WO2022228476A1 - 通信方法及装置 - Google Patents

通信方法及装置 Download PDF

Info

Publication number
WO2022228476A1
WO2022228476A1 PCT/CN2022/089642 CN2022089642W WO2022228476A1 WO 2022228476 A1 WO2022228476 A1 WO 2022228476A1 CN 2022089642 W CN2022089642 W CN 2022089642W WO 2022228476 A1 WO2022228476 A1 WO 2022228476A1
Authority
WO
WIPO (PCT)
Prior art keywords
rnti
access network
network device
rule
message
Prior art date
Application number
PCT/CN2022/089642
Other languages
English (en)
French (fr)
Inventor
耿婷婷
张宏卓
胡星星
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP22794946.8A priority Critical patent/EP4322641A1/en
Priority to JP2023566733A priority patent/JP2024519477A/ja
Priority to BR112023022734A priority patent/BR112023022734A2/pt
Priority to KR1020237040655A priority patent/KR20240004624A/ko
Publication of WO2022228476A1 publication Critical patent/WO2022228476A1/zh
Priority to US18/496,149 priority patent/US20240056950A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • H04W68/02Arrangements for increasing efficiency of notification or paging channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • H04W68/005Transmission of information for alerting of incoming communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • H04W68/12Inter-network notification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/34Selective release of ongoing connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a communication method and device.
  • the radio resource control (RRC) state of a terminal device includes a connected (connected) state, an inactive (inactive) state, and an idle (idle) state, wherein the terminal device is in In the inactive state, the RRC connection is suspended between the terminal device and the access network device, but the terminal device and the access network device will save the context information of the terminal device.
  • RRC radio resource control
  • the access network device When the access network device configures the terminal device to enter the inactive state, it will send the inactive radio network temporary identifier (I-RNTI) to the terminal device.
  • I-RNTI is used by the access network device to obtain the context information of the terminal device.
  • the access network device may determine the format of the I-RNTI according to the I-RNTI rule.
  • the I-RNTI rules of the access network equipment will not change. But at present, the I-RNTI rules of the access network equipment can be changed, and the change of the I-RNTI rules brings new problems, and corresponding solutions need to be considered.
  • the present application provides a communication method and apparatus, which can solve the problem of communication errors caused by changes in the I-RNTI rules of access network equipment.
  • the present application provides a communication method, and the method can be applied to an access network device, or a chip, or a chipset, or a functional module in a chip that executes the method, and so on.
  • the method includes: a first access network device receives a first message from a second access network device, where the first message is used to indicate at least two I-RNTIs of the second access network device Rules remain in effect.
  • the first access network device determines, according to at least one valid I-RNTI rule of the second access network device, an access network device corresponding to the I-RNTI of the terminal device, and accesses at least one of the determined access network devices.
  • the network device obtains the context information of the terminal device.
  • the first access network device can maintain multiple I-RNTI rules of the second access network device valid under the instruction of the second access network device, so that when restoring the RRC connection of the terminal device, it can be based on Multiple I-RNTI rules determine the second access network device, so that to a certain extent, it can avoid missing the access network device when determining the second access network device based on the I-RNTI, thereby improving the success of the terminal device in restoring the RRC connection Rate.
  • the first access network device receives a second message from the second access network device, where the second message indicates that the second I-RNTI rule is invalid.
  • the second access network device can indicate that the I-RNTI rule before the update is invalid, so that the first access network device can no longer maintain the I-RNTI rule before the update, so that the first access network device can be reduced. communication costs.
  • the present application provides a communication method, and the method can be applied to an access network device, or a chip, or a chipset, or a functional module in a chip that executes the method, and so on.
  • the method includes: the second access network device updates the I-RNTI rule; the second access network device sends a first message to the first access network device, where the first message is used to indicate the second access network device At least two deactivated wireless network temporary identification I-RNTI rules of the access network device remain valid.
  • the second access network device may instruct the first access network device to maintain multiple I-RNTI rules of the second access network device valid, so that the first access network device is restoring the RRC connection of the terminal device
  • the second access network device may instruct the first access network device to maintain multiple I-RNTI rules of the second access network device valid, so that the first access network device is restoring the RRC connection of the terminal device
  • the second access network device sends a second message to the first access network device, where the second message indicates that the second I-RNTI rule is invalid.
  • the second access network device can indicate that the I-RNTI rule before the update is invalid, so that the first access network device can no longer maintain the I-RNTI rule before the update, so that the first access network device can be reduced. communication costs.
  • the first message indicates that the updated I-RNTI rule of the second access network device is the first I-RNTI rule, and indicates that the second I-RNTI rule remains valid, and the second I-RNTI rule It is the I-RNTI rule before the update of the second access network device.
  • the terminal equipment that allocates the I-RNTI based on the I-RNTI rule before the update can accurately determine the anchor point in the RRC recovery process. Access network equipment, thereby improving the success rate of the terminal equipment to restore the RRC connection.
  • the first message carries the first I-RNTI rule and first indication information, where the first indication information is used to indicate that the second I-RNTI rule remains valid.
  • the second I-RNTI rule may include at least two I-RNTI rules.
  • the first message may carry multiple pieces of first indication information, where one piece of first indication information may be associated with one or more I-RNTI rules in the second I-RNTI rule.
  • the first message carries the first I-RNTI rule and the second I-RNTI rule.
  • the above design can implicitly indicate that the I-RNTI rule before the update remains valid by carrying the I-RNTI rule before the update when the I-RNTI rule is updated.
  • the first message indicates to add the first I-RNTI rule.
  • the first access network device can maintain the original second I-RNTI rule and the newly added first I-RNTI rule.
  • the second message carries second indication information, and the second indication information is used to indicate that the second I-RNTI rule is invalid. In this way, the indication of the second I-RNTI rule invalidation can be displayed.
  • the second I-RNTI rule may include at least two I-RNTI rules.
  • the second message may carry multiple pieces of second indication information, wherein one piece of second indication information may be associated with one or more I-RNTI rules in the second I-RNTI rules.
  • the second message indicates that the first I-RNTI rule remains in effect. In this manner, the invalidation of the second I-RNTI rule may be implicitly indicated when the second message does not indicate that the second I-RNTI rule is valid.
  • the second message indicates release/deletion of the second I-RNTI rule.
  • the first access network device can stop maintaining the second I-RNTI rule by releasing/deleting the second I-RNTI rule.
  • the present application provides a communication method, and the method can be applied to an access network device, or a chip, or a chipset, or a functional module in a chip that executes the method, and so on.
  • the method includes: the second access network device updates the I-RNTI rule; the second access network device sends a first paging message and/or a second paging message, the first paging message It is used to indicate that the access network device in the radio access network notification area of the terminal device in the inactive state paging the terminal device in the inactive state, and the second paging message is used for the second access network device to page the inactive state.
  • the second access network device performs at least one of the following: triggering the first terminal device in the inactive state to update the I-RNTI based on the updated I-RNTI rule; triggering the second terminal device in the inactive state to enter the idle state ; Send the context information of the inactive third terminal device to the first access network device, where the first access network device is the access network device that receives the paging response sent by the third terminal device.
  • the second access network device when the second access network device updates the I-RNTI rules, it updates the I-RNTI of the terminal device by paging the terminal device in time, so that the second access network device and the first access network device can communicate with each other.
  • the device can maintain a set of I-RNTI rules, thereby reducing the complexity of the implementation of the access network device.
  • the first paging message and/or the second paging message carry a paging reason
  • the paging reason is an I-RNTI rule change.
  • the second access network device triggers the inactive first terminal device I-RNTI to update, including: the second access network device is the first terminal device based on the updated I-RNTI rule Allocate an I-RNTI.
  • the terminal equipment in the communication range of the second access network can update the I-RNTI under the paging of the second access network equipment.
  • the second access network device triggers the inactive first terminal device I-RNTI to update, including: the second access network device sends a third message to the third access network device, the The third access network device is an access network device that receives the paging response sent by the first terminal device, and the third message is used to instruct the third access network device to allocate an I-RNTI to the first terminal device.
  • the terminal equipment in the communication range of the third access network can update the I-RNTI under the paging of the third access network equipment.
  • the third message carries a reason value for indicating the I-RNTI rule change.
  • the terminal device can determine that the reason for updating the I-RNTI is the I-RNTI rule change.
  • the second access network device triggering the inactive second terminal device to enter the idle state includes: the second access network device releases the second terminal device to the idle state.
  • the second access network device triggers the second terminal device in the inactive state to enter the idle state, including: the second access network device sends a fourth message to the fourth access network device, and the fourth access network device sends a fourth message to the fourth access network device.
  • the network access device is an access network device that receives a paging response sent by the second terminal device, and the fourth message is used to instruct the fourth access network device to release the second terminal device to an idle state.
  • the fourth message carries a reason value for indicating the I-RNTI rule change.
  • the terminal device can determine that the reason for updating the I-RNTI is the I-RNTI rule change.
  • the present application provides a communication method, and the method can be applied to an access network device, or a chip, or a chipset, or a functional module in a chip that executes the method, and so on.
  • the method includes: a first access network device receives a first paging message from a second access network device, where the first paging message is used to page a terminal device in an inactive state; An access network device sends a third paging message, where the third paging message is used to page the terminal device in the inactive state; the first access network device performs at least one of the following: updating the information of the first terminal device in the inactive state I-RNTI; Release the second terminal equipment in the inactive state to enter the idle state.
  • the second access network device when the second access network device updates the I-RNTI rules, it updates the I-RNTI of the terminal device by paging the terminal device in time, so that the second access network device and the first access network device can communicate with each other.
  • the device can maintain a set of I-RNTI rules, thereby reducing the complexity of the implementation of the access network device.
  • the first paging message and/or the second paging message carry a paging reason
  • the paging reason is an I-RNTI rule change.
  • the method further includes: before the first access network device updates the inactive terminal device I-RNTI, the first access network device receives a third message from the second access network device , and the third message is used to instruct the first access network device to allocate an I-RNTI to the first terminal device.
  • the terminal device in the communication range of the first access network can update the I-RNTI under the paging of the first access network device.
  • the method further includes: before the first access network device releases the terminal device in the inactive state and enters the idle state, the first access network device receives a fourth message from the second access network device , the fourth message is used to instruct the fourth access network device to release the second terminal device to the idle state.
  • the third message carries a reason value for indicating the I-RNTI rule change.
  • the terminal device can determine that the reason for updating the I-RNTI is the I-RNTI rule change.
  • the fourth message carries a reason value for indicating the I-RNTI rule change.
  • the terminal device can determine that the reason for updating the I-RNTI is the I-RNTI rule change.
  • the present application provides a communication method, and the method can be applied to a terminal device, or a chip, or a chipset, or a functional module in a chip that executes the method, and so on.
  • the method includes: the terminal device receives the second paging message or the third paging message; the terminal device enters an idle state or updates the I-RNTI.
  • the present application provides a communication method, and the method can be applied to an access network device, or a chip, or a chipset, or a functional module in the chip that executes the method, and so on.
  • the method includes: the first access network device receives a message 1 from the second access network device, where the message 1 indicates the first I-RNTI rule of the second access network device; The network access device determines that the first I-RNTI rule conflicts with the I-RNTI rules of other access network devices; the first access network device triggers the second access network device to update the I-RNTI rules.
  • the first access network device can adjust the I-RNTI rules of the second access network device. For example, when the first access network device discovers When the I-RNTI rules cannot reasonably determine the anchor point access network equipment, the second access network equipment can be assisted to modify the I-RNTI rules, thereby improving the accuracy of determining the anchor point access network equipment, and avoiding to a certain extent
  • the access network equipment is omitted when the anchor point access network equipment is determined based on the I-RNTI, which can improve the success rate of the terminal equipment in restoring the RRC connection, and can also avoid determining too many access networks based on the I-RNTI to a certain extent. equipment, so that signaling overhead can be saved.
  • the first access network device triggers the second access network device to update the I-RNTI rule, including: the first access network device sends a message 2 to the second access network device, and the message 2 indicates the first access network device. 2.
  • the access network equipment updates the I-RNTI rules.
  • the first access network device may instruct the second access network device to update the I-RNTI rule by sending a message.
  • message 2 carries at least one of the following information: first information and second information, where the first information is used to instruct the second access network device to update the I-RNTI rule, and the second information is used to instruct the second access network device to update the I-RNTI rule.
  • first information is used to instruct the second access network device to update the I-RNTI rule
  • second information is used to instruct the second access network device to update the I-RNTI rule.
  • the first access network device triggers the second access network device to update the I-RNTI rules, including: the first access network device sends a message 3 to an operation and management (OAM) entity, and the message 3 uses Indicates that there is a conflict in the I-RNTI rules.
  • OAM operation and management
  • the I-RNTI rules of the access network equipment can be managed uniformly through the OAM entity.
  • the message 3 carries the information of the first I-RNTI rule, and/or the identification information of the second access network device.
  • the OAM entity can determine the conflicting I-RNTI rules.
  • message 3 also carries information of I-RNTI rules of other access network devices, and/or identification information of other access network devices.
  • the OAM entity can determine the conflicting I-RNTI rules.
  • the first access network device receives third information from the second access network device, where the third information is used to indicate that the first access network device is allowed to assist the second access network device in adjusting I- RNTI rules.
  • the first access network device can obtain authorization to assist the second access network device in adjusting the I-RNTI rule.
  • the first I-RNTI rule includes information related to the identification information of the access network device.
  • the first I-RNTI rule further indicates at least one of the following: related information of the terminal equipment identity, related information of the public land mobile network (PLMN), radio access technology/system related information and I-RNTI rules.
  • PLMN public land mobile network
  • the first I-RNTI rule corresponds to the number of bits of the I-RNTI or the length type of the I-RNTI.
  • the present application provides a communication method, and the method can be applied to an access network device, or a chip, or a chipset, or a functional module in the chip that executes the method, and so on.
  • the method includes: the second access network device sends a message 1 to the first access network device, where the message 1 indicates the first I-RNTI rule of the second access network device; the second access network device sends a message 1 to the first access network device; The network device receives message 2 from the first access network device, and the message 2 instructs the second access network device to update the I-RNTI rule.
  • the first access network device can adjust the I-RNTI rules of the second access network device. For example, when the first access network device discovers When the I-RNTI rules cannot reasonably determine the anchor point access network equipment, the second access network equipment can be assisted to modify the I-RNTI rules, thereby improving the accuracy of determining the anchor point access network equipment, and avoiding to a certain extent
  • the access network equipment is omitted when the anchor point access network equipment is determined based on the I-RNTI, which can improve the success rate of the terminal equipment in restoring the RRC connection, and can also avoid determining too many access networks based on the I-RNTI to a certain extent. equipment, so that signaling overhead can be saved.
  • the method further includes: the second access network device sends third information to the first access network device, where the third information is used to indicate that the first access network device is allowed to assist the second access network
  • the device adjusts the I-RNTI rules.
  • the first access network device can obtain authorization to assist the second access network device in adjusting the I-RNTI rule.
  • message 2 carries at least one of the following information: first information and second information, where the first information is used to instruct the second access network device to update the I-RNTI rule, and the second information is used to instruct the second access network device to update the I-RNTI rule.
  • first information is used to instruct the second access network device to update the I-RNTI rule
  • second information is used to instruct the second access network device to update the I-RNTI rule.
  • the first I-RNTI rule includes information related to the identification information of the access network device.
  • the first I-RNTI rule indicates at least one of the following: terminal equipment identification related information, PLMN related information, radio access technology/system related information, and I-RNTI rule related information.
  • the first I-RNTI rule indicates the number of bits of the I-RNTI or the length type of the I-RNTI.
  • the present application provides a communication method, and the method can be applied to an OAM entity, or a chip, or a chipset, or a functional module in a chip that executes the method, and so on.
  • the OAM entity receives a message 3 from the first access network device, where the message 3 is used to indicate that there is a conflict in the I-RNTI rule of the deactivated wireless network temporary identifier; - RNTI rules are updated.
  • the first access network device can adjust the I-RNTI rule of the second access network device. For example, when the first access network device discovers the I-RNTI rule based on the second access network device When the RNTI rule cannot reasonably determine the anchor point access network device, the second access network device can be assisted to modify the I-RNTI rule, thereby improving the accuracy of determining the anchor point access network device, and avoiding the need for When the I-RNTI determines the access network device of the anchor point, the access network device is omitted, which can improve the success rate of the terminal device to restore the RRC connection, and can also avoid determining too many access network devices based on the I-RNTI to a certain extent. Thereby, signaling overhead can be saved.
  • the message 3 carries the information of the first I-RNTI rule, and/or the identification information of the second access network device.
  • the OAM entity can determine the conflicting I-RNTI rules.
  • the OAM entity updates the conflicting I-RNTI rules, including: the OAM entity updates the I-RNTI rules of the second access network device; the OAM entity sends the updated I-RNTI rules to the second access network device; I-RNTI rules.
  • message 3 also carries information of the second I-RNTI rule that conflicts with the first I-RNTI rule, and/or the identifier of the third access network device corresponding to the second I-RNTI rule information. In the above manner, the OAM entity can determine the conflicting I-RNTI rules.
  • the OAM entity updates the conflicting I-RNTI rules, including: the OAM entity updates the I-RNTI rules of the third access network device; the OAM entity sends the updated I-RNTI rules to the third access network device; I-RNTI rules.
  • the present application provides a communication method, and the method can be applied to an access network device, or a chip, or a chipset, or a functional module in the chip that executes the method, and so on.
  • the method includes: the first access network device receives an RRC recovery request from the terminal device, the RRC recovery request carries the I-RNTI of the terminal device, and the I-RNTI indicates the corresponding I-RNTI rule; The first access network device determines the access network device corresponding to the I-RNTI based on the I-RNTI rule; the first access network device obtains the context information of the terminal device from the access network device.
  • the I-RNTI of the terminal device is used to indicate the corresponding I-RNTI rule, so that the first access network device can use the indicated I-RNTI rule to determine the access network device information carried in the I-RNTI, so that it can determine the access network device information carried in the I-RNTI.
  • the I-RNTI rule is used to indicate the corresponding I-RNTI rule, so that the first access network device can use the indicated I-RNTI rule to determine the access network device information carried in the I-RNTI, so that it can determine the access network device information carried in the I-RNTI.
  • the I-RNTI indicates the I-RNTI rule before the update of the second access network device; or, if the first bit of the I-RNTI Taking the second value, the I-RNTI indicates the updated I-RNTI rule of the second access network device.
  • the corresponding I-RNTI rule can be indicated by the one or more bits.
  • the present application provides a communication method, and the method can be applied to an access network device, or a chip, or a chipset, or a functional module in the chip that executes the method, and so on.
  • the method includes: the second access network device determines the I-RNTI rule; the second access network device determines the I-RNTI of the terminal device based on the I-RNTI rule, and the I-RNTI indicates the corresponding I-RNTI -RNTI rules.
  • the I-RNTI of the terminal device is used to indicate the corresponding I-RNTI rule, so that the first access network device can use the indicated I-RNTI rule to determine the access network device information carried in the I-RNTI, so that it can determine the access network device information carried in the I-RNTI.
  • the I-RNTI rule is used to indicate the corresponding I-RNTI rule, so that the first access network device can use the indicated I-RNTI rule to determine the access network device information carried in the I-RNTI, so that it can determine the access network device information carried in the I-RNTI.
  • the I-RNTI indicates the I-RNTI rule before the update of the second access network device; or, if the first bit of the I-RNTI Taking the second value, the I-RNTI indicates the updated I-RNTI rule of the second access network device.
  • the corresponding I-RNTI rule can be indicated by the one or more bits.
  • the present application provides a communication method, and the method can be applied to a terminal device, or a chip, or a chipset, or a functional module in a chip that executes the method, and so on.
  • the method includes:
  • the terminal device receives configuration information from the second access network device, where the configuration information carries the I-RNTI allocated by the second access network device to the terminal device, where the I-RNTI indicates the corresponding I-RNTI rule;
  • the access network device sends an RRC recovery request, and the RRC recovery request carries the I-RNTI of the terminal device, and the I-RNTI indicates the corresponding I-RNTI rule.
  • the I-RNTI of the terminal device is used to indicate the corresponding I-RNTI rule, so that the first access network device can use the indicated I-RNTI rule to determine the access network device information carried in the I-RNTI, so that it can determine the access network device information carried in the I-RNTI.
  • the I-RNTI rule is used to indicate the corresponding I-RNTI rule, so that the first access network device can use the indicated I-RNTI rule to determine the access network device information carried in the I-RNTI, so that it can determine the access network device information carried in the I-RNTI.
  • the I-RNTI indicates the I-RNTI rule before the update of the second access network device; or, if the first bit of the I-RNTI Taking the second value, the I-RNTI indicates the updated I-RNTI rule of the second access network device.
  • the corresponding I-RNTI rule can be indicated by the one or more bits.
  • the present application provides an apparatus, which may be a communication device, or a chip or a chipset in the communication device, wherein the communication device may be a terminal device, an access network device, or an OAM entity.
  • the apparatus may include a processing module and a transceiver module.
  • the processing module may be a processor, and the transceiver module may be a transceiver; the apparatus may further include a storage module, which may be a memory; the storage module is used to store instructions and/or data , the processing module reads the instructions and/or data stored in the storage module, so that the access network device executes the above-mentioned first to fourth, sixth to seventh, and ninth to tenth aspects
  • the processing module executes the instruction stored in the storage module, so that the terminal device performs the corresponding function in the fifth aspect, or, the processing module executes the instruction stored in the storage module, So that the OAM entity performs the corresponding function in the above eighth aspect.
  • the processing module may be a processor, and the transceiver module may be an input/output interface, a pin or a circuit, etc.; the processing module executes the instructions stored in the storage module to Perform the corresponding function in any one of the first aspect to the fourth aspect, the sixth aspect to the seventh aspect, and the ninth aspect to the tenth aspect, or, to perform the corresponding function in the fifth aspect, or, to The corresponding functions in the above eighth aspect are performed.
  • the storage module may be a storage module (eg, register, cache, etc.) within the chip or chipset, or may be a storage module (eg, read-only memory, random access memory, etc.) located outside the chip or chipset.
  • an apparatus comprising: a processor, a communication interface, and a memory.
  • the communication interface is used to transfer information, and/or messages, and/or data between the device and other devices.
  • the memory is used for storing computer-executable instructions, and when the apparatus operates, the processor executes the computer-executable instructions stored in the memory, so that the apparatus executes any one of the first to tenth aspects or any one of the above-mentioned aspects any of the methods described above.
  • the present application further provides a system, which includes a first access network device implementing any design of the first aspect above, and a second access device implementing any design of the second aspect above network equipment.
  • the present application further provides a system, which includes a first access network device implementing any of the designs of the third aspect above, and a second access device implementing any of the designs of the fourth aspect above.
  • the network device may further include a terminal device that implements the fifth aspect.
  • the present application further provides a system, which includes a first access network device implementing any of the designs of the sixth aspect, and a second access device implementing any of the designs of the seventh aspect. network equipment.
  • the present application further provides a system, the system includes a first access network device implementing any of the designs of the sixth aspect, and an OAM entity implementing any of the designs of the eighth aspect, and further A second access network device may be included.
  • the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, when the computer-readable storage medium runs on a computer, the computer executes the methods described in the above aspects.
  • the present application also provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the methods described in the above aspects.
  • FIG. 1 is a schematic structural diagram of an access network device according to an embodiment of the application.
  • FIG. 2 is a schematic structural diagram of another access network device according to an embodiment of the application.
  • FIG. 3 is a schematic flowchart of a terminal device restoring an RRC connection according to an embodiment of the present application
  • FIG. 4 is a schematic flowchart of an update I-RNTI rule according to an embodiment of the application.
  • FIG. 5 is a schematic flowchart of an update I-RNTI rule according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of an update I-RNTI rule according to an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of a communication method according to an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a communication method according to an embodiment of the present application.
  • FIG. 9 is a schematic flowchart of a communication method according to an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a communication method according to an embodiment of the application.
  • FIG. 11 is a schematic structural diagram of a communication device according to an embodiment of the application.
  • FIG. 12 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • the network elements involved in the embodiments of this application include access network equipment and terminal equipment.
  • An access network device is an entity on the network side for transmitting or receiving signals, such as a new generation base station (generation Node B, gNodeB or gNB).
  • An access network device may be a device used to communicate with a mobile device.
  • the access network device may be an access point (AP) in a wireless local area network (wireless local area networks, WLAN), or an evolved base station (evolutional Node B, eNB) in long term evolution (long term evolution, LTE).
  • an access network device provides services for a cell, and a terminal device communicates with the access network device through transmission resources (eg, frequency domain resources, or spectrum resources) used by the cell.
  • the access network device in this embodiment of the present application may refer to a centralized unit (central unit, CU) or a distributed unit (distributed unit, DU).
  • the access network device may also be composed of a CU and a DU, for example, as shown in FIG. 1 .
  • the CU and the DU may be physically separated, or may be deployed together, which is not specifically limited in this embodiment of the present application.
  • One CU can be connected to one DU, or multiple DUs can share one CU, which can save costs and facilitate network expansion.
  • the segmentation of CU and DU can be divided according to the protocol stack, one of the possible ways is to aggregate the radio resource control (radio resource control, RRC), service data adaptation protocol (service data adaptation protocol, SDAP) and packet data.
  • RRC radio resource control
  • SDAP service data adaptation protocol
  • the protocol (packet data convergence protocol, PDCP) layer is deployed in the CU, and the rest of the radio link control (radio link control, RLC) layer, media access control (media access control, MAC) layer and physical layer are deployed in the DU.
  • RLC radio link control
  • MAC media access control
  • the above-mentioned protocol stack segmentation manner is not completely limited in the embodiments of the present application, and other segmentation manners are also possible.
  • the CU and DU are connected through the F1 interface.
  • CU represents the gNB is connected to the core network through the Ng interface.
  • the access network device in this embodiment of the present application may refer to a centralized unit control plane (CU-CP) node or a centralized unit user plane (CU-UP) node, or the network device may also be a CU-CP and a CU- UP.
  • the CU-CP is responsible for the control plane function, mainly including RRC and PDCP-C.
  • PDCP-C is mainly responsible for encryption and decryption of control plane data, integrity protection, and data transmission.
  • CU-UP is responsible for user plane functions, mainly including SDAP and PDCP-U.
  • the SDAP is mainly responsible for processing the data of the core network and mapping the flow to the bearer.
  • PDCP-U is mainly responsible for data plane encryption and decryption, integrity protection, header compression, serial number maintenance, data transmission, etc.
  • the CU-CP and CU-UP are connected through the E1 interface.
  • CU-CP represents that the gNB is connected to the core network through the Ng interface.
  • CU-UP is connected through F1-U (user plane) and DU.
  • F1-C control plane
  • DU user plane
  • PDCP-C is also in CU-UP. As shown in FIG.
  • the access network device mentioned in this embodiment of the present application may be a device including a CU, or a DU, or a device including a CU and a DU, or a control plane CU node (CU-CP node) and a user plane CU node (CU-UP node) and devices of the DU node.
  • the access network equipment may be other apparatuses that provide wireless communication functions for the terminal equipment.
  • the embodiments of the present application do not limit the specific technology and specific device form adopted by the access network device.
  • a device that provides a wireless communication function for a terminal device is referred to as an access network device.
  • a terminal device may be a terminal device capable of receiving access network device scheduling and indication information
  • a terminal device may be a device that provides voice and/or data connectivity to a user, or a handheld device with wireless connectivity, or a connection to a wireless modem other processing equipment.
  • Terminal equipment can communicate with one or more core networks or the Internet via a radio access network (eg, radio access network, RAN), and the terminal equipment can be a mobile terminal equipment, such as a mobile phone (or "cellular" phone, mobile phone (mobile phone), computer and data cards, for example, may be portable, pocket, hand-held, computer built-in or vehicle mounted mobile devices that exchange language and/or data with the radio access network.
  • a terminal device may also be referred to as a system, a subscriber unit, a subscriber station, a mobile station, a mobile station (MS), a remote station, or an access point (access point).
  • the terminal device can also be a wearable device and a next-generation communication system, for example, a terminal device in a 5G network or a terminal device in a future evolved PLMN network, a terminal device in an NR communication system, and so on.
  • the embodiments of the present application may also be applicable to other future-oriented communication technologies.
  • the network architecture and service scenarios described in this application are for the purpose of illustrating the technical solutions of this application more clearly, and do not constitute a limitation on the technical solutions provided by this application. appears, the technical solutions provided in this application are also applicable to similar technical problems.
  • the terminal device and/or the network device may perform some or all of the steps in the embodiments of the present application, these steps or operations are only examples, and the embodiments of the present application may also perform other operations or various Variation of operations.
  • various steps may be performed in different orders presented in the embodiments of the present application, and may not be required to perform all the operations in the embodiments of the present application.
  • the communication system may be: a 5G communication system, an LTE communication system, a 6G communication system, a non-terrestrial network (non-terrestrial network, NTN) system, and the like.
  • the RRC state of the terminal device includes connected state, inactive state, and idle state.
  • the terminal device is in the inactive state, the RRC connection is suspended between the terminal device and the access network device, but the terminal device and the access network device are suspended.
  • the context information of the end device is saved.
  • the access network device When the access network device configures the terminal device to enter the inactive state, it will send an I-RNTI to the terminal device.
  • the I-RNTI is used by the access network device to obtain the context information of the terminal device.
  • the I-RNTI corresponds to the context information of the terminal device on the anchor access network device, and the context information of the terminal device can be found through the I-RNTI.
  • I-RNTI currently has two lengths, one is 40 bits (bit), which is generally called long I-RNTI (full I-RNTI), and the other is 24 bits, which is generally called short I-RNTI (short I-RNTI). I-RNTI).
  • the information in the I-RNTI may include the identity of the terminal device and the identity of the access network device (eg, the identity of the anchor access network device).
  • the embodiments of this application are described by taking an example that the I-RNTI has two lengths, and the length of the I-RNTI is not limited.
  • the terminal device in the inactive state initiates an RRC recovery process.
  • the RRC recovery process can be as follows:
  • the terminal device sends an RRC resume request (RRC resume request) message to the target access network device.
  • RRC resume request RRC resume request
  • the RRC resume request message carries the I-RNTI of the terminal device.
  • the target access network device is the access network device that initiates RRC recovery by the terminal device.
  • the target access network device sends a request (Retrieve UE context request) message to the anchor access network device.
  • the Retrieve UE context request message carries the I-RNTI of the terminal device.
  • the anchor access network device is the access network device that configures the terminal device to enter the inactive state, and may also be referred to as the source access network device.
  • the target access network device may determine the anchor access network device according to the identification information of the anchor access network device in the I-RNTI, and then send a Retrieve UE context request message to the anchor access network device. For example, the target access network device may determine the corresponding global access network device identification information according to the identification information of the anchor access network device in the I-RNTI, and then determine the corresponding anchor access network device.
  • the anchor access network device sends a response message to the target access network device.
  • the response message may be an acquisition terminal device context information response (Retrieve UE context response) message, wherein the Retrieve UE context response message carries the context information of the terminal device.
  • the target access network device successfully finds the access network device corresponding to the I-RNTI.
  • the response message may be a Retrieve UE context failure message. If the anchor access network device fails to verify the terminal device, the anchor access network device can send a Retrieve UE context failure message; in this scenario, it can be considered that the target access network device has not successfully found the access network device corresponding to the I-RNTI, that is The anchor access network device was unsuccessfully found.
  • the response message may be a Retrieve UE context failure message. If the anchor access network device successfully authenticates the terminal device, but determines to continue to maintain the context information of the terminal device or determines to release the terminal device to the idle state, the anchor access network device can send a Retrieve UE context failure message. At this time, the Retrieve UE context failure message The message carries the RRC Release (RRC Release) message generated by the anchor access network device, and the target access network device can transparently transmit or forward the RRC Release message to the terminal device. In this scenario, it can be considered that the target access network device successfully finds the access network device corresponding to the I-RNTI.
  • RRC Release RRC Release
  • the access network device may determine the format of the I-RNTI according to the I-RNTI rule.
  • the I-RNTI rules of the access network equipment can be changed, so that the access network equipment is prone to errors when performing the RRC recovery process on the terminal equipment according to the I-RNTI.
  • the embodiments of the present application provide a communication method and apparatus, which can solve the problem of communication errors caused by the change of the I-RNTI rule of the access network equipment.
  • the method and the device are based on the same inventive concept. Since the principles of the method and the device for solving the problem are similar, the implementation of the device and the method can be referred to each other, and the repetition will not be repeated.
  • At least one refers to one or more, and "a plurality” refers to two or more.
  • And/or which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects are an “or” relationship.
  • At least one (item) of the following or its similar expression refers to any combination of these items, including any combination of single item (item) or plural item (item).
  • At least one (a) of a, b or c may represent: a, b, c, a and b, a and c, b and c, or a, b and c, where a, b, c Can be single or multiple.
  • I-RNTI rules involved in the embodiments of this application may also be referred to as "I-RNTI formats", “I-RNTI division rules”, “I-RNTI reference profiles”, etc. , of course, it can also be named as other, as long as the information can have the characteristics of determining the I-RNTI format, it can be considered as the "I-RNTI rule" described in the embodiment of this application.
  • the target access network device is an access network device that initiates RRC recovery by the terminal device.
  • the source access network device is the access network device that configures the terminal device to enter the inactive state, or the access network device that is last accessed before the terminal device enters the inactive state.
  • the source access network device can also be called the anchor access network device. .
  • a communication method is provided in an embodiment of the present application. Specifically, the method may include:
  • the second access network device sends a message 1 to the first access network device, where the message 1 indicates the first I-RNTI rule of the second access network device.
  • the first access network device receives message 1 from the second access network device.
  • the second access network device may send a message 1 to the first access network device to indicate that the updated I-RNTI rule is the first I-RNTI rule .
  • the first access network device in the process of restoring the RRC connection by the terminal device, may be the target access network device that the terminal device initiates the RRC restoration process, and the second access network device may be the one that saves the terminal device.
  • the source access network device of the context information in the process of restoring the RRC connection by the terminal device, may be the target access network device that the terminal device initiates the RRC restoration process, and the second access network device may be the one that saves the terminal device.
  • the source access network device of the context information in the process of restoring the RRC connection by the terminal device.
  • the first I-RNTI rule may be used by the first access network device to determine the access network device identification information carried in the I-RNTI.
  • the first I-RNTI rule may include: related information of the access network device identification information, and the related information of the access network device identification information is used by the first access network device to determine the access network carried in the I-RNTI. Device identification information.
  • the related information of the access network device identification information is used to indicate the number of bits of the access network device identification information.
  • the relevant information of the access network device identification information may be a specific value, such as 20bit, 12bit, and the like.
  • the related information of the access network device identification information may also be a relative value, such as half, etc., the relative value can indicate the proportional relationship between the number of bits of the access network device identification information and the number of bits of the global access network device identification information
  • the relevant information of the access network device identification information can be
  • the number of bits indicating the access network device identification information is the number of bits of the global access network device identification information.
  • the access network device identification information carried in the I-RNTI may also be referred to as local access network device identification information, for example, local RAN node ID, and global access network device identification information may be global RAN node ID.
  • the bit position of the access network device identification information in the global access network device identification information may be determined by the first access network device according to the first RNTI rule, or may be preset, or specified by a protocol. of.
  • the first access network device may determine the access network device identity of the second access network device according to the relevant information of the access network device identity information and the global access network device identity information of the second access network device information.
  • the related information of the access network device identification information may be access network device identification information of the second access network device.
  • the first I-RNTI rule may further include at least one of the following: related information of the terminal equipment identifier, related information of the public land mobile network (PLMN), related information of the radio access technology/system, I - Information about RNTI rules.
  • PLMN public land mobile network
  • I - Information about RNTI rules may further include at least one of the following: related information of the terminal equipment identifier, related information of the public land mobile network (PLMN), related information of the radio access technology/system, I - Information about RNTI rules.
  • the related information of the terminal device identification is used to indicate the number of bits of the terminal device identification information.
  • the related information of the PLMN is used to indicate the number of bits of the PLMN information.
  • the related information of the radio access technology/system is used to indicate the number of bits of the radio access technology/system information.
  • the related information of the I-RNTI rule is used to indicate the number of bits of the I-RNTI rule sequence number or index information.
  • the first I-RNTI rule corresponds to the number of bits of the I-RNTI or the length type of the I-RNTI.
  • Message 1 may indicate the length type of the I-RNTI and the corresponding first I-RNTI rule.
  • message 1 indicates the following I-RNTI rule information:
  • the first I-RNTI rule may indicate that the local RAN node ID is 20 bits. Assuming that the protocol specifies that the least significant bit of the global RAN node ID carries the local RAN node ID, the first access network device can use the length information of the local RAN node ID in the first I-RNTI rule and the global RAN node of the second access network device ID determines the local RAN node ID. It is also assumed that the protocol stipulates that the lowest bit of the I-RNTI carries the local RAN node ID, then the first access network device can determine that when the length of the I-RNTI is 40, the first 20 bits of the I-RNTI from low to high are the local RAN node ID .
  • the first access network device can determine the local RAN node ID of the second access network device, and determine the local RAN node ID in the received I-RNTI. If the two local RAN node IDs are the same, the first access network device may determine, according to the corresponding global RAN node ID, that the second access network device may be the source/anchor point network device of the terminal device corresponding to the I-RNTI. When the I-RNTI length is 24 bits, the first I-RNTI rule may indicate that the local RAN node ID is 12 bits. For operations corresponding to the first access network device, reference may be made to the description when the length of the I-RNTI is 24 bits, which will not be repeated here.
  • the second access network device may indicate to the first access network device the length of the long local access network identification information, and/or the length of the short local access network device identification information.
  • the first I-RNTI rule may carry the specific content of the local RAN node ID.
  • message 1 may indicate the following I-RNTI rule information:
  • the first I-RNTI rule When the I-RNTI length is 40 bits, the first I-RNTI rule carries the long local RAN node ID of the second access network device, such as local RAN node ID1-1, and local RAN node ID1-1 is the second access network device. The length of the network device is the local RAN node ID of 20 bits. When the I-RNTI length is 24 bits, the first I-RNTI rule carries the short local RAN node ID of the second access network device, such as local RAN node ID1-2, and local RAN node ID1-2 is the second access network device. The length of the network device is the local RAN node ID of 12 bits.
  • the second access network device may indicate the long local access network device identification information and/or the short local access network device identification information to the first access network device.
  • the second access network device may indicate to the first access network device the length of the long local access network identification information, and/or the length of the short local access network device identification information.
  • I-RNTI rule involved in the following is similar to the "first I-RNTI rule", and for details, reference may be made to the relevant description of the first I-RNTI rule above, and the repetition will not be repeated.
  • the manner in which message 1 indicates the first I-RNTI rule may be: carrying the specific content of the first I-RNTI rule, or, message 1 may also carry the sequence number and index information of the first I-RNTI rule or logo.
  • the I-RNTI rule corresponding to the sequence number, identification or index information may be predefined by a protocol, or may be exchanged between access network devices, or the access network devices may obtain information from other network devices (for example, operation and management (operation and management). and management, OAM) equipment).
  • the protocol defines multiple I-RNTI rules, each I-RNTI rule corresponds to an index, and message 1 may carry the index of the first I-RNTI rule.
  • message 1 is an interface setup request message, such as an X2 setup request message, an Xn setup request message, or other messages.
  • S402 may be performed.
  • the first access network device determines that the first I-RNTI rule conflicts with the I-RNTI rules of other access network devices.
  • the first access network device determines that the local access network device identification information carried by the I-RNTI is associated with N possible access network devices based on the first I-RNTI rule, and determines the first access network device.
  • the I-RNTI rules conflict with the I-RNTI rules of access network devices other than the second access network device among the multiple possible access network devices, where N is an integer greater than 1.
  • N may be preset, or specified by a protocol, or may be determined by the first access network device, for example, the first access network device determines the value of N based on its own capabilities, and the like. Then, S403 may be performed.
  • the second access network device may send third information to the first access network device, where the third information is used to indicate whether the first access network device is allowed to assist the second access network
  • the device adjusts the I-RNTI rules.
  • allowing the first access network device to assist the second access network device to adjust the I-RNTI rules can be understood as allowing the first access network device to determine the I-RNTI rules of the second access network device and other connections. Check whether the I-RNTI rules of the network access device conflict. Alternatively, it can also be understood as allowing the first access network device to execute S403 when the I-RNTI rule of the second access network device conflicts with the I-RNTI rules of other access network devices.
  • the first access network device may maintain the second access network device's I-RNTI rules.
  • the first I-RNTI rule so that when the terminal device initiates the RRC recovery process to the first access network device, the first access network device can determine the local access carried by the I-RNTI of the terminal device according to the first I-RNTI rule network device identification information, so that the second access network device can be determined according to the local access network device identification information.
  • the first access network device triggers the second access network device to update the I-RNTI rule.
  • the first access network device may send a message 2 to the second access network device, where the message 2 instructs the second access network device to update the I-RNTI rule.
  • the second access network device may send the updated I-RNTI rule to the first access network device. As shown in Figure 5.
  • message 2 carries at least one item of the following information: first information and second information, where the first information is used to instruct the second access network device to update the I-RNTI rule, and the second information is used to instruct the I-RNTI Update requirements for RNTI rules.
  • the process of updating the I-RNTI rule by the second access network device may be: after receiving the message 2, the second access network device may re-determine the current I-RNTI rule, and notify the second access network device of the current I-RNTI rule.
  • An access network device the first access network device can re-determine whether the I-RNTI rule conflicts with the I-RNTI rules of other access network devices, and if there is a conflict, notify the second access network device until the second access network device There is no conflict between the I-RNTI rules of the network access device and the I-RNTI rules of other access network devices.
  • the update requirement of the I-RNTI rule may include the specific content of the I-RNTI rule, for example, the I-RNTI rule expected by the first access network device.
  • the update requirement of the I-RNTI rule may also include the constraint condition of the I-RNTI rule, for example, the condition that the I-RNTI rule expected by the first access network device needs to meet, and the like.
  • the first access network device determines the update requirement of the I-RNTI rule according to the I-RNTI rule conflicting with the first I-RNTI rule.
  • the first access network device may also follow the I-RNTI rules maintained by itself (including the I-RNTI rules of the first access network device and the I-RNTI rules of other access network devices) Determine the update requirements for the I-RNTI rules.
  • the first access network device may send a message 3 to an operation and management (Operation and management, OAM) entity, where the message 3 is used to indicate that there is a conflict in the I-RNTI rule.
  • OAM operation and management
  • message 3 may carry information of the first I-RNTI rule.
  • message 3 may carry specific content of the first I-RNTI rule, and may also carry identification information such as the sequence number and index of the first I-RNTI rule.
  • message 3 may carry identification information of the second access network device.
  • the OAM entity saves the correspondence between the access network equipment and the I-RNTI rules, and the OAM may determine the conflicting I-RNTI rules according to the identification information of the second access network equipment carried in message 3.
  • message 3 may also carry information of the first I-RNTI rule and identification information of the second access network device.
  • message 3 may also carry at least one of the information of the I-RNTI rule of other access network devices and the identification information of other access network devices, the other access network devices being the I-RNTI with the second access network device - The access network device in which the RNTI rules conflict, such as a third access network device.
  • the OAM entity may update the conflicting I-RNTI rules, so that the I-RNTI rules of the second access network device and the I-RNTI rules of other access network devices There is no conflict.
  • the OAM entity may update the I-RNTI rule of the second access network device, and report the conflict to the second access network device.
  • the access network device sends the updated I-RNTI rule, wherein the updated I-RNTI rule of the second access network device does not conflict with the I-RNTI rule of the third access network device.
  • the second access network device may send the updated I-RNTI rule to the first access network device.
  • the OAM entity may update the I-RNTI rules of the third access network device, and send the I-RNTI rules to the third access network device.
  • the third access network device sends the updated I-RNTI rule, wherein the updated I-RNTI rule of the third access network device does not conflict with the I-RNTI rule of the second access network device.
  • the OAM entity may also update the I-RNTI rule of the second access network device and the I-RNTI rule of the third access network device, so that the updated I-RNTI rule of the second access network device is compatible with the third access network device.
  • the updated I-RNTI rules of the network access device do not conflict.
  • the OAM entity may send at least one I-RNTI rule that allows selection to the second access network device.
  • the second access network device may determine the first I-RNTI rule as the current I-RNTI rule of the second access network device according to the at least one I-RNTI rule, as shown in FIG. 6 .
  • the embodiments of the present application may be applied to the interaction of I-RNTI rules between adjacent access network devices. It should be understood that the embodiments of the present application describe the process of the second access network device sending the I-RNTI rule to the first access network device, and the first access network device and the second access network device may communicate with each other. The I-RNTI rules are sent, and the repetition will not be repeated.
  • the first access network device may send the current I-RNTI rule of the first access network device to the second access network device.
  • RNTI rules For example, the first access network device receives message 1 sent by the second access network device. The first access network device sends message 4 to the second access network device. Message 4 carries the current I-RNTI rule of the first access network device.
  • message 1 may be an interface establishment request message
  • message 4 may be an interface establishment response message.
  • message 1 may be an X2 setup request message, an Xn setup request message or other request messages, and correspondingly, message 4 may be an X2 setup response message, an Xn setup response message or other response messages.
  • the access network device can adjust the I-RNTI rules of the neighboring stations. For example, when the access network device finds that the anchor point access network cannot be reasonably determined based on the I-RNTI rules of the neighboring stations When the device is installed, it can assist the neighboring station to modify the I-RNTI rules, thereby improving the accuracy of the target access network device in determining the anchor point access network device. Omitting access network devices when accessing network devices can improve the success rate of terminal devices in restoring RRC connections. On the other hand, it can also avoid determining too many access network devices based on I-RNTI to a certain extent, thus saving Signaling overhead.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the method may include:
  • the second access network device updates the I-RNTI rule.
  • the reason for updating the I-RNTI rule may be that the number of access network devices determined based on the original I-RNTI rule exceeds a threshold, or it may also be for a more reasonable configuration of terminal devices in an inactive state, of course, also It can be for other update reasons, which are not specifically limited here.
  • the second access network device may send the reason for updating the I-RNTI rule to the first access network device, or may not send it, which is not specifically limited here.
  • the second access network device may carry the reason for updating the I-RNTI rule in the first message.
  • step S701 may be an optional step.
  • the second access network device sends a first message to the first access network device, where the first message is used to indicate that at least two I-RNTI rules of the second access network device remain valid.
  • the first access network device receives the first message from the second access network device.
  • the at least two I-RNTI rules may include a first I-RNTI rule after the second access network device is updated and a second I-RNTI rule before the second access network device is updated.
  • the first message may indicate that the updated I-RNTI rule of the second access network device is the first I-RNTI rule, and that the second I-RNTI rule remains valid.
  • the first I-RNTI rule may include at least one I-RNTI rule.
  • the second I-RNTI rule may also include at least one I-RNTI rule.
  • the first message may carry the first I-RNTI rule and first indication information, where the first indication information is used to indicate whether the second I-RNTI rule remains valid. In the above manner, whether the second I-RNTI rule remains valid may be explicitly indicated through the indication information. It can be understood that if the second I-RNTI rule includes at least two I-RNTI rules, the first message may include at least one first indication information, wherein one first indication information may be associated with one of the second I-RNTI rules or multiple I-RNTI rules. For example, the first message may carry the first indication information corresponding to each I-RNTI rule. As an implementation manner, the first indication information may be at least one bit, and bits in the at least one bit respectively correspond to the I-RNTI rules in the second I-RNTI rules.
  • the first indication information corresponds to the number of bits of the I-RNTI or the length type of the I-RNTI.
  • the first message may indicate the length type of the I-RNTI and the corresponding first indication information.
  • the first message indicates the following information:
  • the first indication information indicates that the first I-RNTI rule is valid and the second I-RNTI rule is invalid.
  • the first indication information indicates that the first I-RNTI rule is invalid and the second I-RNTI rule is invalid.
  • the rule is valid.
  • the first indication information corresponding to the full I-RNTI that is, the length of the I-RNTI is 40 bits
  • the first access network device receives the first message after receiving the first message.
  • the first full I-RNTI rule in the second I-RNTI rule can be kept valid and the second full I-RNTI rule invalid.
  • the first indication information corresponding to the short I-RNTI (that is, the length of the I-RNTI is 24 bits) is 10, then the first access network device can keep the first information in the second I-RNTI rule after receiving the first message.
  • the first short I-RNTI rule is invalid and the second short I-RNTI rule is valid.
  • the first message may carry the first I-RNTI rule and the second I-RNTI rule.
  • the first message may carry the first I-RNTI rule and the second I-RNTI rule.
  • the first message may instruct the first access network device to add the first I-RNTI rule.
  • the second I-RNTI rule can be implicitly indicated to remain valid.
  • the first message may indicate the following information:
  • the second access network device sends the second I-RNTI rule to the first access network device.
  • the first access network device may also determine that some of the I-RNTI rules in the at least two I-RNTI rules are invalid.
  • the first access network device determines that the second I-RNTI rule is invalid. If the first access network device determines that the second I-RNTI rule is invalid when the timer corresponding to the second I-RNTI rule expires, the timer may record the valid time of the second I-RNTI rule.
  • the first message may also carry time information, which is used to indicate the valid time of the second I-RNTI rule.
  • the second access network device may also indicate that the second I-RNTI rule is invalid. For example, when the second access network device releases the context information of all terminal devices allocated I-RNTI based on the second I-RNTI rule, the second access network device may indicate the second I-RNTI rule to the first access network device invalid. For example, an implementation manner for the second access network device to release the context information of all terminal devices allocated I-RNTI based on the second I-RNTI rule may be: the second access network device deletes the I-RNTI allocated based on the second I-RNTI rule. The context information of the terminal equipment of the RNTI, and/or the context information of the terminal equipment based on the second I-RNTI rule is transferred to other access network equipment.
  • the first access network The device may receive a second message from the second access network device, the second message indicating that the second I-RNTI rule is invalid, or the second message indicating that the first I-RNTI rule remains valid.
  • the second message carries second indication information, where the second indication information is used to indicate that the second I-RNTI rule is invalid, and in this manner, the indication information is displayed to indicate that the second I-RNTI rule is invalid.
  • the second message carries the first I-RNTI rule, and in this manner, the invalidation of the second I-RNTI rule is implicitly indicated when the second message does not indicate that the second I-RNTI rule is valid.
  • the second message carries the first I-RNTI rule and the second indication information.
  • the second message carries the second I-RNTI rule, and indicates that the second I-RNTI rule is invalid or instructs the first access network device to release the second I-RNTI rule.
  • the embodiment of this application is described by taking the second message indicating the invalidation of the second I-RNTI rule as an example.
  • the second message may also indicate a new third I-RNTI rule.
  • the first message indicating the first I-RNTI rule will not be repeated here.
  • the second message indicates the following information:
  • the second indication information corresponds to the number of bits of the I-RNTI or the length type of the I-RNTI.
  • the second message may indicate the length type of the I-RNTI and the corresponding second indication information.
  • the second message indicates the following information:
  • the first access network device may no longer maintain the second I-RNTI rule corresponding to the full I-RNTI after receiving the second message.
  • the second indication information when the short I-RNTI is not indicated in the second message therefore, after receiving the second message, the first access network device continues to maintain the second I-RNTI rule corresponding to the short I-RNTI.
  • the first access network device may determine that the second I-RNTI rule is invalid when the timer corresponding to the second I-RNTI rule expires.
  • step S702 may be an optional step.
  • the fact that the first access network device maintains multiple I-RNTI rules of the second access network device to be valid may also not depend on the foregoing steps S701 and/or S702.
  • the second access network device may also indicate that some or all of the I-RNTI rules in the multiple I-RNTI rules are invalid through the second message.
  • the first access network device determines an access network device corresponding to the I-RNTI of the terminal device according to at least one valid I-RNTI rule of the second access network device.
  • the at least one valid I-RNTI rule of the second access network device may include one or more of the at least two valid I-RNTI rules indicated by the first message, and may also be included in step S702. Then the new valid I-RNTI rule indicated by the second access network device. For example, if after S702, the first access network device determines that the second I-RNTI rule is valid, the first access network device may determine the terminal device's The access network device corresponding to the I-RNTI.
  • the at least one valid I-RNTI rule of the second access network device may also not include at least two valid I-RNTI rules indicated by the first message.
  • the first access network device determines the first A message indicates that at least two valid I-RNTI rules are invalid, then the at least one valid I-RNTI rule adopted by the first access network device when performing S703 may not include at least two valid I-RNTI rules indicated by the first message. RNTI rules.
  • At least one valid I-RNTI rule of the second access network device may not depend on the first message.
  • the first access network device maintains multiple I-RNTI rules of the second access network device to be valid without relying on S701 and/or S702, and at least one valid I-RNTI rule described in step S703 is valid It may include one or more I-RNTI rules among the plurality of I-RNTI rules maintained by the first access network device.
  • the first access network device sends a request message for acquiring terminal device context information to at least one access network device among the determined access network devices.
  • the first access network device determines the access network device according to a valid I-RNTI rule. If the determined number of access network devices is greater than or equal to 2, the first access network device may send a request message for obtaining terminal device context information to all access network devices, or, through a traversal mechanism, send messages to the determined access network devices in turn. The device sends a request message for obtaining terminal device context information. If the first access network device adopts the traversal mechanism, the first access network device may sequentially send a request message for obtaining terminal device context information to each access network device until the access network device corresponding to the I-RNTI is successfully found. For example, the first access network device sends a request message for obtaining the context information of the terminal device to the first access network device.
  • the access network device corresponding to the I-RNTI If the access network device corresponding to the I-RNTI is not found successfully, it continues to send the obtainment message to the next access network device. Terminal device context information request message. And so on, until the access network device corresponding to the I-RNTI is successfully found.
  • the first access network device sends a request message for obtaining terminal device context information to the first access network device as an example, but the “first” in this embodiment of the present application is not limited to one. That is, the first access network device may also acquire the context information of the terminal device from multiple access network devices at the same time.
  • the first access network device may sequentially determine the access network device according to the valid I-RNTI rule. If the first access network device fails to find the access network device corresponding to the I-RNTI according to the nth I-RNTI rule, the first access network device determines the corresponding access network according to the n+1th I-RNTI rule equipment. And so on, until the access network device corresponding to the I-RNTI is successfully found. If the number of access network devices determined by the first access network device according to each I-RNTI rule is greater than or equal to 2, then for each I-RNTI rule, the first access network device can obtain the terminal device context information when acquiring the terminal device context information. The method of acquiring the context information of the terminal device in the implementation mode 1 is adopted. Of course, other methods may also be adopted, which are not specifically limited here. where n is an integer greater than or equal to 1.
  • the first access network device may, according to the first I-RNTI rule, and/or, The second I-RNTI rule determines the access network device corresponding to the I-RNTI of the terminal device. According to implementation manner 1, the first access network device first determines the corresponding access network device according to the first I-RNTI rule and the second I-RNTI rule, respectively.
  • the first access network device may perform S704 separately with all the determined access network devices, or may perform S704 with some corresponding access network devices. If the first access network device and some corresponding access network devices execute S704, when the first access network device successfully finds the access network device corresponding to the I-RNTI, the first access network device may terminate the traversal. According to implementation mode 2, the first access network device may determine the access corresponding to the I-RNTI of the terminal device based on the first I-RNTI rule (which may be the first I-RNTI rule or the second I-RNTI rule). The network access device then sends a request message for acquiring terminal device context information to the access network device determined based on the first I-RNTI rule.
  • the first I-RNTI rule which may be the first I-RNTI rule or the second I-RNTI rule.
  • the first access network device may perform S704 separately with all the determined access network devices, or may perform S704 with some corresponding access network devices. If the first access network device traverses the access network devices determined according to the first I-RNTI rule and fails to find the access network device corresponding to the I-RNTI, it can continue to determine the terminal device based on the second I-RNTI rule The access network equipment corresponding to the I-RNTI. If the number of access network devices determined based on the second I-RNTI rule is greater than or equal to 2, the implementation manner of the first access network device may refer to the above description, which will not be repeated here.
  • the first access network device can The I-RNTI of the terminal device determines multiple access network devices.
  • the first access network device is used to obtain the context information of the terminal device based on one I-RNTI rule at a time during the traversal process, but the embodiment of the present application is not limited to one, the first An access network device may also acquire the context information of the terminal device based on multiple I-RNTI rules at a time during the traversal process.
  • the target access network device can maintain multiple I-RNTI rules of the source access network device valid under the instruction of the source access network device, so that when restoring the RRC connection of the terminal device, it can be based on multiple I-RNTI rules.
  • the RNTI rule determines the source access network device, so that to a certain extent, it can avoid omitting the access network device when determining the source access network device based on the I-RNTI, so that the success rate of the terminal device in restoring the RRC connection can be improved, so that the terminal device can It can quickly enter the connection state and shorten the delay of service transmission.
  • the first message instructs to add an I-RNTI rule, so that the first access network device further maintains the added I-RNTI rule on the basis of maintaining the original I-RNTI rule of the second access network device.
  • the I-RNTI rule is updated by the access network equipment, there may be terminal equipment that allocates the I-RNTI based on the original I-RNTI rule.
  • the first access network device can determine the access network device according to the original I-RNTI rule and the newly added I-RNTI rule when restoring the RRC connection of the terminal device, thereby avoiding missed access to a certain extent. network equipment, thereby improving the success rate of the terminal equipment to restore the RRC connection.
  • the second message instructs to delete/release the I-RNTI rule, so that the first access network device can no longer maintain the original I-RNTI rule of the second access network device.
  • the first access network device can determine the access network device according to the newly added I-RNTI rule when restoring the RRC connection of the terminal device, so that the number of the determined access network devices can be reduced, and a small number of access network devices can be
  • the access network device acquires the context information of the terminal device, and it can be seen that the cost of the first access network device can be reduced by the above method.
  • the second access network device may interact with the first access network device based on the process described in Embodiment 1, So that there is no conflict between the I-RNTI rules of the second access network device and the I-RNTI rules of other access network devices, the specific process can refer to the description in Embodiment 1, which will not be repeated here.
  • the first access network device may be the target access network device that initiates the RRC recovery process for the terminal device
  • the second access network device may be the source access network device that stores the context information of the terminal device .
  • the process shown in Figure 8 may include:
  • the second access network device sends the I-RNTI rule 1 to the first access network device.
  • the second access network device and the first access network device may interact based on the process described in Embodiment 1, so that the I-RNTI rule 1 and the I-RNTI rules of other access network devices There is no conflict.
  • the second access network device configures at least one first terminal device to enter an inactive state, and allocates an I-RNTI to the terminal device based on I-RNTI rule 1.
  • steps S801 and S802 do not have a strict sequence. S801 may be executed first and then S802 may be executed, or S802 may be executed first and then S801 may be executed, or S801 and S802 may be executed simultaneously.
  • the second access network device determines to update the current I-RNTI rule to I-RNTI rule 2.
  • the second access network device and the first access network device may interact based on the process described in Embodiment 1, so that the I-RNTI rule 2 and the I-RNTI rules of other access network devices There is no conflict.
  • the reason for updating the I-RNTI rule may be that the number of access network devices determined based on I-RNTI rule 1 exceeds the threshold, or it may be to configure the terminal devices in the inactive state more reasonably.
  • the threshold may be a configurable threshold for the terminal devices in the inactive state.
  • the second access network device may send the reason for updating the I-RNTI rule to the first access network device, or may not send it, which is not specifically limited here.
  • the second access network device may carry the reason for updating the I-RNTI rule in the first message.
  • the second access network device sends a first message to the first access network device, where the first message carries the I-RNTI rule 2 and indicates that the I-RNTI rule 1 remains valid.
  • the first message may carry I-RNTI rule 2 and first indication information, where the first indication information is used to indicate that I-RNTI rule 1 remains valid, or the first indication information may also indicate the first access network
  • the device may determine the access network device according to the I-RNTI rule 1 before the update.
  • the first message may carry I-RNTI rule 1 and I-RNTI rule 2.
  • the first message may instruct the first access network device to add I-RNTI rule 2.
  • the first message may be a device configuration update message, such as an ENB/NG-RAN NODE CONFIGURATION UPDATE message, or a device configuration update confirmation message, such as an ENB/NG-RAN NODE CONFIGURATION UPDATE ACKNOWLEDGE.
  • a device configuration update message such as an ENB/NG-RAN NODE CONFIGURATION UPDATE message
  • a device configuration update confirmation message such as an ENB/NG-RAN NODE CONFIGURATION UPDATE ACKNOWLEDGE.
  • S805 may be executed.
  • the first access network device sends a confirmation message of the first message to the second access network device.
  • the confirmation message of the first message may be a device configuration update confirmation message, such as ENB/NG-RAN NODE CONFIGURATION UPDATE ACKNOWLEDGE.
  • the second access network device configures at least one second terminal device to enter an inactive state, and allocates an I-RNTI to the terminal device based on I-RNTI rule 2.
  • the terminal device 1 sends an RRC recovery request message to the first access network device, where the RRC recovery request message carries the I-RNTI of the terminal device 1 .
  • the terminal device 1 may be a first terminal device or a second terminal device.
  • the first access network device determines the access network device corresponding to the I-RNTI of the terminal device 1 based on the I-RNTI rule 1 and/or the I-RNTI rule 2.
  • the first access network device sends a context acquisition request message to the determined access network device, where the context acquisition request message is used to acquire the context information of the terminal device 1 .
  • the first access network device determines the access network device corresponding to the I-RNTI of the terminal device 1 based on the I-RNTI rule 1 and the I-RNTI rule 2, and reports to the access network device determined based on the I-RNTI rule 1.
  • the access network device and the access network device determined based on the I-RNTI rule 2 respectively send a context acquisition request message.
  • the first access network device determines the access network device corresponding to the I-RNTI of the terminal device based on the I-RNTI rule 1, and sends the context to the access network device determined based on the I-RNTI rule 1 Get request message. If the access network device corresponding to the I-RNTI is successfully found, the RRC recovery process is continued. For details, please refer to the description of S303 in FIG. 3 . If the access network device corresponding to the I-RNTI is not successfully found, the access network device corresponding to the I-RNTI of the terminal device is determined based on the I-RNTI rule 2, and the access network device determined based on the I-RNTI rule 2 is sent to the terminal device. Send a context get request message.
  • the second access network device sends a second message to the first access network device, where the second message indicates that the I-RNTI rule 1 is invalid.
  • the second message carries second indication information, and the second indication information is used to indicate that the I-RNTI rule 1 is invalid.
  • the second message only carries I-RNTI rule 2.
  • the second message carries the second indication information and I-RNTI rule 2.
  • the second message carries the I-RNTI rule 1, and indicates that the I-RNTI rule 1 is invalid or instructs the first access network device to release the I-RNTI rule 1.
  • the second message may be a device configuration update message, such as an ENB/NG-RAN NODE CONFIGURATION UPDATE message, or a device configuration update confirmation message, such as an ENB/NG-RAN NODE CONFIGURATION UPDATE ACKNOWLEDGE.
  • a device configuration update message such as an ENB/NG-RAN NODE CONFIGURATION UPDATE message
  • a device configuration update confirmation message such as an ENB/NG-RAN NODE CONFIGURATION UPDATE ACKNOWLEDGE.
  • the second access network device may send the second message to the first access network device when releasing the context information of all terminal devices allocated I-RNTI based on I-RNTI rule 1.
  • the first access network device may determine the access network device based on the I-RNTI rule 2.
  • the second embodiment of the present application only describes the process of updating the I-RNTI rules by the second access network device to the first access network device, and the first access network device may also update the second access network device I-RNTI rules, the repetition will not be repeated.
  • the method may include:
  • the second access network device updates the I-RNTI rule.
  • step S100 reference may be made to the relevant description of step S701, which will not be repeated here.
  • step S1001 After step S1001, S1002a, or S1002b, or S1002a and S1002b may be performed.
  • the second access network device sends a first paging message, where the first paging message is used to instruct the access network device in the radio access network notification area of the terminal device in the inactive state to page the terminal device in the inactive state .
  • the access network device in the radio access network notification area of the terminal device in the inactive state receives the first paging message.
  • the first access network device may send a third paging message, and the first access network device may send a third paging message.
  • Three paging messages are used for paging inactive terminal devices.
  • the first paging message may carry a paging cause, where the paging cause is used to indicate a change in the I-RNTI rule.
  • the third paging message may carry a paging cause, where the paging cause is used to indicate a change in the I-RNTI rule.
  • the second access network device sends a second paging message, where the second paging message is used for the second access network device to page the terminal device in the inactive state.
  • the terminal device receives the second paging message.
  • the second paging message may carry a paging cause, where the paging cause is used to indicate the I-RNTI rule change.
  • S1003 may be performed.
  • the second access network device performs at least one of the following A-C:
  • the I-RNTI of the first terminal device in the inactive state is triggered to be updated based on the updated I-RNTI rule.
  • the first terminal device sends a paging response to the second access network device
  • the second access network device may allocate an I-RNTI to the first terminal device based on the updated I-RNTI rule.
  • the second access network device may send a third message to the third access network device, and the third access network device forwards the third message to the first terminal device, where the third message is used to update the The I-RNTI rule of the I-RNTI is allocated to the first terminal device, wherein the third access network device is the access network device that receives the paging response sent by the first terminal device.
  • the third message may carry a reason value for indicating the I-RNTI rule change.
  • the second terminal device in the inactive state is triggered to enter the idle state.
  • the second terminal device sends a paging response to the second access network device, and the second access network device releases the second terminal device to an idle state;
  • the second terminal device sends a paging response to the fourth access network device
  • the second access network device may send a fourth message to the fourth access network device
  • the fourth access network device sends a fourth message to the fourth access network device.
  • a terminal device forwards the fourth message, and the fourth message is used to release the second terminal device to the idle state.
  • the fourth message may carry a reason value for indicating the I-RNTI rule change.
  • the second access network device may store the context information of the first terminal device, the second terminal device, and the third terminal device.
  • the source access network device when updating the I-RNTI rule, can update the I-RNTI of the terminal device based on the new I-RNTI rule by paging the terminal device in time, or release the terminal device In idle state, or the context information of the terminal equipment that allocates I-RNTI based on the old I-RNTI rules is transferred to other access network equipment, so that the source access network equipment and the target access network equipment can maintain a set of I-RNTI rules , so that the complexity of the access network device implementation can be reduced.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • one or more bits are divided in the I-RNTI to indicate the corresponding I-RNTI rule.
  • another communication method is provided in this embodiment of the present application. Specifically, the method may include:
  • the second access network device sends the current I-RNTI rule 1 to the first access network device.
  • the second access network device configures the I-RNTI for the terminal device 1 according to the I-RNTI rule 1.
  • one or more bits in the I-RNTI configured for the terminal device 1 indicate the corresponding I-RNTI rule 1.
  • the second access network device may send configuration information to the terminal device 1, where the configuration information carries the I-RNTI of the terminal device 1.
  • the I-RNTI of the terminal device 1 may carry the specific content of the I-RNTI rule 1, and may also carry the identifier and index information of the I-RNTI rule 1.
  • step S1101 may be an optional step. For example, when the specific content of I-RNTI rule 1 is carried in the I-RNTI, S1101 may not be executed.
  • the second access network device updates the current I-RNTI rule to I-RNTI rule 2 to the first access network device.
  • the second access network device configures the I-RNTI for the terminal device 2 according to the I-RNTI rule 2.
  • one or more bits in the I-RNTI of the terminal device 2 indicate the corresponding I-RNTI rule 2.
  • the second access network device may send configuration information to the terminal device 2, where the configuration information carries the I-RNTI of the terminal device 2.
  • the I-RNTI of the terminal device 2 may carry the specific content of the I-RNTI rule 2, and may also carry the identifier and index information of the I-RNTI rule 2.
  • step S1102 may be an optional step. For example, when the specific content of I-RNTI rule 2 is carried in the I-RNTI, S1102 may not be executed.
  • the terminal device sends an RRC recovery request to the first access network device, where the RRC recovery request carries the I-RNTI of the terminal device.
  • the terminal device may be the above-mentioned terminal device 1 or the terminal device 2 .
  • the first access network device determines the corresponding I-RNTI rule based on the I-RNTI of the terminal device.
  • the first access network device determines that the corresponding I-RNTI rule is I-RNTI rule 1 based on the I-RNTI of the terminal device.
  • the first access network device determines that the corresponding I-RNTI rule is I-RNTI rule 2 based on the I-RNTI of the terminal device.
  • the first access network device determines an access network device corresponding to the I-RNTI of the terminal device based on the corresponding I-RNTI rule.
  • the first access network device acquires the context information of the terminal device from the determined access network device.
  • the fourth embodiment of the present application only sends the I-RNTI rule to the second access network device to the first access network device, the second access network device allocates the I-RNTI to the terminal device, and the terminal device accesses the first access network device to the first access network device.
  • the process of initiating the RRC recovery process by the network device is described.
  • the first access network device can also send the I-RNTI rules to the second access network device, and the first access network device can also allocate the I-RNTI to the terminal device and the terminal
  • the device may also initiate an RRC recovery process to the second access network device, and the repetition will not be repeated.
  • the I-RNTI of the terminal device is used to indicate the corresponding I-RNTI rule, so that the first access network device can use the indicated I-RNTI rule to determine the access network device information carried in the I-RNTI, so that it can determine the access network device information carried in the I-RNTI.
  • the I-RNTI rule is used to indicate the corresponding I-RNTI rule, so that the first access network device can use the indicated I-RNTI rule to determine the access network device information carried in the I-RNTI, so that it can determine the access network device information carried in the I-RNTI.
  • the embodiments of the present application provide a communication device.
  • the structure of the communication device may be as shown in FIG. 11 , including a transceiver module 1201 and a processing module 1202 .
  • a storage module may also be included, and the storage module may be used to store program instructions and/or data.
  • the processing module 1202 may call program instructions stored in the storage module to perform processing actions such as determination, acquisition, and update.
  • the communication apparatus may be specifically used to implement the method performed by the first access network device in the embodiment described in FIG. 7 or FIG. 8 , and the apparatus may be the first access network device itself, or may be a A chip in the first access network device or a chip set or a part of the chip for performing the function of the related method.
  • the transceiver module 1201 is used to receive a first message from the second access network device, where the first message is used to indicate that at least two I-RNTI rules of the second access network device remain valid; the processing module 1202 is used to Determine the access network device corresponding to the I-RNTI of the terminal device according to at least one valid I-RNTI rule of the second access network device; and obtain the access network device of the terminal device from at least one of the determined access network devices. contextual information.
  • the first message indicates that the updated I-RNTI rule of the second access network device is the first I-RNTI rule, and indicates that the second I-RNTI rule remains valid, and the second I-RNTI rule is the second I-RNTI rule. I-RNTI rules before the network access device is updated.
  • the first message carries the first I-RNTI rule and first indication information, and the first indication information is used to indicate that the second I-RNTI rule remains valid; or, the first message carries the first I-RNTI rule and the first I-RNTI rule. 2. I-RNTI Rules.
  • the transceiver module 1201 is further configured to: receive a second message from the second access network device, where the second message indicates that the second I-RNTI rule is invalid.
  • the second message carries second indication information, where the second indication information is used to indicate that the second I-RNTI rule is invalid; or, the second message indicates that the first I-RNTI rule remains valid.
  • the communication apparatus may be specifically used to implement the method performed by the second access network device in the embodiment described in FIG. 7 or FIG. 8 , and the apparatus may be the second access network device itself, or it may be It is a chip or a chip set in the second access network device or a part of the chip for executing the function of the related method.
  • the processing module 1202 is used to update the I-RNTI rules; the transceiver module 1201 is used to send a first message to the first access network device, where the first message is used to indicate at least two I-RNTIs of the second access network device. RNTI rules remain in effect.
  • the first message indicates that the updated I-RNTI rule of the second access network device is the first I-RNTI rule, and indicates that the second I-RNTI rule remains valid, and the second I-RNTI rule is the second I-RNTI rule. I-RNTI rules before the network access device is updated.
  • the first message carries the first I-RNTI rule and first indication information, and the first indication information is used to indicate that the second I-RNTI rule remains valid; or, the first message carries the first I-RNTI rule and the first I-RNTI rule. 2. I-RNTI Rules.
  • the transceiver module 1201 is further configured to: send a second message to the first access network device, where the second message indicates that the second I-RNTI rule is invalid.
  • the second message carries second indication information, where the second indication information is used to indicate that the second I-RNTI rule is invalid; or, the second message indicates that the first I-RNTI rule remains valid.
  • the communication apparatus may be specifically used to implement the method performed by the first access network device in the embodiment described in FIG. 10 , and the apparatus may be the first access network device itself, or the first access network device itself.
  • the processing module 1202 is used to update the I-RNTI rules;
  • the transceiver module 1201 is used to send a first paging message and/or a second paging message, and the first paging message is used to indicate the status of the terminal equipment in the inactive state.
  • the access network device in the radio access network notification area pages the terminal device in the inactive state, and the second paging message is used for the second access network device to page the terminal device in the inactive state;
  • the transceiver module 1201 is further used for Perform at least one of the following: triggering the I-RNTI of the first terminal device in the inactive state to update based on the updated I-RNTI rule; triggering the second terminal device in the inactive state to enter the idle state;
  • the network access device sends the context information of the inactive third terminal device, and the first access network device is the access network device that receives the paging response sent by the third terminal device.
  • the first paging message and/or the second paging message carry a paging reason
  • the paging reason is an I-RNTI rule change
  • the processing module 1202 when triggering the update of the I-RNTI of the first terminal device in the inactive state, is specifically configured to: allocate the I-RNTI to the first terminal device based on the updated I-RNTI rule;
  • the transceiver module 1201 sends a third message to a third access network device, where the third access network device is an access network device that receives a paging response sent by the first terminal device, and the third message is used to instruct the third access network device
  • An I-RNTI is allocated to the first terminal device.
  • the third message carries a reason value for indicating the I-RNTI rule change.
  • the transceiver module 1201 is specifically configured to: release the second terminal device to the idle state; or, send the sending and receiving module 1201 to the fourth access network device through the transceiver module 1201
  • the fourth message, the fourth access network device is the access network device that receives the paging response sent by the second terminal device, and the fourth message is used to instruct the fourth access network device to release the second terminal device to the idle state.
  • the fourth message carries a reason value for indicating the I-RNTI rule change.
  • the communication apparatus may be specifically used to implement the method performed by the second access network device in the embodiment described in FIG. 10 , and the apparatus may be the second access network device itself, or the second access network device itself.
  • the transceiver module 1201 is used to receive a first paging message from a second access network device, and the first paging message is used to page an inactive terminal device; and send a third paging message, the third paging message
  • the paging message is used for paging the terminal equipment in the inactive state
  • the processing module 1202 is configured to perform at least one of the following: update the I-RNTI of the first terminal equipment in the inactive state; release the second terminal equipment in the inactive state and enter the idle state state.
  • the first paging message and/or the third paging message carry a paging reason
  • the paging reason is an I-RNTI rule change.
  • the transceiver module 1201 is further configured to: before the processing module 1202 updates the inactive terminal device I-RNTI, receive a third message from the second access network device, where the third message is used to indicate the first connection.
  • the network access device allocates the I-RNTI to the first terminal device; or, before the processing module 1202 releases the terminal device in the inactive state to enter the idle state, receives a fourth message from the second access network device, where the fourth message is used to indicate The fourth access network device releases the second terminal device to an idle state.
  • the third message and/or the fourth message carries a reason value for indicating the I-RNTI rule change.
  • the communication apparatus may be specifically used to implement the method performed by the terminal device in the embodiment described in FIG. 10 , and the apparatus may be the second access network device itself, or may be in the second access network device.
  • the transceiver module 1201 is configured to receive the second paging message or the third paging message.
  • the processing module 1202 is configured to enter an idle state or update the I-RNTI.
  • the communication apparatus may be specifically used to implement the method performed by the first access network device in the embodiments described in FIG. 4 to FIG. 6 , and the apparatus may be the first access network device itself, or may be a A chip in the first access network device or a chip set or a part of the chip for performing the function of the related method.
  • the transceiver module 1201 is used to receive message 1 from the second access network device, where the message 1 indicates the first I-RNTI rule of the second access network device; the processing module 1202, the first access network device determines the first I-RNTI rule. There is a conflict between the I-RNTI rules and the I-RNTI rules of other access network devices; and, triggering the second access network device to update the I-RNTI rules.
  • the processing module 1202 when triggering the second access network device to update the I-RNTI rule, is specifically configured to: send a message 2 to the second access network device through the transceiver module, where the message 2 indicates the second access network device Update I-RNTI rules.
  • message 2 carries at least one item of the following information: first information and second information, where the first information is used to instruct the second access network device to update the I-RNTI rule, and the second information is used to instruct the I-RNTI Update requirements for RNTI rules.
  • first information is used to instruct the second access network device to update the I-RNTI rule
  • second information is used to instruct the I-RNTI Update requirements for RNTI rules.
  • the processing module 1202 when triggering the second access network device to update the I-RNTI rules, is specifically configured to: send a message 3 to the OAM entity through the transceiver module, where the message 3 is used to indicate that there is a conflict in the I-RNTI rules.
  • message 3 carries the information of the first I-RNTI rule, and/or the identification information of the second access network device.
  • the OAM entity can determine the conflicting I-RNTI rules.
  • message 3 also carries information of I-RNTI rules of other access network devices, and/or identification information of other access network devices.
  • the OAM entity can determine the conflicting I-RNTI rules.
  • the transceiver module 1201 is further configured to receive third information from the second access network device, where the third information is used to indicate that the first access network device is allowed to assist the second access network device to adjust the I-RNTI rule.
  • the communication apparatus may be specifically used to implement the method performed by the second access network device in the embodiments described in FIG. 4 to FIG. 6 , and the apparatus may be the second access network device itself, or may be a A chip in the second access network device or a chip set or a part of the chip for performing the function of the related method.
  • the transceiver module 1201 is used to communicate with the first access network device.
  • the processing module 1202 is configured to send a message 1 to the first access network device through the transceiver module 1201, where the message 1 indicates the first I-RNTI rule of the second access network device; receive through the transceiver module 1201 from the first access network device The message 2 of the message 2 instructs the second access network device to update the I-RNTI rule.
  • message 2 carries at least one item of the following information: first information and second information, where the first information is used to instruct the second access network device to update the I-RNTI rule, and the second information is used to instruct the I-RNTI Update requirements for RNTI rules.
  • first information is used to instruct the second access network device to update the I-RNTI rule
  • second information is used to instruct the I-RNTI Update requirements for RNTI rules.
  • the transceiver module 1201 is further configured to: send third information to the first access network device, where the third information is used to indicate that the first access network device is allowed to assist the second access network device to adjust the I-RNTI rule.
  • message 3 carries the information of the first I-RNTI rule, and/or the identification information of the second access network device.
  • the OAM entity can determine the conflicting I-RNTI rules.
  • message 3 also carries information of I-RNTI rules of other access network devices, and/or identification information of other access network devices.
  • the OAM entity can determine the conflicting I-RNTI rules.
  • the transceiver module 1201 is further configured to: send third information to the first access network device, where the third information is used to indicate that the first access network device is allowed to assist the second access network device to adjust the I-RNTI rule.
  • the communication device may be specifically used to implement the method performed by the OAM entity in the embodiments described in FIG. 4 to FIG. 6 , and the device may be the OAM entity itself, or a chip or a chipset in the OAM entity. or the part of the chip used to perform the function of the associated method.
  • the transceiver module 1201 is configured to receive message 3 from the first access network device, where message 3 is used to indicate that there is a conflict in the I-RNTI rule of the deactivated wireless network temporary identifier.
  • the processing module 1202 is configured to update the conflicting I-RNTI rules.
  • the processing module 1202 is specifically configured to update the I-RNTI rule of the second access network device.
  • the transceiver module 1201 is further configured to send the updated I-RNTI rule to the second access network device.
  • the processing module 1202 may also be configured to update the I-RNTI rule of the third access network device.
  • the transceiver module 1201 is further configured to send the updated I-RNTI rule to the third access network device.
  • the communication apparatus may be specifically used to implement the method performed by the first access network device in the embodiment described in FIG. 11 , and the apparatus may be the first access network device itself, or the first access network device itself.
  • the transceiver module 1201 is configured to receive an RRC recovery request from a terminal device, where the RRC recovery request carries the I-RNTI of the terminal device, and the I-RNTI indicates a corresponding I-RNTI rule.
  • the processing module 1202 is configured to determine the access network device corresponding to the I-RNTI based on the I-RNTI rule, and obtain the context information of the terminal device from the access network device.
  • the communication apparatus may be specifically used to implement the method performed by the second access network device in the embodiment described in FIG. 11 , and the apparatus may be the second access network device itself, or the second access network device itself.
  • the processing module 1202 is configured to determine the I-RNTI rule; and determine the I-RNTI of the terminal device based on the I-RNTI rule, where the I-RNTI indicates the corresponding I-RNTI rule.
  • the communication apparatus may be specifically used to implement the method executed by the terminal device in the embodiment described in FIG. 11 , and the apparatus may be the terminal device itself, or a chip or a chipset or a chip in the terminal device. Used to perform part of the function of the associated method.
  • the transceiver module 1201 is configured to receive configuration information from the second access network device, where the configuration information carries the I-RNTI allocated by the second access network device to the terminal device, and the I-RNTI indicates the corresponding I-RNTI rule and, sending an RRC recovery request to the first access network device, where the RRC recovery request carries the I-RNTI of the terminal device, and the I-RNTI indicates the corresponding I-RNTI rule.
  • the division of modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be other division methods.
  • the functional modules in the various embodiments of the present application may be integrated into one processing unit. In the device, it can also exist physically alone, or two or more modules can be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. It can be understood that, for the functions or implementations of each module in the embodiments of the present application, further reference may be made to the related descriptions of the method embodiments.
  • the communication apparatus may be as shown in FIG. 12 , and the communication apparatus may be an access network device or a chip in the access network device.
  • the communication apparatus may include a processor 1301 , a communication interface 1302 , and optionally, a memory 1303 .
  • the processing module 1202 may be the processor 1301 .
  • the transceiver module 1201 may be the communication interface 1302 .
  • the processor 1301 may be a central processing unit (central processing unit, CPU), or a digital processing module or the like.
  • the communication interface 1302 may be a transceiver, an interface circuit such as a transceiver circuit, or a transceiver chip or the like.
  • the communication apparatus further includes: a memory 1303 for storing programs executed by the processor 1302 .
  • the memory 1303 may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or may be a volatile memory (volatile memory), such as random access memory (random access memory) -access memory, RAM).
  • Memory 1303 is, but is not limited to, any other medium that can be used to carry or store instructions and/or data that can be accessed by a computer.
  • the processor 1301 may be configured to read program codes and/or data stored in the memory 1303, so as to implement, for example, the actions of the above-mentioned processing module 1202, which are not described herein again.
  • connection medium between the communication interface 1302 , the processor 1301 , and the memory 1303 is not limited in the embodiments of the present application.
  • the memory 1303, the processor 1301, and the communication interface 1302 are connected by a bus 1304 in FIG. 12.
  • the bus is represented by a thick line in FIG. 12.
  • the connection mode between other components is only for schematic illustration. , is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in FIG. 12, but it does not mean that there is only one bus or one type of bus.
  • An embodiment of the present invention further provides a computer-readable storage medium for storing computer software instructions to be executed for executing the above-mentioned processor, which includes a program to be executed for executing the above-mentioned processor.
  • An embodiment of the present invention further provides a communication system, where the communication system includes the first access network device and the second access network device described in Embodiment 1, and may also include the OAM entity described in Embodiment 1.
  • An embodiment of the present invention further provides another communication system, where the communication system includes the first access network device and the second access network device described in Embodiment 2, and may also include a terminal device.
  • An embodiment of the present invention further provides another communication system, where the communication system includes the first access network device and the second access network device described in Embodiment 3, and may also include a terminal device.
  • An embodiment of the present invention further provides another communication system, where the communication system includes the first access network device and the second access network device described in Embodiment 4, and may also include a terminal device.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), and the like.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种通信方法及装置,可以解决接入网设备的去激活态无线网络临时标识(I-RNTI)规则改变导致通信错误的问题。该方法包括:第一接入网设备接收来自第二接入网设备的第一消息,第一消息用于指示第二接入网设备的至少两个I-RNTI规则保持有效。第一接入网设备根据第二接入网设备的至少一个有效的I-RNTI规则确定终端设备的I-RNTI对应的接入网设备,并向确定的接入网设备中的至少一个接入网设备获取终端设备的上下文信息。通过上述方案,可以在一定程度上避免在基于I-RNTI确定第二接入网设备时遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率。

Description

通信方法及装置
相关申请的交叉引用
本申请要求在2021年04月30日提交中国专利局、申请号为202110481627.3、申请名称为“通信方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种通信方法及装置。
背景技术
在新无线(new radio,NR)中,终端设备的无线资源控制(radio resource control,RRC)状态包括连接(connected)态,去激活(inactive)态,空闲(idle)态,其中,终端设备处于inactive态时,终端设备和接入网设备之间挂起RRC连接,但终端设备与接入网设备会保存终端设备的上下文信息。
接入网设备配置终端设备进入inactive态时,会向终端设备发送去激活态无线网络临时标识(inactive radio network temporary identifier,I-RNTI)。I-RNTI用于接入网设备获取终端设备的上下文信息。
接入网设备可以根据I-RNTI规则确定I-RNTI的格式。一般来说接入网设备的I-RNTI规则是不会变的。但目前,接入网设备的I-RNTI规则可以改变,I-RNTI规则改变带来了新的问题,需要考虑对应的解决方案。
发明内容
本申请提供一种通信方法及装置,可以解决接入网设备的I-RNTI规则改变导致通信错误的问题。
第一方面,本申请提供了一种通信方法,所述方法可以应用于接入网设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以接入网设备为例,该方法包括:第一接入网设备接收来自第二接入网设备的第一消息,第一消息用于指示第二接入网设备的至少两个I-RNTI规则保持有效。第一接入网设备根据第二接入网设备的至少一个有效的I-RNTI规则确定终端设备的I-RNTI对应的接入网设备,并向确定的接入网设备中的至少一个接入网设备获取终端设备的上下文信息。
本申请实施例中,第一接入网设备可以在第二接入网设备的指示下维持第二接入网设备的多个I-RNTI规则有效,从而在恢复终端设备的RRC连接时可以基于多个I-RNTI规则确定第二接入网设备,从而可以在一定程度上避免在基于I-RNTI确定第二接入网设备时遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率。
在一种可能的设计中,第一接入网设备接收来自第二接入网设备的第二消息,第二消息指示第二I-RNTI规则失效。上述设计中,第二接入网设备可以指示更新前的I-RNTI规则失效,使得第一接入网设备可以不再维护更新前的I-RNTI规则,从而可以降低第一接入网设备的通信成本。
第二方面,本申请提供了一种通信方法,所述方法可以应用于接入网设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以接入网设备为例,该方法包括:第二接入网设备更新I-RNTI规则;第二接入网设备向第一接入网设备发送第一消息,第一消息用于指示第二接入网设备的至少两个去激活态无线网络临时标识I-RNTI规则保持有效。
本申请实施例中,第二接入网设备可以指示第一接入网设备维持第二接入网设备的多个I-RNTI规则有效,从而第一接入网设备在恢复终端设备的RRC连接时可以基于多个I-RNTI规则确定第二接入网设备,从而可以在一定程度上避免在基于I-RNTI确定第二接入网设备时遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率。
在一种可能的设计中,第二接入网设备向第一接入网设备发送第二消息,第二消息指示第二I-RNTI规则失效。上述设计中,第二接入网设备可以指示更新前的I-RNTI规则失效,使得第一接入网设备可以不再维护更新前的I-RNTI规则,从而可以降低第一接入网设备的通信成本。
对于上述第一方面和第二方面:
在一种可能的设计中,第一消息指示第二接入网设备更新后的I-RNTI规则为第一I-RNTI规则,并指示第二I-RNTI规则保持有效,第二I-RNTI规则为第二接入网设备更新前的I-RNTI规则。上述设计中,通过在更新I-RNTI规则时指示更新前的I-RNTI规则保持有效,使得基于更新前的I-RNTI规则分配I-RNTI的终端设备在RRC恢复流程中可以准确的确定锚点接入网设备,从而可以提高终端设备恢复RRC连接的成功率。
在一种可能的设计中,第一消息携带第一I-RNTI规则以及第一指示信息,第一指示信息用于指示第二I-RNTI规则保持有效。通过上述设计,可以显示指示更新前的I-RNTI规则保持有效。
在一种可能的设计中,第二I-RNTI规则可以包括至少两个I-RNTI规则。第一消息可以携带多个第一指示信息,其中,一个第一指示信息可以关联第二I-RNTI规则中的一个或多个I-RNTI规则。通过上述设计,可以提高指示的精确度。
在一种可能的设计中,第一消息携带第一I-RNTI规则以及第二I-RNTI规则。上述设计,通过在更新I-RNTI规则时携带更新前的I-RNTI规则的方式可以隐式指示更新前的I-RNTI规则保持有效。
在一种可能的设计中,第一消息指示增加所述第一I-RNTI规则。通过上述设计,使得第一接入网设备可以维护原来的第二I-RNTI规则以及新增的第一I-RNTI规则。
在一种可能的设计中,第二消息携带第二指示信息,第二指示信息用于指示第二I-RNTI规则失效。通过该方式,可以显示指示第二I-RNTI规则失效。
在一种可能的设计中,第二I-RNTI规则可以包括至少两个I-RNTI规则。第二消息可以携带多个第二指示信息,其中,一个第二指示信息可以关联第二I-RNTI规则中的一个或多个I-RNTI规则。通过上述设计,可以提高指示的精确度。
在一种可能的设计中,第二消息指示第一I-RNTI规则保持有效。该方式中,可以通过在第二消息未指示第二I-RNTI规则有效时隐式指示第二I-RNTI规则失效。
在一种可能的设计中,第二消息指示释放/删除所述第二I-RNTI规则。通过上述设计,第一接入网设备可以通过释放/删除第二I-RNTI规则的方式停止维护第二I-RNTI规则。
第三方面,本申请提供了一种通信方法,所述方法可以应用于接入网设备,或者芯片, 或者芯片组,或者芯片中执行该方法的功能模块等等。以接入网设备为例,该方法包括:第二接入网设备更新I-RNTI规则;第二接入网设备发送第一寻呼消息和/或第二寻呼消息,第一寻呼消息用于指示非激活态的终端设备的无线接入网通知区域中的接入网设备寻呼非激活态的终端设备,第二寻呼消息用于第二接入网设备寻呼非激活态的终端设备;第二接入网设备执行如下至少一项:触发非激活态的第一终端设备I-RNTI基于更新后的I-RNTI规则进行更新;触发非激活态的第二终端设备进入空闲态;向第一接入网设备发送非激活态的第三终端设备的上下文信息,第一接入网设备为接收第三终端设备发送的寻呼响应的接入网设备。
通过本申请实施例的方案,第二接入网设备在更新I-RNTI规则时,通过及时寻呼终端设备,更新终端设备的I-RNTI,使得第二接入网设备和第一接入网设备可以维护一套I-RNTI规则,从而可以减少接入网设备实现的复杂度。
在一种可能的设计中,第一寻呼消息和/或第二寻呼消息携带寻呼原因,寻呼原因为I-RNTI规则变更。通过上述设计,接收到第一寻呼消息或者第二寻呼消息的通信设备可以获取寻呼原因。
在一种可能的设计中,第二接入网设备触发非激活态的第一终端设备I-RNTI进行更新,包括:第二接入网设备基于更新后的I-RNTI规则为第一终端设备分配I-RNTI。通过上述设计,处于第二接入网的通信范围的终端设备可以在第二接入网设备的寻呼下更新I-RNTI。
在一种可能的设计中,第二接入网设备触发非激活态的第一终端设备I-RNTI进行更新,包括:第二接入网设备向第三接入网设备发送第三消息,第三接入网设备为接收第一终端设备发送的寻呼响应的接入网设备,第三消息用于指示第三接入网设备为第一终端设备分配I-RNTI。通过上述设计,处于第三接入网的通信范围的终端设备可以在第三接入网设备的寻呼下更新I-RNTI。
在一种可能的设计中,第三消息携带用于指示I-RNTI规则变更的原因值。通过上述设计,使得终端设备可以确定更新I-RNTI的原因为I-RNTI规则变更。
在一种可能的设计中,第二接入网设备触发非激活态的第二终端设备进入空闲态,包括:第二接入网设备释放第二终端设备到空闲态。通过上述设计,处于第二接入网的通信范围的终端设备可以在第二接入网设备的寻呼下释放在空闲态。
在一种可能的设计中,第二接入网设备触发非激活态的第二终端设备进入空闲态,包括:第二接入网设备向第四接入网设备发送第四消息,第四接入网设备为接收第二终端设备发送的寻呼响应的接入网设备,第四消息用于指示第四接入网设备释放第二终端设备到空闲态。通过上述设计,处于第四接入网的通信范围的终端设备可以在第四接入网设备的寻呼下释放在空闲态。
在一种可能的设计中,第四消息携带用于指示I-RNTI规则变更的原因值。通过上述设计,使得终端设备可以确定更新I-RNTI的原因为I-RNTI规则变更。
第四方面,本申请提供了一种通信方法,所述方法可以应用于接入网设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以接入网设备为例,该方法包括:第一接入网设备接收来自第二接入网设备的第一寻呼消息,第一寻呼消息用于寻呼非激活态的终端设备;第一接入网设备发送第三寻呼消息,第三寻呼消息用于寻呼非激活态的终端设备;第一接入网设备执行如下至少一项:更新非激活态的第一终端设备的I-RNTI; 释放非激活态的第二终端设备进入空闲态。
通过本申请实施例的方案,第二接入网设备在更新I-RNTI规则时,通过及时寻呼终端设备,更新终端设备的I-RNTI,使得第二接入网设备和第一接入网设备可以维护一套I-RNTI规则,从而可以减少接入网设备实现的复杂度。
在一种可能的设计中,第一寻呼消息和/或第二寻呼消息携带寻呼原因,寻呼原因为I-RNTI规则变更。通过上述设计,接收到第一寻呼消息或者第二寻呼消息的通信设备可以获取寻呼原因。
在一种可能的设计中,该方法还包括:在第一接入网设备更新非激活态的终端设备I-RNTI之前,第一接入网设备接收来自第二接入网设备的第三消息,第三消息用于指示第一接入网设备为第一终端设备分配I-RNTI。通过上述设计,处于第一接入网的通信范围的终端设备可以在第一接入网设备的寻呼下更新I-RNTI。
在一种可能的设计中,该方法还包括:在第一接入网设备释放非激活态的终端设备进入空闲态之前,第一接入网设备接收来自第二接入网设备的第四消息,第四消息用于指示第四接入网设备释放第二终端设备到空闲态。通过上述设计,处于第一接入网的通信范围的终端设备可以在第一接入网设备的寻呼下释放在空闲态。
在一种可能的设计中,第三消息携带用于指示I-RNTI规则变更的原因值。通过上述设计,使得终端设备可以确定更新I-RNTI的原因为I-RNTI规则变更。
在一种可能的设计中,第四消息携带用于指示I-RNTI规则变更的原因值。通过上述设计,使得终端设备可以确定更新I-RNTI的原因为I-RNTI规则变更。
第五方面,本申请提供了一种通信方法,所述方法可以应用于终端设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以终端设备为例,该方法包括:终端设备接收第二寻呼消息或者第三寻呼消息;终端设备进入空闲态或者更新I-RNTI。
第六方面,本申请提供了一种通信方法,所述方法可以应用于接入网设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以接入网设备为例,该方法包括:第一接入网设备接收来自第二接入网设备的消息1,消息1指示第二接入网设备的第一I-RNTI规则;第一接入网设备确定第一I-RNTI规则与其他接入网设备的I-RNTI规则存在冲突;第一接入网设备触发第二接入网设备更新I-RNTI规则。
通过本申请实施例所述的方案,第一接入网设备可以使得第二接入网设备的I-RNTI规则进行调整,例如,当第一接入网设备发现基于第二接入网设备的I-RNTI规则无法合理的确定锚点接入网设备时,可以辅助第二接入网设备修改I-RNTI规则,从而可以提高确定锚点接入网设备的准确性,可以在一定程度上避免在基于I-RNTI确定锚点接入网设备时遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率,也可以在一定程度上避免基于I-RNTI确定出过多的接入网设备,从而可以节省信令开销。
在一种可能的设计中,第一接入网设备触发第二接入网设备更新I-RNTI规则,包括:第一接入网设备向第二接入网设备发送消息2,消息2指示第二接入网设备更新I-RNTI规则。上述设计中,第一接入网设备可以通过发送消息指示第二接入网设备更新I-RNTI规则。
在一种可能的设计中,消息2携带如下信息中至少一项:第一信息、第二信息,其中,第一信息用于指示第二接入网设备更新I-RNTI规则,第二信息用于指示I-RNTI规则的更新要求。通过上述设计,可以提高更新效率。
在一种可能的设计中,第一接入网设备触发第二接入网设备更新I-RNTI规则,包括:第一接入网设备向运营和管理(OAM)实体发送消息3,消息3用于指示I-RNTI规则存在冲突。上述设计中,可以通过OAM实体统一管理接入网设备的I-RNTI规则。
在一种可能的设计中,消息3携带第一I-RNTI规则的信息,和/或,第二接入网设备的标识信息。通过上述方式,OAM实体可以确定发生冲突的I-RNTI规则。
在一种可能的设计中,消息3还携带其他接入网设备的I-RNTI规则的信息,和/或,其他接入网设备的标识信息。通过上述方式,OAM实体可以确定发生冲突的I-RNTI规则。
在一种可能的设计中,第一接入网设备接收来自第二接入网设备的第三信息,第三信息用于指示允许第一接入网设备辅助第二接入网设备调整I-RNTI规则。通过上述方式,第一接入网设备可以得到辅助第二接入网设备调整I-RNTI规则的授权。
在一种可能的设计中,第一I-RNTI规则包括接入网设备标识信息的相关信息。
在一种可能的设计中,第一I-RNTI规则还指示如下至少一项:终端设备标识的相关信息、公共陆地移动网络(public land mobile network,PLMN)的相关信息、无线接入技术/系统的相关信息、I-RNTI规则的相关信息。
在一种可能的设计中,第一I-RNTI规则与I-RNTI的比特数或者I-RNTI的长度类型对应。
第七方面,本申请提供了一种通信方法,所述方法可以应用于接入网设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以接入网设备为例,该方法包括:第二接入网设备向第一接入网设备发送消息1,消息1指示第二接入网设备的第一I-RNTI规则;第二接入网设备接收来自第一接入网设备的消息2,消息2指示第二接入网设备更新I-RNTI规则。
通过本申请实施例所述的方案,第一接入网设备可以使得第二接入网设备的I-RNTI规则进行调整,例如,当第一接入网设备发现基于第二接入网设备的I-RNTI规则无法合理的确定锚点接入网设备时,可以辅助第二接入网设备修改I-RNTI规则,从而可以提高确定锚点接入网设备的准确性,可以在一定程度上避免在基于I-RNTI确定锚点接入网设备时遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率,也可以在一定程度上避免基于I-RNTI确定出过多的接入网设备,从而可以节省信令开销。
在一种可能的设计中,该方法还包括:第二接入网设备向第一接入网设备发送第三信息,第三信息用于指示允许第一接入网设备辅助第二接入网设备调整I-RNTI规则。通过上述方式,第一接入网设备可以得到辅助第二接入网设备调整I-RNTI规则的授权。
在一种可能的设计中,消息2携带如下信息中至少一项:第一信息、第二信息,其中,第一信息用于指示第二接入网设备更新I-RNTI规则,第二信息用于指示I-RNTI规则的更新要求。通过上述设计,可以提高更新效率。
在一种可能的设计中,第一I-RNTI规则包括接入网设备标识信息的相关信息。
在一种可能的设计中,第一I-RNTI规则指示如下至少一项:终端设备标识的相关信息、PLMN的相关信息、无线接入技术/系统的相关信息、I-RNTI规则的相关信息。
在一种可能的设计中,第一I-RNTI规则指示I-RNTI的比特数或者I-RNTI的长度类型。
第八方面,本申请提供了一种通信方法,所述方法可以应用于OAM实体,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以OAM实体为例,该方法包括: OAM实体接收来自第一接入网设备的消息3,消息3用于指示去激活态无线网络临时标识I-RNTI规则存在冲突;OAM实体对存在冲突的I-RNTI规则进行更新。
通过本申请实施例所述的方案,第一接入网设备可以调整第二接入网设备的I-RNTI规则,例如,当第一接入网设备发现基于第二接入网设备的I-RNTI规则无法合理的确定锚点接入网设备时,可以辅助第二接入网设备修改I-RNTI规则,从而可以提高确定锚点接入网设备的准确性,可以在一定程度上避免在基于I-RNTI确定锚点接入网设备时遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率,也可以在一定程度上避免基于I-RNTI确定出过多的接入网设备,从而可以节省信令开销。
在一种可能的设计中,消息3携带第一I-RNTI规则的信息,和/或,第二接入网设备的标识信息。通过上述方式,OAM实体可以确定发生冲突的I-RNTI规则。
在一种可能的设计中,OAM实体对存在冲突的I-RNTI规则进行更新,包括:OAM实体更新第二接入网设备的I-RNTI规则;OAM实体向第二接入网设备发送更新后的I-RNTI规则。
在一种可能的设计中,消息3还携带与第一I-RNTI规则冲突的第二I-RNTI规则的信息,和/或,第二I-RNTI规则对应的第三接入网设备的标识信息。通过上述方式,OAM实体可以确定发生冲突的I-RNTI规则。
在一种可能的设计中,OAM实体对存在冲突的I-RNTI规则进行更新,包括:OAM实体更新第三接入网设备的I-RNTI规则;OAM实体向第三接入网设备发送更新后的I-RNTI规则。
第九方面,本申请提供了一种通信方法,所述方法可以应用于接入网设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以接入网设备为例,该方法包括:第一接入网设备接收来自终端设备的RRC恢复请求,RRC恢复请求携带终端设备的I-RNTI,且I-RNTI指示对应的I-RNTI规则;第一接入网设备基于I-RNTI规则确定I-RNTI对应的接入网设备;第一接入网设备向接入网设备获取终端设备的上下文信息。
本申请实施例中通过终端设备的I-RNTI指示对应的I-RNTI规则,使得第一接入网设备可以采用指示的I-RNTI规则确定I-RNTI中携带的接入网设备信息,从而可以提高终端设备恢复RRC连接的准确性。
在一种可能的设计中,若I-RNTI的第一比特取第一值,则I-RNTI指示第二接入网设备更新前的I-RNTI规则;或者,若I-RNTI的第一比特取第二值,则I-RNTI指示第二接入网设备更新后的I-RNTI规则。上述设计中,通过在I-RNTI中划分出一个或多个比特,从而可以通过该一个或多个比特指示对应的I-RNTI规则。
第十方面,本申请提供了一种通信方法,所述方法可以应用于接入网设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以接入网设备为例,该方法包括:第二接入网设备确定I-RNTI规则;第二接入网设备基于I-RNTI规则确定终端设备的I-RNTI,I-RNTI指示对应的I-RNTI规则。
本申请实施例中通过终端设备的I-RNTI指示对应的I-RNTI规则,使得第一接入网设备可以采用指示的I-RNTI规则确定I-RNTI中携带的接入网设备信息,从而可以提高终端设备恢复RRC连接的准确性。
在一种可能的设计中,若I-RNTI的第一比特取第一值,则I-RNTI指示第二接入网设备更新前的I-RNTI规则;或者,若I-RNTI的第一比特取第二值,则I-RNTI指示第二接 入网设备更新后的I-RNTI规则。上述设计中,通过在I-RNTI中划分出一个或多个比特,从而可以通过该一个或多个比特指示对应的I-RNTI规则。
第十一方面,本申请提供了一种通信方法,所述方法可以应用于终端设备,或者芯片,或者芯片组,或者芯片中执行该方法的功能模块等等。以终端设备为例,该方法包括:
终端设备接收来自第二接入网设备的配置信息,该配置信息携带第二接入网设备分配给终端设备的I-RNTI,该I-RNTI指示对应的I-RNTI规则;终端设备向第一接入网设备发送RRC恢复请求,RRC恢复请求携带终端设备的I-RNTI,且I-RNTI指示对应的I-RNTI规则。
本申请实施例中通过终端设备的I-RNTI指示对应的I-RNTI规则,使得第一接入网设备可以采用指示的I-RNTI规则确定I-RNTI中携带的接入网设备信息,从而可以提高终端设备恢复RRC连接的准确性。
在一种可能的设计中,若I-RNTI的第一比特取第一值,则I-RNTI指示第二接入网设备更新前的I-RNTI规则;或者,若I-RNTI的第一比特取第二值,则I-RNTI指示第二接入网设备更新后的I-RNTI规则。上述设计中,通过在I-RNTI中划分出一个或多个比特,从而可以通过该一个或多个比特指示对应的I-RNTI规则。
第十二方面,本申请提供一种装置,该装置可以是通信设备,也可以是通信设备内的芯片或芯片组,其中,通信设备可以是终端设备、或者接入网设备,也可以是OAM实体。该装置可以包括处理模块和收发模块。当该装置是通信设备时,该处理模块可以是处理器,该收发模块可以是收发器;该装置还可以包括存储模块,该存储模块可以是存储器;该存储模块用于存储指令和/或数据,该处理模块读取该存储模块所存储的指令和/或数据,以使接入网设备执行上述第一方面至第四方面、第六方面至第七方面、第九方面至第十方面中任一方面中相应的功能,或者,该处理模块执行该存储模块所存储的指令,以使终端设备执行上述第五方面中相应的功能,或者,该处理模块执行该存储模块所存储的指令,以使OAM实体执行上述第八方面中相应的功能。当该装置是通信设备内的芯片或芯片组时,该处理模块可以是处理器,该收发模块可以是输入/输出接口、管脚或电路等;该处理模块执行存储模块所存储的指令,以执行上述第一方面至第四方面、第六方面至第七方面、第九方面至第十方面中任一方面中相应的功能,或者,以执行上述第五方面中相应的功能,或者,以执行上述第八方面中相应的功能。该存储模块可以是该芯片或芯片组内的存储模块(例如,寄存器、缓存等),也可以是位于该芯片或芯片组外部的存储模块(例如,只读存储器、随机存取存储器等)。
第十三方面,提供了一种装置,包括:处理器、通信接口和存储器。通信接口用于该装置与其他装置之间传输信息、和/或消息、和/或数据。该存储器用于存储计算机执行指令,当该装置运行时,该处理器执行该存储器存储的该计算机执行指令,以使该装置执行如上述第一方面至第十方面中任一方面或任一方面中任一所述的方法。
第十四方面,本申请还提供一种系统,该系统包括实现上述第一方面的任一设计中的第一接入网设备,以及实现上述第二方面的任一设计中的第二接入网设备。
第十五方面,本申请还提供一种系统,该系统包括实现上述第三方面的任一设计中的第一接入网设备,以及实现上述第四方面的任一设计中的第二接入网设备,还可以包括实现上述第五方面中的终端设备。
第十六方面,本申请还提供一种系统,该系统包括实现上述第六方面的任一设计中的 第一接入网设备,以及实现上述第七方面的任一设计中的第二接入网设备。
第十七方面,本申请还提供一种系统,该系统包括实现上述第六方面的任一设计中的第一接入网设备,以及实现上述第八方面的任一设计中的OAM实体,还可以包括第二接入网设备。
第十八方面,本申请还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。
第十九方面,本申请还提供一种包括指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。
附图说明
图1为本申请实施例的一种接入网设备的结构示意图;
图2为本申请实施例的另一种接入网设备的结构示意图;
图3为本申请实施例的一种终端设备恢复RRC连接的流程示意图;
图4为本申请实施例的一种更新I-RNTI规则的流程示意图;
图5为本申请实施例的一种更新I-RNTI规则的流程示意图;
图6为本申请实施例的一种更新I-RNTI规则的流程示意图;
图7为本申请实施例的一种通信方法的流程示意图;
图8为本申请实施例的一种通信方法的流程示意图;
图9为本申请实施例的一种通信方法的流程示意图;
图10为本申请实施例的一种通信方法的流程示意图;
图11为本申请实施例的一种通信装置的结构示意图;
图12为本申请实施例的一种通信装置的结构示意图。
具体实施方式
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。
本申请实施例中涉及的网元包括接入网设备和终端设备。
接入网设备是网络侧中一种用于发射或接收信号的实体,如新一代基站(generation Node B,gNodeB或gNB)。接入网设备可以是用于与移动设备通信的设备。接入网设备可以是无线局域网(wireless local area networks,WLAN)中的接入点(access point,AP),可以是长期演进(long term evolution,LTE)中的演进型基站(evolutional Node B,eNB或eNodeB),或者中继站或接入点或接入回传一体化(integrated access and backhaul,IAB),或者车载设备、可穿戴设备以及5G网络中的接入网设备或者未来演进的公共陆地移动网络(public land mobile network,PLMN)网络中的接入网设备,或新无线(new radio,NR)系统中的gNB等。另外,在本申请实施例中,接入网设备为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与接入网设备进行通信。本申请实施例中的接入网设备可以是指集中单元(central unit,CU)或者分布单元(distributed unit,DU)。或者,接入网设备也可以是CU和DU组成的,例如,如图1所示。其中,CU和DU在物理上可以是分离的,也可以部署在一起,本申请实施例对此不 做具体限定。一个CU可以连接一个DU,或者也可以多个DU共用一个CU,可以节省成本,以及易于网络扩展。CU和DU的切分可以按照协议栈切分,其中一种可能的方式是将无线资源控制(radio resource control,RRC)、业务数据适配协议栈(service data adaptation protocol,SDAP)以及分组数据汇聚协议(packet data convergence protocol,PDCP)层部署在CU,其余的无线链路控制(radio link control,RLC)层、介质访问控制(media access control,MAC)层以及物理层部署在DU。本申请实施例中并不完全限定上述协议栈切分方式,还可以有其它的切分方式。CU和DU之间通过F1接口连接。CU代表gNB通过Ng接口和核心网连接。本申请实施例中的接入网设备可以是指集中式单元控制面(CU-CP)节点或者集中式单元用户面(CU-UP)节点,或者,网络设备也可以是CU-CP和CU-UP。其中CU-CP负责控制面功能,主要包含RRC和PDCP-C。PDCP-C主要负责控制面数据的加解密,完整性保护,数据传输等。CU-UP负责用户面功能,主要包含SDAP和PDCP-U。其中SDAP主要负责将核心网的数据进行处理并将流(flow)映射到承载。PDCP-U主要负责数据面的加解密,完整性保护,头压缩,序列号维护,数据传输等。其中CU-CP和CU-UP通过E1接口连接。CU-CP代表gNB通过Ng接口和核心网连接。通过F1-C(控制面)和DU连接。CU-UP通过F1-U(用户面)和DU连接。当然还有一种可能的实现是PDCP-C也在CU-UP。如图2所示,本申请实施例所提及的接入网设备可以为包括CU、或DU、或包括CU和DU的设备、或者控制面CU节点(CU-CP节点)和用户面CU节点(CU-UP节点)以及DU节点的设备。此外,在其它可能的情况下,接入网设备可以是其它为终端设备提供无线通信功能的装置。本申请的实施例对接入网设备所采用的具体技术和具体设备形态不做限定。为方便描述,本申请实施例中,为终端设备提供无线通信功能的装置称为接入网设备。
终端设备可以是能够接收接入网设备调度和指示信息的终端设备,终端设备可以是指向用户提供语音和/或数据连通性的设备,或具有无线连接功能的手持式设备、或连接到无线调制解调器的其他处理设备。终端设备可以经无线接入网(如,radio access network,RAN)与一个或多个核心网或者互联网进行通信,终端设备可以是移动终端设备,如移动电话(或称为“蜂窝”电话,手机(mobile phone))、计算机和数据卡,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据。例如,个人通信业务(personal communications service,PCS)电话、无绳电话、会话发起协议(SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、平板电脑(Pad)、带无线收发功能的电脑等设备。终端设备也可以称为系统、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile station,MS)、远程站(remote station)、接入点(access point,AP)、远程终端设备(remote terminal)、接入终端设备(access terminal)、用户终端设备(user terminal)、用户代理(user agent)、用户站(subscriber station,SS)、用户端设备(customer premises equipment,CPE)、终端(terminal)、用户设备(user equipment,UE)、移动终端(mobile terminal,MT)等。终端设备也可以是可穿戴设备以及下一代通信系统,例如,5G网络中的终端设备或者未来演进的PLMN网络中的终端设备,NR通信系统中的终端设备等。
此外,本申请实施例还可以适用于面向未来的其他通信技术。本申请描述的网络架构以及业务场景是为了更加清楚的说明本申请的技术方案,并不构成对本申请提供的技术方 案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请提供的技术方案对于类似的技术问题,同样适用。
可以理解的,本申请实施例中,终端设备和/或网络设备可以执行本申请实施例中的部分或全部步骤,这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或者各种操作的变形。此外,各个步骤可以按照本申请实施例呈现的不同的顺序来执行,并且有可能并非要执行本申请实施例中的全部操作。
需要说明的是,本申请实施例不限定以上通信系统的类型和制式。例如:所述通信系统可以为:5G通信系统、LTE通信系统、6G通信系统、非地面网络(non-terrestrial network,NTN)系统等。
在NR中,终端设备的RRC状态包括connected态,inactive态,idle态,其中,终端设备处于inactive态时,终端设备和接入网设备之间挂起RRC连接,但终端设备与接入网设备会保存终端设备的上下文信息。
接入网设备配置终端设备进入inactive态时,会向终端设备发送I-RNTI。I-RNTI用于接入网设备获取终端设备的上下文信息,例如I-RNTI和终端设备在锚点接入网设备上的上下文信息是对应的,通过I-RNTI可以找到该终端设备的上下文信息。举例而言,I-RNTI目前有2种长度,一种为40比特(bit),一般称为长I-RNTI(full I-RNTI),一种为24bit,一般称为短I-RNTI(short I-RNTI)。I-RNTI中的信息可以包括终端设备的标识和接入网设备的标识(比如锚点接入网设备标识)。本申请实施例以I-RNTI有2种长度为例进行描述,对I-RNTI的长度并不限制。
当有业务需求时(比如,终端设备有上行数据需要发送,或者收到寻呼消息),inactive态的终端设备发起RRC恢复过程。如图3所示,RRC恢复过程可以如下:
S301,终端设备向目标接入网设备发送RRC恢复请求(RRC resume request)消息。
其中,RRC resume request消息携带终端设备的I-RNTI。
目标接入网设备为终端设备发起RRC恢复的接入网设备。
S302,目标接入网设备向锚点接入网设备发送获取终端设备上下文信息请求(Retrieve UE context request)消息。
其中,Retrieve UE context request消息携带终端设备的I-RNTI。
锚点接入网设备为配置终端设备进入inactive态的接入网设备,也可以称为源接入网设备。
具体的,目标接入网设备可以根据该I-RNTI中锚点接入网设备的标识信息,确定锚点接入网设备,进而向锚点接入网设备发送Retrieve UE context request消息。比如,目标接入网设备可以根据该I-RNTI中锚点接入网设备的标识信息,确定对应的全局接入网设备标识信息,进而确定对应的锚点接入网设备。
S303,锚点接入网设备向目标接入网设备发送响应消息。
响应消息可以是获取终端设备上下文信息响应(Retrieve UE context response)消息,其中,Retrieve UE context response消息携带终端设备的上下文信息。该场景可以认为目标接入网设备成功找到I-RNTI对应的接入网设备。
或者,响应消息可以是获取终端设备上下文信息失败(Retrieve UE context failure)消息。若锚点接入网设备验证终端设备失败,锚点接入网设备可以发送Retrieve UE context failure消息;该场景可以认为目标接入网设备未成功找到I-RNTI对应的接入网设备,也 就是未成功找到锚点接入网设备。
或者,响应消息可以是获取终端设备上下文信息失败(Retrieve UE context failure)消息。若锚点接入网设备成功验证终端设备,但是确定继续维护终端设备的上下文信息或者确定释放终端设备到idle态,锚点接入网设备可以发送Retrieve UE context failure消息,此时Retrieve UE context failure消息携带锚点接入网设备生成的RRC释放(RRC Release)消息,目标接入网设备可以向终端设备透传或转发该RRC Release消息。该场景可以认为目标接入网设备成功找到I-RNTI对应的接入网设备。
接入网设备可以根据I-RNTI规则确定I-RNTI的格式。目前,接入网设备的I-RNTI规则可以改变,使得接入网设备在根据I-RNTI对终端设备进行RRC恢复流程时容易出现错误。
基于此,本申请实施例提供一种通信方法及装置,可以解决接入网设备的I-RNTI规则改变导致通信错误的问题。其中,方法和装置是基于同一发明构思的,由于方法及装置解决问题的原理相似,因此装置与方法的实施可以相互参见,重复之处不再赘述。
应理解,本申请实施例中“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A、B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一(项)个”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a、b或c中的至少一项(个),可以表示:a,b,c,a和b,a和c,b和c,或a、b和c,其中a、b、c可以是单个,也可以是多个。
需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。
本申请实施例中所涉及的“I-RNTI规则”也可以称为“I-RNTI格式”、“I-RNTI的划分规则”、“I-RNTI参考配置文件(I-RNTI reference profile)”等,当然也可以命名为其他,只要该信息可以具有确定I-RNTI格式的特征,可以认为是本申请实施例所述的“I-RNTI规则”。
本申请实施例中目标接入网设备为终端设备发起RRC恢复的接入网设备。源接入网设备为配置终端设备进入inactive态的接入网设备,或者,终端设备进入inactive态之前最后接入的接入网设备,源接入网设备也可以称为锚点接入网设备。
下面结合附图对本申请提供的通信方法进行具体说明。
实施例一:
如图4所示,为本申请实施例提供的一种通信方法。该方法具体可以包括:
S401,第二接入网设备向第一接入网设备发送消息1,消息1指示第二接入网设备的第一I-RNTI规则。
相应的,第一接入网设备接收来自第二接入网设备的消息1。
一种可能的实施例中,第二接入网设备可以在更新I-RNTI规则后,向第一接入网设备发送消息1,以指示更新后的I-RNTI规则为第一I-RNTI规则。
一种示例性说明中,在终端设备恢复RRC连接的流程中,第一接入网设备可以是终端设备发起RRC恢复流程的目标接入网设备,第二接入网设备可以是保存终端设备的上下文信息的源接入网设备。
第一I-RNTI规则可以用于第一接入网设备确定I-RNTI中携带的接入网设备标识信息。
示例性的,第一I-RNTI规则可以包括:接入网设备标识信息的相关信息,接入网设备标识信息的相关信息用于第一接入网设备确定I-RNTI中携带的接入网设备标识信息。
一个示例中,接入网设备标识信息的相关信息用于指示接入网设备标识信息的比特数量。例如,接入网设备标识信息的相关信息可以为具体值,如20bit、12bit等。或者,接入网设备标识信息的相关信息也可以为相对值,例如一半、
Figure PCTCN2022089642-appb-000001
等,通过相对值可以指示接入网设备标识信息的比特数量与全局接入网设备标识信息的比特数量的比例关系,以接入网设备标识信息的相关信息可以为
Figure PCTCN2022089642-appb-000002
为例,指示接入网设备标识信息的比特数量是全局接入网设备标识信息的比特数量的
Figure PCTCN2022089642-appb-000003
I-RNTI中携带的接入网设备标识信息又可以称为本地接入网设备标识信息,比如,local RAN node ID,全局接入网设备标识信息可以为global RAN node ID。
可选的,接入网设备标识信息在全局接入网设备标识信息中的比特位置可以是第一接入网设备根据第一RNTI规则确定的,或者,也可以是预设的,或者协议规定的。
在上述示例中,第一接入网设备可以根据接入网设备标识信息的相关信息以及第二接入网设备的全局接入网设备标识信息确定第二接入网设备的接入网设备标识信息。
另一个示例中,接入网设备标识信息的相关信息可以为第二接入网设备的接入网设备标识信息。
此外,第一I-RNTI规则还可以包括以下至少一项:终端设备标识的相关信息、公共陆地移动网络(public land mobile network,PLMN)的相关信息、无线接入技术/系统的相关信息、I-RNTI规则的相关信息。
示例性的,终端设备标识的相关信息用于指示终端设备标识信息的比特数量。PLMN的相关信息用于指示PLMN信息的比特数量。无线接入技术/系统的相关信息用于指示无线接入技术/系统信息的比特数量。I-RNTI规则的相关信息用于指示I-RNTI规则序号或索引信息的比特数量。
可选的,第一I-RNTI规则与I-RNTI的比特数或者I-RNTI的长度类型对应。消息1中可以指示I-RNTI的长度类型和对应的第一I-RNTI规则。
作为一个可能的示例,消息1中指示如下I-RNTI规则信息:
Figure PCTCN2022089642-appb-000004
当I-RNTI长度为40bit时,第一I-RNTI规则可以指示local RAN node ID为20bit。假设协议规定global RAN node ID的最低位比特携带local RAN node ID,第一接入网设备可以根据第一I-RNTI规则中local RAN node ID的长度信息和第二接入网设备的global RAN node ID确定local RAN node ID。又假设协议规定I-RNTI的最低位比特携带local RAN node ID,则第一接入网设备可以确定I-RNTI长度为40时,I-RNTI从低到高的前20比特为local RAN node ID。根据上述机制,使得第一接入网设备可以确定第二接入网设备的local RAN node ID,以及确定接收到的I-RNTI中的local RAN node ID。若该两个local RAN node ID相同,第一接入网设备可以根据对应的global RAN node ID确定第二接入网设备 可能为该I-RNTI对应的终端设备的源/锚点网络设备。当I-RNTI长度为24bit时,第一I-RNTI规则可以指示local RAN node ID为12bit。第一接入网设备对应的操作可以参考I-RNTI长度为24bit时的描述,此处不再赘述。
在该示例中,第二接入网设备可以向第一接入网设备指示长本地接入网标识信息的长度,和/或,短本地接入网设备标识信息的长度。
作为另一个可能的示例,第一I-RNTI规则可以携带local RAN node ID的具体内容,例如,消息1中可以指示如下I-RNTI规则信息:
Figure PCTCN2022089642-appb-000005
当I-RNTI长度为40bit时,第一I-RNTI规则携带第二接入网设备的长local RAN node ID,比如记为local RAN node ID1-1,local RAN node ID1-1为第二接入网设备的长度为20bit的local RAN node ID。当I-RNTI长度为24bit时,第一I-RNTI规则携带第二接入网设备的短local RAN node ID,比如记为local RAN node ID1-2,local RAN node ID1-2为第二接入网设备的长度为12bit的local RAN node ID。
在该示例中,第二接入网设备可以向第一接入网设备指示长本地接入网设备标识信息,和/或,短本地接入网设备标识信息。可选的,第二接入网设备可以向第一接入网设备指示长本地接入网标识信息的长度,和/或,短本地接入网设备标识信息的长度。
应理解,下文涉及的“I-RNTI规则”与“第一I-RNTI规则”类似,具体可以参阅以上第一I-RNTI规则的相关描述,重复之处不再赘述。
一种示例性说明中,消息1指示第一I-RNTI规则的方式可以是:携带第一I-RNTI规则的具体内容,或者,消息1也可以携带第一I-RNTI规则的序号、索引信息或标识。可选的,该序号、标识或者索引信息对应的I-RNTI规则可以是协议预定义的,或者接入网设备间交互的,或者接入网设备从其它网络设备(比如,运营和管理(operation and management,OAM)设备)获取的。例如,协议定义了多个I-RNTI规则,每个I-RNTI规则对应一个索引,消息1可以携带第一I-RNTI规则的索引。
一种示例性说明中,消息1为接口建立请求消息,比如X2 setup request消息,Xn setup request消息或者其它消息。
可选的,S401之后,可以执行S402。
S402,第一接入网设备确定第一I-RNTI规则与其他接入网设备的I-RNTI规则存在冲突。
一种可能的实现方式中,第一接入网设备在基于第一I-RNTI规则确定I-RNTI携带的本地接入网设备标识信息关联到N个可能的接入网设备时,确定第一I-RNTI规则与该多个可能的接入网设备中第二接入网设备以外的接入网设备的I-RNTI规则存在冲突,其中,N为大于1的整数。可选的,N可以是预设的,也可以是协议规定的,或者也可以是第一接入网设备确定,例如,第一接入网设备基于自身能力确定N的取值等。那么,可以执行S403。
在一些实施例中,在步骤S402之前,第二接入网设备可以向第一接入网设备发送第 三信息,第三信息用于指示是否允许第一接入网设备辅助第二接入网设备调整I-RNTI规则。
示例性的,“允许第一接入网设备辅助第二接入网设备调整I-RNTI规则”可以理解为允许第一接入网设备确定第二接入网设备的I-RNTI规则与其他接入网设备的I-RNTI规则是否存在冲突。或者,也可以理解为允许第一接入网设备在第二接入网设备的I-RNTI规则与其他接入网设备的I-RNTI规则存在冲突时,执行S403。
可以理解的是,如果第一接入网设备确定第一I-RNTI规则与其他接入网设备的I-RNTI规则不存在冲突,那么第一接入网设备可以维护第二接入网设备的第一I-RNTI规则,从而在终端设备向第一接入网设备发起RRC恢复流程时,第一接入网设备可以根据第一I-RNTI规则确定终端设备的I-RNTI携带的本地接入网设备标识信息,从而可以根据本地接入网设备标识信息确定第二接入网设备。
可选的,S403,第一接入网设备触发第二接入网设备更新I-RNTI规则。
一种实现方式中,第一接入网设备可以向第二接入网设备发送消息2,消息2指示第二接入网设备更新I-RNTI规则。
在该实现方式中,第二接入网设备在接收到消息2后,可以向第一接入网设备发送更新后的I-RNTI规则。如图5所示。
示例性的,消息2携带如下信息中至少一项:第一信息、第二信息,其中,第一信息用于指示第二接入网设备更新I-RNTI规则,第二信息用于指示I-RNTI规则的更新要求。
一种可能的实施方式中,第二接入网设备更新I-RNTI规则的过程可以为:第二接入网设备在接收到消息2后,可以重新确定当前的I-RNTI规则,并通知第一接入网设备,第一接入网设备可以再次确定该I-RNTI规则是否与其他接入网设备的I-RNTI规则冲突,若冲突,则通知第二接入网设备,直到第二接入网设备的I-RNTI规则与其他接入网设备的I-RNTI规则不存在冲突。
其中,I-RNTI规则的更新要求可以包括I-RNTI规则的具体内容,例如,第一接入网设备期望的I-RNTI规则。或者,I-RNTI规则的更新要求也可以包括I-RNTI规则的约束条件,例如,第一接入网设备期望的I-RNTI规则需要满足的条件等。
一种可能的实施方式中,第一接入网设备根据与第一I-RNTI规则冲突的I-RNTI规则确定I-RNTI规则的更新要求。
另一种可能的实施方式中,第一接入网设备也可以根据自身维护的I-RNTI规则(包括第一接入网设备的I-RNTI规则以及其他接入网设备的I-RNTI规则)确定I-RNTI规则的更新要求。
另一种实现方式中,第一接入网设备可以向运营和管理(Operation and management,OAM)实体发送消息3,消息3用于指示I-RNTI规则存在冲突。
示例性的,消息3可以携带第一I-RNTI规则的信息,例如,消息3可以携带第一I-RNTI规则的具体内容,也可以携带第一I-RNTI规则的序号、索引等标识信息。
或者,消息3可以携带第二接入网设备的标识信息。一种可能的示例中,OAM实体保存接入网设备与I-RNTI规则之间的对应关系,OAM可以根据消息3携带的第二接入网设备的标识信息确定存在冲突的I-RNTI规则。
或者,消息3也可以携带第一I-RNTI规则的信息以及第二接入网设备的标识信息。
此外,消息3还可以携带其他接入网设备的I-RNTI规则的信息和其他接入网设备的 标识信息中的至少一项,该其他接入网设备为与第二接入网设备的I-RNTI规则发生冲突的接入网设备,如第三接入网设备。
在该实现方式中,OAM实体在接收到消息3后,可以对存在冲突的I-RNTI规则进行更新,使得第二接入网设备的I-RNTI规则与其他接入网设备的I-RNTI规则不存在冲突。
例如,以第二接入网设备的I-RNTI规则与第三接入网设备的I-RNTI规则冲突为例,OAM实体可以更新第二接入网设备的I-RNTI规则,并向第二接入网设备发送更新后的I-RNTI规则,其中,第二接入网设备更新后的I-RNTI规则与第三接入网设备的I-RNTI规则不存在冲突。
进一步的,第二接入网设备可以向第一接入网设备发送更新后的I-RNTI规则。
又例如,以第二接入网设备的I-RNTI规则与第三接入网设备的I-RNTI规则冲突为例,OAM实体可以更新第三接入网设备的I-RNTI规则,并向第三接入网设备发送更新后的I-RNTI规则,其中,第三接入网设备更新后的I-RNTI规则与第二接入网设备的I-RNTI规则不存在冲突。
再例如,OAM实体还可以更新第二接入网设备的I-RNTI规则和第三接入网设备的I-RNTI规则,使得第二接入网设备更新后的I-RNTI规则与第三接入网设备更新后的I-RNTI规则不冲突。
在上述另一种实现方式中,在步骤S401之前,OAM实体可以向第二接入网设备发送允许选择的至少一个I-RNTI规则。第二接入网设备可以根据该至少一个I-RNTI规则确定第一I-RNTI规则作为第二接入网设备当前的I-RNTI规则,如图6所示。可选的,本申请实施例可以应用于相邻接入网设备间的I-RNTI规则的交互。应理解,本申请实施例一对第二接入网设备向第一接入网设备发送I-RNTI规则的过程进行了说明,第一接入网设备与第二接入网设备之间可以相互发送I-RNTI规则,重复之处不再赘述。一种示例性说明中,第一接入网设备在接收到第二接入网设备的第一I-RNTI规则后,可以向第二接入网设备发送第一接入网设备当前的I-RNTI规则。例如,第一接入网设备接收第二接入网设备发送的消息1。第一接入网设备向第二接入网设备发送消息4。消息4中携带第一接入网设备当前的I-RNTI规则。比如消息1可以为接口建立请求消息,消息4为接口建立响应消息。比如,消息1可以为X2 setup request消息,Xn setup request消息或者其它请求消息,对应的,消息4可以为X2 setup response消息,Xn setup response消息或者其它响应消息。
通过本申请实施例一所述的方案,接入网设备可以调整邻站的I-RNTI规则,例如,当接入网设备发现基于邻站的I-RNTI规则无法合理的确定锚点接入网设备时,可以辅助邻站修改I-RNTI规则,从而可以提高目标接入网设备确定锚点接入网设备的准确性,一方面,可以在一定程度上避免在基于I-RNTI确定锚点接入网设备时遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率,另一方面,也可以在一定程度上避免基于I-RNTI确定出过多的接入网设备,从而可以节省信令开销。
实施例二:
如图7所示,为本申请实施例提供的另一种通信方法。该方法具体可以包括:
S701,第二接入网设备更新I-RNTI规则。
示例性的,更新I-RNTI规则的原因可以是基于原来的I-RNTI规则确定的接入网设备的数量超过阈值,或者,也可以是为了更合理的配置inactive态的终端设备,当然,也可 以为其他更新原因,这里不做具体限定。
可选的,第二接入网设备可以向第一接入网设备发送更新I-RNTI规则的原因,也可以不发送,这里不做具体限定。示例性的,第二接入网设备可以在第一消息中携带更新I-RNTI规则的原因。
需要说明的是,步骤S701可以是一个可选的步骤。
S702,第二接入网设备向第一接入网设备发送第一消息,第一消息用于指示第二接入网设备的至少两个I-RNTI规则保持有效。
相应的,第一接入网设备接收来自第二接入网设备的第一消息。
示例性的,该至少两个I-RNTI规则可以包括第二接入网设备更新之后的第一I-RNTI规则以及第二接入网设备更新之前的第二I-RNTI规则。例如,第一消息可以指示第二接入网设备更新后的I-RNTI规则为第一I-RNTI规则,并指示第二I-RNTI规则保持有效。具体的,第一I-RNTI规则可以包括至少一个I-RNTI规则。第二I-RNTI规则也可以包括至少一个I-RNTI规则。
一个可能的示例中,第一消息可以携带第一I-RNTI规则以及第一指示信息,第一指示信息用于指示第二I-RNTI规则是否保持有效。上述方式可以通过指示信息显式指示第二I-RNTI规则是否保持有效。可以理解的,若第二I-RNTI规则包括至少两个I-RNTI规则,第一消息可以包括至少一个第一指示信息,其中,一个第一指示信息可以关联第二I-RNTI规则中的一个或多个I-RNTI规则。例如,第一消息可以携带每个I-RNTI规则对应的第一指示信息。作为一种实现方式,第一指示信息可以为至少一个比特,该至少一个比特中的比特分别对应第二I-RNTI规则中的I-RNTI规则。
可选的,第一指示信息与I-RNTI的比特数或者I-RNTI的长度类型对应。第一消息中可以指示I-RNTI的长度类型和对应的第一指示信息。
作为一个可能的示例,以第二I-RNTI规则中有2个I-RNTI规则为例,第一消息中指示如下信息:
Figure PCTCN2022089642-appb-000006
假设第一指示信息为01时指示第1个I-RNTI规则有效,第2个I-RNTI规则无效,第一指示信息为10时指示第1个I-RNTI规则无效,第2个I-RNTI规则有效,根据上述格式的第一消息可知,full I-RNTI(即I-RNTI的长度为40bit)对应的第一指示信息为01,则第一接入网设备在接收到的第一消息后可以保持第二I-RNTI规则中的第1个full I-RNTI规则有效以及第2个full I-RNTI规则无效。short I-RNTI(即I-RNTI的长度为24bit)对应的第一指示信息为10,则第一接入网设备在接收到的第一消息后可以保持第二I-RNTI规则中的第1个short I-RNTI规则无效以及第2个short I-RNTI规则有效。
应理解,上述示例仅是一种举例说明,第一指示信息与I-RNTI的比特数或者I-RNTI的长度类型,和/或I-RNTI规则的数量的对应关系也可以为其他,这里不再一一列举。
另一个可能的示例中,第一消息可以携带第一I-RNTI规则以及第二I-RNTI规则。上述方式通过在第一消息中同时携带第一I-RNTI规则以及第二I-RNTI规则,从而可以隐式 指示第二I-RNTI规则保持有效。
又一个可能的示例中,第一消息可以指示第一接入网设备增加第一I-RNTI规则。上述方式通过在第一消息中指示增加第一I-RNTI规则,从而可以隐式指示第二I-RNTI规则保持有效。举例说明,第一消息中可以指示如下信息:
第一消息  
>增加(add)  
>>第一I-RNT规则  
作为一种可能的实现方式,在步骤S701之前,第二接入网设备向第一接入网设备发送第二I-RNTI规则。
可选的,在步骤S702之后,第一接入网设备也可以确定该至少两个I-RNTI规则中的部分I-RNTI规则失效。
例如,可以是第一接入网设备判定第二I-RNTI规则失效。如第一接入网设备在第二I-RNTI规则对应的定时器超时时确定第二I-RNTI规则失效,定时器可以记录第二I-RNTI规则的有效时间。可选的,第一消息中还可以携带时间信息,用于指示第二I-RNTI规则的有效时间。
或者,也可以是第二接入网设备指示第二I-RNTI规则失效。如当第二接入网设备释放基于第二I-RNTI规则分配I-RNTI的全部终端设备的上下文信息时,第二接入网设备可以向第一接入网设备指示第二I-RNTI规则失效。比如,第二接入网设备释放基于第二I-RNTI规则分配I-RNTI的全部终端设备的上下文信息的实现方式可以为:第二接入网设备删除基于第二I-RNTI规则分配I-RNTI的终端设备的上下文信息,和/或,转移基于第二I-RNTI规则的终端设备的上下文信息到其他接入网设备。
以该至少两个I-RNTI规则可以包括第二接入网设备更新之后的第一I-RNTI规则以及第二接入网设备更新之前的第二I-RNTI规则为例,第一接入网设备可以接收来自第二接入网设备的第二消息,第二消息指示第二I-RNTI规则失效,或者,第二消息指示第一I-RNTI规则保持有效。
示例性的,第二消息携带第二指示信息,第二指示信息用于指示第二I-RNTI规则失效,该方式通过指示信息显示指示第二I-RNTI规则失效。
或者,第二消息携带第一I-RNTI规则,该方式中,通过在第二消息未指示第二I-RNTI规则有效时隐式指示第二I-RNTI规则失效。
或者,第二消息携带第一I-RNTI规则和第二指示信息。
或者,第二消息携带第二I-RNTI规则,以及指示第二I-RNTI规则失效或者指示第一接入网设备释放第二I-RNTI规则。
可以理解的,本申请实施例以第二消息指示第二I-RNTI规则的失效为例进行描述,可选的,第二消息中也可以指示新的第三I-RNTI规则,具体的可以参考第一消息中的指示第一I-RNTI规则的相关描述,此处不再赘述。作为一个可能的示例,第二消息中指示如下信息:
第一消息  
>增加(add) 可选的
>>第三I-RNT规则  
>释放/删除(release/remove) 可选的
>>第二I-RNTI规则  
可选的,第二指示信息与I-RNTI的比特数或者I-RNTI的长度类型对应。第二消息中可以指示I-RNTI的长度类型和对应的第二指示信息。
作为一个可能的示例,第二消息中指示如下信息:
第二消息  
>full I-RNTI对应的第二指示信息 I-RNTI长度为40bit时
若更新前的I-RNTI规则的I-RNTI长度为40bit,第一接入网设备在接收到第二消息后可以不再维护full I-RNTI对应的第二I-RNTI规则。第二消息中未指示short I-RNTI时的第二指示信息,因此第一接入网设备在收到第二消息后,继续维护short I-RNTI对应的第二I-RNTI规则。
应理解,上述示例仅是一种举例说明,第二指示信息与I-RNTI的比特数或者I-RNTI的长度类型的对应关系也可以为其他,这里不再一一列举。
或者,第一接入网设备可以在第二I-RNTI规则对应的定时器超时,确定第二I-RNTI规则失效。
需要说明的是,步骤S702可以是一个可选的步骤。
一个可能的实施例中,第一接入网设备维护第二接入网设备的多个I-RNTI规则有效也可以不依赖于上述步骤S701,和/或,S702。在该实施例中,第二接入网设备也可以通过上述第二消息指示该多个I-RNTI规则中部分或全部I-RNTI规则失效。
可选的,S703,第一接入网设备根据第二接入网设备的至少一个有效的I-RNTI规则确定终端设备的I-RNTI对应的接入网设备。
一种示例性说明中,该第二接入网设备的至少一个有效的I-RNTI规则可以包括第一消息指示有效的至少两个I-RNTI规则中一个或多个,还可以包括在步骤S702之后第二接入网设备指示的新的有效的I-RNTI规则。比如,若S702之后,第一接入网设备确定第二I-RNTI规则有效,第一接入网设备可以根据第一I-RNTI规则,和/或,第二I-RNTI规则确定终端设备的I-RNTI对应的接入网设备。
或者,该第二接入网设备的至少一个有效的I-RNTI规则也可以不包括第一消息指示有效的至少两个I-RNTI规则,例如,第一接入网设备在S702之后,确定第一消息指示有效的至少两个I-RNTI规则均失效,则第一接入网设备在执行S703时采用的至少一个有效的I-RNTI规则可以不包括第一消息指示有效的至少两个I-RNTI规则。
或者,该第二接入网设备的至少一个有效的I-RNTI规则也可以不依赖于第一消息。例如,第一接入网设备在不依赖于S701和/或S702的方式下维护第二接入网设备的多个I-RNTI规则有效,步骤S703中所述的至少一个有效的I-RNTI规则可以包括第一接入网设备维护的该多个I-RNTI规则中的一个或多个I-RNTI规则。
可选的,S704,第一接入网设备向确定的接入网设备中的至少一个接入网设备发送获取终端设备上下文信息请求消息。
S704的具体描述可以参考步骤S302中的描述。
一种实现方式1中,第一接入网设备根据有效的I-RNTI规则确定接入网设备。若确定的接入网设备的数量大于或等于2个,第一接入网设备可以向全部接入网设备发送获取终端设备上下文信息请求消息,或者通过遍历的机制,依次向确定的接入网设备发送获取终端设备上下文信息请求消息。若第一接入网设备采用遍历的机制,第一接入网设备可以 依次向各个接入网设备发送获取终端设备上下文信息请求消息,直到成功找到I-RNTI对应的接入网设备。举例说明,第一接入网设备向第一个接入网设备发送获取终端设备上下文信息请求消息,若未成功找到I-RNTI对应的接入网设备,继续向下一个接入网设备发送获取终端设备上下文信息请求消息。以此类推,直到成功找到I-RNTI对应的接入网设备。需要说明的是,该举例说明中以第一接入网设备向第一个接入网设备发送获取终端设备上下文信息请求消息为例,但本申请实施例“第一个”并不限于一个,即第一接入网设备在同一时刻也可以向多个接入网设备获取终端设备的上下文信息。
另一种实现方式2中,第一接入网设备可以依次根据有效的I-RNTI规则确定接入网设备。若第一接入网设备根据第n个I-RNTI规则未成功找到I-RNTI对应的接入网设备,第一接入网设备根据第n+1个I-RNTI规则确定对应的接入网设备。以此类推,直到成功找到I-RNTI对应的接入网设备。若第一接入网设备根据每个I-RNTI规则确定的接入网设备的数量大于或等于2个,那么对于每个I-RNTI规则,第一接入网设备获取终端设备上下文信息时可以采用实现方式1中获取终端设备上下文信息的方式获取,当然,也可以采用其他方式,这里不做具体限定。其中n为大于等于1的整数。
举例说明,以第二接入网设备的2个有效的I-RNTI规则为例。比如,若S702之后,第一接入网设备维护第一I-RNTI规则,并继续维护第二I-RNTI规则有效,第一接入网设备可以根据第一I-RNTI规则,和/或,第二I-RNTI规则确定终端设备的I-RNTI对应的接入网设备。按照实现方式1,第一接入网设备先根据第一I-RNTI规则和第二I-RNTI规则分别确定对应的接入网设备。若确定的接入网设备的数量大于或等于2,第一接入网设备可以和确定的全部接入网设备分别执行S704,或者,可以和部分对应的接入网设备执行S704。若第一接入网设备和部分对应的接入网设备执行S704,当第一接入网设备成功找到I-RNTI对应的接入网设备,则第一接入网设备可以终止遍历。按照实现方式2,第一接入网设备可以基于第1个I-RNTI规则(可以是第一I-RNTI规则,也可以是第二I-RNTI规则)确定终端设备的I-RNTI对应的接入网设备,然后向基于该第1个I-RNTI规则确定出来的接入网设备发送获取终端设备上下文信息请求消息。若确定的接入网设备的数量大于或等于2,第一接入网设备可以和确定的全部接入网设备分别执行S704,或者,可以和部分对应的接入网设备执行S704。若第一接入网设备遍历根据第1个I-RNTI规则确定出来的接入网设备,未成功找到I-RNTI对应的接入网设备,可以继续基于第2个I-RNTI规则确定终端设备的I-RNTI对应的接入网设备。若基于第2个I-RNTI规则确定的接入网设备的数量大于或等于2,第一接入网设备的实现方式可以参考上述描述,此处不再赘述。
一种示例性说明中,若有多个接入网设备的本地接入网设备标识信息与终端设备的I-RNTI携带的本地接入网设备标识信息相同,则第一接入网设备可以根据终端设备的I-RNTI确定出多个接入网设备。
需要说明的是,在上述另一种实施方式中以第一接入网设备在遍历过程中一次基于1个I-RNTI规则获取终端设备的上下文信息,但本申请实施例并不限于一个,第一接入网设备在遍历过程中也可以一次基于多个I-RNTI规则获取终端设备的上下文信息。
本申请实施例中,目标接入网设备可以在源接入网设备的指示下维持源接入网设备的多个I-RNTI规则有效,从而在恢复终端设备的RRC连接时可以基于多个I-RNTI规则确定源接入网设备,从而可以在一定程度上避免在基于I-RNTI确定源接入网设备时遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率,使得终端设备可以快速进入 连接态,缩短业务传输的时延。
例如,第一消息通过指示增加I-RNTI规则的方式,使得第一接入网设备在维护第二接入网设备原有I-RNTI规则的基础上进一步维护增加的I-RNTI规则,由于第二接入网设备在更新I-RNTI规则后可能存在基于原有I-RNTI规则分配I-RNTI的终端设备。通过上述方式第一接入网设备可以在恢复终端设备RRC连接时可以根据原有的I-RNTI规则和新增的I-RNTI规则确定接入网设备,从而可以在一定程度上避免遗漏接入网设备,从而可以提高终端设备恢复RRC连接的成功率。
此外,第二消息通过指示删除/释放I-RNTI规则的方式,使得第一接入网设备可以不再维护第二接入网设备原有I-RNTI规则。通过上述方式第一接入网设备可以在恢复终端设备RRC连接时可以根据新增的I-RNTI规则确定接入网设备,从而可以减少确定出的接入网设备的数量,进而可以向少量的接入网设备获取终端设备的上下文信息,可见,通过上述方式可以降低第一接入网设备的成本。
一种可能的实施方式中,第二接入网设备在向第一接入网设备指示任一I-RNTI规则之前,可以基于实施例一所述的过程与第一接入网设备进行交互,使得第二接入网设备的I-RNTI规则与其他接入网设备的I-RNTI规则不存在冲突,具体过程可以参阅实施例一所述,这里不再重复赘述。
为了便于对方案的理解,下面结合具体场景对本申请实施例二提供的方法进行描述。在如图8所示流程中,第一接入网设备可以为终端设备发起RRC恢复流程的目标接入网设备,第二接入网设备可以为保存有终端设备上下文信息的源接入网设备。
图8所示的流程可以包括:
S801,第二接入网设备向第一接入网设备发送I-RNTI规则1。
可选的,步骤S801之前,第二接入网设备与第一接入网设备可以基于实施例一所述的过程进行交互,使得I-RNTI规则1与其他接入网设备的I-RNTI规则不存在冲突。
S802,第二接入网设备配置至少一个第一终端设备进入inactive态,并基于I-RNTI规则1为该终端设备分配I-RNTI。
需要说明的是,步骤S801和S802没有严格的先后顺序,可以先执行S801再执行S802,也可以先执行S802再执行S801,或者也可以同时执行S801和S802。
S803,第二接入网设备确定将当前的I-RNTI规则更新为I-RNTI规则2。
可选的,步骤S803之前,第二接入网设备与第一接入网设备可以基于实施例一所述的过程进行交互,使得I-RNTI规则2与其他接入网设备的I-RNTI规则不存在冲突。
示例性的,更新I-RNTI规则的原因可以是基于I-RNTI规则1确定的接入网设备的数量超过阈值,或者,也可以是为了更合理的配置inactive态的终端设备,当然,也可以为其他更新原因,这里不做具体限定。
可选的,第二接入网设备可以向第一接入网设备发送更新I-RNTI规则的原因,也可以不发送,这里不做具体限定。示例性的,第二接入网设备可以在第一消息中携带更新I-RNTI规则的原因。
S804,第二接入网设备向第一接入网设备发送第一消息,该第一消息携带I-RNTI规则2,并指示I-RNTI规则1保持有效。
一个示例中,第一消息可以携带I-RNTI规则2以及第一指示信息,第一指示信息用于指示I-RNTI规则1保持有效,或者,该第一指示信息也可以指示第一接入网设备可以 根据更新之前的I-RNTI规则1确定接入网设备。
另一个示例中,第一消息可以携带I-RNTI规则1以及I-RNTI规则2。
又一个示例中,第一消息可以指示第一接入网设备增加I-RNTI规则2。
一种示例性说明中,第一消息可以是设备配置更新消息,比如ENB/NG-RAN NODE CONFIGURATION UPDATE消息,或者设备配置更新确认消息,比如ENB/NG-RAN NODE CONFIGURATION UPDATE ACKNOWLEDGE。
可选的,S804之后,可以执行S805。
S805,第一接入网设备向第二接入网设备发送第一消息的确认消息。
示例性的,第一消息的确认消息可以为设备配置更新确认消息,比如ENB/NG-RAN NODE CONFIGURATION UPDATE ACKNOWLEDGE。
S806,第二接入网设备配置至少一个第二终端设备进入inactive态,并基于I-RNTI规则2为该终端设备分配I-RNTI。
S807,终端设备1向第一接入网设备发送RRC恢复请求消息,该RRC恢复请求消息携带该终端设备1的I-RNTI。
其中,该终端设备1可以是第一终端设备,也可以是第二终端设备。
S808,第一接入网设备基于I-RNTI规则1和/或I-RNTI规则2确定该终端设备1的I-RNTI对应的接入网设备。
S809,第一接入网设备向确定的接入网设备发送上下文获取请求消息,该上下文获取请求消息用于获取终端设备1的上下文信息。
一种实现方式中,第一接入网设备基于I-RNTI规则1和I-RNTI规则2确定该终端设备1的I-RNTI对应的接入网设备,并向基于I-RNTI规则1确定的接入网设备以及基于I-RNTI规则2确定的接入网设备分别发送上下文获取请求消息。
另一种实现方式中,第一接入网设备基于I-RNTI规则1确定该终端设备的I-RNTI对应的接入网设备,并向基于I-RNTI规则1确定的接入网设备发送上下文获取请求消息。若成功找到I-RNTI对应的接入网设备,则继续RRC恢复流程,具体可以参阅图3中S303所述。若未成功找到I-RNTI对应的接入网设备,则基于I-RNTI规则2确定该终端设备的I-RNTI对应的接入网设备,并向基于I-RNTI规则2确定的接入网设备发送上下文获取请求消息。
应理解,上述实现方式仅以先基于I-RNTI规则1获取终端设备的上下文信息,后基于I-RNTI规则2获取终端设备的上下文信息为例,在具体实施中,也可以先基于I-RNTI规则2获取终端设备的上下文信息,后基于I-RNTI规则1获取终端设备的上下文信息,这里不对I-RNTI规则的先后顺序进行具体限定。
S810,第二接入网设备向第一接入网设备发送第二消息,第二消息指示I-RNTI规则1失效。
示例性的,第二消息携带第二指示信息,第二指示信息用于指示I-RNTI规则1失效。或者,第二消息只携带I-RNTI规则2。或者,第二消息携带第二指示信息和I-RNTI规则2。或者,第二消息携带I-RNTI规则1,以及指示I-RNTI规则1失效或者指示第一接入网设备释放I-RNTI规则1。
一种示例性说明中,第二消息可以是设备配置更新消息,比如ENB/NG-RAN NODE CONFIGURATION UPDATE消息,或者设备配置更新确认消息,比如ENB/NG-RAN NODE  CONFIGURATION UPDATE ACKNOWLEDGE。
一种实施方式中,第二接入网设备可以释放基于I-RNTI规则1分配I-RNTI的全部终端设备的上下文信息时,向第一接入网设备发送第二消息。
在步骤S810之后,若终端设备2向第一接入网设备发起RRC恢复流程,第一接入网设备可以基于I-RNTI规则2确定接入网设备。
需要说明的是,图8中所述的步骤可以不全部执行,例如执行其中的部分步骤,此外,还可以执行图8中未示出(或说明)的步骤。
应理解,本申请实施例二仅对第二接入网设备向第一接入网设备更新I-RNTI规则的过程进行了说明,第一接入网设备也可以向第二接入网设备更新I-RNTI规则,重复之处不再赘述。
实施例三:
如图9所示,为本申请实施例提供的另一种通信方法。该方法具体可以包括:
S1001,第二接入网设备更新I-RNTI规则。
示例性的,步骤S1001可以参阅步骤S701的相关描述,这里不再重复赘述。
在步骤S1001之后可以执行S1002a,或者S1002b,也可以执行S1002a和S1002b。
S1002a,第二接入网设备发送第一寻呼消息,第一寻呼消息用于指示非激活态的终端设备的无线接入网通知区域中的接入网设备寻呼非激活态的终端设备。相应的,非激活态的终端设备的无线接入网通知区域中的接入网设备接收第一寻呼消息。
以非激活态的终端设备的无线接入网通知区域中的第一接入网设备为例,第一接入网设备在接收到第一寻呼消息之后,可以发送第三寻呼消息,第三寻呼消息用于寻呼非激活态的终端设备。
可选的,第一寻呼消息可以携带寻呼原因,该寻呼原因用于指示I-RNTI规则变更。可选的,第三寻呼消息可以携带寻呼原因,该寻呼原因用于指示I-RNTI规则变更。
S1002b,第二接入网设备发送第二寻呼消息,第二寻呼消息用于第二接入网设备寻呼非激活态的终端设备。相应的,终端设备接收第二寻呼消息。
第二寻呼消息可以携带寻呼原因,该寻呼原因用于指示I-RNTI规则变更。
在S1002a,或者S1002b之后,可以执行S1003。
S1003,第二接入网设备执行如下A-C中至少一项:
A,触发非激活态的第一终端设备的I-RNTI基于更新后的I-RNTI规则进行更新。
一种实现方式中,第一终端设备向第二接入网设备发送寻呼响应,第二接入网设备可以基于更新后的I-RNTI规则为第一终端设备分配I-RNTI。
另一种实现方式中,第二接入网设备可以向第三接入网设备发送第三消息,第三接入网设备向第一终端设备转发第三消息,第三消息用于基于更新后的I-RNTI规则为第一终端设备分配I-RNTI,其中,第三接入网设备为接收第一终端设备发送的寻呼响应的接入网设备。
可选的,第三消息可以携带用于指示I-RNTI规则变更的原因值。
B,触发非激活态的第二终端设备进入空闲态。
一种实现方式中,第二终端设备向第二接入网设备发送寻呼响应,第二接入网设备释放第二终端设备到空闲态;
另一种实现方式中,第二终端设备向第四接入网设备发送寻呼响应,第二接入网设备 可以向第四接入网设备发送第四消息,第四接入网设备向第一终端设备转发第四消息,第四消息用于释放第二终端设备到空闲态。
可选的,第四消息可以携带用于指示I-RNTI规则变更的原因值。
C,向第一接入网设备发送非激活态的第三终端设备的上下文信息,第一接入网设备为接收第三终端设备发送的寻呼响应的接入网设备。
其中,第二接入网设备可以保存上述第一终端设备、第二终端设备以及第三终端设备的上下文信息。
通过本申请实施例三的方案,源接入网设备在更新I-RNTI规则时,通过及时寻呼终端设备,从而可以基于新的I-RNTI规则更新终端设备的I-RNTI,或者释放终端设备到空闲态,或者基于旧的I-RNTI规则分配I-RNTI的终端设备的上下文信息转移到其他接入网设备,使得源接入网设备和目标接入网设备可以维护一套I-RNTI规则,从而可以减少接入网设备实现的复杂度。
实施例四:
本申请实施例四中,通过在I-RNTI中划分出一个或多个bit,用于指示对应的I-RNTI规则。如图10所示,为本申请实施例提供的另一种通信方法。该方法具体可以包括:
S1101,第二接入网设备向第一接入网设备发送当前的I-RNTI规则1。
S1102,第二接入网设备根据I-RNTI规则1为终端设备1配置I-RNTI。
其中,为终端设备1的配置的I-RNTI中的1个或多个bit指示对应的I-RNTI规则1。
一个实施例中,步骤S1102之后,第二接入网设备可以向终端设备1发送配置信息,该配置信息携带终端设备1的I-RNTI。
一种实现方式中,终端设备1的I-RNTI中可以携带I-RNTI规则1的具体内容,也可以携带I-RNTI规则1的标识、索引信息等。
需要说明的是,步骤S1101可以是一个可选的步骤。例如,I-RNTI中携带I-RNTI规则1的具体内容时,可以不执行S1101。
S1103,第二接入网设备向第一接入网设备更新当前的I-RNTI规则为I-RNTI规则2。
S1104,第二接入网设备根据I-RNTI规则2为终端设备2配置I-RNTI。
其中,为终端设备2的I-RNTI中的1个或多个bit指示对应的I-RNTI规则2。
一个实施例中,步骤S1104之后,第二接入网设备可以向终端设备2发送配置信息,该配置信息携带终端设备2的I-RNTI。
一种实现方式中,终端设备2的I-RNTI中可以携带I-RNTI规则2的具体内容,也可以携带I-RNTI规则2的标识、索引信息等。
需要说明的是,步骤S1102可以是一个可选的步骤。例如,I-RNTI中携带I-RNTI规则2的具体内容时,可以不执行S1102。
S1105,终端设备向第一接入网设备发送RRC恢复请求,该RRC恢复请求携带终端设备的I-RNTI。
该终端设备可以是上述终端设备1,也可以是终端设备2。
S1106,第一接入网设备基于终端设备的I-RNTI确定对应的I-RNTI规则。
例如,若发送RRC恢复请求的终端设备为终端设备1,则第一接入网设备基于该终端设备的I-RNTI确定对应的I-RNTI规则为I-RNTI规则1。
若发送RRC恢复请求的终端设备为终端设备2,则第一接入网设备基于该终端设备的 I-RNTI确定对应的I-RNTI规则为I-RNTI规则2。
S1107,第一接入网设备基于对应的I-RNTI规则确定终端设备的I-RNTI对应的接入网设备。
S1108,第一接入网设备向确定的接入网设备获取该终端设备的上下文信息。
应理解,本申请实施例四仅对第二接入网设备向第一接入网设备发送I-RNTI规则、第二接入网设备为终端设备分配I-RNTI以及终端设备向第一接入网设备发起RRC恢复流程的过程进行了说明,第一接入网设备也可以向第二接入网设备发送I-RNTI规则、第一接入网设备也可以为终端设备分配I-RNTI以及终端设备也可以向第二接入网设备发起RRC恢复流程,重复之处不再赘述。
本申请实施例中通过终端设备的I-RNTI指示对应的I-RNTI规则,使得第一接入网设备可以采用指示的I-RNTI规则确定I-RNTI中携带的接入网设备信息,从而可以提高终端设备恢复RRC连接的准确性。
基于与方法实施例的同一发明构思,本申请实施例提供一种通信装置。该通信装置的结构可以如图11所示,包括收发模块1201、处理模块1202。可选的,还可以包括存储模块,存储模块可以用于存储程序指令和/或数据。一种可能的实现方式中,处理模块1202可以调用存储模块中存储的程序指令执行确定、获取、更新等处理动作。
一种具体实施方式中,通信装置具体可以用于实现图7或图8所述的实施例中第一接入网设备执行的方法,该装置可以是第一接入网设备本身,也可以是第一接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,收发模块1201,用于接收来自第二接入网设备的第一消息,第一消息用于指示第二接入网设备的至少两个I-RNTI规则保持有效;处理模块1202,用于根据第二接入网设备的至少一个有效的I-RNTI规则确定终端设备的I-RNTI对应的接入网设备;以及向确定的接入网设备中的至少一个接入网设备获取终端设备的上下文信息。
示例性的,第一消息指示第二接入网设备更新后的I-RNTI规则为第一I-RNTI规则,并指示第二I-RNTI规则保持有效,第二I-RNTI规则为第二接入网设备更新前的I-RNTI规则。
示例性的,第一消息携带第一I-RNTI规则以及第一指示信息,第一指示信息用于指示第二I-RNTI规则保持有效;或者,第一消息携带第一I-RNTI规则以及第二I-RNTI规则。
可选的,收发模块1201,还用于:接收来自第二接入网设备的第二消息,第二消息指示第二I-RNTI规则失效。
示例性的,第二消息携带第二指示信息,第二指示信息用于指示第二I-RNTI规则失效;或者,第二消息指示第一I-RNTI规则保持有效。
另一种具体实施方式中,通信装置具体可以用于实现图7或图8所述的实施例中第二接入网设备执行的方法,该装置可以是第二接入网设备本身,也可以是第二接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,处理模块1202,用于更新I-RNTI规则;收发模块1201,用于向第一接入网设备发送第一消息,第一消息用于指示第二接入网设备的至少两个I-RNTI规则保持有效。
示例性的,第一消息指示第二接入网设备更新后的I-RNTI规则为第一I-RNTI规则,并指示第二I-RNTI规则保持有效,第二I-RNTI规则为第二接入网设备更新前的I-RNTI 规则。
示例性的,第一消息携带第一I-RNTI规则以及第一指示信息,第一指示信息用于指示第二I-RNTI规则保持有效;或者,第一消息携带第一I-RNTI规则以及第二I-RNTI规则。
可选的,收发模块1201,还用于:向第一接入网设备发送第二消息,第二消息指示第二I-RNTI规则失效。
示例性的,第二消息携带第二指示信息,第二指示信息用于指示第二I-RNTI规则失效;或者,第二消息指示第一I-RNTI规则保持有效。
一种具体实施方式中,通信装置具体可以用于实现图10所述的实施例中第一接入网设备执行的方法,该装置可以是第一接入网设备本身,也可以是第一接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,处理模块1202,用于更新I-RNTI规则;收发模块1201,用于发送第一寻呼消息和/或第二寻呼消息,第一寻呼消息用于指示非激活态的终端设备的无线接入网通知区域中的接入网设备寻呼非激活态的终端设备,第二寻呼消息用于第二接入网设备寻呼非激活态的终端设备;收发模块1201,还用于执行如下至少一项:触发非激活态的第一终端设备I-RNTI基于更新后的I-RNTI规则进行更新;触发非激活态的第二终端设备进入空闲态;通过收发模块1201向第一接入网设备发送非激活态的第三终端设备的上下文信息,第一接入网设备为接收第三终端设备发送的寻呼响应的接入网设备。
示例性的,第一寻呼消息和/或第二寻呼消息携带寻呼原因,寻呼原因为I-RNTI规则变更。
可选的,处理模块1202,在触发非激活态的第一终端设备I-RNTI进行更新时,具体用于:基于更新后的I-RNTI规则为第一终端设备分配I-RNTI;或者,通过收发模块1201向第三接入网设备发送第三消息,第三接入网设备为接收第一终端设备发送的寻呼响应的接入网设备,第三消息用于指示第三接入网设备为第一终端设备分配I-RNTI。
示例性的,第三消息携带用于指示I-RNTI规则变更的原因值。
可选的,收发模块1201,在触发非激活态的第二终端设备进入空闲态时,具体用于:释放第二终端设备到空闲态;或者,通过收发模块1201向第四接入网设备发送第四消息,第四接入网设备为接收第二终端设备发送的寻呼响应的接入网设备,第四消息用于指示第四接入网设备释放第二终端设备到空闲态。
示例性的,第四消息携带用于指示I-RNTI规则变更的原因值。
一种具体实施方式中,通信装置具体可以用于实现图10所述的实施例中第二接入网设备执行的方法,该装置可以是第二接入网设备本身,也可以是第二接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,收发模块1201,用于接收来自第二接入网设备的第一寻呼消息,第一寻呼消息用于寻呼非激活态的终端设备;以及发送第三寻呼消息,第三寻呼消息用于寻呼非激活态的终端设备;处理模块1202,用于执行如下至少一项:更新非激活态的第一终端设备的I-RNTI;释放非激活态的第二终端设备进入空闲态。
示例性的,第一寻呼消息和/或第三寻呼消息携带寻呼原因,寻呼原因为I-RNTI规则变更。
可选的,收发模块1201,还用于:在处理模块1202更新非激活态的终端设备I-RNTI 之前,接收来自第二接入网设备的第三消息,第三消息用于指示第一接入网设备为第一终端设备分配I-RNTI;或者,在处理模块1202释放非激活态的终端设备进入空闲态之前,接收来自第二接入网设备的第四消息,第四消息用于指示第四接入网设备释放第二终端设备到空闲态。
示例性的,第三消息和/或第四消息携带用于指示I-RNTI规则变更的原因值。
一种具体实施方式中,通信装置具体可以用于实现图10所述的实施例中终端设备执行的方法,该装置可以是第二接入网设备本身,也可以是第二接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,收发模块1201,用于接收第二寻呼消息或者第三寻呼消息。处理模块1202,用于进入空闲态或者更新I-RNTI。
一种具体实施方式中,通信装置具体可以用于实现图4至图6所述的实施例中第一接入网设备执行的方法,该装置可以是第一接入网设备本身,也可以是第一接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,收发模块1201,用于接收来自第二接入网设备的消息1,消息1指示第二接入网设备的第一I-RNTI规则;处理模块1202,第一接入网设备确定第一I-RNTI规则与其他接入网设备的I-RNTI规则存在冲突;以及,触发第二接入网设备更新I-RNTI规则。
可选的,处理模块1202,在触发第二接入网设备更新I-RNTI规则时,具体用于:通过收发模块向第二接入网设备发送消息2,消息2指示第二接入网设备更新I-RNTI规则。
示例性的,消息2携带如下信息中至少一项:第一信息、第二信息,其中,第一信息用于指示第二接入网设备更新I-RNTI规则,第二信息用于指示I-RNTI规则的更新要求。通过上述设计,可以提高更新效率。
可选的,处理模块1202,在触发第二接入网设备更新I-RNTI规则时,具体用于:通过收发模块向OAM实体发送消息3,消息3用于指示I-RNTI规则存在冲突。
示例性的,消息3携带第一I-RNTI规则的信息,和/或,第二接入网设备的标识信息。通过上述方式,OAM实体可以确定发生冲突的I-RNTI规则。
示例性的,消息3还携带其他接入网设备的I-RNTI规则的信息,和/或,其他接入网设备的标识信息。通过上述方式,OAM实体可以确定发生冲突的I-RNTI规则。
可选的,收发模块1201,还用于接收来自第二接入网设备的第三信息,第三信息用于指示允许第一接入网设备辅助第二接入网设备调整I-RNTI规则。
一种具体实施方式中,通信装置具体可以用于实现图4至图6所述的实施例中第二接入网设备执行的方法,该装置可以是第二接入网设备本身,也可以是第二接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,收发模块1201,用于与第一接入网设备进行通信。处理模块1202,用于通过收发模块1201向第一接入网设备发送消息1,消息1指示第二接入网设备的第一I-RNTI规则;通过收发模块1201接收来自第一接入网设备的消息2,消息2指示第二接入网设备更新I-RNTI规则。
示例性的,消息2携带如下信息中至少一项:第一信息、第二信息,其中,第一信息用于指示第二接入网设备更新I-RNTI规则,第二信息用于指示I-RNTI规则的更新要求。通过上述设计,可以提高更新效率。
可选的,收发模块1201,还用于:向第一接入网设备发送第三信息,第三信息用于指示允许第一接入网设备辅助第二接入网设备调整I-RNTI规则。
示例性的,消息3携带第一I-RNTI规则的信息,和/或,第二接入网设备的标识信息。 通过上述方式,OAM实体可以确定发生冲突的I-RNTI规则。
示例性的,消息3还携带其他接入网设备的I-RNTI规则的信息,和/或,其他接入网设备的标识信息。通过上述方式,OAM实体可以确定发生冲突的I-RNTI规则。
可选的,收发模块1201,还用于:向第一接入网设备发送第三信息,第三信息用于指示允许第一接入网设备辅助第二接入网设备调整I-RNTI规则。
一种具体实施方式中,通信装置具体可以用于实现图4至图6所述的实施例中OAM实体执行的方法,该装置可以是OAM实体本身,也可以是OAM实体中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,收发模块1201,用于接收来自第一接入网设备的消息3,消息3用于指示去激活态无线网络临时标识I-RNTI规则存在冲突。处理模块1202,用于对存在冲突的I-RNTI规则进行更新。
可选的,处理模块1202,具体用于更新第二接入网设备的I-RNTI规则。收发模块1201,还用于向第二接入网设备发送更新后的I-RNTI规则。
处理模块1202,还可以用于更新第三接入网设备的I-RNTI规则。收发模块1201,还用于向第三接入网设备发送更新后的I-RNTI规则。
一种具体实施方式中,通信装置具体可以用于实现图11所述的实施例中第一接入网设备执行的方法,该装置可以是第一接入网设备本身,也可以是第一接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,收发模块1201,用于接收来自终端设备的RRC恢复请求,RRC恢复请求携带终端设备的I-RNTI,且I-RNTI指示对应的I-RNTI规则。处理模块1202,用于基于I-RNTI规则确定I-RNTI对应的接入网设备,以及向接入网设备获取终端设备的上下文信息。
一种具体实施方式中,通信装置具体可以用于实现图11所述的实施例中第二接入网设备执行的方法,该装置可以是第二接入网设备本身,也可以是第二接入网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,处理模块1202,用于确定I-RNTI规则;以及基于I-RNTI规则确定终端设备的I-RNTI,I-RNTI指示对应的I-RNTI规则。
一种具体实施方式中,通信装置具体可以用于实现图11所述的实施例中终端设备执行的方法,该装置可以是终端设备本身,也可以是终端设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。其中,收发模块1201,用于接收来自第二接入网设备的配置信息,该配置信息携带第二接入网设备分配给终端设备的I-RNTI,该I-RNTI指示对应的I-RNTI规则;以及,向第一接入网设备发送RRC恢复请求,RRC恢复请求携带终端设备的I-RNTI,且I-RNTI指示对应的I-RNTI规则。
本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个实施例中的各功能模块可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。可以理解的是,本申请实施例中各个模块的功能或者实现可以进一步参考方法实施例的相关描述。
一种可能的方式中,通信装置可以如图12所示,该通信装置可以是接入网设备或者接入网设备中的芯片。该通信装置可以包括处理器1301,通信接口1302,可选的,还可以包括存储器1303。其中,处理模块1202可以为处理器1301。收发模块1201可以为通信接口1302。
处理器1301,可以是一个中央处理模块(central processing unit,CPU),或者为数字 处理模块等等。通信接口1302可以是收发器、也可以为接口电路如收发电路等、也可以为收发芯片等等。该通信装置还包括:存储器1303,用于存储处理器1302执行的程序。存储器1303可以是非易失性存储器,比如硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等,还可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM)。存储器1303是能够用于携带或存储具有指令和/或数据并能够由计算机存取的任何其他介质,但不限于此。
一种可能的方式中,处理器1301可以用于读取存储器1303存储的程序代码和/或数据,从而实现例如上述处理模块1202的动作,本申请在此不再赘述。
本申请实施例中不限定上述通信接口1302、处理器1301以及存储器1303之间的具体连接介质。本申请实施例在图12中以存储器1303、处理器1301以及通信接口1302之间通过总线1304连接,总线在图12中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图12中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
本发明实施例还提供了一种计算机可读存储介质,用于存储为执行上述处理器所需执行的计算机软件指令,其包含用于执行上述处理器所需执行的程序。
本发明实施例还提供了一种通信系统,该通信系统包括实施例一所述的第一接入网设备和第二接入网设备,还可以包括实施例一所述的OAM实体。
本发明实施例还提供了另一种通信系统,该通信系统包括实施例二所述的第一接入网设备以及第二接入网设备,还可以包括终端设备。
本发明实施例还提供了另一种通信系统,该通信系统包括实施例三所述的第一接入网设备以及第二接入网设备,还可以包括终端设备。
本发明实施例还提供了另一种通信系统,该通信系统包括实施例四所述的第一接入网设备以及第二接入网设备,还可以包括终端设备。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在 流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。

Claims (35)

  1. 一种通信方法,其特征在于,所述方法包括:
    第一接入网设备接收来自第二接入网设备的第一消息,所述第一消息用于指示所述第二接入网设备的至少两个去激活态无线网络临时标识I-RNTI规则保持有效;
    所述第一接入网设备根据所述第二接入网设备的至少一个有效的I-RNTI规则确定终端设备的I-RNTI对应的接入网设备;
    所述第一接入网设备向确定的接入网设备中的至少一个接入网设备获取所述终端设备的上下文信息。
  2. 如权利要求1所述的方法,其特征在于,所述第一消息指示所述第二接入网设备更新后的I-RNTI规则为第一I-RNTI规则,并指示第二I-RNTI规则保持有效,所述第二I-RNTI规则为所述第二接入网设备更新前的I-RNTI规则。
  3. 如权利要求2所述的方法,其特征在于,所述第一消息携带所述第一I-RNTI规则以及第一指示信息,所述第一指示信息用于指示所述第二I-RNTI规则保持有效;或者
    所述第一消息携带所述第一I-RNTI规则以及所述第二I-RNTI规则;或者
    所述第一消息指示增加所述第一I-RNTI规则。
  4. 如权利要求2或3所述的方法,其特征在于,所述方法还包括:
    所述第一接入网设备接收来自所述第二接入网设备的第二消息,所述第二消息指示所述第二I-RNTI规则失效。
  5. 如权利要求4所述的方法,其特征在于,所述第二消息携带第二指示信息,所述第二指示信息用于指示所述第二I-RNTI规则失效;或者
    所述第二消息指示所述第一I-RNTI规则保持有效;或者
    所述第二消息指示释放/删除所述第二I-RNTI规则。
  6. 如权利要求1-5任一项所述的方法,其特征在于,所述I-RNTI规则用于所述第一接入网设备确定所述终端设备的I-RNTI中携带的接入网设备标识信息。
  7. 如权利要求6所述的方法,其特征在于,所述I-RNTI规则包括:所述接入网设备标识信息的相关信息,所述接入网设备标识信息的相关信息用于指示所述接入网设备标识信息的比特数量,或者,所述接入网设备标识信息的相关信息为所述第二接入网设备的接入网设备标识信息。
  8. 如权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:
    所述第一接入网设备接收来自所述终端设备的无线资源控制RRC恢复请求,所述RRC恢复请求携带所述终端设备的I-RNTI,且所述I-RNTI指示所述第二接入网设备更新前的I-RNTI规则或者所述第二接入网设备更新后的I-RNTI规则;
    所述第一接入网设备根据所述第二接入网设备的至少一个有效的I-RNTI规则确定终端设备的I-RNTI对应的接入网设备,包括:
    所述第一接入网设备根据所述I-RNTI指示的I-RNTI规则确定所述终端设备的所述I-RNTI对应的接入网设备。
  9. 如权利要求8所述的方法,其特征在于,
    所述I-RNTI的第一比特取第一值,所述I-RNTI指示所述第二接入网设备更新前的I-RNTI规则,所述第一比特包括一个或多个比特;
    或者,所述I-RNTI的第一比特取第二值,所述I-RNTI指示所述第二接入网设备更新后的I-RNTI规则,所述第一比特包括一个或多个比特。
  10. 一种通信方法,其特征在于,所述方法包括:
    第二接入网设备更新去激活态无线网络临时标识I-RNTI规则;
    所述第二接入网设备向第一接入网设备发送第一消息,所述第一消息用于指示所述第二接入网设备的至少两个去激活态无线网络临时标识I-RNTI规则保持有效。
  11. 如权利要求10所述的方法,其特征在于,所述第一消息指示所述第二接入网设备更新后的I-RNTI规则为第一I-RNTI规则,并指示第二I-RNTI规则保持有效,所述第二I-RNTI规则为所述第二接入网设备更新前的I-RNTI规则。
  12. 如权利要求11所述的方法,其特征在于,所述第一消息携带所述第一I-RNTI规则以及第一指示信息,所述第一指示信息用于指示所述第二I-RNTI规则保持有效;或者
    所述第一消息携带所述第一I-RNTI规则以及所述第二I-RNTI规则;或者
    所述第一消息指示增加所述第一I-RNTI规则。
  13. 如权利要求11或12所述的方法,其特征在于,所述方法还包括:
    所述第二接入网设备向所述第一接入网设备发送第二消息,所述第二消息指示所述第二I-RNTI规则失效。
  14. 如权利要求13所述的方法,其特征在于,所述第二消息携带第二指示信息,所述第二指示信息用于指示所述第二I-RNTI规则失效;或者
    所述第二消息指示所述第一I-RNTI规则保持有效;或者
    所述第二消息指示释放/删除所述第二I-RNTI规则。
  15. 如权利要求10-14任一项所述的方法,其特征在于,所述I-RNTI规则用于所述第一接入网设备确定所述终端设备的I-RNTI中携带的接入网设备标识信息。
  16. 如权利要求15所述的方法,其特征在于,所述I-RNTI规则包括:所述接入网设备标识信息的相关信息,所述接入网设备标识信息的相关信息用于指示所述接入网设备标识信息的比特数量,或者,所述接入网设备标识信息的相关信息为所述第二接入网设备的接入网设备标识信息。
  17. 如权利要求10-16任一项所述的方法,其特征在于,所述方法还包括:
    所述第二接入网设备确定I-RNTI规则;
    所述第二接入网设备基于确定的所述I-RNTI规则确定终端设备的I-RNTI,所述I-RNTI指示对应的I-RNTI规则。
  18. 如权利要求17所述的方法,其特征在于,
    所述I-RNTI的第一比特取第一值,所述I-RNTI指示所述第二接入网设备更新前的I-RNTI规则,所述第一比特包括一个或多个比特;
    或者,所述I-RNTI的第一比特取第二值,所述I-RNTI指示所述第二接入网设备更新后的I-RNTI规则,所述第一比特包括一个或多个比特。
  19. 一种通信方法,其特征在于,所述方法包括:
    第二接入网设备更新去激活态无线网络临时标识I-RNTI规则;
    所述第二接入网设备发送第一寻呼消息和/或第二寻呼消息,所述第一寻呼消息用于指示非激活态的终端设备的无线接入网通知区域中的接入网设备寻呼非激活态的终端设备,所述第二寻呼消息用于所述第二接入网设备寻呼非激活态的终端设备;
    所述第二接入网设备执行如下至少一项:
    触发非激活态的第一终端设备I-RNTI基于更新后的I-RNTI规则进行更新;
    触发非激活态的第二终端设备进入空闲态;
    向第一接入网设备发送非激活态的第三终端设备的上下文信息,所述第一接入网设备为接收所述第三终端设备发送的寻呼响应的接入网设备。
  20. 如权利要求19所述的方法,其特征在于,所述第一寻呼消息和/或所述第二寻呼消息携带寻呼原因,所述寻呼原因为I-RNTI规则变更。
  21. 如权利要求19或20所述的方法,其特征在于,所述第二接入网设备触发非激活态的第一终端设备I-RNTI进行更新,包括:
    所述第二接入网设备基于更新后的I-RNTI规则为所述第一终端设备分配I-RNTI;
    或者,所述第二接入网设备向第三接入网设备发送第三消息,所述第三接入网设备为接收所述第一终端设备发送的寻呼响应的接入网设备,所述第三消息用于指示所述第三接入网设备为所述第一终端设备分配I-RNTI。
  22. 如权利要求21所述的方法,其特征在于,所述第三消息携带用于指示I-RNTI规则变更的原因值。
  23. 如权利要求19或20所述的方法,其特征在于,所述第二接入网设备触发非激活态的第二终端设备进入空闲态,包括:
    所述第二接入网设备释放所述第二终端设备到空闲态;
    或者,所述第二接入网设备向第四接入网设备发送第四消息,所述第四接入网设备为接收所述第二终端设备发送的寻呼响应的接入网设备,所述第四消息用于指示所述第四接入网设备释放所述第二终端设备到空闲态。
  24. 如权利要求23所述的方法,其特征在于,所述第四消息携带用于指示I-RNTI规则变更的原因值。
  25. 一种通信方法,其特征在于,所述方法包括:
    第一接入网设备接收来自第二接入网设备的第一寻呼消息,所述第一寻呼消息用于寻呼非激活态的终端设备;
    所述第一接入网设备发送第三寻呼消息,第三寻呼消息用于寻呼非激活态的终端设备;
    所述第一接入网设备执行如下至少一项:
    更新非激活态的第一终端设备的去激活态无线网络临时标识I-RNTI;
    释放非激活态的第二终端设备进入空闲态。
  26. 如权利要求25所述的方法,其特征在于,所述第一寻呼消息和/或所述第三寻呼消息携带寻呼原因,所述寻呼原因为I-RNTI规则变更。
  27. 如权利要求25或26所述的方法,其特征在于,所述方法还包括:
    在所述第一接入网设备更新非激活态的终端设备I-RNTI之前,所述第一接入网设备接收来自所述第二接入网设备的第三消息,所述第三消息用于指示所述第一接入网设备为所述第一终端设备分配I-RNTI;或者
    在所述第一接入网设备释放非激活态的终端设备进入空闲态之前,所述第一接入网设备接收来自所述第二接入网设备的第四消息,所述第四消息用于指示所述第四接入网设备释放所述第二终端设备到空闲态。
  28. 如权利要求27所述的方法,其特征在于,所述第三消息和/或所述第四消息携带用 于指示I-RNTI规则变更的原因值。
  29. 一种通信方法,其特征在于,所述方法包括:
    第一接入网设备接收来自终端设备的无线资源控制RRC恢复请求,所述RRC恢复请求携带所述终端设备的去激活态无线网络临时标识I-RNTI,且所述I-RNTI指示对应的I-RNTI规则;
    所述第一接入网设备基于所述I-RNTI规则确定所述I-RNTI对应的接入网设备;
    所述第一接入网设备向所述接入网设备获取终端设备的上下文信息。
  30. 如权利要求29所述的方法,其特征在于,
    所述I-RNTI的第一比特取第一值,所述I-RNTI指示第二接入网设备更新前的I-RNTI规则,所述第一比特包括一个或多个比特;
    或者,所述I-RNTI的第一比特取第二值,所述I-RNTI指示第二接入网设备更新后的I-RNTI规则,所述第一比特包括一个或多个比特。
  31. 一种通信方法,其特征在于,所述方法包括:
    第二接入网设备确定去激活态无线网络临时标识I-RNTI规则;
    所述第二接入网设备基于所述I-RNTI规则确定终端设备的I-RNTI,所述I-RNTI指示对应的I-RNTI规则。
  32. 如权利要求31所述的方法,其特征在于,
    所述I-RNTI的第一比特取第一值,所述I-RNTI指示第二接入网设备更新前的I-RNTI规则,所述第一比特包括一个或多个比特;
    或者,所述I-RNTI的第一比特取第二值,所述I-RNTI指示第二接入网设备更新后的I-RNTI规则,所述第一比特包括一个或多个比特。
  33. 一种通信装置,其特征在于,所述装置包括用于实现如权利要求1-9任一项所述的方法的模块;或者,所述装置包括用于实现如权利要求10-18任一项所述的方法的模块;或者,所述装置包括用于实现如权利要求19-24任一项所述的方法的模块;或者,所述装置包括用于实现如权利要求25-28任一项所述的方法的模块;或者,所述装置包括用于实现如权利要求29或30所述的方法的模块;或者,所述装置包括用于实现如权利要求31或32所述的方法的模块。
  34. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储程序,所述程序在被一个或多个处理器读取并执行时可实现权利要求1-9任一项所述的方法;或者,所述程序在被一个或多个处理器读取并执行时可实现权利要求10-18任一项所述的方法;或者,所述程序在被一个或多个处理器读取并执行时可实现权利要求19-24任一项所述的方法;或者,所述程序在被一个或多个处理器读取并执行时可实现权利要求25-28任一项所述的方法;或者,所述程序在被一个或多个处理器读取并执行时可实现权利要求29或30所述的方法;或者,所述程序在被一个或多个处理器读取并执行时可实现权利要求31或32所述的方法。
  35. 一种通信系统,其特征在于,所述系统包括可实现权利要求1-9任一项所述方法的第一接入网设备,以及可实现权利要求10-18任一项所述方法的第二接入网设备;或者,所述系统包括可实现权利要求19-24任一项所述方法的第二接入网设备,以及可实现权利要求25-28任一项所述方法的第一接入网设备;或者,所述系统包括可实现权利要求29或30所述方法的第一接入网设备,以及可实现权利要求31或32所述方法的第二接入网设备。
PCT/CN2022/089642 2021-04-30 2022-04-27 通信方法及装置 WO2022228476A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP22794946.8A EP4322641A1 (en) 2021-04-30 2022-04-27 Communication method and device
JP2023566733A JP2024519477A (ja) 2021-04-30 2022-04-27 通信方法及び装置
BR112023022734A BR112023022734A2 (pt) 2021-04-30 2022-04-27 Método e aparelho de comunicação
KR1020237040655A KR20240004624A (ko) 2021-04-30 2022-04-27 통신 방법 및 장치
US18/496,149 US20240056950A1 (en) 2021-04-30 2023-10-27 Communication method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110481627.3 2021-04-30
CN202110481627.3A CN115278880A (zh) 2021-04-30 2021-04-30 通信方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/496,149 Continuation US20240056950A1 (en) 2021-04-30 2023-10-27 Communication method and apparatus

Publications (1)

Publication Number Publication Date
WO2022228476A1 true WO2022228476A1 (zh) 2022-11-03

Family

ID=83745886

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/089642 WO2022228476A1 (zh) 2021-04-30 2022-04-27 通信方法及装置

Country Status (7)

Country Link
US (1) US20240056950A1 (zh)
EP (1) EP4322641A1 (zh)
JP (1) JP2024519477A (zh)
KR (1) KR20240004624A (zh)
CN (1) CN115278880A (zh)
BR (1) BR112023022734A2 (zh)
WO (1) WO2022228476A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110831247A (zh) * 2018-08-10 2020-02-21 华为技术有限公司 一种通信方法及装置
US20200314913A1 (en) * 2019-03-28 2020-10-01 Nazanin Rastegardoost Selecting a Random Access Procedure Type in a Wireless System
WO2021056596A1 (zh) * 2019-09-29 2021-04-01 华为技术有限公司 一种寻呼方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110831247A (zh) * 2018-08-10 2020-02-21 华为技术有限公司 一种通信方法及装置
US20200314913A1 (en) * 2019-03-28 2020-10-01 Nazanin Rastegardoost Selecting a Random Access Procedure Type in a Wireless System
WO2021056596A1 (zh) * 2019-09-29 2021-04-01 华为技术有限公司 一种寻呼方法及装置

Also Published As

Publication number Publication date
JP2024519477A (ja) 2024-05-14
US20240056950A1 (en) 2024-02-15
EP4322641A1 (en) 2024-02-14
KR20240004624A (ko) 2024-01-11
CN115278880A (zh) 2022-11-01
BR112023022734A2 (pt) 2024-01-02

Similar Documents

Publication Publication Date Title
US11516704B2 (en) Information transmission method and apparatus
JP6945659B2 (ja) 情報処理方法および関連装置
WO2018082598A1 (zh) 一种寻呼方法、基站及终端
US11206529B2 (en) User apparatus for retaining context information
WO2019196811A1 (zh) 通信方法和相关装置
WO2018202165A1 (zh) 一种失败处理方法、切换方法及终端设备、网络设备
WO2017193766A1 (zh) 一种下行数据传输的方法及设备
WO2018202138A1 (zh) 通信方法及相关设备
WO2020164615A1 (zh) 一种通信方法及相关设备
WO2020135850A1 (zh) 通信方法和装置
US11419027B2 (en) User plane link establishment method, base station, and mobility management device
WO2021093438A1 (zh) 一种接入网络的方法及通信装置
WO2021238774A1 (zh) 通信方法及装置
WO2021196249A1 (zh) Rrc状态设置方法、装置、通信设备及存储介质
WO2019223702A1 (zh) 管理pdu会话的方法、装置和系统
WO2019056279A1 (zh) 连接管理方法、用户设备、核心网实体及系统
JP2019534636A (ja) セッション管理方法及びセッション管理ネットワーク要素
WO2019148396A1 (zh) 数据传输方法、切换方法及相关设备
WO2020024865A1 (zh) 一种会话对应关系的管理方法和终端设备
WO2018170746A1 (zh) 通信方法、辅网络节点和终端
WO2018170707A1 (zh) 控制面连接管理方法和装置
WO2018214762A1 (zh) 一种获取寻呼参数的方法及装置
WO2019090829A1 (zh) 控制数据复制的方法及相关设备
WO2021147044A1 (zh) 一种时间敏感网络时间同步方法及装置
WO2022228476A1 (zh) 通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22794946

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2023566733

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: MX/A/2023/012887

Country of ref document: MX

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112023022734

Country of ref document: BR

WWE Wipo information: entry into national phase

Ref document number: 2022794946

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022794946

Country of ref document: EP

Effective date: 20231108

ENP Entry into the national phase

Ref document number: 20237040655

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 112023022734

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20231030