WO2022252651A1 - 一种无线通信方法及装置 - Google Patents

一种无线通信方法及装置 Download PDF

Info

Publication number
WO2022252651A1
WO2022252651A1 PCT/CN2022/073127 CN2022073127W WO2022252651A1 WO 2022252651 A1 WO2022252651 A1 WO 2022252651A1 CN 2022073127 W CN2022073127 W CN 2022073127W WO 2022252651 A1 WO2022252651 A1 WO 2022252651A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
information
data flow
processing time
time
Prior art date
Application number
PCT/CN2022/073127
Other languages
English (en)
French (fr)
Inventor
李汉成
周汉
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022252651A1 publication Critical patent/WO2022252651A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints

Definitions

  • the present application relates to the technical field of wireless communication, and in particular to a wireless communication method and device.
  • the network exposure function (NEF) network element can obtain the time when the data flow arrives at the entrance network element of the 5GS, and can Determine the time when the 5GS egress network element sends the data stream according to the time when the data stream arrives at the ingress network element, and then configure the time when the egress network element sends the data stream to the egress network element, and the egress network element can send the data stream accordingly .
  • a 5GS network element may process multiple data streams, and a network element may conflict with the processing time of different data streams, but there is currently no solution that can detect such conflicts.
  • Embodiments of the present application provide a wireless communication method and device, which are used to provide a method for detecting whether time conflicts exist in multiple data streams.
  • an embodiment of the present application provides a wireless communication method, and the method may be executed by a fifth network element, or may be executed by a chip system, and the chip system may implement a function of the fifth network element.
  • the fifth network element is, for example, a network opening function network element, an application function network element, a user plane function network element, a session management function network element, a policy control function, a fourth network element, or a terminal device.
  • the fifth network element executes the method as an example for description below.
  • the method includes: determining forwarding information of the first data flow, the forwarding information including information of the first network element and/or information of the second network element used to forward the first data flow; if the first processing time is different from the second data flow If there is a conflict in the second processing time of the flow, then determine the processing time of the first data flow in the first network element and/or the processing time of the second network element, wherein the first processing time is the first network element
  • the second processing time is the time when the first network element processes the second data flow
  • the first processing time is the time when the second network element processes the first data flow
  • the second processing time is the time when the second network element processes the second data flow.
  • the fifth network element may determine information of the network element that forwards the first data flow, that is, forwarding information. After determining the forwarding information of the first data flow, according to the forwarding information of the first data flow, it is determined whether there is a conflict between the first processing time of the same network element for the first data flow and the processing time of the second data flow, providing A mechanism for detecting timing conflicts between multiple data streams.
  • the processing time of the first data flow in the first network element may be determined, and/or the processing time of the first data flow in the second network element may be determined time, which is equivalent to changing the processing time of the first network element and/or the first data flow, thereby reducing the situation that the same network element has conflicts in the processing time of multiple data flows, and provides a solution to multiple data flows A scheme in which the processing time of flows on the same network element conflicts.
  • due to the reduction of the conflict of the processing time of multiple data streams by the same network element it can reduce the failure of sending or receiving data streams or the incomplete sending or receiving of data streams caused by time conflicts of the same network element. , thus improving the possibility of the same network element successfully receiving and/or sending multiple data streams, improving the reliability of the same network element transmitting data streams, and correspondingly improving the reliability of the entire communication network where the network element is located sex.
  • the fifth network element may select 1.
  • the first network element or the second network element receives the forwarding information; in the second manner, the fifth network element can determine the forwarding information according to the relevant information of the first data flow, and the relevant information includes session information, the first network element one or more of the information of the second network element, the information of the second network element, and the flow information, the flow information is the information of the third network element or the identification of the first data flow, and the third network element is the first data flow The destination or source device of the stream.
  • the fifth network element can directly receive the forwarding information from other network elements, which relatively simplifies the process for the fifth network element to determine the forwarding information; in the second way of this embodiment, the first The five network elements can flexibly determine the forwarding information according to one or more items of related information of the first data flow, which enriches the ways of determining the forwarding information.
  • multiple ways of determining the forwarding information according to the specific information in the related information of the first data stream including: if the related information includes session information, determining the forwarding information corresponding to the session information information, session information such as session identification and/or session address, etc., for example, session information is associated with information of the first network element, and/or session information is associated with information of the second network element, then the fifth network element may determining the forwarding information corresponding to the session information; or, if the related information includes the information of the first network element, determining the forwarding information corresponding to the information of the first network element, for example, the fifth network element may send the first network element
  • the information of the network element is used as the forwarding information, or the information of the first network element is associated with the information of the second network element, so the fifth network element can determine the information of the second network element according to the information of the first network element, and the determined The information of the second network element is used as the forwarding information, or the fifth network element may use the information of the first
  • the meaning of the flow information can refer to the above, here No more details, for example, the flow information includes the identifier of the first data flow, and the identifier of the first data flow is associated with the forwarding information, so after the fifth network element obtains the identifier of the first data flow, it can determine that the first data flow Flow ID corresponds to forwarding information.
  • the fifth network element may determine the forwarding information according to any one or multiple pieces of information in the relevant information, which enriches the ways of determining the forwarding information and improves the flexibility of determining the forwarding information.
  • determining the forwarding information corresponding to the flow information includes: determining the forwarding information corresponding to the flow information according to the correspondence between the flow information and the forwarding information, and the relationship between the flow information and the forwarding information
  • the address learning information, the address learning information for example, the correspondence between the address of the third network element and the forwarding information, for example, the fifth network element pre-stores the address learning information, and the fifth network element determines the first After the address of the destination device of a data flow is obtained, the forwarding information corresponding to the address of the destination device can be determined from the address learning information.
  • the fifth network element can predetermine or receive the correspondence between flow information and forwarding information from other network elements, so that the corresponding forwarding information can be determined directly based on the flow information, and the logic for determining the forwarding information is relatively simple. Simple.
  • a manner of determining the correspondence between the flow information and the forwarding information is provided.
  • the correspondence between the flow information and the forwarding information may be received from a user plane functional network element.
  • the fifth network element may directly receive the correspondence between the flow information and the forwarding information from the user plane functional network element, which simplifies the process for the fifth network element to obtain the correspondence.
  • the first method is to receive the information of the third network element from the application function network element, for example, the fifth network element is a network opening function network element, then the network opening function network element can receive the information of the third network element from the application function network element;
  • the second type receive the information of the third network element from the network opening function network element, for example, the fifth network element is the user plane function network element, then the user plane function network element can receive the information of the third network element from the network opening function network element.
  • the fifth network element can receive the information of the third network element from the application function network element or the network opening function network element, providing multiple sources for the fifth network element to receive the information of the third network element, so that the fifth network element
  • the fifth network element can receive the information of the third network element more flexibly, which reduces the difficulty for the fifth network element to receive the information of the third network element, and correspondingly reduces the determination of the fifth network element based on the information of the third network element. Difficulty in forwarding information.
  • the flow information includes the information of the third network element, then the forwarding information corresponding to the information of the third network element may be determined according to the first topology information, and the first topology information includes the information of the first network element.
  • the connection information between an element and at least one network element, and/or the connection information between a second network element and at least one network element, and the at least one network element includes at least a third network element.
  • the fifth network element may determine the information of the third network element of the first data flow, and may, according to the topological relationship between the first network element and/or the second network element and the third network element, thereby To determine the first network element and/or the second network element that has a connection relationship with the third network element, since the third network element corresponding to each data flow may be different, and the topology relationship may cover multiple network elements, so using
  • the manner in this embodiment can be applied to determine the forwarding information of each data flow, so that the manner of determining the forwarding information in this embodiment has a relatively wide application range.
  • the topological relationship may also include the port connection relationship between network elements, so the port information of the first network element and/or the second network element can be more determined by using this method in this embodiment , so that the fifth network element can specifically detect whether there is a conflict in the processing time of the multiple data flows at the ports of the first network element and/or the second network element.
  • a method for obtaining first topology information is provided.
  • second topology information may be received from an application function network element, and the second topology information is a network element between at least one network element.
  • the connection information, according to the second topology information and the third topology information, so as to determine the first topology information, the third topology information includes the connection information between the first network element and the adjacent network elements of the first network element, and/or Connection information between the second network element and an adjacent network element of the second network element, where the adjacent network element belongs to the at least one network element.
  • the fifth network element can directly receive the second topology information from the application function network element, so that the fifth network element does not need to maintain the second topology information, and the processing amount of the fifth network element can be reduced.
  • part of the flow information of the first data stream may be determined, for example, the identifier of the first data stream and/or the purpose of the first data stream Device information, etc., so that it is convenient to forward the data flow according to the identifier of the first data flow and/or the information of the destination device.
  • the identifier of the first data flow and the first One or two of the information on the destination device of the data flow, or assign an identifier to the first data flow in this case, the information on the destination device of the first data flow can be obtained from the network element with the network opening function, or Information about the destination device may not be required.
  • the fifth network element can receive the identifier of the first data flow and/or the information of the destination device from the network element with the network opening function, without the fifth network element needing to assign an identifier to the first data flow, reducing the number of fifth network elements processing.
  • the fifth network element may directly assign an identifier to the first data flow, so that when the fifth network element cannot obtain the identifier of the first data flow from other network elements, a method of determining the identifier of the first data flow is provided.
  • the network element with the network opening function does not need to transmit the identifier of the first data flow to the fifth network element, the amount of data transmission between the fifth network element and the network element with the network opening function is reduced.
  • a method for determining the first processing time is provided.
  • the time when the first data stream arrives at the first network element can be received, and according to the time, the first network element and the second network element
  • the delay between the two network elements determines the first processing time; or, the time when the first data stream arrives at the second network element can be received, and according to this time, and the delay between the first network element and the second network element , to determine the first processing time.
  • the fifth network element may calculate the first processing time according to the time when the first data flow arrives at the first network element or the second network element, and the time delay between the first network element and the second network element. time, so that even if the fifth network element cannot directly obtain the first processing time, the first processing time can be calculated based on the method in this embodiment, which enriches the way for the fifth network element to determine the first processing time.
  • the processing time of the first data flow at the first network element and/or the processing time of the second network element may be determined, and There are many ways to determine the processing time of the first data flow in the first network element and/or the second network element, for example, the fifth network element can adjust the time when the first data flow reaches the first network element or the second network element , or the time delay between the first network element and the second network element can be adjusted, or the time when the first data flow arrives at the first network element or the second network element can be adjusted, and the time delay can be adjusted.
  • the time when the first data flow arrives at the first network element or the second network element and/or the time between the first network element and the second network element is adjusted, which is equivalent to directly or indirectly changing the first processing time, thus reducing the possibility that the first network element and/or the second network element have conflicts in the processing time of multiple data streams, Therefore, the success rate of data stream transmission by the first network element and/or the second network element is improved.
  • the processing time of the first data flow in the first network element is determined, the processing time of the first data flow in the first network element is allocated to the first network element, and/or, If the processing time of the first data flow in the second network element is determined, the processing time of the first data flow in the second network element can be configured to the second network element, and/or, the first data flow can be configured in the first network element
  • the processing time of the network element and/or the processing time of the second network element are allocated to the network element with the network opening function.
  • the processing time of the first data flow in the corresponding network element can be configured to the corresponding network element, so that the corresponding network element can determine the Processing time of the first data flow, since the determined processing time relatively reduces the time conflict problem of the corresponding network element for multiple data flows, so the corresponding network element transmits the first data flow according to the determined processing time higher success rate.
  • the processing time of the first data flow in the first network element and/or the second network element can also be allocated to the network opening function network element, so that the network opening function network element can process the first data flow between the first network element and the second network element according to the first data flow.
  • the processing time of the second network element predict the processing time of other network elements before the first network element and the second network element to process the first data flow, and detect the next data flow and other data flows for the network opening function network element Provide a time basis for whether there is a conflict in the time.
  • the fifth network element may configure the determined processing time of the first data flow in the first network element and/or the second network element to the session management function network element, so that the session management function
  • the network element may determine the time when the first data flow arrives at the network element of the access network according to the processing time of the first data flow in the first network element and/or the second network element, so that the network element of the access network may The time at which the first data flow arrives at the network element of the access network is determined by the element, and the first data flow is scheduled.
  • the problem of time conflicts of multiple data flows in the first network element and/or the second network element can be reduced, correspondingly
  • the time when the first data flow arrives at the network element of the access network determined by the session management function network element based on the processing time of the first data flow in the first network element and/or the second network element may also be determined to a certain extent
  • the time conflict of multiple data streams in the network elements of the access network is reduced, the success rate of scheduling data streams by the network elements of the access network is improved, and the reliability of data stream scheduling by the network elements of the access network is improved.
  • the embodiment of the present application provides a wireless communication method, which can be executed by a user plane functional network element, or a chip system, and the chip system can realize the functions of the user plane functional network element, and the following uses the user plane functional network element
  • the method includes: receiving flow information of a first data flow, where the flow information is information of a third network element and/or an identifier of the first data flow, and the third network element is The destination device or source device of the first data flow; determine the forwarding information corresponding to the flow information, where the forwarding information includes information of the first network element and/or the second network element used to forward the first data flow Meta information; send the forwarded information.
  • the user plane functional network element since the user plane functional network element is responsible for the routing and forwarding functions of the user plane data packet, the user plane functional network element can directly learn the path of the data stream transmitted by the third network element.
  • the information of the third network element corresponds to the information of the first network element and/or the information of the second network element. In this way, there is no need to expand the functions of the user plane functional network element, and the user plane functional network element receives the third network element After receiving the information of the third network element, the forwarding information can be quickly determined, so that the user plane functional network element does not need to forward the information of the first network element and/or the information of the second network element corresponding to the information of the third network element to other network elements , relatively reducing data interaction.
  • a manner of receiving the flow information of the first data flow is provided, that is, the flow information of the first data flow may be received from a network capability opening network element or a fourth network element.
  • the flow information can be obtained from the application function network element or the fourth network element, or the network capability opening network element or the fourth network element can automatically Create flow information, that is, the network capability opening network element or the fourth network element has multiple ways to determine the flow information, so that the user plane functional network element successfully obtains the flow information from the network capability opening network element or the fourth network element More likely.
  • a manner of sending the forwarding information is provided, that is, the forwarding information may be sent to a network capability opening network element or a fourth network element.
  • the network capability opening network element or the fourth network element may receive the forwarding information, so as to determine whether there is a conflict between the first processing time of the first data flow and the second processing time of the second data flow, and the first processing
  • the meaning of the time and the second processing time can be referred to above, and will not be repeated here, without the need for the network capability opening network element to determine the forwarding information, simplifying the processing of the network capability opening network element.
  • the embodiment of the present application provides a wireless communication method, which can be executed by an application function network element, or by a chip system, and the chip system can realize the function of the application function network element, and the method includes: receiving a first Information about a third network element of the data flow, where the third network element is the destination device or source device of the first data flow; from the first topology information, determine the first Data flow forwarding information, wherein the first topology information includes connection information between the first network element and at least one network element, and/or includes connection information between the second network element and at least one network element, and the at least A network element includes the third network element, the forwarding information includes information of the first network element and/or information of the second network element used to forward the first data stream; and sending the forwarding information.
  • the forwarding information is determined by the application function network element based on the topology relationship between the first network element and/or the second network element and the third network element, because the application function network element usually maintains the topology Therefore, it is not necessary to expand the functions of the application function network element too much by using the application function network element to determine the forwarding information.
  • the application function network element may send it to the network capability opening network element or other network elements, so that the network capability opening network element or other network elements can detect the first processing time and the first processing time of the first data flow according to the forwarding information. Whether there is a conflict in the second processing time of the second data stream.
  • the method further includes: receiving third topology information, where the third topology information includes connection information between the first network element and an adjacent network element of the first network element, and /or connection information between the second network element and an adjacent network element of the second network element, where the adjacent network element belongs to the at least one network element; determining the first topology according to the second topology information and the third topology information information, wherein the second topology information includes connection information between the at least one network element.
  • the application function network element can obtain part of the topology information in the above-mentioned first topology information from the network capability exposure network element, that is, the third topology information, so that the application function network element itself does not need to maintain a large amount of topology information, simplifying the application Processing of functional network elements.
  • the embodiment of the present application provides a communication device, which may be the fifth network element in the above first aspect, or an electronic device (for example, a chip system) configured in the fifth network element, or is a larger device including the fifth network element.
  • the fifth network element includes corresponding means or modules for implementing the foregoing first aspect or any optional implementation manner.
  • the communication device includes a processing unit (also called a processing module at times), and optionally, a transceiver unit (also called a transceiver module at times).
  • the processing unit is configured to determine forwarding information of the first data flow, where the forwarding information includes information about a first network element and/or information about a second network element used to forward the first data flow; the processing unit is also configured to If there is a conflict between the first processing time and the second processing time of the second data flow, determining the processing time of the first data flow in the first network element and/or the processing time of the second network element, wherein, The first processing time is the time when the first network element processes the first data flow, and the second processing time is the time when the first network element processes the second data flow, or the first processing time is the second processing time The time when the second network element processes the first data flow, the second processing time is the time when the second network element processes the second data flow.
  • the communication device includes a storage unit, and the processing unit can be coupled to the storage unit, and executes programs or instructions in the storage unit, enabling the communication device to perform the function of the first network element.
  • the communication device includes: a processor, coupled to a memory, configured to execute instructions in the memory, so as to implement the method performed by the fifth network element in the above first aspect or in various implementation manners .
  • the communication device further includes other components, for example, an antenna, an input and output module, an interface, and the like. These components can be hardware, software, or a combination of software and hardware.
  • the embodiment of the present application provides a communication device, which may be the user plane functional network element in the above second aspect, or an electronic device (for example, a chip system) configured in the user plane functional network element , or a larger device including the user plane functional network element.
  • the user plane functional network element includes corresponding means or modules for implementing the above second aspect or any optional implementation manner.
  • the communication device includes a transceiver unit (sometimes also called a transceiver module) and a processing unit (sometimes also called a processing module).
  • the transceiver unit is configured to receive flow information of the first data flow, where the flow information is information of a third network element and/or an identifier of the first data flow, and the third network element is the first data flow The destination device or the source device of the flow; the processing unit is configured to determine the forwarding information corresponding to the flow information according to the correspondence between the flow information and the forwarding information, wherein the forwarding information includes information for forwarding the first The information of the first network element and/or the information of the second network element of a data flow; the transceiver unit is also used to send the forwarding information.
  • the communication device includes a storage unit, and the processing unit can be coupled with the storage unit, and executes programs or instructions in the storage unit, enabling the communication device to perform the functions of the above-mentioned user plane function network element .
  • the communication device includes: a processor, coupled to a memory, configured to execute instructions in the memory, so as to realize the user plane function executed by the network element in the second aspect or various implementation manners.
  • the communication device further includes other components, for example, an antenna, an input and output module, an interface, and the like. These components can be hardware, software, or a combination of software and hardware.
  • the embodiment of the present application provides a communication device, which may be the application function network element in the above third aspect, or an electronic device (for example, a chip system) configured in the application function network element, or It is a larger device including network elements of the application function.
  • the application function network element includes corresponding means or modules for implementing the above third aspect or any optional implementation manner.
  • the communication device includes a transceiver unit (sometimes also called a transceiver module) and a processing unit (sometimes also called a processing module).
  • the transceiver unit is configured to receive information of a third network element of the first data stream, wherein the third network element is the destination device or source device of the first data stream;
  • the processing unit is configured to receive from In the first topology information, determining forwarding information of the first data flow corresponding to the information of the third network element, where the first topology information includes connection information between the first network element and at least one network element, and/or include connection information between the second network element and at least one network element, the at least one network element includes the third network element, and the forwarding information includes the first The information of the network element and/or the information of the second network element; the transceiving unit is further configured to send the forwarding information.
  • the communication device includes a storage unit, and the processing unit can be coupled to the storage unit, and executes programs or instructions in the storage unit, enabling the communication device to perform the functions of the above-mentioned application function network element.
  • the communication device includes: a processor, coupled to the memory, configured to execute instructions in the memory, so as to implement the above third aspect or the application function executed by the network element in various implementation manners.
  • the communication device further includes other components, for example, an antenna, an input and output module, an interface, and the like. These components can be hardware, software, or a combination of software and hardware.
  • the embodiment of the present application provides a chip system, where the chip system includes: a processor and an interface.
  • the processor is used to call and execute instructions from the interface, and when the processor executes the instructions, the method described in the first aspect, the second aspect or the third aspect is implemented.
  • a computer-readable storage medium which is used to store a computer program or an instruction, and when it is executed, the method described in the first aspect, the second aspect or the third aspect above be realized.
  • a ninth aspect provides a computer program product containing instructions, which, when run on a computer, enable the method described in the first aspect, the second aspect or the third aspect to be implemented.
  • FIG. 1A is a schematic diagram of a network architecture of 5GS
  • Figure 1B is a schematic diagram of a network architecture based on 5GS to achieve deterministic transmission
  • Fig. 2A is an example diagram of 5GS normal transmission
  • Figure 2B is an example diagram of 5GS abnormal transmission
  • FIG. 3 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • FIG. 4 is a flowchart of a wireless communication method provided in an embodiment of the present application.
  • FIG. 5 is an example diagram of a first topology information provided by an embodiment of the present application.
  • FIG. 6 is a flowchart of an example of a wireless communication method provided by an embodiment of the present application.
  • FIG. 7 is a flow chart of another example of a wireless communication method provided in an embodiment of the present application.
  • FIG. 8 is a flow chart of another example of a wireless communication method provided by an embodiment of the present application.
  • FIG. 9 is a flow chart of another example of a wireless communication method provided by an embodiment of the present application.
  • FIG. 10 is a flow chart of another example of a wireless communication method provided by an embodiment of the present application.
  • FIG. 11 is a flow chart of another example of a wireless communication method provided by an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a communication device provided in an embodiment of the present application.
  • FIG. 13 is another schematic structural diagram of a communication device provided in an embodiment of the present application.
  • the network element in the embodiment of the present application may be a single physical device, for example, it may be a single device or node, or it may be an apparatus integrating multiple devices or nodes.
  • the network element shown in the embodiment of the present application can also be a logical concept, such as a software module, or a network function corresponding to the service provided by each network element.
  • the network function can be understood as a virtualization function implemented under virtualization, or It can be understood as the network function that provides services under the service network, for example, the user plane function (UPF) that is mainly responsible for the routing and forwarding of 5G core network user plane data packets, or the session dedicated to managing sessions Management (Session Management function, SMF), which is not specifically limited in this embodiment of the present application.
  • UPF user plane function
  • SMF Session Management function
  • the terminal equipment in the embodiment of the present application may be called user equipment (UE), terminal, access station, UE station, remote station, wireless communication equipment, or user device, etc., and the terminal equipment is a kind of
  • a device with a wireless transceiver function may be a fixed device, a mobile device, a handheld device, a wearable device, a vehicle-mounted device, or a wireless device (such as a communication module or a chip system, etc.) built into the above-mentioned devices.
  • Terminal devices are used to connect people, objects, machines, etc., and can be widely used in various scenarios, including but not limited to the following scenarios: cellular communication, device-to-device communication (device-to-device, D2D), vehicle-to-everything (vehicle to everything, V2X), machine-to-machine/machine-type communications (M2M/MTC), Internet of Things (IoT), virtual reality (VR), augmented Augmented reality (AR), industrial control, self driving, remote medical, smart grid, smart furniture, smart office, smart wear, smart transportation, intelligence Terminal equipment for smart cities, drones, robots and other scenarios.
  • cellular communication device-to-device communication
  • vehicle-to-everything vehicle to everything
  • V2X machine-to-machine/machine-type communications
  • IoT Internet of Things
  • VR virtual reality
  • AR augmented Augmented reality
  • industrial control self driving, remote medical, smart grid, smart furniture, smart office, smart wear, smart transportation, intelligence Terminal equipment for smart cities, drones,
  • Terminals can be mobile phones, tablet computers, computers with wireless transceiver functions, wearable devices, vehicles, drones, helicopters, airplanes, ships, robots, robotic arms, smart home devices, etc.
  • the embodiment of the present application does not limit the specific technology and specific device form adopted by the terminal device.
  • the terminal device is taken as an example for description.
  • the network device in the embodiment of the present application includes, for example, an access network device (or called an access network element), and/or a core network device (or called a core network element).
  • an access network device or called an access network element
  • a core network device or called a core network element
  • the access network device is a device with a wireless transceiver function, and is used for communicating with the terminal device.
  • the access network (Radio Access Network, (R)AN) equipment includes but is not limited to the base station (BTS, Node B, eNodeB/eNB, or gNodeB/gNB) in the above-mentioned communication system, the transceiver point (t(R)ANsmission Reception point, TRP), the base station of the third generation partnership project (3rd generation partnership project, 3GPP) subsequent evolution, the access node in the wireless fidelity (Wireless Fidelity, WiFi) system, the wireless relay node, the wireless backhaul node Wait.
  • the base station BTS, Node B, eNodeB/eNB, or gNodeB/gNB
  • TRP transceiver point
  • 3rd generation partnership project 3rd generation partnership project
  • the base station may be: a macro base station, a micro base station, a pico base station, a small station, a relay station, and the like. Multiple base stations may support the aforementioned networks of the same access technology, or may support the aforementioned networks of different access technologies.
  • a base station may contain one or more co-sited or non-co-sited transmission and reception points.
  • the network device may also be a wireless controller, a centralized unit (centralized unit, CU), and/or a distributed unit (distributed unit, DU) in a cloud radio access network (cloud radio access network, C(R)AN) scenario.
  • the network device can also be a server, a wearable device, or a vehicle-mounted device, etc.
  • a network device in a vehicle to everything (V2X) technology may be a road side unit (RSU).
  • the base station is used as an example for the access network device to be described.
  • the multiple network devices in the communication system may be base stations of the same type, or base stations of different types.
  • the base station can communicate with the terminal equipment, and can also communicate with the terminal equipment through the relay station.
  • a terminal device can communicate with multiple base stations in different access technologies.
  • the core network equipment is used to implement at least one of functions such as mobility management, data processing, session management, policy and charging.
  • functions such as mobility management, data processing, session management, policy and charging.
  • the names of devices implementing core network functions in systems with different access technologies may be different, which is not limited in this embodiment of the present application.
  • the core network equipment includes: access and mobility management function (access and mobility management function, AMF), SMF, or user plane function (user plane function, UPF), etc.
  • the device for realizing the function of the network device may be a network device, or a device capable of supporting the network device to realize the function, such as a chip system, and the device may be installed in the network device.
  • the technical solution provided by the embodiment of the present application the technical solution provided by the embodiment of the present application is described by taking the network device as an example for realizing the function of the network device.
  • the number of nouns means “singular noun or plural noun", that is, “one or more”. "At least one” means one or more, and “plurality” means two or more. "And/or” describes the association relationship of associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean: A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural. The character “/" generally indicates that the contextual objects are an "or” relationship. For example, A/B means: A or B. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items.
  • At least one item (piece) of a, b, or c means: a, b, c, a and b, a and c, b and c, or a and b and c, where a, b, c Can be single or multiple.
  • the 3GPP standard organization has formulated the next generation mobile communication network architecture (next generation system), which is called 5G network architecture.
  • the 5G network architecture supports wireless technologies defined by the 3GPP standard organization (such as long term evolution (LTE) or 5G
  • LTE long term evolution
  • Figure 1A is a schematic diagram of a network architecture of 5GS.
  • the 5G network architecture shown in Figure 1A includes terminal equipment, access network and core network, and terminal equipment accesses the core network through the access network. The three parts are briefly introduced respectively.
  • the access network includes network elements of the access network.
  • the access network includes network elements of the access network.
  • the core network includes each core network element and a data network (data network, DN), and the core network element includes a user plane network element and a control plane network element.
  • the user plane network element includes a user plane function (UPF) network element, and the UPF is mainly responsible for packet forwarding, quality of service (QoS) control, and billing information statistics.
  • the network element function of the control plane is mainly responsible for service process interaction, sending data packet forwarding policies, QoS control policies, etc. to the network elements of the user plane.
  • the network elements that may be included in the network elements of the control plane are introduced below.
  • Access and mobility management function (access and mobility management function, AMF) network element is mainly responsible for the access management function.
  • the SMF network element which may also be referred to as SMF for short, is used to manage user protocol data units (protocol data unit, PDU), session creation and deletion, etc., maintain the PDU session context, and forward user plane network element information.
  • PDU protocol data unit
  • session creation and deletion etc.
  • PCF policy control function
  • the application function (application function, AF) network element which can also be referred to as AF for short, is a functional network element used to provide various business services, can interact with the core network through the NEF network element, and can interact with the policy management framework for policy management. It should be noted that, in practical applications, AF can be divided into two types, one type belongs to core network elements, and the other type belongs to third-party application servers.
  • the NEF network element also referred to as NEF for short, is used to provide frameworks, authentication and interfaces related to network capability opening, and to transfer information between 5G system network functions and other network functions.
  • a DN can provide corresponding services for terminal equipment, for example, provide data and/or voice services.
  • a DN includes multiple forwarding nodes and terminal devices connected to the corresponding forwarding nodes.
  • the terminal devices connected to the forwarding nodes are TSN terminals, etc., or for example, the DN is a private network of a smart factory. It can be a terminal, and a control server of a sensor is deployed in the DN, and the control server can provide services for the sensor.
  • the sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
  • DN is a company's internal office network.
  • the mobile phone or computer of the company's employees can be a terminal, and the employee's mobile phone or computer can access information and data resources on the company's internal office network.
  • Nnssf, Nnef, Nnrf, Npcf, Nudm, Naf, Nausf, Namf, and Nsmf in Figure 1A are the network slice selection function (network slice selection function, NSSF), NEF, and network function storage function (NF repository function, NRF) respectively.
  • PCF network slice selection function
  • unified data management unified data management, UDM
  • AF authentication server function
  • AUSF authentication server function
  • AMF service interface provided by SMF, used to call the corresponding service operation.
  • SMF service interface provided by SMF
  • the interface between the UE and the control plane of the core network is N1, the interface between the UE and the control plane of the core network.
  • the communication interface between the network element of the access network and the control plane of the core network is N2, the communication interface between the network element of the access network and the control plane of the core network.
  • the communication interface between the network element of the access network and the UPF, used to transmit user data is N3, the communication interface between the network element of the access network and the UPF, used to transmit user data.
  • the communication interface between the SMF and the UPF used for policy configuration on the UPF, etc.
  • FIG. 1B is a schematic diagram of a network architecture for deterministic transmission based on 5GS.
  • 5GS is connected to the TSN system, or it can be understood as 5GS in the TSN system.
  • the network architecture includes UPF, RAN and UE, and also includes device side TSN translator (device side TSN translator, DS-TT) and Network side TSN translator (network side TSN translator, NW-TT).
  • the mechanism of data stream transmission based on 5GS is: the data stream arrives at the ingress port of 5GS, and after being processed internally by 5GS, it is sent out from the egress port of 5GS.
  • the ingress port and the egress port may be network elements in the 5GS, for example, the ingress port is the ingress network element in the 5GS, and the egress port is the egress network element in the 5GS.
  • the ingress port of the 5GS is DS-TT; if DS-TT is integrated in the UE, the ingress port of the 5GS is UE; if NW-TT and UPF are deployed independently , the outgoing port of the 5GS is NW-TT; if NW-TT is integrated in UPF, the outgoing port of the 5GS is UPF.
  • the ingress port of the 5GS is NW-TT; if NW-TT is integrated in UPF, the ingress port of the 5GS is UPF; if DS-TT is independent of UE If deployed, the outgoing port of the 5GS is DS-TT; if DS-TT is integrated in the UE, the outgoing port of the 5GS is the UE.
  • the ingress port and egress port of the 5GS can be the corresponding UEs, for example, UE1 and UE2 communicate, the ingress port is UE1, and the egress port is UE2; If in UE-to-UE communication, and DS-TT and UE are deployed independently, the ingress port and egress port of the 5GS can be the corresponding DS-TT, for example, UE1 and UE2 communicate, and the ingress port is the DS corresponding to UE1 -TT1, the outbound port is DS-TT2 corresponding to UE2.
  • the transmission path in UE-to-UE communication is, for example: UE1 (DS-TT1)-RAN-UPF-UE2 (DS-TT2).
  • the ingress port and the egress port may also be ports (ports) of a network element in 5GS, for example, the ingress port is a port of an ingress network element in 5GS, and the egress port is a port of an egress network element in 5GS.
  • the ingress port of the 5GS is the port of DS-TT; if DS-TT is integrated in the UE, the ingress port of the 5GS is the port of the UE; if NW-TT If deployed independently with UPF, the outbound port of the 5GS is the port of NW-TT; if NW-TT is integrated in UPF, the outbound port of the 5GS is the port of UPF.
  • the inbound port of the 5GS is the port of the NW-TT; if the NW-TT is integrated in the UPF, the inbound port of the 5GS is the port of the UPF; if the DS- If TT and UE are deployed independently, the outgoing port of the 5GS is the port of DS-TT; if DS-TT is integrated in the UE, the outgoing port of the 5GS is the port of the UE.
  • the ingress port and egress port of the 5GS can be the ports of the corresponding UE; if in UE-to-UE communication, DS-TT and UE Independently deployed, the ingress port and egress port of the 5GS can be the corresponding DS-TT ports respectively.
  • DS-TT and NW-TT are the logical functions of the 5GS user plane, and DS-TT can also be called the TSN converter on the UE side, which is used to connect the TSN system on the terminal side when the 5GS user plane is connected to TSN. ; NW-TT can also be called a TSN converter on the UPF side, which is used to connect to the TSN system on the network side.
  • the TSN converter refers to converting and adapting the characteristics and information of 5GS into information required by TSN and providing it to the TSN system, or converting the information required by the TSN system into characteristics or information specific to 5GS and providing it to 5GS.
  • DS-TT and UE can be deployed independently, or DS-TT can also be integrated in UE.
  • NW-TT and UPF can be deployed independently, or NW-TT can also be integrated in UPF.
  • the embodiments of the present application are introduced by taking DS-TT integrated in UE and NW-TT integrated in UPF as examples.
  • the 5GS delay includes the delay between when the data packet arrives at the inbound port of the 5GS and when the data packet is sent out from the outbound port of the 5GS.
  • 5GS delay can also be called 5GS internal processing time or 5GS internal processing delay.
  • the 5GS latency can include the dwell time on the UE side (that is, the processing time of the data flow at the UE and the processing time of the TSN converter on the UE side), and it can also include the dwell time on the UPF side (that is, the processing time of the data flow at the UPF) and the processing time of the TSN converter on the UPF side), and including the transmission delay between the UE and the UPF, the transmission delay between the UE and the UPF is the packet delay budget value of the data flow between the UE and the UPF ( packet delay budget, PDB).
  • deterministic transmission based on 5GS can also have other network architectures.
  • the 5GS user plane can also independently provide deterministic transmission capabilities (that is, 5GS is not in the TSN).
  • the user plane can There is no DS-TT and/or NW-TT, which is not limited in this embodiment of the present application.
  • the AF can send the time when the data flow reaches the UE and/or UPF and the 5GS delay (5GS bridge delay, or can be called 5GS delay) to the NEF.
  • 5GS delay 5GS bridge delay, or can be called 5GS delay
  • NEF or other network elements other than NEF and AF receive data streams from AF to UE and/or UPF and after 5GS delay
  • the time when other network elements can directly receive data streams from AF to UE and/or UPF and 5GS delay you can also receive the time when the data stream arrives at the UE and/or UPF from the NEF and the 5GS delay
  • the NEF or other network elements can calculate the processing time of the data stream at the UE and/or UPF.
  • NEF uses NEF It is described as an example, similarly, the process of processing by other network elements can be understood.
  • the processing time of the data stream in the UE can be understood as the receiving time window of the UE, or the time to start receiving the data stream; if the UE is sending the data stream, then the processing time of the data stream in the UE Time can be understood as the sending time window of the UE, or the time when the data stream starts to be sent; if the UPF is receiving the data stream, then the processing time of the data stream in the UPF can be understood as the receiving time window of the UPF, or the time when the data stream is started to be received ; If the UPF is sending the data flow, then the processing time of the data flow in the UPF can be understood as the sending time window of the UPF, or the time when the data flow starts to be sent.
  • the receiving time window of a certain network element refers to the corresponding time period from the beginning of receiving data flow to the completion of receiving data flow of a certain network element; The time period corresponding to the end of the data flow.
  • the receiving time window and the sending time window can be expressed in many specific ways.
  • the receiving time window and the sending time window are both represented by two moments, and the receiving time window is the start time of receiving the data stream and the end of receiving the data stream.
  • the end time of , the sending time window is represented by the start time of sending data stream and the end time of sending data stream, or receiving time window or sending time window can also be expressed in other forms, such as receiving time window to start receiving data stream
  • the start time of the data stream and the data volume of the data stream are represented, and the sending time window is represented by the start time of sending the data stream and the data volume of the data stream.
  • the embodiment of the present application does not limit the specific expression form of the time window.
  • the NEF can calculate the sending time window of the uplink data flow in the UPF according to the time when the uplink data flow arrives at the UE and the 5GS delay. After receiving the uplink data flow, the UE sends the uplink data flow to the UPF, and the UPF sends the uplink data flow to the outside according to the calculated sending time window of the uplink data flow.
  • the NEF can calculate the sending time window of the downlink data flow in the UE according to the time when the data flow arrives at the UPF and the 5GS delay.
  • the UPF sends the uplink data flow to the UE, and the UE sends the downlink data flow to the outside according to the calculated sending time window of the downlink data flow.
  • the network element can normally receive the multiple data streams.
  • the network element can normally send the multiple data streams only when the network element's sending time windows for the multiple data streams do not conflict.
  • FIG. 2A which is an example of normal 5GS transmission.
  • Figure 2A includes three data streams, represented by f1, f2 and f3 respectively, these three data streams are sent by UPF, and the sending time of the UPF does not conflict, so the UPF can follow the respective sending time of these three data streams, Send the corresponding data stream respectively.
  • FIG. 2B is an example of abnormal 5GS transmission.
  • Figure 2B includes three data streams, respectively denoted by f4, f5 and f6, the three data streams arrive at the UE in 5GS at the same time, and the 5GS time delays corresponding to the three data streams are also the same, at this time, The processing time of the three data streams conflicts with the UPF, causing the UPF to fail to transmit the three data streams correctly.
  • the embodiment of the present application provides a technical solution.
  • this technical solution by determining the forwarding information of the data flow, it can be determined whether there is a conflict in the processing time of the same network element for multiple data flows, and a conflict detection solution is provided. If it is determined that there is a conflict in the processing time of the same network element for multiple data streams, the processing time of the network element and/or other network elements for the data streams can be determined accordingly, thereby reducing the number of data streams in the same network element. Time Conflict. It can be seen that the conflict detection scheme provided by the embodiment of the present application can effectively detect time conflicts when network elements process data streams, thereby reducing the probability of conflicts and improving the transmission quality and efficiency of data streams.
  • the technical solutions provided by the embodiments of this application can be applied to 5G systems, such as the network architecture shown in Figure 1A or Figure 1B, or can also be applied to the next generation mobile communication system or other similar communication systems, or can also be applied to the following Figure 3 shows the network architecture.
  • the application scenarios shown in Figure 3 include network elements such as AF, NEF, PCF, SMF, AMF, UPF, Crtl, RAN, UE, and DS-TT.
  • the fourth network element may be a control plane network element, and the fourth network element may communicate with the AF, NEF, PCF, and SMF respectively.
  • the fourth network element may determine the forwarding information of the first data flow, so as to determine whether there is a conflict in the processing time of the same network element for multiple data flows according to the forwarding information, and determine whether the same network element has multiple data flows.
  • the wireless communication method in the embodiment of the present application does not need to add new functions to the existing network elements of 5GS, and can relatively reduce the difficulty of deploying the core network.
  • the wireless communication method in the embodiment of the present application may also be implemented by existing network elements in the 5GS, which is not limited in the embodiment of the present application.
  • the fourth network element in this embodiment of the present application may be a network element having the function of Ctrl shown in FIG. 3 .
  • the fourth network element is used as an example of Ctrl, that is to say, the Ctrl that appears later in the embodiment of the present application can be replaced by the fourth network element.
  • the fourth network element may still be called Ctrl, or may have other names, or the function of the fourth network element may also be integrated into other network elements or split into multiple network elements.
  • this embodiment of the present application does not limit.
  • the user plane functional network element in the embodiment of the present application may be a network element having the function of the UPF shown in FIG. 1A, FIG. 1B or FIG. 3, and a TSN converter may be integrated in the user plane functional network element , or the TSN converter may also be deployed independently of the user plane functional network element.
  • this embodiment of the present application takes the TSN converter integrated in the user plane functional network element as an example for illustration.
  • the user plane functional network element is UPF as an example, that is to say, the UPF appearing in the subsequent embodiments of the present application can be replaced by the user plane functional network element.
  • the user plane functional network element can still be called UPF, or it can have other names, or the function of the user plane functional network element may also be integrated into other network elements or split To multiple network elements, this embodiment of the present application is not limited.
  • the access and mobility management network element in the embodiment of the present application may be a network element having the function of the AMF shown in FIG. 1A , FIG. 1B or FIG. 3 .
  • the access and mobility management network element is taken as an example of AMF, that is to say, the AMF appearing later in the embodiment of the present application can be replaced with the access and mobility management network.
  • the access and mobility management network element may still be called AMF, or may have other names, or the functions of the access and mobility management network may also be integrated into other network elements.
  • the embodiment of the present application does not limit it to one network element or split it into multiple network elements.
  • the session management network element in the embodiment of the present application may be a network element having the function of the SMF shown in FIG. 1A , FIG. 1B or FIG. 3 .
  • the session management network element is referred to as an SMF as an example. That is to say, the SMF appearing later in the embodiment of the present application can be replaced with a session management network element.
  • the session management network element may still be called SMF, or may have other names, or the function of the access and mobility management network may also be integrated into other network elements or disassembled.
  • the division into multiple network elements is not limited in the embodiments of the present application.
  • the policy control network element in this embodiment of the present application refers to a network element having the PCF function shown in FIG. 1A , FIG. 1B or FIG. 3 .
  • the policy control network element is referred to as the PCF as an example. That is to say, the PCF that appears in the subsequent embodiments of the present application can be replaced by a policy control function network element.
  • the policy control network element can still be called a PCF network element, or it can have other names, or the function of the policy control network element may also be integrated into other network elements or split To multiple network elements, this embodiment of the present application is not limited.
  • the network capability opening network element in the embodiment of the present application may be a network element having the function of the NEF shown in FIG. 1A , FIG. 1B or FIG. 3 .
  • the network capability opening network element is an NEF as an example. That is to say, the NEF appearing later in the embodiment of the present application can be replaced by a network capability opening network element.
  • the network element of network capability exposure can still be called NEF, or it can have other names, or the function of the network element of network capability exposure may also be integrated into other network elements or split To multiple network elements, this embodiment of the present application is not limited.
  • the application function network element in the embodiment of the present application may be a network element having the AF function shown in FIG. 1A , FIG. 1B or FIG. 3 .
  • the application function network element is taken as an example of AF, that is to say, the AF appearing later in the embodiment of the present application can be replaced by the application function network element.
  • the application function network element may still be called AF, or may have other names, or the function of the application function network element may also be integrated into other network elements or split into multiple network elements.
  • the embodiments of this application are not limited.
  • the network element of the access network in the embodiment of the present application may be a network element having the function of the RAN shown in FIG. 1A , FIG. 1B or FIG. 3 .
  • the access network element is the RAN as an example, that is to say, the RAN that appears later in the embodiment of the present application can be replaced by the network element of the access network.
  • the access network element can still be called RAN, or it can have other names, or the functions of the access network element may also be integrated into other network elements or split To multiple network elements, this embodiment of the present application is not limited.
  • the terminal device in the embodiment of the present application may be a network element having the functions of the UE shown in FIG. 1A, FIG. 1B or FIG. 3, and the terminal may be integrated with a TSN converter, or the TSN converter Independent of terminal deployment, for convenience of description, the embodiment of the present application takes the TSN converter integrated in the terminal as an example for description. For convenience of description, in the subsequent description of the embodiment of the present application, it is taken that the terminal device is a UE as an example.
  • the wireless communication method provided by the embodiment of the present application is described below with reference to the accompanying drawings.
  • the first network element and the second network element are different network elements
  • the first network element may be UE, UPF or RAN, etc.
  • the second network element may be UE, UPF or RAN, etc.
  • all steps indicated by dotted lines are optional steps.
  • the wireless communication method may be executed by a fifth network element, or by a chip system, and the chip system may implement the functions of the fifth network element.
  • the fifth network element is NEF, AF, UPF, Ctrl, UE, PCF, or SMF. Unless otherwise specified, this embodiment of the present application does not specifically limit it. For the convenience of description, the fifth network element is used below to execute The wireless communication method is taken as an example, and the wireless communication method in the embodiment of the present application is introduced.
  • the fifth network element determines forwarding information of the first data flow, where the forwarding information includes information of the first network element and/or information of the second network element used to forward the first data flow.
  • the first network element and the second network element may be two different types of network elements in the communication system.
  • the first network element is UPF, and the second network element is UE; or, the first network element is UPF, and the second network element is an access network element; or, the first network element is UE, and the second network element is UPF; or, the first network element is an access network element, and the second network element is a UE; or, the first network element is a UPF, and the second network element is an access network element, and so on.
  • the first network element and the second network element may be two network elements of the same type in the communication system, for example, in UE-to-UE communication, for example, the first network element is UE1, and the second network element is UE2.
  • time conflicts may be detected by forwarding information of network elements of multiple data streams.
  • the processing time of multiple data streams at a certain network element conflicts, the creation time of multiple data streams may not be at the same time, so the fifth network element may have previously determined the processing time of some of the multiple data streams.
  • the information of the network element, so the fifth network element only needs to determine the information of the network element of the current first data flow, and the determination method of the forwarding information of multiple data flows is the same, so in the embodiment of this application is
  • the first data stream is taken as an example for introduction.
  • the forwarding information may have the following two explanations.
  • the forwarding information may indicate information about the port of the network element that forwards the first data flow.
  • the forwarding information may include information about the port of the network element, or include information indirectly indicating the port of the network element.
  • the forwarding information includes information of the first network element and/or information of the second network element.
  • the information of the first network element includes one or more of the information of the first port of the first network element, the identifier of the first network element, or the identifier of an instance of the first network element
  • the information of the second network element includes the second One or more items of the information of the second port of the network element, the identifier of the second network element, or the identifier of an instance of the second network element.
  • the first port includes a port through which the first network element receives the first data flow, and/or a port through which the first network element sends the first data flow.
  • the second port includes a port through which the second network element receives the first data flow, and/or a port through which the second network element sends the first data flow.
  • an instance of a network element can be understood as an object created by a network element to implement a corresponding function.
  • a corresponding instance identifier is assigned to the instance correspondingly, and the instance of the network element is represented by a unique identifier. If an NE is bound to a port, it can be understood that the NE is bound to a specific port of the NE.
  • the NE can have multiple ports, but the NE ID can be It only corresponds to a specific port of the network element, and the network element may have only one port, and the port corresponds to the identification of the network element, so the identification of the network element is actually the information of the port of the network element; An instance of an element is bound to a port, and an instance of an NE is bound to a port, which means that the instance of the NE corresponds to a port of the NE.
  • the first data flow is an uplink data flow
  • the forwarding information includes information about the port of the UPF that sends the first data flow, and includes information about the port of the UE that receives the first data flow.
  • the first data flow is a downlink data flow
  • the forwarding information includes information about a port of the UPF that receives the first data flow, and includes information about a port of the UE that sends the first data flow.
  • the forwarding information may indicate the information of the network element that forwards the first data flow.
  • the port may not be clearly defined, but it is essentially equivalent to the function of having one or more ports, or for some network elements, the network element may have multiple ports, but do not pay attention to Whether multiple data streams are processed by the port of this network element, multiple data streams may be processed by one or more ports of this network element, only need to pay attention to whether these multiple data streams are processed by this network element, or for a certain
  • the network element has only one port, so there is no need to pay attention to the port itself of the network element, and the forwarding information can include the information of the network element.
  • the fifth network element may determine the forwarding information of the first data stream in many ways, which are described below with examples.
  • the fifth network element determines the forwarding information according to the relevant information of the first data flow.
  • the relevant information of the first data flow includes, for example, one or more items of session information of the first data flow, information of the first network element, information of the second network element, or flow information of the first data flow.
  • the session information of the first data stream which can also be called the session information of the first data stream, can indicate the session for transmitting the first data stream.
  • the session is, for example, a PDU session. If it is another communication system, then the session can be different.
  • the session is a PDU session as an example.
  • the session information of the first data flow includes, for example, an identifier of a PDU session of the first data flow.
  • the flow information of the first data flow may include an identifier of the first data flow or information of the third network element.
  • the identifier of the first data stream is used to identify the first data stream.
  • the information of the third network element includes information of the destination device of the first data flow or information of the source device of the first data flow.
  • the information of the destination device includes, for example, the identifier of the destination device and/or the address of the destination device, and the address of the destination device may be called the destination address of the first data stream, for example;
  • the information of the source device includes, for example, the identifier of the source device and/or the address of the source device. Address, the address of the source device is called the source address of the first data flow, for example.
  • the identification of the first data flow may include a source address and/or a destination address.
  • the relevant information of the first data flow may be information pre-configured in the fifth network element, or information stipulated by a protocol, or may be obtained from other network elements.
  • the fifth network element is NEF or Ctrl, NEF or Ctrl can obtain the relevant information of the first data flow from AF; for another example, the fifth network element is any one of UPF, UE, PCF, SMF or Ctrl, the fifth network The element may obtain information about the first data flow from the NEF.
  • the embodiment of the present application does not limit the source of the related information of the first data stream.
  • the fifth network element can determine the forwarding information of the first data flow according to one or more items of relevant information of the first data flow, providing multiple ways to determine the forwarding information, and because the fifth network element The element may determine the forwarding information according to any one or more items of related information, which also improves the flexibility of the fifth network element in determining the forwarding information.
  • the manner in which the fifth network element determines to forward the information may also be different, and an example is introduced below.
  • the fifth network element determines a first implementation manner of forwarding information, and this implementation manner may be referred to as sub-mode 1.
  • the fifth network element determines forwarding information of the first data flow according to the session information of the first data flow.
  • the corresponding control plane network element can create a session for the first data stream, such as a PDU session, and the fifth network element can obtain information about the session, for example, called session information.
  • the session information is, for example, the address of the session and/or the identifier of the session.
  • the address of the session may also be referred to as the session address, and the identifier of the session may also be referred to as the session identifier.
  • the SMF can send the session information to the fifth network element, for example, the fifth network element is Ctrl, and the SMF directly sends the session information to Ctrl, or forwards the session information to the fifth network element through the PCF, or for example , the fifth network element is the NEF, and the SMF can forward the session information to the NEF through the PCF.
  • the SMF may store the session information in the UDM, and the fifth network element reads the session information from the UDM.
  • session information may be represented by interface information.
  • interface information For example, when the SMF transmits information, you can create an interface for the SMF to transmit information, and the interface is based on the session as the granularity, that is, a session corresponds to an interface, and the corresponding network elements interacting with the SMF can use this interface to interact with The SMF performs message transmission, and in this case the information of the interface essentially indicates the corresponding session.
  • the fifth network element stores the corresponding relationship between the session information and the forwarding information, which is called the first corresponding relationship, for example. Therefore, if the fifth network element obtains the session information of the first data flow, it can determine the forwarding information corresponding to the session information, that is, determine the forwarding information of the first data flow.
  • the forwarding information that the fifth network element can obtain includes information on the first network element; or, if the first correspondence is session information and the information of the second network element, the forwarding information that can be obtained by the fifth network element includes the information of the second network element; or, if the first correspondence is session information, information of the first network element, and information of the second network element A matching relationship between the information of the two network elements, or, if the first correspondence includes a first sub-correspondence between the session information and the information of the first network element, and the session information and the information of the second network element If there is a second sub-correspondence between the information, then the forwarding information that the fifth network element can obtain includes the information of the first network element and the information of the second network element.
  • the fifth network element pre-stores the first corresponding relationship between the session information of the first data flow and the information of the first network element, the session information takes the session identifier as an example, and the information of the first network element takes the UPF port
  • the first correspondence is the correspondence between the session identifier "1" and the UPF port identifier "2”
  • the fifth network element determines that the session identifier of the first data flow is "1”.
  • it is determined that the identifier of the port whose forwarding information includes the UPF is "2".
  • the fifth network element can determine the forwarding information of the first data flow through the corresponding relationship, which is relatively simple. In addition, before transmitting the first data stream, it is usually necessary to create corresponding session information, so the fifth network element is relatively easy to obtain the session information, thereby reducing the difficulty for the fifth network element to obtain the session information.
  • the fifth network element determines a second implementation manner of forwarding information, and this implementation manner may be referred to as sub-mode 2.
  • the fifth network element determines the forwarding information according to the information of the first network element.
  • the source device of the first data flow can sense the topology, that is, it can determine the information of the first network element connected to the source device, then the source device can carry the information of the first network element it perceives in the information of the first data flow (also referred to as flow information for short), the information of the first data flow includes, for example, the identifier and/or flow characteristics of the first data flow, and the fifth network element may obtain the information of the first network element from the information of the first data flow .
  • the flow request refers to a message requesting to create the first data flow
  • the flow request may include information of the first network element
  • the fifth network element may receive the message from other network elements A flow request, so as to obtain the information of the first network element according to the flow request, for example, the fifth network element is an NEF
  • the AF can create a flow request
  • the NEF can obtain the flow request from the AF.
  • the flow characteristics of the data flow are used to describe the data flow characteristics of the service.
  • the flow characteristics of a data flow include one or more of the following: the destination address of the data flow, the source address of the data flow, the 5GS of the data flow Latency, the jitter of the data stream, the time when the burst traffic of the data stream arrives at UE and/or UPF (burst arrival time at UE and/or UPF), the burst traffic size of the data stream (burst size ), or, the burst period of the stream.
  • the jitter of the data stream refers to the error range of the 5GS delay.
  • the 5GS delay may fluctuate within a range due to noise, link quality, load, etc., and this range is the jitter.
  • the time when the burst traffic of the data flow arrives at the UE or the UPF refers to the time when the data flow arrives at the UE or the UPF.
  • a burst can be understood as relatively high-bandwidth data transmission in a short period of time.
  • the burst size of the data flow refers to the size of the data flow reaching the UE or UPF.
  • the burst period of the data stream means that the data stream arrives at the UE or UPF at a certain period.
  • the fifth network element may use the information of the first network element as forwarding information.
  • the fifth network element may also store the corresponding relationship between the information of the first network element and the information of the second network element, for example, it may be called the second corresponding relationship. Therefore, the fifth network element obtains the information of the first network element After the information is obtained, the information of the second network element may be obtained according to the second corresponding relationship, so that the information of the second network element is used as forwarding information.
  • the fifth network element obtains the information of the second network element according to the second corresponding relationship, it may also use the information of the first network element and the information of the second network element as forwarding information.
  • the fifth network element may determine the second corresponding relationship between the information of the first network element and the information of the second network element.
  • the information of the first network element as an example of an identifier of a UPF port
  • the information of the second network element The information takes the identification of the port of the UE as an example.
  • the second correspondence is, for example, the correspondence between the identification "1" of the port of the UPF forwarding the first data flow and the identification "3" of the port of the UE.
  • the fifth network element From the flow information of the first data flow, the first data flow is forwarded from port 1 of the UPF, so the fifth network element can determine the forwarding information according to the identifier "1" of the UPF port and the second corresponding relationship The identifier "3" of the port including the UE, and/or the identifier "1" of the port including the UPF.
  • the fifth network element can obtain the information of the first network element from the flow information or the flow request, and can also obtain the For the forwarding information, the forwarding information can be obtained without using other information, which can relatively simplify the way for the fifth network element to determine the forwarding information.
  • the fifth network element determines a third implementation manner of forwarding information, and this implementation manner may be referred to as sub-mode 3.
  • the fifth network element determines the forwarding information according to the information of the second network element.
  • the source device of the first data stream transmits the first data stream, it can perceive the topology, that is, it can determine the information of the second network element connected to itself, then the source device can carry the information of the second network element it perceives in the In the flow information of the first data flow, the meaning of the flow information can be referred to above, and will not be repeated here.
  • the fifth network element can obtain the information of the second network element from the flow information.
  • the flow request includes information of the second network element, and the fifth network element can obtain the information of the second network element from the flow request.
  • the meaning of the flow request refer to the foregoing, here No longer.
  • the fifth network element may use the information of the second network element as forwarding information.
  • the fifth network element may also store the corresponding relationship between the information of the second network element and the information of the first network element, for example, it is called the third corresponding relationship. Therefore, the fifth network element obtains the information of the second network element Afterwards, the information of the first network element may be obtained according to the third corresponding relationship, and the information of the first network element may be used as forwarding information.
  • the fifth network element may use the information of the first network element and the information of the second network element as forwarding information.
  • the fifth network element can obtain the information of the second network element from the flow information or the flow request, and can also obtain the The forwarding information can be obtained without using other information, which can relatively simplify the way for the fifth network element to determine the forwarding information.
  • the fifth network element determines a fourth implementation manner of forwarding information, and this implementation manner may be referred to as sub-mode 4.
  • the fifth network element may determine the forwarding information according to the information of the third network element. For example, the fifth network element may determine the forwarding information corresponding to the obtained information of the third network element according to the fourth correspondence between the information of the third network element and the forwarding information.
  • the fifth network element may obtain the information of the third network element from the flow information or the flow request. Wherein, if the transmission direction of the first data flow is different, the information of the third network element may be different.
  • the first data flow is an uplink data flow
  • the information of the third network element that can be obtained by the fifth network element includes the information of the destination device. According to the fourth corresponding relationship between the information of the destination device and the forwarding information, and determine and The forwarding information corresponding to the information of the destination device.
  • the information of the third network element that can be obtained by the fifth network element includes the information of the source device, and according to the fourth corresponding relationship between the information of the source device and the forwarding information, determine and Forwarding information corresponding to the information of the source device.
  • the fifth network element may obtain address learning information.
  • the address learning information is an implementation manner of the fourth correspondence.
  • the address learning information includes, for example, addresses of some or all of the network elements in the DN, and information about the first network element and/or the second network element corresponding to each of some or all of these addresses.
  • the address learning information may be preconfigured in the fifth network element, or the fifth network element may learn the address learning information based on an address learning mechanism.
  • the address learning mechanism includes, for example, that the fifth network element obtains the information of the first network element and/or the information of the second network element corresponding to each of some or all of the network elements in the DN when transmitting other data streams. This address learns information.
  • the other data stream is a different data stream from the first data stream, for example, the other data stream refers to a data stream transmitted by a corresponding network element before transmitting the first data stream.
  • the first data flow is an uplink data flow
  • the fifth network element determines that the destination address of the first data flow is address 1, and in the address learning information, the address 1 of the destination device corresponds to the identifier of the port of the UE as 3, thus The fifth network element may determine that the forwarding information includes the identifier of the port of the UE as 3.
  • the first method for obtaining the fourth corresponding relationship is applicable to, but not limited to, unicast transmission or transmission with a destination address.
  • the fifth network element After the fifth network element obtains the information of the third network element, it can further obtain the forwarding information according to the pre-learned address learning information, which provides another way of obtaining the forwarding information.
  • the method for obtaining the fourth corresponding relationship does not need to expand the functions of the fifth network element or other network elements except the fifth network element too much, and does not require the fifth network element or other network elements except the fifth network element
  • Other network elements other than the fifth network element can relatively simplify the processing load of the fifth network element or other network elements except the fifth network element.
  • the fifth network element may obtain the first topology information.
  • the first topology information is another implementation manner of the fourth correspondence.
  • the first topology information includes connection information between the first network element and at least one network element, and/or, the first topology information includes connection information between the second network element and at least one network element.
  • the at least one network element includes a third network element.
  • the first topology information includes the connection information between the first network element and the third network element, and/or the second network element Connection information with the third network element.
  • the first topology information includes: UPF1 port 1, and the port connected to the UPF port 1
  • the process of Dev1 and UPF discovering the topology For example: Dev1 sends a topology discovery packet to UPF, and the intermediate device between Dev1 and UPF directly forwards the topology discovery packet to UPF, and then UPF can use the received topology discovery packet, thereby Determine the connection relationship between port 1 of the UPF and the Dev1.
  • the fifth network element may obtain the first topology information from other network elements, for example, the fifth network element may receive the second topology information from other network elements, and other network elements refer to networks other than the fifth network element Meta, such as AF.
  • the second topology information includes the connection information between the first network element and the adjacent network elements of the first network element, wherein the connection information between the first network element and the adjacent network elements of the first network element includes the connection information of the first network element
  • the identifier and the identifier of the adjacent network element of the first network element, or the connection information between the first network element and the adjacent network element of the first network element includes the port information of the first network element and the adjacent network element of the first network element
  • the connection information between the adjacent network elements of the element includes the identifier of the second network element and
  • the fifth network element also needs to topology information, the first topology information can be determined.
  • the third topology information includes connection information between at least one network element.
  • the third topology information may be pre-configured in the fifth network element, or received by the fifth network element from other network elements, which is not limited in this embodiment of the present application.
  • the fifth network element may receive Obtaining the second topology information, or obtaining the second topology information and the third topology information from other network elements, the fifth network element does not need to update the second topology information in real time when the network topology changes, and even does not need to update the third topology information, etc.
  • the processing load of the fifth network element is relatively reduced.
  • the first topology information may be preconfigured in the fifth network element.
  • the fifth network element itself can pre-store corresponding first topology information, and update the first topology information accordingly according to changes in the network topology, without obtaining the first topology information from other network elements, which relatively reduces Interaction between the fifth network element and other network elements.
  • the DN includes the forwarding node SW, the first terminal device Dev1 and the second terminal device Dev2.
  • the first topology information corresponding to the UPF includes the identifier of port 1 of the UPF, the identifier of port 1 of the SW connected to port 1 of the UPF, the identifier of port 2 of the UPF, and
  • the information of the Dev2 connected to the port 2 of the UPF may also optionally include the information of the port of the Dev2 connected to the port 2 of the UPF, for example, the identifier of the port 1 of the Dev2).
  • the fifth network element or other network elements other than the fifth network element does not need to use the transmission information of the data stream transmitted before the first data stream, but only needs to sense the network topology to determine the fourth corresponding relationship.
  • the topology information may involve the connection relationship between multiple network elements, and different data flows may involve different destination devices or source devices. Therefore, the fifth network element may determine the forwarding information based on the first topology information.
  • the forwarding information of each data stream, that is, the method has good universality.
  • the fifth network element determines a fifth implementation manner of forwarding information, and this implementation manner may be referred to as sub-mode 5. If the related information includes the identifier of the first data flow in the flow information, the fifth network element may pre-store the corresponding relationship between the identifier of the first data flow and the forwarding information, for example, it is called the fifth corresponding relationship. After the identifier of the first data flow is obtained, the forwarding information may be determined according to the fifth correspondence.
  • the fifth correspondence may be pre-configured in the fifth network element, or when the identifier of the first data flow includes the information of the destination device and/or the information of the source device of the first data flow, the second The fifth network element may also obtain the fifth corresponding relationship based on the method for obtaining the fourth corresponding relationship mentioned in sub-mode 4, which will not be repeated here.
  • the fifth network element determines that the identifier of the first data flow is identifier 1, and in the fifth correspondence, the identifier 1 of the first data flow corresponds to the identifier of port 1 of the UPF, then the fifth network element may determine that the forwarding information includes the identifier of the UPF ID of port 1.
  • sub-mode 1 to sub-mode 5 are examples of the manner of determining forwarding information for the fifth network element, and are not limited thereto in practice.
  • the fifth network element may determine the forwarding information according to any one or more types of information in the relevant information of the first data flow.
  • the fifth network element may determine the forwarding information according to the information with the highest priority among the information included in the relevant information of the first data flow, and the priority of each information in the relevant information of the first data flow may be that the fifth network element pre-determines the forwarding information. It is configured, or is configured by other network elements except the fifth network element, or is stipulated by a protocol, or may be default, which is not limited in this embodiment of the present application.
  • the fifth network element may receive the forwarding information from other network elements, and other network elements refer to network elements other than the fifth network element in the communication system.
  • the manner in which other network elements determine the forwarding information may refer to the contents of sub-mode 1 to sub-mode 5 discussed above, which will not be repeated here.
  • the fifth network element is Ctrl
  • the AF may determine the forwarding information of the first data flow
  • Ctrl may obtain the forwarding information from the AF.
  • the fifth network element may also determine forwarding information of one or more other data flows, for example, other data flows include the second data flow and so on. It should be noted that the order in which the fifth network element determines the forwarding information of the first data flow and the forwarding information of the second data flow may be arbitrary, which is not limited in this embodiment of the present application. Alternatively, the forwarding information of the second data flow may be pre-configured in the fifth network element.
  • Step 402 If the first processing time conflicts with the second processing time of the second data flow, the fifth network element determines the processing time of the first data flow in the first network element and/or the processing time of the second network element.
  • the first processing time is the time for the first network element to process the first data flow
  • the second processing time is the time for the first network element to process the second data flow
  • the first processing time is the time for the second network element to process the first
  • the second processing time is the time when the second network element processes the second data flow.
  • the first processing time and the second processing time can be the same network element The time of the same type of processing performed on the first data flow and the second data flow, or the time of different types of processing performed by the same network element on the first data flow and the second data flow.
  • the first processing time and the second processing time It is the time when the same network element respectively performs the same type of processing on the first data flow and the second data flow, and the same type of processing is, for example, both receiving processing or both sending processing.
  • the first processing time is the time when the first network element receives the first data flow
  • the second processing time is the time when the first network element receives the second data flow.
  • the first processing time is the time when the first network element sends the first data flow
  • the second processing time is the time when the first network element sends the second data flow.
  • the first processing time is the time when the second network element receives the first data flow
  • the second processing time is the time when the second network element receives the second data flow.
  • the first processing time is the time when the second network element sends the first data flow
  • the second processing time is the time when the second network element sends the second data flow.
  • the first processing time and the second processing time can be understood as the concept of time, for example, the first processing time is the starting time of receiving the first data stream, and the second processing time can be understood as the starting time of receiving the second data stream time.
  • the start time of receiving the data stream may be understood as the time when the data stream starts to be received.
  • the first processing time is the starting moment of sending the first data stream
  • the second processing time may be understood as the starting moment of sending the second data stream.
  • the start time of sending the data stream may be understood as the time when the data stream starts to be sent.
  • the first processing time and the second processing time can also be understood as the concept of a time period, for example, the first processing time is the receiving time window for receiving the first data stream, and the second processing time is the receiving time window for receiving the second data stream. Time Window.
  • the start time of the receiving time window of the data stream is the time when the data stream starts to be received
  • the end time is the time when the data stream is completely received.
  • the first processing time is the sending time window for sending the first data stream
  • the second processing time is the sending time window for sending the second data stream
  • the specific representation forms of the receiving time window and the sending time window can refer to the foregoing discussion content, which will not be repeated here.
  • the fifth network element may determine whether the first processing time and the second processing time exist conflict.
  • first processing time and the second processing time are concepts of time, then the first processing time and the second processing time are the same, or the first processing time or the second processing time is used as the starting time, and the processing is determined based on the capability of the network element. If the time of the first data flow overlaps with the time of the second data flow, it means that there is a conflict between the first processing time and the second processing time, and the first processing time and the second processing time are different, or based on the capability of the network element , it is determined that the time for processing the first data stream does not overlap with the time for processing the second data stream, which means that there is no conflict between the first processing time and the second processing time.
  • first processing time and the second processing time are the concept of a time period
  • first processing time and the second processing time completely overlap, or there is a partial overlap between the first processing time and the second processing time, or the first processing time
  • the overlapping portion of the first processing time and the second processing time is greater than the preset ratio, it means that there is a conflict between the first processing time and the second processing time.
  • the preset ratio refers to the overlap between the first processing time and the second processing time and The proportion between the first processing time, or the proportion between the overlapping part of the first processing time and the second processing time and the second processing time; and if there is no overlap between the first processing time and the second processing time, or If the overlapping portion of the first processing time and the second processing time is less than or equal to the preset ratio, it means that there is no conflict between the first processing time and the second processing time.
  • this method can be used for conflict determination mechanisms based on various scheduling methods, including scheduling methods based on time slots, or other types of scheduling methods, which are not limited in this application.
  • the forwarding information directly or indirectly indicates the port of the first network element and/or the port of the second network element, and the first data flow and the second data flow are processed by the same port of the same network element, then the fifth network element It may be detected whether there is a conflict in the processing time of the first data flow and the second data flow respectively by the same port of the same network element.
  • the fifth network element determines that port 1 of the UPF receives the first
  • the first processing time of the data flow is: 13:31:00-13:31:10
  • the second processing time of determining that port 1 of the UPF receives the second data flow is: 13:31:05-13:32:01
  • the fifth network element may determine that the first processing time and the second processing time conflict.
  • the fifth network element may It is detected whether there is a conflict in the processing time of the first data flow and the second data flow respectively by the same network element.
  • the fifth network element determines the first processing time for the RAN to send the first data flow The time is: 14:01:00-14:01:20, and it is determined that the second processing time for the RAN to send the second data flow is: 14:01:00-14:01:20, because the first processing time and the second processing The times completely overlap, so the fifth network element can determine that the first processing time and the second processing time conflict.
  • the first processing time and the second processing time may be pre-configured in the fifth network element, or determined by the fifth network element.
  • the following takes the determination of the first processing time by the fifth network element as an example to introduce the first
  • the fifth network element determines the first processing time and the second processing time.
  • the meaning of the first processing time is different, and there may be various ways to determine the first processing time, and examples are introduced below.
  • the first processing time is the time when the first network element processes the first data flow.
  • the time when the fifth network element receives the first data stream and arrives at the first network element then the fifth network element can directly use the time when the first data stream arrives at the first network element as the first processing time, or the fifth network element
  • the first processing time may be determined according to the time when the first data flow arrives at the first network element and the time required for the first network element to process the first data flow.
  • the duration required by the first network element to process the first data flow may be specified by the protocol, pre-configured in the fifth network element, or calculated by the fifth network element according to the flow characteristics of the first data flow, for example, Calculated by the fifth network element according to the data volume of the first data flow.
  • the fifth network element can use the time when the first data stream arrives at the second network element, and the time between the first network element and the second network element The time delay in between determines the first processing time.
  • the second network element is the ingress network element of the communication system
  • the first network element is the egress network element of the communication system
  • the fifth network element can send the first data stream to the second network element, and the first network element
  • the sum of delays with the second network element is used as the first processing time.
  • the first network element is the entrance network element of the communication system
  • the second network element is the exit network element of the communication system
  • the fifth network element can compare the time when the first data flow reaches the second network element with the first network element The delay difference between the second network element and the second network element is used as the first processing time.
  • the first processing time is the time when the second network element processes the first data flow.
  • the time when the fifth network element receives the first data stream and arrives at the second network element then the fifth network element can directly use the time when the first data stream arrives at the second network element as the first processing time, or the fifth network element
  • the first processing time may be determined according to the time when the first data flow arrives at the second network element and the time required for the second network element to process the first data flow.
  • the fifth network element can use the time when the first data stream arrives at the first network element, and the time between the first network element and the second network element The time delay in between determines the first processing time.
  • the fifth network element can record the time when the first data flow reaches the first network element, and the first network element The sum of delays with the second network element is used as the first processing time.
  • the second network element is the ingress network element of the communication system
  • the first network element is the egress network element of the communication system
  • the fifth network element can compare the time when the first data stream arrives at the first network element with the first network element The delay difference between the second network element and the second network element is used as the first processing time.
  • the manner in which the fifth network element determines the second processing time may refer to the content of determining the first processing time, which will not be repeated here.
  • the fifth network element may cause the first network element and/or the second network element to fail to process the first data flow normally, for example, unable to send all of the first data flow or part of it, or delaying the sending of all or part of the first data stream, or delaying the sending of the first data stream to cause subsequent congestion, resulting in random packet loss, and for example, failing to receive all or part of the first data stream, or Delaying the reception of all or part of the first data flow, or delaying the reception of the first data flow causes subsequent congestion, and then random packet loss occurs, in order to reduce or avoid the processing of multiple data by the first network element and/or the second network element flow conflict, therefore, in this embodiment of the present application, the fifth network element may determine the processing time of the first data flow in the first network element and/or the processing time of the first data flow in the second network element.
  • the fifth network element may determine the processing time of the first data flow in the first network element and/or the processing time of the first data flow in the second network element. There may be multiple ways, and examples are introduced below.
  • the processing time of the data flow corresponding to the network element can be understood as the time when the port of the network element processes the data flow, for example, the first processing time is the first network element The time when the element processes the first data flow, and the second processing time is the time when the first network element processes the second data flow.
  • the first network element does not clearly define ports, or the first network element has one or more ports, but does not pay attention to the ports of the first network element.
  • the processing time of the first data flow in the first network element may be determined.
  • the first network element may subsequently process the first data flow according to the retrieved processing time of the first network element for the first data flow.
  • the fifth network element may adjust the first processing time to obtain the re-determined processing time of the first data flow in the first network element.
  • the fifth network element detects that there is a conflict between the processing time of the first data flow and the second data flow by the first network element, which means that there is a conflict between the processing time of the first network element for multiple data flows, and the first network element
  • the processing time is equivalent to the initial theoretical value of the processing time of the first data flow by the first network element. Therefore, the fifth network element can directly adjust the first processing time, so as to regain the processing time of the first data flow by the first network element. processing time.
  • the fifth network element only needs to change the first processing time to obtain the processing time of the first data flow by the first network element; if the first processing Time and the second processing time are the concept of time period, then the fifth network element can determine the duration corresponding to the overlapping part between the first processing time and the second processing time, for example, it can be called the overlapping duration, and adjust according to the overlapping duration For the first processing time, for example, the start time and end time of the first processing time are added to the overlap duration, or the start time and end time of the first processing time are respectively subtracted from the overlap duration, so as to obtain the first Processing time of the first data flow by the network element.
  • the fifth network element pre-configures the arrival time of the first data flow to the first network element, or obtains the arrival time of the first data flow from other network elements, then the fifth network element can adjust the arrival time of the first data flow The time of the first network element, and according to the adjusted time when the first data flow arrives at the first network element, determine the processing time of the first network element for the first data flow.
  • the processing time of the first data flow to be determined by the first network element is the receiving time of the first data flow by the first network element, and the processing time of the first data flow to be determined by the first network element is time concept, then the time when the adjusted first data flow arrives at the first network element may be regarded as the determined processing time of the first network element for the first data flow.
  • the fifth network element can use the time when the adjusted first data flow arrives at the first network element as the starting time of the first network element's processing time for the first data flow, and the adjusted first The sum of the time when the data flow arrives at the first network element and the time required for the first network element to receive the first data flow is used as the end time of the first network element's processing time for the first data flow.
  • the time required for the first network element to receive the first data stream can be understood as the time spent by the first network element from the start of receiving the first data stream to the completion of receiving the first data stream.
  • the first network element receives the first data stream
  • the duration required for the flow may be pre-configured in the fifth network element, or the fifth network element may obtain it from other network elements.
  • the fifth network element may adjust the arrival time of the first data flow to the first network element, and the internal processing delay of the first network element processing the first data flow, to obtain the processing time of the first network element for the first data flow.
  • the internal processing delay of the first network element processing the first data flow refers to the time spent by the first network element from when the first network element starts to receive the first data flow to when the first network element starts to send the first data flow.
  • the fifth network element pre-configures the 5GS delay of the first data flow, or obtains the 5GS delay of the first data flow from other network elements, then the fifth network element can adjust the 5GS delay of the first data flow, and according to The adjusted 5GS determines the processing time of the first data flow by the first network element.
  • the fifth network element may pre-configure the time when the first data flow arrives at the ingress network element of the communication system, or the fifth network element may obtain the time when the first data flow arrives at the ingress network element of the communication system from other network elements, so the fifth network element Network elements can adjust the 5GS delay.
  • the fifth network element can increase the 5GS delay by increasing the overlap duration, or reduce the 5GS overlap duration.
  • the sum of the last 5GS delay and the time when the first data flow arrives at the ingress network element of the communication system is used as the processing time of the first network element for the first data flow.
  • the fifth network element adjusts the 5GS delay of the first data flow, and adjusts the time when the first data flow arrives at the ingress network element of the communication system.
  • the fifth network element may The time of the ingress network element increases the overlap duration, or the overlap duration can be reduced in the time when the first data flow arrives at the ingress network element of the communication system.
  • the 5GS delay and the adjusted time when the first data flow arrives at the ingress network element of the communication system determine the processing time of the first data flow by the first network element.
  • Example 4 is equivalent to the combination of Example 3 and Example 2, wherein the manner in which the fifth network element obtains the 5GS delay and the time when the first data flow arrives at the ingress network element of the communication system can refer to the above, and will not be repeated here.
  • the first processing time and the second processing time are time concepts, then the re-determined processing time of the first data flow by the first network element is different from the second processing time, thus avoiding the first network If there is a conflict between the processing time of the first data flow and the second data flow, the first network element can subsequently process the first data flow according to the re-determined processing time of the first data flow by the first network element, which improves the efficiency of the first network element. Reliability of meta-processing data streams.
  • the fifth network element adjusts the initial value of the processing time of the first data flow, it can reduce the first processing time and the second processing time along the In the overlapping direction, adjust the first processing time, which can reduce the problem of time conflict between the processing time of the first data flow and the second data flow by the first network element. Since the problem of time conflict is reduced, the subsequent processing of the first network element The first data flow and the second data flow can be processed more smoothly, thereby improving the reliability of processing the first data flow.
  • case one may include the following sub-cases.
  • the processing time of the data stream corresponding to the port of the network element may be understood as the time when the port of the network element processes the data stream.
  • the first processing time is the processing time of the first data flow by the first port of the first network element
  • the second processing time is the processing time of the second data flow by the first port of the first network element. If the fifth network element determines that the first processing time conflicts with the second processing time, it may determine the processing time of the first data flow at the first port of the first network element.
  • the first port is a port through which the first network element receives or sends the first data flow.
  • the first processing time is the processing time of the first data flow by the first port of the first network element, which means that the fifth network element has obtained the initial processing time of the first data flow by the first port of the first network element. Therefore, the fifth network element can re-determine the processing time of the first data flow by the first port of the first network element.
  • the fifth network element can re-determine the processing time of the first data flow by the first port of the first network element.
  • the fifth network element may re-determine a time different from the first processing time as the processing time of the first data flow on the first port of the first network element .
  • the fifth network element can determine the overlapping duration. , to determine the processing time of the first data flow on the first port of the first network element, for example, the fifth network element can use the sum of the duration corresponding to the overlapping duration and the first processing time as the first port pair of the first network element The processing time of the first data flow; or, for example, the fifth network element may use the difference between the overlapping duration and the first processing time as the processing time of the first data flow by the first port of the first network element.
  • the first network element when the processing time of multiple data flows on the same port of the first network element conflicts, the first network element can determine the processing time for the first data flow, because the re-determined The processing time of the first data flow by the first port is different from the second processing time, or the overlap between the re-determined first port of the first network element's processing time of the first data flow and the second processing time is reduced, so that The conflict problem is reduced, so that the first port of the first network element can successfully process the first processing time and the second processing time subsequently.
  • the first network element is a UPF
  • the first port of the first network element is port 1 of the UPF that sends the first data flow
  • the first processing time is that port 1 of the UPF sends the first data flow.
  • the sending time of a data stream is specifically 15:01:00-15:01:10
  • the second processing time is the sending time of the second data stream sent by port 1 of the UPF, specifically 15:01:09-15:01 :15 as an example
  • the fifth network element determines that the first processing time and the second processing time completely overlap, so the fifth network element determines that the first processing time and the second processing time conflict, then the fifth network element can adjust the first processing time , for example, the first processing time is adjusted forward by two seconds, that is, 15:01:00-15:01:10 is adjusted to: 15:00:58-15:01:08.
  • the first processing time is the processing time of the first data flow by the first port of the first network element
  • the second processing time is the processing time of the second data flow by the first port of the first network element. If the fifth network element determines that there is a conflict between the first processing time and the second processing time, determine the corresponding processing time of the first data flow on the second port of the first network element.
  • the first port is the port on which the first network element receives the data stream
  • the second port is the port on which the first network element sends the data stream
  • the first port is the port on which the first network element sends the data stream
  • the second port is The port through which the first network element receives the data flow.
  • the fifth network element may determine the corresponding processing time of the first data flow on the second port of the first network element.
  • the processing time corresponding to the first data flow at the second port of the first network element can be determined according to the overlapping duration, and the meaning of the overlapping duration can be Refer to the foregoing, and will not repeat them here.
  • the fifth network element may determine the sum of the processing time of the first network element at the first port, the delay between the first port and the second port of the first network element, and the overlapping duration. The processing time corresponding to a data flow on the second port of the first network element. Or for example, the fifth network element may determine the sum of the processing time of the first network element at the first port and the delay between the first port and the second port of the first network element, and based on the determined sum of delays The overlapping duration is subtracted, so as to determine the corresponding processing time of the first data flow on the second port of the first network element.
  • the processing time of the first network element at the first port and the delay between the first port and the second port of the first network element may be pre-configured in the fifth network element, or may be obtained from the fifth network element Obtained by other network elements.
  • the conflict between the processing time of the first data stream and the second data stream by the second port can be reduced, and the conflict between the first processing time and the second processing time can also be reduced.
  • the first port is the first The port through which the network element sends the first data flow
  • the second port is the port through which the first network element receives the first data flow, which determines the processing time of the first data flow at the second port of the first network element, which actually corresponds to The processing time of the first data flow at the first port of the first network element is changed.
  • the first network element is a UPF
  • the first port of the first network element is port 1 of the UPF that sends the first data flow
  • the second port of the first network element is the port 1 for receiving the first data flow.
  • the first processing time is the sending time of the first data flow sent by port 1 of UPF, specifically 15:05:10-15:05:15
  • the second processing time is port 1 of UPF Send the sending time of the second data stream, specifically 15:05:14-15:05:18 as an example
  • the fifth network element determines that there is a conflict between the first processing time and the second processing time, and the fifth network element can determine the UPF
  • the receiving time of port 2 for receiving the first data stream is 15:04:10-15:04:15.
  • the first processing time is the processing time of the first data flow by the first port of the first network element
  • the second processing time is the processing time of the second data flow by the first port of the first network element. If the fifth network element determines that there is a conflict between the first processing time and the second processing time, determine the processing time of the first data flow at the first port of the first network element, and determine the processing time of the first data flow at the first port of the first network element Two-port processing time. The meanings of the first port and the second port can be referred to above, and will not be repeated here.
  • the first network element is a UPF
  • the first port of the first network element is port 1 of the UPF that sends the first data flow
  • the second port of the first network element is the port 1 for receiving the first data flow.
  • the first processing time is the sending time of the first data flow sent by port 1 of UPF, specifically 15:05:15-15:05:20
  • the second processing time is port 1 of UPF Send the sending time of the second data stream, specifically 15:05:18-15:05:25 as an example
  • the fifth network element determines that there is a conflict between the first processing time and the second processing time, and the fifth network element can determine the UPF
  • the sending time of port 1 sending the first data stream is 15:06:00-15:06:05
  • the receiving time of port 2 of the UPF for receiving the second data stream is determined to be 15:05:00-15:05:05.
  • the first processing time is the processing time of the first data flow by the first network element
  • the second processing time is the processing time of the second data flow by the first network element.
  • the first processing time is the processing time of the first data flow by the first port of the first network element
  • the second processing time is the processing time of the second data flow by the first port of the first network element.
  • the first processing time is the processing time of the first data flow by the second port of the first network element
  • the second processing time is the processing time of the second data flow by the second port of the first network element.
  • the second network element does not clearly define ports, or the second network element has one or more ports, but does not pay attention to the ports of the second network element.
  • the fifth network element may determine the processing time for the second network element to process the first data flow.
  • the fifth network element determines the processing time for the second network element to process the first data flow according to the first processing time, the overlapping duration, and the delay between the first network element and the second network element.
  • the meaning of the overlapping duration can be referred to above, and will not be repeated here.
  • the fifth network element determines the first processing time and the sum of the delay between the first network element and the second network element, based on the determined sum Increase the overlapping duration to determine the processing time for the second network element to process the first data flow.
  • the fifth network element determines the sum of the first processing time and the delay between the first network element and the second network element, and reduces the overlap duration on the basis of the determined sum, thereby determining that the second network element processes the first processing time The processing time of a data stream.
  • the delay between the first network element and the second network element can be pre-configured in the fifth network element, or the fifth network element can obtain it from other network elements. Let me repeat.
  • the fifth network element determines the first processing time, and the delay difference between the first network element and the second network element, based on the determined difference Increase the overlapping duration to determine the processing time for the second network element to process the first data flow.
  • the fifth network element determines the first processing time and the delay difference between the first network element and the second network element, subtracts the overlap duration from the determined difference, and determines that the second network element processes the first data The processing time of the stream.
  • the second type is the first type.
  • the fifth network element determines the processing time for the second network element to process the first data flow according to the overlap duration and the time when the first data flow arrives at the second network element.
  • the arrival time of the first data stream to the second network element may be preconfigured in the fifth network element, or the fifth network element may obtain it from other network elements.
  • the fifth network element takes the sum of the time when the first data flow arrives at the second network element and the overlapping duration as the processing time for the second network element to process the first data flow, or may take the time when the first data flow arrives at the second network element The difference between the overlapping duration and the overlapping duration is used as the processing time for the second network element to process the first data flow.
  • case two may include the following sub-cases:
  • the first processing time is the processing time of the first data flow by the first network element
  • the second processing time is the processing time of the second data flow by the first network element.
  • the first processing time is the processing time of the first data flow by the first port of the first network element
  • the second processing time is the processing time of the second data flow by the first port of the first network element.
  • the first processing time is the processing time of the first data flow by the second port of the first network element
  • the second processing time is the processing time of the second data flow by the second port of the first network element. If the fifth network element determines that the first processing time conflicts with the second processing time, determine the processing time of the first data flow at the third port of the second network element.
  • the third port is a port through which the second network element receives or sends the first data flow.
  • the first network element is the UPF
  • the second network element is the UE
  • the third port of the UE is port 3 of the UE sending the first data flow
  • the first processing time is UPF
  • the first processing time is UPF
  • the second processing time is the receiving time of UPF port 1 receiving the second data stream, specifically 16:04:00 -16:04:20 as an example
  • the fifth network element determines that the first processing time and the second processing time completely overlap, thereby determining that there is a conflict, then the fifth network element can determine the sending time of the first data stream sent by port 3 of the UE Specifically: 16:05:10-15:05:30.
  • the first processing time is the processing time of the first data flow by the first network element
  • the second processing time is the processing time of the second data flow by the first network element.
  • the first processing time is the processing time of the first data flow by the first port of the first network element
  • the second processing time is the processing time of the second data flow by the first port of the first network element.
  • the first processing time is the processing time of the first data flow by the second port of the first network element
  • the second processing time is the processing time of the second data flow by the second port of the first network element. If the fifth network element determines that the first processing time conflicts with the second processing time, determine the processing time of the first data flow at the fourth port of the second network element.
  • the third port is the port for the second network element to receive the data flow
  • the fourth port is the port for the second network element to send the data flow
  • the third port is the port for the second network element to send the data flow
  • the fourth port is The port through which the second network element receives the data flow.
  • the determination of the processing time of the first data flow at the fourth port of the second network element may refer to the similar method of determining the processing time of the first data flow at the second network element above, and details are not repeated here.
  • the first processing time is that the first data flow is in the UPF
  • the sending time of port 2 specifically: 17:05:00-17:05:10
  • the second processing time is the sending time of the second data stream on port 2 of the UPF, specifically: 17:05:05-17 :05:20
  • the first processing time of the fifth network element is exactly the same as the second processing time, that is, it is determined that there is a conflict between the first processing time and the second processing time
  • the fifth network element determines the difference between port 2 of the UPF and port 4 of the UE
  • the delay between them is 3 minutes, and according to the first processing time and the second processing time, it is determined that the overlapping duration is 5 seconds, so the processing time for the fifth network element to determine that the first data stream can be sent by port 4 of the UE is specifically: 17 :07:55-17:08:
  • the first processing time is the processing time of the first data flow by the first network element
  • the second processing time is the processing time of the second data flow by the first network element.
  • the first processing time is the processing time of the first data flow by the first port of the first network element
  • the second processing time is the processing time of the second data flow by the first port of the first network element.
  • the first processing time is the processing time of the first data flow by the second port of the first network element
  • the second processing time is the processing time of the second data flow by the second port of the first network element.
  • the fifth network element determines that the first processing time and the second processing time conflict, determine the processing time of the first data flow at the third port of the second network element, and determine the processing time of the first data flow at the third port of the second network element.
  • Port processing time wherein, the meanings of the third port and the fourth port can refer to the content discussed in the previous sub-case 5, which will not be repeated here.
  • the manner in which the fifth network element determines the processing time of the first data flow at the third port of the second network element and the manner of determining the processing time of the first data flow at the third port of the second network element can refer to the foregoing, where No longer.
  • the above-mentioned case 1 and the above-mentioned case 2 may be combined.
  • any one of the above-mentioned sub-cases 1-3 may be combined with any one of the above-mentioned sub-cases 4-6.
  • the first processing time is the processing time of the first data flow by the first port of the first network element
  • the second processing time is the first processing time of the first network element.
  • the first processing time is the processing time for the second network element to process the first data flow
  • the second processing time is the processing time for the second network element to process the second data flow
  • the second network element does not clearly define the port, or the second network element There are one or more ports in the network element, but it does not pay attention to the ports of the second network element.
  • the fifth network element determines that there is a conflict between the first processing time and the second processing time, it means that the fifth network element has The processing time of the data flow and the second data flow conflict, so the fifth network element can determine the processing time of the first data flow in the second network element.
  • the manner in which the fifth network element determines the processing time of the first data flow in the second network element may refer to the content discussed in the foregoing case 1, which will not be repeated here.
  • case three if the first processing time and the second processing time correspond to ports of the second network element, case three may specifically include the following sub-cases.
  • the processing time of the data stream corresponding to the port of the network element may be understood as the time when the port of the network element processes the data stream.
  • the first processing time is the processing time of the first data flow by the third port of the second network element
  • the second processing time is the processing time of the first data flow by the third port of the second network element. If the fifth network element determines that there is a conflict between the first processing time and the second processing time, determine the processing time of the first data flow at the third port of the third network element.
  • the third port For the meaning of the third port, reference may be made to the meaning of the third port discussed above, which will not be repeated here.
  • the manner of determining the processing time of the first data stream at the third port of the third network element may refer to the content discussed in subcase 1 above, and details are not repeated here.
  • the first processing time is the processing time of the first data flow by the third port of the second network element
  • the second processing time is the processing time of the first data flow by the third port of the second network element. If the fifth network element determines that there is a conflict between the first processing time and the second processing time, it may determine the processing time of the first data flow at the fourth port of the second network element.
  • the meaning of the third port and the fourth port can refer to the meaning discussed above, and will not be repeated here.
  • To determine the processing time of the first data stream on the fourth port of the second network element refer to the content discussed in the previous sub-case 2. I won't repeat them here.
  • the first processing time is the processing time of the first data flow by the third port of the second network element
  • the second processing time is the processing time of the first data flow by the third port of the second network element. If the fifth network element determines that there is a conflict between the first processing time and the second processing time, it may determine the processing time of the first data flow at the third port of the second network element, and the processing time of the first data flow at the third port of the second network element.
  • Four-port processing time For the meanings of the third port and the fourth port, reference may be made to the content discussed above, and details will not be repeated here.
  • the content of determining the processing time of the first data flow at the third port of the second network element and the processing time of the first data flow at the fourth port of the second network element can refer to the content discussed in the previous sub-case 3. Let me repeat.
  • the first processing time is the processing time of the first data flow by the second network element
  • the second processing time is the processing time of the second data flow by the second network element.
  • the first processing time is the processing time of the first data flow by the third port of the second network element
  • the second processing time is the processing time of the second data flow by the third port of the second network element.
  • the first processing time is the processing time of the first data flow by the fourth port of the second network element
  • the second processing time is the processing time of the second data flow by the fourth port of the second network element.
  • the fifth network element may determine the processing time for the first network element to process the first data flow.
  • case four may include the following sub-cases:
  • the first processing time is the processing time of the first data flow by the second network element
  • the second processing time is the processing time of the second data flow by the second network element.
  • the first processing time is the processing time of the first data flow by the third port of the second network element
  • the second processing time is the processing time of the second data flow by the third port of the second network element.
  • the first processing time is the processing time of the first data flow by the fourth port of the second network element
  • the second processing time is the processing time of the second data flow by the fourth port of the second network element. If the fifth network element determines that there is a conflict between the first processing time and the second processing time, then the processing time of the first data flow at the first port of the first network element may be determined.
  • the meaning of the first port can refer to the content discussed above, and will not be repeated here.
  • For determining the processing time of the first data flow at the first port of the first network element reference may be made to the content discussed in subcase 4 above, and details are not repeated here.
  • the first processing time is the processing time of the first data flow by the second network element
  • the second processing time is the processing time of the second data flow by the second network element.
  • the first processing time is the processing time of the first data flow by the third port of the second network element
  • the second processing time is the processing time of the second data flow by the third port of the second network element.
  • the first processing time is the processing time of the first data flow by the fourth port of the second network element
  • the second processing time is the processing time of the second data flow by the fourth port of the second network element. If the fifth network element determines that there is a conflict between the first processing time and the second processing time, then the processing time of the first data flow at the second port of the first network element may be determined.
  • the first processing time is the processing time of the first data flow by the second network element
  • the second processing time is the processing time of the second data flow by the second network element.
  • the first processing time is the processing time of the first data flow by the third port of the second network element
  • the second processing time is the processing time of the second data flow by the third port of the second network element.
  • the first processing time is the processing time of the first data flow by the fourth port of the second network element
  • the second processing time is the processing time of the second data flow by the fourth port of the second network element.
  • the fifth network element may determine the processing time of the first data flow at the first port of the first network element, and determine the processing time of the first data flow at the first port of the first network element The processing time of the second port. For determining the processing time of the first data stream at the second port of the first network element, reference may be made to the content discussed in subcase 5 above, and details are not repeated here.
  • the above-mentioned case 3 and the above-mentioned case 4 can be combined.
  • any of the above-mentioned sub-cases 7 to 9 can be combined with any of the above-mentioned sub-cases 10 to 12. List them all.
  • the embodiment of the present application uses determining the processing time of the first data flow in the first network element and/or the second network element as an example.
  • the fifth network element may also determine the processing time of the second data flow in the first network element.
  • the processing time of the first network element and/or the second network element, the fifth network element may also determine the processing time of the first data flow in the first network element and/or the second network element, and determine the processing time of the second data flow in the first network element and/or the second network element Processing time of a network element and/or a second network element.
  • determining the processing time of the second data flow in the first network element and/or the second network element may refer to the content of determining the processing time of the first data flow in the first network element and/or the second network element discussed above, I won't repeat them here.
  • multiple ways of determining the forwarding information of the first data flow are provided, and the processing time of the same network element for the first data flow and the second data flow can be determined according to the forwarding information Whether there is a conflict provides a way to detect and handle time conflicts. And when a time conflict is detected, the processing time of the first data flow in the first network element and/or the second network element can be flexibly determined, thereby reducing or avoiding the processing time conflict of the same network element for multiple data flows happening.
  • the fifth network element below can be one of NEF, AF, UPF, Ctrl, UE, PCF or SMF, and the fifth network element can Determining the forwarding information in one of ways 5 is taken as an example, and an example of the process of the wireless communication method in the embodiment of the present application is introduced.
  • the fifth network element is the NEF, and the NEF uses address-based learning information in the above method 4 to determine forwarding information.
  • FIG. 6 is a schematic flowchart of the wireless communication method provided by the embodiment of the present application.
  • the first data flow is the uplink data flow
  • the first network element is the UPF
  • the second network element is the UE
  • the forwarding information includes UPF information is used as an example for description.
  • step 601 the UPF sends address learning information to the NEF.
  • the UPF is pre-configured with the address learning information in the DN, or learns the address learning information in the DN based on the address learning mechanism.
  • the address learning information includes the addresses of each network element in the DN and the information of the UPF corresponding to each address.
  • the UPF information includes: one or more items of UPF identifier, UPF instance identifier, or UPF port information.
  • For the address learning mechanism reference may be made to the content discussed above in FIG. 4 , which will not be repeated here.
  • the address learning information in this example is a specific example of the fourth correspondence discussed above.
  • UPF can report the address learning information to NEF, or UPF forwards address learning information to NEF through SMF, or UPF forwards address learning information to NEF through PCF, or UPF forwards address learning information to NEF through SMF and PCF in turn.
  • the embodiment of the application does not limit this.
  • step 602 the AF sends a stream request to the NEF.
  • the flow request may include information of the third network element. If the first data flow is an uplink data flow, then the information of the third network element is the destination address; if the first data flow is a downlink data flow, then the information of the third network element is the source address. It should be noted that, in FIG. 6 , an example is taken in which the stream request includes the destination address.
  • the stream request may also include the time when the first data stream arrives at the UE, or the NEF is pre-configured with the time when the first data stream arrives at the UE.
  • NEF can determine the sending time of UPF to send the first data stream according to the time when the first data stream arrives at the UE and the internal processing delay of 5GS, that is, the first processing time of the first data stream.
  • the first processing time here can be It is understood as the sending time when UPF theoretically sends the first data stream.
  • the internal processing delay of the 5GS may be configured by the AF to the NEF, or pre-configured in the NEF, which is not specifically limited in this embodiment of the present application.
  • the AF may determine the sending time for the UPF to send the first data flow according to the time when the first data flow arrives at the UE and the internal processing delay of the 5GS, and send the first processing time to the NEF.
  • the NEF can obtain the sending time for the UPF to send the second data flow, that is, determine the second processing time.
  • the manner of determining the second processing time may refer to the manner of determining the first processing time discussed above, which will not be repeated here.
  • the NEF may also obtain the information of the third network element by itself, and create a flow request by itself.
  • step 603 the NEF determines UPF information according to the address learning information and the destination address.
  • the NEF After the NEF obtains the address learning information and the destination address, it can determine the information of the UPF corresponding to the destination address from the address learning information.
  • the NEF may send the information of the third network element to the UPF, and the UPF determines the information of the UPF corresponding to the information of the third network element, and The determined UPF information is sent to the NEF.
  • the UPF does not need to report the address learning information, and the UPF only needs to feed back the UPF information corresponding to the information of the third network element to the NEF, thereby relatively reducing the interaction between the UPF and the NEF.
  • the NEF can also obtain the information of the UPF corresponding to the second data stream.
  • the method of determining the information of the UPF corresponding to the second data stream can refer to the method of determining the information of the UPF corresponding to the first data stream discussed above. Let me repeat.
  • step 604 according to the information of the UPF, if the NEF determines that there is a conflict between the first processing time and the second processing time, then determine the sending time of the first data flow in the UPF.
  • the NEF determines that both the first data flow and the second data flow need to be sent from the same port of the UPF, and there is a conflict between the first processing time and the second processing time, it means that the same port of the UPF sends the first data flow and the second data flow. There is a conflict in the time of the data flow. Therefore, the NEF can adjust the arrival time of the first data flow to the UE and/or adjust the delay between the UE and the UPF, which is equivalent to adjusting the sending time of the UPF to send the first data flow.
  • the first processing time is adjusted, and the NEF can determine the adjusted first processing time according to the adjusted time when the first data flow arrives at the UE and/or the adjusted delay between the UE and the UPF,
  • the adjusted first processing time is used as the sending time of the first data flow in the UPF.
  • the time difference between the adjusted first processing time and the first processing time is called an adjustment time
  • the adjustment time may be a specific time adjustment value or a time adjustment interval.
  • the NEF changes the sending time of the first data stream in the UPF, thereby reducing or avoiding the conflict between the sending time of the first data stream in the UPF and the sending time of the second data stream in the UPF.
  • Figure 6 is an example of determining the sending time of the first data stream in the UPF.
  • the NEF can also determine the receiving time of the first data stream in the UPF, the receiving time of the first data stream in the UE, or the first data stream One or more items in the sending time of the stream at the UE, which is not limited in this embodiment of the present application.
  • step 605 the NEF configures egress scheduling information to the UPF.
  • the egress scheduling information includes at least the sending time of the first data flow in the UPF, where the sending time of the first data flow in the UPF refers to the sending time of the first data flow in the UPF determined by the NEF in step 604, which is the adjusted First processing time.
  • the NEF may configure the UPF sending time of the first data flow at the UPF through the PCF, or the NEF may configure the sending time of the first data flow at the UPF to the PCF, and the PCF may send the first data flow at the UPF
  • the sending time of the first data flow is carried in the policy information, and the policy information is forwarded to the UPF.
  • the policy information may also include service quality information and monitoring information.
  • the monitoring information is for example Latency monitoring information, such as the 5GS latency mentioned above.
  • the NEF may configure the sending time of the first data flow to the UPF through the PCF.
  • the NEF may configure the sending time of the first data flow to the UPF through the SMF.
  • the NEF may configure the UPF sending time of the first data flow to the UPF through the PCF and the SMF in sequence, which is not limited in this embodiment of the present application.
  • the NEF When the NEF configures the egress scheduling information to the UPF, it may also configure the flow information of the first data flow to the UPF, so that the UPF sends the first data flow according to the egress scheduling information.
  • the NEF may determine the receiving time of the first data stream at the UE and/or determine the sending time of the first data stream at the UE, then the NEF may determine the receiving time of the first data stream at the UE and/or determine the The first data stream is configured to the UE at the sending time of the UE, and the configuration method for the UE may refer to the configuration method for the UPF above, which will not be repeated here.
  • the NEF may also configure the receiving time of the first data stream at the UPF as the UPF.
  • the scheduling information configured by the NEF for the UPF can be at the granularity of the data flow, which can be understood as NEF configuring the scheduling information corresponding to each data flow for the UPF, and the scheduling information includes egress scheduling information and/or ingress scheduling information, the egress scheduling information includes sending time for indicating the sending data flow, and the ingress scheduling information includes receiving time for indicating the receiving data flow, for example, taking the scheduling information including sending time for indicating the sending data flow as an example, the NEF is The UPF configures the sending time of the first data flow at the UPF, and when the UPF subsequently sends the first data flow, it may send the first data flow according to the sending time of the first data flow at the UPF.
  • the scheduling information configured by the NEF for the UPF may be at the granularity of the port, which means that the NEF may combine the scheduling information of the first data flow corresponding to the port with the scheduling information of other data flows and send it to the UPF, taking the scheduling information as the sending time window as an example, NEF can combine the sending time windows of multiple data streams into one large sending time window, and send it to UPF, and UPF sends multiple data streams based on the combined sending time window.
  • the UPF can flexibly process each data flow with reference to the time configured by the NEF. In this way, it can flexibly coordinate the processing resources of the UPF or the processing time of each data flow while reducing time conflicts.
  • NEF configures port 1 of UPF to send the first data flow and the second data flow respectively at 13:01-13:03. 02 to send the second data stream, and send the first data stream at 13:02-13:03.
  • the scheduling information configured by the NEF for the UPF can be at the granularity of the queue, which means that the NEF can combine the scheduling information of the first data flow in the queue with the scheduling information of other data flows and send it to the UPF
  • the queue can be understood as a certain port of the UPF or a queue for the UPF to send data streams.
  • the scheduling information including the sending time the UPF can obtain the sending time of multiple data streams corresponding to a certain port, and when sending multiple data streams subsequently, it can flexibly schedule multiple data streams according to each sending time.
  • UPF can flexibly send corresponding data streams according to the processing time of the data streams configured by NEF, and flexibly coordinate the sending time of multiple data streams while reducing the time conflicts of data streams, improving the efficiency of UPF sending and receiving data.
  • Stream efficiency to meet the transmission priority requirements of data streams of different services.
  • the NEF configures port 2 of the UPF to start sending the first data flow and the second data flow in the first queue at 11:01, and complete the sending at 11:06.
  • the UPF may send the second data flow at 11:01-11:02, and send the first data flow at 11:04-11:05.
  • step 606 the NEF sends the time when the first data stream arrives at the UE and the adjusted time to the SMF.
  • Step 607 the SMF calculates a time sensitive communication assistant information (TSCAI) according to the time when the first data stream arrives at the UE and the adjustment time.
  • TSCAI time sensitive communication assistant information
  • TSCAI is information used to assist the RAN in scheduling, and refers to the time when the data flow arrives at the network element of the access network. If the first data flow is an uplink data flow, then TSCAI is the time when the UE sends the first data flow to the network element of the access network. Time, if the first data flow is the time when the first data flow arrives at the network element of the access network.
  • the SMF can determine the time when the UE sends the first data stream, that is, the TSCAI, according to the time when the first data stream arrives at the UE, the adjustment time, and the internal processing time of the UE.
  • the TSCAI is obtained by adding the time when the first data stream arrives at the UE, the adjustment time, and the internal processing time of the UE.
  • Step 608 the SMF configures the TSCAI to the RAN.
  • the RAN may schedule the first data flow according to the TSCAI.
  • the RAN may schedule the first data flow with reference to the adjusted TACAI, so as to reduce or avoid the time conflict between the first data flow and the second data flow in the RAN.
  • step 609 the NEF sends to the AF the sending time of the first data stream at the UPF.
  • the sending time of the first data flow in the UPF in step 609 refers to the adjusted first processing time above.
  • the NEF sends the first data flow to the AF at the sending time of the UPF, and the AF can refer to the sending time of the first data flow at the UPF to determine the time for other network elements to process the data flow.
  • Other network elements refer to the network elements other than the UPF A network element, for example, a terminal device or a forwarding node in a DN.
  • the time when other network elements process the data flow includes: the time when other network elements receive the first data flow, the time when other network elements forward the first data flow, or the time when other network elements give feedback on the first data flow, etc. item.
  • the AF can subsequently determine the time when the next data flow arrives at the UE or the UPF according to the time when other network elements send and receive the first data flow.
  • the NEF may feed back to the AF the time when the first data flow arrives at the UE, and the sending time of the first data flow at the UPF.
  • the AF can combine the time when the first data flow arrives at the UE, the delay between the UE and the UPF, and the delay between other network elements to determine the processing time for other network elements to process the first data flow, and other network elements to process the first data flow.
  • the processing time of a data flow may be the time when other network elements send and/or receive the first data flow.
  • steps 601 to 603 are optional parts
  • step 605 is an optional step
  • steps 606 to 608 are optional parts
  • step 609 is an optional step.
  • the NEF can determine the forwarding information corresponding to the address learning information according to the information of the third network element of the first data flow, so as to judge the first data flow and the second data flow according to the forwarding information Whether there is a conflict in the sending time on the same port of the UPF provides a solution for detecting time conflicts, and when a time conflict is detected, the first network element or the second network element can be adjusted to process the first data flow time to reduce or avoid the time conflict problem of multiple data streams in UPF.
  • the NEF can also feed back the adjusted processing time to the SMF, so that the SMF can calculate the time when the adjusted first data flow arrives at the RAN, so that the RAN can perform data processing based on the adjusted time when the first data flow arrives at the RAN.
  • Stream scheduling to reduce or avoid the conflict of processing time of multiple data streams in the RAN.
  • the fifth network element is Ctrl, and Ctrl uses the address-based learning information in the above method 4 to determine the forwarding information:
  • FIG. 7 is a schematic flowchart of the wireless communication method provided by the embodiment of the present application.
  • the first data flow is the downlink data flow
  • the first network element is UPF
  • the second network element is UE
  • the forwarding information includes UE information as an example.
  • step 701 the UPF sends address learning information to Ctrl through the PCF.
  • the address learning information shown in FIG. 7 includes the correspondence between the information of the third network element and the information of the corresponding UE, which is an example of the fourth correspondence mentioned above.
  • the UPF may forward the address learning information to Ctrl through the SMF and PCF in sequence, or in the case that the Ctrl and UPF can communicate directly, the UPF may directly send the address learning information to Ctrl.
  • Step 702 Ctrl receives a flow request from the AF through the NEF.
  • the meaning of the stream request can refer to the content discussed above, and will not be repeated here.
  • FIG. 7 an example is taken in which the flow request includes the source address.
  • Ctrl can receive flow requests from AF without NEF intermediary at this time, reducing interaction in the communication system.
  • Step 703 Ctrl determines UE information according to the address learning information and the source address.
  • step 704 according to the information of the UE, if it is determined that there is a conflict between the first processing time and the second processing time, the Ctrl determines the sending time of the first data stream in the UE.
  • the first processing time is the sending time when the UE sends the first data stream
  • the second processing time is the sending time when the UE sends the first data stream.
  • the first processing time and the second processing time can be determined with reference to the content discussed in FIG. 4 , I won't repeat them here. If Ctrl determines that there is a conflict between the first processing time and the second processing time, then the first processing time may be adjusted to obtain the sending time of the first data stream in the UE, that is, the adjusted first processing time.
  • Step 705a Ctrl configures the sending time of the first data flow in the UE, the time when the first data flow arrives at the UPF, and the adjustment time to the SMF.
  • Ctrl can configure the sending time of the first data flow at the UE, the time when the first data flow arrives at the UPF, and the adjustment time through the PCF to the UPF, or Ctrl can use the PCF and SMF in turn to configure the first data flow at the UPF.
  • the sending time of the UE, the time when the first data stream arrives at the UPF, and the adjustment time are configured to the UPF, or Ctrl can configure the sending time of the first data stream at the UE, the time when the first data stream arrives at the UPF, and the adjustment time through NEF
  • this embodiment of the present application does not limit it.
  • step 705b the SMF configures the sending time of the first data stream to the UE.
  • the UE After the UE receives the first data stream at the sending time of the UE, it can send the first data stream according to the sending time. Since the NEF adjusts the sending time of the first data stream at the UE, the first data stream can be reduced or avoided. The problem that the transmission time of the UE stream and the second data stream collides with each other.
  • step 706 the SMF calculates the TSCAI according to the time when the first data flow arrives at the UPF and the adjustment time.
  • TSCAI can refer to the content discussed above, and will not be repeated here.
  • the SMF can calculate the TSCAI according to the time when the first data flow arrives at the UPF, the adjustment time, and the time delay between the UPF and the RAN. For example, the SMF may use the sum of the time when the first data flow arrives at the UPF, the adjustment time, and the delay between the UPF and the RAN as the TSCAI, that is, the time when the first data flow arrives at the RAN.
  • Step 707 the SMF configures the TSCAI to the RAN.
  • Step 708, Ctrl sends the first data stream to the AF through the NEF at the sending time of the UE.
  • step 701 is an optional step
  • step 702 is an optional step
  • step 705 is an optional step
  • steps 706-707 are optional parts
  • step 708 is an optional step.
  • the forwarding information of the first data flow can be determined through the fourth network element Ctrl, and according to the forwarding information, it is determined whether multiple data flows conflict at the processing time of the UE, and a method for detecting conflict is provided. Moreover, when it is determined that there is a conflict in time for processing multiple data streams by the same network element, the processing time for processing the first data stream by the network element is adjusted, so as to reduce or avoid the problem of time conflict among multiple data streams in the UE. Further, Ctrl can also feed back the adjusted time etc. to the SMF, so that the SMF can calculate the time when the adjusted first data flow arrives at the RAN, so that the RAN can schedule the data flow according to the adjusted time when the first data flow arrives at the RAN.
  • FIG. 6 and FIG. 7 are respectively introduced by taking the fifth network element as NEF and Ctrl as an example. If the fifth network element is AF, UPF, UE, PCF or SMF, the process of the wireless communication method involved can be Refer to the content discussed above, and will not repeat it here.
  • the fifth network element is the NEF, and the NEF uses the above method 4 to determine the forwarding information based on the first topology information:
  • FIG. 8 is a schematic flowchart of a wireless communication method provided by an embodiment of the present application.
  • FIG. 8 uses the first data stream as the uplink data stream, the first network element as UPF, the second network element as UE, and the forwarding information includes UE information as an example.
  • step 801 the NEF maintains third topology information.
  • the first network element is UPF
  • the second network element is UE as an example for introduction.
  • the NEF may maintain third topology information corresponding to the UPF, where the third topology information includes the connection relationship between the UPF and its adjacent network elements.
  • the NEF may also maintain the third topology information corresponding to the UE, where the third topology information includes the connection relationship between the UE and its adjacent network elements.
  • Step 802 the AF sends the second topology information to the NEF.
  • the NEF After the NEF obtains the third topology information and the second topology information, it is equivalent to obtaining the first topology information.
  • step 803 the NEF receives the flow request.
  • the flow request includes information of the third network element. If the first data flow is an uplink data flow, then the information of the third network element is the information of the network element receiving the data flow from the UPF, that is, the information of the destination device; if the first data flow is a downlink data flow, then the third network element It is the information of the network element that sends the data flow to the UPF, that is, the information of the source device.
  • the flow request may also include information of the UE and/or information of devices in the user network on the UE side, so as to determine session information for forwarding the first data flow during subsequent transmission of the first data flow.
  • the stream request may be created locally by the NEF.
  • the NEF does not need to perform step 803, that is, does not need to receive the stream request from the AF.
  • Step 804 the NEF determines the information of the UPF corresponding to the information of the third network element according to the first topology information.
  • the NEF determines that the information of the third network element corresponds to the information of the first network element processing the first data flow and/or the information of the second network element, for example, the port of the UPF sending the first data flow information.
  • the NEF may also determine the session information for forwarding the first data flow according to the identity of the UE, and/or the information of the equipment in the user network on the UE side, and the third topology information, and further determine the session information of the UE that processes the first data flow. port information.
  • the NEF may maintain the first topology information, obtain the information of the third network element from the AF, or have the information of the third network element itself with the first data flow, and the NEF , to determine the forwarding information corresponding to the information of the third network element.
  • the NEF does not need to obtain the second topology information from the AF, and the signaling interaction between the AF and the NEF is relatively reduced.
  • step 805 the NEF determines forwarding rules.
  • the NEF can create a forwarding rule of the UPF, and the forwarding rule includes the information of the UPF that processes the first data flow (for example, when the first data flow is an uplink data flow, the UPF information includes the identifier of the port of the UPF that sends the first data flow, or for example , when the first data flow is a downlink data flow, the UPF information includes an identifier of a port of the UPF that receives the first data flow).
  • the forwarding rule further includes flow information of the first data flow, and the flow information includes an identifier of the first data flow and/or a flow characteristic of the first data flow.
  • the identifier and/or flow characteristic of the first data flow may be assigned by the NEF to the first data flow.
  • step 806 the NEF configures forwarding rules to the UPF.
  • the NEF can create a forwarding rule and configure the forwarding rule to the UPF.
  • Configuring the forwarding rule to the UPF For example, the NEF directly sends the forwarding rule to the UPF, or configures the forwarding rule to the UPF through the PCF or SMF, which is not limited in this embodiment of the present application.
  • the UPF After the UPF obtains the forwarding rules, it can receive or send data flows according to the forwarding rules.
  • the NEF does not need to create the forwarding rule separately, and the NEF does not need to configure a forwarding rule for the UPF.
  • the UPF may assign an identifier to the first data flow.
  • step 807 the NEF determines, according to the information of the UPF, that there is a conflict between the first processing time and the second processing time, and then determines the receiving time of the first data stream at the UE.
  • the manner of determining the first processing time and the second processing time, and the manner of determining the receiving time of the first data stream at the UE may refer to the content discussed above in FIG. 6 , which will not be repeated here.
  • the actual NEF may also determine the receiving time of the first data stream at the UPF, the sending time of the first data stream at the UPF, and the time at which the first data stream is received at the UPF.
  • the sending time of the first data stream at the UPF may also determine the receiving time of the first data stream at the UPF, the sending time of the first data stream at the UPF, and the time at which the first data stream is received at the UPF.
  • Step 808 the NEF configures ingress scheduling information to the UE through the PCF.
  • the ingress scheduling information includes the receiving time of the first data flow in the UE.
  • the manner of configuring the ingress scheduling information can refer to the content discussed above in FIG. 6 , which will not be repeated here.
  • Step 809 the NEF sends the time when the first data stream arrives at the UE and the adjusted time to the SMF.
  • the time for sending the first data stream to the UE and the manner of adjusting the time can refer to the content discussed in FIG. 6 above, and details are not repeated here.
  • step 810 the NEF calculates the TSCAI according to the arrival time of the first data stream at the UE and the adjustment time.
  • the manner of calculating the TSCAI may refer to the content discussed in FIG. 6 above, and will not be repeated here.
  • Step 811 SMF configures TSCAI to RAN.
  • step 812 the NEF feeds back the ingress scheduling information to the AF.
  • steps 801-803 are optional parts
  • steps 805-806 are optional parts
  • step 808 is an optional step
  • steps 809-811 are optional parts
  • step 812 is an optional step .
  • the NEF can determine the forwarding information corresponding to the data flow through the topology information, and then judge whether there is a conflict in the time when the UPF processes multiple data flows according to the forwarding information, and if there is a conflict, process the first data flow for the UE
  • the processing time of the stream is adjusted to reduce or avoid time conflicts.
  • the NEF can also feed back the adjusted time to the SMF, so that the SMF can calculate the time when the adjusted first data flow arrives at the RAN, so that the RAN can perform data flow scheduling according to the adjusted time when the first data flow arrives at the RAN.
  • the above embodiment shown in FIG. 8 is introduced by taking the fifth network element as NEF as an example.
  • the fifth network element is AF, UPF, UE, PCF, Ctrl or SMF
  • the process of the wireless communication method involved can also refer to The content discussed above in FIG. 8 will not be repeated here.
  • the fifth network element is UPF:
  • FIG. 9 is a schematic flowchart of the wireless communication method provided by the embodiment of the present application.
  • the first data flow is the downlink data flow
  • the first network element is UPF
  • the second network element is UE
  • the forwarding information includes UPF information as an example.
  • step 901 the NEF obtains a flow request from the AF.
  • the stream request may include the relevant information discussed above, and the meaning of the relevant information may refer to the content discussed above, which will not be repeated here.
  • step 902 the NEF allocates the identifier and/or flow characteristics of the first data flow.
  • the relevant information obtained in step 901 includes the identifier of the first data flow, NEF does not need to assign an identifier to the first data flow, and the meaning of the flow characteristics can refer to the content discussed above, which will not be repeated here. If the relevant information obtained in step 901 If the information includes the information of the third network element, the NEF does not need to allocate the information of the third network element to the first data flow.
  • step 903 the UPF obtains relevant information from the NEF.
  • the UPF may obtain one or more of the session information, the information of the first network element, the information of the second network element, and the index information from the NEF, which is not limited in this application.
  • Step 904 the UPF determines the UPF information corresponding to the related information.
  • the manner in which the UPF determines the information of the UPF may refer to any manner of determining the forwarding information discussed above in FIG. 4 , which will not be repeated here.
  • step 905 the UPF determines, according to the information of the UPF, that there is a conflict between the first processing time and the second processing time, and then determines the receiving time of the first data stream at the UPF.
  • the first processing time is the sending time of the UPF sending the first data stream
  • the second processing time is the sending time of the UPF sending the second data stream.
  • the first processing time and the second processing time can be determined by referring to the content discussed in Figure 4 above. I won't repeat them here. If the UPF determines that there is a conflict between the first processing time and the second processing time, the UPF may re-determine the receiving time for the UPF to receive the first data stream, so as to reduce or avoid time conflicts when the UPF processes multiple data streams.
  • the UPF may also adjust the sending time for the UPF to send the first data flow, that is, adjust the first processing time, so as to obtain the adjusted first processing time.
  • step 906 the UPF allocates an identifier of the first data flow.
  • step 903 If the relevant information obtained in step 903 includes the identifier of the first data flow, or the NEF assigns an identifier to the first data flow, then the UPF does not need to perform step 906.
  • the UPF configures the time when the first data flow arrives at the UPF and the adjustment time to the SMF.
  • Step 908 the SMF calculates the TSCAI according to the arrival time of the first data stream at the UE and the adjustment time.
  • Step 909 the SMF configures the TSCAI to the RAN.
  • Step 910 the NEF sends the receiving time of the first data stream at the UE to the AF.
  • step 910 in addition to sending the receiving time of the first data flow at the UE to the AF, the sending time of the UPF sending the first data flow may also be sent.
  • step 902 is an optional step
  • step 906 is an optional step
  • steps 907-909 are optional steps
  • step 910 is an optional step.
  • the UPF can obtain relevant information from the NEF, determine the forwarding information of the first data flow, and determine whether the processing time of the UPF for processing the first data flow conflicts with the processing time of other data flows according to the forwarding information, If a conflict is detected, the processing time of the UPF for processing the first data flow is adjusted to reduce or avoid the situation of time conflict at the UPF. Further, the UPF can also feed back the adjusted time to the SMF, so that the SMF can calculate the time when the adjusted first data flow arrives at the RAN, so that the RAN can perform data flow scheduling according to the adjusted time when the first data flow arrives at the RAN.
  • the above-mentioned embodiment shown in FIG. 9 is introduced by taking the fifth network element as UPF as an example.
  • the fifth network element is AF, UPF, UE, PCF, or SMF
  • the process of the wireless communication method involved can also refer to the foregoing The content of the discussion will not be repeated here.
  • FIGS. 6-9 are examples for the fifth network element to determine the forwarding information through the above-mentioned method 1.
  • the following uses the above-mentioned method 2 for the fifth network element to determine the forwarding information as an example.
  • the process of the wireless communication method involved is described with an example.
  • the fifth network element is NEF, and NEF obtains forwarding information from AF:
  • FIG. 10 is a schematic flow diagram of a wireless communication method provided by an embodiment of the present application.
  • FIG. 10 uses the first data stream as the uplink data stream, the first network element as UPF, the second network element as UE, and the forwarding information includes UPF information as an example, the flowchart includes the following steps:
  • Step 1001 the AF determines the information of the UPF according to the first topology information and the information of the third network element.
  • the first topology information may be maintained by the AF itself, and the meanings of the first topology information and the information of the third network element may refer to the content discussed above, which will not be repeated here.
  • Step 1002 AF sends UPF information to NEF.
  • step 1003 the NEF determines, according to the information of the UPF, that there is a conflict between the first processing time and the second processing time, and then determines the sending time of the first data stream in the UPF.
  • step 1004 the NEF creates forwarding rules.
  • Step 1005 NEF configures forwarding rules to UPF.
  • step 1006 the NEF configures the sending time of the first data stream to the UPF through the PCF.
  • Step 1007 the NEF sends the time when the first data stream arrives at the UE and the adjusted time to the SMF.
  • Step 1008 the SMF calculates the TSCAI according to the time when the first data flow arrives at the UE and the adjustment time.
  • TSCAI and the method of calculating TSCAI can refer to the content discussed above, and will not be repeated here.
  • Step 1009 the SMF configures the TSCAI to the RAN.
  • Step 1010 the NEF feeds back the sending time of the first data flow in the UPF to the AF.
  • steps 1004-1005 are optional parts
  • step 1006 is an optional step
  • steps 1007-1009 are optional parts
  • step 1010 is an optional step.
  • the AF can determine the forwarding information according to the topology information, and the NEF can directly obtain the forwarding information from the AF. Whether the flow and the second data flow conflict in the processing time of the UPF, since the NEF does not need to determine the forwarding information, the processing amount of the NEF is relatively reduced. Moreover, when it is detected that there is a conflict in the processing time of the UPF for processing multiple data streams, the sending time of the UPF for sending the first data stream may be adjusted, so as to reduce or avoid the time conflict of the UPF for processing multiple data streams.
  • the above-mentioned embodiment shown in FIG. 10 is introduced by taking the fifth network element as NEF as an example.
  • the fifth network element is UPF, UE, PCF, SMF or Ctrl
  • the process of the wireless communication method involved can also refer to the previous discussion.
  • the content of will not be repeated here, and
  • Figure 10 is an example of AF determining forwarding information, Ctrl, UE, PCF or SMF, etc. can also refer to the process shown in Figure 10, and will not be repeated here.
  • the fifth network element is NEF, and NEF obtains forwarding information from UPF:
  • FIG. 11 is a schematic flow diagram of a wireless communication method provided by an embodiment of the present application.
  • the first data stream is used as the downlink data stream
  • the first network element is UPF
  • the second network element is UE
  • the forwarding information includes UPF information as an example.
  • Step 1101 NEF receives flow request from AF.
  • the stream request includes relevant information, and the meaning of the relevant information can refer to the content discussed above, and will not be repeated here.
  • step 1102 the NEF allocates the identifier and/or flow characteristics of the first data flow.
  • step 1103 the NEF sends relevant information to the UPF.
  • Step 1104 the UPF determines the UPF information corresponding to the related information.
  • Step 1105 the UPF sends the UPF information to the NEF.
  • step 1106 the NEF determines that there is a conflict between the first processing time and the second processing time according to the information of the UPF, and then determines the receiving time of the first data flow in the UPF and the sending time of the first data flow in the UE.
  • the first processing time is the receiving time when the UPF receives the first data flow
  • the second processing time is the receiving time when the UE receives the second data flow.
  • step 1107 the NEF allocates the identifier of the first data flow.
  • step 1108a the NEF configures the ingress scheduling information to the UPF.
  • the ingress scheduling information includes configuring the receiving time of the first data flow to the UPF at the UPF.
  • step 1108b the NEF configures the egress scheduling information to the UE.
  • the egress scheduling information includes the sending time of the first data flow in the UE.
  • step 1109 the NEF configures the time when the first data flow arrives at the UE and the adjustment time to the SMF.
  • Step 1110 the SMF calculates the TSCAI according to the time when the first data flow arrives at the UE and the adjustment time.
  • Step 1111 SMF configures TSCAI to RAN.
  • Step 1112 the AF configures egress scheduling information and ingress scheduling information to the NEF.
  • the UPF can determine the forwarding information corresponding to the first data flow, and the NEF obtains the forwarding information from the UPF, and according to the forwarding information, determines the time when the UPF processes the first data flow and the second data flow Conflict, provides a way to detect time conflicts, and when it is determined that the processing time of the first data flow and the second data flow conflict in the UPF, re-determine the sending time of the first data flow in the UPF, thereby reducing or avoiding the second A data flow and a second data flow collide at the time of the UPF.
  • step 1102 is an optional step
  • step 1107 is an optional step
  • step 1108a is an optional step
  • step 1108b is an optional step
  • steps 1109-step 1111 are optional parts
  • step 1112 is Optional step.
  • the UPF can determine the forwarding information, and the NEF can obtain the forwarding information from the UPF, so that the NEF does not need to determine the forwarding information, which relatively reduces the processing load of the NEF, and detects the first data flow and the second data flow according to the forwarding information Whether the processing time of the data flow in the UPF conflicts, since the NEF does not need to determine the forwarding information, the processing amount of the NEF is relatively reduced.
  • the receiving time for the UPF to send the first data stream can be determined, so as to reduce or avoid the time conflict for the UPF to process multiple data streams, and it can also be determined that the UE sends the first data stream.
  • the sending time of a data stream so as to reduce or avoid the time conflict of UE processing multiple data streams.
  • FIG. 11 takes the fifth network element as NEF as an example.
  • the fifth network element is AF, UE, PCF Ctrl, or SMF
  • the process of the wireless communication method involved can also refer to the previous figure The content discussed in 11 will not be repeated here.
  • FIG. 11 takes UPF to determine the forwarding information as an example.
  • the method of determining forwarding information such as AF, Ctrl, UE, PCF or SMF can also refer to the process shown in Figure 11. Here No longer.
  • FIG. 12 is a schematic structural diagram of a possible communication device provided by an embodiment of the present application.
  • the communication device shown in FIG. 12 can be used to implement the network open network element, application function network element, session management network element, policy control network element, access network network element, user plane function network element, fourth functions of network elements or terminal equipment, therefore, the beneficial effects of the foregoing method embodiments can also be realized.
  • the communication device shown in FIG. 12 can be used to implement the network open network element, application function network element, session management network element, policy control network element, access network network element, user plane function network element, fourth functions of network elements or terminal equipment, therefore, the beneficial effects of the foregoing method embodiments can also be realized.
  • the 12 may be an open network element or a chip system with the function of an open network element, or may be an application function network element or a chip with the function of an application function network element system, or it may be a session management network element or a chip system with a session management network element function, or it may be a policy control network element or a chip system with a policy control network element function, or it may be an access network element or a chip system with a A chip system that functions as a network element of the access network, or may be a user plane functional network element or a chip system that has the function of a user plane functional network element, or may be a fourth network element or a chip system that has the function of a fourth network element , or may be a terminal device or a system-on-a-chip with the functions of a terminal device.
  • a communication device 1200 includes a transceiver unit 1201 and a processing unit 1202 .
  • the communication device 1200 can be used to realize the function of the fifth network element in the method embodiment shown in FIG. 4, FIG. 6, FIG. 7, FIG. 8, FIG. 9, FIG. 10 or FIG. 11, specifically For functions, refer to the descriptions in the foregoing method embodiments.
  • the communication device 1200 can be used to realize the function of NEF in the method embodiment shown in FIG. 6, the function of Ctrl in the method embodiment shown in FIG. 7, the function of NEF in the method embodiment shown in FIG.
  • the transceiver unit 1201 in the communication device 1200 is an optional unit.
  • the communication device 1200 may be used to realize the function of AF in the method embodiment shown in FIG. 10 , and for specific functions, please refer to the description in the foregoing method embodiment.
  • the communication device 1200 may be used to realize the function of the UPF in the method embodiment shown in FIG. 11 , and for specific functions, refer to the description in the foregoing method embodiment.
  • FIG. 13 is a schematic structural diagram of a possible communication device provided by an embodiment of the present application.
  • the communication device shown in FIG. 13 can be used to implement the network open network element, application function network element, session management network element, policy control network element, access network network element, user plane function network element, fourth functions of network elements or terminal equipment, therefore, the beneficial effects of the foregoing method embodiments can also be realized.
  • the specific possible form of the communication device shown in Figure 13 can refer to the specific possible form of the communication device shown in Figure 12 above, and will not be repeated here.
  • a communication device 1300 includes a processor 1301 and an interface 1302 .
  • the processor 1301 and the interface 1302 are coupled to each other. It can be understood that the interface 1302 may be a transceiver or an input-output interface.
  • the communication device 1300 may include one or more processors 1301, and the processors 1301 may also be referred to as processing units, and may implement certain control functions.
  • the processor 1301 may be a general-purpose processor or a special-purpose processor. For example, including: baseband processor, central processing unit, etc.
  • the baseband processor can be used to process communication protocols and communication data.
  • the central processing unit may be used to control the communication device 1300, execute software programs and/or process data.
  • Different processors may be independent devices, or may be arranged in one or more processing circuits, for example, integrated on one or more application-specific integrated circuits.
  • the communication device 1300 includes one or more memories 1303 for storing instructions, and the instructions can be executed on the processor, so that the communication device 1300 executes the methods described in the foregoing method embodiments.
  • the memory 1303 in the communication device 1300 is an optional component, which is illustrated by a dashed box in FIG. 13 .
  • data may also be stored in the memory 1303 .
  • the processor and memory can be set separately or integrated together.
  • the communication device 1300 may further include a memory 1303 for storing instructions executed by the processor 1301 or storing input data required by the processor 1301 to execute the instructions or storing data generated after the processor 1301 executes the instructions.
  • the communication device 1300 when the communication device 1300 is used to implement the method embodiment shown in FIG. 4, FIG. 6, FIG. 7, FIG. 8, FIG. 9, FIG. 10 or FIG. 11, the communication device 1300 can be used to implement the 4. Functions of the fifth network element in the method embodiments shown in FIG. 6, FIG. 7, FIG. 8, FIG. 9, FIG. 10 or FIG.
  • the communication device 1300 may be used to realize the function of AF in the method embodiment shown in FIG. 10 , and for specific functions, please refer to the description in the foregoing method embodiment.
  • the communication device 1300 may be used to realize the function of the UPF in the method embodiment shown in FIG. 11 , and for specific functions, refer to the description in the foregoing method embodiment.
  • the functions of the transceiver unit 1201 may be realized through the interface 1302 , and the functions of the processing unit 1202 may be realized through the processor 1301 .
  • the method steps in the embodiments of the present application may be implemented by means of hardware, or may be implemented by means of a processor executing software instructions.
  • Software instructions can be composed of corresponding software modules, and software modules can be stored in random access memory, flash memory, read-only memory, programmable read-only memory, erasable programmable read-only memory, electrically erasable programmable read-only Memory, registers, hard disk, removable hard disk, compact disc read-only memory (CD-ROM) or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium.
  • the storage medium may also be a component of the processor.
  • the processor and storage medium can be located in the ASIC.
  • the ASIC can be located in the base station or the terminal.
  • the processor and the storage medium may also exist in the base station or the terminal as discrete components.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product comprises one or more computer programs or instructions. When the computer program or instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are executed in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, a base station, user equipment or other programmable devices.
  • the computer program or instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program or instructions may be downloaded from a website, computer, A server or data center transmits to another website site, computer, server or data center by wired or wireless means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrating one or more available media.
  • the available medium may be a magnetic medium, such as a floppy disk, a hard disk, or a magnetic tape; it may also be an optical medium, such as a digital video disk; and it may also be a semiconductor medium, such as a solid state disk.
  • the computer readable storage medium may be a volatile or a nonvolatile storage medium, or may include both volatile and nonvolatile types of storage media.
  • the computer software product is stored in a storage medium, and includes several instructions to enable a computer device (which may be a personal computer, server, or network device, etc.) to execute all or part of the steps of the methods described in various embodiments of the present application.
  • the aforementioned computer-readable storage medium may be any available medium that can be accessed by a computer.
  • computer-readable media can include random access memory (random access memory, RAM), read-only memory (read-only memory, ROM), or can be used to carry or store instructions or data structures desired program code in the form of any other medium that can be accessed by a computer.
  • random access memory random access memory
  • read-only memory read-only memory
  • ROM read-only memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种无线通信方法及装置,涉及通信技术领域。确定第一数据流的转发信息,该转发信息表示用于转发第一数据流的网元的信息。从而可以根据第一数据流的转发信息,确定同一个网元处理第一数据流和第二数据流的处理时间是否存在冲突。本申请提供了一种检测处理时间冲突的解决方案,且在检测到第一数据流和第二数据流的处理时间存在冲突时,可以确定第一数据流的处理时间,从而减少多个数据流在同一个网元的处理时间的存在冲突的情况。

Description

一种无线通信方法及装置
相关申请的交叉引用
本申请要求在2021年06月04日提交中国专利局、申请号为202110622488.1、申请名称为“一种无线通信方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及无线通信技术领域,尤其涉及一种无线通信方法及装置。
背景技术
在基于第五代移动通信系统(the 5th generation system,5GS)的确定性传输方案中,网络能力开放(network exposure function,NEF)网元可以获得数据流到达5GS的入口网元的时间,并可根据数据流到达入口网元的时间确定5GS的出口网元发送该数据流的时间,进而将出口网元发送该数据流的时间配置给出口网元,该出口网元可以据此发送该数据流。
5GS的网元可能处理多个数据流,则一个网元对于不同的数据流的处理时间可能产生冲突,而目前尚无能够检测这种冲突的方案。
发明内容
本申请实施例提供一种无线通信方法及装置,用于提供一种检测多个数据流是否存在时间冲突的方法。
第一方面,本申请实施例提供一种无线通信方法,该方法可以由第五网元执行,或者可以由芯片系统执行,该芯片系统可以实现第五网元的功能。第五网元例如为网络开放功能网元、应用功能网元、用户面功能网元、会话管理功能网元、策略控制功能、第四网元或终端设备等。为了便于描述,下文中以第五网元执行该方法为例进行说明。该方法包括:确定第一数据流的转发信息,该转发信息包括用于转发第一数据流的第一网元的信息和/或第二网元的信息;如果第一处理时间与第二数据流的第二处理时间存在冲突,则确定该第一数据流在该第一网元的处理时间和/或该第二网元的处理时间,其中,该第一处理时间为该第一网元处理该第一数据流的时间,该第二处理时间为该第一网元处理该第二数据流的时间,或者,该第一处理时间为该第二网元处理该第一数据流的时间,该第二处理时间为该第二网元处理该第二数据流的时间。
在本申请实施例中,第五网元可以确定转发第一数据流的网元的信息,即转发信息。在确定第一数据流的转发信息之后,根据第一数据流的转发信息,确定同一个网元对第一数据流的第一处理时间和对第二数据流的处理时间是否存在冲突,提供了一种检测多个数据流是否存在时间冲突的机制。且,在确定第一数据流和第二数据流存在时间冲突的情况下,可以确定第一数据流在第一网元的处理时间,和/或确定第一数据流在第二网元的处理时间,这样相当于改变了第一网元和/或对第一数据流的处理时间,从而减少同一个网元对多个数据流的处理时间存在冲突的情况,提供了一种解决多个数据流在同个网元的处理时间冲突的方案。且,由于减少同一个网元对多个数据流的处理时间的冲突情况,对应可以减少同一个网元因时间冲突而导致的数据流发送或接收失败,或者数据流发送或接收不完 整的情况,因此提高了同一个网元成功接收和/或发送多个数据流的可能性,提高了同一个网元传输数据流的可靠性,对应地,提升了该网元所在的整个通信网络的可靠性。
在一种可能的实施方式中,提供了两种确定第一数据流的转发信息的方式,第一种方式第五网元可以从用户面功能网元、网络开放功能网元、应用功能网元、第一网元或第二网元接收该转发信息;第二种方式中第五网元可以根据第一数据流的相关信息确定该转发信息,该相关信息包括会话信息、该第一网元的信息、该第二网元的信息、流信息中的一项或多项,该流信息为第三网元的信息或该第一数据流的标识,该第三网元为该第一数据流的目的设备或源设备。
在该实施方式的第一种方式中,第五网元可以直接从其他网元接收该转发信息,相对简化第五网元确定转发信息的过程;在该实施方式的第二种方式中,第五网元可以灵活地根据第一数据流的相关信息中的一项或多项,确定该转发信息,丰富了确定转发信息的方式。
在一种可能的实施方式中,提供了根据第一数据流的相关信息中的具体信息确定转发信息的多种方式,包括:如果该相关信息包括会话信息,则确定与该会话信息对应的转发信息,会话信息例如,会话的标识和/或会话的地址等,例如,会话信息与第一网元的信息关联,和/或会话信息与第二网元的信息关联,那么第五网元可以确定与该会话信息相应的转发信息;或,如果相关信息包括该第一网元的信息,则确定与该第一网元的信息对应的转发信息,例如,第五网元可以将该第一网元的信息作为转发信息,或者第一网元的信息与第二网元的信息关联,因此第五网元可以根据第一网元的信息,确定第二网元的信息,将确定出的第二网元的信息作为转发信息,或者第五网元可以将相关信息包括的第一网元的信息和确定出的第二网元的信息作为转发信息;或,如果相关信息包括第二网元的信息,则确定与该第二网元的信息对应的转发信息,例如,第五网元可以将该第二网元的信息作为转发信息,或者第一网元的信息与第二网元的信息关联,因此第五网元可以根据第二网元的信息,确定第一网元的信息,将确定出的第一网元的信息作为转发信息,或者第五网元可以将相关信息包括的第二网元的信息和确定出的第一网元的信息作为转发信息;或者如果相关信息包括流信息,则确定与该流信息对应的转发信息,流信息的含义可以参照前文,此处不再赘述,例如,流信息包括第一数据流的标识,该第一数据流的标识与转发信息关联,因此第五网元在获得第一数据流的标识之后,可以确定与该第一数据流的标识相应的转发信息。
在该实施方式中,第五网元可以根据相关信息中的任意一项或多项信息,确定转发信息,丰富了确定转发信息的方式,提高了确定转发信息的灵活性。
在一种可能的实施方式中,确定与该流信息对应的转发信息,包括:根据该流信息和转发信息之间的对应关系,确定该流信息对应的该转发信息,流信息与转发信息之间的对应关系例如,地址学习信息,地址学习信息例如,第三网元的地址与转发信息之间的对应关系,例如,第五网元预存有该地址学习信息,在第五网元确定第一数据流的目的设备的地址之后,可以从该地址学习信息中,确定与该目的设备的地址对应的转发信息。
在该实施方式中,第五网元可以预先确定或从其他网元接收流信息与转发信息之间的对应关系,从而后续可以直接根据流信息确定出相应的转发信息,确定转发信息的逻辑较为简单。
在一种可能的实施方式中,提供了一种确定该流信息与转发信息之间的对应关系的方 式,具体可以从用户面功能网元接收该流信息与该转发信息之间的对应关系。
在该实施方式中,第五网元可以直接从用户面功能网元直接接收该流信息与该转发信息之间的对应关系,简化了第五网元获得该对应关系的过程。
在一种可能的实施方式中,提供了两种接收第三网元的信息的方式,第一种:从应用功能网元接收第三网元的信息,例如,第五网元为网络开放功能网元,那么网络开放功能网元可以从应用功能网元接收第三网元的信息;第二种:从网络开放功能网元接收第三网元的信息,例如,第五网元为用户面功能网元,那么用户面功能网元可以从网络开放功能网元接收第三网元的信息。
在该实施方式中,第五网元可以从应用功能网元或网络开放功能网元接收第三网元的信息,提供了第五网元接收第三网元的信息的多种来源,使得第五网元可以更灵活地接收第三网元的信息,也就降低了第五网元接收第三网元的信息的难度,对应也就降低了第五网元基于第三网元的信息确定转发信息的难度。
在一种可能的实施方式中,该流信息包括第三网元的信息,那么可以根据第一拓扑信息,确定与该第三网元信息对应的该转发信息,第一拓扑信息包括第一网元与至少一个网元之间的连接信息,和/或包括第二网元与至少一个网元之间的连接信息,至少一个网元至少包括第三网元。
在该实施方式中,第五网元可以确定了第一数据流的第三网元的信息,可以根据第一网元和/或第二网元与第三网元之间的拓扑关系,从而确定与该第三网元存在连接关系的第一网元和/或第二网元,由于各个数据流对应的第三网元可能各不相同,而拓扑关系可以涵盖多个网元,因此采用该实施方式中的这种方式可以适用于确定各个数据流的转发信息,使得该实施方式中确定该转发信息的方式的应用范围较为广泛。且,拓扑关系还可以包括网元与网元之间的端口连接关系,因此采用该实施方式中的这种方式还可以更为确定出第一网元和/或第二网元的端口的信息,从而便于第五网元可以具体检测多个数据流在第一网元和/或第二网元的端口的处理时间是否存在冲突。
在一种可能的实施方式中,提供了一种获取第一拓扑信息的方式,该方式中,可以从应用功能网元接收第二拓扑信息,该第二拓扑信息为至少一个网元之间的连接信息,根据该第二拓扑信息以及第三拓扑信息,从而确定第一拓扑信息,第三拓扑信息包括第一网元与该第一网元的邻接网元之间的连接信息,和/或第二网元与第二网元的邻接网元之间的连接信息,该邻接网元属于该至少一个网元。
在该实施方式中,第五网元可以从应用功能网元直接接收第二拓扑信息,这样无需第五网元对第二拓扑信息进行维护,可以减少第五网元的处理量。
在一种可能的实施方式中,在传输数据流的过程中,可以确定第一数据流的部分的流信息,部分的流信息例如,第一数据流的标识和/或第一数据流的目的设备的信息等,这样便于根据第一数据流的标识和/或目的设备的信息等转发数据流,在该实施方式中,可以从网络开放功能网元接收该第一数据流的标识和第一数据流的目的设备的信息中的一项或两项,或者,为第一数据流分配标识,这种情况下,可以从网络开放功能网元获得第一数据流的目的设备的信息,或者也可能无需目的设备的信息。
在该实施方式中,第五网元可以从网络开放功能网元接收第一数据流的标识和/或目的设备的信息,无需第五网元为第一数据流分配标识,减少第五网元的处理。或者,第五网元可以直接为第一数据流分配标识,这样在第五网元无法从其他网元获得第一数据流的标 识的情况下,提供了一种确定第一数据流的标识的方式,另外,由于网络开放功能网元无需向第五网元传输第一数据流的标识,因此减少了第五网元和网络开放功能网元之间的数据传输量。
在一种可能的实施方式中,提供了确定第一处理时间的方式,在该实施方式中,可以接收第一数据流到达第一网元的时间,根据该时间,以及第一网元和第二网元之间的时延,确定第一处理时间;或者,可以接收第一数据流到达第二网元的时间,根据该时间,以及第一网元和第二网元之间的时延,确定第一处理时间。
在该实施方式中,第五网元可以根据第一数据流到达第一网元或第二网元的时间,以及第一网元和第二网元之间的时延,从而计算第一处理时间,这样即使第五网元无法直接获得第一处理时间,也可以基于该实施例中的方式计算出第一处理时间,丰富了第五网元确定第一处理时间的方式。
在一种可能的实施方式中,在确定第一处理时间和第二处理时间存在冲突时,可以确定第一数据流在第一网元的处理时间和/或第二网元的处理时间,而确定第一数据流在第一网元和/或第二网元的处理时间可以有多种方式,例如,第五网元可以调整第一数据流到达第一网元或第二网元的时间,或者可以调整第一网元和第二网元之间的时延,或者可以调整第一数据流到达第一网元或第二网元的时间,以及调整时延。
在该实施方式中,当第一处理时间和第二处理时间存在冲突时,对第一数据流到达第一网元或第二网元的时间和/或第一网元与第二网元之间的时延进行了调整,这样相当于直接或间接地改变了第一处理时间,因此可以降低第一网元和/或第二网元对多个数据流的处理时间存在冲突的可能性,从而提高第一网元和/或第二网元传输数据流的成功率。
在一种可能的实施方式中,如果确定了第一数据流在第一网元的处理时间,则将第一数据流在第一网元的处理时间配置给第一网元,和/或,如果确定了第一数据流在第二网元的处理时间,则可以将第一数据流在第二网元的处理时间配置给第二网元,和/或,将第一数据流在第一网元的处理时间和/或第二网元的处理时间配置给网络开放功能网元。
在该实施方式中,在确定第一数据流在相应网元的处理时间之后,可以将第一数据流在相应网元的处理时间配置给相应网元,这样以便于相应网元可以根据确定出的处理时间,处理第一数据流,由于确定出的处理时间相对减少了该相应网元对多个数据流的时间冲突的问题,因此该相应网元按照确定出的处理时间传输第一数据流的成功率更高。另外,还可以将第一数据流在第一网元和/或第二网元的处理时间配置给网络开放功能网元,使得网络开放功能网元可以根据第一数据流在第一网元和/或第二网元的处理时间,预测除第一网元和第二网元之前的其他网元处理第一数据流的处理时间,为网络开放功能网元检测下一个数据流与其他数据流的时间是否存在冲突提供时间依据。
在一种可能的实施方式中,第五网元可以将确定出的第一数据流在第一网元和/或第二网元的处理时间配置给会话管理功能网元,这样,会话管理功能网元可以根据第一数据流在第一网元和/或第二网元的处理时间,确定第一数据流到达接入网网元的时间,从而便于接入网网元根据会话管理功能网元确定出的第一数据流到达接入网网元的时间,调度第一数据流。
由于确定出的第一数据流在第一网元和/或第二网元的处理时间,可以减少多个数据流在第一网元和/或第二网元的时间冲突的问题,对应地,会话管理功能网元基于该第一数据流在第一网元和/或第二网元的处理时间,确定出的第一数据流到达接入网网元的时间,在 一定程度上也可以减少多个数据流在接入网网元的时间冲突的问题,提高接入网网元调度数据流的成功率,提高接入网网元调度数据流的可靠性。
第二方面,本申请实施例提供一种无线通信方法,该方法可以由用户面功能网元,或者芯片系统执行,该芯片系统可以实现用户面功能网元的功能,下面以用户面功能网元执行为例,进行示例说明,该方法包括:接收第一数据流的流信息,其中,该流信息为第三网元的信息和/或该第一数据流的标识,该第三网元为该第一数据流的目的设备或源设备;确定与该流信息对应的该转发信息,其中,该转发信息包括用于转发该第一数据流的第一网元的信息和/或第二网元的信息;发送该转发信息。
在本申请实施例中,由于用户面功能网元负责用户面数据包的路由与转发相关功能,因此用户面功能网元可以直接根据该第三网元之前传输的数据流的路径,学习到该第三网元的信息对应的第一网元的信息和/或第二网元的信息,这样,无需对用户面功能网元的功能进行拓展,且用户面功能网元在接收第三网元的信息之后,可以快速地确定转发信息,这样无需用户面功能网元将学习到该第三网元的信息对应的第一网元的信息和/或第二网元的信息转发给其他网元,相对减少了数据交互。
在一种可能的实施方式中,提供了接收第一数据流的流信息的方式,即可以从网络能力开放网元或第四网元接收该第一数据流的流信息。
在该实施方式中,由于网络能力开放网元可以直接与应用功能网元对接,从应用功能网元或第四网元获得该流信息,或者该网络能力开放网元或第四网元可以自行创建流信息,也就是说,网络能力开放网元或第四网元有多种确定流信息的方式,使得用户面功能网元从网络能力开放网元或第四网元成功获取该流信息的可能性更大。
在一种可能的实施方式中,提供了发送该转发信息的方式,即可以向网络能力开放网元或第四网元发送该转发信息。
在该实施方式中,网络能力开放网元或第四网元可以接收该转发信息,从而确定第一数据流的第一处理时间和第二数据流的第二处理时间是否存在冲突,第一处理时间和第二处理时间的含义可以参照前文,此处不再赘述,而无需网络能力开放网元确定转发信息,简化网络能力开放网元的处理。
另外,关于第二方面或第二方面的部分实施方式所带来的其他技术效果,可参考对于第一方面或相应的实施例的技术效果的介绍。
第三方面,本申请实施例提供一种无线通信方法,该方法可以由应用功能网元执行,或者由芯片系统执行,该芯片系统可以实现应用功能网元的功能,该方法包括:接收第一数据流的第三网元的信息,其中,该第三网元为该第一数据流的目的设备或源设备;从第一拓扑信息中,确定与该第三网元的信息对应的第一数据流的转发信息,其中,该第一拓扑信息包括第一网元与至少一个网元之间的连接信息,和/或包括第二网元与至少一个网元之间的连接信息,该至少一个网元包括该第三网元,该转发信息包括用于转发第一数据流的该第一网元的信息和/或该第二网元的信息;发送该转发信息。
在本申请实施例中,通过应用功能网元基于第一网元和/或第二网元,与第三网元之间的拓扑关系,确定转发信息,由于应用功能网元通常维护有该拓扑关系中的部分或全部,因此利用应用功能网元确定转发信息,无需对应用功能网元的功能进行过多的拓展。且,应用功能网元确定转发信息之后,可以发送给网络能力开放网元或其他网元,以便于网络能力开放网元或其他网元根据转发信息,检测第一数据流的第一处理时间和第二数据流的 第二处理时间是否存在冲突。
在一种可能的实施方式中,该方法还包括:接收第三拓扑信息,其中,该第三拓扑信息包括该第一网元与该第一网元的邻接网元之间的连接信息,和/或该第二网元与该第二网元的邻接网元之间的连接信息,该邻接网元属于该至少一个网元;根据第二拓扑信息以及该第三拓扑信息确定该第一拓扑信息,其中,该第二拓扑信息包括该至少一个网元之间的连接信息。
在该实施方式中,应用功能网元可以从网络能力开放网元获取上述第一拓扑信息中的部分拓扑信息,即第三拓扑信息,这样应用功能网元自身无需维护大量的拓扑信息,简化应用功能网元的处理。
另外,关于第三方面或第三方面的部分实施方式所带来的其他技术效果,可参考对于第一方面或相应的实施例的技术效果的介绍。
第四方面,本申请实施例提供一种通信装置,该通信装置可以为上述第一方面中的第五网元,或者为配置在第五网元中的电子设备(例如,芯片系统),或者为包括该第五网元的较大设备。该第五网元包括用于执行上述第一方面或任一可选的实施方式的相应的手段(means)或模块。例如,该通信装置包括处理单元(有时也称为处理模块),可选的,还包括收发单元(有时也称为收发模块)。
例如,该处理单元,用于确定第一数据流的转发信息,该转发信息包括用于转发第一数据流的第一网元的信息和/或第二网元的信息;该处理单元,还用于如果第一处理时间与第二数据流的第二处理时间存在冲突,则确定该第一数据流在该第一网元的处理时间和/或该第二网元的处理时间,其中,该第一处理时间为该第一网元处理该第一数据流的时间,该第二处理时间为该第一网元处理该第二数据流的时间,或者,该第一处理时间为该第二网元处理该第一数据流的时间,该第二处理时间为该第二网元处理该第二数据流的时间。
在一种可选的实施方式中,该通信装置包括存储单元,该处理单元能够与存储单元耦合,并执行存储单元中的程序或指令,使能该通信装置执行上述第一网元的功能。
在一种可选的实施方式中,该通信装置包括:处理器,与存储器耦合,用于执行存储器中的指令,以实现上述第一方面或各种实施方式中第五网元所执行的方法。可选的,该通信装置还包括其他部件,例如,天线,输入输出模块,接口等等。这些部件可以是硬件,软件,或者软件和硬件的结合。
第五方面,本申请实施例提供一种通信装置,该通信装置可以为上述第二方面中的用户面功能网元,或者为配置在用户面功能网元中的电子设备(例如,芯片系统),或者为包括该用户面功能网元的较大设备。该用户面功能网元包括用于执行上述第二方面或任一可选的实施方式的相应的手段或模块。例如,该通信装置包括收发单元(有时也称为收发模块)和处理单元(有时也称为处理模块)。
例如,该收发单元,用于接收第一数据流的流信息,其中,该流信息为第三网元的信息和/或该第一数据流的标识,该第三网元为该第一数据流的目的设备或源设备;该处理单元,用于根据该流信息与该转发信息之间的对应关系,确定与该流信息对应的该转发信息,其中,该转发信息包括用于转发该第一数据流的第一网元的信息和/或第二网元的信息;该收发单元,还用于发送该转发信息。
在一种可选的实施方式中,该通信装置包括存储单元,该处理单元能够与存储单元耦合,并执行存储单元中的程序或指令,使能该通信装置执行上述用户面功能网元的功能。
在一种可选的实施方式中,该通信装置包括:处理器,与存储器耦合,用于执行存储器中的指令,以实现上述第二方面或各种实施方式中的用户面功能网元所执行的方法。可选的,该通信装置还包括其他部件,例如,天线,输入输出模块,接口等等。这些部件可以是硬件,软件,或者软件和硬件的结合。
第六方面,本申请实施例提供一种通信装置,该通信装置可以为上述第三方面中的应用功能网元,或者为配置在应用功能网元中的电子设备(例如,芯片系统),或者为包括该应用功能网元的较大设备。该应用功能网元包括用于执行上述第三方面或任一可选的实施方式相应的手段或模块。例如,该通信装置包括收发单元(有时也称为收发模块)和处理单元(有时也称为处理模块)。
例如,该收发单元,用于接收第一数据流的第三网元的信息,其中,所述第三网元为所述第一数据流的目的设备或源设备;该处理单元,用于从第一拓扑信息中,确定与所述第三网元的信息对应的第一数据流的转发信息,其中,所述第一拓扑信息包括第一网元与至少一个网元之间的连接信息,和/或包括第二网元与至少一个网元之间的连接信息,所述至少一个网元包括所述第三网元,所述转发信息包括用于转发第一数据流的所述第一网元的信息和/或所述第二网元的信息;该收发单元,还用于发送该转发信息。
在一种可选的实施方式中,该通信装置包括存储单元,该处理单元能够与存储单元耦合,并执行存储单元中的程序或指令,使能该通信装置执行上述应用功能网元的功能。
在一种可选的实施方式中,该通信装置包括:处理器,与存储器耦合,用于执行存储器中的指令,以实现上述第三方面或各种实施方式中的应用功能网元所执行的方法。可选的,该通信装置还包括其他部件,例如,天线,输入输出模块,接口等等。这些部件可以是硬件,软件,或者软件和硬件的结合。
第七方面,本申请实施例提供一种芯片系统,该芯片系统包括:处理器和接口。其中,该处理器用于从该接口调用并运行指令,当该处理器执行该指令时,使得上述第一方面、第二方面或第三方面所述的方法被实现。
第八方面,提供一种计算机可读存储介质,该计算机可读存储介质用于存储计算机程序或指令,当其被运行时,使得上述第一方面、第二方面或第三方面所述的方法被实现。
第九方面,提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得上述第一方面、第二方面或第三方面所述的方法被实现。
附图说明
图1A为5GS的一种网络架构示意图;
图1B为基于5GS实现确定性传输的一种网络架构示意图;
图2A为5GS正常传输的一种示例图;
图2B为5GS异常传输的一种示例图;
图3为本申请实施例提供的应用场景的一种示意图;
图4为本申请实施例提供的一种无线通信方法的流程图;
图5为本申请实施例提供的一种第一拓扑信息的一种示例图;
图6为本申请实施例提供的一种无线通信方法的一种示例的流程图;
图7为本申请实施例提供的一种无线通信方法的又一种示例的流程图;
图8为本申请实施例提供的一种无线通信方法的再一种示例的流程图;
图9为本申请实施例提供的一种无线通信方法的再一种示例的流程图;
图10为本申请实施例提供的一种无线通信方法的再一种示例的流程图;
图11为本申请实施例提供的一种无线通信方法的再一种示例的流程图;
图12为本申请实施例提供的一种通信装置的一种结构示意图;
图13为本申实施例提供的一种通信装置的另一种结构示意图。
具体实施方式
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述。方法实施例中的具体操作方法也可以应用于装置实施例或系统实施例中。
以下,对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解。
1、本申请实施例中的网元,可以是单个物理设备,例如可以是单个的设备或节点,或者也可以是集成了多个设备或节点的装置。本申请实施例所示的网元还可以是逻辑概念,例如为软件模块,或者为与各个网元提供的服务对应的网络功能,网络功能可以理解为虚拟化实现下的一个虚拟化功能,还可以理解为服务化网络下提供服务的网络功能,例如,主要负责5G核心网用户面数据包的路由和转发相关功能的用户面功能(user plane function,UPF),或者专门用于管理会话的会话管理(Session Management function,SMF),本申请实施例对此不作具体限定。
2、本申请实施例中的终端设备,可以称为用户设备(user equipment,UE)、终端、接入站、UE站、远方站、无线通信设备、或用户装置等,终端设备是一种具有无线收发功能的设备,可以是固定设备,移动设备、手持设备、穿戴设备、车载设备,或内置于上述设备中的无线装置(例如,通信模块或芯片系统等)。终端设备用于连接人,物,机器等,可广泛用于各种场景,例如包括但不限于以下场景:蜂窝通信、设备到设备通信(device-to-device,D2D)、车到一切(vehicle to everything,V2X)、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)、物联网(internet of things,IoT)、虚拟现实(virtual reality,VR)、增强现实(augmented reality,AR)、工业控制(industrial control)、无人驾驶(self driving)、远程医疗(remote medical)、智能电网(smart grid)、智能家具、智能办公、智能穿戴、智能交通,智慧城市(smart city)、无人机、机器人等场景的终端设备。终端可以是手机、平板电脑、带无线收发功能的电脑、可穿戴设备、车辆、无人机、直升机、飞机、轮船、机器人、机械臂、智能家居设备等。本申请的实施例对终端设备所采用的具体技术和具体设备形态不作限定。为描述方便,本申请实施例中将终端设备以UE为例进行说明。
3、本申请实施例中的网络设备,例如包括接入网设备(或者,称为接入网网元),和/或核心网设备(或者,称为核心网网元)。
所述接入网设备为具有无线收发功能的设备,用于与所述终端设备进行通信。所述接入网(Radio Access Network,(R)AN)设备包括但不限于上述通信系统中的基站(BTS,Node B,eNodeB/eNB,或gNodeB/gNB)、收发点(t(R)ANsmission reception point,TRP),第三代合作伙伴计划(3rd generation partnership project,3GPP)后续演进的基站,无线保真(wireless fidelity,WiFi)系统中的接入节点,无线中继节点,无线回传节点等。所述基站可以是:宏基站,微基站,微微基站,小站,中继站等。多个基站可以支持上述提及的同一种接入技术的网络,也可以支持上述提及的不同接入技术的网络。基站可以包含一个或 多个共站或非共站的传输接收点。网络设备还可以是云无线接入网络(cloud radio access network,C(R)AN)场景下的无线控制器、集中单元(centralized unit,CU),和/或分布单元(distributed unit,DU)。网络设备还可以是服务器,可穿戴设备,或车载设备等。例如,车到一切(vehicle to everything,V2X)技术中的网络设备可以为路侧单元(road side unit,RSU)。以下对接入网设备以为基站为例进行说明。所述通信系统中的多个网络设备可以为同一类型的基站,也可以为不同类型的基站。基站可以与终端设备进行通信,也可以通过中继站与终端设备进行通信。终端设备可以与不同接入技术中的多个基站进行通信。
所述核心网设备用于实现移动管理,数据处理,会话管理,策略和计费等功能中的至少一项。不同接入技术的系统中实现核心网功能的设备名称可以不同,本申请实施例并不对此进行限定。以5G系统为例,所述核心网设备包括:接入和移动管理功能(access and mobility management function,AMF)、SMF、或用户面功能(user plane function,UPF)等。
本申请实施例中,用于实现网络设备的功能的装置可以是网络设备,也可以是能够支持网络设备实现该功能的装置,例如芯片系统,该装置可以被安装在网络设备中。在本申请实施例提供的技术方案中,以用于实现网络设备的功能的装置是网络设备为例,描述本申请实施例提供的技术方案。
本申请中,对于名词的数目,除非特别说明,表示“单数名词或复数名词”,即"一个或多个”。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。例如,A/B,表示:A或B。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),表示:a,b,c,a和b,a和c,b和c,或a和b和c,其中a,b,c可以是单个,也可以是多个。
为了便于理解,下面简单介绍5G系统的网络架构。
3GPP标准组织制定了下一代移动通信网络架构(next generation system),称为5G网络架构,5G网络架构支持3GPP标准组织定义的无线技术(如长期演进(long term evolution,LTE)或5G无线接入网。请参照图1A,为5GS的一种网络架构示意图。图1A所示的5G网络架构包括终端设备、接入网和核心网,终端设备通过接入网接入核心网,下面对这三部分分别进行简单介绍说明。
其中,接入网包括接入网网元,对于终端设备和接入网的接入网网元的介绍,可以参考前文解释说明部分论述的内容,此处不再赘述。
核心网包括各个核心网网元和数据网络(data network,DN),核心网网元包括用户面网元和控制面网元。用户面网元包括用户面功能(user plane function,UPF)网元,UPF主要负责分组数据包的转发、服务质量(quality of service,QoS)控制、计费信息统计等。控制面网元功能主要负责业务流程交互、向用户面网元下发数据包转发策略、QoS控制策略等。下面介绍控制面网元可能包括的网元。
接入与移动性管理功能(access and mobility management function,AMF)网元,主要负责接入管理功能。
SMF网元,又可以简称为SMF,用于管理用户协议数据单元(protocol data unit,PDU)、 会话创建和删除等、以及维护PDU会话上下文及向转发用户面网元信息。
策略控制功能(policy control function,PCF)网元,又可以简称为PCF,用于生成、管理用户、会话、QoS流处理策略。
应用功能(application function,AF)网元,又可以简称为AF,用于提供各种业务服务的功能网元,能够通过NEF网元与核心网交互,以及能够和策略管理框架交互进行策略管理。需要说明的是,在实际应用中,AF可以分为两类,一类属于核心网网元,另一类属于第三方应用服务器。
NEF网元,又可以简称为NEF,用于提供网络能力开放相关的框架、鉴权和接口,在5G系统网络功能和其他网络功能之间传递信息。
其中,DN上可部署多种业务,可为终端设备相应的服务,例如,提供数据和/或语音等服务。例如,DN包括多个转发节点和与相应转发节点连接的终端设备,这里与转发节点连接的终端设备例如TSN终端等,或者例如,DN是某智能工厂的私有网络,智能工厂安装在车间的传感器可为终端,DN中部署了传感器的控制服务器,控制服务器可为传感器提供服务。传感器可与控制服务器通信,获取控制服务器的指令,根据指令将采集的传感器数据传送给控制服务器等。又例如,DN是某公司的内部办公网络,该公司员工的手机或者电脑可为终端,员工的手机或者电脑可以访问公司内部办公网络上的信息、数据资源等。
图1A中的Nnssf、Nnef、Nnrf、Npcf、Nudm、Naf、Nausf、Namf、Nsmf分别为上述网络切片选择功能(network slice selection function,NSSF)、NEF、网络功能仓储功能(NF repository function,NRF)、PCF、统一数据管理(unified data management,UDM)、AF、认证服务器功能(authentication server function,AUSF)、AMF和SMF提供的服务化接口,用于调用相应的服务化操作。下面介绍5GS中各个网元之间的相关接口。
N1,UE与核心网控制面之间的接口。
N2,接入网网元与核心网控制面之间的通信接口。
N3,接入网网元与UPF之间的通信接口,用于传输用户数据。
N4,SMF与UPF之间的通信接口,用于对UPF进行策略配置等。
N6,UPF与DN之间的通信端口。
可参照图1B,为基于5GS实现确定性传输的一种网络架构示意图。该网络架构中5GS与TSN系统对接,或可以理解为5GS在TSN系统中,该网络架构包括UPF、RAN和UE,还包括设备时延敏感网络转换器(device side TSN translator,DS-TT)和网络侧TSN转换器(network side TSN translator,NW-TT)。
基于5GS传输数据流的机制为:数据流到达5GS的入端口,经过5GS内部处理后,从5GS的出端口发送出去。
入端口和出端口可以为5GS中的网元,例如,入端口为5GS中的入口网元,出端口为5GS中的出口网元。针对上行数据流,如果DS-TT与UE独立部署,则该5GS的入端口是DS-TT;如果DS-TT集成在UE中,该5GS的入端口是UE;如果NW-TT与UPF独立部署,则该5GS的出端口是NW-TT;如果NW-TT集成在UPF中,该5GS的出端口是UPF。针对下行数据流,如果NW-TT与UPF独立部署,则该5GS的入端口是NW-TT;如果NW-TT集成在UPF中,则该5GS的入端口是UPF;如果DS-TT与UE独立部署,则该5GS的出端口是DS-TT;如果DS-TT集成在UE中,该5GS的出端口是UE。如果在 UE至UE的通信中,且DS-TT集成在UE中,该5GS的入端口和出端口可以分别为相应的UE,例如,UE1和UE2通信,入端口为UE1,出端口为UE2;如果在UE至UE的通信中,且DS-TT与UE独立部署,该5GS的入端口和出端口可以分别为相应的DS-TT,例如,UE1和UE2通信,入端口为与UE1对应的DS-TT1,出端口为与UE2对应的DS-TT2。其中,UE至UE的通信中的传输路径例如:UE1(DS-TT1)-RAN-UPF-UE2(DS-TT2)。
或者,入端口和出端口也可以为5GS中的网元的端口(port),例如,入端口为5GS中的入口网元的端口,出端口为5GS中的出口网元的端口。针对上行数据流,如果DS-TT与UE独立部署,则该5GS的入端口是DS-TT的端口;如果DS-TT集成在UE中,该5GS的入端口是UE的端口;如果NW-TT与UPF独立部署,则该5GS的出端口是NW-TT的端口;如果NW-TT集成在UPF中,该5GS的出端口是UPF的端口。针对下行数据流,如果NW-TT与UPF独立部署,则该5GS的入端口是NW-TT的端口;如果NW-TT集成在UPF中,则该5GS的入端口是UPF的端口;如果DS-TT与UE独立部署,则该5GS的出端口是DS-TT的端口;如果DS-TT集成在UE中,该5GS的出端口是UE的端口。如果在UE至UE的通信中,且DS-TT集成在UE中,该5GS的入端口和出端口可以分别为相应的UE的端口;如果在UE至UE的通信中,且DS-TT与UE独立部署,该5GS的入端口和出端口可以分别为相应的DS-TT的端口。
其中,DS-TT和NW-TT为5GS用户面的逻辑功能,DS-TT又可以称为UE侧的TSN转换器,用于5GS用户面在和TSN对接时,用于连接终端侧的TSN系统;NW-TT又可以称为UPF侧的TSN转换器,用于连接网络侧的TSN系统。其中,TSN转换器是指将5GS的特征和信息转换和适配成TSN要求的信息,提供给TSN系统,或者将TSN系统要求的信息转换成针对5GS的特征或信息,提供给5GS。其中,DS-TT与UE可以独立部署,或者DS-TT也可以集成在UE中。NW-TT与UPF可以独立部署,或者NW-TT也可以集成在UPF中。在没有特别说明的情况下,本申请实施例以DS-TT集成在UE中、NW-TT集成在UPF中为例进行介绍。
其中,5GS时延包括从数据包到达5GS的入端口到该数据包从5GS的出端口发出这之间的时延。5GS时延也可以称为5GS的内部处理时间或5GS的内部处理时延等。5GS时延可以包括UE侧的驻留时间(即数据流在UE的处理时间以及在UE侧的TSN转换器的处理时间),也可以包括UPF侧驻留时间(即数据流在UPF的处理时间以及在UPF侧的TSN转换器的处理时间),以及包括UE与UPF之间的传输时延,UE与UPF之间的传输时延为数据流在UE和UPF之间的包时延预算值(packet delay budget,PDB)。
除了图1B之外,基于5GS实现确定性传输还可以有其他的网络架构,在其他网络架构中,5GS用户面也可以独立提供确定性传输能力(即5GS不在TSN中),这时用户面可以没有DS-TT和/或NW-TT,本申请实施例对此不作限制。
目前,基于5GS实现确定性传输的方案中,AF可以将数据流到达UE和/或UPF的时间以及5GS时延(5GS bridge delay,或可以称为5GS delay)发送给NEF。
NEF或者除了NEF和AF之外的其他网元从AF接收数据流到达UE和/或UPF的时间以及5GS时延后,其他网元可以直接从AF接收数据流到达UE和/或UPF的时间以及5GS时延,也可以从NEF接收数据流到达UE和/或UPF的时间以及5GS时延,NEF或者其他网元可以计算数据流在UE和/或UPF的处理时间,为简化描述,后续以NEF为例进行说明,类似的可以理解其他网元进行处理时的过程。其中,如果UE是接收该数据流, 那么数据流在UE的处理时间可以理解为UE的接收时间窗,或者开始接收数据流的时间;如果UE是发送该数据流,那么数据流在UE的处理时间可以理解为UE的发送时间窗,或者开始发送数据流的时间;如果UPF是接收该数据流,那么数据流在UPF的处理时间可以理解为UPF的接收时间窗,或者开始接收数据流的时间;如果UPF是发送该数据流,那么数据流在UPF的处理时间可以理解为UPF的发送时间窗,或者开始发送数据流的时间。其中,某个网元的接收时间窗是指某个网元开始接收数据流到接收数据流完毕对应的时间段;某个网元的发送时间窗是指某个网元开始发送数据流到发送数据流完毕对应的时间段。接收时间窗可和发送时间窗可以有多种具体的表示方式,例如,接收时间窗和发送时间窗均以两个时刻进行表示,接收时间窗以开始接收数据流的开始时刻和接收数据流完毕的结束时刻表示,发送时间窗以开始发送数据流的开始时刻和发送数据流完毕的结束时刻表示,或者接收时间窗或发送时间窗还可以通过其他形式表示,例如接收时间窗以开始接收数据流的开始时刻与数据流的数据量进行表示,发送时间窗以开始发送数据流的开始时刻与数据流的数据量进行表示,本申请实施例不限定时间窗的具体表示形式。
对于上行数据流来说,例如NEF可以根据该上行数据流到达UE的时间和5GS时延,计算该上行数据流在UPF的发送时间窗。UE在接收该上行数据流后,向UPF发送该上行数据流,UPF根据计算得到的该上行数据流的发送时间窗,对外发送该上行数据流。
对于下行数据流来说,NEF可以根据数据流到达UPF的时间和5GS时延,计算该下行数据流在UE的发送时间窗。UPF在接收到该下行数据流后,向UE发送该上行数据流,UE根据计算得到的该下行数据流的发送时间窗,对外发送该下行数据流。
按照上述方案,如果5GS中的同一个网元接收多个数据流,只有当该网元对于这多个数据流的接收时间窗不冲突时,该网元才能正常地接收这多个数据流。或者,如果5GS中的同一个网元发送多个数据流,只有当该网元对于这多个数据流的发送时间窗不冲突时,该网元才能正常地发送这多个数据流。例如请参照图2A,为5GS正常传输的一种示例。图2A包括三个数据流,分别用f1、f2和f3表示,这三个数据流通过UPF发送,且在该UPF的发送时间不冲突,因此UPF可以按照这三个数据流各自的发送时间,分别发送相应的数据流。
但目前尚无机制检测多个数据流在同一个网元的处理时间是否存在冲突。在传输过程中,如果一个网元对于多个数据流的处理时间存在冲突,则该网元可能无法按照指定的处理时间发送或接收数据流,例如入端口存在冲突,不同数据流不能在预期的时间到达入端口,或者不同数据流随机到达入端口,入端口对应的入口网元可以检测数据流的到达该入端口的时间,那么该入口网元可能丢弃到达该入端口的时间异常的数据流,或者有可能该数据流中的部分数据到达该入端口的时间异常,那么入口网元可以丢弃时间异常的部分数据,还可能导致入端口与出端口之间的时延与预期的时延不符;如果出端口存在冲突,则不同数据流无法按照预期的时间被发送,进而导致该出端口对应的出口网元无法发送数据流或者数据流中的部分数据,或者延期发送数据流或者该数据流中的部分数据,或者进一步地由于延期发送数据流导致传输拥塞而导致随机丢包的情况,还可能导致入端口与出端口之间的时延与预期的时延不符。
例如请参照图2B,为5GS异常传输的一种示例。图2B包括三个数据流,分别用f4、f5和f6表示,这三个数据流到达5GS中的UE的时间相同,且这三个数据流分别对应的5GS时延也是相同的,此时,这三个数据流在UPF的处理时间存在冲突,导致UPF无法 正确地传输这三个数据流。
鉴于此,本申请实施例提供一种技术方案。在该技术方案中,通过确定数据流的转发信息,从而可以确定同一个网元对多个数据流的处理时间是否存在冲突,提供了一种冲突检测方案。如果确定同一个网元对多个数据流的处理时间存在冲突,则可以对应确定该网元和/或其他网元对于数据流的处理时间,从而可减少多个数据流在同一个网元的时间冲突。可见,通过本申请实施例提供的冲突检测方案,能够有效检测网元在处理数据流时的时间冲突,从而能够减少冲突出现的概率,提高数据流的传输质量和传输效率。
本申请实施例提供的技术方案可以应用于5G系统中,例如图1A或图1B所示的网络架构,或者还可以应用于下一代移动通信系统或其他类似的通信系统,或者还可以应用于如下图3所示的网络架构。图3所示的应用场景包括AF、NEF、PCF、SMF、AMF、UPF、Crtl、RAN、UE和DS-TT等网元。
相较于图1A所示的5GS的架构,图3所示的应用场景在图1A所示的5GS的基础上新增了一个网元,为了便于描述,称为第四网元Crtl。该第四网元可以是控制面网元,该第四网元可以分别与AF、NEF、PCF和SMF通信。例如,可以由该第四网元确定第一数据流的转发信息,从而根据该转发信息,确定同一个网元对多个数据流的处理时间是否存在冲突,并在确定同一个网元对多个数据流的处理时间存在冲突时,确定该网元处理第一数据流的处理时间,和/或除了该网元之外的其他网元处理第一数据流的时间,以减少或避免多个数据流在同一个网元处的时间冲突。
在图3所示的应用场景中,通过第四网元实现本申请实施例中的无线通信方法,可以无需在5GS的已有网元中新增功能,相对可以降低部署核心网的难度。当然,本申请实施例中的无线通信方法也可以通过5GS中的已有网元实现,本申请实施例对此不作限制。
作为一个示例,本申请实施例中的第四网元,可以是具有图3所示的Ctrl的功能的网元。为方便说明,本申请实施例后续描述中以该第四网元是Ctrl为例,也就是说,本申请实施例后续出现的Ctrl可以替换为第四网元。需要说明的是,在未来通信中,该第四网元仍然可以称为Ctrl,或者还可以有其他的名称,或者该第四网元的功能也可能集成到其他网元中或拆分到多个网元中,本申请实施例不限定。
作为一个示例,本申请实施例中的用户面功能网元,可以是具有图1A、图1B或图3所示的UPF的功能的网元,该用户面功能网元中可以集成有TSN转换器,或者该TSN转换器也可以独立于该用户面功能网元部署,为方便说明,本申请实施例以TSN转换器集成在用户面功能网元中为例进行说明。并且,本申请实施例后续描述中以该用户面功能网元是UPF为例,也就是说,本申请实施例后续出现的UPF可以替换为用户面功能网元。需要说明的是,在未来通信中,该用户面功能网元仍然可以称为UPF,或者还可以有其他的名称,或者该用户面功能网元的功能也可能集成到其他网元中或拆分到多个网元中,本申请实施例均不限定。
作为一个示例,本申请实施例中的接入及移动性管理网元,可以是具有图1A、图1B或图3所示的AMF的功能的网元。为方便描述,本申请实施例后续描述中以将该接入及移动性管理网元是AMF为例,也就是说,本申请实施例后续出现的AMF可以替换为接入及移动性管理网。需要说明的是,在未来通信中,该接入及移动性管理网元仍然可以称为AMF,或者还可以有其他的名称,或者该接入及移动性管理网的功能也可能集成到其他网元中或拆分到多个网元中,本申请实施例均不限定。
作为一个示例,本申请实施例中的会话管理网元,可以是具有图1A、图1B或图3所示的SMF的功能的网元。为方便描述,本申请实施例后续描述中以该会话管理网元称是SMF为例,也就是说,本申请实施例后续出现的SMF可以替换为会话管理网元。需要说明的是,在未来通信中,该会话管理网元仍然可以称为SMF,或者还可以有其他的名称,或者该接入及移动性管理网的功能也可能集成到其他网元中或拆分到多个网元中,本申请实施例均不限定。
作为一个示例,本申请实施例中的策略控制网元,指的具有图1A、图1B或图3所示的PCF的功能的网元。为方便说明,本申请实施例后续描述中以该策略控制网元称是PCF为例,也就是说,本申请实施例后续出现的PCF可以替换为策略控制功能网元。需要说明的是,在未来通信中,该策略控制网元仍然可以称为PCF网元,或者还可以有其他的名称,或者该策略控制网元的功能也可能集成到其他网元中或拆分到多个网元中,本申请实施例均不限定。
作为一个示例,本申请实施例中的网络能力开放网元,可以是具有图1A、图1B或图3所示的NEF的功能的网元。为方便说明,本申请实施例后续描述中以该网络能力开放网元是NEF为例,也就是说,本申请实施例后续出现的NEF可以替换为网络能力开放网元。需要说明的是,在未来通信中,该网络能力开放网元仍然可以称为NEF,或者还可以有其他的名称,或者该网络能力开放网元的功能也可能集成到其他网元中或拆分到多个网元中,本申请实施例均不限定。
作为一个示例,本申请实施例中的应用功能网元,可以是具有图1A、图1B或图3所示的AF的功能的网元。为方便说明,本申请实施例后续描述中以该应用功能网元是AF为例,也就是说,本申请实施例后续出现的AF可以替换为应用功能网元。需要说明的是,在未来通信中,该应用功能网元仍然可以称为AF,或者还可以有其他的名称,或者该应用功能网元的功能也可能集成到其他网元中或拆分到多个网元中,本申请实施例均不限定。
作为一个示例,本申请实施例中的接入网网元,可以是具有图1A、图1B或图3所示的RAN的功能的网元。为方便说明,本申请实施例后续描述中以该接入网网元是RAN为例,也就是说,本申请实施例后续出现的RAN可以替换为接入网网元。需要说明的是,在未来通信中,该接入网网元仍然可以称为RAN,或者还可以有其他的名称,或者该接入网网元的功能也可能集成到其他网元中或拆分到多个网元中,本申请实施例均不限定。
作为一个示例,本申请实施例中的终端设备,可以是具有图1A、图1B或图3所示的UE的功能的网元,该终端中可以集成有TSN转换器,或者是该TSN转换器独立于终端部署,为方便说明,本申请实施例以TSN转换器集成于终端为例进行说明。为方便说明,本申请实施例后续描述中以该终端设备是UE为例。
下面结合附图介绍本申请实施例所提供的无线通信方法。本申请中的各个实施例中在没有特别说明的情况下,第一网元和第二网元为不同的网元,第一网元可以为UE、UPF或RAN等,第二网元可以为UE、UPF或RAN等。另外,在本申请的各个实施例对应的附图中,凡是用虚线表示的步骤,均为可选的步骤。
可参考图4,为本申请实施例提供的一种无线通信方法的流程图,该无线通信方法可以由第五网元执行,或芯片系统执行,该芯片系统可以实现第五网元的功能,第五网元为NEF、AF、UPF、Ctrl、UE、PCF或SMF等,在没有特别说明的情况下,本申请实施例对此不作具体限定,为了便于描述,下文中以第五网元执行该无线通信方法为例,对本申请 实施例中的无线通信方法进行介绍。
步骤401,第五网元确定第一数据流的转发信息,该转发信息包括用于转发第一数据流的第一网元的信息和/或第二网元的信息。
第一网元和第二网元可以是通信系统中两个不同类型的网元,该通信系统的结构例如参考图1A、图1B或图3,本申请实施例对此不作限制。例如,第一网元为UPF,第二网元为UE;或者,第一网元为UPF,第二网元为接入网网元;或者,第一网元为UE,第二网元为UPF;或者,第一网元为接入网网元,第二网元为UE;或者,第一网元为UPF,第二网元为接入网网元,等等。第一网元和第二网元可以是通信系统中两个同类型的网元,例如在UE至UE的通信中,例如,第一网元为UE1,第二网元为UE2。
对于某些网元存在明确的端口定义,且只有在多个数据流是由该网元的同一个端口处理时才会存在冲突,那么多个数据流从同一个网元的同一个端口发送,或者多个数据流由同一个网元的同一个端口接收,都可能出现该网元对于多个数据流的处理时间有冲突的情况;或者,对于某些网元可能没有端口的定义,或者某些网元只要同时处理多个数据流就可能存在冲突,而并不关注这多个数据流是否是由该网元的一个端口处理,那么这些情况下,或者多个数据流由同一个网元接收,或者多个数据流从同一个网元发送,都可能出现该网元对于多个数据流的处理时间有冲突的情况。为此本申请实施例提出,可以通过转发多个数据流的网元的信息来检测时间冲突。虽然多个数据流在某个网元处的处理时间有冲突,但可能多个数据流的创建时间并不是同时的,那么第五网元可能之前已确定了多个数据流中部分数据流的网元的信息,因此第五网元只需确定当前的第一数据流的网元的信息即可,再者多个数据流的转发信息的确定方式是相同的,因此在本申请实施例是以第一数据流为例进行介绍。
其中,转发信息可以有如下两种解释。
第一种解释:转发信息可指示转发第一数据流的网元的端口的信息。
在这种解释下,转发信息可以包括网元的端口的信息,或者包括间接指示网元的端口的信息。
转发信息包括第一网元的信息和/或第二网元的信息。第一网元的信息包括第一网元的第一端口的信息、第一网元的标识或第一网元的实例的标识中的一项或多项,第二网元的信息包括第二网元的第二端口的信息、第二网元的标识或第二网元的实例的标识中的一项或多项。第一端口包括第一网元接收第一数据流的端口,和/或第一网元发送第一数据流的端口。第二端口包括第二网元接收第一数据流的端口,和/或第二网元发送第一数据流的端口。
其中,网元的实例可以理解为网元创建的用于实现相应功能的对象,创建实例时会相应地为该实例分配相应的实例的标识,以唯一的标识表示该网元的该实例。如果网元绑定一个端口,网元绑定一个端口可以理解为该网元只对应该网元的一个特定的端口,此时,该网元可以有多个端口,但该网元的标识可以只与该网元的一个特定的端口对应,该网元也可以只有一个端口,该端口与该网元的标识对应,那么网元的标识实质上也是网元的端口的信息;或者,如果网元的实例绑定一个端口,网元的实例绑定了一个端口是指该网元的实例对应了该网元的一个端口。
为了便于更清楚地理解转发信息,下面对转发信息进行举例说明:
例如,第一数据流为上行数据流,转发信息包括发送该第一数据流的UPF的端口的信 息,以及包括接收该第一数据流的UE的端口的信息。又例如,第一数据流为下行数据流,转发信息包括接收该第一数据流的UPF的端口的信息,以及包括发送该第一数据流的UE的端口的信息。
第二种解释:转发信息可指示转发第一数据流的网元的信息。
例如,对于有些网元而言,可能没有明确定义端口,但实质上相当于具有一个或多个端口的功能,或者对于某些网元而言,该网元可能有多个端口,但不关注多个数据流是否由该网元的端口进行处理,多个数据流可能由该网元的一个或多个端口处理,只需关注这多个数据流是否由该网元进行处理,或者对于某些网元而言,该网元只有一个端口,那么也无需关注该网元的端口本身,那么转发信息可以包括网元的信息。
第五网元确定第一数据流的转发信息,可以有多种方式,下面举例介绍。
方式一。
第五网元根据第一数据流的相关信息,确定转发信息。
其中,第一数据流的相关信息,例如包括第一数据流的会话信息、第一网元的信息、第二网元的信息、或第一数据流的流信息中的一项或多项。第一数据流的会话信息,又可以称为第一数据流的会话的信息,可指示传输第一数据流的会话,以5G系统为例,该会话例如为PDU会话,如果是其他通信系统,则该会话可以有所不同。在本申请的各个实施例中,以会话是PDU会话为例。第一数据流的会话信息例如包括第一数据流的PDU会话的标识。第一网元的信息和第二网元的信息可以参照前文,此处不再赘述。第一数据流的流信息可包括第一数据流的标识或第三网元的信息。第一数据流的标识用于标识第一数据流。第三网元的信息包括第一数据流的目的设备的信息或第一数据流的源设备的信息。目的设备的信息例如包括目的设备的标识和/或目的设备的地址,目的设备的地址例如可以称为第一数据流的目的地址;源设备的信息例如包括源设备的标识和/或源设备的地址,源设备的地址例如称为第一数据流的源地址。在某些情况下,第一数据流的标识可以包括源地址和/或目的地址。
其中,第一数据流的相关信息可以是预配置在第五网元中的信息、或协议规定的信息,也可以是从其他网元获得的。例如第五网元为NEF或Ctrl,NEF或Ctrl可从AF获得第一数据流的相关信息;又例如,第五网元为UPF、UE、PCF、SMF或Ctrl中的任一个,第五网元可从NEF获得第一数据流的相关信息。本申请实施例不对第一数据流的相关信息的来源进行限制。
在方式一中,第五网元可以根据第一数据流的相关信息中的一项或多项,确定第一数据流的转发信息,提供了多种确定转发信息的方式,且由于第五网元可以根据相关信息中的任意一项或多项确定转发信息,这样也提高了第五网元确定转发信息的灵活性。
在方式一中,如果第一数据流的相关信息包含的信息不同,则第五网元确定转发信息的方式也可能有区别,下面举例介绍。
方式一下,第五网元确定转发信息的第一种实现方式,这种实现方式可称为子方式1。
如果相关信息包括会话信息,那么第五网元根据第一数据流的会话信息,确定第一数据流的转发信息。
在传输第一数据流之前,相应的控制面网元,例如SMF等,可以为该第一数据流创建会话,会话例如,PDU会话,则第五网元可获得该会话的信息,例如也可以称为会话信息。会话信息例如会话的地址和/或会话的标识,会话的地址也可以称为会话地址,会话的 标识也可以称为会话标识。例如,SMF在创建会话之后,SMF可以将会话信息发送给第五网元,例如,第五网元为Ctrl,SMF直接将会话信息发送给Ctrl,或者通过PCF转发给第五网元,或者例如,第五网元为NEF,SMF可以通过PCF将会话信息转发给NEF。或者SMF可以将会话信息存储在UDM中,第五网元从UDM中读取会话信息。
作为一个示例,会话信息可以以接口的信息表示。例如,在SMF传输信息的时候,可以创建SMF用于传输信息的接口,而该接口是以会话为粒度,即一个会话对应一个接口,对应与该SMF交互的网元可以通过该接口,从而与SMF进行消息传输,这种情况下该接口的信息实质指示了相应的会话。
第五网元存储会话信息与转发信息之间的对应关系,例如称为第一对应关系。因此,第五网元如果获得了第一数据流的会话信息,就可以确定与会话信息对应的转发信息,也就是确定了第一数据流的转发信息。
例如,第一对应关系为会话信息与第一网元的信息之间的对应关系,那么第五网元可以获得的转发信息包括第一网元的信息;或者,如果第一对应关系为会话信息与第二网元的信息之间的对应关系,那么第五网元可以获得的转发信息包括第二网元的信息;或者,如果第一对应关系为会话信息、第一网元的信息和第二网元的信息三者之间的对一下关系,或者,如果第一对应关系包括会话信息与第一网元的信息之间的第一子对应关系,以及,会话信息与第二网元的信息之间的第二子对应关系,那么第五网元可以获得的转发信息包括第一网元的信息和第二网元的信息。
举例来说,第五网元预存有第一数据流的会话信息和第一网元的信息之间的第一对应关系,会话信息以会话标识为例,第一网元的信息以UPF的端口的标识为例,即该第一对应关系为会话标识为“1”与UPF的端口的标识“2”之间的对应关系,第五网元确定了第一数据流的会话标识为“1”之后,从而根据该会话标识以及第一对应关系,确定转发信息包括UPF的端口的标识为“2”。
在子方式1中,第五网元通过对应关系就能确定第一数据流的转发信息,方式较为简单。且由于传输第一数据流之前,通常是需要创建相应的会话信息,因此第五网元比较容易获得会话信息,从而降低了第五网元获得会话信息的难度。
方式一下,第五网元确定转发信息的第二种实现方式,这种实现方式可称为子方式2。
如果转发信息包括第一网元的信息,那么第五网元根据第一网元的信息,确定转发信息。
例如,第一数据流的源设备可以感知拓扑,即能够确定与该源设备连接的第一网元的信息,那么源设备可以将感知的第一网元的信息携带在第一数据流的信息(也可简称为流信息)中,第一数据流的信息例如包括第一数据流的标识和/或流特征,第五网元可以从第一数据流的信息中获得第一网元的信息。或者,在创建第一数据流的流请求时,该流请求是指请求创建第一数据流的消息,该流请求可包括第一网元的信息,第五网元可以从其他网元接收该流请求,从而根据该流请求获得第一网元的信息,例如,第五网元为NEF,AF可以创建流请求,NEF可以从AF获得该流请求。
其中,数据流的流特征用于描述业务的数据流特征,例如一个数据流的流特征包括如下一项或多项:该数据流的目的地址,该数据流的源地址,该数据流的5GS时延,该数据流的抖动(jitter),该数据流的突发流量到达UE和/或UPF的时间(burst arrival time at UE and/or UPF)、该数据流的突发流量大小(burst size),或,该数据流的突发周期(burst  periodicity)。数据流的抖动指的是5GS时延的误差范围,例如5GS时延可能因为噪音、链路质量、负载等原因导致在一个范围内波动,该范围即为抖动。数据流的突发流量到达UE或UPF的时间指的是该数据流到达UE或UPF的时间。其中,突发可以理解为短时间内进行相对高带宽的数据传输。数据流的突发流量大小指的是该数据流到达UE或UPF的大小。数据流的突发周期指的是该数据流按照一定的周期到达UE或UPF。
第五网元可以将第一网元的信息作为转发信息。或者,第五网元也可以存储第一网元的信息与第二网元的信息之间的对应关系,例如可以称为第二对应关系,因此,第五网元在获得第一网元的信息之后,可以根据第二对应关系,获得第二网元的信息,从而将第二网元的信息作为转发信息。或者,第五网元根据第二对应关系,获得第二网元的信息之后,也可以将第一网元的信息和第二网元的信息作为转发信息。
例如,第五网元可以确定第一网元的信息与第二网元的信息之间的第二对应关系,以第一网元的信息以UPF的端口的标识为例,第二网元的信息以UE的端口的标识为例,第二对应关系例如为:转发第一数据流的UPF的端口的标识“1”与UE的端口的标识“3”之间的对应关系,第五网元从第一数据流的流信息中获得该第一数据流从UPF的端口1进行转发,因此第五网元可以根据该UPF的端口的标识“1”,以及第二对应关系,从而确定转发信息包括UE的端口的标识“3”,和/或包括UPF的端口的标识“1”。
在子方式2中,第五网元可以从流信息或流请求中获得第一网元的信息,还可以根据第一网元的信息与第二网元的信息之间的对应关系就能获得转发信息,无需再通过其他信息就可以获得该转发信息,相对可以简化第五网元确定转发信息的方式。
方式一下,第五网元确定转发信息的第三种实现方式,这种实现方式可称为子方式3。
如果转发信息包括第二网元的信息,那么第五网元根据第二网元的信息,确定转发信息。
例如,第一数据流的源设备在传输第一数据流时,可以感知拓扑,即能够确定与自身连接的第二网元的信息,那么源设备可以将感知的第二网元的信息携带在第一数据流的流信息中,流信息的含义可以参照前文,此处不再赘述,第五网元可以从流信息中获得第二网元的信息。或者,在创建第一数据流的流请求时,该流请求包括第二网元的信息,第五网元可以从流请求获得第二网元的信息,流请求的含义可以参照前文,此处不再赘述。
第五网元可以将以第二网元的信息作为转发信息。或者,第五网元也可以存储第二网元的信息与第一网元的信息之间的对应关系,例如称为第三对应关系,因此,第五网元在获得第二网元的信息之后,可以根据第三对应关系,获得第一网元的信息,将第一网元的信息作为转发信息。或者,第五网元根据第三对应关系,获得第一网元的信息之后,可以将第一网元的信息和第二网元的信息作为转发信息。
在子方式3中,第五网元可以从流信息或流请求中获得第二网元的信息,还可根据第一网元的信息与第二网元的信息之间的对应关系就能获得该转发信息,无需再通过其他信息就可以获得该转发信息,相对可以简化第五网元确定转发信息的方式。
方式一下,第五网元确定转发信息的第四种实现方式,这种实现方式可称为子方式4。
如果相关信息包括流信息中的第三网元的信息,那么第五网元可以根据第三网元的信息,确定转发信息。例如,第五网元可以根据第三网元的信息与转发信息之间的第四对应关系,确定与获得的第三网元的信息对应的转发信息。
第五网元可以从流信息或流请求中获得第三网元的信息。其中,如果第一数据流的传 输方向不同,则第三网元的信息可能有所区别。
(1)第一数据流为上行数据流,第五网元可以获得的第三网元的信息包括目的设备的信息,根据目的设备的信息与转发信息之间的第四对应关系,与确定与目的设备的信息对应的转发信息。
(2)如果第一数据流为下行数据流,第五网元可以获得的第三网元的信息包括源设备的信息,根据源设备的信息与转发信息之间的第四对应关系,确定与源设备的信息对应的转发信息。
这其中涉及到第五网元具体如何获得第四对应关系,下面对此进行举例介绍。
获得第四对应关系的方法一。
第五网元可以获得地址学习信息。该地址学习信息即为第四对应关系的一种实现方式。该地址学习信息例如包括DN中的部分或全部网元的地址,以及这些地址中的部分或全部地址中的每个地址对应的第一网元和/或第二网元的信息。
该地址学习信息可以预配置在第五网元中,或者第五网元也可以基于地址学习机制学习得到该地址学习信息。地址学习机制例如包括,第五网元根据DN中的部分或全部网元中的每个网元传输其他数据流时所对应的第一网元的信息和/或第二网元的信息,获得该地址学习信息。其他数据流与第一数据流是不同的数据流,例如其他数据流是指相应网元在传输第一数据流之前传输的数据流。
例如第一数据流为上行数据流,第五网元确定第一数据流的目的地址为地址1,而在地址学习信息中,目的设备的地址1对应的是UE的端口的标识为3,从而第五网元可确定转发信息包括UE的端口的标识为3。
获得第四对应关系的方法一可以适用但不限于单播传输或有目的地址的传输等。第五网元在获得第三网元的信息之后,进而可以根据预先学习的地址学习信息,获得转发信息,提供了另一种获得转发信息的方式。且,该获得第四对应关系的方法一无需对第五网元或除第五网元之外的其他网元的功能进行过多的拓展,不需要第五网元或除第五网元之外的其他网元执行额外的拓扑发现过程等,相对可以简化第五网元或除第五网元之外的其他网元的处理量。
获得第四对应关系的方法二。
第五网元可以获得第一拓扑信息。该第一拓扑信息为第四对应关系的另一种实现方式。其中,第一拓扑信息包括第一网元与至少一个网元之间的连接信息,和/或,第一拓扑信息包括第二网元与至少一个网元之间的连接信息。至少一个网元包括第三网元。
如果至少一个网元只包括第三网元,即第一网元与第三网元之间无需中间设备,或者第一网元与第三网元之间需要中间设备,但中间设备在转发数据流时,无需感知该数据流,即中间设备可以直接转发该数据流,这些情况下,第一拓扑信息包括第一网元与第三网元之间的连接信息,和/或第二网元与第三网元之间的连接信息。例如,以第一网元和第五网元均为UPF,第三网元为设备(device,Dev)1为例,第一拓扑信息包括:UPF1端口1,以及与该UPF的端口1连接的Dev1,UPF发现拓扑的过程例如:Dev1向UPF发送拓扑发现报文,Dev1和UPF之间的中间设备直接将该拓扑发现报文转发给UPF,进而UPF可以通过接收到的拓扑发现报文,从而确定UPF的端口1与该Dev1之间的连接关系。
作为一个示例,第五网元可以从其他网元获得第一拓扑信息,例如,第五网元可以从其他网元接收第二拓扑信息,其他网元是指除了第五网元之外的网元,例如AF。第二拓 扑信息包括第一网元跟第一网元的邻接网元之间的连接信息,其中,第一网元跟第一网元的邻接网元之间的连接信息包括第一网元的标识与第一网元的邻接网元的标识,或者第一网元跟第一网元的邻接网元之间的连接信息包括第一网元的端口的信息与第一网元的邻接网元的端口的信息,和/或,包括第二网元跟第二网元的邻接网元之间的连接信息,其中,邻接网元属于至少一个网元,其中,第二网元跟第二网元的邻接网元之间的连接信息包括第二网元的标识与第二网元的邻接网元的标识,或者第二网元跟第二网元的邻接网元之间的连接信息包括第二网元的端口的信息与第二网元的邻接网元的端口的信息。如果至少一个网元只包括第三网元,即第三网元直接与第二网元或第一网元连接,那么第五网元获得的第二拓扑信息即为第一拓扑信息。
或者,如果至少一个网元不止包括第三网元,即第三网元通过其他网元与第二网元或第一网元连接,那么第五网元还需根据第二拓扑信息以及第三拓扑信息,才能确定第一拓扑信息。其中,第三拓扑信息包括至少一个网元之间的连接信息。第三拓扑信息可以是预配置第五网元中,或者是第五网元从其他网元接收的,本申请实施例不对此进行限制,在该示例中,第五网元可以从其他网元获得第二拓扑信息,或者从其他网元获得第二拓扑信息和第三拓扑信息,第五网元无需在网络拓扑变化时实时更新第二拓扑信息,甚至无需对第三拓扑信息进行更新等,相对减少了第五网元的处理量。
作为另一个示例,第一拓扑信息可以是预配置在第五网元中。在该示例中,第五网元自身可以预存有相应的第一拓扑信息,并根据网络拓扑的变化,相应更新该第一拓扑信息,无需从其他网元获得该第一拓扑信息,相对减少了第五网元与其他网元之间的交互。
例如,请参照图5,为本申请实施例提供的第一拓扑信息的一种示例。如图5所示,DN中包含转发节点SW、第一终端设备Dev1和第二终端设备Dev2。以第一网元是UPF为例,UPF对应的第一拓扑信息包括UPF的端口1的标识,以及与该UPF的端口1连接的SW的端口1的标识,UPF的端口2的标识,以及与该UPF的端口2连接的Dev2的信息,可选的,还可以包括与该UPF的端口2连接的Dev2的端口的信息,例如Dev2的端口1的标识)。
在获得第四对应关系的方法二中,提供了另一种获得第四对应关系的方法,且在获得第四对应关系的方法二中,第五网元或除第五网元之外的其他网元无需借助在传输第一数据流之前传输的数据流的传输信息,只需通过感知网络拓扑,对应确定第四对应关系。且拓扑信息可以涉及多个网元之间的连接关系,而不同的数据流涉及的目的设备或源设备可能不同,因此第五网元基于第一拓扑信息,确定转发信息的方式可以适用于确定各个数据流的转发信息,即该方法的普适性较好。
方式一下,第五网元确定转发信息的第五种实现方式,这种实现方式可称为子方式5。如果相关信息包括流信息中的第一数据流的标识,第五网元可以预存有第一数据流的标识与转发信息之间的对应关系,例如称为第五对应关系,第五网元在获得第一数据流的标识之后,可以根据第五对应关系确定转发信息。其中,该第五对应关系可以是预配置在第五网元预中,或者在第一数据流的标识包括第一数据流的目的设备的信息和/或源设备的信息的情况下,则第五网元也可以基于子方式4中提到的获得第四对应关系的方法来获得第五对应关系,此处不再赘述。
例如第五网元确定第一数据流的标识为标识1,在第五对应关系中,第一数据流的标识1对应UPF的端口1的标识,则第五网元可以确定转发信息包括UPF的端口1的标识。
上述子方式1至子方式5是对第五网元确定转发信息的方式的示例,实际并不限于此。
作为一个示例,如果第一数据流的相关信息包括第一数据流的会话信息、第一网元的信息、第二网元的信息、第三网元的信息或第一数据流的标识中的一种或多种,那么第五网元可以根据第一数据流的相关信息中的任意一种或多种信息确定转发信息。或者,第五网元可以根据第一数据流的相关信息所包括的信息中优先级最高的信息确定转发信息,第一数据流的相关信息中的各个信息的优先级可以是第五网元预配置的,或者是除了第五网元之外的其他网元配置的,或者是协议规定,或者也可以是默认的,本申请实施例不对此进行限制。
方式二。
第五网元可以从其他网元接收该转发信息,其他网元是指通信系统中除了第五网元之外的网元。其中,其他网元确定转发信息的方式可以参照前文论述的子方式1-子方式5的内容,此处不再赘述。
例如,第五网元为Ctrl,AF可以确定第一数据流的转发信息,Ctrl可以从AF获得转发信息。
同理,除了第一数据流之外,第五网元还可以确定其他的一个或多个数据流的转发信息,例如其他数据流包括第二数据流等。需要说明的是,第五网元确定第一数据流的转发信息和第二数据流的转发信息的先后顺序可以是任意的,本申请实施例不对此进行限制。或者,第二数据流的转发信息可以是预配置在第五网元中。
步骤402,如果第一处理时间与第二数据流的第二处理时间存在冲突,则第五网元确定第一数据流在第一网元的处理时间和/或第二网元的处理时间。其中,第一处理时间为第一网元处理第一数据流的时间,第二处理时间为第一网元处理第二数据流的时间;或者,第一处理时间为第二网元处理第一数据流的时间,第二处理时间为第二网元处理第二数据流的时间。
如果同一个网元接收数据流的过程和发送数据流的过程是相互影响的,例如单工的网元的端口,例如,RAN,那么第一处理时间和第二处理时间可以是同一个网元对第一数据流和第二数据流进行的同种类型处理的时间,或者也可以是同一个网元对第一数据流和第二数据流进行的不同类型处理的时间。
如果同一个网元接收数据流的过程和发送数据流的过程是相互独立的,即同一个网元接收数据流的过程与发送数据流的过程互不影响,第一处理时间和第二处理时间为同一个网元分别对第一数据流和第二数据流进行的同种类型处理的时间,同种类型处理例如,同为接收处理,或者同为发送处理。例如,第一处理时间为第一网元接收第一数据流的时间,第二处理时间为第一网元接收第二数据流的时间。或者,第一处理时间为第一网元发送第一数据流的时间,第二处理时间为第一网元发送第二数据流的时间。或者,第一处理时间为第二网元接收第一数据流的时间,第二处理时间为第二网元接收第二数据流的时间。或者,第一处理时间为第二网元发送第一数据流的时间,第二处理时间为第二网元发送第二数据流的时间。
例如,将第一处理时间和第二处理时间理解为时刻的概念,例如,第一处理时间为接收第一数据流的起始时刻,第二处理时间可以理解为接收第二数据流的起始时刻。其中,接收数据流的起始时刻,可理解为开始接收该数据流的时刻。又例如,第一处理时间为发送第一数据流的起始时刻,第二处理时间可以理解为发送第二数据流的起始时刻。其中, 发送数据流的起始时刻,可理解为开始发送该数据流的时刻。
或者,也可以将第一处理时间和第二处理时间理解为时间段的概念,例如,第一处理时间为接收第一数据流的接收时间窗,第二处理时间为接收第二数据流的接收时间窗。其中,数据流的接收时间窗的起始时刻为开始接收该数据流的时刻,结束时刻为接收该数据流完毕的时刻。又例如,第一处理时间为发送第一数据流的发送时间窗,第二处理时间为发送第二数据流的发送时间窗,其中,接收时间窗和发送时间窗的具体表示形式可以参照前文论述的内容,此处不再赘述。
进一步地,第五网元在确定第一数据流的转发信息、第二数据流的转发信息、第一处理时间、以及第二处理时间之后,可以确定第一处理时间和第二处理时间是否存在冲突。
如果第一处理时间和第二处理时间为时刻的概念,则第一处理时间和第二处理时间相同,或者以第一处理时间或第二处理时间作为开始时刻,基于网元的能力,确定处理第一数据流的时间和第二数据流的时间存在重叠,则表示第一处理时间和第二处理时间存在冲突,而第一处理时间和第二处理时间不相同,或者,基于网元的能力,确定处理第一数据流的时间和第二数据流的时间不存在重叠,则表示第一处理时间和第二处理时间不存在冲突。
或者,如果第一处理时间和第二处理时间为时间段的概念,则如果第一处理时间和第二处理时间完全重叠,或第一处理时间和第二处理时间存在部分重叠,或第一处理时间和第二处理时间重叠的部分大于预设占比时,则表示第一处理时间和第二处理时间存在冲突,该预设占比是指第一处理时间与第二处理时间重叠的部分与第一处理时间之间的占比,或者第一处理时间与第二处理时间重叠的部分与第二处理时间之间的占比;而如果第一处理时间和第二处理时间不存在重叠,或第一处理时间和第二处理时间重叠的部分小于或等于预设占比,则表示第一处理时间和第二处理时间不存在冲突。
或者,根据第一处理时间和第二处理时间对应的同一个网元上的调度机制、接收机制、或发送机制,确定第一处理时间和第二处理时间是否存在冲突,本申请实施例对此不作限定,该方式可以用于基于各类调度方式下的确定冲突的机制,各类调度方式包括基于时隙的调度方式,或者其他类型的调度方式,本申请对此不作限定。
如果转发信息直接指示或间接指示第一网元的端口和/或第二网元的端口,且第一数据流和第二数据流由同一个网元的同一个端口处理,那么第五网元可以检测同一个网元的同一个端口分别对第一数据流和第二数据流的处理时间是否存在冲突。
例如,以第一处理时间和第二处理时间为时间段的概念,且第一数据流和第二数据流均由UPF的端口1接收为例,第五网元确定UPF的端口1接收第一数据流的第一处理时间为:13:31:00-13:31:10,确定UPF的端口1接收第二数据流的第二处理时间为:13:31:05-13:32:01,由于第一处理时间和第二处理时间存在部分重叠,因此第五网元可以确定第一处理时间和第二处理时间冲突。
而如果转发信息指示第一网元和/或第二网元,而并不指示网元的端口,且第一数据流和第二数据流是由同一个网元处理,那么第五网元可以检测同一个网元分别对第一数据流和第二数据流的处理时间是否存在冲突。
例如,以第一处理时间和第二处理时间为时间段的概念,且第一数据流和第二数据流均由RAN发送为例,第五网元确定RAN发送第一数据流的第一处理时间为:14:01:00-14:01:20,确定RAN发送第二数据流的第二处理时间为:14:01:00-14:01:20,由 于第一处理时间和第二处理时间完全重叠,因此第五网元可以确定第一处理时间和第二处理时间冲突。
作为一个示例,第一处理时间和第二处理时间可以是预配置在第五网元中的,或者第五网元确定的,下面以第五网元确定第一处理时间为例,示例介绍第五网元确定第一处理时间和第二处理时间的方式。
其中,第一处理时间的含义不同,其确定第一处理时间的方式可以多种,下面进行示例介绍。
确定方式一:
第一处理时间为第一网元处理第一数据流的时间。
(1)第五网元接收第一数据流到达第一网元的时间,那么第五网元可以直接将第一数据流到达第一网元的时间作为第一处理时间,或者第五网元可以根据第一数据流到达第一网元的时间,以及第一网元处理第一数据流所需的时长,从而确定第一处理时间。其中,第一网元处理第一数据流所需的时长可以是协议规定的,预配置在第五网元中的,或者第五网元根据第一数据流的流特征计算得到的,例如,第五网元根据第一数据流的数据量计算得到的。
(2)第五网元接收第一数据流到达第二网元的时间,那么第五网元可以根据第一数据流到达第二网元的时间,以及第一网元与第二网元之间的时延,确定第一处理时间。
例如,第二网元为通信系统的入口网元,第一网元为通信系统的出口网元,那么第五网元可以将第一数据流到达第二网元的时间,以及第一网元与第二网元之间的时延之和,作为第一处理时间。或者例如,第一网元为通信系统的入口网元,第二网元为通信系统的出口网元,那么第五网元可以将第一数据流到达第二网元的时间与第一网元与第二网元之间的时延之差,作为第一处理时间。
确定方式二:
第一处理时间为第二网元处理第一数据流的时间。
(1)第五网元接收第一数据流到达第二网元的时间,那么第五网元可以直接将第一数据流到达第二网元的时间作为第一处理时间,或者第五网元可以根据第一数据流到达第二网元的时间,以及第二网元处理第一数据流所需的时长,从而确定第一处理时间。
(2)第五网元接收第一数据流到达第一网元的时间,那么第五网元可以根据第一数据流到达第一网元的时间,以及第一网元与第二网元之间的时延,确定第一处理时间。
例如,第一网元为通信系统的入口网元,第二网元为通信系统的出口网元,那么第五网元可以将第一数据流到达第一网元的时间,以及第一网元与第二网元之间的时延之和,作为第一处理时间。或者例如,第二网元为通信系统的入口网元,第一网元为通信系统的出口网元,那么第五网元可以将第一数据流到达第一网元的时间与第一网元与第二网元之间的时延之差,作为第一处理时间。
作为一个示例,第五网元确定的,第五网元确定第二处理时间的方式可以参照确定第一处理时间的内容,此处不再赘述。
如果第五网元确定第一处理时间和第二处理时间存在冲突,那么可能导致第一网元和/或第二网元无法正常处理第一数据流,例如,无法发送第一数据流的全部或部分,或者延期发送第一数据流的全部或部分,或者延期发送第一数据流而导致后续拥塞,进而出现随机丢包的情况,又例如,无法接收第一数据流的全部或部分,或者延期接收第一数据流的 全部或部分,或者延期接收第一数据流而导致后续拥塞,进而出现随机丢包的情况,为了减少或避免第一网元和/或第二网元处理多个数据流的冲突,因此在本申请实施例中第五网元可以确定第一数据流在第一网元的处理时间和/或第一数据流在第二网元的处理时间。
第五网元确定第一数据流在第一网元的处理时间和/或第一数据流在第二网元的处理时间,可能有多种方式,下面举例介绍。
情况一。
如果第一处理时间和第二处理时间对应第一网元,其中,数据流的处理时间对应网元可以理解为该网元的端口处理该数据流的时间,例如第一处理时间为第一网元处理第一数据流的时间,第二处理时间为第一网元处理第二数据流的时间。而第一网元没有明确定义端口,或者第一网元存在一个或多个端口,但并不关注第一网元的端口,这些情况下,第五网元如果确定第一处理时间和第二处理时间冲突,则可以确定第一数据流在第一网元的处理时间。作为一个示例,第一网元后续可以根据重新获得的第一网元对第一数据流的处理时间,处理第一数据流。
第五网元确定第一数据流在第一网元的处理时间的方式可以有多种,下面举例介绍。
示例一。
第五网元可以对第一处理时间进行调整,获得重新确定的第一数据流在第一网元的处理时间。
具体的,第五网元检测到第一网元对第一数据流和第二数据流的处理时间存在冲突,也就是表示第一网元对多个数据流的处理时间存在冲突,而第一处理时间相当于第一网元对第一数据流的处理时间的初始理论值,因此,第五网元可以直接对第一处理时间进行调整,从而重新获得第一网元对第一数据流的处理时间。
例如,如果第一处理时间和第二处理时间为时刻的概念,那么第五网元只需改变第一处理时间,即可获得第一网元对第一数据流的处理时间;如果第一处理时间和第二处理时间为时间段的概念,那么第五网元可以确定第一处理时间和第二处理时间之间的重叠的部分对应的时长,例如可以称为重叠时长,根据重叠时长,调整第一处理时间,例如将第一处理时间的起始时刻和结束时刻分别与该重叠时长相加,或者将第一处理时间的起始时刻和结束时刻分别减去该重叠时长,从而获得第一网元对第一数据流的处理时间。
示例二。
第五网元预配置了第一数据流到达第一网元的时间,或者从其他网元获得了第一数据流到达第一网元的时间,那么第五网元可以调整第一数据流到达第一网元的时间,并根据调整后的第一数据流到达第一网元的时间,确定第一网元对第一数据流的处理时间。
如果需要确定的第一网元对第一数据流的处理时间为第一网元对第一数据流的接收时间,且该需要确定的第一网元对第一数据流的处理时间为时间的概念,那么调整后的第一数据流到达第一网元的时间可以视为确定出的第一网元对第一数据流的处理时间。
如果需要确定的第一网元对第一数据流的处理时间为第一网元对第一数据流的接收时间,且该需要确定的第一网元对第一数据流的处理时间为时间段的概念,那么第五网元可以根据调整后的第一数据流到达第一网元的时间作为该第一网元对第一数据流的处理时间的起始时刻,而将调整后的第一数据流到达第一网元的时间与该第一网元接收第一数据流所需的时长之和,作为该第一网元对第一数据流的处理时间的结束时刻。其中,第一网元接收第一数据流所需的时长可以理解为第一网元从开始接收第一数据流到接收第一 数据流完毕所耗费的时长,该第一网元接收第一数据流所需的时长可以是预配置在第五网元中,或者第五网元从其他网元获得的。
如果需要确定的第一网元对第一数据流的处理时间为第一网元对第一数据流的发送时间,那么第五网元可以根据调整第一数据流到达第一网元的时间,以及第一网元处理第一数据流的内部处理时延,获得第一网元对第一数据流的处理时间。第一网元处理第一数据流的内部处理时延是指第一网元从开始接收第一数据流到第一网元开始发送第一数据流所耗费的时长。
示例三。
第五网元预配置了第一数据流的5GS时延,或者从其他网元获得了第一数据流的5GS时延,那么第五网元可以调整第一数据流的5GS时延,并根据调整后的5GS,确定第一网元对第一数据流的处理时间。
第五网元可以预配置了第一数据流到达通信系统的入口网元的时间,或者第五网元可以从其他网元获得第一数据流到达通信系统的入口网元的时间,因此第五网元可以对5GS时延进行调整,例如,第五网元可以将5GS时延增加重叠时长,或者可以将5GS减少重叠时长,重叠时长的含义可以参照前文,此处不再赘述,并将调整后的5GS时延与第一数据流到达通信系统的入口网元的时间之和,作为第一网元对第一数据流的处理时间。
示例四。
第五网元对第一数据流的5GS时延进行调整,以及对第一数据流到达通信系统的入口网元的时间进行调整,例如,第五网元可以在第一数据流到达通信系统的入口网元的时间上增加重叠时长,或者可以在第一数据流到达通信系统的入口网元的时间上减少重叠时长,重叠时长的含义可以参照前文,此处不再赘述,并根据调整后的5GS时延,以及调整后的第一数据流到达通信系统的入口网元的时间,确定第一网元对第一数据流的处理时间。
示例四相当于示例三和示例二的结合,其中,第五网元获得5GS时延以及第一数据流到达通信系统的入口网元的时间的方式可以参照前文,此处不再赘述。
在该情况一中,如果第一处理时间和第二处理时间为时间的概念,那么重新确定的第一网元对第一数据流的处理时间与第二处理时间不同,因此避免了第一网元第一数据流和第二数据流的处理时间的冲突情况,第一网元后续可以按照重新确定的第一网元对第一数据流的处理时间处理第一数据流,提高了第一网元处理数据流的可靠性。
如果第一处理时间和第二处理时间为时间段的概念,而第五网元是对第一数据流的处理时间的初值进行调整时,可以沿减少第一处理时间和第二处理时间的重叠的方向,调整第一处理时间,这样可以减少第一网元对第一数据流和第二数据流的处理时间存在时间冲突的问题,由于减少了时间冲突的问题,因此第一网元后续可以更顺利地处理第一数据流和第二数据流,从而提高处理第一数据流的可靠性。
在情况一中,如果第一处理时间和第二处理时间对应第一网元的端口,那么情况一可以包括以下几种子情况。其中,数据流的处理时间对应网元的端口可以理解为该网元的端口处理该数据流的时间。
子情况1。
第一处理时间为第一网元的第一端口对第一数据流的处理时间,第二处理时间为第一网元的第一端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间冲突,则可以确定第一数据流在第一网元的第一端口的处理时间。第一端口为第一网元 接收或发送第一数据流的端口。
第一处理时间为第一网元的第一端口对第一数据流的处理时间,也就表示第五网元已经获得了第一网元的第一端口对第一数据流的处理时间的初始值,因此第五网元可以重新确定第一网元的第一端口对第一数据流的处理时间。重新确定处理时间的内容可以参照前文,此处不再赘述。
如果第一处理时间和第二处理时间为时间的概念,则第五网元可以重新确定一个与第一处理时间不同的时间,作为第一网元的第一端口对第一数据流的处理时间。
如果第一处理时间和第二处理时间为时间段的概念,则第五网元可以确定重叠时长,重叠时长的含义可以参照前文,此处不再赘述,那么第五网元可以根据该重叠时长,确定第一网元的第一端口对第一数据流的处理时间,例如第五网元可以将该重叠时长对应的时长与第一处理时间之和,作为第一网元的第一端口对第一数据流的处理时间;或者例如,第五网元可以将该重叠时长与第一处理时间之差,作为第一网元的第一端口对第一数据流的处理时间。
该子情况1中,当第一网元的同个端口对多个数据流的处理时间冲突时,第一网元可以确定对第一数据流的处理时间,由于重新确定的第一网元的第一端口对第一数据流的处理时间与第二处理时间不同,或者重新确定的第一网元的第一端口对第一数据流的处理时间和第二处理时间的重叠部分减少了,从而减少了冲突问题,便于后续该第一网元的第一端口成功处理第一处理时间和第二处理时间。
例如,以第一数据流是上行数据流,第一网元为UPF,第一网元的第一端口为发送第一数据流的UPF的端口1,第一处理时间为UPF的端口1发送第一数据流的发送时间,具体为15:01:00-15:01:10,第二处理时间为UPF的端口1发送第二数据流的发送时间,具体为15:01:09-15:01:15为例,第五网元确定第一处理时间和第二处理时间完全重叠,因此第五网元确定第一处理时间和第二处理时间冲突,则第五网元可以调整第一处理时间,例如将第一处理时间往前调整两秒,即将15:01:00-15:01:10调整为:15:00:58-15:01:08。
子情况2。
第一处理时间为第一网元的第一端口对第一数据流的处理时间,第二处理时间为第一网元的第一端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在第一网元的第二端口对应的处理时间。其中,第一端口为第一网元接收数据流的端口,第二端口为第一网元发送数据流的端口,或者,第一端口为第一网元发送数据流的端口,第二端口为第一网元接收数据流的端口。具体的,由于多个数据流在第一网元的第一端口的处理时间冲突,那么表示多个数据流在第一网元的第二端口的处理时间存在冲突的可能性也较大,因此第五网元可以确定第一数据流在第一网元的第二端口对应的处理时间。
在确定第一数据流在第一网元的第二端口对应的处理时间时,可以根据重叠时长,确定第一数据流在第一网元的第二端口对应的处理时间,重叠时长的含义可以参照前文,此处不再赘述。
例如,第五网元可以根据第一网元在第一端口的处理时间,以及第一网元的第一端口和第二端口之间的时延,以及重叠时长三者之和,从而确定第一数据流在第一网元的第二端口对应的处理时间。或者例如,第五网元可以确定第一网元在第一端口的处理时间和第一网元的第一端口和第二端口之间的时延之和,并根据确定出的时延之和减去重叠时长, 从而确定第一数据流在第一网元的第二端口对应的处理时间。其中,第一网元在第一端口的处理时间和第一网元的第一端口和第二端口之间的时延可以是预配置在第五网元中,或者可以是第五网元从其他网元获得的。
该实施例中,可以减少第二端口对第一数据流和第二数据流的处理时间的冲突,还可以减少第一处理时间和第二处理时间之间的冲突,例如第一端口为第一网元发送第一数据流的端口,第二端口为第一网元接收第一数据流的端口,确定了第一数据流在第一网元的第二端口的处理时间,实际上也就对应改变了第一数据流在第一网元的第一端口的处理时间。
例如,以第一数据流是上行数据流,第一网元为UPF,第一网元的第一端口为发送第一数据流的UPF的端口1,第一网元的第二端口为接收第一数据流的UPF的端口2,第一处理时间为UPF的端口1发送第一数据流的发送时间,具体为15:05:10-15:05:15,第二处理时间为UPF的端口1发送第二数据流的发送时间,具体为15:05:14-15:05:18为例,第五网元确定第一处理时间和第二处理时间存在冲突,第五网元可以确定UPF的端口2接收第一数据流的接收时间为15:04:10-15:04:15。
子情况3。
第一处理时间为第一网元的第一端口对第一数据流的处理时间,第二处理时间为第一网元的第一端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在第一网元的第一端口的处理时间,以及确定第一数据流在第一网元的第二端口的处理时间。第一端口和第二端口的含义可以参照前文,此处不再赘述。确定第一数据流在第一网元的第一端口的处理时间,以及确定第一数据流在第一网元的第二端口的处理时间的方式可以参照前文,此处不再赘述。
例如,以第一数据流是上行数据流,第一网元为UPF,第一网元的第一端口为发送第一数据流的UPF的端口1,第一网元的第二端口为接收第一数据流的UPF的端口2,第一处理时间为UPF的端口1发送第一数据流的发送时间,具体为15:05:15-15:05:20,第二处理时间为UPF的端口1发送第二数据流的发送时间,具体为15:05:18-15:05:25为例,第五网元确定第一处理时间和第二处理时间存在冲突,第五网元可以确定UPF的端口1发送第一数据流的发送时间为15:06:00-15:06:05,确定UPF的端口2接收第二数据流的接收时间为15:05:00-15:05:05。
情况二。
第一处理时间为第一网元对第一数据流的处理时间,第二处理时间为第一网元对第二数据流的处理时间。或者,第一处理时间为第一网元的第一端口对第一数据流的处理时间,第二处理时间为第一网元的第一端口对第二数据流的处理时间。或者,第一处理时间为第一网元的第二端口对第一数据流的处理时间,第二处理时间为第一网元的第二端口对第二数据流的处理时间。而第二网元没有明确定义端口,或者第二网元存在一个或多个端口,但并不关注第二网元的端口,这些情况下,第五网元如果确定第一处理时间和第二处理时间存在冲突,而多个数据流在第一网元的处理时间冲突,那么表示多个数据流在第二网元的处理时间存在冲突的可能性也较大,因此在本申请实施例中,第五网元可以确定第二网元处理第一数据流的处理时间。
其中,确定第二网元处理第一数据流的处理时间的方式可以有多种,下面示例介绍:
第一种。
第五网元根据第一处理时间,重叠时长,以及第一网元与第二网元之间的时延,确定第二网元处理第一数据流的处理时间。其中,重叠时长的含义可以参照前文,此处不再赘述。
例如,第一网元为5GS的入口网元,那么第五网元确定第一处理时间,以及第一网元与第二网元之间的时延之和,在确定出的和的基础上增加重叠时长,确定第二网元处理第一数据流的处理时间。或者,第五网元确定第一处理时间,以及第一网元与第二网元之间的时延之和,在确定出的和的基础上减少重叠时长,从而确定第二网元处理第一数据流的处理时间。其中,第一网元与第二网元之间的时延可以是预配置在第五网元中,或者第五网元从其他网元获得的,重叠时长的含义可以参照前文,此处不再赘述。
例如,第一网元为5GS的出口网元,那么第五网元确定第一处理时间,以及第一网元与第二网元之间的时延之差,在确定出的差的基础上增加重叠时长,确定第二网元处理第一数据流的处理时间。第五网元确定第一处理时间,以及第一网元与第二网元之间的时延之差,在确定出的差的基础上减去重叠时长,确定第二网元处理第一数据流的处理时间。
第二种。
第五网元根据重叠时长,以及第一数据流到达第二网元的时间,确定第二网元处理第一数据流的处理时间。
其中,第一数据流到达第二网元的时间可以是预配置在第五网元中,或者第五网元从其他网元获得的。第五网元将第一数据流到达第二网元的时间与重叠时长之和,作为第二网元处理第一数据流的处理时间,或者可以将第一数据流到达第二网元的时间与重叠时长之差,作为第二网元处理第一数据流的处理时间。在情况二中,如果第二网元明确定义有端口,那么情况二可以包括以下几种子情况:
子情况4。
第一处理时间为第一网元对第一数据流的处理时间,第二处理时间为第一网元对第二数据流的处理时间。或者,第一处理时间为第一网元的第一端口对第一数据流的处理时间,第二处理时间为第一网元的第一端口对第二数据流的处理时间。或者,第一处理时间为第一网元的第二端口对第一数据流的处理时间,第二处理时间为第一网元的第二端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间冲突,则确定第一数据流在第二网元的第三端口的处理时间。第三端口为第二网元接收或发送第一数据流的端口。
例如,以第一数据流是上行数据流,第一网元为UPF,第二网元为UE,UE的第三端口为发送第一数据流的UE的端口3,第一处理时间为UPF的端口1接收第一数据流的接收时间,具体为16:04:00-16:04:20,第二处理时间为UPF的端口1接收第二数据流的接收时间,具体为16:04:00-16:04:20为例,第五网元确定第一处理时间和第二处理时间完全重叠,从而确定存在冲突,那么第五网元可以确定UE的端口3发送第一数据流的发送时间具体为:16:05:10-15:05:30。
子情况5。
第一处理时间为第一网元对第一数据流的处理时间,第二处理时间为第一网元对第二数据流的处理时间。或者,第一处理时间为第一网元的第一端口对第一数据流的处理时间,第二处理时间为第一网元的第一端口对第二数据流的处理时间。或者,第一处理时间为第一网元的第二端口对第一数据流的处理时间,第二处理时间为第一网元的第二端口对第二 数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间冲突,则确定第一数据流在第二网元的第四端口的处理时间。其中,第三端口为第二网元接收数据流的端口,第四端口为第二网元发送数据流的端口,或者,第三端口为第二网元发送数据流的端口,第四端口为第二网元接收数据流的端口。
其中,确定第一数据流在第二网元的第四端口的处理时间可以参照前文确定第一数据流在第二网元的处理时间的类似方式,此处不再赘述。
例如,以第一数据流为下行数据流,第一网元为UPF,第二网元为UE,UE的第四端口为UE的端口4为例,第一处理时间为第一数据流在UPF的端口2的发送时间,具体为:17:05:00-17:05:10,第二处理时间为第二数据流在UPF的端口2的发送时间,具体为:17:05:05-17:05:20,第五网元第一处理时间和第二处理时间完全相同,即确定第一处理时间和第二处理时间存在冲突,第五网元确定UPF的端口2和UE的端口4之间的时延为3分钟,并根据第一处理时间和第二处理时间,确定重叠时长为5秒,因此第五网元确定可以UE的端口4发送第一数据流的处理时间具体为:17:07:55-17:08:05。
子情况6。
第一处理时间为第一网元对第一数据流的处理时间,第二处理时间为第一网元对第二数据流的处理时间。或者,第一处理时间为第一网元的第一端口对第一数据流的处理时间,第二处理时间为第一网元的第一端口对第二数据流的处理时间。或者,第一处理时间为第一网元的第二端口对第一数据流的处理时间,第二处理时间为第一网元的第二端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间冲突,则确定第一数据流在第二网元的第三端口的处理时间,以及确定第一数据流在第二网元的第三端口的处理时间。其中,第三端口和第四端口的含义可以参照前文子情况5中论述的内容,此处不再赘述。第五网元确定第一数据流在第二网元的第三端口的处理时间的方式,以及确定第一数据流在第二网元的第三端口的处理时间的方式可以参照前文,此处不再赘述。
作为一个示例,上述情况一和上述情况二可以结合,另外,上述子情况1-3中的任意一种子情况可以与上述子情况4-6中的任意一种子情况相互结合。
下面以上述子情况3与子情况5结合为例进行介绍:第一处理时间为第一网元的第一端口对第一数据流的处理时间,第二处理时间为第一网元的第一端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间冲突,则确定第一数据流在第一网元的第一端口的处理时间,第一数据流在第一网元的第二端口对应的处理时间,以及第一数据流在第二网元的第四端口的处理时间。
其中,上述子情况1至3中的任意一种子情况可以与上述子情况4至6中的任意一种子情况相互结合的其它情况,此处不再一一罗列。
情况三。
第一处理时间为第二网元处理第一数据流的处理时间,第二处理时间为第二网元处理第二数据流的处理时间,而第二网元没有明确定义端口,或者第二网元存在一个或多个端口,但并不关注第二网元的端口,这些情况下,第五网元如果确定第一处理时间和第二处理时间存在冲突,即表示第五网元对第一数据流和第二数据流的处理时间存在冲突,因此第五网元可以确定第一数据流在第二网元的处理时间。
其中,第五网元确定第一数据流在第二网元的处理时间的方式可以参照前文情况一论述的内容,此处不再赘述。
在情况三中,如果第一处理时间和第二处理时间对应第二网元的端口,那么情况三可以具体包括以下几种子情况。其中,数据流的处理时间对应网元的端口可以理解为该网元的端口处理该数据流的时间。
子情况7。
第一处理时间为第二网元的第三端口对第一数据流的处理时间,以及第二处理时间为第二网元的第三端口对第一数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在第三网元的第三端口的处理时间。第三端口的含义可以参照前文论述的第三端口的含义,此处不再赘述。其中,确定第一数据流在第三网元的第三端口的处理时间的方式可以参照前文子情况1论述的内容,此处不再赘述。
子情况8。
第一处理时间为第二网元的第三端口对第一数据流的处理时间,以及第二处理时间为第二网元的第三端口对第一数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,则可以确定第一数据流在第二网元的第四端口的处理时间。第三端口和第四端口的含义可以参照前文论述的含义,此处不再赘述,确定第一数据流在第二网元的第四端口的处理时间可以参照前文子情况2论述的内容,此处不再赘述。
子情况9。
第一处理时间为第二网元的第三端口对第一数据流的处理时间,以及第二处理时间为第二网元的第三端口对第一数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,则可以确定第一数据流在第二网元的第三端口的处理时间,以及第一数据流在第二网元的第四端口的处理时间。第三端口和第四端口的含义可以参照前文论述内容,此处不再赘述。确定第一数据流在第二网元的第三端口的处理时间,以及第一数据流在第二网元的第四端口的处理时间的内容可以参照前文子情况3论述的内容,此处不再赘述。
情况四。
第一处理时间为第二网元对第一数据流的处理时间,第二处理时间为第二网元对第二数据流的处理时间。或者,第一处理时间为第二网元的第三端口对第一数据流的处理时间,第二处理时间为第二网元的第三端口对第二数据流的处理时间。或者,第一处理时间为第二网元的第四端口对第一数据流的处理时间,第二处理时间为第二网元的第四端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,由于多个数据流在第二网元的处理时间冲突,那么多个数据流在第一网元的处理时间存在冲突的可能性也较大,因此在本申请实施例中,第五网元可以确定第一网元处理第一数据流的处理时间。
在情况四中,如果第二网元明确定义有端口,那么情况四可以包括以下几种子情况:
子情况10。
第一处理时间为第二网元对第一数据流的处理时间,第二处理时间为第二网元对第二数据流的处理时间。或者,第一处理时间为第二网元的第三端口对第一数据流的处理时间,第二处理时间为第二网元的第三端口对第二数据流的处理时间。或者,第一处理时间为第二网元的第四端口对第一数据流的处理时间,第二处理时间为第二网元的第四端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,那么可以确定第一数据流在第一网元的第一端口的处理时间。其中,第一端口的含义可以参照前文 论述的内容,此处不再赘述。确定第一数据流在第一网元的第一端口的处理时间可以参照前文子情况4论述的内容,此处不再赘述。
子情况11。
第一处理时间为第二网元对第一数据流的处理时间,第二处理时间为第二网元对第二数据流的处理时间。或者,第一处理时间为第二网元的第三端口对第一数据流的处理时间,第二处理时间为第二网元的第三端口对第二数据流的处理时间。或者,第一处理时间为第二网元的第四端口对第一数据流的处理时间,第二处理时间为第二网元的第四端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,那么可以确定第一数据流在第一网元的第二端口的处理时间。第二端口的含义可以参照前文论述的内容,此处不再赘述。确定第一数据流在第一网元的第二端口的处理时间可以参照前文子情况4论述的内容,此处不再赘述。
子情况12。
第一处理时间为第二网元对第一数据流的处理时间,第二处理时间为第二网元对第二数据流的处理时间。或者,第一处理时间为第二网元的第三端口对第一数据流的处理时间,第二处理时间为第二网元的第三端口对第二数据流的处理时间。或者,第一处理时间为第二网元的第四端口对第一数据流的处理时间,第二处理时间为第二网元的第四端口对第二数据流的处理时间。第五网元如果确定第一处理时间和第二处理时间存在冲突,那么可以确定第一数据流在第一网元的第一端口的处理时间,以及确定第一数据流在第一网元的第二端口的处理时间。确定第一数据流在第一网元的第二端口的处理时间可以参照前文子情况5论述的内容,此处不再赘述。
作为一个示例,上述情况三和上述情况四可以结合,另外,上述子情况7至9中的任意一种子情况可以与上述子情况10至12中的任意一种子情况可以相互结合,此处不再一一列举。
作为一个示例,本申请实施例中是以确定第一数据流在第一网元和/或第二网元的处理时间为例进行介绍,实际上第五网元也可以确定第二数据流在第一网元和/或第二网元的处理时间,第五网元也可以确定第一数据流在第一网元和/或第二网元的处理时间,以及确定第二数据流在第一网元和/或第二网元的处理时间。其中,确定第二数据流在第一网元和/或第二网元的处理时间可以参照前文论述的确定第一数据流在第一网元和/或第二网元的处理时间的内容,此处不再赘述。
在图4所示的实施例中,提供了多种确定第一数据流的转发信息的方式,且能够根据该转发信息,确定同一个网元对第一数据流和第二数据流的处理时间是否存在冲突,提供了一种检测处理时间冲突的方式。且在检测到存在时间冲突时,可以灵活地确定第一数据流在第一网元和/或第二网元的处理时间,从而减少或避免同一个网元对多个数据流的处理时间冲突情况。
为了更清楚地介绍本申请实施例涉及的无线通信方法,下面第五网元可以为NEF、AF、UPF、Ctrl、UE、PCF或SMF中的一种,以及第五网元根据上述方式1至方式5中的一种方式确定转发信息为例,对本申请实施例中的无线通信方法的过程进行示例介绍。
1、第五网元为NEF,NEF采用上述方式4中基于地址学习信息,确定转发信息。
请参考图6,为本申请实施例提供的无线通信方法的流程示意图,图6中是以第一数据流为上行数据流、第一网元为UPF、第二网元为UE、转发信息包括UPF的信息为例进 行说明。
步骤601,UPF向NEF发送地址学习信息。
UPF预配置有DN中的地址学习信息,或者基于地址学习机制,学习到DN中的地址学习信息。该地址学习信息包括DN中各个网元的地址,以及每个地址对应的UPF的信息。UPF的信息包括:UPF的标识、UPF的实例标识、或UPF的端口的信息中的一项或多项。地址学习机制可以参照前文图4中论述的内容,此处不再赘述。该示例中的地址学习信息即为前文论述的第四对应关系的一种具体示例。
UPF可以向NEF上报该地址学习信息,或者UPF通过SMF将地址学习信息转发给NEF,或者UPF通过PCF将地址学习信息转发给NEF,或者UPF依次通过SMF和PCF将地址学习信息转发给NEF,本申请实施例对此不作限定。
步骤602,AF向NEF发送流请求。
该流请求可以包括第三网元的信息。如果第一数据流为上行数据流,那么第三网元的信息为目的地址;如果第一数据流为下行数据流,那么第三网元的信息为源地址。应当说明的是,图6中是以流请求包括目的地址为例进行说明。
作为一个示例,流请求还可以包括第一数据流到达UE的时间,或者NEF预配置有第一数据流到达UE的时间。
NEF可以根据第一数据流到达UE的时间,以及5GS的内部处理时延,从而确定UPF发送第一数据流的发送时间,即第一数据流的第一处理时间,这里的第一处理时间可以理解为UPF理论上发送第一数据流的发送时间。其中,5GS的内部处理时延可以是AF配置给NEF的,或者预配置在NEF中的,本申请实施例对此不作具体限制。
作为一个示例,AF可以根据第一数据流到达UE的时间,以及5GS的内部处理时延,确定UPF发送第一数据流的发送时间,并将第一处理时间发送给NEF。
同理,NEF可以获得UPF发送第二数据流的发送时间,即确定第二处理时间。确定第二处理时间的方式可以参照前文论述的确定第一处理时间的方式,此处不再赘述。
在另一个示例中,NEF也可以自行获得第三网元的信息,自行创建流请求。
步骤603,NEF根据地址学习信息,以及目的地址,确定UPF的信息。
NEF在获得地址学习信息和目的地址之后,可以从地址学习信息中,确定出与该目的地址对应的UPF的信息。
在另一种可能的实施例中,NEF可以在获得第三网元的信息之后,将第三网元的信息发送给UPF,UPF确定与该第三网元的信息对应的UPF的信息,并确定出的UPF的信息发送给NEF。在该实施例中,UPF可以不用上报地址学习信息,UPF只需向NEF反馈第三网元的信息对应的UPF的信息,从而相对减少了UPF和NEF之间的交互。
同理,NEF也可以获得第二数据流对应的UPF的信息,确定第二数据流对应的UPF的信息的方式可以参照前文论述的确定第一数据流对应的UPF的信息的方式,此处不再赘述。
步骤604,NEF根据UPF的信息,如果确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在UPF的发送时间。
NEF如果确定第一数据流和第二数据流均需要从UPF的同一端口发送,且确定第一处理时间和第二处理时间存在冲突,那么表示该UPF的同一端口发送第一数据流和第二数据流的时间存在冲突,因此,NEF可以调整第一数据流到达UE的时间和/或调整UE和UPF 之间的时延,相当于对UPF发送该第一数据流的发送时间进行了调整,即相当于调整了第一处理时间,NEF可以根据调整后的第一数据流到达UE的时间和/或调整后的调整UE和UPF之间的时延,从而确定调整后的第一处理时间,并将调整后的第一处理时间作为第一数据流在UPF的发送时间。
其中,调整后的第一处理时间与第一处理时间之间的时间差称为调整时间,调整时间可以为具体的一个时间调整值,也可以是一个时间调整区间。
在本申请实施例中,NEF改变了第一数据流在UPF的发送时间,从而可以减少或避免第一数据流在UPF的发送时间与第二数据流在UPF的发送时间之间的冲突问题。
图6中是以确定第一数据流在UPF的发送时间为例进行说明,同理,NEF还可以确定第一数据流在UPF的接收时间、第一数据流在UE的接收时间或第一数据流在UE的发送时间中的一项或多项,本申请实施例对此不作限制。
步骤605,NEF将出口调度信息配置给UPF。
出口调度信息至少包括第一数据流在UPF的发送时间,这里的第一数据流在UPF的发送时间是指NEF在步骤604确定出的第一数据流在UPF的发送时间,即为调整后的第一处理时间。
作为另一个示例,NEF可以通过PCF将第一数据流在UPF的发送时间配置给UPF,或者NEF可以将第一数据流在UPF的发送时间配置给PCF,PCF可以将该第一数据流在UPF的发送时间携带在策略信息中,并将策略信息转发给UPF,该策略信息除了包括该第一数据流在UPF的发送时间之外,还可以包括服务质量信息和监测信息等,监测信息例如针对时延的监测信息,时延例如,前文中的5GS时延。
作为另一个示例,NEF可以通过PCF将第一数据流在UPF的发送时间配置给UPF。或者,NEF可以通过SMF将第一数据流在UPF的发送时间配置给UPF。或者,NEF可以依次通过PCF和SMF将第一数据流在UPF的发送时间配置给UPF,本申请实施例对此不作限定。
NEF将出口调度信息配置给UPF时,还可以将该第一数据流的流信息一并配置给UPF,以便于UPF根据该出口调度信息,发送第一数据流。
作为一个示例,NEF如果确定了第一数据流在UE的接收时间和/或确定了第一数据流在UE的发送时间,那么NEF可以将第一数据流在UE的接收时间和/或确定了第一数据流在UE的发送时间配置给UE,配置给UE的方式可以参照前文配置给UPF的方式,此处不再赘述。
作为一个示例,NEF如果确定了第一数据流在UPF的接收时间,也可以一并将第一数据流在UPF的接收时间配置为UPF。
作为一个示例,NEF为UPF配置的调度信息可以是数据流为粒度,以数据流为粒度可以理解为NEF为UPF配置每个数据流对应的调度信息,调度信息包括出口调度信息和/或入口调度信息,出口调度信息包括用于指示发送数据流的发送时间,入口调度信息包括用于指示接收数据流的接收时间,例如,以调度信息包括用于指示发送数据流的发送时间为例,NEF为UPF配置了第一数据流在UPF的发送时间,UPF在后续发送第一数据流时,可以按照该第一数据流在UPF的发送时间发送第一数据流。
作为另一个示例,NEF为UPF配置的调度信息可以是端口为粒度,以端口为粒度可以理解为NEF可以将该端口对应的第一数据流的调度信息和其他数据流的调度信息合并后 发送给UPF,以调度信息为发送时间窗为例,NEF可以将多个数据流的发送时间窗合并为一个大的发送时间窗,并发送给UPF,UPF基于合并的发送时间窗发送多个数据流。该示例中,UPF可以参照NEF配置的时间,灵活地处理各个数据流,这样在减少时间冲突的情况下,还能灵活协调UPF的处理资源,或灵活协调各个数据流的处理时间。
例如,NEF配置了UPF的端口1在13:01-13:03分别发送第一数据流和第二数据流,UPF在获得这两个数据流的发送时间之后,可以在13:01-13:02发送第二数据流,在13:02-13:03发送第一数据流。
作为另一个示例,NEF为UPF配置的调度信息可以是队列为粒度,以队列为粒度可以理解为NEF可以将队列中的第一数据流的调度信息和其他数据流的调度信息合并后发送给UPF,队列可以理解为UPF的某个端口或UPF发送数据流的队列。以调度信息包括发送时间为例,UPF可以获得某个端口对应多个数据流的发送时间,在后续发送多个数据流时,可以按照各个发送时间,灵活地调度多个数据流。在该示例中,UPF可以根据NEF配置的数据流的处理时间,灵活地发送相应的数据流,在减少数据流的时间冲突的情况下,灵活协调多个数据流的发送时间,提高UPF收发数据流的效率,以满足不同业务的数据流的传输优先级需求。
例如,NEF配置了UPF的端口2从11:01开始发送第一队列中的第一数据流和第二数据流发送,并在11:06发送完成。对应地,UPF可以在11:01-11:02发送第二数据流,在11:04-11:05发送第一数据流。
步骤606,NEF将第一数据流到达UE的时间和调整时间发送给SMF。
这里的调整时间的含义可以参照前文步骤605论述的内容,此处不再赘述。
步骤607,SMF根据第一数据流到达UE的时间和调整时间,计算时间敏感通信辅助参数(time sensitive communication assistant information,TSCAI)。
TSCAI是用于辅助RAN进行调度的信息,是指数据流到达接入网网元的时间,如果第一数据流为上行数据流,那么TSCAI为UE向接入网网元发送第一数据流的时间,如果第一数据流为第一数据流到达接入网网元的时间。
以图6为例,SMF可以根据第一数据流到达UE的时间、调整时间、以及UE的内部处理时间,从而确定UE发送第一数据流的时间,即TSCAI。例如,将第一数据流到达UE的时间、调整时间、以及UE的内部处理时间相加,从而获得TSCAI。
步骤608,SMF将TSCAI配置给RAN。
RAN在接收TSCAI之后,可以根据TSCAI调度第一数据流。
在步骤606-步骤608的实施例中,RAN可以参照调整后的TACAI,调度第一数据流,以减少或避免第一数据流和第二数据流在RAN的时间冲突的情况。
步骤609,NEF向AF发送第一数据流在UPF的发送时间。
步骤609中的第一数据流在UPF的发送时间是指前文调整后的第一处理时间。
NEF将第一数据流在UPF的发送时间发送给AF,AF可以参照该第一数据流在UPF的发送时间,进而确定其他网元处理数据流的时间,其他网元是指除了UPF之外的网元,例如,DN中的终端设备或转发节点等。其他网元处理数据流的时间包括:其他网元接收第一数据流的时间,其他网元转发第一数据流的时间,或其他网元针对第一数据流进行反馈的时间等一项或多项。AF后续可以根据其他网元收发第一数据流的时间,从而确定下一个数据流到达UE或UPF的时间。
进一步地,NEF可以向AF反馈第一数据流到达UE的时间,以及第一数据流在UPF的发送时间。AF可以结合第一数据流到达UE的时间、UE和UPF之间的时延、以及其他网元之间的时延,确定的其他网元处理第一数据流的处理时间,其他网元处理第一数据流的处理时间可以为其他网元发送和/或接收第一数据流的时间。
作为一个示例,步骤601-步骤603为可选的部分、步骤605为可选的步骤、步骤606-步骤608为可选的部分、以及步骤609为可选的步骤。
在图6所示的实施例中,NEF可以根据第一数据流的第三网元的信息,确定与地址学习信息对应的转发信息,从而根据转发信息,判断第一数据流和第二数据流在UPF的同个端口上存在发送时间是否存在冲突,提供了一种检测时间冲突的解决方案,且,在检测到时间冲突时,可以调整第一网元或第二网元处理第一数据流的时间,以减少或避免多个数据流在UPF的时间冲突问题。进一步地,NEF还可以将调整后的处理时间等反馈给SMF,以便SMF计算调整后的第一数据流到达RAN的时间,使得RAN可以根据调整后的第一数据流到达RAN的时间,进行数据流调度,以减少或避免多个数据流在RAN的处理时间的冲突问题。
2、第五网元为Ctrl,Ctrl采用上述方式4中基于地址学习信息,确定转发信息:
请参考图7,为本申请实施例提供的无线通信方法的流程示意图,图7中是以第一数据流为下行数据流,第一网元为UPF、第二网元为UE、转发信息包括UE的信息为例。
步骤701,UPF通过PCF向Ctrl发送地址学习信息。
图7所示的地址学习信息包括第三网元的信息与其对应的UE的信息之间的对应关系,即为前文中第四对应关系的一种示例。
作为另一个示例,UPF可以将地址学习信息依次通过SMF和PCF转发给Ctrl,或者在Ctrl和UPF可以直接通信的情况下,UPF可以直接将地址学习信息发送给Ctrl。
步骤702,Ctrl通过NEF从AF接收流请求。
流请求的含义可以参照前文论述的内容,此处不再赘述。图7中是以流请求包括源地址为例进行示例。
作为另一个示例,Ctrl可以从AF接收流请求,此时无需NEF中转,减少通信系统中的交互。
步骤703,Ctrl根据地址学习信息,以及源地址,确定UE的信息。
步骤704,Ctrl根据UE的信息,如果确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在UE的发送时间。
第一处理时间为UE发送第一数据流的发送时间,第二处理时间为UE发送第一数据流的发送时间,第一处理时间和第二处理时间的确定方式可以参照图4论述的内容,此处不再赘述。如果Ctrl确定第一处理时间和第二处理时间存在冲突,那么可以调整第一处理时间,以获得第一数据流在UE的发送时间,即调整后的第一处理时间。
步骤705a,Ctrl将第一数据流在UE的发送时间、第一数据流到达UPF的时间,以及调整时间配置给SMF。
作为另一个示例,Ctrl可以通过PCF将第一数据流在UE的发送时间、第一数据流到达UPF的时间,以及调整时间配置给UPF,或者Ctrl可以依次通过PCF和SMF将第一数据流在UE的发送时间、第一数据流到达UPF的时间,以及调整时间配置给UPF,或者Ctrl可以通过NEF将第一数据流在UE的发送时间、第一数据流到达UPF的时间,以及调 整时间配置给UPF,本申请实施例对此不作限定。
步骤705b,SMF将第一数据流在UE的发送时间配置给UE。
UE接收该第一数据流在UE的发送时间之后,可以根据该发送时间,发送第一数据流,由于NEF对第一数据流在UE的发送时间进行了调整,因此可以减少或避免第一数据流和第二数据流在UE的发送时间冲突的问题。
步骤706,SMF根据第一数据流到达UPF的时间以及调整时间,计算TSCAI。
TSCAI的含义可以参照前文论述的内容,此处不再赘述。
图7中SMF可以根据第一数据流到达UPF的时间、调整时间、以及UPF和RAN之间的时延,计算TSCAI。例如,SMF可以将第一数据流到达UPF的时间、调整时间、以及UPF和RAN之间的时延之和作为TSCAI,即为第一数据流到达RAN的时间。
步骤707,SMF将TSCAI配置给RAN。
步骤708,Ctrl将第一数据流在UE的发送时间通过NEF发送给AF。
作为一个示例,步骤701为可选的步骤,步骤702为可选的步骤,步骤705为可选的步骤,步骤706-步骤707为可选的部分,步骤708为可选的步骤。
在本申请实施例中,通过第四网元Ctrl可以确定第一数据流的转发信息,根据转发信息,确定多个数据流在UE的处理时间是否冲突,提供了一种检测冲突的方法。且,在确定同个网元处理多个数据流的时间存在冲突时,对该网元处理第一数据流的处理时间进行调整,以减少或避免多个数据流在UE存在时间冲突的问题。进一步地,Ctrl还可以将调整时间等反馈给SMF,以便SMF计算调整后的第一数据流到达RAN的时间,使得RAN可以根据调整后的第一数据流到达RAN的时间,调度数据流。
上述图6和图7的实施例是分别以第五网元为NEF和Ctrl为例进行介绍,如果第五网元为AF、UPF、UE、PCF或SMF,其涉及的无线通信方法的过程可以参照前文论述的内容,此处不再赘述。
3、第五网元为NEF,NEF采用上述方式4中基于第一拓扑信息,确定转发信息:
请参考图8,为本申请实施例提供的无线通信方法的流程示意图,图8是以第一数据流为上行数据流、第一网元为UPF、第二网元为UE、转发信息包括UE的信息为例。
步骤801,NEF维护有第三拓扑信息。
第一网元为UPF,第二网元为UE为例进行介绍。
NEF可以维护有UPF对应的第三拓扑信息,该第三拓扑信息包括UPF与其邻接网元之间的连接关系。当然,实际上NEF也可以维护有UE对应的第三拓扑信息,该第三拓扑信息包括UE与其邻接网元之间的连接关系。
步骤802,AF将第二拓扑信息发送给NEF。
第二拓扑信息的含义可以参照图4中论述的内容,此处不再赘述。
NEF在获得第三拓扑信息和第二拓扑信息之后,相当于获得了第一拓扑信息。
步骤803,NEF接收流请求。
流请求包括第三网元的信息。如果第一数据流为上行数据流,那么第三网元的信息为从UPF接收数据流的网元的信息,即目的设备的信息;如果第一数据流为下行数据流,那么第三网元为向UPF发送数据流的网元的信息,即源设备的信息。
作为一个示例,该流请求还可以包括UE的信息和/或UE侧用户网络中的设备的信息,以便于后续传输第一数据流过程中确定转发第一数据流的会话信息。
作为另一个示例,该流请求可以是NEF本地创建的,那么这种情况下,NEF无需执行步骤803,即无需从AF接收流请求。
步骤804,NEF根据第一拓扑信息,确定与第三网元的信息对应的UPF的信息。
NEF根据第一拓扑信息,确定第三网元的信息对应的处理第一数据流的第一网元的信息和/或第二网元的信息,例如,发送第一数据流的UPF的端口的信息。
进一步地,NEF还可以根据UE的标识,和或UE侧用户网络中设备的信息,以及第三拓扑信息,确定转发第一数据流的会话信息,进一步还可以确定处理第一数据流的UE的端口的信息。
在另一种可能的实施例中,NEF可以维护有第一拓扑信息,从AF获得第三网元的信息,或者自身具有第一数据流的第三网元的信息,NEF根据第一拓扑信息,确定与第三网元的信息对应的转发信息。在这种实施例中,NEF无需从AF获取第二拓扑信息,相对减少AF和NEF之间的信令交互。
步骤805,NEF确定转发规则。
NEF可以创建UPF的转发规则,转发规则包括处理第一数据流的UPF的信息(例如第一数据流为上行数据流时,UPF的信息包括发送第一数据流的UPF的端口的标识,或者例如,第一数据流为下行数据流时,UPF的信息包括接收第一数据流的UPF的端口的标识)。
作为一个示例,转发规则还包括第一数据流的流信息,流信息包括第一数据流的标识和/或第一数据流的流特征。
其中,第一数据流的标识和/或流特征可以是NEF为第一数据流分配的。
步骤806,NEF将转发规则配置给UPF。
对于目的地址是非单播地址的第一数据流,NEF可以创建转发规则,并将该转发规则配置给UPF。将转发规则配置给UPF例如,NEF直接将转发规则发送给UPF,或者通过PCF或SMF配置给UPF,本申请实施例对此不作限定。UPF在获得转发规则之后,可以按照转发规则,接收或发送数据流。
作为一个示例,对于目的地址为单播地址的第一数据流,或者第一数据流为下行数据流,NEF也无需单独创建该转发规则,NEF可以无需为UPF配置转发规则。
在另一个示例中,UPF可以为第一数据流分配标识。
步骤807,NEF根据UPF的信息,确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在UE的接收时间。
确定第一处理时间和第二处理时间的方式、以及确定第一数据流在UE的接收时间的方式可以参照前文图6论述的内容,此处不再赘述。
在步骤807中是以确定第一数据流在UE的接收时间为例,实际NEF还可以确定第一数据流在UPF的接收时间、第一数据流在UPF的发送时间、以及第一数据流在UE的发送时间中的一项或多项。
步骤808,NEF通过PCF向UE配置入口调度信息。
该入口调度信息包括第一数据流在UE的接收时间。配置入口调度信息的方式可以参照前文图6论述的内容,此处不再赘述。
步骤809,NEF向SMF发送第一数据流到达UE的时间以及调整时间。
发送第一数据流到达UE的时间以及调整时间的方式可以参照前文图6论述的内容,此处不再赘述。
步骤810,NEF根据第一数据流到达UE的时间以及调整时间,计算TSCAI。
计算TSCAI的方式可以参照前文图6论述的内容,此处不再赘述。
步骤811,SMF向RAN配置TSCAI。
步骤812,NEF向AF反馈入口调度信息。
作为一个示例,步骤801-步骤803为可选的部分,步骤805-806为可选的部分,步骤808为可选的步骤,步骤809-811为可选的部分,步骤812为可选的步骤。
在本申请实施例中,NEF可以通过拓扑信息,确定数据流对应的转发信息,进而根据转发信息,判断UPF处理多个数据流的时间是否存在冲突,如果存在冲突,则对UE处理第一数据流的处理时间进行调整,以减少或避免时间冲突。进一步地,NEF还可以将调整时间等反馈给SMF,以便SMF计算调整后的第一数据流到达RAN的时间,使得RAN可以根据调整后的第一数据流到达RAN的时间,进行数据流调度。
上述图8所示的实施例是以第五网元为NEF为例进行介绍,第五网元为AF、UPF、UE、PCF、Ctrl或SMF时,其涉及的无线通信方法的过程也可以参照前文图8论述的内容,此处不再赘述。
4、第五网元为UPF:
请参考图9,为本申请实施例提供的无线通信方法的流程示意图,图9中是以第一数据流为下行数据流、第一网元为UPF,第二网元为UE、转发信息包括UPF的信息为例。
步骤901,NEF从AF获取流请求。
该流请求可以包括前文论述的相关信息,相关信息的含义可以参照前文论述的内容,此处不再赘述。
步骤902,NEF分配第一数据流的标识和/或流特征。
如果步骤901获得的相关信息中包括第一数据流的标识,则NEF无需为第一数据流分配标识,流特征的含义可以参照前文论述的内容,此处不再赘述,如果步骤901获得的相关信息中包括第三网元的信息,则NEF无需为第一数据流分配第三网元的信息。
步骤903,UPF从NEF获得相关信息。
UPF可以从NEF获得会话信息、第一网元的信息、第二网元的信息、索引信息中的一项或多项,本申请不对此进行限制。
步骤904,UPF确定与相关信息对应的UPF的信息。
UPF确定UPF的信息的方式可以参照前文图4中论述的任一确定转发信息的方式,此处不再赘述。
步骤905,UPF根据UPF的信息,确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在UPF的接收时间。
第一处理时间为UPF发送第一数据流的发送时间,第二处理时间为UPF发送第二数据流的发送时间,确定第一处理时间和第二处理时间可以参照前文图4论述的内容,此处不再赘述。如果UPF确定第一处理时间和第二处理时间存在冲突,那么UPF可以重新确定UPF接收第一数据流的接收时间,以减少或避免UPF处理多个数据流的时间冲突。
作为一个示例,UPF还可以调整UPF发送第一数据流的发送时间,即调整第一处理时间,以获得调整后的第一处理时间。
步骤906,UPF分配第一数据流的标识。
如果步骤903获得的相关信息包括第一数据流的标识,或者NEF为第一数据流分配了 标识,那么UPF无需执行步骤906。
步骤907,UPF向SMF配置第一数据流到达UPF的时间以及调整时间。
调整时间的含义可以参照前文论述的内容,此处不再赘述。
步骤908,SMF根据第一数据流到达UE的时间以及调整时间,计算TSCAI。
TSCAI和计算TSCAI的方式可以参照前文论述的内容,此处不再赘述。
步骤909,SMF将TSCAI配置给RAN。
步骤910,NEF向AF发送第一数据流在UE的接收时间。
在步骤910中,除了向AF发送第一数据流在UE的接收时间之外,还可以发送UPF发送第一数据流的发送时间。
作为一个示例,步骤902为可选的步骤,步骤906为可选的步骤,步骤907-步骤909为可选的步骤,步骤910为可选的步骤。
在本申请实施例中,UPF可以从NEF获取相关信息,确定第一数据流的转发信息,并根据该转发信息,确定UPF处理第一数据流的处理时间与其他数据流的处理时间是否冲突,如果检测到冲突,则调整UPF处理第一数据流的处理时间,以减少或避免UPF处的时间冲突的情况。进一步地,UPF还可以将调整时间等反馈给SMF,以便SMF计算调整后的第一数据流到达RAN的时间,使得RAN可以根据调整后的第一数据流到达RAN的时间,进行数据流调度。
上述图9所示的实施例是以第五网元为UPF为例进行介绍,第五网元为AF、UPF、UE、PCF、或SMF时,其涉及的无线通信方法的过程也可以参照前文论述的内容,此处不再赘述。
上述图6-图9所示的实施例是针对第五网元通过上述方式一确定转发信息为例,进行示例介绍,下面对第五网元以上述方式二确定转发信息为例,对其中涉及的无线通信方法的过程进行示例说明。
1、第五网元为NEF,NEF从AF获取转发信息:
可参照图10,为本申请实施例提供的无线通信方法的流程示意图,图10是以第一数据流为上行数据流、第一网元为UPF,第二网元为UE、转发信息包括UPF的信息为例,该流程示意图包括以下步骤:
步骤1001,AF根据第一拓扑信息,以及第三网元的信息,确定UPF的信息。
第一拓扑信息可以是AF自身维护的,第一拓扑信息和第三网元的信息的含义可以参照前文论述的内容,此处不再赘述。
步骤1002,AF向NEF发送UPF的信息。
步骤1003,NEF根据UPF的信息,确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在UPF的发送时间。
第一处理时间和第二处理时间的含义可以参照前文图6论述的内容,此处不再赘述。
步骤1004,NEF创建转发规则。
转发规则的含义可以参照前文图8论述的内容,此处不再赘述。
步骤1005,NEF将转发规则配置给UPF。
步骤1006,NEF通过PCF将第一数据流在UPF的发送时间配置给UPF。
步骤1007,NEF将第一数据流到达UE的时间以及调整时间发送给SMF。
步骤1008,SMF根据第一数据流到达UE的时间以及调整时间,计算TSCAI。
TSCAI的含义以及计算TSCAI的方式可以参照前文论述的内容,此处不再赘述。
步骤1009,SMF将TSCAI配置给RAN。
步骤1010,NEF向AF反馈第一数据流在UPF的发送时间。
作为一个示例,步骤1004-步骤1005为可选的部分,步骤1006为可选的步骤,步骤1007-步骤1009为可选的部分,步骤1010为可选的步骤。
在图10所示的实施例中,AF可以根据拓扑信息确定转发信息,NEF可以直接从AF获得转发信息,这样NEF无需确定转发信息,相对减少了NEF的处理量,根据转发信息检测第一数据流和第二数据流在UPF的处理时间是否冲突,由于无需NEF确定转发信息,相对减少了NEF的处理量。且,检测到UPF处理多个数据流的处理时间存在冲突时,可以调整UPF发送第一数据流的发送时间,以减少或避免UPF处理多个数据流的时间冲突。
上述图10所示的实施例是以第五网元为NEF为例进行介绍,第五网元为UPF、UE、PCF、SMF或Ctrl时,其涉及的无线通信方法的过程也可以参照前文论述的内容,此处不再赘述,另外图10是以AF确定转发信息为例,Ctrl、UE、PCF或SMF等确定转发信息的方式也可以参照图10所示的过程,此处不再赘述。
2、第五网元为NEF,NEF从UPF获取转发信息:
可参照图11,为本申请实施例提供的无线通信方法的流程示意图,图11中是以第一数据流为下行数据流、第一网元为UPF,第二网元为UE、转发信息包括UPF的信息为例。
步骤1101,NEF从AF接收流请求。
该流请求包括相关信息,相关信息的含义可以参照前文论述的内容,此处不再赘述。
步骤1102,NEF分配第一数据流的标识和/或流特征。
流特征的含义可以参照前文论述的内容,此处不再赘述。
步骤1103,NEF将相关信息发送给UPF。
步骤1104,UPF确定与相关信息对应的UPF的信息。
步骤1105,UPF将UPF的信息发送给NEF。
步骤1106,NEF根据UPF的信息,确定第一处理时间和第二处理时间存在冲突,则确定第一数据流在UPF的接收时间,以及第一数据流在UE的发送时间。
第一处理时间为UPF接收第一数据流的接收时间,第二处理时间为UE接收第二数据流的接收时间。
步骤1107,NEF分配第一数据流的标识。
步骤1108a,NEF将入口调度信配置给UPF。
该入口调度信息包括第一数据流在UPF的接收时间配置给UPF。
步骤1108b,NEF将出口调度信息配置给UE。
该出口调度信息包括第一数据流在UE的发送时间。
步骤1109,NEF将第一数据流到达UE的时间以及调整时间配置给SMF。
步骤1110,SMF根据第一数据流到达UE的时间以及调整时间,计算TSCAI。
步骤1111,SMF将TSCAI配置给RAN。
步骤1112,AF将出口调度信息和入口调度信息配置给NEF。
在图11所示的实施例中,UPF可以确定第一数据流对应的转发信息,NEF从UPF获得该转发信息,并根据该转发信息,确定UPF处理第一数据流以及第二数据流的时间是否冲突,提供了一种检测时间冲突的方式,并在确定第一数据流和第二数据流在UPF的处理 时间冲突时,重新确定第一数据流在UPF的发送时间,从而减少或避免第一数据流和第二数据流在UPF的时间冲突。
作为一个示例,步骤1102为可选的步骤,步骤1107为可选的步骤,步骤1108a为可选的步骤,步骤1108b为可选的步骤,步骤1109-步骤1111为可选的部分,步骤1112为可选的步骤。
在图11所示的实施例中,UPF可以确定转发信息,NEF可以从UPF获得转发信息,这样NEF无需确定转发信息,相对减少了NEF的处理量,根据转发信息检测第一数据流和第二数据流在UPF的处理时间是否冲突,由于无需NEF确定转发信息,相对减少了NEF的处理量。且,检测到UPF处理多个数据流的处理时间存在冲突时,可以确定UPF发送第一数据流的接收时间,以减少或避免UPF处理多个数据流的时间冲突,以及还可以确定UE发送第一数据流的发送时间,以减少或避免UE处理多个数据流的时间冲突。
上述图11所示的实施例是以第五网元为NEF为例进行介绍,第五网元为AF、UE、PCF Ctrl、或SMF时,其涉及的无线通信方法的过程也可以参照前文图11论述的内容,此处不再赘述,另外图11是以UPF确定转发信息为例,AF、Ctrl、UE、PCF或SMF等确定转发信息的方式也可以参照图11所示的过程,此处不再赘述。
图12为本申请的实施例提供的可能的通信装置的结构示意图。图12所示的通信装置可以用于实现上述方法实施例中网络开放网元、应用功能网元、会话管理网元、策略控制网元、接入网网元、用户面功能网元、第四网元或终端设备的功能,因此也能实现上述方法实施例所具备的有益效果。在本申请的实施例中,图12所示的通信装置可以是网络开放网元或具有网络开放网元的功能的芯片系统,或者可以是应用功能网元或具有应用功能网元的功能的芯片系统,或者可以是会话管理网元或具有会话管理网元的功能的芯片系统,或者可以是策略控制网元或具有策略控制网元的功能的芯片系统,或者可以是接入网网元或具有接入网网元的功能的芯片系统,或者可以是用户面功能网元或具有用户面功能网元的功能的芯片系统,或者可以是第四网元或具有第四网元的功能的芯片系统,或者可以是终端设备或具有终端设备的功能的芯片系统。
如图12所示,通信装置1200包括收发单元1201和处理单元1202。
在一个实施例中,该通信装置1200可以用于实现图4、图6、图7、图8、图9、图10或图11中所示的方法实施例中第五网元的功能,具体的功能可以参见上述方法实施例中的说明。例如,该通信装置1200可以用于实现图6所示的方法实施例中NEF的功能、图7所示的方法实施例中Ctrl的功能、图8所示的方法实施例中NEF的功能、图9所示的方法实施例中UPF的功能、图10所示的方法实施例中NEF的功能、或者图11所示的方法实施例中NEF的功能。可选的,该通信装置1200中的收发单元1201为可选的单元。
在又一个实施例中,该通信装置1200可以用于实现图10所示的方法实施例中AF的功能,具体的功能可以参见上述方法实施例中的说明。
在再一个实施例中,该通信装置1200可以用于实现图11所示的方法实施例中UPF的功能,具体的功能可以参见上述方法实施例中的说明。
图13为本申请的实施例提供的可能的通信装置的结构示意图。图13所示的通信装置可以用于实现上述方法实施例中网络开放网元、应用功能网元、会话管理网元、策略控制网元、接入网网元、用户面功能网元、第四网元或终端设备的功能,因此也能实现上述方法实施例所具备的有益效果。在本申请的实施例中,图13所示的通信装置的具体可能的 形式可以参照前文图12所示的通信装置的具体可能的形式,此处不再赘述。
如图13所示,通信装置1300包括处理器1301和接口1302。处理器1301和接口1302之间相互耦合。可以理解的是,接口1302可以为收发器或输入输出接口。
通信装置1300可以包括一个或多个处理器1301,处理器1301也可以称为处理单元,可以实现一定的控制功能。所述处理器1301可以是通用处理器或者专用处理器等。例如,包括:基带处理器,中央处理器等。所述基带处理器可以用于对通信协议以及通信数据进行处理。所述中央处理器可以用于对通信装置1300进行控制,执行软件程序和/或处理数据。不同的处理器可以是独立的器件,也可以是设置在一个或多个处理电路中,例如,集成在一个或多个专用集成电路上。
可选的,通信装置1300中包括一个或多个存储器1303,用以存储指令,该指令可在所述处理器上被运行,使得通信装置1300执行上述方法实施例中描述的方法。通信装置1300中的存储器1303为可选的部件,在图13中以虚线框进行示意。
可选的,存储器1303中还可以存储有数据。所述处理器和存储器可以单独设置,也可以集成在一起。
可选的,通信装置1300还可以包括存储器1303,用于存储处理器1301执行的指令或存储处理器1301运行指令所需要的输入数据或存储处理器1301运行指令后产生的数据。
在一个实施例中,当通信装置1300用于实现图4、图6、图7、图8、图9、图10或图11所示的方法实施例时,该通信装置1300可以用于实现图4、图6、图7、图8、图9、图10或图11中所示的方法实施例中第五网元的功能,具体的功能可以参见上述方法实施例中的说明。
在又一个实施例中,该通信装置1300可以用于实现图10所示的方法实施例中AF的功能,具体的功能可以参见上述方法实施例中的说明。
在再一个实施例中,该通信装置1300可以用于实现图11所示的方法实施例中UPF的功能,具体的功能可以参见上述方法实施例中的说明。
可选的,收发单元1201的功能可通过接口1302实现,处理单元1202的功能可通过处理器1301实现。
本申请的实施例中的方法步骤可以通过硬件的方式来实现,也可以由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器、闪存、只读存储器、可编程只读存储器、可擦除可编程只读存储器、电可擦除可编程只读存储器、寄存器、硬盘、移动硬盘、致密光盘只读存储器(compact disc read-only memory,CD-ROM)或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于基站或终端中。当然,处理器和存储介质也可以作为分立组件存在于基站或终端中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、基站、用户设备或者其它可编程装置。所述计算机程序或指令可以 存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序或指令可以从一个网站站点、计算机、服务器或数据中心通过有线或无线方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,例如,软盘、硬盘、磁带;也可以是光介质,例如,数字视频光盘;还可以是半导体介质,例如,固态硬盘。该计算机可读存储介质可以是易失性或非易失性存储介质,或可包括易失性和非易失性两种类型的存储介质。
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
在本申请所提供的几个实施例以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的计算机可读存储介质,可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。
以上所述,仅为本申请的具体实施方式,但本申请实施例的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请实施例揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请实施例的保护范围之内。因此,本申请实施例的保护范围应所述以权利要求的保护范围为准。

Claims (21)

  1. 一种无线通信方法,其特征在于,包括:
    确定第一数据流的转发信息,所述转发信息包括用于转发第一数据流的第一网元的信息和/或第二网元的信息;
    如果第一处理时间与第二数据流的第二处理时间存在冲突,则确定所述第一数据流在所述第一网元的处理时间和/或所述第二网元的处理时间,其中,所述第一处理时间为所述第一网元处理所述第一数据流的时间,所述第二处理时间为所述第一网元处理所述第二数据流的时间,或者,所述第一处理时间为所述第二网元处理所述第一数据流的时间,所述第二处理时间为所述第二网元处理所述第二数据流的时间。
  2. 如权利要求1所述的方法,其特征在于,确定第一数据流的转发信息,包括:
    从用户面功能网元、网络开放功能网元、应用功能网元、所述第一网元或所述第二网元接收所述转发信息;或,
    根据所述第一数据流的相关信息确定所述转发信息,其中,所述相关信息包括会话信息、所述第一网元的信息、所述第二网元的信息、流信息中的一项或多项,所述流信息包括第三网元的信息和/或所述第一数据流的标识,所述第三网元为所述第一数据流的目的设备或源设备。
  3. 如权利要求2所述的方法,其特征在于,根据所述第一数据流的相关信息确定所述转发信息,包括:
    如果所述相关信息包括所述会话信息,则确定与所述会话信息对应的所述转发信息;或,
    如果所述相关信息包括所述第一网元的信息,则确定与所述第一网元的信息对应的所述转发信息;或,
    如果所述相关信息包括所述第二网元的信息,则确定与所述第二网元的信息对应的所述转发信息;或,
    如果所述相关信息包括流信息,则确定与所述流信息对应的所述转发信息。
  4. 如权利要求3所述的方法,其特征在于,确定与所述流信息对应的所述转发信息,包括:
    根据所述流信息与所述转发信息之间的对应关系,确定与所述流信息对应的所述转发信息。
  5. 如权利要求4所述的方法,其特征在于,所述方法还包括:
    从用户面功能网元接收所述流信息与所述转发信息之间的对应关系。
  6. 如权利要求2~5任一项所述的方法,其特征在于,所述方法还包括:
    从应用功能网元接收所述第三网元的信息;或,
    从网络开放功能网元接收所述第三网元的信息。
  7. 如权利要求3所述的方法,其特征在于,所述流信息包括所述第三网元的信息;确定与所述流信息对应的所述转发信息,包括:
    根据第一拓扑信息确定与所述第三网元的信息对应的所述转发信息,其中,所述第一拓扑信息包括所述第一网元与至少一个网元之间的连接信息,和/或包括所述第二网元与至少一个网元之间的连接信息,所述至少一个网元包括所述第三网元。
  8. 如权利要求7所述的方法,其特征在于,所述方法还包括:
    从应用功能网元接收第二拓扑信息,其中,所述第二拓扑信息包括所述至少一个网元之间的连接信息;
    根据所述第二拓扑信息以及第三拓扑信息确定所述第一拓扑信息,其中,所述第三拓扑信息包括所述第一网元与所述第一网元的邻接网元之间的连接信息,和/或所述第二网元与所述第二网元的邻接网元之间的连接信息,所述邻接网元属于所述至少一个网元。
  9. 如权利要求1~8任一项所述的方法,其特征在于,所述方法还包括:
    从网络开放功能网元接收所述第一数据流的标识和目的设备的信息中的一项或两项;或,
    为所述第一数据流分配标识。
  10. 如权利要求1~9任一项所述的方法,其特征在于,所述方法还包括:
    接收所述第一数据流到达所述第一网元或所述第二网元的时间;
    根据所述时间,以及所述第一网元和所述第二网元之间的时延,确定所述第一处理时间。
  11. 如权利要求10所述的方法,其特征在于,确定所述第一数据流在所述第一网元的处理时间和/或所述第二网元的处理时间,包括:
    调整所述时间和/或所述时延,确定所述第一数据流在所述第一网元的处理时间和/或所述第二网元的处理时间。
  12. 如权利要求1~11任一项所述的方法,其特征在于,所述方法还包括:
    将所述第一数据流在所述第一网元的处理时间配置给所述第一网元;和/或,
    将所述第一数据流在所述第二网元的处理时间配置给所述第二网元;和/或,
    将所述第一数据流在所述第一网元的处理时间和/或所述第一数据流在所述第二网元的处理时间发送给网络开放功能网元。
  13. 如权利要求1~12任一项所述的方法,其特征在于,所述方法还包括:
    将所述第一数据流在所述第一网元的处理时间和/或所述第一数据流在所述第二网元的处理时间配置给会话管理功能网元。
  14. 一种无线通信方法,其特征在于,包括:
    接收第一数据流的流信息,其中,所述流信息包括第三网元的信息和/或所述第一数据流的标识,所述第三网元为所述第一数据流的目的设备或源设备;
    确定与所述流信息对应的转发信息,其中,所述转发信息包括用于转发所述第一数据流的第一网元的信息和/或第二网元的信息;
    发送所述转发信息。
  15. 如权利要求14所述的方法,其特征在于,接收第一数据流的流信息,包括:
    从网络能力开放网元或第四网元接收所述第一数据流的流信息。
  16. 如权利要求14或15所述的方法,其特征在于,发送所述转发信息,包括:
    向网络能力开放网元或第四网元发送所述转发信息。
  17. 一种无线通信方法,其特征在于,包括:
    接收第一数据流的第三网元的信息,其中,所述第三网元为所述第一数据流的目的设备或源设备;
    从第一拓扑信息中,确定与所述第三网元的信息对应的第一数据流的转发信息,其中, 所述第一拓扑信息包括第一网元与至少一个网元之间的连接信息,和/或包括第二网元与至少一个网元之间的连接信息,所述至少一个网元包括所述第三网元,所述转发信息包括用于转发第一数据流的所述第一网元的信息和/或所述第二网元的信息;
    发送所述转发信息。
  18. 如权利要求17所述的方法,其特征在于,所述方法还包括:
    接收第三拓扑信息,其中,所述第三拓扑信息包括所述第一网元与所述第一网元的邻接网元之间的连接信息,和/或所述第二网元与所述第二网元的邻接网元之间的连接信息,所述邻接网元属于所述至少一个网元;
    根据第二拓扑信息以及所述第三拓扑信息确定所述第一拓扑信息,其中,所述第二拓扑信息包括所述至少一个网元之间的连接信息。
  19. 一种通信装置,其特征在于,包括:处理器和存储器;所述存储器用于存储一个或多个计算机程序,所述一个或多个计算机程序包括计算机执行指令,当所述通信装置运行时,所述处理器执行所述存储器存储的所述一个或多个计算机程序,以使得所述通信装置执行如权利要求1~13中任一项所述的方法,或者执行如权利要求14~16中任一项所述的方法,或者执行如权利要求17或18所述的方法。
  20. 一种芯片系统,其特征在于,所述芯片系统包括:
    处理器和接口,所述处理器用于从所述接口调用并运行指令,当所述处理器执行所述指令时,实现如权利要求1~13中任一项所述的方法,或者实现如权利要求14~16中任一项所述的方法,或者实现如权利要求17或18所述的方法。
  21. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1~13中任一项所述的方法,或者执行如权利要求14~16中任一项所述的方法,或者执行如权利要求17或18所述的方法。
PCT/CN2022/073127 2021-06-04 2022-01-21 一种无线通信方法及装置 WO2022252651A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110622488.1A CN115442853A (zh) 2021-06-04 2021-06-04 一种无线通信方法及装置
CN202110622488.1 2021-06-04

Publications (1)

Publication Number Publication Date
WO2022252651A1 true WO2022252651A1 (zh) 2022-12-08

Family

ID=84239881

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/073127 WO2022252651A1 (zh) 2021-06-04 2022-01-21 一种无线通信方法及装置

Country Status (2)

Country Link
CN (1) CN115442853A (zh)
WO (1) WO2022252651A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116915689B (zh) * 2023-09-13 2024-01-23 北京智芯微电子科技有限公司 确定性网络的时间触发调度方法及装置和终端设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018086549A1 (zh) * 2016-11-14 2018-05-17 深圳市金立通信设备有限公司 一种信息冲突处理方法及终端
WO2018130053A1 (zh) * 2017-01-10 2018-07-19 中兴通讯股份有限公司 一种流程冲突处理方法及装置
CN110113122A (zh) * 2018-02-01 2019-08-09 华为技术有限公司 一种定时的方法及装置
CN110121191A (zh) * 2018-02-05 2019-08-13 成都华为技术有限公司 一种中继系统中资源配置的方法及装置
CN110740149A (zh) * 2018-07-19 2020-01-31 华为技术有限公司 通信方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018086549A1 (zh) * 2016-11-14 2018-05-17 深圳市金立通信设备有限公司 一种信息冲突处理方法及终端
WO2018130053A1 (zh) * 2017-01-10 2018-07-19 中兴通讯股份有限公司 一种流程冲突处理方法及装置
CN110113122A (zh) * 2018-02-01 2019-08-09 华为技术有限公司 一种定时的方法及装置
CN110121191A (zh) * 2018-02-05 2019-08-13 成都华为技术有限公司 一种中继系统中资源配置的方法及装置
CN110740149A (zh) * 2018-07-19 2020-01-31 华为技术有限公司 通信方法和装置

Also Published As

Publication number Publication date
CN115442853A (zh) 2022-12-06

Similar Documents

Publication Publication Date Title
US11950127B2 (en) 5G system support for virtual TSN bridge management, QoS mapping and TSN Qbv scheduling
US11864019B2 (en) Time-sensitive networking communication method and apparatus
WO2021089018A1 (zh) 一种通信方法、装置及系统
US20230019215A1 (en) TSC-5G QoS MAPPING WITH CONSIDERATION OF ASSISTANCE TRAFFIC INFORMATION AND PCC RULES FOR TSC TRAFFIC MAPPING AND 5G QoS FLOWS BINDING
WO2022017285A1 (zh) 报文转发方法、装置及系统
WO2023082878A1 (zh) 一种通信方法及装置
WO2022252651A1 (zh) 一种无线通信方法及装置
WO2021134353A1 (zh) 通信方法、装置及系统
WO2023143177A1 (zh) 一种通信方法和通信装置
WO2022267652A1 (zh) 一种通信方法、通信装置及通信系统
WO2021218321A1 (zh) 用于处理数据流的方法和通信装置
WO2021134561A1 (zh) 通信方法和通信装置
WO2023005728A1 (zh) 一种通信方法、装置和系统
WO2022242201A1 (zh) 一种无线通信方法、通信装置及通信系统
Eznarriaga et al. Experiences with SoftToken: a token‐based coordination layer for WLANs
WO2023050828A1 (zh) 一种通信方法及装置
WO2022160346A1 (zh) 一种通信方法及装置
WO2023174023A1 (zh) 一种通信方法及装置
WO2022042095A1 (zh) 下行传输的方法和通信装置
WO2023273745A1 (zh) 一种通信方法、通信装置及通信系统
WO2024104253A1 (zh) 通信方法、装置和系统
CN117062145A (zh) 一种QoS控制方法和对应装置
TW201536006A (zh) 控制封包優先順序的方法及其存取點
CN117202393A (zh) 处理实时数据传输的装置及方法
CN115348665A (zh) 一种通信方法、设备及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22814701

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22814701

Country of ref document: EP

Kind code of ref document: A1