless terminal in smart grid, wireless terminal in transportation safety, intelligent Wireless terminals in smart cities, wireless terminals in smart homes, wearable terminal devices, etc.
- the embodiments of the present application do not limit application scenarios.
- Terminal equipment may also sometimes be referred to as terminal, user equipment (UE, User Equipment), access terminal equipment, vehicle terminal, industrial control terminal, UE unit, UE station, mobile station, mobile station, remote station, remote terminal equipment, mobile equipment, UE terminal equipment, terminal equipment, wireless communication equipment, UE proxy or UE device, etc.
- Terminal devices can also be stationary or mobile.
- Access network equipment It is used to provide network access functions for authorized users in a specific area, and can use different quality transmission tunnels according to user levels and business needs. Access network equipment can manage wireless resources, provide access services for terminal equipment, and then complete the forwarding of control signals and user data between terminal equipment and core network equipment. base station.
- the access network device may also be referred to as a radio access network (radio access network, (R)AN).
- R radio access network
- the access network device in the embodiment of the present application is a device used for communicating with terminal devices, and the access network device may be: an evolved base station (evolutional NodeB, eNB or eNodeB) or a transmission reception point (transmission reception point) in the LTE system point, TRP), 3GPP subsequent evolution base station, wireless controller in the cloud radio access network (coud radio access network, CRAN) scenario, relay station, access point, in-vehicle equipment, wearable equipment, and 5G network in the network
- the device or the network device in the future 6G network, etc. are not limited in the embodiments of the present application.
- the access network equipment is divided into a centralized unit (central unit, CU) and a distributed unit (distributed unit, DU), that is, the DU is separated from the CU.
- the DU is mainly used for the processing of the radio link control (RLC) layer, the medium access control (MAC) layer, and the physical layer (PHY), and the CU is mainly used for the packet data convergence protocol (packet). data convergence protocol, PDCP) layer processing.
- RLC radio link control
- MAC medium access control
- PHY physical layer
- packet packet data convergence protocol
- PDCP packet data convergence protocol
- the control plane and user plane of the CU are separated, and the network element used for the control plane is called the central unit control plane (CU-CP) network element, and the network element used for the user plane is called a centralized unit control plane (CU-CP) network element.
- the element is called a central unit user plane (CU-UP) network element.
- one CU includes one CU-CP and one or more CU-UPs.
- the N2 interface is the reference point of the access network equipment and the AMF network element, and is used for sending non-access stratum (NAS) messages
- the N3 interface is the access network equipment and the UPF network.
- the N4 interface is the reference point between the SMF network element and the UPF network element, used to transmit, for example, the tunnel identification information of the N3 connection, the data buffer indication information, and the downlink Information such as data notification messages
- the N6 interface is the reference point between the UPF network element and the server, and is used to transmit data on the user plane.
- the F1-U interface is the reference point of the DU and CU-UP, and is used for the user plane between CU and DU. Data transmission; F1-C interface is the reference point of DU and CU-CP, used for data transmission of control messages between CU and DU; E1 interface is the reference point of CU-UP and CU-CP, used for CU-CP and Data transmission of control messages between CU-UP.
- the above-mentioned network architectures applied to the embodiments of the present application are only examples, and the network architectures applicable to the embodiments of the present application are not limited thereto, and any network architecture that can implement the functions of the above-mentioned network elements is applicable to the implementation of the present application. example.
- the above-mentioned access management network element, access management network element and session management network element are network elements in the core network equipment.
- the core network device may further include a policy control function (policy control function, PCF) network element, a network capability exposure function (network exposure function, NEF) network element, and the like.
- policy control function policy control function
- NEF network exposure function
- the above functional network elements may be network elements in hardware devices, software functions running on dedicated hardware, or virtualized functions instantiated on a platform (eg, a cloud platform).
- network equipment evaluates data transmission performance by monitoring performance parameters such as transmission delay and packet loss rate of a data packet.
- performance parameters such as transmission delay and packet loss rate of a data packet.
- the transmission of service flows is carried out in bursts, and a burst includes one or more data packets.
- the performance parameters obtained by monitoring at the granularity of data packets cannot be accurately evaluated.
- the transmission performance is poor, resulting in poor user experience.
- a video frame can be called a burst, and the terminal device can display the image of the frame only if all data packets in a video frame are received correctly within the preset delay.
- Frames can cause video stuttering and poor user experience.
- VR Virtual Reality
- a video frame is generated every 16.7ms, and a video frame (about 583Kb) is divided into 50 pieces of data Packets (about 1500Byte) are delivered.
- the decoder of the terminal device can only correctly receive all the data packets of the video frame within the preset delay, otherwise the frame of the image cannot be displayed, which is equivalent to losing the frame. As long as the frame is dropped, the video will freeze, and if the frame is dropped, the frequency of playback freezes is high.
- the purpose of the embodiments of the present application is to monitor with a burst as the granularity to obtain a burst performance parameter, thereby obtaining relatively accurate data transmission performance.
- a burst is a periodic burst of a service flow, which can represent a transmission unit of service flow transmission.
- a burst is the smallest unit of service flow transmission.
- a burst consists of one or more packets, and in most cases, a burst consists of multiple packets.
- a burst may include one or more files, one file for a characteristic, the characteristic is related to the type of traffic flow.
- the characteristic may be content representing different attributes, such as scenery, characters, animals, etc. in a video frame image.
- a file can contain one or more data packages.
- the burst is periodic, and when monitoring the performance parameter, the burst is periodically monitored.
- a slice can also be used as a data transmission unit, each slice can be decoded independently, and a slice includes one or more data packets.
- a slice may be a partial area in a frame image.
- a burst can be understood as a slice
- a slice can be regarded as a sub-unit of a burst
- a burst includes one or more slices.
- a video frame can be divided into multiple slices.
- the "slice" can be used as the monitoring object to monitor the performance parameters of the slice. Therefore, a burst can be understood as a slice.
- one video frame can be used as the monitoring object to monitor the performance parameters of the video frame, so one burst can be understood as one video frame.
- a slice may also be referred to as a tile (tile), and the two descriptions may be replaced with each other.
- the protocol architecture of wireless communication includes the protocol architecture of the control plane and the protocol architecture of the user plane.
- the protocol architecture in the embodiments of the present application refers to the protocol architecture of the user plane.
- FIG. 2 shows an example diagram of two possible protocol architectures provided by the embodiments of the present application.
- FIG. 2(a) shows the protocol architecture in 4G
- FIG. 2(b) shows the 5G protocol architecture.
- protocol architecture The terminal device and the access network device are both configured with a protocol architecture.
- the protocol architecture sequentially includes: PDCP layer, RLC layer, MAC layer, and PHY.
- PDCP layer Responsible for performing IP header compression to reduce the bit-traffic that the wireless interface has to transmit.
- RLC layer responsible for segmentation/concatenation and reassembly of data, retransmission processing, and sequential transmission of higher layer data.
- the data received by the RLC entity from the PDCP layer or sent to the PDCP layer is called RLC SDU
- RLC PDU The data received by the RLC entity from the MAC layer or sent to the MAC layer.
- the size of the RLC PDU is determined by the MAC layer, and its size ratio is not necessarily equal to the size of the RLC SDU. Therefore, the sender may need to segment/concatenate the RLC SDU to make the processed data size match the size specified by the MAC layer, and The processed data is sent to the MAC layer in the form of RLC PDUs.
- the receiving end when the receiving end receives the RLC PDU, it needs to reassemble the previously segmented RLC SDU in order to restore the original RLC SDU and deliver it to the PDCP layer.
- MAC layer responsible for the multiplexing of control logical channels, hybrid automatic repeat request (HARQ) hybrid HARQ retransmission, scheduling of uplink and downlink.
- HARQ hybrid automatic repeat request
- PHY responsible for handling encoding/decoding, modulation/demodulation, multi-antenna mapping, and other types of physical layer functions.
- the PHY, MAC layer, and RLC layer are configured in the DU, and the PDCP layer is configured in the CU. Also, in a scenario where the CU-CP of the CU is separated from the CU-UP, the PDCP layer is configured in the CU-UP.
- the protocol architecture sequentially includes: a service data adaptation protocol (SDAP) layer, a PDCP layer, an RLC layer, a MAC layer, and a PHY.
- SDAP service data adaptation protocol
- the SDAP layer is used to process QoS-related information
- the description of other protocol layers can refer to the above description, which will not be repeated here.
- the PHY, MAC layer and RLC layer are configured in the DU, and the PDCP layer and SDAP layer are configured in the CU.
- the PDCP layer and the SDAP layer are configured in the CU-UP.
- uplink data is sent from the terminal device to the access network device, and then sent by the access network device to the core network device, exemplarily, to the UPF in the core network device.
- uplink data is delivered from the upper layer to the lower layer.
- the terminal device sequentially submits the uplink data from the SDAP layer to the PHY in order from top to bottom.
- the access network device receives the uplink data at the PHY, and submits the uplink data from the PHY to the SDAP layer in order from the bottom to the top to complete the uplink data between the terminal device and the access network device. transmission between.
- the access network device sends the submitted uplink data to the core network device to complete the transmission of the uplink data between the access network device and the core network device.
- downlink data is sent from the core network device to the access network device, exemplarily, from the UPF in the core network device to the access network device, and then sent by the access network device to the terminal device.
- the downlink data is sent from the core network device to the access network device, and reaches the SDAP layer of the access network device to complete the transmission of the downlink data between the core network device and the access network device.
- the access network device sequentially delivers downlink data from the SDAP layer to the PHY in a top-to-bottom order.
- the terminal device receives the downlink data at the PHY, and sequentially submits the downlink data from the PHY to the SDAP layer in order from bottom to top to complete the transmission of the downlink data between the terminal device and the access network device.
- the transmission of downlink data between the terminal equipment and the core network equipment is completed.
- the embodiments of the present application mainly involve monitoring of two performance parameters.
- One performance parameter is the burst delay, including the burst transmission delay between the terminal equipment and the access network equipment, and the burst transmission delay between the terminal equipment and the access network equipment.
- another performance parameter is the burst error rate, which mainly monitors the bursts that do not meet the delay requirement among multiple bursts within a time period.
- the above two performance parameters are described respectively. First, the monitoring of the burst delay is described, and then, the monitoring of the burst error rate of the burst is described.
- FIG. 3 to 11 relate to the time delay of the uplink burst
- FIGS. 12 to 20 relate to the time delay of the downlink burst.
- the 5G protocol architecture UPF as an example of core network equipment, and an uplink burst including 4 data packets are used as an example for description, wherein the 4 data packets are recorded as data packet 1, data packet 2, and data packet 3 respectively. and packet 4.
- FIG. 3 is a schematic diagram of transmission of uplink bursts in a scenario where each protocol layer is delivered in sequence.
- four data packets arrive at the SDAP layer of the terminal device, and the terminal device sequentially delivers the four data packets to the MAC layer of the terminal device in order from top to bottom.
- the terminal device sends 4 data packets to the access network device, and the 4 data packets arrive at the MAC layer of the access network device from the MAC layer of the terminal device.
- the packet is delivered from the MAC layer of the access network device to the SDAP layer of the access network device, and 4 data packets are sent from the SDAP layer to the UPF.
- FIG. 4 is a schematic diagram of uplink burst transmission in the scenario of RLC layer segmentation. It is assumed that upstream bursts are delivered in sequence at each protocol layer.
- 4 data packets arrive at the SDAP layer of the terminal device. After the terminal device submits the 4 data packets to the RLC layer in the form of RLC SDUs in order from top to bottom, the terminal device responds to the uplink burst. Packets are fragmented. It is assumed that the terminal device segments each data packet and divides 1 data packet into two segments, and 4 data packets are segmented at the RLC layer to form 8 data packets, which are recorded as data packet 1.1, data packet 1.2, data packet Packet 2.1, Packet 2.2, Packet 3.1, Packet 3.2, Packet 4.1, Packet 4.2, 8 packets arrive at the MAC layer in sequence in the form of RLC PDUs.
- the terminal equipment sends 8 data packets to the access network equipment, and the 8 data packets arrive at the MAC layer of the access network equipment from the MAC layer of the terminal equipment.
- the access network device needs to reassemble the previously segmented data packet (ie, RLC SDU) to restore the previously segmented data packet, that is, 8 data packets are restored for the original 4 packets.
- the access network device sends the 4 data packets from the RLC layer to the SDAP layer of the access network device, and sends the 4 data packets from the SDAP layer to the UPF.
- FIG. 5 is a schematic diagram of transmission in a scenario where uplink bursts arrive out of sequence during air interface transmission.
- the air interface transmission mentioned in the embodiments of the present application refers to the process in which the sender (for example, a terminal device) sends data from the MAC layer of the sender to the MAC layer of the receiver (for example, an access network device).
- the sender for example, a terminal device
- the MAC layer of the receiver for example, an access network device
- four data packets arrive at the SDAP layer of the terminal device, and the terminal device sequentially delivers the four data packets to the MAC layer of the terminal device in order from top to bottom.
- the terminal device sends 4 data packets to the access network device, and the 4 data packets arrive at the MAC layer of the access network device from the MAC layer of the terminal device.
- the data packets arrive out of sequence. That is, packet 4 arrives at the MAC layer of the access network device earlier than packet 3.
- the access network device delivers four data packets to the PDCP layer in the order of data packet 1, data packet 2, data packet 4 and data packet 3.
- the access network device When the PDCP layer is configured with sequential delivery, no matter in which order the four data packets arrive at the PDCP layer, the access network device will send the four data packets as the original data packet 1, data packet 2, and data packet 3. , The sequence of data packets 4 is sent from the PDCP layer to the SDAP layer, and 4 data packets are sent from the SDAP layer to the UPF.
- the access network device will send the four data packets in time order, that is, the data packets that arrive at the PDCP layer first are sent first, and then the data packets that arrive at the PDCP layer are sent out. After the packet is sent out.
- the terminal device will continue to send 4 packets to SDAP in the order of packet 1, packet 2, packet 4, and packet 3, and from the SDAP layer to the UPF ( Figure 5). not shown).
- FIG. 6 is a schematic diagram of transmission of uplink bursts in a scenario where packets are lost and arrive out of sequence.
- the terminal device sequentially delivers the four data packets to the MAC layer of the terminal device in order from top to bottom.
- the terminal device sends 4 data packets to the access network device, and the 4 data packets reach the MAC layer of the access network device from the MAC layer of the terminal device.
- packet loss and out-of-order arrival occurred.
- the phenomenon is that the data packet 3 does not reach the MAC layer of the access network device, and the data packet 4 arrives at the MAC layer of the access network device earlier than the time when the data packet 3 should arrive.
- the access network device sequentially delivers the remaining three data packets to the PDCP layer in the order from bottom to top.
- the PDCP layer When the PDCP layer is configured with sequential delivery, even if the access network device has received the data packet 4 at the PDCP layer, it will still wait for the data packet 3, and will not receive the data packet 3 within the preset time period. Packet 4 is delivered to the SDAP layer, then the remaining 3 packets are sent from the SDAP layer to the UPF.
- the uplink delay of an uplink burst between the terminal equipment and the access network equipment is recorded as D U-UE-base station
- the uplink burst between the terminal equipment and the core network equipment is denoted as D U-UE-base station.
- the uplink delay is recorded as D U-UE-UPF
- the uplink delay of an uplink burst between the access network device and the core network device is recorded as D U-base station-UPF .
- the uplink delay D U-UE-base station in the embodiment of the present application has two possible cases (case 1 and case 2).
- the following describes the uplink delay D U-UE-base station according to the cases.
- the uplink delay D U-UE-base station includes the uplink delay D U1 and the uplink delay D U2 .
- the uplink delay D U1 can be understood as the delay of the terminal equipment sending a data packet of the uplink burst from the upper layer to the lower layer, and the uplink delay D U2 can be understood as the time from the terminal equipment sending the uplink burst to the access network equipment. The duration of the time to send the last data packet of the uplink burst to the core network device.
- the uplink delay D U1 includes a duration from time T U1.1 to time T U1.2 , for example, the duration corresponding to (1) D U1 in FIGS. 3 to 6 .
- the time T U1.1 is the arrival time of the first data packet (eg, data packet 1 of FIGS. 3 to 6 ) in the uplink burst that arrives at the PDCP layer of the terminal device.
- Time T U1.2 is the arrival time of the first data packet (eg, data packet 1 of FIG. 3 , FIG. 5 , FIG. 6 , or data packet 1.1 of FIG. 4 ) of the uplink burst that arrives at the MAC layer of the terminal device.
- the first data packet eg, data packet 1 of FIG. 3 , FIG. 5 , FIG. 6 , or data packet 1.1 of FIG. 4
- the uplink burst data packet is segmented at the RLC layer of the terminal device
- the first data packet arriving at the MAC layer of the terminal device has been divided into multiple segments at the RLC layer
- the first packet arriving at the terminal device's MAC layer The data packet of the MAC layer is the first data packet in the multi-segment data packet.
- the first data packet arriving at the MAC layer of the terminal device is the data packet 1.1.
- the uplink delay D U1 includes a duration from time T U1.1 to time T U1.3 , for example, the duration corresponding to (2) D U1 in FIGS. 3 to 6 .
- the time T U1.3 is the grant time of the first data packet in the uplink burst that arrives at the MAC layer of the terminal device (eg, data packet 1 of Fig. 3, Fig. 5, Fig. 6, or data packet 1.1 of Fig. 4) .
- the authorization time of the data packet represents the time when the data packet is scheduled by the access network device, and the time when the data packet is scheduled can be understood as the time when the access network device instructs the data packet to be sent from the terminal device to the access network device.
- the access network device may send scheduling information to the terminal device, where the scheduling information includes the time when the data packet is scheduled.
- the SDAP layer does not have the function of buffering data, the delay of data at the SDAP layer is very short, and the delay can be ignored.
- the uplink delay D U2 includes the duration from time T U1.3 to time T U2.1 , for example, the duration corresponding to D U2 in FIGS. 3 to 6 .
- the time T U1.3 is the grant time of the first data packet in the uplink burst that arrives at the MAC layer of the terminal device (eg, data packet 1 of Fig. 3, Fig. 5, Fig. 6, or data packet 1.1 of Fig. 4) , and the specific description can refer to the above description, which will not be repeated.
- the time TU2.1 is the transmission time of the last data packet (eg, data packet 4) sent from the PDCP layer of the access network device in the uplink burst.
- the time T U2.1 is the transmission time of the last data packet (eg, data packet 4 ) sent from the PDCP layer of the CU in the uplink burst.
- the sending time of the data packet sent from the PDCP layer of the access network device in the embodiment of the present application represents the sending time of sending the data packet from the PDCP layer to the SDAP layer in 5G, and the sending time of the data packet from the PDCP layer to the SDAP layer in 4G.
- the sending time sent by the PDCP layer to the core network device eg, UPF.
- the uplink delay D U2 may include four parts of the delay, and the four parts of the delay include the delay D U21 , the delay D U22 , and the delay D U23 , time delay D U24 .
- the delay D U21 can be understood as the air interface delay between the terminal equipment and the access network equipment in the uplink burst, including the time duration from time T U1.3 to time T U2.2 , for example, D in Figure 3 to Figure 6 The duration corresponding to U21 .
- Time T U2.2 is the last data packet in the uplink burst that arrives at the MAC layer of the DU (for example, data packet 1 in Figure 3, or data packet 4.2 in Figure 4, or, data packet 3, Figure 4 in Figure 5 the arrival time of the packet 4).
- the last data packet in the uplink burst that reaches the MAC layer of the access network device in the embodiment of the present application is a certain segment of the complete data packet.
- the last data packet that reaches the MAC layer of the access network device is the data packet 4.2.
- the time delay D U22 can be understood as the time delay of DU processing data packets, including the time duration from time T U2.2 to time T U2.3 , for example, the time duration corresponding to D U22 in FIG. 3 to FIG. 6 .
- time T U2.3 is the last packet in the upstream burst sent from the RLC layer of the DU (eg, packet 4 of FIG. 3, 4 or 6, or packet 3 of FIG. 5 ). ) sending time.
- time T U2.3 may also be the last exit from the general packet radio system tunneling protocol (GTP) tunnel of the F1-U interface of the DU in the uplink burst The sending time of the sent packet.
- GTP general packet radio system tunneling protocol
- the RLC layer receives and reassembles the fragmented data packet to recover the original data packet (ie, RLC SDU), and delivers the restored complete data packet to the PDCP layer. Therefore, no matter whether the data packet of the uplink burst is segmented or not, the last data packet in the uplink burst sent from the RLC layer of the access network device is also the recovered data packet. As shown in FIG. 4 , the access network device reassembles the data packet 4.1 and the data packet 4.2 into the data packet 4 at the RLC layer, and then submits it to the PDCP layer.
- the delay D U23 can be understood as the delay of data packet transmission between the DU and the CU, including the duration from time T U2.3 to time T U2.4 , for example, the duration corresponding to D U23 in FIG. 3 to FIG. 6 .
- time T U2.4 is the last packet in the upstream burst that arrives at the PDCP layer of the CU (eg, packet 4 of FIG. 3 , FIG. 4 , or FIG. 6 , or packet 3 of FIG. 5 ) arrival time.
- the time T U2.4 may also be the arrival time of the last data packet in the uplink burst that arrives at the tunnel entry of the F1-U interface of the CU.
- the time delay D U24 can be understood as the time delay for the CU to process the data packet, including the time duration from time T U2.4 to time T U2.1 , for example, the time duration corresponding to D U24 in FIG. 3 to FIG. 6 .
- the uplink delay D U-UE-base station includes the uplink delay D U2 , and does not involve the delay of the uplink burst delivered at each protocol layer of the terminal device.
- the uplink delay D U2 For a specific description of the uplink delay D U2 , reference may be made to the relevant description of the above case 1, and details are not repeated here.
- the uplink delay D U-base station-UPF is the last data packet sent from the access network device in the uplink burst (for example, data packet 4 in Figure 3 to Figure 6) between the access network device and the core network device. time delay. It should be understood that the uplink delay D U-base station- UP is a delay of a packet granularity.
- the uplink delay DU-base station-UPF includes the duration from time TU2.6 to time TU3 .
- the time T U2.6 is the sending time of the last data packet sent from the access network device in the uplink burst.
- the time T U2.6 may be the sending time of the last data packet sent from the GTP tunnel exit of the interface (eg, N3 interface) between the access network device and the core network device in the uplink burst.
- the interface eg, N3 interface
- the time T U2.6 may be the sending time of the last data packet sent from the SDAP layer of the access network device in the uplink burst. It should be understood that the sending time represents the sending time when the data packet is sent from the SDAP layer of the access network device to the core network device. For example, the time T U2.6 shown in FIG. 3 to FIG. 6 is the sending time when the data packet 4 is sent from the SDAP layer.
- the time T U2.6 can also be any of the following:
- the time T U2.6 may be the last transmission time in the uplink burst sent from the PDCP layer of the access network device.
- time T U2.6 is the sending time of the last data packet sent from the PDCP layer of the access network device in the uplink burst.
- the time T U3 may be the arrival time of the last data packet (eg, data packet 4 ) in the uplink burst that arrives at the core network device.
- the time TU3 may be the arrival time of the last GTP tunnel entry in the uplink burst that arrives at the interface (eg, the N3 interface) between the core network device and the access network device.
- the uplink delay D U-UE-UPF represents the delay between the terminal equipment and the core network equipment of the uplink burst, including the uplink delay U-UE-base station and the uplink delay D U-base station-UPF , about the uplink delay
- the uplink delay D U-UE-UPF represents the delay between the terminal equipment and the core network equipment of the uplink burst, including the uplink delay U-UE-base station and the uplink delay D U-base station-UPF , about the uplink delay
- FIG. 7 is a schematic flowchart of a method 100 for burst monitoring of uplink transmission provided by an embodiment of the present application.
- the core network device sends a delay monitoring request to the access network device, where the delay monitoring request is used to instruct to perform delay monitoring on periodic bursts.
- the uplink burst in this embodiment of the present application is periodic, and the delay monitoring request is used to instruct to perform delay monitoring on the uplink burst of each cycle in one or more cycles, so as to determine that the periodic uplink burst is The transmission delay between the terminal equipment and the access network equipment.
- the delay monitoring request is used to instruct to report the delay of periodic uplink burst transmission between the terminal device and the access network device.
- the delay monitoring request may be a single piece of information, or may be content carried in other information, which is not limited in any embodiment of the present application.
- the delay monitoring request may be a field carried in a downlink (downlink, DL) protocol data unit (protocol data unit, PDU) session information (SESSION INFORMATION).
- DL downlink
- PDU protocol data unit
- SESSION INFORMATION session information
- the access network device determines the uplink delay between the terminal device and the access network device in the uplink burst, wherein the uplink burst is between the terminal device and the access network device.
- the uplink delay between network devices includes the first uplink delay, and the first uplink delay includes the duration from the first time to the second time, and the first time is the first time in the uplink burst to reach the terminal device.
- the authorization time of the data packet of the MAC layer of the medium access control, the second time is the sending time of the last data packet sent from the packet data convergence protocol PDCP layer of the access network device in the uplink burst.
- the access network device receives the delay monitoring request, and determines the uplink delay of the uplink burst between the terminal device and the access network device.
- the access network device can also be configured according to the network management system, such as the configuration strategy of the operation and maintenance management (OAM) system, or according to the configuration strategy stored locally by the access network device (such as the factory configuration of the device, the factory configuration can be upgraded) and so on, the above-mentioned delay monitoring is started, so the above-mentioned S110 is optional.
- the access network device determines the uplink delay according to the network management system or the configuration policy stored locally.
- the first time can be understood as the start time of the uplink burst between the terminal device and the access network device
- the second time can be understood as the start time of the uplink burst between the terminal device and the access network device End Time.
- the uplink delay of the uplink burst between the terminal equipment and the access network equipment is the uplink delay D U-UE-base station described above
- the first uplink delay is the above delay D U2
- the first uplink delay is the above delay D U2
- the first time is the above time T U1.3
- the second time is the above time T U2.1 .
- the terminal device may determine the first data packet in the uplink burst that reaches the MAC layer of the terminal device according to the burst number of the uplink burst.
- the terminal device may determine, according to the change of the burst number of the uplink burst, the first data packet in the uplink burst that reaches the MAC layer of the terminal device. For example, the MAC layer of the terminal device first receives the uplink burst data packet with burst number 1, and then receives the uplink burst data packet with burst number 2. Since the burst number has changed from 1 to 2, It means that the uplink burst with burst number 1 has been received, then the first time the MAC layer of the terminal device receives the uplink burst with burst number 2 is the first time to reach the MAC layer of the terminal device. the data package.
- the terminal device may determine the first data packet in the uplink burst that reaches the MAC layer of the terminal device according to the period to which the uplink burst belongs.
- the terminal device may start monitoring from the start time of a cycle, and the first data packet received by the MAC layer of the terminal device during the cycle is the first data of the uplink burst transmitted during the cycle. Bag.
- the access network device may determine the last data packet sent from the PDCP layer of the access network device in the uplink burst according to the period to which the uplink burst belongs.
- the access network device may start monitoring from the start time of a period, and the last data packet sent from the PDCP layer in the period is the last data packet sent from the access network in the uplink burst transmitted in the period. Data packets sent by the PDCP layer of the device.
- the method for burst monitoring provides a method for monitoring the delay of an uplink burst.
- the access network device determines the uplink delay based on the delay monitoring request for the uplink burst sent by the core network device,
- the uplink delay includes a first uplink delay from a first time to a second time, where the first time is the authorization time for the first data packet in the uplink burst to reach the MAC layer of the terminal device, and the first time
- the second time is the sending time of the last data packet sent from the PDCP layer of the access network device in the uplink burst.
- the process in which the access network device monitors the uplink delay of the uplink burst between the terminal device and the access network device is implemented, so that the access network device can more accurately determine the uplink delay based on the uplink burst for the uplink burst. Evaluate data transfer performance to improve user experience.
- the uplink delay of the uplink burst between the terminal device and the access network device further includes a fourth uplink delay, and the fourth uplink delay includes the time from the fourth time to the fifth time. duration, or, the fourth uplink delay includes the duration from the fourth time to the first time, where the fourth time is the arrival time of the first data packet arriving at the PDCP layer of the terminal device in the uplink burst, The fifth time is the arrival time of the first data packet in the uplink burst that reaches the MAC layer of the terminal device.
- the fourth time can be understood as the start time of the uplink burst between the terminal device and the access network device.
- the fourth uplink delay is the above uplink delay D U1
- the fourth time is the above time T U1.1
- the fifth time is the above time T U1.2
- the first time is Time T U1.3 above.
- the terminal device may count the fourth uplink delays of multiple uplink bursts to obtain an average value of the multiple fourth uplink delays, and the average value may be used as the fourth uplink delay of the uplink bursts.
- the period lengths of the multiple uplink bursts are the same.
- the terminal device can determine the first data packet in the uplink burst that reaches the PDCP layer of the terminal device according to the burst number of the uplink burst.
- the related description of the first data packet arriving at the MAC layer of the terminal device in the uplink burst is determined by sending the number, and details are not repeated here.
- the terminal device may determine the first data packet in the uplink burst to reach the PDCP layer of the terminal device according to the period to which the uplink burst belongs. The relevant description of the first data packet reaching the MAC layer of the terminal device in the periodic determination of the uplink burst will not be repeated.
- the terminal device sends the fourth uplink delay to the access network device
- the access network device receives the fourth uplink delay
- the access network device determines the first uplink delay, and determines the uplink delay of the uplink burst at the terminal device and the access network device according to the fourth uplink delay and the first uplink delay.
- the uplink delay between the terminal device and the access network device of the uplink burst includes: a first uplink delay and a fourth uplink delay. To put it simply, the access network device adds the two delays to obtain the uplink delay of the uplink burst between the terminal device and the access network device.
- the uplink delay between the terminal device and the access network device of the uplink burst also includes the delay of the uplink burst delivered at each protocol layer of the terminal device, which can be more accurate. Therefore, the data transmission performance can be more accurately evaluated based on the uplink delay for the uplink burst, so as to further improve the user experience.
- the embodiments of the present application provide two methods for monitoring the uplink delay (referred to as mode 1 and mode 2).
- Method 1 is mainly to count the uplink delay between the terminal equipment and the access network equipment in sections, so as to obtain the uplink delay of the uplink burst between the terminal equipment and the access network equipment, which can be applied to the access network.
- Mode 2 is mainly based on the first time and second time of the uplink burst to determine the uplink delay of the uplink burst between the terminal device and the access network device. This mode 2 is not limited to the scenario where the DU is separated from the CU, and can also be applied to the DU Scenarios that are not separated from the CU.
- the access network device mainly collects statistics on two delays, that is, the second uplink delay and the third uplink delay.
- the first uplink delay includes a second uplink delay and a third uplink delay, wherein the second uplink delay includes the duration from the first time to the third time, and the third uplink delay includes the time from the first time to the third time.
- the duration from the third time to the second time, the third time is the sending time of the last data packet sent from the RLC layer of the access network device to the PDCP layer of the access network device in the uplink burst.
- the first time is the arrival time of the first data packet reaching the MAC layer of the terminal device in the uplink burst, which is the above time T U1.3
- the second time is the last slave access time in the uplink burst
- the sending time of the data packet sent by the PDCP layer of the network device is the above time T U2.1
- the fifth time is the above time T U2.3 .
- the second time is the transmission time of the last data packet sent from the PDCP layer of the DU in the uplink burst
- the third time is the RLC of the last data packet from the CU in the uplink burst The transmission time of the data packet sent by the layer to the PDCP layer of the DU.
- the second uplink delay includes the above delays D U21 and D U22
- the third uplink delay includes the above delays D U23 and D U24 .
- each time delay reference may be made to the above related description, which will not be repeated.
- the access network device may determine the last data packet sent from the RLC layer of the access network device to the PDCP layer in the uplink burst according to the period to which the uplink burst belongs. For a specific description, reference may be made to the above description about the access network device determining the last data packet in the uplink burst sent from the PDCP layer of the access network device according to the period to which the uplink burst belongs, and details are not repeated here.
- the uplink delay between the terminal device and the access network device of the uplink burst includes the first uplink delay and the fourth uplink delay.
- the access network device determines the uplink delay of the uplink burst between the terminal device and the access network device, including:
- the access network device determines the second uplink delay and the third uplink delay in response to the delay monitoring request;
- the access network device determines the fourth uplink delay
- the access network device determines the uplink time of the uplink burst between the terminal device and the access network device according to the second uplink delay, the third uplink delay and the fourth uplink delay extension.
- the access network device receives the fourth uplink delay sent from the terminal device to determine the fourth uplink delay, and the fourth downlink delay is the above downlink delay D U1 , and the specific description can refer to the above The relevant descriptions will not be repeated here.
- the method for monitoring the uplink delay of the uplink burst may be as follows:
- the DU determines the second uplink delay in response to the delay monitoring request
- the DU sends the second uplink delay to the CU
- the CU determines the fourth uplink delay
- the CU determines the third uplink delay in response to the delay monitoring request
- the CU determines the uplink delay of the uplink burst between the terminal device and the access network device according to the second uplink delay, the third uplink delay and the fourth uplink delay.
- the terminal device sends the fourth uplink delay to the CU, so that the CU determines the fourth uplink delay.
- the DU may determine the second uplink delay according to the first time and the third time, that is, the DU first determines the first time and the third time, and then determines the second uplink delay.
- the DU may determine the second uplink delay according to the delay D U21 and the delay D U22 , that is, the DU first determines the delay D U21 and the delay D U22 , and then determines the second uplink delay.
- the CU may determine the third uplink delay according to the third time and the second time, that is, the CU first determines the third time and the first time, and then determines the third uplink delay.
- the CU may determine the third uplink delay according to the delays D U23 and D U24 , that is, the DU first determines the delays D U23 and D U24 , and then determines the third uplink delay.
- the third uplink delay is determined by the CU-UP, and according to the second uplink delay, the third uplink delay and the fourth uplink delay
- Uplink delay determine the uplink delay of the uplink burst between the terminal device and the access network device.
- the method for burst monitoring supports the scenario where the DU and CU of the access network equipment are separated.
- the uplink delay determines the uplink delay of the uplink burst in the terminal equipment and the access network equipment. That is to say, by segmenting the DU and CU to count the delay related to themselves, it is possible to monitor the uplink delay of the uplink burst in the scenario where the DU and the CU are separated.
- the uplink delay between the terminal device and the access network device of the uplink burst includes the first uplink delay and does not include the fourth uplink delay.
- the access network device determines the uplink delay of the uplink burst between the terminal device and the access network device, including:
- the access network device determines the second uplink delay and the third uplink delay in response to the delay monitoring request;
- the access network device determines the uplink delay of the uplink burst between the terminal device and the access network device according to the second uplink delay and the third uplink delay.
- the method for monitoring the uplink delay of the uplink burst may be as follows:
- the DU determines the second uplink delay in response to the delay monitoring request
- the DU sends the second uplink delay to the CU
- the CU determines the third uplink delay in response to the delay monitoring request
- the CU determines the uplink delay of the uplink burst between the terminal device and the access network device according to the third uplink delay and the fourth uplink delay.
- the CU-UP determines the third uplink delay, and determines the uplink delay according to the second uplink delay and the third uplink delay The burst uplink delay between the terminal equipment and the access network equipment.
- the method for burst monitoring supports the scenario where the DU and CU of the access network equipment are separated.
- the second uplink delay and the third uplink delay determined by the CU due to the transmission of the uplink burst between the CU and the DU and the processing of the uplink burst by the CU determine that the uplink burst occurs when the terminal equipment and the access network equipment are uplinked. extension. That is to say, by segmenting the DU and CU to count their own-related delays, it can meet the monitoring of the uplink delay of the uplink burst in the scenario where the DU and the CU are separated.
- the uplink delay between the terminal device and the access network device of the uplink burst includes the first uplink delay and the fourth uplink delay.
- the access network device determines the uplink delay of the uplink burst between the terminal device and the access network device, including:
- the access network device determines the first time and the second time in response to the delay monitoring request
- the access network device determines the fourth uplink delay
- the access network device determines, according to the fourth uplink delay, the first time and the second time, the uplink delay of the uplink burst between the terminal device and the access network device.
- the first time is the arrival time of the first data packet in the uplink burst that reaches the MAC layer of the terminal device, that is, the above time T U1.3 .
- the second time is the sending time of the last data packet sent from the PDCP layer of the access network device in the uplink burst.
- the second time is the last data packet sent from the PDCP layer of the DU in the uplink burst.
- the sending time of the sent data packet is the above time T U2.1 .
- the duration from the first time to the second time is the first uplink delay in this embodiment of the present application.
- the access network equipment When the access network equipment schedules data, the access network equipment allocates an uplink grant (UL grant) to the terminal equipment.
- the UL grant carries the authorization time of the data packet, and the terminal equipment sends the data packet through the UL grant. Even if the access network device receives the data packet only after scheduling retransmission, the access network device can still obtain the authorization time of the data packet based on the time of the UL Grant of the initial transmission of the data packet.
- the access network device may determine the grant time of the first data packet in the uplink burst according to the UL grant.
- the access network device in response to the delay monitoring request, determines the uplink delay of the uplink burst between the terminal device and the access network device, including:
- the DU determines the first time in response to the delay monitoring request
- the DU sends the first time to the CU
- the CU determines the fourth uplink delay
- the CU determines the second time in response to the delay monitoring request
- the CU determines, according to the fourth uplink delay, the first time, and the second time, the uplink delay of the uplink burst between the terminal device and the access network device.
- the terminal device sends the fourth uplink delay to the CU, so that the CU determines the fourth uplink delay.
- the CU-UP determines that the uplink burst is between the terminal device and the connection according to the fourth uplink delay, the first time, and the second time. Upstream delay between networked devices.
- the burst monitoring method supports the scenario in which the DU and CU of the access network device are separated. Based on the first time, the second time (ie, the end time) of the uplink burst determined by the CU at the CU, and the fourth uplink delay generated by the terminal equipment due to the uplink burst obtained by the CU due to data submission, it is determined that the uplink burst is at Uplink delay of terminal equipment and access network equipment. In this way, the process of monitoring the uplink delay of the uplink burst in the scenario where the DU and the CU are separated can be implemented. In addition, compared with the way of calculating the delay in segments of DUs and CUs, this method can obtain more accurate uplink delays of uplink bursts.
- the uplink delay between the terminal device and the access network device of the uplink burst includes the first uplink delay and does not include the fourth uplink delay.
- the access network device determines the uplink delay of the uplink burst between the terminal device and the access network device, including:
- the access network device determines the first time and the second time according to the delay monitoring request
- the access network device determines, according to the first time and the second time, the uplink time delay of the uplink burst between the terminal device and the access network device.
- the access network device in response to the delay monitoring request, determines the uplink delay of the uplink burst between the terminal device and the access network device, including:
- the DU determines the first time in response to the delay monitoring request
- the DU sends the first time to the CU
- the CU determines the second time
- the CU determines, according to the first time and the second time, the uplink delay of the uplink burst between the terminal device and the access network device.
- the CU-UP determines the second time, and the uplink burst is determined at the terminal according to the second time and the received first time.
- the uplink delay between the device and the access network device is the first time.
- the burst monitoring method supports the scenario in which the DU and CU of the access network device are separated. Based on the first time and the second time (ie, the end time) of the uplink burst determined by the CU at the CU, the uplink delay of the uplink burst at the terminal device and the access network device is determined. In this way, the uplink delay of monitoring the uplink burst can be satisfied in the scenario where the DU and the CU are separated. In addition, compared with the way of calculating the delay in segments of DUs and CUs, this method can obtain more accurate uplink delays of uplink bursts.
- the uplink time delay between the terminal device and the core network device can also be determined. Based on this, the method 100 for burst monitoring of uplink transmission according to the embodiment of the present application further includes steps S130, S140 and S150.
- the access network device sends response information to the core network device, where the response information is information in response to the delay monitoring request, and the response information includes the uplink burst between the terminal device and the access network device. time delay.
- the core network device receives the response information.
- the response information may be a single piece of information, or may be content carried in other information, which is not limited in any embodiment of the present application.
- the response information may be a field carried in an uplink (UL) PDU SESSION INFORMATION.
- the core network device determines the fifth uplink delay between the access network device and the core network device of the last data packet sent from the PDCP layer of the access network device in the uplink burst.
- the fifth uplink delay is the above uplink delay D U-base station-UPF , and the specific description of the uplink delay D U-base station-UPF refers to the above related description, and will not be repeated.
- the access network device may, according to the transmission time (ie, the second time) of the last data packet sent from the PDCP layer of the access network device in the uplink burst, the time when the last data packet reaches the core network device.
- the arrival time of the data packet determines the fifth uplink delay.
- the fifth uplink delay may also be determined based on the average value of multiple data packets (not limited to uplink data packets or downlink data packets) transmitted between the access network device and the core network device, or, the fifth uplink delay It can also be obtained based on the transmission delay of any data packet between the access network device and the core network device.
- the core network device determines, according to the fifth uplink delay and the uplink delay of the uplink burst between the terminal device and the access network device, that the uplink burst is between the terminal device and the core network Upstream delay between devices.
- the uplink delay between the terminal device and the core network device of the uplink burst includes: the fifth uplink delay and the uplink delay of the uplink burst between the terminal device and the access network device.
- the core network equipment adds the two delays to obtain the uplink delay between the terminal equipment and the core network equipment for an uplink burst.
- the uplink delay of the uplink burst between the terminal device and the core network device is the above-mentioned uplink delay D U-UE-UPF , and the specific description can refer to the above-mentioned related description, which will not be repeated.
- the burst monitoring method provides a method for monitoring the delay of an uplink burst.
- the core network device receives the uplink burst sent by the access network device between the terminal device and the access network device. Delay, based on the uplink delay and the fifth uplink delay of the uplink burst between the access network device and the core network device determined by the core network device itself, it is finally determined that the uplink burst is between the terminal device and the core network device. the uplink delay.
- the process of monitoring the uplink delay of the uplink burst between the terminal device and the core network device is implemented, so that the core network device can more accurately evaluate the data transmission performance based on the uplink delay for the uplink burst. to improve user experience.
- FIG. 8 and FIG. 9 a method for performing burst monitoring of downlink transmission in a scenario where DUs and CUs are separated will be described in detail below with reference to FIG. 8 and FIG. 9 .
- the network elements involved in the methods shown in FIG. 8 and FIG. 9 include: terminal equipment, SMF and UPF of core network equipment, and CU-CP and CU-UP of access network equipment.
- the methods shown in FIG. 8 and FIG. 9 are described by taking the uplink frame as an example of the uplink burst and taking the UE as an example of the terminal device.
- the upstream frame may be a video frame.
- FIG. 8 is a schematic flowchart of a method 200 for burst monitoring of uplink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- the method 200 corresponds to the embodiment of Mode 1.
- the SMF sends a PDU session resource setting request (PDU SESSION RESOURCE SETUP REQUEST) to the CU-CP, wherein the PDU SESSION RESOURCE SETUP REQUEST carries a QoS flow identifier (QFI) and a frame service quality monitoring request.
- PDU SESSION RESOURCE SETUP REQUEST carries a QoS flow identifier (QFI) and a frame service quality monitoring request.
- QFI QoS flow identifier
- the frame service quality monitoring request is used to indicate the transmission direction of monitoring, and the transmission direction includes uplink and downlink.
- the CU-CP After the CU-CP receives the frame service quality monitoring request, it can enable the DU and CU-UP to perform frame service quality monitoring function for the data radio bearer (DRB) of QFI, and enable the DU and CU-UP to open the frame monitoring function.
- DRB data radio bearer
- the transmission direction of the monitoring frame indicated by the frame service quality monitoring request is uplink transmission.
- the frame service quality monitoring request may also be referred to as a burst service quality monitoring request, and the descriptions of the two may be replaced.
- the CU-CP sends a bearer context setting request (BEARER CONTEXT SETUP REQUEST) to the CU-UP, and the BEARER CONTEXT SETUP REQUEST carries the QFI and frame service quality monitoring request.
- BEARER CONTEXT SETUP REQUEST a bearer context setting request
- the CU-UP receives the BEARER CONTEXT SETUP REQUEST sent by the CU-CP, and the CU-UP can perform the frame quality of service monitoring function for the DRB of the QFI.
- the frame service quality monitoring function may also be referred to as a burst service quality monitoring function, and the descriptions of the two may be replaced.
- the CU-CP sends a UE context setting request (UE CONTEXT SETUP REQUEST) to the DU, and the UE CONTEXT SETUP REQUEST carries the QFI and frame service quality monitoring request.
- UE CONTEXT SETUP REQUEST UE context setting request
- the DU receives the UE CONTEXT SETUP REQUEST from the CU-CP, obtains the QFI and the corresponding frame service quality monitoring request, and the DU can perform the frame service quality monitoring function for the DRB of the QFI.
- the CU-CP sends measurement configuration information (measureconfig) to the UE, where the measureconfig includes the delivery delay of the first data packet arriving at the PDCP layer in the uplink frame instructing the UE to report the DRB, and the first data packet in the uplink frame
- the delivery delay of each data packet arriving at the PDCP layer at the terminal device is the fourth upstream delay above, that is, the upstream delay D U1 .
- the UE counts the fourth uplink delay of the uplink frame of the DRB.
- the UE sends a measurement report to the CU-CP, where the measurement report carries the identifier (eg, ID) of the DRB and the fourth uplink delay D U1 of the corresponding uplink frame.
- the CU-CP receives the measurement report, and obtains the fourth uplink delay D U1 of the uplink frame corresponding to the DRB.
- the CU-CP sends the GNB-CU-CP measurement result (GNB-CU-CP MEASUREMENT RESULTS INFORMATION) to the CU-UP, and the GNB-CU-CP MEASUREMENT RESULTS INFORMATION carries the DRB identifier and the first number of the uplink frame corresponding to the DRB identifier.
- GNB-CU-CP MEASUREMENT RESULTS INFORMATION carries the DRB identifier and the first number of the uplink frame corresponding to the DRB identifier.
- Four uplink delays D U1 Four uplink delays D U1 .
- the UPF sends the DL PDU session information (DL PDU SESSION INFORMATION) to the CU-UP, and the DL PDU SESSION INFORMATION carries the QoS monitoring frame (Qos monitoring frame, QMF).
- the CU-UP receives the DL PDU SESSION INFORMATION and obtains the QMF.
- the QMF can be understood as the delay monitoring request in the method 100 .
- Table 1 shows a frame format of DL PDU SESSION INFORMATION, wherein the DL PDU SESSION INFORMATION carries a QoS monitoring frame request (QoS Monitoring frame, QMF).
- the DL PDU SESSION INFORMATION can also carry a QoS monitoring packet request (QoS monitoring packet, QMP), and the QMP is used to instruct the access network device to perform QoS monitoring of a data packet.
- QMP QoS monitoring packet request
- DL PDU SESSION INFORMATION exists in one of QMP and QMF.
- the DL PDU SESSION INFORMATION can also carry: paging policy presence (paging policy presence, PPP), reverse QoS indicator (reflective QoS indicator, RQI), paging policy indicator (paging policy indicator, PPI).
- paging policy presence paging policy presence, PPP
- reverse QoS indicator reflective QoS indicator, RQI
- paging policy indicator paging policy indicator, PPI
- the QoS monitoring frame can also be called a QoS monitoring burst, and the descriptions of the two can be replaced.
- CU-UP sends DL user data (DL USER DATA) ((PDU Type 0) to DU, and DL USER DATA carries QMF.
- DL USER DATA DL USER DATA
- DU receives DL USER DATA and obtains QMF.
- the DU determines the second uplink delay between the terminal device and the DU in the uplink frame according to the QMF received in S218.
- the second uplink time delay the time delay D U21 and the time delay D U22 .
- the DU sends UL auxiliary information data (UL ASSISTANCE INFORMATION DATA) (PDU Type 2) to the CU-UP, where the UL ASSISTANCE INFORMATION DATA carries the second uplink delay between the terminal device and the DU.
- UL ASSISTANCE INFORMATION DATA UL auxiliary information data
- the CU-UP receives the UL ASSISTANCE INFORMATION DATA to obtain the second uplink delay.
- Table 2 shows a frame format of UL ASSISTANCE INFORMATION DATA.
- the uplink frame delay result of DU ((UL frame,ULF)Delay DU Result) includes the second uplink delay of the uplink frame between the terminal device and the DU, which is represented by 0 or 4-bit number of bytes
- the uplink frame delay indication (ULF Delay Ind.) indicates whether there is a ULF Delay DU Result in the UL ASSISTANCE INFORMATION DATA, which is represented by a 1-bit number of bytes.
- ULF Delay Ind. when the value of ULF Delay Ind. is 1, it means that ULF Delay DU Result exists in UL ASSISTANCE INFORMATION DATA, and when the value of ULF Delay Ind. is 0, it means that there is no ULF Delay DU Result in UL ASSISTANCE INFORMATION DATA ULF Delay DU Result.
- the uplink frame delay result can also be called the uplink burst delay result
- the uplink frame delay flag bit can also be called the uplink burst delay flag bit. replace.
- the CU-UP determines the uplink delay of the uplink frame between the terminal device and the CU-UP according to the QMF received in S217, that is, determines the uplink time delay of the uplink frame between the terminal device and the access network device Extend D U-UE-base station .
- the CU-UP determines the uplink delay between the terminal device and the CU-UP according to the second uplink delay, the third uplink delay and the fourth uplink delay.
- the fourth uplink delay is the second uplink delay carried in the GNB-CU-CP MEASUREMENT RESULTS INFORMATION sent by the CU-CP to the CU-UP in S216.
- the second uplink delay is the third uplink delay carried in the UL ASSISTANCE INFORMATION DATA sent by the DU to the CU-UP in S220.
- the third uplink delay the delay D U23 + the delay D U24 .
- the CU-UP sends UL PDU session information (UL PDU SESSION INFORMATION) to the UPF, where the UL PDU SESSION INFORMATION carries the uplink delay D U-UE-base station between the terminal device and the CU-UP.
- UL PDU SESSION INFORMATION carries the uplink delay D U-UE-base station between the terminal device and the CU-UP.
- the UPF receives the UL PDU SESSION INFORMATION.
- the UL PDU SESSION INFORMATION carries response information in response to the QMF sent in S217, where the response information includes the uplink delay between the terminal device and the CU-UP DU-UE -base station .
- the uplink frame delay result (ULF Delay Result) includes the uplink delay of the uplink frame between the terminal device and the CU-UP, and ULF Delay Ind. indicates whether there is a ULF Delay Result in the UL PDU SESSION INFORMATION, which consists of 1-bit bytes. number representation.
- ULF Delay Ind. indicates whether there is a ULF Delay Result in the UL PDU SESSION INFORMATION, which consists of 1-bit bytes. number representation.
- ULF Delay Ind. when the value of ULF Delay Ind. is 1, it means that ULF Delay Result exists in UL PDU SESSION INFORMATION, and when the value of ULF Delay Ind. is 0, it means that ULF does not exist in UL PDU SESSION INFORMATION Delay Result.
- the UPF determines the uplink delay of the uplink frame between the terminal device and the UPF (ie, the core network device).
- the uplink delay includes the fifth uplink delay D U-base station -UPF of the uplink frame at UPF and CU-UP, and the uplink delay D U -UE-base station of the uplink frame at the terminal equipment and CU-UP.
- the UPF determines the uplink delay D U-UE-UPF of the uplink frame between the terminal device and the UPF according to the fifth uplink delay and the uplink delay of the uplink frame at the terminal device and the CU-UP.
- the uplink delay determined in the above embodiment includes the fourth uplink delay D U1 .
- the uplink delay does not include the fourth uplink delay D U1 , as another specific embodiment in the scenario where the DU and the CU are separated, It can be performed with reference to the embodiment of FIG. 8 .
- the method for monitoring the uplink time delay is slightly different: in this embodiment, S214 to S216 are omitted, and all information about the fourth uplink time delay D U1 is omitted in S219 to S223 content can be.
- FIG. 9 is a schematic flowchart of a method 300 for burst monitoring of uplink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- the method 300 corresponds to the embodiment of Mode 2.
- each network element performing S311 to S318 is the same as the process of each network element performing S211 to S218 in the method 200, which is not repeated here, and the process of S319 to S323 is described below.
- the DU determines the first time according to the QMF received in S318, and the first time is the authorization time of the first data packet in the uplink frame that reaches the MAC layer of the terminal device.
- the first time is the above time T U1.3 , and the specific description refers to the above related description, which is not repeated here.
- the DU sends UL ASSISTANCE INFORMATION DATA (PDU Type 2) to the CU-UP, and the UL ASSISTANCE INFORMATION DATA carries the first time.
- PDU Type 2 UL ASSISTANCE INFORMATION DATA
- Table 4 shows a frame format of ASSISTANCE INFORMATION DATA.
- the uplink frame timestamp result of the DU ((UL frame, ULF) Timestamp DU Result) includes the grant time (ie, the first time) of the first data packet in the uplink frame, and the uplink frame delay indication (ULF Delay Ind.) Indicates whether ULF Timestamp DU Result exists in ASSISTANCE INFORMATION DATA. Exemplarily, when the value of ULF Delay Ind. is 1, it means that there is a ULF Timestamp DU Result in the ASSISTANCE INFORMATION DATA, and when the value of ULF Delay Ind. is 0, it means that there is no ULF Timestamp DU Result.
- the uplink frame time stamp result may also be referred to as the uplink burst time stamp result, and the descriptions of the two may be replaced.
- the CU-UP determines the uplink time delay of the uplink frame between the terminal device and the CU-UP, thereby determining the uplink time delay D U-UE-base station of the uplink frame between the terminal device and the access network device.
- the uplink delay includes the fourth uplink delay submitted by the terminal device of the uplink frame, the first uplink delay from the first time to the second time, and the second time is the last uplink frame sent from the PDCP layer of the CU the sending time of the packet.
- the CU-UP determines the uplink delay D U-UE-base station between the terminal device and the CU-UP (ie, core network device) according to the fourth uplink delay, the first time and the second time.
- the fourth uplink delay is the fourth uplink delay carried in the GNB-CU-CP MEASUREMENT RESULTS INFORMATION sent by the CU-CP to the CU-UP in S316.
- the CU-UP sends the UL PDU SESSION INFORMATION to the UPF, where the UL PDU SESSION INFORMATION carries the uplink delay between the terminal device and the CU-UP DU-UE -base station .
- the UPF determines the uplink time delay D U-UE-UPF between the terminal device and the UPF (ie, the core network device) of the uplink frame.
- each network element performing S322 to S323 is the same as the process of each network element performing S222 to S223 in method 200, and details are not repeated here.
- the uplink delay determined in the above embodiment includes the fourth uplink delay.
- the uplink delay does not include the fourth uplink delay
- FIG. 9 implementation of the example since there is no need to determine the fourth uplink delay, the method for monitoring the uplink delay is slightly different: compared with case 1, in this case, S314 to S316 are omitted, and the fourth uplink delay is omitted in S321 to S323 content can be.
- the embodiment of the present application also provides a method for burst monitoring.
- the method provides that the core network device determines the uplink delay of the uplink burst between the terminal device and the core network device mainly based on the first time and the end time of the uplink burst between the terminal device and the core network device, compared to The uplink delay obtained by calculating the delay in segments of each network element is more accurate.
- FIG. 10 is a schematic flowchart of a method 400 for burst monitoring of uplink transmission provided by an embodiment of the present application.
- the core network device sends a delay monitoring request to the access network device, where the delay monitoring request is used to instruct to perform delay monitoring on periodic bursts.
- the access network device determines a first time in response to the delay monitoring request, where the first time is the authorization time of the first data packet in the uplink burst that reaches the MAC layer of the terminal device.
- the access network device may determine the first time according to the UL grant. For a specific description, refer to the relevant description of the access network device determining the first time in Mode 2 above, which will not be repeated here.
- the access network device sends response information to the core network device, where the response information includes the first time.
- the response information may be a single piece of information, or may be content carried in other information, which is not limited in any embodiment of the present application.
- the response information may be a field carried in a UL PDU SESSION INFORMATION frame.
- the core network device determines the arrival time of the last data packet arriving at the core network device in the uplink burst.
- the arrival time can be understood as the end time of the uplink burst between the terminal device and the core network device.
- the arrival time is the above time T U3 , and the specific description refers to the above related description, which will not be repeated.
- the core network device determines the uplink delay between the terminal device and the core network device for the uplink burst according to the first time and the arrival time.
- the uplink delay between the terminal device and the core network device of the uplink burst is the above-mentioned uplink delay D U-UE-UPF , including the duration from the first time to the arrival time.
- the authorization time ie, the first time
- the authorization time ie, the first time
- An arrival time to the core network equipment determines the uplink delay of the uplink burst between the terminal equipment and the core network equipment.
- the uplink delay D U-UE-UPF of the uplink burst between the terminal device and the core network device further includes a fourth uplink delay. Based on this, the method 400 further includes:
- the core network device receives the fourth uplink delay from the terminal device
- the core network device determines the uplink delay of the uplink burst between the terminal device and the core network device according to the fourth uplink delay, the first time and the arrival time.
- the terminal device sends the fourth uplink delay to the core network device through the access network device.
- the response information sent by the access network device includes the first time and the fourth uplink delay.
- FIG. 11 is a schematic flowchart of a method 500 for burst monitoring of uplink transmission in a scenario where DUs and CUs are separated, provided by an embodiment of the present application.
- the method 500 is a more specific embodiment of the method 400 .
- the network elements involved in the method shown in FIG. 11 include: terminal equipment, SMF and UPF of core network equipment, and CU-CP and CU-UP of access network equipment.
- the method shown in FIG. 11 is described by taking the uplink frame as an example of the uplink burst and taking the UE as an example of the terminal device.
- the upstream frame may be a video frame.
- each network element performing S511 to S518 is the same as the process of each network element performing S211 to S218 in the method 200, which is not repeated here, and the process of S518 to S522 is described below.
- the DU determines the first time according to the QMF received in S518, where the first time is the authorization time of the first data packet in the uplink frame that arrives at the MAC layer of the terminal device.
- the DU sends UL ASSISTANCE INFORMATION DATA (PDU Type 2) to the CU-UP, and the UL ASSISTANCE INFORMATION DATA carries the first time.
- PDU Type 2 UL ASSISTANCE INFORMATION DATA
- the CU-UP sends the UL PDU SESSION INFORMATION to the UPF, and the UL PDU SESSION INFORMATION carries the first time and the fourth uplink delay.
- the fourth uplink delay is the fourth uplink delay carried in the GNB-CU-CP MEASUREMENT RESULTS INFORMATION sent by the CU-CP to the CU-UP in S516.
- the UL PDU SESSION INFORMATION carries the response information in response to the QMF sent in S517, and the response information includes the first time and the fourth uplink delay.
- Table 5 shows a frame format of UL PDU SESSION INFORMATION.
- the uplink frame timestamp result (ULF Timestamp Result) includes the first time and the fourth uplink delay, and ULF Delay Ind. indicates whether there is a ULF Timestamp Result in the UL PDU SESSION INFORMATION.
- ULF Delay Ind. indicates whether there is a ULF Timestamp Result in the UL PDU SESSION INFORMATION.
- ULF Delay Ind. when the value of ULF Delay Ind. is 1, it means that there is a ULF Timestamp Result in the UL PDU SESSION INFORMATION, and when the value of ULF Delay Ind. is 0, it means that there is no ULF Timestamp Result.
- the UPF determines the uplink delay D U-UE-UPF between the terminal device and the UPF (ie, the core network device) of the uplink frame according to the first time, the arrival time and the fourth uplink delay.
- the uplink delay D U-UE-UPF includes the fourth uplink delay and the duration from the first time to the arrival time.
- the uplink delay D U-UE-UPF determined in the above embodiment includes the fourth uplink delay.
- the CU-UP sends the The UPF sends the UL PDU SESSION INFORMATION, and the UL PDU SESSION INFORMATION carries the first time.
- the UPF determines, according to the first time and the arrival time, the duration of the uplink frame between the terminal device and the UPF (ie, the core network device). Uplink delay D U-UE-UPF .
- the time delay of the uplink burst is described in detail above with reference to FIGS. 3 to 11 , and the time delay of the downlink burst is described in detail below with reference to FIGS. 12 to 20 .
- the 5G protocol architecture UPF as an example of core network equipment, and a downlink burst including 4 data packets are used as an example for description, wherein the 4 data packets are recorded as data packet 1, data packet 2, and data packet 3 respectively. and packet 4.
- Figure 12 shows a schematic diagram of transmission of downlink bursts in a scenario where each protocol layer is delivered in sequence.
- the UPF sends four data packets to the SDAP layer of the access network device, and the access network device sequentially delivers the four data packets to the MAC layer of the access network device in order from top to bottom.
- the access network device sends 4 data packets to the access network device, and the 4 data packets reach the MAC layer of the terminal device from the MAC layer of the access network device.
- the packet is delivered to the SDAP layer of the end device.
- the terminal device For each successfully received data packet, the terminal device sends feedback information from the MAC layer of the terminal device to the MAC layer of the access network device to indicate that the terminal device successfully received the data packet.
- the feedback information may be a correct acknowledgement (Acknowledge, ACK).
- Acknowledge, ACK Only when the access network device successfully receives the feedback information, it means that the data packet corresponding to the feedback information has been successfully received and the downlink transmission of the data packet is completed. Assuming that the terminal device successfully receives 4 data packets, it will send 4 pieces of feedback information to the MAC layer of the access network device. Only the feedback information (eg, ACK) of the data packet 4 is shown in FIG. 12 , and the rest are not shown. .
- FIG. 13 is a schematic diagram of downlink burst transmission in the scenario of RLC layer segmentation. It is assumed that downlink bursts are delivered in sequence at each protocol layer.
- the UPF sends 4 data packets to the SDAP layer of the access network device, the access network device submits them in order from top to bottom, and submits the 4 data packets to the RLC layer in the form of RLC SDUs Then, the access network device segments the downlink burst data packets. It is assumed that the access network device divides the data packet 4 into two segments at the RLC layer, which are denoted as data packet 4.1 and data packet 4.2. The access network device sends data packet 1, data packet 2, data packet 3, data packet 4.1 and data packet 4.2 from the RLC layer in the form of RLC PDUs and delivers them to the MAC layer in sequence. The access network device sends the five data packets to the terminal device, and the five data packets reach the MAC layer of the terminal device from the MAC layer of the access network device.
- the terminal device Assuming that the terminal device successfully receives the 5 data packets, it will send 5 pieces of feedback information to the MAC layer of the access network device.
- Figure 13 only shows the feedback information (eg, ACK) of the last data packet 4.2, and the rest Not shown.
- the terminal device delivers the 5 data packets from the MAC layer to the RLC layer, and the terminal device needs to reassemble the previously segmented data packet 4 (ie, RLC SDU) to restore the previously segmented data packet 4 (RLC SDU) Fragmented packet 4. That is, the terminal device reassembles the data packet 4.1 and the data packet 4.2 and restores the original data packet 4. In this way, the terminal device delivers the four data packets from the RLC layer to the SDAP layer of the terminal device.
- RLC SDU previously segmented data packet 4
- RLC SDU previously segmented data packet 4
- FIG. 14 is a schematic diagram of transmission in a scenario where downlink bursts arrive out of sequence during air interface transmission.
- the UPF sends 4 data packets to the SDAP layer of the access network device
- the access network device delivers the 4 data packets in order from top to bottom, and delivers the 4 data packets to the MAC layer of the access network device.
- the access network device sends 4 data packets to the terminal device, and the 4 data packets arrive from the MAC layer of the access network device to the MAC layer of the terminal device.
- the data packets arrive out of sequence. That is, packet 4 arrives at the MAC layer of the terminal device earlier than packet 3.
- the terminal device Assuming that the terminal device successfully receives the 4 data packets, it will send 4 feedback information to the MAC layer of the access network device. Only the feedback information (eg, ACK) of the last data packet 4 is shown in FIG. 14 , and the rest Not shown.
- ACK feedback information
- the terminal device In the process of submitting data packets by the terminal device, the terminal device submits 4 data packets to the PDCP layer in the order of data packet 1, data packet 2, data packet 4 and data packet 3, and the sequential delivery is configured in the PDCP layer. No matter in which order the four data packets arrive at the PDCP layer, the terminal device will send the four data packets from the PDCP layer to the SDAP in the order of the original data packet 1, data packet 2, data packet 3, and data packet 4. Floor.
- the terminal device when the PDCP layer is configured with out-of-order delivery, the terminal device will send four data packets in chronological order, that is, the data packets that arrive at the PDCP layer first are sent first, and then the data packets that arrive at the PDCP layer are sent. sent out later. In the scenario shown in Figure 14, the terminal device will continue to send four data packets to the SDAP in the order of data packet 1, data packet 2, data packet 4, and data packet 3.
- Figure 15 shows a schematic diagram of uplink burst transmission in a scenario where packets are lost and arrive out of sequence.
- the UPF sends 4 data packets to the SDAP layer of the access network device, and the 4 data packets arrive at the SDAP layer of the access network device.
- Each data packet is delivered to the MAC layer of the access network device.
- the access network device sends 4 data packets to the terminal device, and the 4 data packets reach the MAC layer of the terminal device from the MAC layer of the access network device.
- packet loss and out-of-order arrival occurred.
- the phenomenon is that the data packet 3 does not reach the MAC layer of the access network device, and the data packet 4 arrives at the MAC layer of the access network device earlier than the time when the data packet 3 should arrive.
- Figure 15 only shows the feedback information of the last data packet 4 (for example, , ACK), the rest are not shown.
- the terminal device sequentially submits the received data packet 1, data packet 2 and data packet 4 to the PDCP layer in the order from bottom to top.
- the terminal device sequentially submits the received data packet 1, data packet 2 and data packet 4 to the PDCP layer in the order from bottom to top.
- the terminal device sequentially submits the received data packet 1, data packet 2 and data packet 4 to the PDCP layer in the order from bottom to top.
- the terminal device still waits for the data packet 3, and only after the data packet 3 is not received within a preset period of time will the data packet 4 be submitted to the SDAP layer.
- the downlink delay between the terminal equipment and the access network equipment of a downlink burst is recorded as D D-UE-base station
- the downlink delay between the terminal equipment and the core network equipment of a downlink burst is The downlink delay is recorded as D D-UE-UPF
- the downlink delay of a downlink burst between the access network equipment and the core network equipment is recorded as D D -base station-UPF .
- Downlink delay D D -base station-UPF indicates that the first data packet sent from the core network device in the downlink burst (for example, the data packet 1 shown in Figure 12 to Figure 15 ) is between the core network device and the access network device.
- time delay for example, the time length corresponding to the downlink delay D D -base station-UPF shown in FIG. 12 to FIG. 15 . It should be understood that the downlink delay D D -base station-UPF is a delay of a packet granularity.
- the downlink delay D D -base station-UPF includes the duration from time T D0 to time T D1.1 .
- Time T D0 is the sending time of the first data packet sent from the core network device in the downlink burst, for example, the start time of the duration corresponding to the downlink delay D D -base station-UPF shown in FIG. 12 to FIG. 15 .
- the time T D0 may be the sending time of the first data packet sent from the GTP tunnel exit of the interface (eg, the N3 interface) of the core network device and the access network device in the downlink burst.
- the time T D0 may be determined according to the average value of the sending time of the data packets sent from the GTP tunnel egress of the core network device for the downlink burst data packets.
- the time T D1.1 is the arrival time of the first data packet in the downlink burst that arrives at the access network device.
- the time T D1.1 may be the arrival time of the first data packet in the downlink burst that arrives at the GTP tunnel entry of the interface (eg, the N3 interface) between the access network device and the core network device.
- the interface eg, the N3 interface
- the time T D1.1 may be the arrival time of the first data packet in the downlink burst that arrives at the SDAP layer of the access network device.
- the time T D1.1 can also be any of the following:
- the time T D1.1 may be the arrival time of the first data packet in the downlink burst that reaches the PDCP layer of the access network device, for example, the downlink delay D D- The end time of the duration corresponding to the base station-UPF .
- the time T D1.1 may be the arrival time of the first data packet sent by the PDCP layer of the access network device in the downlink burst.
- case 1 There are two possible cases (case 1 and case 2) of the downlink delay D D-UE-base station in the embodiment of the present application, and the downlink delay D D-UE- base station is described below according to the cases.
- the downlink delay D D-UE-base station includes the downlink delay D D1 and the downlink delay D D2 .
- the downlink delay D D1 can be understood as the time length from the time when the access network device receives the downlink burst from the core network device to the time when the terminal device sends or the access network device receives the last feedback information.
- the downlink delay D D2 can be understood as the delay of the downlink burst delivered at each protocol layer of the terminal device.
- downlink delay D D1 and the downlink delay D D2 are described in detail.
- the downlink delay D D1 includes the duration from T D1.1 to the time T D3 , for example, the duration corresponding to D D1 in FIGS. 12 to 15 .
- the time T D3 can be understood as the time when the terminal device successfully receives the last data packet of the downlink burst. Because the feedback information can indicate whether the terminal device successfully receives the data packet, in this embodiment of the present application, the terminal device sends or the access network device receives the data packet. The time of the last feedback information represents time T D3 .
- the time TD3 is the arrival time of the last feedback information arriving at the MAC layer of the access network device, where the last feedback information is used to indicate that the terminal device successfully receives one data packet of the downlink burst.
- the time T D3 is the transmission time of the last feedback information sent by the terminal device from the physical layer of the terminal device.
- T D3 of this example is the time when the access network equipment is configured.
- the access network device schedules transmission of downlink data packets to the UE, and in order to receive HARQ feedback, the access network device may send indication information to the UE for indicating the time at which the terminal device sends the feedback information.
- the time for sending the feedback information indicated by the indication information is the time T D3 .
- the feedback resources of multiple downlink data packets scheduled and transmitted by the access network device to the UE may be the same, and the terminal device may send multiple feedback information simultaneously on the same feedback resource.
- the data packet corresponding to the last feedback information in this embodiment of the present application indicates the last data packet in the downlink burst that is successfully received by the terminal device, and the last data packet in the downlink burst that is successfully received by the terminal device may be a downlink burst. Any packet in a burst.
- the last data packet in the downlink burst that is successfully received by the terminal device may be the last data packet in the downlink burst that reaches the MAC layer of the access network device, and the last data packet in the downlink burst that is successfully received by the terminal device It can also be other data packets in a downlink burst, depending on the successful reception of the data packets by the terminal device.
- four data packets arrive at the terminal device in the order of data packet 1, data packet 2, data packet 3 and data packet 4.
- the four data packets are successfully received by the terminal device at one time, and the terminal device can send the four data packets in sequence.
- Packet feedback Then, in this case, the last feedback information corresponds to the last data packet 4 that reaches the MAC layer of the terminal device.
- data packets arrive at the terminal device in the order of data packet 1, data packet 2, data packet 3 and data packet 4.
- Data packet 1, data packet 2 and data packet 4 are successfully received by the terminal device at one time, but the data Packet 3 needs to be retransmitted multiple times to be successfully received by the terminal device.
- the terminal device sends the feedback information of the three data packets in turn, and subsequently sends the feedback information after the data packet 3 is successfully retransmitted multiple times. Then, in this case, the last feedback information corresponds to the data packet 3 that arrives at the MAC layer before the data packet 4.
- the terminal device will send a feedback message for each segment of the complete data packet. If a segment of the complete data packet is successfully received by the terminal device at last, then, in this case, the data packet corresponding to the last feedback information is a segment of the complete data packet.
- data packet 4 is divided into data packet 4.1 and data packet 4.2, data packet 4 is a complete data packet, and data packet 4.2 is the last successfully received by the terminal device. Then, the data packet corresponding to the last feedback information is the data packet 4.2.
- the downlink delay D D1 includes three parts of the delay, and the three parts of the delay include the delay D D11 , the delay D D12 and the delay D D13 .
- the time delay D D11 can be understood as the time delay for the CU to process the data packet, including the time duration from time T D1.1 to time T D1.2 .
- the duration corresponding to D D11 in FIG. 12 to FIG. 15 can be understood as the time delay for the CU to process the data packet, including the time duration from time T D1.1 to time T D1.2 .
- the time T D1.2 is the transmission time of the first data packet (eg, data packet 1 shown in FIGS. 12 to 15 ) sent from the PDCP layer of the CU in the downlink burst.
- the first data packet eg, data packet 1 shown in FIGS. 12 to 15
- T D1.2 may also be the first data packet in the downlink burst sent from the GTP tunnel egress of the F1-U interface of the CU (for example, the data packet 1 shown in FIG. 12 to FIG. 15 ) sending time.
- the time delay D D12 can be understood as the time delay of data packet transmission between CU and DU, including the time duration from T D1.2 to time T D1.3 , for example, the time duration corresponding to D D12 in FIG. 12 to FIG. 15 .
- the time T D1.3 is the arrival time of the first data packet (eg, data packet 1 shown in FIGS. 12-15 ) in the downlink burst that arrives at the RLC layer of the DU.
- T D1.3 may also be the first data packet (for example, data packet 1 shown in FIG. 12 to FIG. 15 ) that reaches the GTP tunnel entry of the F1-U interface of the DU in the downlink burst. Time of arrival.
- the delay D D13 can be understood as the sum of the delay of DU processing data packets and the air interface delay of downlink bursts in the access network equipment and terminal equipment.
- the delay D D13 includes the duration from time T D1.3 to time T D3 , for example, the duration corresponding to the time delay D D13 in FIG. 12 to FIG. 15 .
- the downlink delay D D2 can be understood as the delay of the downlink burst delivered at each protocol layer of the terminal device.
- the downlink delay D D2 includes the duration from time T D2.1 to time T D2.2 , for example, the duration corresponding to D D2 in FIGS. 12 to 15 .
- Time T D2.1 is the last packet in the downlink burst that reaches the MAC layer of the terminal device (eg, packet 4 in Figure 12, packet 4.2 in Figure 13, packet 3 in Figure 14, packet in Figure 15 4) the arrival time.
- the last data packet in the downlink burst that reaches the MAC layer of the terminal device in the embodiment of the present application is a certain segment of the complete data packet.
- the last data packet to reach the MAC layer of the terminal device is data packet 4.2.
- the time T D2.2 is the transmission time of the last data packet (eg, data packet 4 of FIGS. 12 to 15 ) sent from the PDCP layer of the terminal device in the downlink burst.
- the sending time of the data packet sent from the PDCP layer of the terminal device in this embodiment of the present application represents the time when the data packet is sent from the PDCP layer to the upper layer, and in 5G, it indicates that the data packet is sent from the PDCP layer to the SDAP layer. In 4G, it indicates the sending time of sending the data packet from the PDCP layer to the application layer.
- the downlink delay D D-UE-base station includes the downlink delay D D1 , and does not involve the downlink delay D D2 delivered by the downlink burst at each protocol layer of the terminal device.
- D D1 For a specific description of the downlink delay D D1 , reference may be made to the relevant description of the above case 1, and details are not repeated here.
- the downlink delay D D-UE-UPF represents the downlink burst delay between the terminal equipment and the core network equipment, including the downlink delay D-UE-base station and the downlink delay D D -base station-UPF .
- the downlink delay D-UE- base station and the downlink delay D D -base station-UPF reference may be made to the above related description, and details are not repeated here.
- FIG. 16 is a schematic flowchart of a method 600 for burst monitoring of downlink transmission provided by an embodiment of the present application.
- the core network device sends a delay monitoring request to the access network device, where the delay monitoring request is used to instruct to perform delay monitoring on periodic bursts.
- the downlink burst in this embodiment of the present application is periodic, and the delay monitoring request is used to instruct to perform delay monitoring on the downlink burst of each cycle in one or more cycles, so as to determine that the periodic downlink burst is at the terminal The transmission delay between the device and the access network device.
- the delay monitoring request may be a single piece of information, or may be content carried in other information, which is not limited in any embodiment of the present application.
- the delay monitoring request may be a field carried in the DL PDU SESSION INFORMATION.
- the access network device determines the downlink delay between the terminal device and the access network device for a downlink burst, and the downlink burst occurs between the terminal device and the access network.
- the downlink delay between devices includes the first downlink delay, and the first downlink delay includes the duration from the first time to the second time, and the first time is the first time in the downlink burst to reach the receiver.
- the access network device receives the delay monitoring request, and determines the downlink delay between the terminal device and the access network device in the downlink burst.
- the first time can be understood as the start time of the downlink burst between the terminal device and the access network device
- the second time can be understood as the start time of the downlink burst between the terminal device and the access network device End Time.
- the downlink delay between the terminal equipment and the access network equipment of the downlink burst is the uplink delay D D-UE-base station described above, and the first downlink delay is the above delay D D1 ,
- the first time is the above time T D1.1
- the second time is the above time T D3 .
- the delay D D1 , the time T D1.1 , and the time T D3 reference may be made to the above related descriptions, which will not be repeated.
- the access network device may determine, according to the burst number of the downlink burst, the first data packet in the downlink burst that reaches the PDCP layer of the access network device.
- the access network device may determine, according to the change of the burst number of the downlink burst, the first data packet in the downlink burst that reaches the PDCP layer of the access network device. For example, the PDCP layer of the access network device firstly receives the downlink burst data packet with the burst number 1, and then receives the downlink burst data packet with the burst number 2, because the burst number has changed from 1 to 1. 2, means that the downlink burst with burst number 1 has been sent. Then, the first time that the PDCP layer of the access network device receives the data packet of the downlink burst with the burst number of 2 is the first data packet that reaches the PDCP layer of the access network device.
- the access network device may determine, according to the period to which the downlink burst belongs, the first data packet in the downlink burst that reaches the PDCP layer of the access network device.
- the access network device may start monitoring from the start time of a cycle, and the first data packet received by the PDCP layer of the access network device in this cycle is the downlink burst transmitted in the cycle. first packet.
- the manner in which the access network device determines the first data packet arriving at a certain protocol layer of the access network device in the downlink burst may be determined based on the number or period of the downlink burst, and , the manner in which the access network device determines the first data packet sent from a certain protocol layer of the access network device in the downlink burst can also be determined based on the number or period of the downlink burst.
- the specific process reference may be made to the description here, which will not be repeated hereafter.
- the access network device may determine the last feedback information arriving at the MAC layer of the access network device according to the burst number of the downlink burst.
- the access network device may determine the last feedback information for the downlink burst that reaches the MAC layer of the access network device according to the change of the burst number of the downlink burst. For example, the MAC layer of the access network device first receives the feedback information of the downlink burst data packet whose burst number is 1, and subsequently receives the feedback information of the downlink burst data packet whose burst number is 2. The number has changed from 1 to 2, which means that the feedback information of the data packet of the downlink burst whose burst number is 1 has been sent.
- the last feedback information before the MAC layer of the access network device starts to receive the feedback information of the downlink burst whose burst number is 2 is the MAC layer that reaches the access network device in the downlink burst whose burst number is 1. the last feedback.
- the terminal device can also determine the last feedback information sent from the physical layer of the terminal device according to the burst number of the downlink burst, and the specific description can refer to the above description, which will not be repeated.
- the burst monitoring method provides a method for monitoring the delay of a downlink burst.
- the access network device determines the downlink delay based on a delay monitoring request for the downlink burst sent by the core network device.
- the downlink delay includes the first downlink delay from the first time to the second time, and the first time is the first time in the downlink burst that reaches the PDCP layer of the packet data convergence protocol of the access network device
- the arrival time of the data packet, the second time is the arrival time of the last feedback information arriving at the MAC layer of the access network device or the sending time of sending the last feedback information from the physical layer of the terminal device.
- the process of monitoring the downlink delay between the terminal device and the access network device through the access network device is implemented, so that the access network device can more accurately determine the downlink delay based on the downlink burst for the downlink burst. Evaluate data transfer performance to improve user experience.
- the downlink delay of the downlink burst between the terminal device and the access network device further includes a fourth downlink delay, and the fourth downlink delay includes a time period from the fourth time to the fifth time. duration, the fourth time is the arrival time of the last data packet in the downlink burst that reaches the MAC layer of the terminal device, and the fifth time is the last packet in the downlink burst sent from the PDCP layer of the terminal device the sending time of the packet.
- the fifth time can be understood as the end time of the downlink burst between the terminal device and the access network device.
- the fourth downlink delay is the above downlink delay D D2
- the fourth time is the above time T D2.1
- the fifth time is the above time T D2.2 .
- the terminal device determines the fourth downlink delay, and sends the fourth downlink delay to the access network device, correspondingly, the access network device receives the fourth downlink delay;
- the access network device determines the first downlink delay, and determines the downlink delay of the downlink burst at the terminal device and the access network device according to the fourth downlink delay and the first downlink delay.
- the terminal device may count the fourth downlink delays of multiple downlink bursts to obtain an average value of the multiple fourth downlink delays, and the average value may be used as the fourth downlink delay of the downlink bursts.
- the downlink delay between the terminal device and the access network device of the downlink burst includes: a first downlink delay and a fourth downlink delay. To put it simply, the access network device adds the two delays to obtain the downlink delay between the terminal device and the access network device for a downlink burst.
- the terminal device may determine the last data packet in the downlink burst that reaches the MAC layer of the terminal device according to the period to which the downlink burst belongs.
- the terminal device may start monitoring from the start time of a cycle, and the last data packet received from the MAC layer in this cycle is the last one in the downlink burst transmitted in the cycle to reach the MAC layer of the terminal device. the data package.
- the manner in which the terminal device determines the last data packet in the downlink burst that reaches a certain protocol layer of the terminal device may be determined based on the period of the downlink burst, and the terminal device determines the downlink burst.
- the manner of sending the last data packet sent from a certain protocol layer of the terminal device may also be determined based on the period of the downlink burst. For the specific process, please refer to the description here, which will not be repeated hereafter.
- the downlink delay between the terminal device and the access network device of the downlink burst also includes the delay of the downlink burst delivered at each protocol layer of the terminal device, which can make the access
- the network device can more accurately monitor the downlink delay of the downlink burst, so that the access network device can more accurately evaluate the data transmission performance based on the downlink delay for the downlink burst, so as to further improve the user experience.
- the embodiment of the present application provides two methods for monitoring downlink delay (referred to as mode A and mode B).
- Method A is mainly to count the downlink delay between the terminal equipment and the access network equipment in subsections, so as to obtain the downlink delay of the downlink burst between the terminal equipment and the access network equipment, which can be applied to the access network equipment.
- Mode B mainly determines the downlink delay of the downlink burst between the terminal device and the access network device based on the first time and the second time of the downlink burst.
- Mode B is not limited to the scenario where the DU is separated from the CU, and can also be applied to the DU Scenarios that are not separated from the CU.
- the access network device mainly collects statistics on two delays, that is, the second downlink delay and the third downlink delay.
- the first downlink delay includes a second downlink delay and a third downlink delay
- the second downlink delay includes the duration from the third time to the second time
- the third downlink delay includes the time from the third time to the second time. The duration from the first time to the third time, where the third time is the arrival time of the first data packet arriving at the radio link control RLC layer of the access network device in the downlink burst.
- the first time is the arrival time of the first data packet in the downlink burst that reaches the PDCP layer of the packet data convergence protocol of the access network device, which is the above time T D1.1 .
- the second time is the arrival time of the last feedback information arriving at the MAC layer of the access network device or the sending time of sending the last feedback information from the physical layer of the terminal device, which is the above time T D3 .
- the third time is the above time T D1.3 . For the specific description of each time, reference may be made to the above related description, which will not be repeated.
- the first time is the arrival time of the first data packet arriving at the PDCP layer of the CU in the downlink burst
- the second time is the last feedback arriving at the MAC layer of the DU
- the third time is the arrival time of the first data packet arriving at the RLC layer of the DU in the downlink burst.
- the second downlink delay is the above delay D D13
- the third downlink delay includes the above delay D D11 and D D12 .
- each delay please refer to the above related descriptions. Repeat.
- the downlink delay between the terminal device and the access network device of the downlink burst includes the first downlink delay and the fourth downlink delay.
- the access network device determines the downlink delay between the terminal device and the access network device in response to the delay monitoring request, including:
- the access network device determines the second downlink delay and the third downlink delay in response to the delay monitoring request;
- the access network device determines the fourth downlink delay
- the access network device determines the downlink time of the downlink burst between the terminal device and the access network device according to the second downlink delay, the third downlink delay and the fourth downlink delay extension.
- the access network device receives the fourth downlink delay sent from the terminal device to determine the fourth downlink delay, and the fourth downlink delay is the above downlink delay D D2 .
- the fourth downlink delay is the above downlink delay D D2 .
- the access network device determines the downlink delay between the terminal device and the access network device in response to the delay monitoring request, including:
- the DU determines the second downlink delay in response to the delay monitoring request
- the DU sends the second downlink delay to the CU
- the CU determines the fourth downlink delay
- the CU determines the third downlink delay in response to the delay monitoring request
- the CU determines the downlink delay of the downlink burst between the terminal device and the access network device according to the second downlink delay, the third downlink delay and the fourth downlink delay.
- the terminal device sends the fourth downlink delay to the CU, so that the CU determines the fourth downlink delay.
- the DU may determine the second downlink delay according to the third time and the second time, that is, the DU first determines the third time and the fifth time, and then determines the second downlink delay.
- the CU may determine the third downlink delay according to the first time and the third time, that is, the CU first determines the first time and the third time, and then determines the third downlink delay.
- the CU may determine the third downlink delay according to the delays D D11 and D D12 , that is, the CU first determines the delays D D11 and D D12 , and then determines the third downlink delay.
- the third downlink delay is determined by the CU-UP, and, according to the third downlink delay, the second downlink delay and the fourth downlink delay Downlink delay: determine the downlink delay between the terminal device and the access network device for the downlink burst.
- the method for burst monitoring supports the scenario in which the DU and CU of the access network device are separated.
- the DU reports to the CU the second downlink delay of the downlink burst between the DU and the terminal device.
- delay which determines the downlink delay of the downlink burst at the terminal equipment and the access network equipment. That is, by segmenting DUs and CUs to count their own-related delays, it is possible to monitor the downlink delays of downlink bursts in a scenario where DUs and CUs are separated.
- the downlink delay between the terminal device and the access network device of the downlink burst includes the first downlink delay and does not include the fourth downlink delay.
- the access network device determines the downlink delay between the terminal device and the access network device in response to the delay monitoring request, including:
- the access network device determines the second downlink delay and the third downlink delay in response to the delay monitoring request;
- the access network device determines the downlink delay between the terminal device and the access network device for the downlink burst according to the second downlink delay and the third downlink delay.
- the access network device determines the downlink delay between the terminal device and the access network device in response to the delay monitoring request, including:
- the DU determines the second downlink delay in response to the delay monitoring request
- the DU sends the second downlink delay to the CU
- the CU determines the third downlink delay in response to the delay monitoring request
- the CU determines the downlink delay between the terminal device and the access network device for the downlink burst according to the second downlink delay and the third downlink delay.
- the CU-UP determines the third downlink delay, and, according to the third downlink delay and the second downlink delay, determines the downlink delay The downlink delay of the burst between the terminal equipment and the access network equipment.
- the method for burst monitoring supports the scenario in which the DU and CU of the access network device are separated.
- the DU reports to the CU the second downlink delay of the downlink burst between the DU and the terminal device.
- the second downlink delay and the third uplink delay determined by the CU and generated by the transmission between the CU and the DU and the processing of the downlink burst by the CU determine the downlink delay of the downlink burst at the terminal equipment and the access network equipment. That is, by segmenting DUs and CUs to count their own-related delays, it is possible to monitor downlink delays of downlink bursts in a scenario where DUs and CUs are separated.
- the downlink delay between the terminal device and the access network device of the downlink burst includes the first downlink delay and the fourth downlink delay.
- the access network device determines the downlink delay between the terminal device and the access network device in response to the delay monitoring request, including:
- the access network device determines the first time and the second time in response to the delay monitoring request
- the access network device determines the fourth downlink delay
- the access network device determines the downlink delay between the terminal device and the access network device for the downlink burst according to the fourth downlink delay, the first time and the second time.
- the first time is the arrival time of the first data packet in the downlink burst that reaches the PDCP layer of the access network device, that is, the above time T D1.1 .
- the second time is the arrival time of the last feedback information arriving at the MAC layer of the access network device or the sending time of the last feedback information sent from the physical layer of the terminal device, which is the above time T D3 .
- the duration from the first time to the second time is the first downlink delay in this embodiment of the present application.
- the first time is the arrival time of the first data packet arriving at the PDCP layer of the CU in the downlink burst
- the second time is the last feedback arriving at the MAC layer of the DU
- the third time is the arrival time of the first data packet arriving at the RLC layer of the DU in the downlink burst.
- the second time is the sending time when the physical layer of the terminal device sends the last feedback information
- the second time is configured by the base station for the terminal device, and the access network device can determine the second time based on the configuration.
- the access network device schedules the transmission of downlink data packets to the UE, and in order to receive HARQ feedback, the access network device will send to the UE indication information for indicating the time at which the terminal device sends the feedback information, where the indication information indicates The time for sending the feedback information is the time T D3 .
- the access network device determines the downlink delay between the terminal device and the access network device in response to the delay monitoring request, including:
- the DU determines the second time in response to the delay monitoring request
- the DU sends the second time to the CU
- the CU determines the fourth downlink delay
- the CU determines the first time in response to the delay monitoring request
- the CU determines the downlink delay of the downlink burst between the terminal device and the access network device according to the first time, the second time and the fourth downlink delay.
- the terminal device sends the fourth downlink delay to the CU, so that the CU determines the fourth downlink delay.
- the CU-UP determines, according to the fourth downlink delay, the first time, and the second time, that the downlink burst is in the terminal device and the connection. Downlink delay between networked devices.
- the burst monitoring method supports the scenario in which the DU and the CU of the access network device are separated, and the DU reports to the CU that the downlink burst is transmitted at the second time (that is, the end of the transmission of the access network device and the terminal device) to the CU. time), based on the second time, the downlink burst determined by the CU at the first time (ie, the start time) of the CU, and the downlink burst obtained by the CU at the terminal equipment due to the fourth downlink delay generated by data submission , to determine the downlink delay of the downlink burst at the terminal equipment and the access network equipment.
- this method can obtain more accurate downlink delays of downlink bursts.
- the downlink delay between the terminal device and the access network device of the downlink burst includes the first downlink delay and does not include the fourth downlink delay.
- the access network device determines the downlink delay between the terminal device and the access network device in response to the delay monitoring request, including:
- the access network device determines the first time and the second time in response to the delay monitoring request
- the access network device determines the downlink delay between the terminal device and the access network device in the downlink burst according to the first time and the second time.
- the access network device determines the downlink delay between the terminal device and the access network device in response to the delay monitoring request, including:
- the DU determines the second time in response to the delay monitoring request
- the DU sends the second time to the CU
- the CU determines the first time
- the CU determines the downlink delay between the terminal device and the access network device for the downlink burst according to the first time and the second time.
- the CU-UP determines the first time, and according to the first time and the received second time, it is determined that the downlink burst is sent between the terminal device and the terminal device. Downlink delay between the access network devices.
- the burst monitoring method supports the scenario in which the DU and the CU of the access network device are separated, and the DU reports to the CU that the downlink burst is transmitted at the second time (that is, the end of the transmission of the access network device and the terminal device) to the CU. time), the CU determines the downlink delay of the downlink burst at the terminal device and the access network device based on the second time and the first time (ie, the start time) of the downlink burst determined by the CU at the CU. In this way, the process of monitoring the downlink delay of the downlink burst in the scenario where the DU and the CU are separated can be implemented. In addition, compared with the way of calculating the delay in segments of DUs and CUs, this method can obtain more accurate downlink delays of downlink bursts.
- the obtained downlink delay can also be used to determine the downlink delay between the terminal device and the core network device. Based on this, the method 600 for burst monitoring of downlink transmission in this embodiment of the present application further includes steps S630, S640 and S650.
- the access network device sends response information to the core network device, where the response information includes the downlink delay of the downlink burst between the terminal device and the access network device.
- the response information may be a single piece of information, or may be content carried in other information, which is not limited in any embodiment of the present application.
- the response information may be a field carried in the UL PDU SESSION INFORMATION.
- the core network device determines a fifth downlink delay, where the fifth downlink delay is the first data packet sent from the core network device in the downlink burst between the access network device and the core network device delay between.
- the fifth downlink delay is the above-mentioned uplink delay D D -base station-UPF , and for the specific description of the uplink delay D D -base station-UPF , reference is made to the above related description, and details are not repeated here.
- the access network device may be based on the sending time of the first data packet sent from the core network device in the downlink burst and the data packet of the first data packet arriving at the PDCP layer of the access network device in the downlink burst.
- the arrival time ie, the first time determines the fifth downlink delay.
- the fifth downlink delay represents the same data packet. is the delay of one packet. Therefore, the fifth downlink delay can also be determined based on the average value of multiple data packets (not limited to uplink data packets or downlink data packets) transmitted between the access network device and the core network device, or, the fifth downlink delay It can also be obtained based on the transmission delay of any data packet between the access network device and the core network device.
- the core network device determines, according to the fifth downlink delay and the downlink delay of the downlink burst between the terminal device and the access network device, that the downlink burst occurs between the terminal device and the core network Downlink delay between devices.
- the downlink delay between the terminal equipment and the core network equipment of the downlink burst includes: the fifth downlink delay and the downlink delay of the downlink burst between the terminal equipment and the access network equipment.
- the core network device adds the two delays to obtain the downlink delay between the terminal device and the core network device for a downlink burst.
- the downlink delay between the terminal device and the core network device of the downlink burst is the above downlink delay D D-UE-UPF , and the specific description can refer to the above related description, which will not be repeated.
- the burst monitoring method provided by the embodiment of the present application provides a method for monitoring the delay of a downlink burst.
- the core network device receives the downlink burst sent by the access network device between the terminal device and the access network device.
- Delay based on the downlink delay and the fifth downlink delay of the downlink burst between the access network device and the core network device determined by the core network device itself, it is finally determined that the downlink burst is between the terminal device and the core network device. downlink delay.
- the process of monitoring the downlink delay between the terminal device and the core network device of the downlink burst is realized, so that the core network device can more accurately evaluate the data transmission performance based on the downlink delay for the downlink burst, so as to ensure the accuracy of data transmission.
- the core network device can more accurately evaluate the data transmission performance based on the downlink delay for the downlink burst, so as to ensure the accuracy of data transmission.
- FIG. 17 and FIG. 18 a method for burst monitoring of downlink transmission in a scenario where DUs and CUs are separated will be described in detail below with reference to FIG. 17 and FIG. 18 .
- the network elements involved in the methods shown in FIG. 17 and FIG. 18 include: terminal equipment, SMF and UPF of core network equipment, and CU-CP and CU-UP of access network equipment.
- the methods shown in FIG. 17 and FIG. 18 are described by taking the downlink frame as an example of the downlink burst and the UE as an example of the terminal device.
- the downstream frame may be a video frame.
- FIG. 17 is a schematic flowchart of a method 700 for burst monitoring of downlink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- the method 700 corresponds to the embodiment of mode A.
- the SMF sends a PDU SESSION RESOURCE SETUP REQUEST to the CU-CP, wherein the PDU SESSION RESOURCE SETUP REQUEST carries a QFI and frame service quality monitoring request.
- the transmission direction of the monitoring frame indicated by the frame service quality monitoring request is downlink transmission.
- the CU-CP sends a BEARER CONTEXT SETUP REQUEST to the CU-UP, and the BEARER CONTEXT SETUP REQUEST carries a QFI and frame service quality monitoring request.
- the CU-UP receives the BEARER CONTEXT SETUP REQUEST sent by the CU-CP, and the CU-UP can perform the frame quality of service monitoring function for the DRB of the QFI.
- the CU-CP sends the UE CONTEXT SETUP REQUEST to the DU, and the UE CONTEXT SETUP REQUEST carries the QFI and frame service quality monitoring request.
- the DU receives the UE CONTEXT SETUP REQUEST from the CU-CP, obtains the QFI and the corresponding frame service quality monitoring request, and the DU can perform the frame service quality monitoring function for the DRB of the QFI.
- the CU-CP sends measurement configuration information (measureconfig) to the UE, where the measureconfig includes the delivery delay of the terminal device instructing the UE to report the last data packet to the MAC layer in the downlink frame of the DRB, and the last packet in the downlink frame arrives at the terminal device.
- the delivery delay of the data packet of the MAC layer at the terminal device is the fourth downlink delay above, that is, the downlink delay D D2 .
- the UE counts the fourth downlink delay of the downlink frame of the DRB.
- the UE sends a measurement report to the CU-CP, where the measurement report carries the DRB identifier (eg, ID) and the fourth downlink delay of the corresponding downlink frame.
- the CU-CP receives the measurement report, and obtains the fourth downlink delay of the downlink frame corresponding to the DRB.
- the CU-CP sends the GNB-CU-CP measurement result (GNB-CU-CP MEASUREMENT RESULTS INFORMATION) to the CU-UP, and the GNB-CU-CP MEASUREMENT RESULTS INFORMATION carries the DRB identifier and the first number of the downlink frame corresponding to the DRB identifier.
- GNB-CU-CP MEASUREMENT RESULTS INFORMATION carries the DRB identifier and the first number of the downlink frame corresponding to the DRB identifier.
- Four downlink delays D D2 Four downlink delays D D2 .
- the UPF sends a data frame of DL PDU SESSION INFORMATION to the CU-UP, where the data frame carries a QoS monitoring frame (Qos monitoring frame, QMF).
- QMF Qos monitoring frame
- the QMF can be understood as the delay monitoring request in the method 600 .
- Table 1 above shows an example of DL PDU SESSION INFORMATION, where QMF is carried in the DL PDU SESSION INFORMATION.
- QMF is carried in the DL PDU SESSION INFORMATION.
- CU-UP sends DL USER DATA ((PDU Type 0) to DU, and DL USER DATA carries QMF.
- the DU determines the second downlink delay of the downlink frame between the terminal device and the DU according to the QMF received in S718.
- the second downlink delay is the delay D D13 , and the specific description can refer to the above related description, which is not repeated here.
- the DU sends UL ASSISTANCE INFORMATION DATA (PDU Type 2) to the CU-UP, and the UL ASSISTANCE INFORMATION DATA carries the second downlink delay between the terminal device and the DU.
- PDU Type 2 UL ASSISTANCE INFORMATION DATA
- the downlink frame delay result of the DU ((DL frame, DLF)Delay DU Result) includes the downlink frame delay between the terminal device and the DU, which is represented by 0 or 4-bit number of bytes;
- the delay indication indicates whether there is a DLF Delay DU Result in the UL ASSISTANCE INFORMATION DATA, which is represented by a 1-bit number of bytes.
- DLF Delay Ind. when the value of DLF Delay Ind. is 1, it means that DLF Delay DU Result exists in UL ASSISTANCE INFORMATION DATA, and when the value of DLF Delay Ind. is 0, it means that there is no DLF Delay DU Result in UL ASSISTANCE INFORMATION DATA DLF Delay DU Result.
- the downlink frame delay result can also be called the downlink burst delay result
- the downlink frame delay indication can also be called the downlink burst delay indication
- the CU-UP determines the downlink delay of the downlink frame between the terminal device and the CU-UP according to the QMF received in S717, that is, determines the downlink time delay of the downlink frame between the terminal device and the access network device Extension D U-UE-base station .
- the CU-UP determines the downlink delay between the terminal device and the CU-UP according to the second downlink delay, the third downlink delay and the fourth downlink delay.
- the fourth uplink delay is the fourth uplink delay carried in the GNB-CU-CP MEASUREMENT RESULTS INFORMATION sent by the CU-CP to the CU-UP in S716.
- the second downlink delay is the second downlink delay carried in the UL ASSISTANCE INFORMATION DATA sent by the DU to the CU-UP in S720.
- the third uplink delay the delay D D11 + the delay D D12 .
- the CU-UP sends the UL PDU SESSION INFORMATION to the UPF, where the UL PDU SESSION INFORMATION carries the downlink delay D D-UE-base station between the terminal device and the CU-UP.
- the UL PDU SESSION INFORMATION carries response information in response to the QMF sent in S717, where the response information includes the downlink delay D D-UE-base station between the terminal device and the CU-UP.
- the downlink frame delay result includes the downlink delay of the downlink frame between the terminal device and the CU-UP.
- DLF Delay Ind. indicates whether there is a DLF Delay Result in the UL PDU SESSION INFORMATION, which consists of 1 bit Indicates the number of bytes. For example, when the value of DLF Delay Ind. is 1, it means that there is DLF Delay Result in UL PDU SESSION INFORMATION, and when the value of DLF Delay Ind. is 0, it means that there is no DLF Delay Result in UL PDU SESSION INFORMATION .
- the UPF determines the downlink delay of the downlink frame between the terminal device and the UPF (ie, the core network device).
- the downlink delay includes the fifth downlink delay D D -base station -UPF of the downlink frame at UPF and CU-UP, and the downlink delay D D - UE-base station of the downlink frame at the terminal equipment and CU-UP.
- the UPF determines the downlink delay D D-UE-UPF of the downlink frame between the terminal device and the UPF according to the fifth downlink delay and the downlink delay of the downlink frame between the terminal device and the CU-UP.
- the downlink delay determined in the above embodiment includes the fourth downlink delay.
- the downlink delay does not include the fourth downlink delay
- FIG. 17 implementation of the example since there is no need to determine the fourth downlink delay, the method for monitoring the downlink delay is slightly different: in this embodiment, S714 to S716 are omitted, and all the content about the fourth downlink delay can be omitted in S719 to S723 .
- FIG. 18 is a schematic flowchart of a method 800 for burst monitoring of downlink transmission in a scenario where DUs and CUs of an access network device are separated according to an embodiment of the present application.
- the method 800 corresponds to the embodiment of Mode B.
- each network element performing S811 to S818 is the same as the process of each network element performing S711 to S718 in the method 700, which will not be repeated here, and the process of S819 to S823 will be described below.
- the DU determines the second time according to the QMF received in S818, and the second time is the arrival time of the last feedback information arriving at the MAC layer of the access network device or sending the last feedback information from the physical layer of the terminal device sending time.
- the second time is the above time T D3 , and the specific description refers to the above related description, which is not repeated here.
- the DU sends UL ASSISTANCE INFORMATION DATA (PDU Type 2) to the CU-UP, and the UL ASSISTANCE INFORMATION DATA carries the second time.
- PDU Type 2 UL ASSISTANCE INFORMATION DATA
- the downlink frame timestamp result of DU ((DL frame, DLF) Timestamp DU Result) includes the second time in the downlink frame, and the downlink frame delay flag (DLF Delay Ind.) indicates whether the UL ASSISTANCE INFORMATION DATA DLF Timestamp DU Result exists. For example, when the value of DLF Delay Ind. is 1, it means that DLF Timestamp DU Result exists in UL ASSISTANCE INFORMATION DATA, and when the value of DLF Delay Ind. is 0, it means that there is no DLF Timestamp in UL ASSISTANCE INFORMATION DATA DU Result.
- the CU-UP determines the downlink delay of the downlink frame between the terminal device and the CU-UP, thereby determining the downlink delay D D-UE-base station of the downlink frame between the terminal device and the access network device.
- the downlink delay includes the fourth downlink delay submitted by the terminal device for the last data packet in the downlink frame that reaches the MAC layer, and the first downlink delay from the first time to the second time, and the first time is the downlink delay The arrival time of the first packet in the frame that arrives at the PDCP layer of the CU.
- the CU-UP determines the downlink delay D D-UE-base station between the terminal device and the CU-UP (ie, core network device) according to the fourth downlink delay, the first time and the second time.
- the fourth downlink delay is the fourth downlink delay carried in the GNB-CU-CP MEASUREMENT RESULTS INFORMATION sent by the CU-CP to the CU-UP in S816.
- the CU-UP sends the UL PDU SESSION INFORMATION to the UPF, where the UL PDU SESSION INFORMATION carries the uplink delay between the terminal device and the CU-UP DU-UE -base station .
- Table 3 above shows an example of UL PDU SESSION INFORMATION, and the DLF Delay Result carries a downlink delay DD-UE-base station .
- the UPF determines the downlink delay D D-UE-UPF of the downlink frame between the terminal device and the UPF (ie, the core network device).
- each network element performing S822 to S823 is the same as the process of each network element performing S722 to S723 in method 700, and details are not repeated here.
- the downlink delay determined in the above embodiment includes the fourth downlink delay.
- the downlink delay does not include the fourth downlink delay
- the method for monitoring the downlink delay is slightly different: in this embodiment, S814 to S816 are omitted, and all the content about the fourth downlink delay can be omitted in S821 to S823 .
- the embodiment of the present application also provides a method for burst monitoring.
- the method provides determining the downlink delay between the terminal device and the core network device of the downlink burst mainly based on the start time and the second time of the downlink burst between the terminal device and the core network device.
- the downlink delay obtained by the network element segmentation statistics delay method is more accurate.
- FIG. 19 is a schematic flowchart of a method 900 for burst monitoring of downlink transmission provided by an embodiment of the present application.
- the core network device sends a delay monitoring request to the access network device, where the delay monitoring request is used to instruct to perform delay monitoring on periodic bursts.
- the access network device determines a second time in response to the delay monitoring request, where the second time is the arrival time of the last feedback information arriving at the MAC layer of the access network device, or, the second time is the sending time of the last feedback message sent from the physical layer of the terminal device.
- the access network device sends response information to the core network device, where the response information includes the second time.
- the response information may be a single piece of information, or may be content carried in other information, which is not limited in any embodiment of the present application.
- the response information may be a field carried in a UL PDU SESSION INFORMATION frame.
- the core network device determines the sending time of the first data packet sent from the core network device in the downlink burst.
- the sending time can be understood as the start time of the downlink burst between the terminal device and the core network device.
- the sending time is the above time T D0 , and the specific description refers to the above related description, which will not be repeated.
- the core network device determines the downlink delay between the terminal device and the core network device for the downlink burst according to the sending time and the second time.
- the downlink delay of the downlink burst between the terminal device and the core network device is the above-mentioned downlink delay D D-UE-UPF , including the duration from the sending time to the second time.
- the core network device reaches the access network device through the sending time of the first data packet sent from the core network device and the last feedback information in the uplink burst sent by the access network device Or the second time when the last feedback information is sent from the terminal device, to determine the downlink delay of the downlink burst between the terminal device and the core network device.
- the process of monitoring the downlink delay between the terminal equipment and the core network equipment for downlink bursts is realized, but also a more accurate downlink delay can be obtained. Data transfer performance can be more accurately evaluated to improve user experience.
- the downlink delay D D-UE-UPF of the downlink burst between the terminal device and the core network device further includes a fourth downlink delay. Based on this, the method 900 further includes:
- the core network device receives the fourth downlink delay from the terminal device
- the core network device determines the downlink delay between the terminal device and the core network device for the downlink burst according to the fourth downlink delay, the sending time and the second time.
- the terminal device sends the fourth downlink delay to the core network device through the access network device.
- the response information sent by the access network device includes the first time and the fourth downlink delay.
- FIG. 20 is a schematic flowchart of a method 1000 for burst monitoring of downlink transmission in a scenario where DUs and CUs are separated according to an embodiment of the present application.
- the method 1000 is a more specific embodiment of the method 900 .
- the network elements involved in the method shown in FIG. 20 include: terminal equipment, SMF and UPF of core network equipment, and CU-CP and CU-UP of access network equipment.
- the method shown in FIG. 20 will be described with the downlink frame as an example of the downlink burst and the UE as an example of the terminal device.
- the downstream frame may be a video frame.
- each network element performing S1011 to S1018 is the same as the process of each network element performing S711 to S718 in the method 700, which will not be repeated here.
- the following describes the process of S1018 to S1022.
- the DU determines the second time according to the QMF received in S1018.
- the DU sends UL ASSISTANCE INFORMATION DATA (PDU Type 2) to the CU-UP, and the UL ASSISTANCE INFORMATION DATA carries the second time.
- PDU Type 2 UL ASSISTANCE INFORMATION DATA
- the CU-UP sends the UL PDU SESSION INFORMATION to the UPF, and the UL PDU SESSION INFORMATION carries the second time and the fourth downlink delay.
- the fourth downlink delay is the fourth downlink delay carried in the GNB-CU-CP MEASUREMENT RESULTS INFORMATION sent by the CU-CP to the CU-UP in S1016.
- the UL PDU SESSION INFORMATION carries response information in response to the QMF sent in S1017, where the response information includes the second time and the fourth downlink delay.
- the downlink frame timestamp result (DLF Timestamp Result) includes the second time and the fourth downlink delay, and the DLF Delay Ind. indicates whether there is a DLF Timestamp Result in the UL PDU SESSION INFORMATION.
- DLF Timestamp Result indicates whether there is a DLF Timestamp Result in the UL PDU SESSION INFORMATION.
- DLF Delay Ind. indicates whether there is DLF Timestamp Result in the UL PDU SESSION INFORMATION.
- DLF Delay Ind. when the value of DLF Delay Ind. is 1, it means that there is DLF Timestamp Result in UL PDU SESSION INFORMATION, and when the value of DLF Delay Ind. is 0, it means that UL PDU SESSION
- the downlink frame time stamp result may also be referred to as the downlink burst time stamp result, and the descriptions of the two may be replaced.
- the UPF determines, according to the sending time of the first data packet sent from the UPF (core network device) in the uplink frame, the second time and the fourth downlink delay, between the terminal device and the UPF (the core network device) of the downlink frame.
- the downlink delay D D-UE-UPF includes the fourth downlink delay and the duration from the sending time to the second time.
- the downlink delay D D-UE-UPF determined in the above embodiment includes the fourth downlink delay.
- the CU-UP sends the The UPF sends the UL PDU SESSION INFORMATION, and the UL PDU SESSION INFORMATION carries the second time.
- the UPF determines, according to the sending time and the second time, the duration of the downlink frame between the terminal device and the UPF (ie, the core network device). Downlink delay D D-UE-UPF .
- the time delay of the downlink burst has been described in detail above with reference to FIG. 12 to FIG. 20 .
- the false burst rate of the burst will be described with reference to FIG. 21 to FIG. 22 .
- FIG. 21 is a schematic flowchart of a method 1100 for burst monitoring provided by an embodiment of the present application.
- the method 1100 is used to determine the burst error rate and is applicable to both uplink and downlink transmissions.
- the core network device sends a false burst monitoring request to the access network device.
- the access network device receives the false burst monitoring request.
- the false burst monitoring request instructs the access network device to report the false burst rates of multiple bursts to the core network device.
- the burst is an uplink burst
- the error burst rate is also the error burst rate for the uplink burst.
- the burst is a downlink burst
- the error burst rate is also the error burst rate for the downlink burst.
- the false burst monitoring request may be a single piece of information, or may be content carried in other information, which is not limited in any embodiment of the present application.
- the false burst monitoring request may be a field carried in the DL PDU SESSION INFORMATION.
- the access network device determines a false burst rate, where the false burst rate represents the difference between the number of the first type of bursts in the multiple bursts and the number of the multiple bursts relationship, the first type of burst indicates that at least one data packet in a burst is not successfully received by the receiving end within the preset time delay.
- the multiple bursts used for determining the error burst rate represent multiple bursts within a period of time, and the period of time may be predefined by a protocol or set or configured by an access network device.
- the period of time for the uplink transmission and the downlink transmission may be the same or different, which is not limited.
- the preset delay used for determining whether the burst is the first type may be predefined by a protocol, or may be set or configured by an access network device.
- the preset delays of the uplink transmission and the downlink transmission may be the same or different, which is not limited.
- the at least one data packet used to determine the first type of burst may be a 1, 2, 3, etc. data packet.
- the first type of burst indicates that at least one data packet in a burst is not successfully received by the access network device within the preset time delay, and the access network device is the receiving end.
- the first type of burst indicates that at least one data packet in a burst is not successfully received by the terminal device within the preset delay, and the terminal device is the receiving end. It should be understood that, in the downlink transmission, if the access network device receives the feedback information that the data packet is successfully received, it is considered that the data packet is successfully received by the terminal device.
- each burst includes 10 data packets, and at least one data packet used to determine the first type of burst is 1 data packet.
- the first type of burst includes the 2 bursts.
- the false burst rate is a ratio of the number of bursts of the first type to the number of bursts.
- the false burst rate may also be determined in other ways according to the number of the first type of bursts and the number of the multiple bursts, which is not limited in this embodiment of the present application.
- the first type of burst may also indicate that at least one data packet of the first type of data in one burst is not successfully received by the receiving end within a preset time delay.
- the first type of data is the data of the base layer generated by a burst, and the data of the base layer is the data used for decoding the burst or other bursts to which the data of the base layer belongs.
- the encoder can divide a burst encoding into 2 types of data: the first type of data is the data of the base layer, and the second type of data is the data of the enhancement layer, i.e., it means that a burst includes the data of the base layer data and enhancement layer data.
- the base station may separately count the time delays of the data of the base layer and the data of the enhancement layer. Therefore, in some cases, as long as the data of the base layer in the burst is successfully received by the receiver, the burst can also be considered to be successfully transmitted. Therefore, when calculating the burst error rate, it is only necessary to calculate whether the data packets in the first type of data are successfully received.
- the access network device sends response information to the core network device, where the response information includes the burst error rate.
- the core network device receives the response information and obtains the error burst rate.
- the method for burst monitoring provides a method for determining the error burst rate of a burst, where the error burst rate indicates that among the multiple bursts, the multiple bursts and the first one that is not successfully received by the receiving end
- the access network device determines the false burst rate of the multiple bursts based on the false burst monitoring request of the core network device and sends the false burst rate to the core network device.
- the method for performing burst monitoring in a scenario where DUs and CUs are separated will be described below with reference to FIG. 22 .
- This method exemplifies the process of monitoring the false burst rate.
- the network elements involved in the method shown in FIG. 22 include: terminal equipment, SMF and UPF of core network equipment, and CU-CP and CU-UP of access network equipment.
- the method shown in FIG. 22 will be described with a frame as an example of a burst and a UE as an example of a terminal device.
- the downstream frame may be a video frame.
- the SMF sends a PDU SESSION RESOURCE SETUP REQUEST to the CU-CP, and the PDU SESSION RESOURCE SETUP REQUEST carries a QFI and frame error rate service quality monitoring request.
- the frame error rate service quality monitoring request is used to indicate the transmission direction of monitoring, and the transmission direction includes uplink and downlink.
- the CU-CP After the CU-CP receives the frame error rate quality of service monitoring request, it can enable the DU and the CU-UP to perform the frame error rate quality of service monitoring function for the DRB of the QFI, and enable the DU to enable the frame monitoring function.
- the frame error rate service quality monitoring request may also be referred to as a burst error rate service quality monitoring request, and the descriptions of the two may be replaced.
- the CU-CP sends a BEARER CONTEXT SETUP REQUEST to the CU-UP, and the BEARER CONTEXT SETUP REQUEST carries a QFI and frame error rate service quality monitoring request.
- the CU-UP receives the BEARER CONTEXT SETUP REQUEST sent by the CU-CP, and the CU-UP can perform the frame error rate quality of service monitoring function for the DRB of the QFI.
- the frame error rate service quality monitoring function may also be referred to as the burst error rate service quality monitoring function, and the descriptions of the two may be replaced.
- the CU-CP sends the UE CONTEXT SETUP REQUEST to the DU, and the UE CONTEXT SETUP REQUEST carries the QFI and frame error rate service quality monitoring request.
- the DU receives the UE CONTEXT SETUP REQUEST from the CU-CP, obtains the QFI and the corresponding frame error rate service quality monitoring request, and the DU can perform the frame error rate service quality monitoring function for the DRB of the QFI.
- the UPF sends the DL PDU SESSION INFORMATION to the CU-UP, and the DL PDU SESSION INFORMATION carries the QoS monitoring error frame.
- the QoS monitoring error frame may be understood as the false burst monitoring request in the method 1100 .
- the QoS monitoring error frame may also be referred to as a QoS monitoring error burst, and the descriptions of the two may be replaced.
- CU-UP sends DL USER DATA (PDU Type 0) to DU, and DL USER DATA carries QoS monitoring error frames.
- the DU receives DL USER DATA (PDU Type 0) and obtains QoS monitoring error frames.
- the DU determines the frame error rate.
- the DU monitors the first type of frames among multiple frames within a period of time, and obtains the frame error rate according to the number of the first type of frame and multiple frames.
- the frame error rate For the specific description of determining the frame error rate, please refer to the relevant description above, and will not be repeated here. .
- the frame error rate may also be referred to as the burst error rate, and the descriptions of the two may be replaced.
- the DU sends UL ASSISTANCE INFORMATION DATA (PDU Type 2) to the CU-UP, wherein the UL ASSISTANCE INFORMATION DATA carries the frame error rate.
- CU-UP receives UL ASSISTANCE INFORMATION DATA to obtain the frame error rate.
- the CU-UP sends the UL PDU SESSION INFORMATION to the UPF, and the UL PDU SESSION INFORMATION carries the frame error rate.
- the UPF receives the UL PDU SESSION INFORMATION to obtain the frame error rate.
- the burst monitoring method provided by the embodiments of the present application is described in detail above with reference to FIGS. 1 to 22 , and the apparatus for burst monitoring provided according to the embodiments of the present application will be described in detail below with reference to FIGS. 23 to 24 .
- FIG. 23 shows an apparatus 1300 for burst monitoring provided by an embodiment of the present application.
- the apparatus 1300 may be an access network device or a core network device, or may be a chip in an access network device or a core network device.
- the apparatus 1300 includes: a communication unit 1310 and a processing unit 1320 .
- the apparatus 1300 is configured to execute each process and step corresponding to the access network device in the foregoing method 100 .
- the processing unit 1320 may be configured to perform step S120 in the method 100
- the communication unit 1310 may be configured to perform step S110 of the method 100 .
- the apparatus 1300 is configured to execute each process and step corresponding to the core network device in the foregoing method 100 .
- the processing unit 1320 may be configured to perform steps S140 and S150 in the method 100
- the communication unit 1310 may be configured to perform steps S110 and S130 of the method 100 .
- the apparatus 1300 is configured to execute each process and step corresponding to the core network device in the foregoing method 400 .
- the communication unit 1310 may be configured to perform steps S410 and S430 in the method 400
- the processing unit 1320 may be configured to perform steps S440 and S450 of the method 400 .
- the apparatus 1300 is configured to execute each process and step corresponding to the access network device in the foregoing method 600 .
- the communication unit 1310 may be configured to perform step S610 in the method 600
- the processing unit 1320 may be configured to perform step S620 in the method 600 .
- the apparatus 1300 is configured to execute each process and step corresponding to the core network device in the foregoing method 600 .
- the communication unit 1310 may be configured to perform steps S610 and S630 in the method 600
- the processing unit 1320 may be configured to perform steps S640 and S650 of the method 600 .
- the apparatus 1300 is configured to execute each process and step corresponding to the core network device in the foregoing method 900.
- the communication unit 1310 may be configured to perform steps S910 and S930 in the method 900
- the processing unit 1320 may be configured to perform steps S940 and S950 of the method 900 .
- the apparatus 1300 is configured to execute each process and step corresponding to the access network device in the foregoing method 1100 .
- the communication unit 1310 can be used to perform steps S1110 and S1130 in the method 1100
- the processing unit 1320 can be used to perform step S1120 in the method 1100 .
- unit as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor for executing one or more software or firmware programs (eg, a shared processor, a dedicated processor, or a group of processors, etc.) and memory, merge logic, and/or other suitable components to support the described functions.
- ASIC application specific integrated circuit
- processors for executing one or more software or firmware programs (eg, a shared processor, a dedicated processor, or a group of processors, etc.) and memory, merge logic, and/or other suitable components to support the described functions.
- the apparatus 1300 in each of the above solutions has the function of implementing the corresponding steps performed by the access network device or the core network device in the above method; the function may be implemented by hardware, or by executing corresponding software by hardware.
- the hardware or software includes one or more modules corresponding to the above-mentioned functions; for example, the communication unit may be replaced by a transmitter and a receiver, and other units, such as a processing unit, may be replaced by a processor, which respectively executes the various method embodiments.
- the communication unit in the apparatus 1300 may also be composed of a sending unit and a receiving unit. For performing operations related to reception, the function of the communication unit can be understood as a receiving operation performed by the receiving unit. For performing operations related to sending, The function of the communication unit can be understood as the sending operation performed by the sending unit.
- the device in FIG. 23 may also be a chip or a system of chips, such as a system on chip (system on chip, SoC).
- the transceiver unit may be a transceiver circuit of the chip, which is not limited herein.
- FIG. 24 shows another apparatus 1400 for burst monitoring provided by an embodiment of the present application.
- the apparatus 1400 may specifically be an access network device or a core network device in the foregoing embodiments, and may be configured to execute various steps and/or processes corresponding to the access network device or core network device in the foregoing method embodiments.
- the apparatus 1400 includes a processor 1410 , a transceiver 1420 and a memory 1430 .
- the processor 1410 , the transceiver 1420 and the memory 1430 communicate with each other through an internal connection path.
- the processor 1410 can implement the functions of the processing unit 1320 in various possible implementations in the device 1300 , and the transceiver 1420 can implement various functions in the device 1300 .
- the function of the communication unit 1310 in a possible implementation.
- the memory 1430 is used to store instructions, and the processor 1410 is used to execute the instructions stored in the memory 1430. In other words, the processor 1410 can call these stored instructions to implement the functions of the processor 520 in the apparatus 1300, so as to control the transceiver 1420 to send signals and/or receive signal.
- the memory 1430 may include read only memory and random access memory and provide instructions and data to the processor.
- a portion of the memory may also include non-volatile random access memory.
- the memory may also store device type information.
- the processor 1410 may be configured to execute the instructions stored in the memory, and when the processor 1410 executes the instructions stored in the memory, the processor 1410 is configured to execute the foregoing method embodiments corresponding to the access network device or the core network device the individual steps and/or processes.
- the apparatus 1400 is configured to execute each process and step corresponding to the access network device in the foregoing method 100 .
- the processor 1410 may be configured to perform step S120 in the method 100
- the transceiver 1420 may be configured to perform step S110 of the method 100 .
- the apparatus 1400 is configured to execute each process and step corresponding to the core network device in the foregoing method 100.
- the processor 1410 may be configured to perform steps S140 and S150 in the method 100
- the transceiver 1420 may be configured to perform steps S110 and S130 of the method 100 .
- the apparatus 1400 is configured to execute each process and step corresponding to the core network device in the foregoing method 400 .
- the transceiver 1420 may be used to perform steps S410 and S430 in the method 400
- the processor 1410 may be used to perform steps S440 and S450 of the method 400 .
- the apparatus 1400 is configured to execute each process and step corresponding to the access network device in the foregoing method 600 .
- the transceiver 1420 may be configured to perform step S610 in the method 600
- the processor 1410 may be configured to perform step S620 in the method 600 .
- the apparatus 1400 is configured to execute each process and step corresponding to the core network device in the foregoing method 600 .
- the transceiver 1420 may be configured to perform steps S610 and S630 in the method 600
- the processor 1410 may be configured to perform steps S640 and S650 of the method 600 .
- the apparatus 1400 is configured to execute each process and step corresponding to the core network device in the foregoing method 900 .
- the transceiver 1420 may be configured to perform steps S910 and S930 in the method 900
- the processor 1410 may be configured to perform steps S940 and S950 of the method 900 .
- the apparatus 1400 is configured to execute each process and step corresponding to the access network device in the foregoing method 1100 .
- the transceiver 1420 may be used to perform steps S1110 and S1130 in the method 1100
- the processor 1410 may be used to perform the step S1120 of the method 1100 .
- the processor of the above device may be a central processing unit (central processing unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (DSPs), application-specific integrated circuits (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like.
- DSPs digital signal processors
- ASIC application-specific integrated circuits
- FPGA Field Programmable Gate Array
- a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- each step of the above-mentioned method can be completed by a hardware integrated logic circuit in a processor or an instruction in the form of software.
- the steps of the method disclosed in combination with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software units in the processor.
- the software unit may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
- the storage medium is located in the memory, and the processor executes the instructions in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, detailed description is omitted here.
- the disclosed system, apparatus and method may be implemented in other manners.
- the apparatus embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
- the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
- the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (32)
- 一种突发监测的方法,其特征在于,包括:接入网设备接收来自核心网设备的时延监测请求,所述时延监测请求用于指示对周期性的突发进行时延监测;所述接入网设备响应于所述时延监测请求,确定上行突发在终端设备和所述接入网设备之间的上行时延,其中,所述上行突发在所述终端设备和所述接入网设备之间的上行时延包括第一上行时延,所述第一上行时延包括从第一时间到第二时间的时长,所述第一时间是所述上行突发中第一个到达所述终端设备的媒体访问控制MAC层的数据包的授权时间,所述第二时间是所述上行突发中最后一个从所述接入网设备的分组数据汇聚协议PDCP层发送的数据包的发送时间。
- 根据权利要求1所述的方法,其特征在于,所述第一上行时延包括第二上行时延和第三上行时延,其中,所述第二上行时延包括从所述第一时间到第三时间的时长,所述第三上行时延包括从所述第三时间到所述第二时间的时长,所述第三时间是所述上行突发中最后一个从所述接入网设备的无线链路控制RLC层向所述接入网设备的PDCP层发送的数据包的发送时间。
- 根据权利要求1或2所述的方法,其特征在于,所述上行突发在所述终端设备和所述接入网设备之间的上行时延还包括第四上行时延,所述第四上行时延包括从第四时间到第五时间的时长,或,所述第四上行时延包括从第四时间到所述第一时间的时长,所述第四时间是所述上行突发中第一个到达所述终端设备的PDCP层的数据包的到达时间,所述第五时间是所述上行突发中第一个到达所述终端设备的MAC层的数据包的到达时间。
- 根据权利要求3所述的方法,其特征在于,所述接入网设备响应于所述时延监测请求,确定上行突发在终端设备和所述接入网设备之间的上行时延,包括:所述接入网设备响应于所述时延监测请求,确定第二上行时延和第三上行时延,所述第二上行时延包括从所述第一时间到第三时间的时长,所述第三上行时延包括从所述第三时间到所述第二时间的时长,所述第三时间是所述上行突发中最后一个从所述接入网设备的无线链路控制RLC层向所述接入网设备的PDCP层发送的数据包的发送时间;所述接入网设备确定所述第四上行时延;所述接入网设备根据所述第二上行时延、所述第三上行时延和所述第四上行时延,确定所述上行突发在所述终端设备和所述接入网设备之间的上行时延。
- 根据权利要求3所述的方法,其特征在于,所述接入网设备响应于所述时延监测请求,确定上行突发在终端设备和所述接入网设备之间的上行时延,包括:所述接入网设备响应于所述时延监测请求,确定所述第一时间和第二时间;所述接入网设备确定所述第四上行时延;所述接入网设备根据所述第四上行时延、所述第一时间和所述第二时间,确定所述上行突发在所述终端设备和所述接入网设备之间的上行时延。
- 根据权利要求2所述的方法,其特征在于,所述接入网设备响应于所述时延监测请求,确定上行突发在终端设备和所述接入网设备之间的上行时延,包括:所述接入网设备响应于所述时延监测请求,确定所述第二上行时延和所述第三上行时延;所述接入网设备根据所述第二上行时延和所述第三上行时延,确定所述上行突发在所述终端设备和所述接入网设备之间的上行时延。
- 根据权利要求2所述的方法,其特征在于,所述接入网设备响应于所述时延监测请求,确定上行突发在终端设备和所述接入网设备之间的上行时延,包括:所述接入网设备响应于所述时延监测请求,确定所述第一时间和所述第二时间;所述接入网设备根据所述第一时间和所述第二时间,确定所述上行突发在所述终端设备和所述接入网设备之间的上行时延。
- 根据权利要求1至7中任一项所述的方法,其特征在于,所述方法还包括:所述接入网设备向所述核心网设备发送响应信息,所述响应信息包括所述上行突发在所述终端设备和所述接入网设备之间的上行时延。
- 一种突发监测的方法,其特征在于,包括:核心网设备向接入网设备发送时延监测请求,所述时延监测请求用于指示对周期性的突发进行时延监测;所述核心网设备接收来自所述接入网设备的响应信息,所述响应信息是响应于所述时延监测请求的信息,所述响应信息包括上行突发在终端设备和所述接入网设备之间的上行时延,其中,所述上行突发在所述终端设备和所述接入网设备之间的上行时延包括第一上行时延,所述第一上行时延包括从第一时间到第二时间的时长,所述第一时间是所述上行突发中第一个到达所述终端设备的媒体访问控制MAC层的数据包的授权时间,所述第二时间是所述上行突发中最后一个从所述接入网设备的分组数据汇聚协议PDCP层发送的数据包的发送时间;所述核心网设备确定第五上行时延,所述第五上行时延是所述上行突发中最后一个从所述接入网设备的PDCP层发送的数据包在所述接入网设备和所述核心网设备之间的时延;所述核心网设备根据所述第五上行时延和所述上行突发在所述终端设备和所述接入网设备之间的上行时延,确定所述上行突发在所述终端设备和所述核心网设备之间的上行时延。
- 根据权利要求9所述的方法,其特征在于,所述上行突发在所述终端设备和所述接入网设备之间的上行时延还包括第四上行时延,所述第四上行时延包括从第四时间到第五时间的时长,或,所述第四上行时延包括从第四时间到所述第一时间的时长,所述第四时间是所述上行突发中第一个到达所述终端设备的PDCP层的数据包的到达时间,所述第五时间是所述上行突发中第一个到达所述终端设备的MAC层的数据包的到达时间。
- 一种突发监测的方法,其特征在于,包括:核心网设备向接入网设备发送时延监测请求,所述时延监测请求用于指示对周期性的突发进行时延监测;所述核心网设备接收来自所述接入网设备的响应信息,所述响应信息是响应于所述时延监测请求的信息,所述响应信息包括第一时间,所述第一时间是所述上行突发中第一个到达终端设备的媒体访问控制MAC层的数据包的授权时间;所述核心网设备确定所述上行突发中最后一个到达所述核心网设备的数据包的到达时间;所述核心网设备根据所述第一时间和所述到达时间,确定所述上行突发在所述终端设备和所述核心网设备之间的上行时延。
- 根据权利要求11所述的方法,其特征在于,所述响应信息还包括第四上行时延,所述第四上行时延包括从第四时间到第五时间的时长,或,所述第四上行时延包括从第四时间到所述第一时间的时长,所述第四时间是所述上行突发中第一个到达所述终端设备的PDCP层的数据包的到达时间,所述第五时间是所述上行突发中第一个到达所述终端设备的MAC层的数据包的到达时间;以及,所述核心网设备根据所述第一时间和所述到达时间,确定所述上行突发在所述终端设备和所述核心网设备之间的上行时延,包括:所述核心网设备根据所述第一时间、所述到达时间和所述第四上行时延,确定所述上行突发在所述终端设备和所述核心网设备之间的上行时延。
- 一种突发监测的方法,其特征在于,包括:接入网设备接收来自核心网设备的时延监测请求,所述时延监测请求用于指示对周期性的突发进行时延监测;所述接入网设备响应于所述时延监测请求,确定下行突发在终端设备和所述接入网设备之间的下行时延,所述下行突发在所述终端设备和所述接入网设备之间的下行时延包括第一下行时延,所述第一下行时延包括从第一时间到第二时间的时长,所述第一时间是所述下行突发中第一个到达所述接入网设备的分组数据汇聚协议PDCP层的数据包的到达时间,所述第二时间是到达所述接入网设备的媒体访问控制MAC层的最后一个反馈信息的到达时间,或,所述第二时间是从所述终端设备的物理层发送最后一个反馈信息的发送时间,所述反馈信息用于指示所述终端设备成功接收所述下行突发中的一个数据包。
- 根据权利要求13所述的方法,其特征在于,所述第一下行时延包括第二下行时延和第三下行时延,所述第二下行时延包括从第三时间到所述第二时间的时长,所述第三下行时延包括从所述第一时间到所述第三时间的时长,所述第三时间是所述下行突发中第一个到达所述接入网设备的无线链路控制RLC层的数据包的到达时间。
- 根据权利要求14所述的方法,其特征在于,所述接入网设备响应于所述时延监测请求,确定下行突发在所述终端设备和所述接入网设备之间的下行时延,包括:所述接入网设备响应于所述时延监测请求,确定所述第二下行时延和所述第三下行时延;所述接入网设备根据所述第二下行时延和所述第三下行时延,确定所述下行突发在所述终端设备和所述接入网设备之间的下行时延。
- 根据权利要求14所述的方法,其特征在于,所述接入网设备响应于所述时延监测请求,确定下行突发在所述终端设备和所述接入网设备之间的下行时延,包括:所述接入网设备响应于所述时延监测请求,确定所述第一时间和所述第二时间;所述接入网设备根据所述第一时间和所述第二时间,确定所述下行突发在所述终端设备和所述接入网设备之间的下行时延。
- 根据权利要求13或14所述的方法,其特征在于,所述下行突发在所述终端设备和所述接入网设备之间的下行时延还包括第四下行时延,所述第四下行时延包括从第四时间到第五时间的时长,所述第四时间是所述下行突发中最后一个到达所述终端设备的MAC层的数据包的到达时间,所述第五时间是所述下行突发中最后一个从所述终端设备的PDCP层发送的数据包的发送时间。
- 根据权利要求17所述的方法,其特征在于,所述接入网设备响应于所述时延监测请求,确定下行突发在所述终端设备和所述接入网设备之间的下行时延,包括:所述接入网设备响应于所述时延监测请求,确定第二下行时延和第三下行时延,所述第二下行时延包括从第三时间到所述第二时间的时长,所述第三下行时延包括从所述第一时间到所述第三时间的时长,所述第三时间是所述下行突发中第一个到达所述接入网设备的无线链路控制RLC层的数据包的到达时间;所述接入网设备确定所述第四下行时延;所述接入网设备根据所述第二下行时延、所述第三下行时延和所述第四下行时延,确定所述下行突发在所述终端设备和所述接入网设备之间的下行时延。
- 根据权利要求17所述的方法,其特征在于,所述接入网设备响应于所述时延监测请求,确定下行突发在所述终端设备和所述接入网设备之间的下行时延,包括:所述接入网设备响应于所述时延监测请求,确定所述第一时间和所述第二时间;所述接入网设备确定所述第四下行时延;所述接入网设备根据所述第一时间、所述第二时间和所述第四下行时延,确定所述下行突发在所述终端设备和所述接入网设备之间的下行时延。
- 根据权利要求13至19中任一项所述的方法,其特征在于,所述方法还包括:所述接入网设备向所述核心网设备发送响应信息,所述响应信息包括所述下行突发在所述终端设备和所述接入网设备之间的下行时延。
- 一种突发监测的方法,其特征在于,包括:核心网设备向接入网设备发送时延监测请求;所述核心网设备接收来自所述接入网设备的响应信息,所述响应信息是响应于所述时延监测请求的信息,所述响应信息包括下行突发在终端设备和所述接入网设备之间的下行时延,所述下行突发在所述终端设备和所述接入网设备之间的下行时延包括第一下行时延,所述第一下行时延包括从第一时间到第二时间的时长,所述第一时间是所述下行突发中第一个到达所述接入网设备的分组数据汇聚协议PDCP层的数据包的到达时间,所述第二时间是到达所述接入网设备的媒体访问控制MAC层的最后一个反馈信息的到达时间,或,所述第二时间是从所述终端设备的物理层发送最后一个反馈信息的发送时间,所述反馈信息用于指示所述终端设备成功接收所述下行突发中的一个数据包;所述核心网设备确定第五下行时延,所述第五下行时延是所述下行突发中第一个从所述核心网设备发送的数据包在所述接入网设备和所述核心网设备之间的时延;所述核心网设备根据所述第五下行时延和所述下行突发在所述终端设备和所述接入网设备之间的下行时延,确定所述下行突发在所述终端设备和所述核心网设备之间的下行时延。
- 根据权利要求21所述的方法,其特征在于,所述下行突发在所述终端设备和所 述核心网设备之间的下行时延还包括第四下行时延,所述第四下行时延包括从第四时间到第五时间的时长,所述第四时间是所述下行突发中最后一个达到所述终端设备的MAC层的数据包的到达时间,所述第五时间是所述下行突发中最后一个被从所述终端设备的PDCP层发送的数据包的发送时间。
- 一种突发监测的方法,其特征在于,包括:核心网设备向接入网设备发送时延监测请求;所述核心网设备接收来自所述接入网设备的响应信息,所述响应信息是响应于所述时延监测请求的信息,所述响应信息包括第二时间,所述第二时间是到达所述接入网设备的媒体访问控制MAC层的最后一个反馈信息的到达时间,或,所述第二时间是从所述终端设备的物理层发送最后一个反馈信息的发送时间,所述反馈信息用于指示所述终端设备成功接收所述下行突发中的一个数据包;所述核心网设备确定所述下行突发中第一个从所述核心网设备发送的数据包的发送时间;所述核心网设备根据所述第二时间和所述发送时间,确定所述下行突发在所述终端设备和所述核心网设备之间的下行时延。
- 根据权利要求23所述的方法,其特征在于,所述响应信息还包括第四下行时延,所述第四下行时延包括第四时间和第五时间之间的时长,所述第四时间是所述下行突发中最后一个到达所述终端设备的MAC层的数据包的到达时间,所述第五时间是所述下行突发中最后一个从所述终端设备的PDCP层发送的数据包的发送时间;以及,所述核心网设备根据所述第二时间和所述发送时间,确定所述下行突发在所述终端设备和所述核心网设备之间的下行时延,包括:所述核心网设备根据所述第二时间、所述发送时间和所述第四下行时延,确定所述下行突发在所述终端设备和所述核心网设备之间的下行时延。
- 一种突发监测的装置,其特征在于,包括:通信单元,用于接收来自核心网设备的时延监测请求,所述时延监测请求用于指示对周期性的突发进行时延监测;处理单元,用于响应于所述时延监测请求,确定上行突发在终端设备和所述装置之间的上行时延,其中,所述上行突发在所述终端设备和所述装置之间的上行时延包括第一上行时延,所述第一上行时延包括从第一时间到第二时间的时长,所述第一时间是所述上行突发中第一个到达所述终端设备的媒体访问控制MAC层的数据包的授权时间,所述第二时间是所述上行突发中最后一个从所述装置的分组数据汇聚协议PDCP层发送的数据包的发送时间。
- 一种突发监测的装置,其特征在于,包括:通信单元,用于向接入网设备发送时延监测请求,所述时延监测请求用于指示对周期性的突发进行时延监测;所述通信单元还用于,接收来自所述接入网设备的响应信息,所述响应信息是响应于所述时延监测请求的信息,所述响应信息包括上行突发在终端设备和所述接入网设备之间的上行时延,其中,所述上行突发在所述终端设备和所述接入网设备之间的上行时延包括第一上行时延,所述第一上行时延包括从第一时间到第二时间的时长,所述第一时间是所 述上行突发中第一个到达所述终端设备的媒体访问控制MAC层的数据包的授权时间,所述第二时间是所述上行突发中最后一个从所述接入网设备的分组数据汇聚协议PDCP层发送的数据包的发送时间;处理单元,用于确定第五上行时延,所述第五上行时延是所述上行突发中最后一个从所述接入网设备的PDCP层发送的数据包在所述接入网设备和所述装置之间的时延;所述处理单元还用于,根据所述第五上行时延和所述上行突发在所述终端设备和所述接入网设备之间的上行时延,确定所述上行突发在所述终端设备和所述装置之间的上行时延。
- 一种突发监测的装置,其特征在于,包括:通信单元,用于向接入网设备发送时延监测请求,所述时延监测请求用于指示对周期性的突发进行时延监测;所述通信单元还用于,接收来自所述接入网设备的响应信息,所述响应信息是响应于所述时延监测请求的信息,所述响应信息包括第一时间,所述第一时间是所述上行突发中第一个到达终端设备的媒体访问控制MAC层的数据包的授权时间;处理单元,用于确定所述上行突发中最后一个到达所述核心网设备的数据包的到达时间;所述处理单元还用于,根据所述第一时间和所述到达时间,确定所述上行突发在所述终端设备和所述核心网设备之间的上行时延。
- 一种突发监测的装置,其特征在于,包括:通信单元,用于接收来自核心网设备的时延监测请求,所述时延监测请求用于指示对周期性的突发进行时延监测;处理单元,用于响应于所述时延监测请求,确定下行突发在终端设备和所述装置之间的下行时延,所述下行突发在所述终端设备和所述装置之间的下行时延包括第一下行时延,所述第一下行时延包括从第一时间到第二时间的时长,所述第一时间是所述下行突发中第一个到达所述装置的分组数据汇聚协议PDCP层的数据包的到达时间,所述第二时间是到达所述装置的媒体访问控制MAC层的最后一个反馈信息的到达时间,或,所述第二时间是从所述终端设备的物理层发送最后一个反馈信息的发送时间,所述反馈信息用于指示所述终端设备成功接收所述下行突发中的一个数据包。
- 一种突发监测的装置,其特征在于,包括:通信单元,用于向接入网设备发送时延监测请求;所述通信单元还用于,接收来自所述接入网设备的响应信息,所述响应信息是响应于所述时延监测请求的信息,所述响应信息包括下行突发在终端设备和所述接入网设备之间的下行时延,所述下行突发在所述终端设备和所述接入网设备之间的下行时延包括第一下行时延,所述第一下行时延包括从第一时间到第二时间的时长,所述第一时间是所述下行突发中第一个到达所述接入网设备的分组数据汇聚协议PDCP层的数据包的到达时间,所述第二时间是到达所述接入网设备的媒体访问控制MAC层的最后一个反馈信息的到达时间,或,所述第二时间是从所述终端设备的物理层发送最后一个反馈信息的发送时间,所述反馈信息用于指示所述终端设备成功接收所述下行突发中的一个数据包;处理单元,用于确定第五下行时延,所述第五下行时延是所述下行突发中第一个从所 述装置发送的数据包在所述接入网设备和所述装置之间的时延;所述处理单元还用于,根据所述第五下行时延和所述下行突发在所述终端设备和所述接入网设备之间的下行时延,确定所述下行突发在所述终端设备和所述装置之间的下行时延。
- 一种突发监测的装置,其特征在于,包括:通信单元,用于向接入网设备发送时延监测请求;所述通信单元还用于,接收来自所述接入网设备的响应信息,所述响应信息是响应于所述时延监测请求的信息,所述响应信息包括第二时间,所述第二时间是到达所述接入网设备的媒体访问控制MAC层的最后一个反馈信息的到达时间,或,所述第二时间是从所述终端设备的物理层发送最后一个反馈信息的发送时间,所述反馈信息用于指示所述终端设备成功接收所述下行突发中的一个数据包;处理单元,用于确定所述下行突发中第一个从所述装置发送的数据包的发送时间;所述处理单元还用于,根据所述第二时间和所述发送时间,确定所述下行突发在所述终端设备和所述装置之间的下行时延。
- 一种突发监测的装置,其特征在于,包括:存储器,用于存储计算机指令;处理器,用于调用所述存储器中存储的计算机指令,以执行如权利要求1至8中任一项所述的方法,或,以执行如权利要求9或10所述的方法,以执行如权利要求11或12所述的方法,以执行如权利要求13至20所述的方法,以执行如权利要求21或22所述的方法,以执行如权利要求23或24所述的方法。
- 一种计算机可读存储介质,其特征在于,用于存储计算机指令,所述计算机指令用于实现如权利要求1至8中任一项所述的方法,或,用于实现如权利要求9或10所述的方法,用于实现如权利要求11或12所述的方法,用于实现如权利要求13至20所述的方法,用于实现如权利要求21或22所述的方法,用于实现如权利要求23或24所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/081513 WO2022193225A1 (zh) | 2021-03-18 | 2021-03-18 | 一种突发监测的方法和装置 |
CN202180087516.2A CN116686325A (zh) | 2021-03-18 | 2021-03-18 | 一种突发监测的方法和装置 |
EP21930817.8A EP4311293A4 (en) | 2021-03-18 | 2021-03-18 | METHOD AND APPARATUS FOR BURST MONITORING |
US18/468,419 US20240007886A1 (en) | 2021-03-18 | 2023-09-15 | Burst monitoring method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/081513 WO2022193225A1 (zh) | 2021-03-18 | 2021-03-18 | 一种突发监测的方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/468,419 Continuation US20240007886A1 (en) | 2021-03-18 | 2023-09-15 | Burst monitoring method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022193225A1 true WO2022193225A1 (zh) | 2022-09-22 |
Family
ID=83321330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/081513 WO2022193225A1 (zh) | 2021-03-18 | 2021-03-18 | 一种突发监测的方法和装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20240007886A1 (zh) |
EP (1) | EP4311293A4 (zh) |
CN (1) | CN116686325A (zh) |
WO (1) | WO2022193225A1 (zh) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1746788A2 (en) * | 2005-07-20 | 2007-01-24 | Tektronix, Inc. | Method and system for calculating burst bit rate for IP interactive applications |
CN101056199A (zh) * | 2006-04-10 | 2007-10-17 | 华为技术有限公司 | 一种点对多点接入网的上行突发性能监控方法 |
CN101141410A (zh) * | 2007-10-24 | 2008-03-12 | 中兴通讯股份有限公司 | 一种千兆无源光网络系统中下行流控信息的传递方法 |
CN104734772A (zh) * | 2015-04-03 | 2015-06-24 | 烽火通信科技股份有限公司 | 无源光网络骨干光链路保护系统及其获取均衡时延的方法 |
CN111565411A (zh) * | 2019-02-14 | 2020-08-21 | 华为技术有限公司 | 时延测量方法、网络设备和终端设备 |
CN111867073A (zh) * | 2019-04-30 | 2020-10-30 | 中国移动通信有限公司研究院 | 时间信息的处理方法、定时提前的确定方法及相关设备 |
CN111866929A (zh) * | 2019-04-30 | 2020-10-30 | 华为技术有限公司 | 通信方法、装置及系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2525935A (en) * | 2014-05-09 | 2015-11-11 | Nec Corp | Communication system |
WO2016049925A1 (zh) * | 2014-09-30 | 2016-04-07 | 华为技术有限公司 | 网络电话业务的服务质量参数获取装置、系统及方法 |
US10305767B2 (en) * | 2015-07-28 | 2019-05-28 | Nokia Solutions And Networks Oy | Methods and apparatuses for measurement of packet delay in uplink in E-UTRAN |
-
2021
- 2021-03-18 CN CN202180087516.2A patent/CN116686325A/zh active Pending
- 2021-03-18 EP EP21930817.8A patent/EP4311293A4/en active Pending
- 2021-03-18 WO PCT/CN2021/081513 patent/WO2022193225A1/zh active Application Filing
-
2023
- 2023-09-15 US US18/468,419 patent/US20240007886A1/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1746788A2 (en) * | 2005-07-20 | 2007-01-24 | Tektronix, Inc. | Method and system for calculating burst bit rate for IP interactive applications |
CN101056199A (zh) * | 2006-04-10 | 2007-10-17 | 华为技术有限公司 | 一种点对多点接入网的上行突发性能监控方法 |
CN101141410A (zh) * | 2007-10-24 | 2008-03-12 | 中兴通讯股份有限公司 | 一种千兆无源光网络系统中下行流控信息的传递方法 |
CN104734772A (zh) * | 2015-04-03 | 2015-06-24 | 烽火通信科技股份有限公司 | 无源光网络骨干光链路保护系统及其获取均衡时延的方法 |
CN111565411A (zh) * | 2019-02-14 | 2020-08-21 | 华为技术有限公司 | 时延测量方法、网络设备和终端设备 |
CN111867073A (zh) * | 2019-04-30 | 2020-10-30 | 中国移动通信有限公司研究院 | 时间信息的处理方法、定时提前的确定方法及相关设备 |
CN111866929A (zh) * | 2019-04-30 | 2020-10-30 | 华为技术有限公司 | 通信方法、装置及系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4311293A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP4311293A1 (en) | 2024-01-24 |
CN116686325A (zh) | 2023-09-01 |
US20240007886A1 (en) | 2024-01-04 |
EP4311293A4 (en) | 2024-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20210042963A (ko) | 데이터 전송 방법 및 장치, 트래픽 전환 방법 및 장치 | |
RU2422999C2 (ru) | Способ работы улучшенных модуля управления радиоканалом (rlc) и модуля управления радиосетью (rnc) для множественного доступа с кодовым разделением каналов и система для его осуществления | |
CN111757513B (zh) | 通信方法及设备 | |
TWI445360B (zh) | 在無線通訊系統中產生資料區塊的方法 | |
EP3621348B1 (en) | Mobile station and base station | |
JP5580418B2 (ja) | 単一のrlcエンティティについての拡張された多重化 | |
KR20060090191A (ko) | 이동통신 시스템에서 재전송 제어를 위한 상태보고의요청/전송 방법 및 장치 | |
CN109803315B (zh) | 数据传输方法及装置 | |
CN112003684A (zh) | 数据传输方法及装置 | |
WO2018058380A1 (zh) | 一种数据传输方法、网络设备及终端设备 | |
WO2021052467A1 (zh) | 通信方法及装置 | |
CN107113811A (zh) | 一种建立数据无线承载的方法及装置 | |
WO2014172896A1 (zh) | 一种数据传输的方法、基站和无线通信设备 | |
US20050054347A1 (en) | Uplink resource allocation | |
CN115250506A (zh) | 一种通信方法及设备 | |
WO2024028277A1 (en) | Infrastructure equipment, communications devices and methods | |
WO2022193225A1 (zh) | 一种突发监测的方法和装置 | |
WO2017028681A1 (zh) | 一种数据传输状态的报告、确定传输数据量的方法及装置 | |
CN101990241B (zh) | 一种分组数据传输系统和方法 | |
EP4211836B1 (en) | Burst transmission of data packets with feedback | |
KR20090084701A (ko) | SR (Scheduling Request) 과 PBR (Prioritized Bit Rate)을 고려하여 DRX(Discontinuous Reception) 동작을 효율적으로 수행하는 방법 | |
CN113439401B (zh) | 用于传输具有多个自动重传请求进程的数据流的方法、装置和系统 | |
US20240146462A1 (en) | Relay-assisted retransmission | |
CN117354950A (zh) | 一种通信方法及装置 | |
CN117479225A (zh) | 一种被用于无线通信的方法和设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21930817 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202180087516.2 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021930817 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021930817 Country of ref document: EP Effective date: 20231016 |