WO2023092945A1 - 通信方法、节点、设备、通信系统及存储介质 - Google Patents

通信方法、节点、设备、通信系统及存储介质 Download PDF

Info

Publication number
WO2023092945A1
WO2023092945A1 PCT/CN2022/090053 CN2022090053W WO2023092945A1 WO 2023092945 A1 WO2023092945 A1 WO 2023092945A1 CN 2022090053 W CN2022090053 W CN 2022090053W WO 2023092945 A1 WO2023092945 A1 WO 2023092945A1
Authority
WO
WIPO (PCT)
Prior art keywords
target device
message
information
node
access
Prior art date
Application number
PCT/CN2022/090053
Other languages
English (en)
French (fr)
Inventor
牛丽
戴博
沙秀斌
陆婷
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023092945A1 publication Critical patent/WO2023092945A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive loop type
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present application relates to the technical field of wireless communication networks, for example, to a communication method, node, device, communication system and storage medium.
  • the present application provides a communication method, node, device, communication system and storage medium.
  • An embodiment of the present application provides a communication method, including: determining a target device according to a trigger message of a first node; sending an access message to the target device, where the access message is used to instruct the target device to perform a corresponding operation; The first node sends the execution result information of the target device.
  • the embodiment of the present application also provides a communication method, including: sending a trigger message, where the trigger message is used to instruct the second node to determine a target device; and receiving execution result information of the target device.
  • the embodiment of the present application also provides a communication method, including: receiving an access message from a second node, and performing a corresponding operation according to the access message; and sending execution result information to the second node.
  • the embodiment of the present application also provides a node, including: a memory, a processor, and a computer program stored in the memory and operable on the processor, and the processor implements the above-mentioned communication method when executing the computer program.
  • An embodiment of the present application also provides a device, including: a memory, a processor, and a computer program stored in the memory and operable on the processor, and the processor implements the above-mentioned communication method when executing the computer program.
  • the embodiment of the present application also provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and the above-mentioned communication method is implemented when the program is executed by a processor.
  • FIG. 1 is a schematic diagram of a cellular network provided by an embodiment
  • Fig. 2 is a schematic diagram of another cellular network provided by an embodiment
  • Fig. 3 is a schematic diagram of a cellular network control plane architecture provided by an embodiment
  • FIG. 4 is a schematic diagram of another cellular network control plane architecture provided by an embodiment
  • FIG. 5 is a schematic diagram of another cellular network control plane architecture provided by an embodiment
  • FIG. 6 is a flowchart of a communication method provided by an embodiment
  • FIG. 7 is a schematic diagram of a communication process between a device and a node provided by an embodiment
  • FIG. 8 is a schematic diagram of another communication process between a device and a node provided by an embodiment
  • FIG. 9 is a schematic diagram of another communication process between a device and a node provided by an embodiment
  • Fig. 10 is a schematic diagram of another communication process between a device and a node provided by an embodiment
  • Fig. 11 is a schematic diagram of a communication process between a second node and a third node provided by an embodiment
  • Fig. 12 is a schematic diagram of another communication process between a device and a node provided by an embodiment
  • Fig. 13 is a flowchart of another communication method provided by an embodiment
  • Fig. 14 is a flowchart of another communication method provided by an embodiment
  • Fig. 15 is a schematic diagram of a device state transition provided by an embodiment
  • Fig. 16 is a schematic structural diagram of a communication device provided by an embodiment
  • Fig. 17 is a schematic structural diagram of another communication device provided by an embodiment
  • Fig. 18 is a schematic structural diagram of another communication device provided by an embodiment
  • FIG. 19 is a schematic diagram of a hardware structure of a node provided by an embodiment
  • Fig. 20 is a schematic diagram of a hardware structure of a device provided by an embodiment.
  • the tags of each device can be read in turn through special equipment.
  • the number of devices is usually large, and the workload of reading tags is very large; Integrated batteries, and because the business model is very diverse, the battery is difficult to maintain for a long time, and it is also difficult to replace or recharge. It can be seen that the large-scale deployment of the Internet of Things is limited by the energy consumption of sensors, deployment and maintenance costs.
  • the communication method in this embodiment can be implemented based on a cellular network.
  • the communication method involves a first node (such as a core network or a data processing platform, etc.), a second node (such as a base station or an access point, etc.), and a device with a tag (such as a tag or a terminal, etc., hereinafter collectively referred to as a device).
  • the communication method also involves a third node (such as a passive device based on radio frequency technology, a reader or a relay device, etc.).
  • Fig. 1 is a schematic diagram of a cellular network provided by an embodiment.
  • tags or terminals are controlled and managed by the base station.
  • Tags or terminals can obtain energy and signals from the base station, and the base station can manage the tags or terminals according to the instructions of the data processing platform or the core network.
  • Fig. 2 is a schematic diagram of another cellular network provided by an embodiment.
  • a third node may be deployed under the base station, such as a reader or relay device (Relay).
  • the base station gives instructions to the reader or relay, and the reader or relay is responsible for stimulating and sending messages To the tag or terminal, and the reader or relay receives the uplink command sent by the tag or terminal, and then forwards it to the base station.
  • Fig. 3 is a schematic diagram of a cellular network control plane architecture provided by an embodiment.
  • the architecture of its control plane is shown in Figure 3, wherein the Media Access Control (Media Access Control, MAC) layer of the tag or terminal RFID can transmit signaling with the MAC layer of the base station's RFID or data; the physical (Physical, PHY) layer of the tag or terminal RFID can transmit signaling or data with the RFID PHY layer of the base station; the RFID layer of the base station can transmit signaling or data with the RFID layer of the core network.
  • Media Access Control Media Access Control
  • MAC Media Access Control
  • PHY Physical
  • the RFID layer of the base station can transmit signaling or data with the RFID layer of the core network.
  • Fig. 4 is a schematic diagram of another cellular network control plane architecture provided by an embodiment.
  • the architecture of its control plane is shown in Figure 4.
  • the base station does not have an RFID layer, and the base station may not be able to identify relevant information of the RFID or passive equipment.
  • the information of the RFID or passive equipment is a data packet of an application layer, and the base station will not parse these data packets.
  • the reader or relay not only has the functions of RFID, such as the MAC, PHY and RFID layers that support the RFID function, but also has the related functions of the Uu interface, such as supporting Uu-related radio resource control (Radio Resource Control, RRC), packet Data convergence protocol (Packet Data Convergence Protocol, PDCP), radio link layer control protocol (Radio Link Control, RLC), MAC and PHY layer functions.
  • RRC Radio Resource Control
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC Packet Data Convergence Protocol
  • PHY Packet Data Convergence Protocol
  • Fig. 5 is a schematic diagram of another cellular network control plane architecture provided by an embodiment. Taking the cellular network shown in FIG. 2 as an example, the architecture of its control plane is shown in FIG. 5 .
  • the base station may have an RFID layer.
  • the base station can analyze the relevant data packets of RFID or passive devices, can identify the relevant information of RFID or passive devices, and can instruct the reader/writer or Relay to perform operations of determining and accessing tags or terminals.
  • the reader or relay also has the function of the service data adaptation protocol (Service Data Adaptation Protocol, SDAP) layer.
  • SDAP Service Data Adaptation Protocol
  • connections can be established between the reader/relay and the base station, each connection corresponds to or is associated with one or more tags or terminals, and each connection can transmit data related to the associated tags or terminals.
  • a connection can also be established between the reader/relay and the base station, which transmits all tag or terminal-related data supported or maintained by the reader/relay.
  • the configuration of these connections can be a dedicated configuration, and the base station provides a configuration for each connection, or it can be a public configuration, and the base station provides a common configuration for these connections, or these connections all have default configurations.
  • connections can be established between the core network and the base station, each connection corresponds to or is associated with one or more tags or terminals, each connection can transmit data related to the associated tags or terminals, or each connection can transmit read Tag or terminal related data supported or maintained by the writer/relay.
  • a connection may also be established between the core network and the base station, and the connection transmits all tags or terminal-related data supported or maintained by the base station.
  • the configuration of these connections can be a proprietary configuration, and the core network provides configurations for these connections, or it can be a public configuration, and the core network provides a common configuration for these connections, or these connections all have default configurations.
  • Fig. 6 is a flowchart of a communication method provided by an embodiment.
  • the communication method can be applied to a second node (such as a base station).
  • the method provided by this embodiment includes step 110 , step 120 and step 130 .
  • step 110 the target device is determined according to the trigger message of the first node.
  • step 120 an access message is sent to the target device, where the access message is used to instruct the target device to perform a corresponding operation.
  • step 130 the execution result information of the target device is sent to the first node.
  • the first node (such as the core network) can send a trigger message to the second node to trigger the operation of finding the target device among the devices in the network, so that the second node can determine the target device and access the target device;
  • the node instructs the target device to perform corresponding operations by sending an access message, such as reading tags, erasing tags, or modifying tags, etc.; the target device can perform corresponding operations accordingly and feed back execution result information to the first node through the second node, thereby realizing cellular Radio frequency identification of RFID tags in the network.
  • the trigger message includes at least one of the following information of at least one device: a complete or partial identifier of the device; all or part of the data stored in the device; an instruction to change the selected flag or inventory flag; a device selection message ; device capability information; device auxiliary information; operation type; operation content; password; operation message; connection request; resource information for transmitting data; connection information; bearer information.
  • the target device after the target device is determined according to the trigger message of the first node, it further includes, step 112: sending the information of the target device to the first node; wherein, the information of the target device includes at least one of the following information: the target device The complete or partial identification of the target device; all or part of the data stored in the target device; the random code corresponding to the target device; the access result indication of the target device; the capability information of the target device; the auxiliary information of the target device; the feedback message of the target device ;A connection request for a target device;Resource information for transferring data.
  • the information of the target device includes at least one of the following information: the target device The complete or partial identification of the target device; all or part of the data stored in the target device; the random code corresponding to the target device; the access result indication of the target device; the capability information of the target device; the auxiliary information of the target device; the feedback message of the target device ;A connection request for a target device;Resource information for transferring data.
  • step 114 before sending the access message to the target device, it further includes, step 114: receiving an access indication message from the first node, where the access indication message is used to indicate an operation to be performed on the target device; wherein, the access indication message includes the target At least one of the following information of the device: complete or partial identification of the target device; random code corresponding to the target device; operation type; operation content; password; operation message; connection request for the target device; resource information for transmitting data; Capability information of the target device; auxiliary information of the target device; connection information of the target device; bearer information of the target device.
  • the execution result information includes at least one of the following information: the complete or partial identification of the target device; all or part of the data stored in the target device; a random code corresponding to the target device; an access result indication of the target device ; Auxiliary information of the target device; Feedback message of the target device; Operation type; Execution result; Read content; Connection request for the target device;
  • the target device is in one of the following states: idle state, the target device does not support data transmission during the idle state; access state, the target device supports access operation during the access state, Access operations are not supported; connected state, the target device supports access operations during the connected state; inactivated state, the target device does not work during the inactivated state; silent state, the target device is in the silent state Enter power saving mode.
  • determining the target device according to the trigger message of the first node includes: step 1110: sending a selection message and a query message to at least one device according to the trigger message; step 1120: receiving a feedback from at least one of the at least one device Anti-collision information; Step 1120: Send a confirmation message to the device that feeds back the anti-collision information; Step 1130: At least one device among the devices that receive the feedback anti-collision information determines the device that sent the reported information as the target according to the report information sent by the confirmation message equipment.
  • Step 116 Send a request message to the target device, the request message is used to instruct the target device to generate a random number;
  • Step 118 Receive the random number returned by the target device .
  • the access message includes instruction information for at least one of the following operations: read operation; write operation; inactivation operation; lock operation; access operation; block write operation; block erase operation; the access message may also include the following At least one kind of information: resource information used to transmit data; capability information and bearer information of the target device.
  • step 1140 wake up the third node according to the wake-up message of the first node
  • step 1150 receive the connection establishment request of the third node, and send the request to the first node Send a connection establishment request
  • step 1160 Establish a connection with the third node according to the connection indication message of the first node.
  • the wake-up message includes at least one of the following information: an identifier of the third node; a type of the third node; a wake-up reason; capability information of the third node; auxiliary information of the third node;
  • connection establishment request includes at least one of the following information: the identity of the third node; the type of the third node; the reason for waking up; the information of the equipment supported or saved by the third node; layer packets.
  • the core network is used as an example for the first node
  • the base station is used as an example for the second node
  • the tag or terminal is used as an example for the device
  • the reader or relay is used as an example for the third node.
  • the passive Internet of Things based on the cellular network can well solve the functions of tracking, positioning and counting of mobile tags or terminals.
  • the base station has the functions of a reader, such as: sending excitation signals or messages to tags or terminals, receiving messages sent by tags or terminals, identifying tags or terminals, etc.
  • the base station does not have the function of the reader, but can control the reader, for example, send control commands to the reader, receive messages from the reader, etc.
  • the base station only has some reader-writer functions, for example: receiving messages from the reader-writer.
  • the second node and the third node can be regarded as a whole (that is, the reader/base station), mainly reflecting the relationship between the reader/base station and the tag/terminal, the reader/base station The signaling interaction between the reader and the base station is not reflected in this embodiment.
  • Fig. 7 is a schematic diagram of a communication process between a device and a node provided by an embodiment. As shown in Figure 7, the communication process mainly includes the following contents.
  • the core network sends a trigger message to the reader or base station through an interface (for example: Xn or X2) to trigger the search for devices, that is, to select some eligible tags or terminals.
  • a trigger message can carry at least one of the following:
  • the complete identification of the tag/terminal or part of the identification of the tag/terminal such as: Personal Computer (Personal Computer, PC) identification, Electronic Product Code (Electronic Product Code, EPC) and/or Cyclic Redundancy Check Code (Cyclic Redundancy Check, CRC), such as CRC-16, can also be part of PC, EPC and/or CRC-16;
  • PC Personal Computer
  • EPC Electronic Product Code
  • CRC Cyclic Redundancy Check Code
  • CRC-16 Cyclic Redundancy Check
  • tag/terminal memory All data stored in the tag/terminal memory, or a part of the data, for example: class identification code, also known as tag identification code (Tag Identifier, TID), or a part of TID;
  • class identification code also known as tag identification code (Tag Identifier, TID)
  • TID tag identification code
  • -Capability information of the tag/terminal for example, the functions supported by the tag/terminal, the supported transmission mode, the type of the tag/terminal, the version of the tag/terminal, encryption information and/or inactivation status information of the tag, etc.;
  • -Auxiliary information of the tag/terminal for example, location information or beam direction of the last connection of the tag/terminal, transmission mode used in the last connection, probability of collision and/or silence information, etc.
  • the trigger message may carry information of one tag/terminal, or information of multiple tags/terminals.
  • the reader/base station After receiving the trigger message, the reader/base station sends a trigger message to the tag/terminal according to the information provided by the core network to determine the selected tag/terminal and identify the tag. After the tag/terminal receives the trigger message, if the tag/terminal meets the conditions indicated by the message sent by the reader/base station, the tag/terminal recognizes the base station/reader and responds and feeds back the message. In this process, the base station/reader and tag/terminal complete the identification and confirmation of each other.
  • the reader/base station determines the selected tag/terminal (i.e. the target device), and sends the information of the target device to the node.
  • the information of the target device can carry at least one of the following:
  • the full identity or a part of the identity of the target device for example: PC, EPC and/or CRC-16, or a part of PC, EPC and/or CRC-16;
  • an indication of whether the target device has successfully accessed that is, an indication of the access result
  • Ancillary information about the target device such as whether a collision has occurred and/or the probability of a collision
  • the feedback message of the target device can be used as an encapsulated message
  • connection request used to request to establish a connection between the base station/reader and the node for the target device
  • -Resources used by the base station/reader to receive data from the core network or send data to the core network such as Internet Protocol (Internet Protocol, IP) address and/or General Packet Radio Service Tunneling Protocol user plane (General Packet Radio Service Tunneling Protocol User Plane, GTPU) address, etc. (that is, resource information used to transmit data).
  • Internet Protocol Internet Protocol, IP
  • General Packet Radio Service Tunneling Protocol user plane General Packet Radio Service Tunneling Protocol User Plane, GTPU
  • the above information may be information of one target device, or information of multiple target devices.
  • the core network sends an access indication message to the reader/base station, indicating which operations to perform on the target device.
  • the access indication message can carry at least one of the following:
  • the full identity or a part of the identity of the target device for example: PC, EPC and/or CRC-16, or a part of PC, EPC and/or CRC-16;
  • Type of operation e.g. read, write, kill, lock, block write and/or block erase, etc.
  • - Operation content such as the storage area to read, the starting word address of the storage area, the number of reads, the storage area to write, the starting word address of the storage area, the content of writing, the type of lock operation, the storage area of the lock, the storage The starting word address of the area, the content of the lock, the erased storage area, the starting word address of the storage area, the number of erasing and/or the content of erasing, etc.;
  • the core network receives data from the base station/reader or sends data to the resource of the base station/reader (that is, the resource information used to transmit data), such as IP address and/or GTPU address, etc.;
  • - Capability information of the target device for example, functions supported by the target device, supported transmission methods, type of the target device, version of the target device, encryption information and/or label inactivation status information, etc.;
  • -Auxiliary information of the target device for example, the location information or beam direction of the last connection of the target device, the transmission mode used in the last connection, the probability of collision and/or silence information, etc.;
  • -Connection information such as the number of connections between the base station/reader and the node that the base station/reader needs to establish, the identification, and the business requirements that need to be met, such as: Qos index and/or transmission rate, etc.;
  • Bearer information such as the number of bearers between the base station/reader and the tag/terminal, identification, and business requirements to be met, such as: Qos index, transmission rate, transmission format and/or encryption method, etc. ;
  • the above information may be the information of one target device, or the information of multiple target devices.
  • the reader/base station After the reader/base station receives it, it sends an access message to the tag/terminal according to the information provided by the core network, informing the target device of the operation to be performed. After the target device receives it, it executes the response operation according to the access message, and feeds back the execution result information to the base station.
  • the reader/base station can send execution result information to the core network, indicating the execution result of the operation indicated in the access message.
  • the execution result information can carry at least one of the following:
  • target device identification e.g. EPC
  • -Auxiliary information of the target device for example, the transmission method used by the connection and/or the probability of collision, etc.;
  • the above information may be the information of one target device, or the information of multiple target devices.
  • the second node and the third node can be regarded as a whole (that is, the reader/base station), mainly reflecting the relationship between the reader/base station and the tag/terminal, the reader/base station The signaling interaction between the reader and the base station is not reflected in this embodiment.
  • Fig. 8 is a schematic diagram of another communication process between a device and a node provided by an embodiment. As shown in Figure 8, the communication process mainly includes the following contents.
  • the core network sends a trigger message to the reader or base station through an interface (for example: Xn or X2) to trigger the search for devices, that is, to select some eligible tags or terminals.
  • a trigger message can carry at least one of the following:
  • the complete identification of the tag/terminal or a part of the tag/terminal identification for example: PC, EPC and/or CRC-16, or part of PC, EPC and/or CRC-16;
  • Type of operation e.g. read, write, kill, lock, block write and/or block erase, etc.
  • - Operation content such as the storage area to read, the starting word address of the storage area, the number of reads, the storage area to write, the starting word address of the storage area, the content of writing, the type of lock operation, the storage area of the lock, the storage The starting word address of the area, the content of the lock, the erased storage area, the starting word address of the storage area, the number of erasing and/or the content of erasing, etc.;
  • -Capability information of the tag/terminal for example, the functions supported by the tag/terminal, the supported transmission mode, the type of the tag/terminal, the version of the tag/terminal, encryption information and/or inactivation status information of the tag, etc.;
  • -Auxiliary information of the tag/terminal for example, the location information or beam direction of the last connection of the tag/terminal, the transmission method used for the last connection, the probability of collision and/or silence information, etc.;
  • connection request used to request to establish a connection between the base station/reader and the node for the target device
  • the core network receives data from the base station/reader or sends data to the resource of the base station/reader (that is, the resource information used to transmit data), such as IP address and/or GTPU address, etc.;
  • -Connection information such as the number of connections between the base station/reader and the node that the base station/reader needs to establish, the identification, and the business requirements that need to be met, such as: Qos index and/or transmission rate, etc.;
  • Bearer information such as the number of bearers between the base station/reader and the tag/terminal, identification, and business requirements to be met, such as: Qos index, transmission rate, transmission format and/or encryption method, etc. ;
  • the above information can be the information of one tag/terminal, or the information of multiple tags/terminals.
  • the reader/base station After receiving the trigger message, the reader/base station sends a trigger message to the tag/terminal according to the information provided by the core network to determine the selected tag/terminal and identify the tag. After the tag/terminal receives the trigger message, if the tag/terminal meets the conditions indicated by the message sent by the reader/base station, the tag/terminal will respond by identifying the base station/reader and sending a feedback message.
  • the reader/base station also sends an access message to the tag/terminal according to the trigger message, informing the selected tag/terminal (that is, the target device) of the operation to be performed. After the target device receives it, it executes the response operation according to the access message, and feeds back the execution result information.
  • the reader/base station sends execution result information to the core network, indicating the execution result of the operation indicated in the access message.
  • the execution result information can carry at least one of the following:
  • target device identification e.g. EPC
  • - Auxiliary information of the target device for example, the transmission method used by the connection and/or the probability of collision, etc.;
  • the above information may be the information of one target device, or the information of multiple target devices.
  • the number of tags/terminals is very large, and readers often have to identify tens of thousands or even hundreds of thousands of tags/terminals.
  • the base station wakes up the tags/terminals, all the tags/terminals that received the signal may respond, and the signals of these tags/terminals will collide together, and the base station may not be able to recognize the signals of some of the tags/terminals.
  • the base station accesses the tag/terminal, it must uniquely identify the target device to be accessed.
  • anti-collision processing is performed between the base station and the tag/terminal.
  • the second node and the third node can be regarded as a whole (that is, the reader/base station), which mainly reflects the signaling interaction between the reader/base station and the tag/terminal, and The interaction between the reader and the base station is not reflected in this embodiment.
  • Fig. 9 is a schematic diagram of another communication process between a device and a node provided by an embodiment. As shown in Figure 9, the communication process mainly includes the following contents.
  • the reader/base station sends a selection message (or access request message) to the tags/terminals to select some qualified tags/terminals.
  • the selection message can be sent by broadcast, and all tags/terminals can receive it.
  • the selection message may be a MAC packet generated by the MAC.
  • the selection message (or access request message) may carry at least one of the following:
  • It can also carry the resource information of the tag/terminal receiving or sending data (ie resource information used to transmit data), such as frequency point, resource size, modulation mode and/or transmission rate, etc.
  • the reader/base station sends a query message to the tag/terminal to indicate the timing of the feedback message, preventing simultaneous feedback from eligible tags/terminals.
  • Query messages can be sent by broadcast, and all tags/terminals can receive them.
  • the query message may be a MAC data packet generated by the MAC.
  • the query message may carry: the time slot count parameter Q value, etc.
  • the tag/terminal After the tag/terminal receives it, if it satisfies the conditions in the selection message, it can be regarded as the selected tag/terminal (that is, it may be the target device).
  • the selected tag/terminal sends anti-collision information to the reader/base station according to the query message, for example, the selected tag/terminal should select a random number within the range determined by the Q value. If the random number is zero, the selected tag/terminal responds immediately, and the anti-collision information sent can be a 16-bit random or pseudo-random number RN16.
  • the base station After receiving the anti-collision information, the base station considers that a tag/terminal responds, further confirms with the selected tag/terminal, and sends a confirmation message to the selected tag/terminal. Acknowledgment messages can be sent via proprietary messages, only selected tags/terminals can receive them.
  • the acknowledgment message may be a MAC packet generated by the MAC.
  • the confirmation message carries RN16, which is received by the reader/base station in step 3.
  • the selected tag/terminal tries to receive the confirmation message from the reader/base station. If the selected tag/terminal receives the correct RN16, complete the mutual confirmation with the reader/base station, and send reporting information to the base station, such as reporting its identification information, such as PC, EPC and/or CRC-16, the selected tag /Terminal is the target device. Identification information may be sent via a proprietary message. The identification information may be a MAC data packet generated by the MAC. Through the identification information, the tag/terminal can apply for a part of resources from the reader/base station, and send data on these resources. The identification information may carry resource information used for data transmission, such as frequency point, resource size, modulation mode and/or transmission rate, and the like.
  • the selected tag/terminal If the selected tag/terminal does not receive the correct RN16 within a certain period of time, the selected tag/terminal considers an error and returns to the idle state.
  • the reader/base station After the reader/base station confirms with the selected tag/terminal, the selected tag/terminal is the target device, and the reader/base station can perform access operations on the target device.
  • the access operations include but are not limited to: read operations, write operation, kill operation, lock operation and so on.
  • the second node and the third node can be regarded as a whole (that is, the reader/base station), which mainly reflects the signaling interaction between the reader/base station and the tag/terminal, and The interaction between the reader and the base station is not reflected in this embodiment.
  • Fig. 10 is a schematic diagram of another communication process between a device and a node provided by an embodiment. As shown in Figure 10, the communication process mainly includes the following contents.
  • the base station sends a request message to the target device, requesting a new random number.
  • the target device can be through a proprietary message, which can only be received by a specific tag/terminal.
  • the target device can be a MAC packet generated by MAC.
  • the target device may carry: RN16, which is received by the reader/base station before.
  • the request message may also carry resource information for receiving or sending data by the target device, such as frequency point, resource size, modulation mode and/or transmission rate, and the like.
  • the request message can also carry the configuration of the target device and the reader/base station to establish a dedicated bearer (that is, the bearer information), including the transmission format (including transmission resources, time, modulation mode, transmission rate, ARQ and/or HARQ, etc.), encryption mode configuration, etc.
  • a dedicated bearer that is, the bearer information
  • the transmission format including transmission resources, time, modulation mode, transmission rate, ARQ and/or HARQ, etc.
  • encryption mode configuration etc.
  • the tag/terminal After the tag/terminal receives it, it returns a new 16-bit random or pseudo-random number RN16 (that is, the feedback message). Generating new random numbers can reduce tags/terminals and readers/base stations from being tracked or attacked by other devices.
  • the reader/base station After the reader/base station receives it, it sends an access message to the tag/terminal. Access messages can be via proprietary messages, which can only be received by specific tags/terminals.
  • the access message may be a MAC packet generated by MAC.
  • the access message carries RN16 and CRC-16, where RN16 is received by the reader/base station in step 2.
  • the access message can carry: the storage area to be read, the starting word address of the storage area, the number of reads, etc.;
  • the access message can carry: the storage area to be written, the starting word address of the storage area, the content to be written, etc.;
  • the access message can carry: password, etc.;
  • the access message can carry: the type of lock operation, the storage area of the lock, the starting word address of the storage area, the content of the lock, etc.;
  • the access message can carry: password, etc.;
  • the access message can carry: the storage area to be written, the starting word address of the storage area, the content to be written, etc.;
  • the access message can carry: the erased storage area, the starting word address of the storage area, the number to be erased, the content to be erased, etc.
  • the access message may also carry resource information for receiving or sending data by the target device, such as frequency point, resource size, modulation mode and/or transmission rate, and the like.
  • the access message can also carry the configuration of the dedicated bearer established between the target device and the base station, including: transmission format (including transmission resource, time, modulation mode, transmission rate, ARQ and/or HARQ, etc.), encryption mode, etc.
  • the target device tries to receive further access messages from the base station. If the target device receives the correct RN16, and the target device receives the message and completes the corresponding operation, it can send execution result information to the reader/base station, for example, send a feedback message, and the feedback message can include its RN16, PC, EPC and/or or CRC-16. Feedback messages can be via proprietary messages.
  • the execution result information may be a MAC data packet generated by the MAC.
  • the execution result information can carry: the read content
  • the execution result information can carry: the result of the write operation (success or failure);
  • the execution result information can carry: the result of the inactivation operation (success or failure);
  • the execution result information can carry: the result of the lock operation (success or failure);
  • the execution result information can carry: the result of the access operation (success or failure);
  • the execution result information can carry: the result of the block write operation (success or failure);
  • the execution result information can carry: the result of the block erase operation (success or failure);
  • the target device if the target device does not receive the correct RN16, the target device considers an error and returns to the access state.
  • the process in which the base station prompts the reader/relay to access the target device can be understood as the process in which the base station/relay initiates a call.
  • Fig. 11 is a schematic diagram of a communication process between a second node and a third node provided by an embodiment.
  • the communication process between the second node (such as a base station) and the third node (such as a reader/relay) mainly includes:
  • the core network sends a wake-up message to the base station to wake up the reader/relay;
  • the base station sends a wake-up message to wake up the reader/relay
  • the core network transmits data to the reader/Realy.
  • Fig. 12 is a schematic diagram of another communication process between a device and a node provided by an embodiment. As shown in Figure 12, the communication process mainly includes the following contents.
  • the core network sends a wake-up message to the base station to wake up the reader/relay.
  • the wake-up message may be an interface message between the base station and the core network, or an application layer data packet; if it is an interface message, the wake-up message may be a paging message.
  • the wakeup message can carry at least one of the following:
  • the complete identification of the third node which is used to uniquely identify the reader/relay, or a part of the identification; it can also indicate multiple readers/relays;
  • the device type of the third node indicating that the third node is an RFID, a passive device, a reader, etc.
  • - Capability information of the third node for example, the functions supported by the reader/relay, the supported transmission mode and/or the version of the reader/relay, etc.;
  • auxiliary information of the third node for example, the location information or beam direction of the last connection of the reader/relay, etc.
  • the base station sends a wake-up message to wake up the reader/relay.
  • the wake-up message may be an RRC message, or an application layer data packet. If it is an RRC message, the wake-up message may be a paging message.
  • the wakeup message can carry at least one of the following:
  • the complete identification of the third node which is used to uniquely identify the reader/relay, or a part of the identification; it can also indicate multiple readers/relays;
  • the device type of the third node indicating that the third node is RFID, passive device or reader, etc.
  • the reader/relay initiates a connection establishment process and sends a connection establishment request to the base station.
  • the connection establishment request can be an RRC message or an application layer data packet. If it is an RRC message, the RRC message may be a message such as an RRC establishment request, an RRC continuation request, or an RRC reestablishment request.
  • connection establishment request can carry at least one of the following:
  • the complete identification of the third node which is used to uniquely identify the reader/relay, or a part of the identification; it can also indicate multiple readers/relays;
  • the device type of the third node indicating that the third node is RFID, passive device or reader, etc.
  • tags/terminals (usually multiple) supported or saved by the third node, such as the number of tags/terminals, supported anti-collision algorithms, identification, version and/or type, etc.;
  • the base station After receiving the connection establishment request, the base station identifies the reader/relay, sends a connection establishment request (also called initial connection) message to the core network, and establishes the connection between the reader/relay between the base station and the core network .
  • the connection establishment request may be an interface message between the base station and the core network, or an application layer data packet. If it is an interface message, the connection establishment request may be an initial uplink message.
  • connection establishment request can carry at least one of the following:
  • the identification of the third node is used to uniquely identify the reader/relay, or a part of the identification can indicate multiple readers/relays;
  • the device type of the third node indicating that the third node is RFID, passive device or reader, etc.
  • tags/terminals (usually multiple) supported or saved by the third node, such as the number of tags/terminals, supported anti-collision algorithms, identification, version and/or type, etc.;
  • the base station receives data from the core network or sends data to the resources of the node, such as IP address, GTPU address, etc.;
  • the core network After the core network recognizes the reader/relay, it establishes a connection to the reader/relay, and instructs the reader/relay to check or access the tags/terminals.
  • the core network sends a connection indication message to the base station.
  • the connection indication message may be an interface message between the base station and the core network, or an application layer data packet. If it is an interface message, it may be an initial downlink message or an initial context establishment message.
  • the base station After receiving the connection indication message, the base station establishes a connection with the reader/relay, and sends the connection indication message (including connection configuration) to the reader/relay.
  • the base station sends a trigger message to the reader/relay.
  • the trigger message may be an RRC message or an application layer data packet. If it is an RRC message, the RRC message may be RRC establishment, RRC continuation, RRC reconfiguration and other messages.
  • the trigger message can carry at least one of the following:
  • Tag/terminal identification or part of tag/terminal identification for example: PC, EPC (Electronic Product Code) and CRC-16, or part of PC, EPC and CRC-16;
  • TID class identification code
  • - Content of operation storage area to read, start word address of the storage area, number of reads, storage area to write, start word address of the storage area, content to write, type of lock operation, lock storage area, storage The starting word address of the area, the content of the lock, the erased storage area, the starting word address of the storage area, the number of erasing, the content of erasing, etc.;
  • tags/terminals for example, functions supported by tags/terminals, supported transmission methods, types of tags/terminals, versions of tags/terminals, encryption information, tag inactivation status information, etc.;
  • -Auxiliary information of the tag/terminal for example, location information or beam direction of the last connection of the tag/terminal, transmission method used for the last connection, probability of collision, silence information, etc.
  • connection configuration such as: transmission rate, transmission format, encryption method, etc.
  • the above can be information of one label/terminal, or information of multiple labels/terminals.
  • the reader/relay executes the process of determining and accessing the target device according to the instructions.
  • the reader/relay can feed back the execution result information of the target device to the base station.
  • the execution result information may be an RRC message or an application layer data packet. If it is an RRC message, the RRC message may be a message such as RRC establishment completion, RRC continuation completion, and RRC reconfiguration completion.
  • - Execution result information can carry at least one of the following:
  • target device identification or part of target device identification, for example: PC, EPC (Electronic Product Code) and CRC-16, or part of PC, EPC and CRC-16;
  • TID class identification code
  • the feedback message from the target device possibly as an encapsulated message.
  • the above information may be information of one target device, or information of multiple target devices.
  • the base station feeds back the execution result information to the core network.
  • the execution result information may be an interface message between the base station and the core network, or an application layer data packet. If it is an interface message, the execution result information may be an initial uplink message.
  • the execution result information can carry at least one of the following:
  • target device identification or part of target device identification, for example: PC, EPC (Electronic Product Code) and CRC-16, or part of PC, EPC and CRC-16;
  • TID class identification code
  • the feedback message from the target device possibly as an encapsulated message.
  • Type of operation read, write, inactivate, lock, block write, block erase, etc.
  • the base station/reader receives data from the node or sends data to the resource of the node, such as IP address, GTPU address, etc.;
  • the above information may be information of one target device, or information of multiple target devices.
  • the core network After the core network receives the execution result information, if the operation is over, it can trigger the reader/relay to perform the release operation and send a release message to the base station.
  • the release message may be an interface message between the base station and the core network, or an application layer data packet. In the case of an interface message, the release message may be a release message.
  • the release message can carry at least one of the following:
  • the identification of the reader/relay of the target device which can uniquely identify the reader/relay, or a part of the identification, which can indicate multiple readers/relays.
  • -Device type indicating whether it is an RFID or a passive device or a reader-writer, etc.
  • the base station After the base station receives it, it can trigger the reader/relay to perform a release operation and send a release message to the target device.
  • the release message can be an RRC message or an application layer data packet. If it is an RRC message, the release message may be an RRC connection release message.
  • the release message can carry at least one of the following:
  • the identifier of the reader/relay can uniquely identify the reader/relay, or a part of the identifier can indicate multiple readers/relays.
  • -Device type indicating whether it is an RFID or a passive device or a reader-writer, etc.
  • the base station For tags/terminals under the cellular network, the base station needs to judge whether to send data to it according to its state, and the tag/terminal chooses which operation to perform according to its state, for example: silence or receive data, etc. Then, both the base station and the tag/terminal need to maintain the state of the tag/terminal.
  • the possible states include the following.
  • Idle state The tag/terminal in this state remains silent and does not send data to the tag/terminal.
  • the behavior of the tab/terminal can be at least one of the following:
  • the tag/terminal receives a message
  • the message can be a selection message or other messages, these messages contain information related to the identity message of the tag/terminal, or information in the memory of the tag/terminal;
  • the message can also be a receiving inventory or Inventory messages or other messages, these messages include instructions for resolving conflicts, or time information for feedback messages, etc.
  • the message may also be a request for access indication;
  • the message can be a selection message or other messages, these messages contain information related to the identity message of the tag/terminal, or information in the memory of the tag/terminal; the message can also be an inventory or inventory message or other Messages, these messages include instructions for conflict resolution, random information for anti-collision of tags/terminals, or time information for feedback messages, and may also be instructions for requesting access;
  • these response messages may be inventory or inventory or response messages for request access messages or other messages, and may also contain tag/terminal identity information, or random information to prevent conflicts, etc. These messages may also include access success indications, access failure indications, etc.;
  • the tag/terminal will report its identity or password or the generated random number to the base station, the base station can identify the tag/terminal, and the tag/terminal can also know the base station have identified themselves;
  • the tag/terminal can choose to receive or send data on some resources, or the tag/terminal can apply to the base station for some resources and send data on these resources;
  • This state includes the Arbitrate (judgment), Reply (return order) and Acknowledged (response) states of the tag/terminal.
  • tags/terminals in this state can perform access operations.
  • the behavior of the tab/terminal can be at least one of the following:
  • these messages contain information related to the identity of the tag/terminal, or the password information of the tag/terminal, or the random information of the tag/terminal for anti-collision; the message can also be the type of access operation, And which storage locations are accessed, etc. Time information of feedback messages in these messages;
  • - Send a signal, data or response message can be a response message to an access message.
  • These messages may also include tag/terminal identity information, tag/terminal anti-collision random information, and the like. It can also contain success indication, failure indication, etc.;
  • the tag/terminal establishes a one-to-one dedicated bearer with the base station, including: transmission format (including transmission resource, time, modulation mode, transmission rate, ARQ, HARQ, etc.) or encryption mode configuration;
  • the base station and the core network have established a connection for the tag/terminal.
  • Deactivation state In order to alarm, discard, avoid access conflicts, etc., the base station can deactivate the tag/terminal. The tag/terminal in this state cannot work. In this state, the behavior of the tag/terminal can be as follows at least one of:
  • Silent state In this state, the label/terminal is in a silent state and performs power-saving operations. In this state, the behavior of the tab/terminal can be at least one of the following:
  • FIG. 13 is a flowchart of another communication method provided by an embodiment. As shown in FIG. 13 , the method provided by this embodiment includes step 210 and step 220 .
  • step 210 a trigger message is sent, where the trigger message is used to instruct the second node to determine the target device.
  • step 220 the execution result information of the target device is received.
  • the first node (such as the core network) can send a trigger message to the second node to trigger the operation of finding the target device among the devices in the network, so that the second node can determine the target device and access the target device;
  • the second node instructs the target device to perform corresponding operations by sending an access message, such as reading tags, erasing tags, or modifying tags, etc.; the target device can perform corresponding operations accordingly and feed back the execution result information to the first node through the second node, thereby realizing Radio frequency identification of RFID tags in cellular networks.
  • Step 212 Receive the information of the target device; wherein, the information of the target device includes at least one of the following information: the complete identification or partial identification of the target device; All or part of the data; the random code corresponding to the target device; the access result indication of the target device; the capability information of the target device; the auxiliary information of the target device; the feedback message of the target device; the connection request for the target device; used to transmit data resource information.
  • Step 214 Send an access indication message, where the access indication message is used to indicate the operation performed on the target device; wherein, the access indication message includes at least one of the following information of the target device : The complete or partial identification of the target device; the random code corresponding to the target device; the operation type; the operation content; the password; the operation message; the connection request for the target device; the resource information used to transmit data; Auxiliary information of the device; connection information of the target device; bearer information of the target device.
  • Step 230 Send a wake-up message, the wake-up message is used to instruct the second node to wake up the third node;
  • Step 240 Receive the connection establishment message sent by the second node Request;
  • Step 250 Send a connection indication message to the second node, where the connection indication message is used to instruct the second node to establish a connection with the third node.
  • FIG. 14 is a flowchart of another communication method provided by an embodiment. As shown in FIG. 14 , the method provided by this embodiment includes step 310 and step 320 .
  • step 310 an access message from the second node is received, and a corresponding operation is performed according to the access message.
  • step 320 the execution result information is sent to the second node.
  • the first node (such as the core network) can send a trigger message to the second node to trigger the operation of finding the target device among the devices in the network, so that the second node can determine the target device and access the target device;
  • the node instructs the target device to perform corresponding operations by sending an access message, such as reading tags, erasing tags, or modifying tags, etc.; the target device can perform corresponding operations accordingly and feed back execution result information to the first node through the second node, thereby realizing cellular Radio frequency identification of RFID tags in the network.
  • the target device is in one of the following states:
  • the target device does not support data transmission during the idle state
  • the target device supports access operations during the process of being in the access state, but does not support access operations;
  • the target device supports access operations during the process of being in the connected state
  • the target device does not work during the inactivated state
  • the target device enters power saving mode during the silent state.
  • the target device transitions from the idle state to the silent state
  • the first condition includes at least one of the following:
  • the number of receiving configurations during the idle state reaches the first number
  • the target device when the second condition is satisfied, the target device is switched from the silent state to the idle state;
  • the second condition includes at least one of the following:
  • the number of receiving configurations during the silent state reaches the second number of times
  • RSRP Reference Signal Receiving Power
  • the target device transitions from the idle state to the access state
  • the third condition includes at least one of the following:
  • the query message is received and meets the conditions in the query message
  • the access request message is received, and the conditions in the access request message are met;
  • the target device transitions from the access state to the idle state
  • the fourth condition includes at least one of the following:
  • the target device transitions from the access state to the connection state; wherein the fifth condition includes at least one of the following:
  • the target device transitions from the connected state to the idle state
  • the sixth condition includes at least one of the following:
  • the target device when the seventh condition is met, the target device is switched from the connected state to the deactivated state;
  • the seventh condition includes: the deactivation indication message is received, and the condition in the deactivation indication message is met.
  • the target device performs state transition in at least one of the following ways:
  • the number of counts is increased by 1, and the number of counts is greater than or equal to the number threshold, then enters the silent state, and in the case of the silent state, after the third time threshold, enters the idle state;
  • the method also includes:
  • Step 301 receiving a selection message and a query message of the second node
  • Step 303 sending anti-collision information to the second node
  • Step 305 receiving an acknowledgment message from the second node
  • Step 307 Send the report information to the second node.
  • the method also includes:
  • Step 311 receiving a request message from the second device
  • Step 312 Generate a random number according to the request message.
  • Fig. 15 is a schematic diagram of a device state transition provided by an embodiment. As shown in Figure 15, the device state transition mainly includes the following situations.
  • the first condition may be at least one of the following:
  • the requirements for a certain time that is, the time in the idle state reaches the first set time
  • the time interval configured by the base station/reader/relay after this time, the tag or terminal enters the silent state
  • the tag or terminal will add one or subtract one; if the result of adding one or subtracting one meets the configured number of times or is zero, the tag or terminal enters a silent state;
  • the base station/reader/relay device sends an instruction message to the tag or the terminal, and the instruction message can carry relevant instructions of the silent state, for example, whether to enter the silent state state, and the label or terminal identification. After the tag or terminal receives it, it enters the silent state.
  • the second condition may be at least one of the following:
  • the tag or terminal will add one or subtract one; if the result of adding one or subtracting one meets the configured number of times or is zero, the tag or terminal will enter the idle state;
  • the detected RSRP value is below the threshold.
  • the third condition may be at least one of the following:
  • the tag or terminal receives an excitation signal or a wake-up signal
  • the tag or terminal receives the selection message and meets the conditions in the selection message, for example: conditions about identity;
  • the label or the terminal receives the query message, and meets the conditions in the query message, for example, meets the indication of conflict resolution processing;
  • the tag or terminal receives the access request message and meets the conditions in the request access message, for example: the conditions about the identity; the tag or terminal meets the requirements of entering Arbitrate (judgment), Reply (return order), and Acknowledged (response) state.
  • the fourth condition may be at least one of the following:
  • the tag or terminal does not receive an excitation signal or a wake-up signal within a set period of time
  • the fifth condition may be at least one of the following:
  • the second node has determined the target device, that is, the label or terminal has completed the process of determining the label or terminal, and the base station can uniquely identify the label or terminal;
  • the identification information has been reported, that is, the tag or terminal has reported its identification information, such as PC, EPC and CRC-16;
  • the anti-collision information has been reported, that is, the tag or terminal has reported random information to prevent conflicts, such as random numbers;
  • the corresponding connection has been established, that is, the base station/reader and the core network have established a connection for the tag or terminal. 6)
  • the sixth condition may be at least one of the following:
  • the tag or terminal does not receive an excitation signal or a wake-up signal within a set period of time
  • the tag or terminal cannot perceive energy within a set period of time, that is, it cannot sense and obtain energy from the surroundings.
  • the seventh condition may be:
  • the deactivation message is received, and the conditions carried in the deactivation message are met, for example: the deactivation password is consistent, etc.
  • tags/terminals are very limited, so there is a need for power saving.
  • the tag/terminal In the power-saving state, the tag/terminal is in a silent state and does not receive signals; in the non-power-saving state, the tag/terminal needs to work normally.
  • the base station/reader configures the first time threshold and the second time threshold. According to the configuration of the base station/reader, every time the tag/terminal passes the first time threshold, it enters the silent state; when it passes the second time threshold in the silent state, it enters the idle state from the silent state.
  • the base station/reader configures the third time threshold and the number of times threshold.
  • the base station/reader sends a message or signal to the tag/terminal, and the message or signal may carry an indication of the silent state, for example, whether to enter the silent state.
  • the number of counts is increased by one; if the result of adding one is equal to or greater than the threshold of times, the tag/terminal enters a silent state.
  • the idle state is entered from the silent state.
  • the base station/reader configures a fourth time threshold and a count threshold, and the tag/terminal generates a count value equal to or related to the count threshold according to the configuration.
  • the base station/reader sends a message or signal to the tag/terminal, and the message or signal may carry an indication of the silent state, for example, whether to enter the silent state.
  • the count value is decremented by one. If the minus-one result is equal to 0, the tag/terminal enters a silent state. After the fourth time threshold in the silent state, the tag/terminal enters the idle state from the silent state.
  • the base station/reader configures the fifth time threshold.
  • the base station/reader sends a message or signal to the tag/terminal, and the message or signal can carry relevant indications of the silent state, for example, whether to enter the silent state, and the identification of the tag/terminal, etc.
  • the tag/terminal After the tag/terminal receives it, it enters the silent state; after the fifth time threshold in the silent state, the tag/terminal enters the idle state from the silent state.
  • the base station/reader configures the sixth time threshold, the seventh time threshold and the set threshold value. If the tag/terminal fails to detect a signal or message within the sixth time threshold, or the detected signal energy or RSRP is lower than the set threshold value, it enters the silent state; after the seventh time threshold in the silent state, the tag/terminal from silent state to idle state.
  • time thresholds in this embodiment may be equal or unequal; the time threshold for entering the idle state from the silent state may be equal to the second set time in the second condition in the above embodiment.
  • Fig. 16 is a schematic structural diagram of a communication device provided by an embodiment.
  • the communication apparatus includes: a determining module 410 configured to determine a target device according to a trigger message of the first node.
  • the access module 420 is configured to send an access message to the target device, where the access message is used to instruct the target device to perform a corresponding operation.
  • the information sending module 430 is configured to send the execution result information of the target device to the first node.
  • the communication device in this embodiment determines the target device according to the trigger message, accesses the target device, and then receives the execution result information fed back by the target device, so as to realize the radio frequency identification of the RFID tag in the cellular network.
  • the trigger message includes at least one of the following information of at least one device: a complete or partial identifier of the device; all or part of the data stored in the device; an instruction to change the selected flag or inventory flag; a device selection message ; device capability information; device auxiliary information; operation type; operation content; password; operation message; connection request; resource information for transmitting data; connection information; bearer information.
  • the apparatus further includes: a first sending module, configured to send information of the target device to the first node after the target device is determined according to the trigger message of the first node; wherein, the information of the target device includes at least the following One kind of information: the complete or partial identification of the target device; all or part of the data stored in the target device; the random code corresponding to the target device; the access result indication of the target device; the capability information of the target device; the auxiliary information of the target device ; Feedback message from the target device; Connection request for the target device; Resource information for transmitting data.
  • a first sending module configured to send information of the target device to the first node after the target device is determined according to the trigger message of the first node
  • the information of the target device includes at least the following One kind of information: the complete or partial identification of the target device; all or part of the data stored in the target device; the random code corresponding to the target device; the access result indication of the target device; the capability information of the target device; the auxiliary information of the target device ; Feedback
  • the apparatus further includes: a first receiving module, configured to receive an access indication message from the first node before sending the access message to the target device, where the access indication message is used to indicate an operation to be performed on the target device; , the access indication message includes at least one of the following information of the target device: a complete or partial identity of the target device; a random code corresponding to the target device; an operation type; an operation content; a password; an operation message; a connection request for the target device; Resource information of the transmitted data; capability information of the target device; auxiliary information of the target device; connection information of the target device; bearer information of the target device.
  • a first receiving module configured to receive an access indication message from the first node before sending the access message to the target device, where the access indication message is used to indicate an operation to be performed on the target device
  • the access indication message includes at least one of the following information of the target device: a complete or partial identity of the target device; a random code corresponding to the target device; an operation type; an operation content; a password
  • the execution result information includes at least one of the following information: the complete or partial identification of the target device; all or part of the data stored in the target device; a random code corresponding to the target device; an access result indication of the target device ; Auxiliary information of the target device; Feedback message of the target device; Operation type; Execution result; Read content; Connection request for the target device;
  • the target device is in one of the following states:
  • the target device does not support data transmission during the idle state
  • the target device supports access operations during the process of being in the access state, but does not support access operations;
  • the target device supports access operations during the process of being in the connected state
  • the target device does not work during the inactivated state
  • the target device enters power saving mode during the silent state.
  • the determining module 410 includes:
  • an inquiry unit configured to send a selection message and an inquiry message to at least one device according to the trigger message
  • an anti-collision unit configured to receive anti-collision information fed back by at least one of the at least one device
  • a confirmation unit configured to send a confirmation message to the device that feeds back the anti-collision information
  • At least one device among the devices configured to receive feedback anti-collision information determines the device sending the reported information as the target device according to the report information sent by the confirmation message.
  • the device also includes:
  • the random number request module is configured to send a request message to the target device before sending the access message to the target device, and the request message is used to instruct the target device to generate a random number;
  • the random number receiving module is set to receive the random number returned by the target device.
  • the access message includes instruction information for at least one of the following operations: read operation; write operation; kill operation; lock operation; access operation; block write operation; block erase operation.
  • the access message may also include at least one of the following information: resource information for transmitting data; capability information and bearer information of the target device.
  • the device also includes:
  • a wake-up module configured to wake up the third node according to the wake-up message of the first node before sending the access message to the target device;
  • the request forwarding module is configured to receive the connection establishment request of the third node, and send the connection establishment request to the first node;
  • An establishment module configured to establish a connection with the third node according to the connection instruction message of the first node.
  • the wake-up message includes at least one of the following information: an identifier of the third node; a type of the third node; a wake-up reason; capability information of the third node; auxiliary information of the third node;
  • connection establishment request includes at least one of the following information: the identity of the third node; the type of the third node; the reason for waking up; the information of the equipment supported or saved by the third node; layer packets.
  • the communication device proposed in this embodiment and the communication method proposed in the above embodiment belong to the same inventive concept, and the technical details not described in detail in this embodiment can be referred to any of the above embodiments, and this embodiment has the same benefits as the implementation of the communication method Effect.
  • Fig. 17 is a schematic structural diagram of another communication device provided by an embodiment.
  • the communication device includes: a trigger module 510 configured to send a trigger message, where the trigger message is used to instruct the second node to determine the target device.
  • the result receiving module 520 is configured to receive the execution result information of the target device.
  • the communication device of this embodiment by sending a trigger message, triggers the operation of finding the target device among the devices in the network, so as to use the second node to determine the target device and access the target device; and then receive the execution result information fed back by the target device, thereby realizing Radio frequency identification of RFID tags in cellular networks.
  • the apparatus further includes: a second receiving module, configured to receive information of the target device; wherein, the information of the target device includes at least one of the following information: a complete identification or a partial identification of the target device; All or part of the data of the target device; the random code corresponding to the target device; the access result indication of the target device; the capability information of the target device; the auxiliary information of the target device; the feedback message of the target device; the connection request for the target device; Resource information for the data.
  • the information of the target device includes at least one of the following information: a complete identification or a partial identification of the target device; All or part of the data of the target device; the random code corresponding to the target device; the access result indication of the target device; the capability information of the target device; the auxiliary information of the target device; the feedback message of the target device; the connection request for the target device; Resource information for the data.
  • the apparatus further includes: a second sending module, configured to send an access indication message, where the access indication message is used to indicate an operation to be performed on the target device; wherein, the access indication message includes at least one of the following information of the target device : The complete or partial identification of the target device; the random code corresponding to the target device; the operation type; the operation content; the password; the operation message; the connection request for the target device; the resource information used to transmit data; Auxiliary information of the device; connection information of the target device; bearer information of the target device.
  • a second sending module configured to send an access indication message, where the access indication message is used to indicate an operation to be performed on the target device; wherein, the access indication message includes at least one of the following information of the target device : The complete or partial identification of the target device; the random code corresponding to the target device; the operation type; the operation content; the password; the operation message; the connection request for the target device; the resource information used to transmit data; Auxiliary information of the device; connection information of the target
  • the device also includes:
  • a wake-up indication module configured to send a wake-up message, the wake-up message is used to instruct the second node to wake up the third node;
  • the request receiving module is configured to receive the connection establishment request sent by the second node
  • connection indication module configured to send a connection indication message to the second node, where the connection indication message is used to instruct the second node to establish a connection with the third node.
  • the communication device proposed in this embodiment and the communication method proposed in the above embodiment belong to the same inventive concept, and the technical details not described in detail in this embodiment can be referred to any of the above embodiments, and this embodiment has the same benefits as the implementation of the communication method Effect.
  • Fig. 18 is a schematic structural diagram of another communication device provided by an embodiment.
  • the communication device includes: a message receiving module 610 configured to receive an access message from the second node, and perform corresponding operations according to the access message.
  • the result sending module 620 is configured to send the execution result information to the second node.
  • the communication device in this embodiment executes a corresponding operation according to the received access message, and sends the execution result information to the second node, so as to realize the radio frequency identification of the RFID tag in the cellular network.
  • the target device is in one of the following states:
  • the target device does not support data transmission during the idle state
  • the target device supports access operations during the process of being in the access state, but does not support access operations;
  • the target device supports access operations during the process of being in the connected state
  • the target device does not work during the inactivated state
  • the target device enters power saving mode during the silent state.
  • the target device transitions from the idle state to the silent state
  • the first condition includes at least one of the following:
  • the number of receiving configurations during the idle state reaches the first number
  • the target device when the second condition is satisfied, the target device is switched from the silent state to the idle state;
  • the second condition includes at least one of the following:
  • the number of receiving configurations during the silent state reaches the second number of times
  • the target device transitions from the idle state to the access state
  • the third condition includes at least one of the following:
  • the query message is received and meets the conditions in the query message
  • the access request message is received, and the conditions in the access request message are met;
  • the target device transitions from the access state to the idle state
  • the fourth condition includes at least one of the following:
  • the target device when the fifth condition is satisfied, the target device is switched from the access state to the connection state;
  • the fifth condition includes at least one of the following:
  • the target device transitions from the connected state to the idle state
  • the sixth condition includes at least one of the following: an error occurs; no excitation signal or wake-up signal is received within a set time period; energy cannot be sensed within a set time period.
  • the target device transitions from the connection state to the deactivation state; wherein, the seventh condition includes: receiving a deactivation indication message and satisfying the conditions in the deactivation indication message.
  • the target device performs state transition in at least one of the following ways:
  • the number of counts is increased by 1, and the number of counts is greater than or equal to the number threshold, then enters the silent state, and in the case of the silent state, after the third time threshold, enters the idle state;
  • the communication device proposed in this embodiment and the communication method proposed in the above embodiment belong to the same inventive concept, and the technical details not described in detail in this embodiment can be referred to any of the above embodiments, and this embodiment has the same benefits as the implementation of the communication method Effect.
  • Fig. 19 is a schematic diagram of the hardware structure of a node provided by an embodiment.
  • the node provided by the present application includes a memory 720, a processor 710, and a computer program stored in the memory and operable on the processor When the processor 710 executes the computer program, the above-mentioned communication method applied to the first node or the second node is realized.
  • the node may also include a memory 720; there may be one or more processors 710 in the node, and one processor 710 is taken as an example in FIG. 19; the memory 720 is used to store one or more programs; the one or more programs Executed by the one or more processors 710, so that the one or more processors 710 implement the communication method applied to the first node or the second node as described in the embodiment of the present application.
  • the node also includes: communication means 730 , input means 740 and output means 750 .
  • the processor 710, the memory 720, the communication device 730, the input device 740, and the output device 750 in the node may be connected through a bus or in other ways. In FIG. 19, connection through a bus is taken as an example.
  • the input device 740 can be used to receive input numbers or character information, and generate key signal input related to user setting and function control of the node.
  • the output device 750 may include a display device such as a display screen.
  • Communications device 730 may include a receiver and a transmitter.
  • the communication device 730 is configured to perform information sending and receiving communication according to the control of the processor 710 .
  • the memory 720 can be configured to store software programs, computer-executable programs and modules, such as program instructions/modules corresponding to the communication method described in the embodiment of the present application (for example, the determination module 310 in the communication device , access module 320 and information sending module 330).
  • the memory 720 may include a program storage area and a data storage area, wherein the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created according to the use of the node, and the like.
  • the memory 720 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage devices. In some instances, memory 720 may further include memory located remotely from processor 710, and these remote memories may be connected to nodes through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Fig. 20 is a schematic diagram of the hardware structure of a device provided by an embodiment.
  • the device provided by the present application includes a memory 820, a processor 810, and a computer program stored in the memory and operable on the processor When the processor 810 executes the computer program, the above-mentioned communication method applied to the device is realized.
  • the device may also include a memory 820; there may be one or more processors 810 in the device, and one processor 810 is taken as an example in FIG. 20; the memory 820 is used to store one or more programs; the one or more programs Executed by the one or more processors 810, so that the one or more processors 810 implement the communication method applied to the device as described in the embodiment of the present application.
  • the device also includes communication means 830 , input means 840 and output means 850 .
  • the processor 810, the memory 820, the communication device 830, the input device 840 and the output device 850 in the device may be connected via a bus or in other ways, and connection via a bus is taken as an example in FIG. 20 .
  • the input device 840 can be used to receive input numbers or character information, and generate key signal input related to user settings and function control of the device.
  • the output device 850 may include a display device such as a display screen.
  • Communications device 830 may include a receiver and a transmitter.
  • the communication device 830 is configured to perform information sending and receiving communication according to the control of the processor 810 .
  • the memory 820 can be configured to store software programs, computer-executable programs and modules, such as the program instructions/modules corresponding to the communication method described in the embodiment of the present application (for example, the message receiving module in the communication device 410 and result sending module 420).
  • the memory 820 may include a program storage area and a data storage area, wherein the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created according to usage of the device, and the like.
  • the memory 820 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage devices.
  • the memory 820 may further include memory located remotely from the processor 810, and these remote memories may be connected to the device through a network.
  • networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the embodiment of the present application further provides a storage medium, the storage medium stores a computer program, and when the computer program is executed by a processor, the communication method described in any one of the embodiments of the present application is implemented.
  • the method includes: determining a target device according to a trigger message of a first node; sending an access message to the target device, where the access message is used to instruct the target device to perform a corresponding operation; sending the target device to the first node Device execution result information.
  • the method includes: sending a trigger message, where the trigger message is used to instruct the second node to determine the target device; and receiving execution result information of the target device.
  • the method includes: receiving an access message from the second node, and performing corresponding operations according to the access message; and sending execution result information to the second node.
  • the computer storage medium in the embodiments of the present application may use any combination of one or more computer-readable media.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer-readable storage medium may be, for example, but not limited to: an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination thereof. More specific examples (non-exhaustive list) of computer-readable storage media include: electrical connections with one or more conductors, portable computer disks, hard disks, Random Access Memory (RAM), read-only memory (Read Only Memory, ROM), Erasable Programmable Read Only Memory (EPROM), flash memory, optical fiber, portable CD-ROM, optical storage device, magnetic storage device, or any suitable combination of the above .
  • a computer readable storage medium may be any tangible medium that contains or stores a program for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer readable signal medium may include a data signal carrying computer readable program code in baseband or as part of a carrier wave. Such propagated data signals may take many forms, including but not limited to: electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, which can send, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device. .
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wires, optical cables, radio frequency (Radio Frequency, RF), etc., or any suitable combination of the above.
  • any appropriate medium including but not limited to: wireless, wires, optical cables, radio frequency (Radio Frequency, RF), etc., or any suitable combination of the above.
  • Computer program codes for performing the operations of the present application may be written in one or more programming languages or combinations thereof, including object-oriented programming languages such as Java, Smalltalk, C++, and conventional A procedural programming language such as "C" or similar programming language.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as through the Internet using an Internet service provider). connect).
  • LAN local area network
  • WAN wide area network
  • connect such as AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
  • user terminal covers any suitable type of wireless user equipment, such as a mobile phone, a portable data processing device, a portable web browser or a vehicle-mounted mobile station.
  • the various embodiments of the present application can be implemented in hardware or special purpose circuits, software, logic or any combination thereof.
  • some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software, which may be executed by a controller, microprocessor or other computing device, although the application is not limited thereto.
  • Embodiments of the present application may be realized by a data processor of a mobile device executing computer program instructions, for example in a processor entity, or by hardware, or by a combination of software and hardware.
  • Computer program instructions may be assembly instructions, Instruction Set Architecture (ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or written in any combination of one or more programming languages source or object code.
  • ISA Instruction Set Architecture
  • Any logic flow block diagrams in the drawings of the present application may represent program steps, or may represent interconnected logic circuits, modules and functions, or may represent a combination of program steps and logic circuits, modules and functions.
  • Computer programs can be stored on memory.
  • the memory may be of any type suitable for the local technical environment and may be implemented using any suitable data storage technology, such as but not limited to Read-Only Memory (ROM), Random Access Memory (RAM), Optical Memory devices and systems (Digital Video Disc (DVD) or Compact Disk (CD), etc.
  • Computer-readable media may include non-transitory storage media.
  • Data processors may be any Types, such as but not limited to general-purpose computers, special-purpose computers, microprocessors, digital signal processors (Digital Signal Processing, DSP), application-specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic devices (Field-Programmable Gate Array , FGPA) and processors based on multi-core processor architectures.
  • DSP Digital Signal Processing
  • ASIC Application Specific Integrated Circuit
  • FGPA programmable logic devices
  • processors based on multi-core processor architectures.

Abstract

一种通信方法、节点、设备、通信系统及存储介质。该方法根据第一节点的触发消息确定目标设备(110);向所述目标设备发送访问消息,所述访问消息用于指示所述目标设备执行相应操作(120);向所述第一节点发送所述目标设备的执行结果信息(130)。

Description

通信方法、节点、设备、通信系统及存储介质
相关申请的交叉引用
本申请基于申请号为202111413160.5、申请日为2021年11月25日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及无线通信网络技术领域,例如涉及一种通信方法、节点、设备、通信系统及存储介质。
背景技术
近年来,物联网技术的规模化应用导致更加丰富的市场和技术需求,新的物联网应用也将不断涌现,未来将会有更大量的传感器、物联网设备或其他类型模块渗透到农业、工业、环境保护、城市管理和人类健康等多种传统或新兴行业中。例如,一个智慧图书馆中可能所有图书都装入了电子标签,图书在图书馆内各处的流动将被全程跟踪,图书查找、定位、数量或状态统计等都有可能实时完成。又如,仓储物流行业如今可能已经是一个自动化程度很高的行业,通过使用基于射频识别技术(Radio Frequency Identification,RFID)的标签,管理员可以实现电子化的物品记录、查询和跟踪。但由于需要使用专用设备依次读取每个标签,这样的工作量仍然非常巨大。
综合来看,这些应用已经提出与现有物联网应用差别较大的需求。例如,此类设备的数量将非常巨大,很多设备的尺寸非常微小,需要极其简单的硬件结构,甚至无法集成电池,此外,就算这些设备能集成电池,可能由于业务模式非常多样化,也很难保证一块电池维持很长时间。但由于这些设备数量过于巨大,为这些设备充电或更换电池将变得非常困难,需要极大的人力物力,甚至成为不可能的任务。可见,物联网的大规模部署受到了传感器能耗、部署及维护成本的限制。
发明内容
本申请提供一种通信方法、节点、设备、通信系统及存储介质。
本申请实施例提供一种通信方法,包括:根据第一节点的触发消息确定目标设备;向所述目标设备发送访问消息,所述访问消息用于指示所述目标设备执行相应操作;向所述第一节点发送所述目标设备的执行结果信息。
本申请实施例还提供了一种通信方法,包括:发送触发消息,所述触发消息用于指示第二节点确定目标设备;接收目标设备的执行结果信息。
本申请实施例还提供了一种通信方法,包括:接收第二节点的访问消息,并根据所述访问消息执行相应操作;向所述第二节点发送执行结果信息。
本申请实施例还提供了一种节点,包括:存储器、处理器以及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述的通信方法。
本申请实施例还提供了一种设备,包括:存储器、处理器以及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述的通信方法。
本申请实施例还提供了一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该程序被处理器执行时实现上述的通信方法。
附图说明
图1为一实施例提供的一种蜂窝网络的示意图;
图2为一实施例提供的另一种蜂窝网络的示意图;
图3为一实施例提供的一种蜂窝网络控制面架构的示意图;
图4为一实施例提供的另一种蜂窝网络控制面架构的示意图;
图5为一实施例提供的又一种蜂窝网络控制面架构的示意图;
图6为一实施例提供的一种通信方法的流程图;
图7为一实施例提供的一种设备与节点之间通信过程的示意图;
图8为一实施例提供的另一种设备与节点之间通信过程的示意图;
图9为一实施例提供的再一种设备与节点之间通信过程的示意图;
图10为一实施例提供的又一种设备与节点之间通信过程的示意图;
图11为一实施例提供的一种第二节点与第三节点之间通信过程的示意图;
图12为一实施例提供的又一种设备与节点之间通信过程的示意图;
图13为一实施例提供的另一种通信方法的流程图;
图14为一实施例提供的又一种通信方法的流程图;
图15为一实施例提供的一种设备状态转换的示意图;
图16为一实施例提供的一种通信装置的结构示意图;
图17为一实施例提供的另一种通信装置的结构示意图;
图18为一实施例提供的又一种通信装置的结构示意图;
图19为一实施例提供的一种节点的硬件结构示意图;
图20为一实施例提供的一种设备的硬件结构示意图。
具体实施方式
下面结合附图和实施例对本申请进行说明。可以理解的是,此处所描述的具体实施例仅仅用于解释本申请,而非对本申请的限定。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。另外还需要说明的是,为了便于描述,附图中仅示出了与本申请相关的部分而非全部结构。
在物联网技术中,可以通过专用设备依次读取每个设备的标签,设备的数量通常很多,读取标签的工作量非常大;此外,很多设备的尺寸非常微小,硬件结构较简单,甚至无法集成电池,并且由于业务模式非常多样化,电池也难以维持很长时间,更换或充电也较为困难。可见,物联网的大规模部署受到了传感器能耗、部署及维护成本的限制。
本实施例的通信方法可基于蜂窝网络实现。该通信方法涉及第一节点(例如核心网或数据处理平台等)、第二节点(例如基站或接入点等)以及具有标签的设备(例如标签或终端等,以下统称为设备)。在一些实施例中,该通信方法还涉及第三节点(例如基于射频技术的无源设备、读写器或中继设备等)。
图1为一实施例提供的一种蜂窝网络的示意图。如图1所示,在蜂窝网络下,标签或终端受到基站的控制和管理。标签或终端可以从基站获取能量和信号,而基站可以根据数据处理平台或者核心网的指示,对标签或终端进行管理。
图2为一实施例提供的另一种蜂窝网络的示意图。如图2所示,考虑到有的标签或终端的接收灵敏度较低,对接收的信号质量的要求较高,所以,标签或终端要求的下行信号的覆盖范围比基站的实际覆盖范围要小。出于覆盖范围的考虑,基站下可能会部署第三节点,如读写器或者中继设备(Relay),基站给读写器或Relay下达指令,由读写器或Relay负责激励、以及发送消息给标签或终端,而读写器或Relay接收到标签或终端发送的上行命令后,再转发给基站。
图3为一实施例提供的一种蜂窝网络控制面架构的示意图。对于图1所示的蜂窝网络,其控制面的架构如图3所示,其中,标签或终端的RFID的介质访问控制(Media Access Control,MAC)层可与基站的RFID的MAC层传输信令或数据;标签或终端的RFID的物理(Physical,PHY)层可与基站的RFID的PHY层传输信令或数据;基站的RFID层可与核心网的RFID层传输信令或数据。
图4为一实施例提供的另一种蜂窝网络控制面架构的示意图。对于图2所示的蜂窝网络,其控制面的架构如图4所示。其中,基站不具有RFID层,基站可能无法识别RFID或无源设备的相关信息,RFID或无源设备的信息是一个应用层的数据包,基站不会解析这些数据包。读写器或者Relay不仅具有了RFID的功能,例如支持RFID功能的MAC、PHY以及RFID层,还具有了Uu接口的相关功能,例如支持Uu相关的无线资源控制(Radio Resource Control,RRC)、分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)、无线链路层控制协议(Radio Link Control,RLC)、MAC和PHY层的功能。
图5为一实施例提供的又一种蜂窝网络控制面架构的示意图。以图2所示的蜂窝网络为例,其控制面的架构如图5所示。其中,基站可能具有RFID层,基站可以解析RFID或无源设备的相关的数据包,可识别RFID或无源设备的相关信息,可指示读写器或Relay执行确定、访问标签或终端的操作。在此基础上,读写器或Relay还具有服务数据适配协议(Service Data Adaptation Protocol,SDAP)层的功能。
读写器/Relay和基站之间可以建立多个连接,每个连接都对应或关联一个或多个标签或终端,每个连接可传输与关联的标签或终端相关的数据。读写器/Relay和基站之间也可以建立一个连接,该连接传输读写器/Relay支持或保持的所有标签或终端相关的数据。这些连接的配置可以是专有配置,基站对每个连接给出配置,也可以是公共配置,基站对这些连接给出一个公共的配置,或者这些连接都具有缺省配置。
核心网和基站之间可以建立多个连接,每个连接都对应或关联一个或多个标签或终端,每个连接可传输与关联的标签或终端相关的数据,或者,每个连接可传输读写器/Relay支持或保持的标签或终端相关的数据。核心网和基站之间也可以建立一个连接,该连接传输基站下支持或保持的所有标签或终端相关的数据。这些连接的配置可以是专有配置,核心网对这些连接给出配置,也可以是公共配置,核心网对这些连接给出一个公共的配置,或者这些连接都具有缺省配置。
图6为一实施例提供的一种通信方法的流程图。该通信方法可应用于第二节点(如基站)。如图6所示,本实施例提供的方法包括步骤110、步骤120以及骤130。
在步骤110中,根据第一节点的触发消息确定目标设备。
在步骤120中,向所述目标设备发送访问消息,所述访问消息用于指示所述目标设备执行相应操作。
在步骤130中,向所述第一节点发送所述目标设备的执行结果信息。
本实施例中,第一节点(如核心网)可以向第二节点发送触发消息,触发在网络中的设备中寻找目标设备的操作,从而利用第二节点确定目标设备并访问目标设备;第二节点通过发送访问消息指示目标设备执行相应操作,例如读取标签、擦除标签或修改标签等;目标设备可以据此执行相应操作并通过第二节点向第一节点反馈执行结果信息,从而实现蜂窝网络中对RFID标签的射频识别。
在一实施例中,触发消息包括至少一个设备的以下至少一种信息:设备的完整标识或部分标识;设备中保存的全部数据或部分数据;选中标志或盘存标志的更改指令;设备的选择消息;设备的能力信息;设备的辅助信息;操作类型;操作内容;密码;操作消息;连接请求;用于传输数据的资源信息;接连信息;承载信息。
在一实施例中,在根据第一节点的触发消息确定目标设备之后,还包括,步骤112:向第一节点发送目标设备的信息;其中,目标设备的信息包括以下至少一种信息:目标设备的完整标识或部分标识;目标设备中保存的全部数据或部分数据;目标设备对应的随机码;目标设备的接入结果指示;目标设备的能力信息;目标设备的辅助信息;目标设备的反馈消息;针对目标设备的连接请求;用于传输数据的资源信息。
在一实施例中,在向目标设备发送访问消息之前,还包括,步骤114:接收第一节点的访问指示消息,访问指示消息用于指示对目标设备执行的操作;其中,访问指示消息包括目标设备的以下至少一种信息:目标设备的完整标识或部分标识;目标设备对应的随机码;操作类型;操作内容;密码;操作消息;针对目标设备的连接请求;用于传输数据的资源信息;目标设备的能力信息;目标设备的辅助信息;目标设备的接连信息;目标设备的承载信息。
在一实施例中,执行结果信息包括以下至少一种信息:目标设备的完整标识或部分标识;目标设备中保存的全部数据或部分数据;目标设备对应的随机码;目标设备的接入结果指示;目标设备的辅助信息;目标设备的反馈消息;操作类型;执行结果;读取的内容;针对目标设备的连接请求;用于传输数据的资源信息;应用层的数据包。
在一实施例中,目标设备处于以下状态之一:空闲态,目标设备在处于空闲态的过程中不支持数据传输;接入态,目标设备在处于接入态的过程中支持接入操作,不支持访问操作;连接态,目标设备在处于连接态的过程中支持访问操作;灭活态,目标设备在处于灭活态的过程中不工作;静默态,目标设备在处于静默态的过程中进入省电模式。
在一实施例中,根据第一节点的触发消息确定目标设备,包括:步骤1110:根据触发消息向至少一个设备发送选择消息以及查询消息;步骤1120:接收至少一个设备中的至少一个设备反馈的防冲突信息;步骤1120:向反馈防冲突信息的设备发送确认消息;步骤1130:接收反馈防冲突信息的设备中的至少一个设备根据确认消息发送的上报信息,将发送上报信息的设备确定为目标设备。
在一实施例中,在向目标设备发送访问消息之前,还包括:步骤116:向目标设备发送请求消息,请求消息用于指示目标设备生成一个随机数;步骤118:接收目标设备返回的随机数。
在一实施例中,访问消息包括对以下至少一种操作的指示信息:读操作;写操作;灭活操作;锁操作;访问操作;块写操作;块擦除操作;访问消息还可以包括以下至少一种信息:用于传输数据的资源信息;目标设备的能力信息和承载信息。
在一实施例中,在向目标设备发送访问消息之前,还包括:步骤1140:根据第一节点的唤醒消息唤醒第三节点;步骤1150:接收第三节点的连接建立请求,并向第一节点发送连接建立请求;步骤1160:根据第一节点的连接指示消息,与第三节点建立连接。
在一实施例中,唤醒消息包括以下至少一种信息:第三节点的标识;第三节点的类型;唤醒原因;第三节点的能力信息;第三节点的辅助信息;应用层数据包。
在一实施例中,连接建立请求包括以下至少一种信息:第三节点的标识;第三节点的类型;唤醒原因;第三节点支持或者保存的设备的信息;用于传输数据的资源;应用层的数据包。
以下通过实施例对蜂窝网络的通信方法进行说明。需要说明的是,以下实施例中,第一节点以核心网为例,第二节点以基站为例,设备以标签或终端为例,第三节点以读写器或Relay为例进行说明。
实施例一
基于蜂窝网络的无源物联网可以很好的解决移动标签或终端的跟踪、定位及清点等功能。基于蜂窝网络的无源物联网的组网形式有三种。
1)基站具有读写器的功能,例如:给标签或终端发送激励信号或消息、接收标签或终端发送的消息、识别标签或终端等功能。
2)基站不具有读写器的功能,但是能控制读写器,例如,给读写器发送控制命令,接收读写器的消 息等。
3)基站只具有部分读写器的功能,例如:接收读写器的消息等。
本实施例中,为便于描述,可以将第二节点和第三节点视为一个整体(即读写器/基站),主要体现读写器/基站与标签/终端之间、读写器/基站和上层节点(例如:核心网)之间的信令交互,而读写器和基站之间的交互未在该实施例中体现。
图7为一实施例提供的一种设备与节点之间通信过程的示意图。如图7所示,通信过程主要包括以下内容。
1、核心网通过接口(例如:Xn或X2)给读写器或者基站发送触发消息,触发寻找设备,即选择一些符合条件的标签或终端。触发消息可以携带以下至少之一:
-标签/终端的完整标识或者标签/终端的标识的一部分,例如:个人计算机(Personal ComputerPersonal Computer,PC)标识、产品电子代码(Electronic Product Code,EPC)和/或循环冗余校验码(Cyclic Redundancy Check,CRC),例如CRC-16,也可以是PC、EPC和/或CRC-16的一部分;
-标签/终端存储器中保存的全部数据,或者数据的一部分,例如:类识别码,也称为标签识别码(Tag Identifier,TID),或者TID的一部分;
-更改指令,用于改变标签/终端的选中标志或者盘存标志;
-选择消息或其他消息,可以作为一个封装的信息,用于选择设备;
-标签/终端的能力信息,例如,标签/终端支持的功能、支持的传输方式、标签/终端的类型、标签/终端的版本、加密信息和/或标签的灭活状态信息等;
-标签/终端的辅助信息,例如,标签/终端上一次连接的位置信息或波束方向、上一次连接采用的传输方式、冲突的概率和/或静默信息等。
-触发消息中可能携带一个标签/终端的信息,也可能携带多个标签/终端的信息。
2、读写器/基站接收到触发消息后,根据核心网提供的信息,向标签/终端发送触发消息,以确定选中的标签/终端,识别标签。标签/终端接收到触发消息后,如果标签/终端符合读写器/基站发送的消息指示的条件,标签/终端识别基站/读写器就进行响应,反馈消息。在该过程中,基站/读写器和标签/终端完成对彼此的识别和确认。
3、读写器/基站接收到标签/终端的反馈后,确定出被选中的标签/终端(即目标设备),将目标设备的信息发送给节点,目标设备的信息可携带以下至少之一:
-目标设备的完整标识或者标识的一部分,例如:PC、EPC和/或CRC-16,也可以是PC、EPC和/或CRC-16的一部分;
-目标设备存储器中保存的全部数据,或者数据的一部分,例如:TID或者TID的一部分;
-目标设备生成的随机码,例如RN16;
-目标设备是否成功接入的指示(即接入结果指示);
-目标设备的能力信息;
-目标设备的辅助信息,例如是否发生冲突和/或冲突的概率;
-目标设备的反馈消息,可以作为一个封装的信息;
-连接请求,用于请求建立针对目标设备的基站/读写器和节点之间连接;
-基站/读写器用于接收来自核心网的数据或者向核心网发送数据的资源,例如互联网协议(Internet Protocol,IP)地址和/或通用分组无线服务隧道协议用户面(General Packet Radio Service Tunneling Protocol User Plane,GTPU)地址等(即用于传输数据的资源信息)。
以上信息可以是一个目标设备的信息,也可以是多个目标设备的信息。
4、核心网给读写器/基站发送访问指示消息,指示对目标设备执行哪些操作。访问指示消息可携带以下至少之一:
-目标设备的完整标识或者标识的一部分,例如:PC、EPC和/或CRC-16,也可以是PC、EPC和/或CRC-16的一部分;
-目标设备生成的随机码,例如RN16;
-操作类型:例如读、写、灭活、锁、块写和/或块擦等;
-操作内容:例如读的存储区域、存储区的起始字地址、读的数目、写的存储区域、存储区的起始字地址、写的内容、锁操作的类型、锁的存储区域、存储区的起始字地址、锁的内容、擦除的存储区域、存储区的起始字地址、擦除的数目和/或擦除的内容等;
-密码,例如接入密码等;
-操作消息,例如读消息、写消息、灭活消息、锁消息、块写消息和/或块擦消息等;
-是否接受针对目标设备的基站/读写器和节点之间的连接请求;
-核心网接收来自基站/读写器的数据或者发送数据给基站/读写器的资源(即用于传输数据的资源信 息),例如,IP地址和/或GTPU地址等;
-目标设备的能力信息,例如,目标设备支持的功能、支持的传输方式、目标设备的类型、目标设备的版本、加密信息和/或标签的灭活状态信息等;
-目标设备的辅助信息,例如,目标设备上一次连接的位置信息或波束方向、上一次连接采用的传输方式、冲突的概率和/或静默信息等;
-接连信息,例如基站/读写器需要建立的基站/读写器与节点之间接连的个数、标识、以及需要满足的业务需求,例如:Qos指数和/或传输速率等;
-承载信息,例如基站/读写器需要建立的与标签/终端之间的承载的个数、标识、以及需要满足的业务需求,例如:Qos指数、传输速率、传输格式和/或加密方式等;
-以上信息可以是一个目标设备的信息,也可以是多个目标设备的信息。
5、读写器/基站接收到后,根据核心网提供的信息,向标签/终端发送访问消息,告知目标设备要执行的操作。目标设备接收到后,按照访问消息执行响应操作,并向基站反馈执行结果信息。
6、读写器/基站可以向核心网发执行结果信息,指示访问消息中所指示的操作的执行结果。执行结果信息可携带以下至少之一:
-目标设备标识,例如:EPC;
-操作类型:读、写、灭活、锁、块写和/或块擦等;
-执行结果:操作是否成功等;
-如果是读操作,则包括读的内容;
-目标设备的辅助信息,例如,连接采用的传输方式和/或冲突概率等;
-以上信息可以是一个目标设备的信息,也可以是多个目标设备的信息。
实施例二
本实施例中,为便于描述,可以将第二节点和第三节点视为一个整体(即读写器/基站),主要体现读写器/基站与标签/终端之间、读写器/基站和上层节点(例如:核心网)之间的信令交互,而读写器和基站之间的交互未在该实施例中体现。
图8为一实施例提供的另一种设备与节点之间通信过程的示意图。如图8所示,通信过程主要包括以下内容。
1、核心网通过接口(例如:Xn或X2)给读写器或者基站发送触发消息,触发寻找设备,即选择一些符合条件的标签或终端。触发消息可以携带以下至少之一:
-标签/终端的完整标识或者标签/终端标识的一部分,例如:PC、EPC和/或CRC-16,也可以是PC、EPC和/或CRC-16的一部分;
-标签/终端存储器中保存的全部数据,或者数据的一部分,例如:TID或者TID的一部分;
-更改指令,用于改变标签/终端的选中标志或者盘存标志;
-选择消息或其他消息,可以作为一个封装的信息,用于选择设备;
-操作类型:例如读、写、灭活、锁、块写和/或块擦等;
-操作内容:例如读的存储区域、存储区的起始字地址、读的数目、写的存储区域、存储区的起始字地址、写的内容、锁操作的类型、锁的存储区域、存储区的起始字地址、锁的内容、擦除的存储区域、存储区的起始字地址、擦除的数目和/或擦除的内容等;
-密码,例如接入密码等;
-操作消息,例如读消息、写消息、灭活消息、锁消息、块写消息和/或块擦消息等;
-标签/终端的能力信息,例如,标签/终端支持的功能、支持的传输方式、标签/终端的类型、标签/终端的版本、加密信息和/或标签的灭活状态信息等;
-标签/终端的辅助信息,例如,标签/终端上一次连接的位置信息或波束方向、上一次连接采用的传输方式、冲突的概率和/或静默信息等;
-连接请求,用于请求建立针对目标设备的基站/读写器和节点之间连接;
-核心网接收来自基站/读写器的数据或者发送数据给基站/读写器的资源(即用于传输数据的资源信息),例如,IP地址和/或GTPU地址等;
-接连信息,例如基站/读写器需要建立的基站/读写器与节点之间接连的个数、标识、以及需要满足的业务需求,例如:Qos指数和/或传输速率等;
-承载信息,例如基站/读写器需要建立的与标签/终端之间的承载的个数、标识、以及需要满足的业务需求,例如:Qos指数、传输速率、传输格式和/或加密方式等;
-以上信息可以是一个标签/终端的信息,也可以是多个标签/终端的信息。
2、读写器/基站接收到触发消息后,根据核心网提供的信息,向标签/终端发送触发消息,以确定选中的标签/终端,识别标签。标签/终端接收到触发消息后,如果标签/终端符合读写器/基站发送的消息指示 的条件,标签/终端识别基站/读写器就进行响应,发送反馈消息。
3、读写器/基站还根据触发消息,向标签/终端发送访问消息,告知选中的标签/终端(即目标设备)要执行的操作。目标设备接收到后,按照访问消息执行响应操作,并反馈执行结果信息。
4、读写器/基站向核心网发送执行结果信息,指示访问消息中所指示的操作的执行结果。执行结果信息可携带以下至少之一:
-目标设备标识,例如:EPC;
-操作类型:读、写、灭活、锁、块写和/或块擦等;
-执行结果:操作是否成功等;
-如果是读操作,则包括读的内容;
-目标设备的辅助信息,例如,连接采用的传输方式和/或冲突概率等;
-以上信息可以是一个目标设备的信息,也可以是多个目标设备的信息。
实施例三
在实际应用中,标签/终端的数量是非常巨大的,读写器往往要识别几万甚至几十万个标签/终端。当基站唤醒标签/终端后,所有收到信号的标签/终端都可能作出响应,这些标签/终端的信号会碰撞在一起,基站可能无法识别出其中一些标签/终端的信号。但是,在基站对标签/终端进行访问之前,必须唯一识别出要访问的目标设备。本实施例中,在确定目标设备的过程中,基站和标签/终端之间要进行防冲突处理。
本实施例中,为便于描述,可以将第二节点和第三节点视为一个整体(即读写器/基站),主要体现读写器/基站与标签/终端之间的信令交互,而读写器和基站之间的交互未在该实施例中体现。
图9为一实施例提供的再一种设备与节点之间通信过程的示意图。如图9所示,通信过程主要包括以下内容。
1、读写器/基站向标签/终端发送选择消息(或者请求接入消息),以选择一些符合条件的标签/终端。选择消息可以是通过广播发送的,所有的标签/终端都能接收到。选择消息可以是一个由MAC生成的MAC数据包。选择消息(或者请求接入消息)可以携带以下至少之一:
-标签/终端的完整标识或者标签/终端标识的一部分;
-标签/终端存储器中保存的全部数据,或者数据的一部分;
-更改指令,用于改变标签/终端的选中标志或者盘存标志等;
-还可携带标签/终端接收或发送数据的资源信息(即用于传输数据的资源信息),例如,频点、资源大小、调制方式和/或传输速率等。
2、读写器/基站向标签/终端发送查询消息,指示反馈消息的时机,防止符合条件的标签/终端同时反馈。查询消息可以是通过广播发送的,所有的标签/终端都能接收到。查询消息可以是一个由MAC生成的MAC数据包。查询消息可以携带:时隙计数参数Q值等。
3、标签/终端接收到后,如果满足选择消息中的条件,可以认为是选中的标签/终端(即可能为目标设备)。选中的标签/终端根据查询消息向读写器/基站发送防冲突信息,例如,选中的标签/终端应在Q值决定的范围内,选出一个随机数。如果随机数为零值,选中的标签/终端立即应答,发送的防冲突信息可以是一个16位随机或伪随机数RN16。
4、基站接收到防冲突信息后,认为有标签/终端响应,进一步跟该选中的标签/终端进行确认,向选中的标签/终端发送确认消息。确认消息可以是通过专有消息发送,只有选中的标签/终端能接收到。确认消息可以是一个由MAC生成的MAC数据包。确认消息携带RN16,该RN16为读写器/基站在步骤3时接收到的。
5、在一定时间内,选中的标签/终端尝试接收读写器/基站的确认消息。如果选中的标签/终端接收到正确的RN16,完成与读写器/基站的相互确认,向基站发送上报信息,例如上报其标识信息,例如PC、EPC和/或CRC-16,该选中的标签/终端即为目标设备。标识信息可以是通过专有消息发送。标识信息可以是一个由MAC生成的MAC数据包。通过标识信息,标签/终端能够向读写器/基站申请一部分资源,在这些资源上发送数据。标识信息可携带用于传输数据的资源信息,例如频点、资源大小、调制方式和/或传输速率等。
如果在一定时间内,选中的标签/终端没接收到正确的RN16,则选中的标签/终端认为出现错误,回到空闲态。
实施例四
读写器/基站与选中的标签/终端完成确认后,选中的标签/终端即为目标设备,读写器/基站可以对目标设备进行访问操作,其中访问操作包括且不限于:读操作,写操作,灭活操作,锁操作等等。
本实施例中,为便于描述,可以将第二节点和第三节点视为一个整体(即读写器/基站),主要体现读写器/基站与标签/终端之间的信令交互,而读写器和基站之间的交互未在该实施例中体现。
图10为一实施例提供的又一种设备与节点之间通信过程的示意图。如图10所示,通信过程主要包括 以下内容。
1、基站向目标设备发送请求消息,要求一个新的随机数。目标设备可以是通过专有消息,只能特定标签/终端接收到。目标设备可以是一个由MAC生成的MAC数据包。目标设备可携带:RN16,该RN16为读写器/基站之前接收到的。请求消息还可携带目标设备接收或发送数据的资源信息,例如频点、资源大小、调制方式和/或传输速率等。请求消息还可携带目标设备与读写器/基站建立专有承载的配置(即承载信息),包括传输格式(包括传输资源、时刻、调制方式、传输速率、ARQ和/或HARQ等)、加密方式的配置等。
2、标签/终端接收到后,返回一个新的16位随机或伪随机数RN16(即反馈消息)。生成新的随机数可以降低标签/终端和读写器/基站受到其他设备的跟踪或攻击。
3、读写器/基站接收到后,向标签/终端发送访问消息。访问消息可以是通过专有消息,只能特定标签/终端接收到。访问消息可以是一个由MAC生成的MAC数据包。访问消息携带RN16和CRC-16,其中RN16为读写器/基站在步骤2中接收到的。
-如果是读操作,访问消息可携带:读的存储区域、存储区的起始字地址、读的数目等;
-如果是写操作,访问消息可携带:写的存储区域、存储区的起始字地址、写的内容等;
-如果是灭活操作,访问消息可携带:密码等;
-如果是锁操作,访问消息可携带:锁操作的类型、锁的存储区域、存储区的起始字地址、锁的内容等;
-如果是访问操作,访问消息可携带:密码等;
-如果是块写操作,访问消息可携带:写的存储区域、存储区的起始字地址、写的内容等;
-如果是块擦除操作,访问消息可携带:擦除的存储区域、存储区的起始字地址、擦除的数目、擦除的内容等。
此外,访问消息还可携带目标设备接收或发送数据的资源信息,例如频点、资源大小、调制方式和/或传输速率等。访问消息还可携带目标设备与基站建立的专有承载的配置,包括:传输格式(包括传输资源、时刻、调制方式、传输速率、ARQ和/或HARQ等)、加密方式等。
4、在一定时间内,目标设备尝试接收基站的进一步访问消息。如果目标设备接收到正确的RN16,且目标设备接收到消息、完成相应操作,可向读写器/基站发送执行结果信息,例如,发送反馈消息,反馈消息可包括其RN16、PC、EPC和/或CRC-16。反馈消息可以是通过专有消息。执行结果信息可以是一个由MAC生成的MAC数据包。
-如果是读操作,执行结果信息可携带:读的内容;
-如果是写操作,执行结果信息可携带:写操作的结果(成功还是失败);
-如果是灭活操作,执行结果信息可携带:灭活操作的结果(成功还是失败);
-如果是锁操作,执行结果信息可携带:锁操作的结果(成功还是失败);
-如果是访问操作,执行结果信息可携带:访问操作的结果(成功还是失败);
-如果是块写操作,执行结果信息可携带:块写操作的结果(成功还是失败);
-如果是块擦除操作,执行结果信息可携带:块擦除操作的结果(成功还是失败);
-在一定时间内,目标设备没接收到正确的RN16,目标设备认为出错,回到接入态。
实施例五
基站促使读写器/Relay对目标设备进行访问的过程,可理解为基站/Relay发起被呼的流程。
图11为一实施例提供的一种第二节点与第三节点之间通信过程的示意图。如图11所示,第二节点(如基站)与第三节点(如读写器/Relay)之间的通信过程主要包括:
-核心网发送唤醒消息给基站,唤醒读写器/Relay;
-基站发送唤醒消息,唤醒读写器/Relay;
-读写器/Relay、基站以及核心网之间的业务建立(包括连接建立、目标设备已确认、承载已配置和/或防冲突处理已完成等);
-核心网向读写器/Realy传输数据。
图12为一实施例提供的又一种设备与节点之间通信过程的示意图。如图12所示,通信过程主要包括以下内容。
1、核心网发送唤醒消息给基站,唤醒读写器/Relay。唤醒消息可以是基站和核心网之间的接口消息,也可以是应用层数据包;如是接口消息,该唤醒消息可以是寻呼消息。
唤醒消息可携带以下至少之一:
-第三节点的完整标识,用于唯一标识读写器/Relay,或标识的一部分;也能指示多个读写器/Relay;
-第三节点的设备类型,指示第三节点是RFID、无源设备或读写器等。
-唤醒原因,指示是访问操作等;
-第三节点的能力信息,例如,读写器/Relay支持的功能、支持的传输方式和/或读写器/Relay的版本等;
-第三节点的辅助信息,例如,读写器/Relay上一次连接的位置信息或波束方向等。
-应用层的数据包。
2、基站发送唤醒消息,唤醒读写器/Relay。该唤醒消息可以是RRC消息,也可以是应用层数据包。如是RRC消息,该唤醒消息可以是寻呼消息。
唤醒消息可携带以下至少之一:
-第三节点的完整标识,用于唯一标识读写器/Relay,或标识的一部分;也能指示多个读写器/Relay;
-第三节点的设备类型,指示第三节点是RFID、无源设备或读写器等;
-唤醒原因,指示是访问操作等;
-应用层的数据包。
3、读写器/Relay发起连接建立过程,发送连接建立请求给基站。连接建立请求可以是RRC消息,也可以是应用层数据包。如是RRC消息,该RRC消息可以是RRC建立请求、RRC继续请求或RRC重建请求等消息。
连接建立请求可携带以下至少之一:
-第三节点的完整标识,用于唯一标识读写器/Relay,或标识的一部分;也能指示多个读写器/Relay;
-第三节点的设备类型,指示第三节点是RFID、无源设备或读写器等;
-唤醒原因,指示是访问操作等;
-第三节点支持或者保存的标签/终端(通常有多个)的信息,例如标签/终端的数目、支持的防冲突算法、标识、版本和/或类型等;
-应用层的数据包。
4、基站接收到连接建立请求后,识别该读写器/Relay,给核心网发送连接建立请求(也称为初始连接)消息,建立该读写器/Relay在基站和核心网之间的连接。连接建立请求可以是基站和核心网之间的接口消息,也可以是应用层数据包。如是接口消息,连接建立请求可以是初始上行消息。
连接建立请求可携带以下至少之一:
-第三节点的标识,用于唯一标识读写器/Relay,或标识的一部分,能指示多个读写器/Relay;
-第三节点的设备类型,指示第三节点是RFID、无源设备或读写器等;
-唤醒原因,指示是访问操作等;
-第三节点支持或者保存的标签/终端(通常有多个)的信息,例如标签/终端的数目、支持的防冲突算法、标识、版本和/或类型等;
-用于请求建立针对读写器/Relay的基站和核心网之间连接的消息;
-基站接收来自核心网的数据或者发送数据给节点的资源,例如,IP地址,GTPU地址等;
-应用层的数据包。
5、核心网识别出该读写器/Relay后,建立针对读写器/Relay的连接,并指示读写器/Relay对标签/终端进行清点或访问等。核心网给基站发送连接指示消息。连接指示消息可以是基站和核心网之间的接口消息,也可以是应用层数据包。如是接口消息,可以是初始下行消息,或初始上下文建立消息等。
6、基站接收到连接指示消息后,建立与读写器/Relay之间的连接,并将连接指示消息(包括连接的配置)发送读写器/Relay。基站发送触发消息给读写器/Relay。触发消息可以是RRC消息,也可以是应用层数据包。如是RRC消息,该RRC消息可以是RRC建立,RRC继续,RRC重配等消息。
触发消息可携带以下至少之一:
-读写器/Relay的标识,能唯一标识读写器/Relay
-标签/终端标识或者标签/终端标识的一部分,例如:PC、EPC(产品电子代码)和CRC-16,或者PC、EPC和CRC-16的一部分;
-标签/终端存储器中保存的数据,或者数据的一部分,例如:TID(类识别码),或者TID的一部分;
-更改指令,用于改变标签/终端的选中标志或者盘存标志;
-选择消息或其他消息,可能作为一个封装的信息。
-操作的类型:读、写、灭活、锁、块写、块擦等;
-操作的内容:读的存储区域、存储区的起始字地址、读的数目、写的存储区域、存储区的起始字地址、写的内容、锁操作的类型、锁的存储区域、存储区的起始字地址、锁的内容、擦除的存储区域、存储区的起始字地址、擦除的数目、擦除的内容等;
-密码,如接入密码等;
-操作消息,例如:读消息、写消息、灭活消息、锁消息、块写消息、块擦消息等;
-标签/终端的能力信息,例如,标签/终端支持的功能,支持的传输方式,标签/终端的类型,标签/终 端的版本,加密信息,标签的灭活状态信息等;
-标签/终端的辅助信息,例如,标签/终端上一次连接的位置信息或波束方向,上一次连接采用的传输方式,冲突的概率,静默信息等。
-基站/读写器需要建立的与读写器/Relay之间的连接的个数,标识,以及连接配置,例如:传输速率,传输格式,加密方式等。
-应用层的数据包。
-以上可以是一个标签/终端的信息,也可以是多个标签/终端的信息。
7、读写器/Relay根据指示,执行确定和访问目标设备的流程。
8、读写器/Relay可将目标设备的执行结果信息反馈给基站。执行结果信息可以是RRC消息,也可以是应用层数据包。如是RRC消息,该RRC消息可以是RRC建立完成,RRC继续完成,RRC重配完成等消息。
-执行结果信息可携带以下至少之一:
-目标设备标识或者目标设备标识的一部分,例如:PC、EPC(产品电子代码)和CRC-16,或者PC、EPC和CRC-16的一部分;
-目标设备存储器中保存的数据,或者数据的一部分,例如:TID(类识别码),或者TID的一部分;
-目标设备的生成的随机码,例如RN16;
-目标设备的是否成功接入的指示;
-目标设备的辅助信息,例如是否发生冲突,冲突的概率;
-目标设备的反馈消息,可能作为一个封装的信息。
-操作的类型:读、写、灭活、锁、块写、块擦等;
-执行的结果:是否成功等。
-如果是读操作,读的内容;
-应用层的数据包;
-以上可以是一个目标设备的信息,也可以是多个目标设备的信息。
9、基站接收到后,将执行结果信息反馈给核心网。执行结果信息可以是基站和核心网之间的接口消息,也可以是应用层数据包。如是接口消息,执行结果信息可以是初始上行消息。
执行结果信息可携带以下至少之一:
-目标设备标识或者目标设备标识的一部分,例如:PC、EPC(产品电子代码)和CRC-16,或者PC、EPC和CRC-16的一部分;
-目标设备存储器中保存的数据,或者数据的一部分,例如:TID(类识别码),或者TID的一部分;
-目标设备的生成的随机码,例如RN16;
-目标设备的是否成功接入的指示;
-目标设备的辅助信息,例如是否发生冲突,冲突的概率;
-目标设备的反馈消息,可能作为一个封装的信息。
操作的类型:读、写、灭活、锁、块写、块擦等;
-执行的结果:是否成功等。
-如果是读操作,读的内容;
-目标设备的辅助信息,例如,连接采用的传输方式等;
-请求建立针对目标设备的基站/读写器和节点之间连接;
-基站/读写器接收来自节点的数据或者发送数据给节点的资源,例如,IP地址,GTPU地址等;
-应用层的数据包;
-以上可以是一个目标设备的信息,也可以是多个目标设备的信息。
10、核心网接收到执行结果信息后,如果操作结束了,可触发读写器/Relay进行释放操作,给基站发送释放消息。释放消息可以是基站和核心网之间的接口消息,也可以是应用层数据包。如是接口消息,释放消息可以是释放消息。
释放消息可携带以下至少之一:
-目标设备读写器/Relay的标识,能唯一标识读写器/Relay,或标识的一部分,能指示多个读写器/Relay。
-设备类型,指示是RFID或者无源设备或读写器等。
-原因,指示是操作结束等。
-应用层的数据包。
11、基站接收到后,可触发读写器/Relay进行释放操作,向目标设备发送释放消息。释放消息可以是RRC消息,也可以是应用层数据包。如是RRC消息,释放消息可以是RRC连接释放消息。
释放消息可携带以下至少之一:
-读写器/Relay的标识,能唯一标识读写器/Relay,或标识的一部分,能指示多个读写器/Relay。
-设备类型,指示是RFID或者无源设备或读写器等。
-原因,指示是操作结束等。
-应用层的数据包。
实施例六
处于蜂窝网络下的标签/终端,基站需要根据其所处的状态判断是否给其发送数据,而标签/终端根据其所处的状态选择执行哪种操作,例如:静默,还是接收数据等。那么,基站和标签/终端都需要保持标签/终端的状态。
根据标签/终端可能执行的操作,可能的状态包括以下内容。
1)空闲态:处于该状态的标签/终端,保持静默状态,不发送数据标签/终端。在该状态下,标签/终端的行为可以是以下至少之一:
-接收激励信号;
-感知能量,即能够从周围感知、获取能量;
-标签/终端接收消息,消息可以是选择消息或其他消息,这些消息中包含了与标签/终端的身份消息相关的信息,或者是标签/终端的存储器中的信息;消息也可以是接收盘存或者清点消息或其他消息,这些消息中包含了解决冲突处理的指示,或者反馈消息的时刻信息等。消息也可以是请求接入指示;
-不发送信号或数据;
-在该状态包含了标签/终端的Ready(准备)。
2)接入态:处于该状态的标签/终端,会进行接入的操作,不能进行访问操作标签/终端。在该状态下,标签/终端和基站完成了对对方身份的识别,确认对方是待操作的对象。在该状态下,标签/终端的行为可以是以下至少之一:
-接收激励或者唤醒信号;
-感知能量,能够从周围感知、获取能量;
-接收消息,消息可以是选择消息或其他消息,这些消息中包含了与标签/终端的身份消息相关的信息,或者是标签/终端的存储器中的信息;消息也可以是盘存或者清点消息或其他消息,这些消息中包含了解决冲突处理的指示,标签/终端的防冲突的随机信息,或者反馈消息的时刻信息,也可以是请求接入指示;
-发送信号、数据或者响应消息,这些响应消息可以是盘存或者清点或请求接入消息或其他消息的响应消息,也可包含了标签/终端的身份信息、或者防止冲突的随机信息等。这些消息中也可包含接入成功指示、接入失败指示等;
-冲突处理,当发生多个标签/终端在相同或部分相同的时间发送信号时,发生冲突,标签/终端根据基站的指示发送自己的消息;
-身份识别,根据基站/读写器/Relay的指示,标签/终端将自己的身份标识或密码或者生成的随机数上报给基站,基站能够识别出标签/终端,而且标签/终端也能知道基站已经识别出自己来;
-资源选择,根据基站/读写器/Relay的指示,标签/终端能选择在一部分资源上接收或发送数据,或者,标签/终端能够向基站申请一部分资源,在这些资源上发送数据;
-该状态包含了标签/终端的Arbitrate(裁断)、Reply(回令)和Acknowledged(应答)状态。
3)连接态:处于该状态的标签/终端,可进行访问操作。在该状态下,标签/终端的行为可以是以下至少之一:
-接收激励或者唤醒信号;
-感知能量,能够从周围感知、获取能量;
-接收访问消息,这些消息中包含了与标签/终端的身份标识相关的信息,或者标签/终端的密码信息,或者是标签/终端的防冲突的随机信息;消息也可以是访问操作的类型,以及访问的哪些存储位置等等。这些消息中反馈消息的时刻信息;
-发送信号,数据或者响应消息。可以是针对访问消息的响应消息。这些消息中也可包含了标签/终端的身份信息、标签/终端的防冲突的随机信息等。也可包含成功指示、失败指示等;
-在该状态包含了标签/终端的Open(公开),Secured(保护)状态;
-标签/终端与基站建立了一对一专有的承载,包括:传输格式(包括传输资源,时刻,调制方式,传输速率,ARQ,HARQ等)或加密方式的配置;
-基站和核心网建立了针对该标签/终端的连接。
4)灭活态:为了告警、废弃、避免接入冲突等,基站可以将标签/终端灭活,处于该状态的标签/终端,不能工作,在该状态下,标签/终端的行为可以是以下至少之一:
-接收激励或者唤醒信号;
-感知能量,能够从周围感知、获取能量;
-不能发送信号,不做响应;
-不接收信号,不对基站的信号进行操作;
-在该状态包含了标签/终端的Killed(灭活)状态。
5)静默态:在该状态下的标签/终端,处于静默状态,执行省电的操作。在该状态下,标签/终端的行为可以是以下至少之一:
-不接收激励或者唤醒信号;
-不感知能量,能够从周围感知、获取能量;
-不能发送信号,不做响应;
-不接收信号,不对基站的信号进行操作。
本申请实施例还提供一种通信方法,该通信方法可应用于第一节点(例如核心网)。图13为一实施例提供的另一种通信方法的流程图,如图13所示,本实施例提供的方法包括步骤210和步骤220。
在步骤210中,发送触发消息,所述触发消息用于指示第二节点确定目标设备。
在步骤220中,接收目标设备的执行结果信息。
本实施例的方法,第一节点(如核心网)可以向第二节点发送触发消息,触发在网络中的设备中寻找目标设备的操作,从而利用第二节点确定目标设备并访问目标设备;第二节点通过发送访问消息指示目标设备执行相应操作,例如读取标签、擦除标签或修改标签等;目标设备可以据此执行相应操作并通过第二节点向第一节点反馈执行结果信息,从而实现蜂窝网络中对RFID标签的射频识别。
在一实施例中,在发送触发消息之后还包括:步骤212:接收目标设备的信息;其中,目标设备的信息包括以下至少一种信息:目标设备的完整标识或部分标识;目标设备中保存的全部数据或部分数据;目标设备对应的随机码;目标设备的接入结果指示;目标设备的能力信息;目标设备的辅助信息;目标设备的反馈消息;针对目标设备的连接请求;用于传输数据的资源信息。
在一实施例中,在发送触发消息之后,还包括:步骤214:发送访问指示消息,访问指示消息用于指示对目标设备执行的操作;其中,访问指示消息包括目标设备的以下至少一种信息:目标设备的完整标识或部分标识;目标设备对应的随机码;操作类型;操作内容;密码;操作消息;针对目标设备的连接请求;用于传输数据的资源信息;目标设备的能力信息;目标设备的辅助信息;目标设备的接连信息;目标设备的承载信息。
在一实施例中,在接收目标设备的执行结果信息之前,还包括:步骤230:发送唤醒消息,唤醒消息用于指示第二节点唤醒第三节点;步骤240:接收第二节点发送的连接建立请求;步骤250:向第二节点发送连接指示消息,连接指示消息用于指示第二节点与第三节点建立连接。
本申请实施例还提供一种通信方法,该方法可应用于设备(标签/终端)。图14为一实施例提供的又一种通信方法的流程图,如图14所示,本实施例提供的方法包括步骤310和步骤320。
在步骤310中,接收第二节点的访问消息,并根据所述访问消息执行相应操作。
在步骤320中,向所述第二节点发送执行结果信息。
本实施例中,第一节点(如核心网)可以向第二节点发送触发消息,触发在网络中的设备中寻找目标设备的操作,从而利用第二节点确定目标设备并访问目标设备;第二节点通过发送访问消息指示目标设备执行相应操作,例如读取标签、擦除标签或修改标签等;目标设备可以据此执行相应操作并通过第二节点向第一节点反馈执行结果信息,从而实现蜂窝网络中对RFID标签的射频识别。
在一实施例中,目标设备处于以下状态之一:
-空闲态,目标设备在处于空闲态的过程中不支持数据传输;
-接入态,目标设备在处于接入态的过程中支持接入操作,不支持访问操作;
-连接态,目标设备在处于连接态的过程中支持访问操作;
-灭活态,目标设备在处于灭活态的过程中不工作;
-静默态,目标设备在处于静默态的过程中进入省电模式。
在一实施例中,在满足第一条件的情况下,目标设备由空闲态转换至静默态;
其中,第一条件包括以下至少之一:
-处于空闲态的时间达到第一设定时间;
-处于空闲态的过程中接收配置的次数达到第一次数;
-收到转换至静默态的指示。
在一实施例中,在满足第二条件的情况下,目标设备由静默态转换至空闲态;
-其中,第二条件包括以下至少之一:
-处于静默态的时间达到第二设定时间;
-处于静默态的过程中接收配置的次数达到第二次数;
-检测到设定信号或设定消息;
-未检测到设定信号或设定消息;检测到信号能量低于能量阈值;
检测到参考信号接收功率(Reference Signal Receiving Power,RSRP)低于功率阈值。
在一实施例中,在满足第三条件的情况下,目标设备由空闲态转换至接入态;
-其中,第三条件包括以下至少之一:
-接收到激励信号或者唤醒信号;
-接收到选择消息,且符合选择消息中的条件;
-接收到查询消息,且符合查询消息中的条件;
-接收到请求接入消息,且符合请求接入消息中的条件;
-满足进入裁断、回令或应答状态的条件。
在一实施例中,在满足第四条件的情况下,目标设备由接入态转换至空闲态;
-其中,第四条件包括以下至少之一:
-出现错误;
-在设定时间段内未接收到激励信号或者唤醒信号;
-接入失败。
在一实施例中,在满足第五条件的情况下,目标设备由接入态转换至连接态;其中,第五条件包括以下至少之一:
-第二节点已确定目标设备;
-标识信息已上报;
-防冲突信息已上报;
-满足进入公开或保护状态的条件;
-接收到访问消息;
-专有承载或者传输格式的配置已完成;
-对应连接已建立。
在一实施例中,在满足第六条件的情况下,目标设备由连接态转换至空闲态;
-其中,第六条件包括以下至少之一:
-出现错误;
-在设定时间段内未接收到激励信号或者唤醒信号;
-在设定时间段内无法感知能量。
在一实施例中,在满足第七条件的情况下,目标设备由连接态转换至灭活态;
-其中,第七条件包括:接收到灭活指示消息,且满足灭活指示消息中的条件。
-在一实施例中,目标设备按照以下至少一种方式进行状态转换:
-每经过第一时间门限进入静默态,在处于静默态的情况下,经过第二时间门限,进入空闲态;
-每收到一次进入静默态的指示信息,计数次数加1,计数次数大于或等于次数门限,则进入静默态,并在处于静默态的情况下,经过第三时间门限,进入空闲态;
-生成一个计数值,每收到一次进入静默态的指示信息,计数值减1,计数次数等于0,则进入静默态,并在处于静默态的情况下,经过第四时间门限,进入空闲态;
-收到进入静默态的指示信息,则进入静默态,并在处于静默态的情况下,经过第五时间门限,进入空闲态;
-在第六时间门限内,检测到信号能量或信号接收功率低于设定门限值,则进入静默态,并在处于静默态的情况下,经过第七时间门限,进入空闲态。
在一实施例中,该方法还包括:
-步骤301:接收第二节点的选择消息以及查询消息;
-步骤303:向第二节点发送防冲突信息;
-步骤305:接收第二节点的确认消息;
-步骤307:向第二节点发送上报信息。
在一实施例中,该方法还包括:
-步骤311:接收第二设备的请求消息;
-步骤312:根据请求消息生成一个随机数。
以下通过实施例对设备的状态转换进行说明。需要说明的是,以下实施例中,设备以标签或终端为例。
实施例六
图15为一实施例提供的一种设备状态转换的示意图。如图15所示,设备状态转换主要包括以下几种情况。
1)当空闲态的标签或终端满足第一条件,转到静默态。第一条件可能为以下至少之一:
-满足一定时间的要求(即处于空闲态的时间达到第一设定时间),例如,根据基站/读写器/Relay配置的时间间隔,经过该时间,标签或终端进入静默态;
-满足一定次数的要求(处于空闲态的过程中接收配置的次数达到第一次数),例如,根据基站/读写器/Relay配置的次数,标签或终端每收到一次激励信号或者特定消息或者其他信号,标签或终端就加一或者减一;如果加一或者减一的结果满足配置的次数或者为零,标签或终端进入静默态;
-收到基站或读写器的转换至静默态的指示,例如,基站/读写器/Relay器给标签或终端发送指示消息,该指示消息可携带静默态的相关指示,例如,是否进入静默态,以及标签或终端的标识。标签或终端收到后,就进入静默态。
2)当静默态的标签或终端满足第二条件,转到空闲态。第二条件可能为以下至少之一:
-满足一定时间的要求(即处于静默态的时间达到第二设定时间),例如,根据基站/读写器/Relay配置的时间间隔,经过该时间,标签或终端进入空闲态;
-满足一定次数的要求(即静默态的过程中接收配置的次数达到第二次数),例如,根据基站/读写器/Relay配置的次数,标签或终端每收到一次激励信号或者特定消息或者其他信号,标签或终端就加一或者减一;如果加一或者减一的结果满足配置的次数或者为零,标签或终端进入空闲态;
-检测到设定信号或设定消息,则进入静默态;
-检测不到设定信号或设定消息,则进入静默态;
-检测到的信号能量低于阈值;
-检测到的RSRP值低于阈值。
3)当空闲态的标签或终端满足第三条件,转到接入态。第三条件可能为以下至少之一:
-标签或终端接收到激励信号或者唤醒信号;
-标签或终端接收到选择消息,且符合选择消息中的条件,例如:关于身份标识的条件;
-标签或终端接收到查询消息,且满足查询消息中的条件,例如,满足解决冲突处理的指示;
-标签或终端接收到请求接入消息,且符合请求接入消息中的条件,例如:关于身份标识的条件;标签或终端满足进入了Arbitrate(裁断),Reply(回令),Acknowledged(应答)状态。
4)当接入态的标签或终端满足第四条件,转到空闲态。第四条件可能为以下至少之一:
-标签或终端出现错误;
-标签或终端在设定时间段内未接收到激励信号或者唤醒信号;
-标签或终端接入失败。
5)当接入态的标签或终端满足第五条件,转到连接态。第五条件可能为以下至少之一:
-第二节点已确定目标设备,即标签或终端完成确定标签或终端的过程,基站能唯一识别出标签或终端;
-标识信息已上报,即标签或终端上报了其身份标识的信息,例如PC、EPC和CRC-16;
-防冲突信息已上报,即标签或终端上报了防止冲突的随机信息,例如:随机数;
-满足进入公开或保护状态的条件,标签或终端满足进入了Open(公开)、Secured(保护)状态的条件;
-标签或终端接收到访问消息;
-专有承载或者传输格式的配置已完成,即标签或终端完成了专有的承载,或者传输格式的配置;
-对应连接已建立,即基站/读写器和核心网建立了针对该标签或终端的连接。6)当连接态的标签或终端满足第六条件,转到空闲态。第六条件可能为以下至少之一:
-标签或终端出现错误;
-标签或终端在设定时间段内未接收到激励信号或者唤醒信号;
-标签或终端在设定时间段内不能感知能量,即不能够从周围感知、获取能量。
7)当连接态的标签或终端满足第七条件,转到灭活态。第七条件可能为:
-接收到灭活消息,且满足灭活消息中携带的条件,例如:灭活密码一致等。
实施例七
标签/终端的能量是很受限的,所以有省电需求。在省电状态下,标签/终端处于静默态,不接收信号;在非省电状态下,标签/终端需要正常工作。
本实施例中,基站/读写器配置第一时间门限和第二时间门限。根据基站/读写器的配置,标签/终端每经过第一时间门限,进入静默态;在静默态经过第二时间门限,从静默态进入空闲态。
基站/读写器配置第三时间门限和次数门限。基站/读写器给标签/终端发送消息或信号,该消息或信号可携带静默态的相关指示,例如,是否进入静默态。标签/终端每收到一次该消息或信号,计数次数就加一;如果加一结果等于或大于次数门限,则标签/终端进入静默态。在静默态经过第三时间门限,则从静默态进入空闲态。
基站/读写器配置第四时间门限和一个计数门限,标签/终端根据配置,生成一个等于或与计数门限相关的计数值。基站/读写器给标签/终端发送消息或信号,该消息或信号可携带静默态的相关指示,例如,是否进入静默态。标签/终端每收到一次该消息或信号,计数值就减一。如果减一结果等于0,则标签/终端进入静默态。在静默态经过第四时间门限,标签/终端从静默态进入空闲态。
基站/读写器配置第五时间门限。基站/读写器给标签/终端发送消息或信号,该消息或信号可携带静默态的相关指示,例如,是否进入静默态,以及标签/终端的标识等。标签/终端收到后,就进入静默态;在静默态经过第五时间门限,标签/终端从静默态进入空闲态。
基站/读写器配置第六时间门限、第七时间门限和设定门限值。标签/终端在第六时间门限内,检测不到信号或消息,或者检测到的信号能量或RSRP低于设定门限值,就进入静默态;在静默态经过第七时间门限,标签/终端从静默态进入空闲态。
需要说明的是,本实施例中的各时间门限可以相等,也可以不等;从静默态进入空闲态的时间门限,可以与上述实施例中第二条件中的第二设定时间相等。
本申请实施例还提供一种通信装置。图16为一实施例提供的一种通信装置的结构示意图。如图16所示,所述通信装置包括:确定模块410,设置为根据第一节点的触发消息确定目标设备。访问模块420,设置为向所述目标设备发送访问消息,所述访问消息用于指示所述目标设备执行相应操作。信息发送模块430,设置为向所述第一节点发送所述目标设备的执行结果信息。
本实施例的通信装置,通过根据触发消息确定目标设备并访问目标设备,然后接收目标设备反馈的执行结果信息,从而实现蜂窝网络中对RFID标签的射频识别。
在一实施例中,触发消息包括至少一个设备的以下至少一种信息:设备的完整标识或部分标识;设备中保存的全部数据或部分数据;选中标志或盘存标志的更改指令;设备的选择消息;设备的能力信息;设备的辅助信息;操作类型;操作内容;密码;操作消息;连接请求;用于传输数据的资源信息;接连信息;承载信息。
在一实施例中,该装置还包括:第一发送模块,设置为在根据第一节点的触发消息确定目标设备之后,向第一节点发送目标设备的信息;其中,目标设备的信息包括以下至少一种信息:目标设备的完整标识或部分标识;目标设备中保存的全部数据或部分数据;目标设备对应的随机码;目标设备的接入结果指示;目标设备的能力信息;目标设备的辅助信息;目标设备的反馈消息;针对目标设备的连接请求;用于传输数据的资源信息。
在一实施例中,该装置还包括:第一接收模块,设置为在向目标设备发送访问消息之前,接收第一节点的访问指示消息,访问指示消息用于指示对目标设备执行的操作;其中,访问指示消息包括目标设备的以下至少一种信息:目标设备的完整标识或部分标识;目标设备对应的随机码;操作类型;操作内容;密码;操作消息;针对目标设备的连接请求;用于传输数据的资源信息;目标设备的能力信息;目标设备的辅助信息;目标设备的接连信息;目标设备的承载信息。
在一实施例中,执行结果信息包括以下至少一种信息:目标设备的完整标识或部分标识;目标设备中保存的全部数据或部分数据;目标设备对应的随机码;目标设备的接入结果指示;目标设备的辅助信息;目标设备的反馈消息;操作类型;执行结果;读取的内容;针对目标设备的连接请求;用于传输数据的资源信息;应用层的数据包。
在一实施例中,目标设备处于以下状态之一:
-空闲态,目标设备在处于空闲态的过程中不支持数据传输;
-接入态,目标设备在处于接入态的过程中支持接入操作,不支持访问操作;
-连接态,目标设备在处于连接态的过程中支持访问操作;
-灭活态,目标设备在处于灭活态的过程中不工作;
-静默态,目标设备在处于静默态的过程中进入省电模式。
在一实施例中,确定模块410,包括:
-查询单元,设置为根据触发消息向至少一个设备发送选择消息以及查询消息;
-防冲突单元,设置为接收至少一个设备中的至少一个设备反馈的防冲突信息;
-确认单元,设置为向反馈防冲突信息的设备发送确认消息;
-确定第一,设置为接收反馈防冲突信息的设备中的至少一个设备根据确认消息发送的上报信息,将发送上报信息的设备确定为目标设备。
在一实施例中,该装置还包括:
-随机数请求模块,设置为在向目标设备发送访问消息之前,向目标设备发送请求消息,请求消息用于指示目标设备生成一个随机数;
-随机数接收模块,设置为接收目标设备返回的随机数。
在一实施例中,访问消息包括对以下至少一种操作的指示信息:读操作;写操作;灭活操作;锁操作;访问操作;块写操作;块擦除操作。
访问消息还可以包括以下至少一种信息:用于传输数据的资源信息;目标设备的能力信息和承载信息。
在一实施例中,该装置还包括:
-唤醒模块,设置为在向目标设备发送访问消息之前,根据第一节点的唤醒消息唤醒第三节点;
-请求转发模块,设置为接收第三节点的连接建立请求,并向第一节点发送连接建立请求;
-建立模块,设置为根据第一节点的连接指示消息,与第三节点建立连接。
在一实施例中,唤醒消息包括以下至少一种信息:第三节点的标识;第三节点的类型;唤醒原因;第三节点的能力信息;第三节点的辅助信息;应用层数据包。
在一实施例中,连接建立请求包括以下至少一种信息:第三节点的标识;第三节点的类型;唤醒原因;第三节点支持或者保存的设备的信息;用于传输数据的资源;应用层的数据包。
本实施例提出的通信装置与上述实施例提出的通信方法属于同一发明构思,未在本实施例中详尽描述的技术细节可参见上述任意实施例,并且本实施例具备与执行通信方法相同的有益效果。
本申请实施例还提供一种通信装置。图17为一实施例提供的另一种通信装置的结构示意图。如图17所示,所述通信装置包括:触发模块510,设置为发送触发消息,触发消息用于指示第二节点确定目标设备。结果接收模块520,设置为接收目标设备的执行结果信息。
本实施例的通信装置,通过发送触发消息,触发在网络中的设备中寻找目标设备的操作,从而利用第二节点确定目标设备并访问目标设备;然后接收目标设备反馈的执行结果信息,从而实现蜂窝网络中对RFID标签的射频识别。
在一实施例中,该装置还包括:第二接收模块,设置为接收目标设备的信息;其中,目标设备的信息包括以下至少一种信息:目标设备的完整标识或部分标识;目标设备中保存的全部数据或部分数据;目标设备对应的随机码;目标设备的接入结果指示;目标设备的能力信息;目标设备的辅助信息;目标设备的反馈消息;针对目标设备的连接请求;用于传输数据的资源信息。
在一实施例中,该装置还包括:第二发送模块,设置为发送访问指示消息,访问指示消息用于指示对目标设备执行的操作;其中,访问指示消息包括目标设备的以下至少一种信息:目标设备的完整标识或部分标识;目标设备对应的随机码;操作类型;操作内容;密码;操作消息;针对目标设备的连接请求;用于传输数据的资源信息;目标设备的能力信息;目标设备的辅助信息;目标设备的接连信息;目标设备的承载信息。
在一实施例中,该装置还包括:
-唤醒指示模块,设置为发送唤醒消息,唤醒消息用于指示第二节点唤醒第三节点;
-请求接收模块,设置为接收第二节点发送的连接建立请求;
-连接指示模块,设置为向第二节点发送连接指示消息,连接指示消息用于指示第二节点与第三节点建立连接。
本实施例提出的通信装置与上述实施例提出的通信方法属于同一发明构思,未在本实施例中详尽描述的技术细节可参见上述任意实施例,并且本实施例具备与执行通信方法相同的有益效果。
本申请实施例还提供一种通信装置。图18为一实施例提供的再一种通信装置的结构示意图。如图18所示,所述通信装置包括:消息接收模块610,设置为接收第二节点的访问消息,并根据访问消息执行相应操作。结果发送模块620,设置为向第二节点发送执行结果信息。
本实施例的通信装置,根据接收到的访问消息执行相应操作,并向第二节点发送执行结果信息,实现蜂窝网络中对RFID标签的射频识别。
在一实施例中,目标设备处于以下状态之一:
-空闲态,目标设备在处于空闲态的过程中不支持数据传输;
-接入态,目标设备在处于接入态的过程中支持接入操作,不支持访问操作;
-连接态,目标设备在处于连接态的过程中支持访问操作;
-灭活态,目标设备在处于灭活态的过程中不工作;
-静默态,目标设备在处于静默态的过程中进入省电模式。
在一实施例中,在满足第一条件的情况下,目标设备由空闲态转换至静默态;
其中,第一条件包括以下至少之一:
-处于空闲态的时间达到第一设定时间;
-处于空闲态的过程中接收配置的次数达到第一次数;
-收到转换至静默态的指示。
在一实施例中,在满足第二条件的情况下,目标设备由静默态转换至空闲态;
-其中,第二条件包括以下至少之一:
-处于静默态的时间达到第二设定时间;
-处于静默态的过程中接收配置的次数达到第二次数;
-检测到设定信号或设定消息;
-未检测到设定信号或设定消息;检测到信号能量低于能量阈值;
-检测到参考信号接收功率RSRP低于功率阈值。
在一实施例中,在满足第三条件的情况下,目标设备由空闲态转换至接入态;
-其中,第三条件包括以下至少之一:
-接收到激励信号或者唤醒信号;
-接收到选择消息,且符合选择消息中的条件;
-接收到查询消息,且符合查询消息中的条件;
-接收到请求接入消息,且符合请求接入消息中的条件;
-满足进入裁断、回令或应答状态的条件。
在一实施例中,在满足第四条件的情况下,目标设备由接入态转换至空闲态;
-其中,第四条件包括以下至少之一:
-出现错误;
-在设定时间段内未接收到激励信号或者唤醒信号;
-接入失败。
在一实施例中,在满足第五条件的情况下,目标设备由接入态转换至连接态;
-其中,第五条件包括以下至少之一:
-第二节点已确定目标设备;
-标识信息已上报;
-防冲突信息已上报;
-满足进入公开或保护状态的条件;
-接收到访问消息;
-专有承载或者传输格式的配置已完成;
-对应连接已建立。
在一实施例中,在满足第六条件的情况下,目标设备由连接态转换至空闲态;
其中,第六条件包括以下至少之一:出现错误;在设定时间段内未接收到激励信号或者唤醒信号;在设定时间段内无法感知能量。
在一实施例中,在满足第七条件的情况下,目标设备由连接态转换至灭活态;其中,第七条件包括:接收到灭活指示消息,且满足灭活指示消息中的条件。
在一实施例中,目标设备按照以下至少一种方式进行状态转换:
-每经过第一时间门限进入静默态,在处于静默态的情况下,经过第二时间门限,进入空闲态;
-每收到一次进入静默态的指示信息,计数次数加1,计数次数大于或等于次数门限,则进入静默态,并在处于静默态的情况下,经过第三时间门限,进入空闲态;
-生成一个计数值,每收到一次进入静默态的指示信息,计数值减1,计数次数等于0,则进入静默态,并在处于静默态的情况下,经过第四时间门限,进入空闲态;
-收到进入静默态的指示信息,则进入静默态,并在处于静默态的情况下,经过第五时间门限,进入空闲态;
-在第六时间门限内,检测到信号能量或信号接收功率低于设定门限值,则进入静默态,并在处于静默态的情况下,经过第七时间门限,进入空闲态。
本实施例提出的通信装置与上述实施例提出的通信方法属于同一发明构思,未在本实施例中详尽描述的技术细节可参见上述任意实施例,并且本实施例具备与执行通信方法相同的有益效果。
本申请实施例还提供了一种节点,该节点为第一节点或第二节点。图19为一实施例提供的一种节点的硬件结构示意图,如图19所示,本申请提供的节点,包括存储器720、处理器710以及存储在存储器 上并可在处理器上运行的计算机程序,处理器710执行所述计算机程序时实现上述应用于第一节点或第二节点的通信方法。
节点还可以包括存储器720;该节点中的处理器710可以是一个或多个,图19中以一个处理器710为例;存储器720用于存储一个或多个程序;所述一个或多个程序被所述一个或多个处理器710执行,使得所述一个或多个处理器710实现如本申请实施例中所述的应用于第一节点或第二节点的通信方法。
节点还包括:通信装置730、输入装置740和输出装置750。
节点中的处理器710、存储器720、通信装置730、输入装置740和输出装置750可以通过总线或其他方式连接,图19中以通过总线连接为例。
输入装置740可用于接收输入的数字或字符信息,以及产生与节点的用户设置以及功能控制有关的按键信号输入。输出装置750可包括显示屏等显示设备。
通信装置730可以包括接收器和发送器。通信装置730设置为根据处理器710的控制进行信息收发通信。
存储器720作为一种计算机可读存储介质,可设置为存储软件程序、计算机可执行程序以及模块,如本申请实施例所述通信方法对应的程序指令/模块(例如,通信装置中的确定模块310、访问模块320和信息发送模块330)。存储器720可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据节点的使用所创建的数据等。此外,存储器720可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储器720可进一步包括相对于处理器710远程设置的存储器,这些远程存储器可以通过网络连接至节点。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
本申请实施例还提供了一种设备。图20为一实施例提供的一种设备的硬件结构示意图,如图20所示,本申请提供的设备,包括存储器820、处理器810以及存储在存储器上并可在处理器上运行的计算机程序,处理器810执行所述计算机程序时实现上述应用于设备的通信方法。
设备还可以包括存储器820;该设备中的处理器810可以是一个或多个,图20中以一个处理器810为例;存储器820用于存储一个或多个程序;所述一个或多个程序被所述一个或多个处理器810执行,使得所述一个或多个处理器810实现如本申请实施例中所述的应用于设备的通信方法。
设备还包括:通信装置830、输入装置840和输出装置850。
设备中的处理器810、存储器820、通信装置830、输入装置840和输出装置850可以通过总线或其他方式连接,图20中以通过总线连接为例。
输入装置840可用于接收输入的数字或字符信息,以及产生与设备的用户设置以及功能控制有关的按键信号输入。输出装置850可包括显示屏等显示设备。
通信装置830可以包括接收器和发送器。通信装置830设置为根据处理器810的控制进行信息收发通信。
存储器820作为一种计算机可读存储介质,可设置为存储软件程序、计算机可执行程序以及模块,如本申请实施例所述通信方法对应的程序指令/模块(例如,通信装置中的消息接收模块410和结果发送模块420)。存储器820可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据设备的使用所创建的数据等。此外,存储器820可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储器820可进一步包括相对于处理器810远程设置的存储器,这些远程存储器可以通过网络连接至设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
本申请实施例还提供一种存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现本申请实施例中任一所述的通信方法。该方法,包括:根据第一节点的触发消息确定目标设备;向所述目标设备发送访问消息,所述访问消息用于指示所述目标设备执行相应操作;向所述第一节点发送所述目标设备的执行结果信息。
或者,该方法包括:发送触发消息,所述触发消息用于指示第二节点确定目标设备;接收目标设备的执行结果信息。
或者,该方法包括:接收第二节点的访问消息,并根据所述访问消息执行相应操作;向所述第二节点发送执行结果信息。
本申请实施例的计算机存储介质,可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是,但不限于: 电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(Random Access Memory,RAM)、只读存储器(Read Only Memory,ROM)、可擦式可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、闪存、光纤、便携式CD-ROM、光存储器件、磁存储器件、或者上述的任意合适的组合。计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于:电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、电线、光缆、无线电频率(Radio Frequency,RF)等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言或其组合来编写用于执行本申请操作的计算机程序代码,所述计算机程序设计语言包括面向对象的程序设计语言,诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言,诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。
以上所述,仅为本申请的一些实施例而已,并非用于限定本申请的保护范围。
本领域内的技术人员应明白,术语用户终端涵盖任何适合类型的无线用户设备,例如移动电话、便携数据处理装置、便携网络浏览器或车载移动台。
一般来说,本申请的多种实施例可以在硬件或专用电路、软件、逻辑或其任何组合中实现。例如,一些方面可以被实现在硬件中,而其它方面可以被实现在可以被控制器、微处理器或其它计算装置执行的固件或软件中,尽管本申请不限于此。
本申请的实施例可以通过移动装置的数据处理器执行计算机程序指令来实现,例如在处理器实体中,或者通过硬件,或者通过软件和硬件的组合。计算机程序指令可以是汇编指令、指令集架构(Instruction Set Architecture,ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码。
本申请附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于只读存储器(Read-Only Memory,ROM)、随机访问存储器(Random Access Memory,RAM)、光存储器装置和系统(数码多功能光碟(Digital Video Disc,DVD)或光盘(Compact Disk,CD)等。计算机可读介质可以包括非瞬时性存储介质。数据处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑器件(Field-Programmable Gate Array,FGPA)以及基于多核处理器架构的处理器。
通过说明性和非限制性的示例,上文已提供了对本申请的一些实施例的详细描述。但结合附图和权利要求来考虑,对以上实施例的多种修改和调整对本领域技术人员来说是显而易见的,但不偏离本申请的范围。因此,本申请的恰当范围将根据权利要求确定。

Claims (29)

  1. 一种通信方法,包括:
    根据第一节点的触发消息确定目标设备;
    向所述目标设备发送访问消息,所述访问消息用于指示所述目标设备执行相应操作;
    向所述第一节点发送所述目标设备的执行结果信息。
  2. 根据权利要求1所述的方法,其中,所述触发消息包括至少一个设备的以下至少一种信息:
    设备的完整标识或部分标识;设备中保存的全部数据或部分数据;选中标志或盘存标志的更改指令;设备的选择消息;设备的能力信息;设备的辅助信息;操作类型;操作内容;密码;操作消息;连接请求;用于传输数据的资源信息;接连信息;承载信息。
  3. 根据权利要求1所述的方法,其中,在根据第一节点的触发消息确定目标设备之后,还包括:
    向所述第一节点发送目标设备的信息;
    其中,所述目标设备的信息包括以下至少一种信息:
    所述目标设备的完整标识或部分标识;所述目标设备中保存的全部数据或部分数据;所述目标设备对应的随机码;所述目标设备的接入结果指示;所述目标设备的能力信息;所述目标设备的辅助信息;所述目标设备的反馈消息;针对所述目标设备的连接请求;用于传输数据的资源信息。
  4. 根据权利要求1所述的方法,其中,在向所述目标设备发送访问消息之前,还包括:
    接收所述第一节点的访问指示消息,所述访问指示消息用于指示对所述目标设备执行的操作;
    其中,所述访问指示消息包括所述目标设备的以下至少一种信息:
    所述目标设备的完整标识或部分标识;所述目标设备对应的随机码;操作类型;操作内容;密码;操作消息;针对所述目标设备的连接请求;用于传输数据的资源信息;所述目标设备的能力信息;所述目标设备的辅助信息;所述目标设备的接连信息;所述目标设备的承载信息。
  5. 根据权利要求1所述的方法,其中,所述执行结果信息包括以下至少一种信息:
    所述目标设备的完整标识或部分标识;所述目标设备中保存的全部数据或部分数据;所述目标设备对应的随机码;所述目标设备的接入结果指示;所述目标设备的辅助信息;所述目标设备的反馈消息;操作类型;执行结果;读取的内容;针对所述目标设备的连接请求;用于传输数据的资源信息;应用层的数据包。
  6. 根据权利要求1所述的方法,其中,所述目标设备处于以下状态之一:
    空闲态,所述目标设备在处于所述空闲态的过程中不支持数据传输;
    接入态,所述目标设备在处于所述接入态的过程中支持接入操作,不支持访问操作;
    连接态,所述目标设备在处于所述连接态的过程中支持访问操作;
    灭活态,所述目标设备在处于所述灭活态的过程中不工作;
    静默态,所述目标设备在处于所述静默态的过程中进入省电模式。
  7. 根据权利要求1所述的方法,其中,根据第一节点的触发消息确定目标设备,包括:
    根据所述触发消息向至少一个设备发送选择消息以及查询消息;
    接收所述至少一个设备中的至少一个设备反馈的防冲突信息;
    向反馈所述防冲突信息的设备发送确认消息;
    接收反馈所述防冲突信息的设备中的至少一个设备根据所述确认消息发送的上报信息,将发送所述上报信息的设备确定为目标设备。
  8. 根据权利要求1所述的方法,其中,在向所述目标设备发送访问消息之前,还包括:
    向所述目标设备发送请求消息,所述请求消息用于指示所述目标设备生成一个随机数;
    接收所述目标设备返回的随机数。
  9. 根据权利要求1所述的方法,其中,所述访问消息包括对以下至少一种操作的指示信息:读操作;写操作;灭活操作;锁操作;访问操作;块写操作;块擦除操作。
  10. 根据权利要求1所述的方法,其中,在向所述目标设备发送访问消息之前,还包括:
    根据所述第一节点的唤醒消息唤醒第三节点;
    接收所述第三节点的连接建立请求,并向所述第一节点发送连接建立请求;
    根据所述第一节点的连接指示消息,与所述第三节点建立连接。
  11. 根据权利要求10所述的方法,其中,所述唤醒消息包括以下至少一种信息:
    所述第三节点的标识;所述第三节点的类型;唤醒原因;所述第三节点的能力信息;所述第三节点的辅助信息;应用层数据包。
  12. 根据权利要求10所述的方法,其中,所述连接建立请求包括以下至少一种信息:
    所述第三节点的标识;所述第三节点的类型;唤醒原因;所述第三节点支持或者保存的设备的信息; 用于传输数据的资源;应用层的数据包。
  13. 一种通信方法,包括:
    发送触发消息,所述触发消息用于指示第二节点确定目标设备;
    接收目标设备的执行结果信息。
  14. 根据权利要求13所述的方法,还包括:
    接收所述目标设备的信息;其中,所述目标设备的信息包括以下至少一种信息:
    所述目标设备的完整标识或部分标识;所述目标设备中保存的全部数据或部分数据;所述目标设备对应的随机码;所述目标设备的接入结果指示;所述目标设备的能力信息;所述目标设备的辅助信息;所述目标设备的反馈消息;针对所述目标设备的连接请求;用于传输数据的资源信息。
  15. 根据权利要求13所述的方法,还包括:
    发送访问指示消息,所述访问指示消息用于指示对所述目标设备执行的操作;
    其中,所述访问指示消息包括所述目标设备的以下至少一种信息:
    所述目标设备的完整标识或部分标识;所述目标设备对应的随机码;操作类型;操作内容;密码;操作消息;针对所述目标设备的连接请求;用于传输数据的资源信息;所述目标设备的能力信息;所述目标设备的辅助信息;目标设备的接连信息;目标设备的承载信息。
  16. 根据权利要求13所述的方法,还包括:
    发送唤醒消息,所述唤醒消息用于指示所述第二节点唤醒第三节点;
    接收所述第二节点发送的连接建立请求;
    向所述第二节点发送连接指示消息,所述连接指示消息用于指示所述第二节点与所述第三节点建立连接。
  17. 一种通信方法,包括:
    接收第二节点的访问消息,并根据所述访问消息执行相应操作;
    向所述第二节点发送执行结果信息。
  18. 根据权利要求17所述的方法,其中,目标设备处于以下状态之一:
    空闲态,所述目标设备在处于所述空闲态的过程中不支持数据传输;
    接入态,所述目标设备在处于所述接入态的过程中支持接入操作,不支持访问操作;
    连接态,所述目标设备在处于所述连接态的过程中支持访问操作;
    灭活态,所述目标设备在处于所述灭活态的过程中不工作;
    静默态,所述目标设备在处于所述静默态的过程中进入省电模式。
  19. 根据权利要求18所述的方法,其中,在满足第一条件的情况下,所述目标设备由空闲态转换至静默态;
    其中,所述第一条件包括以下至少之一:
    处于所述空闲态的时间达到第一设定时间;
    处于所述空闲态的过程中接收配置的次数达到第一次数;
    收到转换至静默态的指示。
  20. 根据权利要求18所述的方法,其中,在满足第二条件的情况下,所述目标设备由静默态转换至空闲态;
    其中,所述第二条件包括以下至少之一:
    处于所述静默态的时间达到第二设定时间;
    处于所述静默态的过程中接收配置的次数达到第二次数;
    检测到设定信号或设定消息;
    未检测到设定信号或设定消息;
    检测到信号能量低于能量阈值;
    检测到参考信号接收功率RSRP低于功率阈值。
  21. 根据权利要求18所述的方法,其中,在满足第三条件的情况下,所述目标设备由空闲态转换至接入态;
    其中,所述第三条件包括以下至少之一:
    接收到激励信号或者唤醒信号;
    接收到选择消息,且符合所述选择消息中的条件;
    接收到查询消息,且符合所述查询消息中的条件;
    接收到请求接入消息,且符合所述请求接入消息中的条件;
    满足进入裁断、回令或应答状态的条件。
  22. 根据权利要求18所述的方法,其中,在满足第四条件的情况下,所述目标设备由接入态转换至空 闲态;
    其中,所述第四条件包括以下至少之一:
    出现错误;
    在设定时间段内未接收到激励信号或者唤醒信号;
    接入失败。
  23. 根据权利要求18所述的方法,其中,在满足第五条件的情况下,所述目标设备由接入态转换至连接态;
    其中,所述第五条件包括以下至少之一:
    第二节点已确定目标设备;
    标识信息已上报;
    防冲突信息已上报;
    满足进入公开或保护状态的条件;
    接收到访问消息;
    专有承载或者传输格式的配置已完成;
    对应连接已建立。
  24. 根据权利要求18所述的方法,其中,在满足第六条件的情况下,所述目标设备由连接态转换至空闲态;
    其中,所述第六条件包括以下至少之一:
    出现错误;
    在设定时间段内未接收到激励信号或者唤醒信号;
    在设定时间段内无法感知能量。
  25. 根据权利要求18所述的方法,其中,在满足第七条件的情况下,所述目标设备由连接态转换至灭活态;
    其中,所述第七条件包括:接收到灭活指示消息,且满足所述灭活指示消息中的条件。
  26. 根据权利要求18所述的方法,其中,所述目标设备按照以下至少一种方式进行状态转换:
    每经过第一时间门限进入静默态,在处于静默态的情况下,经过第二时间门限,进入空闲态;
    每收到一次进入静默态的指示信息,计数次数加1,计数次数大于或等于次数门限,则进入静默态,并在处于静默态的情况下,经过第三时间门限,进入空闲态;
    生成一个计数值,每收到一次进入静默态的指示信息,计数值减1,计数次数等于0,则进入静默态,并在处于静默态的情况下,经过第四时间门限,进入空闲态;
    收到进入静默态的指示信息,则进入静默态,并在处于静默态的情况下,经过第五时间门限,进入空闲态;
    在第六时间门限内,检测到信号能量或信号接收功率低于设定门限值,则进入静默态,并在处于静默态的情况下,经过第七时间门限,进入空闲态。
  27. 一种节点,包括存储器、处理器以及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如权利要求1-12中任一项所述的通信方法或权利要求13-16中任一项所述的通信方法。
  28. 一种设备,包括存储器、处理器以及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如权利要求17-26中任一项所述的通信方法。
  29. 一种计算机可读存储介质,其上存储有计算机程序,其中,该计算机程序被处理器执行时实现如权利要求1-26中任一项所述的通信方法。
PCT/CN2022/090053 2021-11-25 2022-04-28 通信方法、节点、设备、通信系统及存储介质 WO2023092945A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111413160.5 2021-11-25
CN202111413160.5A CN115942282A (zh) 2021-11-25 2021-11-25 通信方法、节点、设备、通信系统及存储介质

Publications (1)

Publication Number Publication Date
WO2023092945A1 true WO2023092945A1 (zh) 2023-06-01

Family

ID=85829678

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/090053 WO2023092945A1 (zh) 2021-11-25 2022-04-28 通信方法、节点、设备、通信系统及存储介质

Country Status (2)

Country Link
CN (1) CN115942282A (zh)
WO (1) WO2023092945A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140121786A1 (en) * 2012-10-30 2014-05-01 Hon Hai Precision Industry Co., Ltd. Smart gateway, smart home system and smart remote control method thereof
CN104885406A (zh) * 2012-12-18 2015-09-02 三星电子株式会社 用于在家庭网络系统中远程控制家庭设备的方法和设备
CN107124342A (zh) * 2017-06-28 2017-09-01 广东美的制冷设备有限公司 家电设备控制方法、装置、智慧家居系统及可读存储介质
CN109991870A (zh) * 2019-04-19 2019-07-09 北京远鼎科技有限公司 一种智能家居系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140121786A1 (en) * 2012-10-30 2014-05-01 Hon Hai Precision Industry Co., Ltd. Smart gateway, smart home system and smart remote control method thereof
CN104885406A (zh) * 2012-12-18 2015-09-02 三星电子株式会社 用于在家庭网络系统中远程控制家庭设备的方法和设备
CN107124342A (zh) * 2017-06-28 2017-09-01 广东美的制冷设备有限公司 家电设备控制方法、装置、智慧家居系统及可读存储介质
CN109991870A (zh) * 2019-04-19 2019-07-09 北京远鼎科技有限公司 一种智能家居系统

Also Published As

Publication number Publication date
CN115942282A (zh) 2023-04-07

Similar Documents

Publication Publication Date Title
US10552648B2 (en) Proximity-based localization of wireless tags based on wireless gateway association information
EP2667519B1 (en) Bluetooth connection method
US8154385B2 (en) Local processing of received RFID tag responses
EP3541127B1 (en) Downlink packet transmission method and device
KR101742997B1 (ko) 데이터 송수신 방법 및 이를 위한 장치
US20120256728A1 (en) Hierarchical fast collection procedure
WO2022160265A1 (zh) 通信方法和通信装置
US20150111495A1 (en) Nfc routing method
CN110059514B (zh) 数据写入方法、nfc标签、nfc设备及存储介质
WO2022170575A1 (zh) 一种寻呼的方法和通信装置
WO2023092945A1 (zh) 通信方法、节点、设备、通信系统及存储介质
JP3519657B2 (ja) 情報処理システムおよび情報処理システムの制御方法、ならびに通信中継装置および情報処理装置
CN114363879B (zh) 无线终端的漫游处理方法及系统
CN112866422B (zh) 一种数据请求处理方法和装置
CN102043934B (zh) 射频识别系统及其工作方法
US20090160611A1 (en) Enhanced Communication Via RFID Interrogator
WO2024027475A1 (zh) 一种通信方法及装置
WO2023138198A1 (zh) 一种通信方法、装置和系统
WO2023236826A1 (zh) 反向散射通信的接入方法、装置、终端及网络侧设备
WO2022160193A1 (zh) 一种灭活的方法和装置
WO2024082967A1 (zh) 通信方法及装置
US11431820B1 (en) Method and system for implementing inter-process communications
WO2024027339A1 (zh) 一种盘点方法及装置
WO2024041309A1 (zh) 一种通信方法及装置
WO2024021935A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22897045

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2022897045

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022897045

Country of ref document: EP

Effective date: 20240328