WO2023173405A1 - 中继通信的方法、发起终端、中继终端和目标终端 - Google Patents

中继通信的方法、发起终端、中继终端和目标终端 Download PDF

Info

Publication number
WO2023173405A1
WO2023173405A1 PCT/CN2022/081688 CN2022081688W WO2023173405A1 WO 2023173405 A1 WO2023173405 A1 WO 2023173405A1 CN 2022081688 W CN2022081688 W CN 2022081688W WO 2023173405 A1 WO2023173405 A1 WO 2023173405A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
target
initiating
relay
connection
Prior art date
Application number
PCT/CN2022/081688
Other languages
English (en)
French (fr)
Inventor
郭雅莉
卢飞
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202280088509.9A priority Critical patent/CN118542068A/zh
Priority to PCT/CN2022/081688 priority patent/WO2023173405A1/zh
Publication of WO2023173405A1 publication Critical patent/WO2023173405A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Definitions

  • Embodiments of the present application relate to the field of communications, and specifically relate to a method of relaying communications, an initiating terminal, a relay terminal, and a target terminal.
  • an initiating terminal with Proximity-based Services (Prose) capability can interact with the target terminal through a relay (Relay) terminal with Prose capability.
  • a relay terminal with Prose capability can interact with the target terminal through a relay (Relay) terminal with Prose capability.
  • a link is established respectively between the initiating terminal and the target terminal and between the relay terminal and the target terminal for communication between the initiating terminal and the target terminal.
  • This application provides a relay communication method, an initiating terminal, a relay terminal and a target terminal, which is conducive to reducing the number of links for relay communication through the relay terminal and improving relay performance.
  • a method for relaying communication including: an initiating terminal determines whether to use the first target connection to perform the said first target connection based on the establishment of the first target connection between the initiating terminal and the relay terminal. Initiates communication between the initiating terminal and the target terminal.
  • a method for relaying communication including: a relay terminal determining whether to use the second target connection for initiation based on the establishment of a second target connection between the relay terminal and a target terminal. Communication between terminal and target terminal.
  • a method for relaying communication including: a target terminal receiving a third request message or a fourth request message from a relay terminal, where the third request message is used to request the use of the relay terminal and the The second target connection between the target terminals carries out communication between the initiating terminal and the target terminal, and the fourth request message is used to request the establishment of the second target connection between the relay terminal and the target terminal. to perform communication between the initiating terminal and the target terminal.
  • a fourth aspect provides an initiating terminal for executing the method in the above first aspect or its respective implementations.
  • the initiating terminal includes a functional module for executing the method in the above first aspect or its respective implementations.
  • a fifth aspect provides a relay terminal for performing the method in the above second aspect or its respective implementations.
  • the relay terminal includes a functional module for executing the method in the above second aspect or its respective implementations.
  • a sixth aspect provides a target terminal for executing the method in the above third aspect or its respective implementations.
  • the target terminal includes a functional module for executing the method in the above third aspect or its respective implementations.
  • a terminal device including a processor and a memory.
  • the memory is used to store computer programs
  • the processor is used to call and run the computer programs stored in the memory, and execute any one of the above-mentioned first to third aspects or the methods in their respective implementations.
  • An eighth aspect provides a chip for implementing any one of the above-mentioned first to third aspects or the method in each implementation manner thereof.
  • the chip includes: a processor, configured to call and run a computer program from a memory, so that the device installed with the device executes any one of the above-mentioned first to third aspects or implementations thereof. method.
  • a ninth aspect provides a computer-readable storage medium for storing a computer program, the computer program causing the computer to execute any one of the above-mentioned first to third aspects or the method in each implementation thereof.
  • a computer program product including computer program instructions that enable a computer to execute any one of the above-mentioned first to third aspects or the methods in each implementation thereof.
  • An eleventh aspect provides a computer program that, when run on a computer, causes the computer to execute any one of the above-mentioned first to third aspects or the method in each implementation thereof.
  • the initiating terminal can determine whether to use the connection to transmit the service between the initiating terminal and the target terminal based on whether the initiating terminal and the relay terminal have established a connection for the service to be transmitted between the initiating terminal and the target terminal. ;and / or
  • the relay terminal may determine whether to use the connection to transmit the service between the initiating terminal and the target terminal according to whether a connection for the service to be transmitted between the initiating terminal and the target terminal has been established between the relay terminal and the target terminal.
  • the connection between the initiating terminal and the relay terminal can serve multiple initiating terminals, and/or the connection between the relay terminal and the target terminal can serve multiple initiating terminals.
  • the connection between the initiating terminal and the relay terminal, and the connection between the relay terminal and the target terminal do not require one-to-one mapping, which is conducive to reducing the number of connections for relay communication through the relay terminal and reducing the number of relays.
  • the processing complexity of the terminal is conducive to reducing the number of connections for relay communication through the relay terminal and reducing the number of relays.
  • Figure 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
  • Figure 2 is a schematic interaction diagram for establishing PC5 connections between UEs.
  • Figure 3 is a schematic diagram of two UEs communicating through a relay UE.
  • Figure 4 is a schematic diagram of communication between UEs through relay UEs.
  • Figure 5 is a schematic diagram of a communication relay method provided by an embodiment of the present application.
  • Figure 6 is a schematic diagram of another communication relay method provided by an embodiment of the present application.
  • Figure 7 is a schematic diagram of yet another communication relay method provided by an embodiment of the present application.
  • Figure 8 is a schematic interaction diagram of a communication relay method provided by an embodiment of the present application.
  • Figure 9 is a schematic interaction diagram of another communication relay method provided by an embodiment of the present application.
  • Figure 10 is a schematic interaction diagram of yet another method of relaying communication provided by an embodiment of the present application.
  • Figure 11 is a schematic block diagram of an initiating terminal provided by an embodiment of the present application.
  • Figure 12 is a schematic block diagram of a relay terminal provided by an embodiment of the present application.
  • Figure 13 is a schematic block diagram of a target terminal provided by an embodiment of the present application.
  • Figure 14 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • Figure 15 is a schematic block diagram of a chip provided by an embodiment of the present application.
  • Figure 16 is a schematic block diagram of a communication system provided by an embodiment of the present application.
  • Embodiments of the present application can be applied to various communication systems, such as: Global System of Mobile communication (GSM) system, Code Division Multiple Access (Code Division Multiple Access, CDMA) system, Wideband Code Division Multiple Access (Wideband Code Division Multiple Access (WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, Advanced long term evolution (LTE-A) system, New Radio Interface (New Radio, NR) system, evolution system of NR system, LTE (LTE-based access to unlicensed spectrum, LTE-U) system on unlicensed spectrum, NR (NR-based access to unlicensed spectrum, NR-U) system, Universal Mobile Telecommunication System (UMTS), Wireless Local Area Networks (WLAN), Wireless Fidelity (WiFi), next-generation communication system or other communication systems, etc.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • the communication system in the embodiment of the present application can be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, or a standalone (Standalone, SA) deployment scenario.
  • CA Carrier Aggregation
  • DC Dual Connectivity
  • SA standalone deployment scenario.
  • the embodiments of this application do not limit the applied spectrum.
  • the embodiments of this application can be applied to licensed spectrum or unlicensed spectrum.
  • FIG. 1 exemplarily shows a schematic diagram of a communication system 100 applied in this application.
  • the communication system 100 mainly includes a terminal equipment (User Equipment, UE) 101, an access network (Access Network, AN) or a wireless access network (radio access network, RAN) equipment 102, access and mobile Access and Mobility Management Function (AMF) entity 103, Session Management Function (SMF) entity 104, User Plane Function (UPF) entity 105, Policy Control function (PCF) ) entity 106, Unified Data Management (UDM) entity 107, Data Network (DN) 108, Application Function (AF) entity 109, Authentication Server Function (AUSF) entity 110.
  • Network Slice Selection Function (NSSF) entity 111 The Network Slice Selection Function (NSSF) entity 111.
  • UE User Equipment
  • AN Access Network
  • RAN wireless access network
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • PCF Policy Control function
  • UDM Unified
  • the UE 101 performs access layer connection with the AN or RAN device 102 through the Uu interface to exchange access layer messages and wireless data transmission, and the UE 101 performs non-access with the AMF entity 103 through the N1 interface.
  • the UPF entity 105 is connected to the DN 108 through the N6 interface.
  • the UPF entity 105 is connected to the SMF entity 104 through the N4 interface.
  • the SMF entity 104 is connected to the PCF entity 106 through the N7 interface, and the SMF entity 104 is connected through the N10 interface.
  • the SMF entity 104 controls the UPF entity 105 through the N4 interface.
  • the SMF entity 104 is connected to the AMF entity 103 through the N11 interface; multiple AMF entities 103 are connected through the N14 interface, and the AMF entity 103 is connected to the UPF entity 105 through the N8 interface.
  • the UDM entity 107 is connected, the AMF entity 103 is connected to the AUSF entity 110 through the N12 interface, the AMF entity 103 is connected to the NSSF entity 111 through the N22 interface, and at the same time, the AMF entity 103 is connected to the PCF entity 106 through the N15 interface; the PCF entity 106 is connected to the N5 interface.
  • the AF entity 109 is connected; the AUSF entity 110 is connected to the UDM entity 107 through the N13 interface.
  • the UDM entity 107 is a subscription database in the core network, which stores the user's subscription data in the 5G network.
  • the AMF entity 103 is the mobility management function in the core network
  • the SMF entity 104 is the session management function in the core network.
  • the AMF entity 103 is also responsible for transferring session management related messages to the UE 101 and SMF entity 104.
  • the PCF entity 106 is the policy management function in the core network and is responsible for formulating policies related to mobility management, session management, and charging of the UE 101.
  • the UPF entity 105 is a user plane function in the core network.
  • a protocol data unit (Protocol Data Unit, PDU) session data connection is established from the UE 101 to the UPF entity 105 for data transmission.
  • the AMF entity 103 and the SMF entity 104 obtain user subscription data from the UDM entity 107 through the N8 and N10 interfaces respectively, and obtain policy data from the PCF entity 106 through the N15 and N7 interfaces.
  • NEF Network Exposure Function
  • devices with communication functions in the network/system may be called communication devices.
  • terminal equipment may also be called user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile Equipment, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
  • the terminal device can be a station (ST) in the WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, or a personal digital processing unit.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • handheld devices with wireless communication capabilities computing devices or other processing devices connected to wireless modems
  • vehicle-mounted devices wearable devices
  • next-generation communication systems such as terminal devices in NR networks or Terminal equipment in the future evolved Public Land Mobile Network (PLMN) network, etc.
  • PLMN Public Land Mobile Network
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices. It is a general term for applying wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes, etc.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not just hardware devices, but also achieve powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized devices that can achieve complete or partial functions without relying on smartphones, such as smart watches or smart glasses, and those that only focus on a certain type of application function and need to cooperate with other devices such as smartphones.
  • the above-mentioned AN device 102 can be a device used to communicate with mobile devices.
  • the AN device 102 can be an access point (Access Point, AP) in WLAN, a base station (Base Transceiver Station, BTS) in GSM or CDMA, or it can be
  • the base station (NodeB, NB) in WCDMA can also be the evolutionary base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and a base station ( For example, gNB) or network equipment in future evolved PLMN networks.
  • network equipment provides services for a cell
  • terminal equipment communicates with the network equipment through transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell.
  • the cell may be a network equipment (for example, base station), the cell can belong to the macro base station, or it can belong to the base station corresponding to the small cell (Small cell).
  • the small cell here can include: urban cell (Metro cell), micro cell (Micro cell), pico cell (Pico) Cell), femto cell (Femto cell), etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-rate data transmission services.
  • the "instruction” mentioned in the embodiments of this application may be a direct instruction, an indirect instruction, or an association relationship.
  • a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association between A and B. relation.
  • correlate can mean that there is a direct correspondence or indirect correspondence between the two, it can also mean that there is an associated relationship between the two, or it can mean indicating and being instructed, configuration and being. Configuration and other relationships.
  • a UE with Proximity-based Services (Prose) capability can communicate directly with another UE with Prose capability through the PC5 interface.
  • Figure 2 is a schematic interaction diagram for establishing PC5 connections between UEs.
  • UE1 is the initiating UE for connection establishment
  • UE2, UE3 and UE4 are the target UEs for connection establishment.
  • Step 1 The target UE determines the target layer-2 (identity, ID) used for signaling reception.
  • UE-2 determines the target layer-2ID for signaling reception
  • UE-3 determines the target layer-2ID for signaling reception
  • UE-4 determines the target layer-2ID for signaling reception.
  • Step 2 The application layer of UE-1 provides application layer information for unicast near field communication.
  • Step 3 UE-1 provides broadcast or unicast mode to send the direct communication request message.
  • UE-1 can initiate the establishment of a short-range link with the target UE.
  • the specific steps may include the following steps:
  • Step 4a UE-1 and UE-2 perform security establishment.
  • Step 5a UE-2 sends the direct communication acceptance message in unicast mode.
  • Step 6a UE-1 and UE-2 transmit unicast data units through the established short-range link.
  • UE-1 may initiate a short-range link establishment targeting traffic to initiate a short-range link establishment targeting traffic between UE-1 and UE-2, and UE-1 and UE-
  • the goal of establishing a short-distance link between 4 is an example for illustration.
  • the specific steps may include the following:
  • Step 4b UE-1 and UE-2 perform security establishment, and UE-1 and UE-4 perform security establishment.
  • Step 5b UE-2 uses unicast mode to send the direct communication acceptance message, and UE-4 uses unicast mode to send the direct communication acceptance message.
  • Step 6b UE-1 and UE-2 transmit the unicast data unit through the established short-range link, and UE-1 and UE-4 transmit the unicast data unit through the established short-range link.
  • FIG. 3 is a schematic diagram of service interaction through relay UE.
  • Relay UE can directly communicate with UE-1 through the PC5 interface, and can also directly communicate with UE-2 through the PC5 interface. Then UE-1 and UE-2 can interact with each other through Relay UE.
  • UE-1 is a communication method for each target UE (such as UE-2, UE-3) in UE-R.
  • a separate link is established between UE-1 and UE-R.
  • link 1-a is used for communication between UE-1 and UE-2
  • link 2-a is used for communication between UE-1 and UE-3
  • UE- 4 also establishes a separate link between UE-4 and UE-R for each target UE, for example, link 3-a is used for UE-4 and UE-2 communication
  • link 4-a is used for UE- 4 communicates with UE-3.
  • a separate link is established between UE-R and the target UE.
  • link 1-b is used for UE-1 and UE- 2
  • link 3-b is used for communication between UE-4 and UE-2
  • link 2-b is used for communication between UE-1 and UE-3
  • link 4-b is used for For communication between UE-4 and UE-3
  • UE-R only needs to associate link 1-a with link 1-b to forward data between UE-1 and UE-2, similar to
  • link 2-a with link 2-b data forwarding between UE-1 and UE-3 can be performed.
  • link 3-a with link 3-b data forwarding between UE-4 can be performed.
  • link 4-a is associated with link 4-b
  • data forwarding between UE-4 and UE-3 can be performed.
  • the number of UEs communicating through the relay UE increases, the number of links that need to be established will also increase accordingly, which increases the processing complexity of the relay UE. Moreover, since the number of links that the relay UE can process is limited, it also limits the number of links that the relay UE can handle. The number of UEs that can communicate through relay UEs.
  • Figure 5 is a schematic diagram of a method 200 for relaying communications according to an embodiment of the present application. As shown in Figure 5, the method 200 includes the following content:
  • the initiating terminal determines whether to use the first target connection for communication between the initiating terminal and the target terminal based on the establishment of the first target connection between the initiating terminal and the relay terminal.
  • the initiating terminal may be the UE 101 in the communication system shown in Figure 1.
  • the specific implementation of the initiating terminal refer to the relevant description of the embodiment shown in Figure 1, which will not be described again here.
  • connection can also be replaced by a link, a path, etc.
  • first target connection can be replaced by the first target link
  • second target connection can be replaced by the second target link
  • PC5 connection can be replaced by a PC5 link, which is not limited in this application.
  • the initiating terminal has chosen to communicate with the target terminal through the relay terminal.
  • the establishment of the first target connection between the initiating terminal and the relay terminal may include:
  • the first target connection is a direct communication connection between the initiating terminal and the relay terminal.
  • the first target connection is a PC5 connection between the initiating terminal and the relay terminal.
  • the first target connection is a direct communication connection between the initiating terminal and the relay terminal for a specific service
  • the specific service is the initiating terminal and the target terminal. between the services to be transmitted.
  • connection between the initiating terminal and the relay terminal may be service granular, or may be service-agnostic.
  • whether the first target connection has been established between the initiating terminal and the relay terminal includes:
  • the initiating terminal may determine whether a PC5 connection has been established between the initiating terminal and the relay terminal.
  • the initiating terminal may determine that the first target connection has been established between the initiating terminal and the relay terminal; otherwise, determine that the initiating terminal and the relay terminal The first target connection is not established between the terminals.
  • whether the first target connection has been established between the initiating terminal and the relay terminal includes:
  • the initiating terminal may determine whether the initiating terminal and the relay terminal have established a PC5 connection for the service to be transmitted.
  • the initiating terminal may determine that the first target connection has been established between the initiating terminal and the relay terminal, Otherwise, it is determined that the first target connection is not established between the initiating terminal and the relay terminal.
  • the S210 includes:
  • the initiating terminal determines to use the first target connection to conduct the communication between the initiating terminal and the target terminal. Communication (or service interaction), or in other words, reusing the first target connection to perform communication (or service interaction) between the initiating terminal and the target terminal.
  • the initiating terminal when the first target connection has been established between the initiating terminal and the relay terminal, the initiating terminal can reuse the first target connection to communicate with the target terminal instead of communicating with the target terminal.
  • the terminal establishes a new connection, which is beneficial to reducing the number of connections for relay communication through the relay terminal and reducing the processing complexity of the relay terminal.
  • the target terminal in the embodiment of the present application is recorded as the first target terminal, and the established first target connection is used for communication between the initiating terminal and the second target terminal, that is, the initiating terminal
  • the first target connection can be reused for communication between the initiating terminal and the first target terminal, and communication between the initiating terminal and the second target terminal, or the first target connection can also be reused for the initiating terminal and more target terminals.
  • the communication between them, that is, the first target connection can serve multiple target terminals.
  • the service to be transmitted is the service to be transmitted between the initiating terminal and the first target terminal.
  • the method 200 further includes:
  • the initiating terminal sends a first request message to the relay terminal, where the first request message is used to request to use the first target connection for communication between the initiating terminal and the target terminal, or in other words, The first request message is used to request to reuse the first target connection to transmit services to be transmitted between the initiating terminal and the target terminal.
  • the relay terminal receives the first request message from the initiating terminal.
  • the initiating terminal sends the first request message to the relay terminal.
  • the initiating terminal when the initiating terminal determines to use the first target connection for communication between the initiating terminal and the target terminal, the initiating terminal sends the first request to the relay terminal. information.
  • the initiating terminal may reuse an existing message to implement the function of the first request message, for example, use a link modification request message to request reuse of an established connection, or may add a new message to implement the third request message.
  • the function of a request message this application does not limit the specific implementation of the first request message.
  • the first request message is a link modification request message, or a new connection modification request message may be added, or a connection reuse request message may be used to reuse an established connection.
  • the first request message may be used to modify the established first target connection, for example, to add a target terminal served by the first target connection.
  • the first target connection is a connection from UE-1 to UE-R.
  • the first target connection is used for communication between UE-1 and UE-2, that is, the initiating terminal is UE-1 and the relay terminal is UE-R.
  • the target terminal is UE-2.
  • the first target connection can also be used, then the first target connection can be used for communication between UE-1, UE-2 and UE-3, that is, The target terminals served by the first target connection are modified from UE-2 to UE-2 and UE-3.
  • the first request message includes identification information of the target terminal and/or address information of the initiating terminal.
  • the relay terminal by carrying the identification information of the target terminal in the first request message, the relay terminal can be notified to reuse the target terminal corresponding to the relay communication of the first target connection, or in other words, The target terminal served by the newly added first target connection.
  • the address information of the initiating terminal can be used by the relay terminal to determine which terminal device to route or forward the service to be transmitted, or which initiating terminal the service to be transmitted comes from.
  • the address information of the initiating terminal includes but is not limited to the Internet Protocol (IP) address information of the initiating terminal and/or the Media Access Control (Media Access Control, MAC) of the initiating terminal. )Address information.
  • IP Internet Protocol
  • MAC Media Access Control
  • the identification information of the target terminal may be used to identify the target terminal.
  • the identification information of the target terminal may include but is not limited to the application layer identification and/or the link layer identification of the target terminal. , such as layer 2-ID.
  • the relay terminal may determine whether a second target connection has been established between the relay terminal and the target terminal according to the identification information of the target terminal, and may further determine whether to reuse the second target connection.
  • the specific implementation is described in method 300, and will not be described in detail here.
  • the second target connection is a direct communication connection between the relay terminal and the target terminal.
  • the second target connection is a PC5 connection between the relay terminal and the target terminal.
  • the second target connection is a direct communication connection between the relay terminal and the target terminal for a specific service
  • the specific service is the initiating terminal and the target terminal. between the services to be transmitted.
  • connection between the relay terminal and the target terminal may be service granular, or may be service-indifferent.
  • the initiating terminal can communicate with multiple target terminals through the first target connection, and/or the relay terminal can relay multiple initiating terminals through the second target connection.
  • the relay terminal For the terminal's services to be transmitted, for the relay terminal, how to distinguish the initiating terminal and/or the target terminal of the services to be transmitted in order to perform correct data forwarding is also a problem that needs to be solved.
  • the relay terminal may forward or route data according to the address information of the initiating terminal and/or the address information of the target terminal.
  • the relay terminal may determine which target terminal to forward the service to be transmitted based on the address information of the target terminals.
  • the relay terminal can determine which initiating terminal the service to be transmitted comes from based on the address information of the initiating terminal.
  • the method 200 further includes:
  • the relay terminal sends a first response message to the initiating terminal.
  • the initiating terminal receives the first response message sent by the relay terminal, where the first response message is a response message to the first request message.
  • the first response message is used to indicate that it is determined to use the first target connection for communication between the initiating terminal and the target terminal, or that the first response message is used to indicate that it is determined to reuse
  • the first target connection transmits services to be transmitted between the initiating terminal and the target terminal.
  • the relay terminal may inform the initiating terminal through the first response message that it determines to reuse the first target connection.
  • the relay terminal can reuse existing messages to implement the function of the first response message. For example, it can use the link modification acceptance message to confirm the reuse of the established connection, or it can also add a new message to implement it.
  • the function of the first response message this application does not limit the specific implementation of the first response message.
  • the first response message is a link modification accept message, or a new connection modification accept message may be added, or a connection reuse accept message may be used to reuse an established connection.
  • the first response message may be used to indicate acceptance of modification to the established first target connection, for example, acceptance of adding a target terminal served by the first target connection.
  • the first response message includes address information of the target terminal.
  • the initiating terminal can learn the address information of the target terminal through the first response message.
  • the address information of the target terminal may be used by the relay terminal to determine which terminal device to route or forward the service to be transmitted.
  • the address information of the target terminal includes but is not limited to the IP address information of the target terminal and/or the MAC address information of the target terminal.
  • the embodiments of the present application do not limit the manner in which the relay terminal obtains the address information of the target terminal.
  • the method of obtaining the address information of the target terminal will be described below with reference to specific embodiments.
  • the present application is not limited to this.
  • the address information of the target terminal is obtained by the relay terminal from the target terminal.
  • the address information of the target terminal is obtained from the third response message and/or the fourth response message of the target terminal, and the third response message is used to indicate that it is determined to use the second target connection to perform the said Initiating communication between the terminal and the target terminal, the fourth response message is used to indicate the completion of the establishment of the second target connection.
  • the specific implementation of the third response message and the fourth response message is in method 300 will be explained in , and will not be repeated here.
  • the address information of the target terminal is negotiated between the relay terminal and the target terminal, or is allocated by the relay terminal to the target terminal.
  • the relay terminal and the target terminal may negotiate IP addresses, so that the relay terminal can obtain the IP address of the target terminal. Address information.
  • the relay terminal and the target terminal may allocate IP addresses, so that the relay terminal obtains the IP address of the target terminal. Address information.
  • the address information of the target terminal is obtained by the relay terminal from the context of the second target connection between the relay terminal and the target terminal stored on the relay terminal. .
  • the context of the second target connection may be stored on the relay terminal, and the second target connection
  • the context may include address information of the target terminal.
  • the address information of the target terminal is obtained by the relay terminal during a secure interaction process between the relay terminal and the target terminal.
  • the relay terminal may initiate an establishment process of the second target connection.
  • the relay terminal and the target terminal may interact securely, and the target terminal may send the address information of the target terminal to the relay terminal during the secure interaction process.
  • the S210 includes:
  • the initiating terminal determines to establish the first target connection to conduct communication between the initiating terminal and the target terminal. Communication.
  • the initiating terminal may initiate the establishment process of the first target connection, to perform communication between the initiating terminal and the target terminal.
  • the method 200 further includes:
  • the initiating terminal sends a second request message to the relay terminal, where the second request message is used to request establishment of the first target connection.
  • the relay terminal receives the second request message sent by the initiating terminal.
  • the initiating terminal when the first target connection is not established between the initiating terminal and the relay terminal, the initiating terminal sends a second request message to the relay terminal.
  • the initiating terminal when the initiating terminal determines to establish the first target connection, the initiating terminal sends the second request message to the relay terminal.
  • the initiating terminal may reuse an existing message to implement the function of the second request message, for example, using a direct communication request message to request the establishment of a connection (that is, the second request message may be a direct communication request message) , or a new message may be added to implement the function of the second request message.
  • a direct communication request message to request the establishment of a connection
  • the second request message may be a direct communication request message
  • a new message may be added to implement the function of the second request message.
  • the second request message includes at least one of the following information:
  • the identification information of the initiating terminal, the identification information of the target terminal, the address information of the initiating terminal, and the information of the service to be transmitted are transmitted.
  • the relay terminal may determine the initiating terminal and the target terminal served by the connection to be established based on the identification information of the initiating terminal and the identification information of the target terminal carried in the second request message.
  • the relay terminal may determine whether a second target connection has been established between the relay terminal and the target terminal according to the identification information of the target terminal, and may further determine whether to reuse the second target connection.
  • the specific implementation is described in method 300, and will not be described in detail here.
  • the address information of the initiating terminal can be used by the relay terminal to determine which terminal device to route or forward the service to be transmitted, or which initiating terminal the service to be transmitted comes from.
  • the information about the service to be transmitted is used by the relay terminal to determine whether a connection for the service to be transmitted has been established between the relay terminal and the target terminal, that is, whether the third connection has been established.
  • the second target connection is connected to determine whether to reuse the second target connection.
  • the identification information of the initiating terminal is used to identify the initiating terminal.
  • the identification information of the initiating terminal may include but is not limited to the application layer identification and/or link layer identification of the initiating terminal. , such as layer 2-ID.
  • the identification information of the target terminal is used to identify the target terminal.
  • the identification information of the target terminal may include but is not limited to the application layer identification and/or link layer identification of the target terminal, For example layer2-id.
  • the address information of the initiating terminal includes but is not limited to the IP address information of the initiating terminal and/or the MAC address information of the initiating terminal.
  • the information about the service to be transmitted includes but is not limited to at least one of the following:
  • the application identification, service type, and relay service code (RSC) of the service to be transmitted.
  • the method 200 further includes:
  • the initiating terminal and the relay terminal perform a secure interaction process.
  • the initiating terminal sends the address information of the initiating terminal to the relay terminal.
  • the relay terminal may learn the address information of the initiating terminal through the second request message, or may also learn the address information of the initiating terminal during the secure interaction process between the initiating terminal and the relay terminal. .
  • the 200 includes:
  • the relay terminal sends a second response message to the initiating terminal.
  • the initiating terminal receives a second response message sent by the relay terminal, where the second response message is a response message to the second request message.
  • the second response message is used to indicate completion of establishment of the first target connection.
  • the relay terminal may reuse an existing message to implement the function of the second response message, for example, using a direct communication accept message to indicate the completion of connection establishment (that is, the second response message may be a direct communication accept message). message), or a new message can be added to implement the function of the second response message.
  • a direct communication accept message to indicate the completion of connection establishment
  • the second response message may be a direct communication accept message.
  • message a new message can be added to implement the function of the second response message. This application does not limit the specific implementation of the second response message.
  • the second response message includes address information of the target terminal.
  • the initiating terminal can learn the address information of the target terminal through the second response message.
  • the method of obtaining the address information of the target terminal may refer to the relevant description in Embodiment 1, which will not be described again here.
  • the initiating terminal can perform the corresponding process according to whether the initiating terminal and the relay terminal have established a connection for the service to be transmitted between the initiating terminal and the target terminal to carry out the communication between the initiating terminal and the target terminal. business interactions between.
  • connection reuse process described in Embodiment 1 may be executed.
  • connection establishment process described in Embodiment 2 may be performed.
  • the PC5 connection between the initiating terminal and the relay terminal can serve multiple target terminals.
  • the relay terminal routes data according to the address information of the target terminal, for example, based on the IP address of the target terminal. This way, data sent to different target terminals can be distinguished by different IP addresses on the same connection, which is helpful to avoid establishing a separate link between the relay terminal and the initiating terminal for each target terminal.
  • PC5 connection that is, the connection between the initiating terminal and the relay terminal, and the connection between the relay terminal and the target terminal do not require one-to-one mapping, which is beneficial to reducing the number of connections for relay communication through the relay terminal. Reduce the processing complexity of relay terminals and improve relay communication performance.
  • the method of relay communication according to an embodiment of the present application is described in detail from the perspective of the initiating terminal above with reference to FIG. 5 .
  • the method of relay communication according to another embodiment of the present application is described in detail from the perspective of the relay terminal with reference to FIG. 6 method. It should be understood that the description on the relay device side corresponds to the description on the initiating terminal side. Similar descriptions can be found above. To avoid duplication, they will not be described again here.
  • FIG. 6 is a schematic flowchart of a method 300 for relaying communications according to another embodiment of the present application. As shown in Figure 3, the method 300 includes the following content:
  • the relay terminal determines whether to use the second target connection for communication between the initiating terminal and the target terminal based on the establishment of the second target connection between the relay terminal and the target terminal.
  • the relay terminal may be the UE 101 in the communication system shown in Figure 1.
  • the relay terminal refer to the relevant description of the embodiment shown in Figure 1, which will not be described again here.
  • connection can also be replaced by a link, a path, etc.
  • first target connection can also be replaced by a first target link
  • second target connection can be replaced by a second target link
  • the PC5 connection can be replaced by a PC5 link, which is not limited in this application.
  • the initiating terminal has chosen to communicate with the target terminal through the relay terminal.
  • the establishment status of the second target connection between the relay terminal and the target terminal may include: whether the second target connection has been established between the relay terminal and the target terminal.
  • the second target connection is a direct communication connection between the relay terminal and the target terminal.
  • the second target connection is a PC5 connection between the relay terminal and the target terminal.
  • the second target connection is a direct communication connection between the relay terminal and the target terminal for a specific service
  • the specific service is the initiating terminal and the target terminal. between the services to be transmitted.
  • connection between the relay terminal and the target terminal may be service granular, or may be service-agnostic.
  • whether the second target connection has been established between the relay terminal and the target terminal includes:
  • the relay terminal can determine the relay terminal and Whether a PC5 connection has been established between the target terminals.
  • the first request message or the second request message please refer to the relevant description of the method 200. For the sake of brevity, details will not be described here.
  • the relay terminal may determine that a second target connection has been established between the relay terminal and the target terminal, otherwise , determining that a second target connection is not established between the relay terminal and the target terminal.
  • whether the second target connection has been established between the relay terminal and the target terminal includes:
  • the relay terminal can determine the relay terminal and Whether the PC5 connection for the service to be transmitted has been established between the target terminals.
  • the first request message or the second request message please refer to the relevant description of the method 200. For the sake of brevity, details will not be described here.
  • the relay terminal may determine the connection between the relay terminal and the target terminal.
  • the second target connection has been established; otherwise, it is determined that the second target connection is not established between the relay terminal and the target terminal.
  • said 310 includes:
  • the relay terminal determines to use the second target connection to conduct the communication between the initiating terminal and the target terminal. communication (or, business interaction), or, in other words, reusing the second target connection to conduct communication (or, business interaction) between the initiating terminal and the target terminal.
  • the relay terminal when the second target connection has been established between the relay terminal and the target terminal, the relay terminal can reuse the second target connection to perform the Communication between the initiating terminal and the target terminal instead of establishing a new connection for the initiating terminal is beneficial to reducing the number of connections for relay communication through the relay terminal and reducing the processing complexity of the relay terminal.
  • the initiating terminal in the embodiment of the present application is recorded as the first initiating terminal, and the established second target connection is used for communication between the second initiating terminal and the target terminal, that is, the relay terminal can
  • the second target connection is reused for communication between the first initiating terminal and the target terminal, and communication between the second initiating terminal and the target terminal.
  • the second target connection can also be reused for communication between more initiating terminals and target terminals. Communication between two terminals, that is, the second target connection can serve multiple initiating terminals.
  • the service to be transmitted is the service to be transmitted between the first initiating terminal and the target terminal.
  • the method 300 further includes:
  • the relay terminal sends a third request message to the target terminal, where the third request message is used to request communication between the initiating terminal and the target terminal using the second target connection.
  • the target terminal receives the third request message sent by the relay terminal.
  • the relay terminal when the second target connection has been established between the relay terminal and the target terminal, the relay terminal sends a third request message to the target terminal.
  • the relay terminal when the relay terminal determines to use the second target connection for communication between the initiating terminal and the target terminal, the relay terminal sends a third request message to the target terminal. .
  • the relay terminal can reuse existing messages to implement the function of the third request message, for example, use a link modification request message to request reuse of an established connection, or it can also add a new message to implement it.
  • this application does not limit the specific implementation of the third request message.
  • the third request message is a link modification request message, or a new connection modification request message may be added, or a connection reuse request message may be used to reuse an established connection.
  • the third request message may be used to modify the established second target connection, for example, add an initiating terminal served by the second target connection.
  • the second target connection is a connection from UE-R to UE-4.
  • the second target connection is used for communication between UE-5 and UE-4.
  • UE-6 also chooses to communicate with UE-4 through UE-R
  • the second target connection can also be used, and the second target connection can be used for communication between UE-5 and UE-6 and UE-4, that is, the initiating terminal served by the second target connection is served by UE-5.
  • 5 is modified to UE-5 and UE-6.
  • the third request message includes identification information of the initiating terminal and/or address information of the initiating terminal.
  • the relay terminal by carrying the identification information of the initiating terminal in the first request message, the relay terminal can be notified to reuse the initiating terminal corresponding to the relay communication of the second target connection, or in other words, The initiating terminal served by the newly added second target connection.
  • the address information of the initiating terminal can be used by the relay terminal to determine which terminal device to route or forward the service to be transmitted, or which initiating terminal the service to be transmitted comes from.
  • the identification information of the initiating terminal is used to identify the initiating terminal.
  • the identification information of the initiating terminal may include but is not limited to the application layer identification and/or the link layer identification of the initiating terminal, such as layer 2-ID.
  • the identification information of the initiating terminal is obtained by the relay terminal from the initiating terminal.
  • first request information and/or the second request message of the initiating terminal For example, it is obtained from the first request information and/or the second request message of the initiating terminal.
  • first request message and the second request message please refer to the relevant description of the method 200. For the sake of brevity, details will not be described here.
  • the identification information of the initiating terminal is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the context of the first target connection may be stored on the relay terminal.
  • the context of the first target connection The identification information of the initiating terminal may be included.
  • the address information of the initiating terminal is obtained by the relay terminal from the initiating terminal.
  • first request information and/or the second request message of the initiating terminal For example, it is obtained from the first request information and/or the second request message of the initiating terminal.
  • first request message and the second request message please refer to the relevant description of the method 200. For the sake of brevity, details will not be described here.
  • the address information of the initiating terminal is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the context of the first target connection may be stored on the relay terminal.
  • the context of the first target connection The address information of the initiating terminal may be included.
  • the address information of the initiating terminal is obtained by the relay terminal during a secure interaction process between the relay terminal and the initiating terminal.
  • the initiating terminal may initiate the establishment process of the first target connection.
  • the initiating terminal and the relay terminal can perform secure interaction.
  • the initiating terminal can send the address information of the initiating terminal to the relay terminal.
  • the method 200 further includes:
  • the target terminal sends a third response message to the relay terminal.
  • the relay terminal receives the third response message sent by the target terminal, and the third response message is the response message of the third request message.
  • the third response message is used to indicate that it is determined to use the second target connection for communication between the initiating terminal and the target terminal, or that the third response message is used to indicate that it is determined to reuse
  • the second target connection transmits services to be transmitted between the initiating terminal and the target terminal.
  • the target terminal may inform the relay terminal through a third response message that it determines to reuse the second target connection.
  • the target terminal may reuse an existing message to implement the function of the third response message, for example, use a link modification acceptance message to confirm reuse of an established connection, or may add a new message to implement the third response message.
  • this application does not limit the specific implementation of the first response message.
  • the third response message is a link modification accept message, or a new connection modification accept message may be added, or a connection reuse accept message may be used to reuse an established connection.
  • the third response message may be used to indicate acceptance of modification to the established second target connection, for example, acceptance of adding an initiating terminal served by the second target connection.
  • the third response message includes address information of the target terminal.
  • the relay terminal can learn the address information of the target terminal through the third response message.
  • the address information of the target terminal may be used by the relay terminal to determine which terminal device to route or forward the service to be transmitted.
  • the address information of the target terminal includes but is not limited to the IP address information of the target terminal and/or the MAC address information of the target terminal.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • the 310 includes:
  • the relay terminal determines to establish the second target connection to conduct the communication between the initiating terminal and the target terminal. communication between.
  • the relay terminal may initiate the establishment process of the second target connection to complete the process between the initiating terminal and the target terminal. Communication between the target terminals.
  • the method 200 further includes:
  • the relay terminal sends a fourth request message to the target terminal, where the fourth request message is used to request establishment of a second target connection between the relay terminal and the target terminal.
  • the target terminal receives the fourth request message sent by the relay terminal.
  • the relay terminal when the second target connection is not established between the relay terminal and the target terminal, the relay terminal sends a fourth request message to the target terminal.
  • the relay terminal when it is determined that the second target connection is established, the relay terminal sends a fourth request message to the target terminal.
  • the relay terminal may reuse an existing message to implement the function of the fourth request message, for example, using a direct communication request message to request the establishment of a connection (that is, the fourth request message may be a direct communication request message ), or a new message may be added to implement the function of the fourth request message.
  • a direct communication request message to request the establishment of a connection
  • a new message may be added to implement the function of the fourth request message.
  • the fourth request message includes at least one of the following information:
  • the identification information of the initiating terminal, the identification information of the target terminal, the address information of the initiating terminal, and the information of the service to be transmitted are transmitted.
  • the target terminal may determine the initiating terminal and the target terminal served by the connection to be established based on the identification information of the initiating terminal and the identification information of the target terminal carried in the fourth request message.
  • the identification information of the initiating terminal is used to identify the initiating terminal.
  • the identification information of the initiating terminal may include but is not limited to the application layer identification and/or link layer identification of the initiating terminal, For example layer2-id.
  • the identification information of the target terminal is used to identify the target terminal.
  • the identification information of the target terminal includes but is not limited to the application layer identification and/or link layer identification of the target terminal, For example layer2-id.
  • the address information of the initiating terminal includes but is not limited to the IP address information of the initiating terminal and/or the MAC address information of the initiating terminal.
  • the information about the service to be transmitted includes but is not limited to at least one of the following:
  • the application identification, service type, and relay service code (RSC) of the service to be transmitted.
  • the identification information of the initiating terminal is obtained by the relay terminal from the initiating terminal.
  • first request information and/or the second request message of the initiating terminal For example, it is obtained from the first request information and/or the second request message of the initiating terminal.
  • first request message and the second request message please refer to the relevant description of the method 200. For the sake of brevity, details will not be described here.
  • the identification information of the initiating terminal is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the context of the first target connection may be stored on the relay terminal, and the context of the first target connection may include the identity of the initiating terminal. information.
  • the identification information of the target terminal is obtained by the relay terminal from the initiating terminal.
  • first request information and/or the second request message of the initiating terminal For example, it is obtained from the first request information and/or the second request message of the initiating terminal.
  • first request message and the second request message please refer to the relevant description of the method 200. For the sake of brevity, details will not be described here.
  • the address information of the initiating terminal is obtained by the relay terminal from the initiating terminal.
  • first request information and/or the second request message of the initiating terminal For example, it is obtained from the first request information and/or the second request message of the initiating terminal.
  • first request message and the second request message please refer to the relevant description of the method 200. For the sake of brevity, details will not be described here.
  • the address information of the initiating terminal is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the context of the first target connection may be stored on the relay terminal.
  • the context of the first target connection The address information of the initiating terminal may be included.
  • the address information of the initiating terminal is obtained by the relay terminal during the security interaction process between the relay terminal and the initiating terminal.
  • the initiating terminal may initiate the establishment process of the first target connection.
  • the initiating terminal and the relay terminal can perform secure interaction.
  • the initiating terminal can send the address information of the initiating terminal to the relay terminal.
  • the information about the service to be transmitted is obtained by the relay terminal from the initiating terminal.
  • the information about the service to be transmitted is obtained from a second request message from the initiating terminal, and the second request message is used to request the establishment of the first target connection.
  • the information about the service to be transmitted is obtained from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the context of the first target connection may be stored on the relay terminal, and the context of the first target connection may include the to-be-transmitted business information.
  • the method 300 further includes:
  • the relay terminal and the target terminal can perform a secure interaction process.
  • the target terminal sends the address information of the target terminal to the relay terminal.
  • the relay terminal can learn the address information of the target terminal during the secure interaction process between the relay terminal and the target terminal.
  • the method 300 further includes:
  • the target terminal sends a fourth response message to the relay terminal.
  • the relay terminal receives a fourth response message sent by the target terminal, where the fourth response message is a response message to the fourth request message.
  • the fourth response message is used to indicate completion of establishment of the second target connection.
  • the target terminal may reuse an existing message to implement the function of the fourth response message, for example, using a direct communication accept message to indicate the completion of connection establishment (that is, the fourth response message may be a direct communication accept message). ), or a new message may be added to implement the function of the fourth response message.
  • a direct communication accept message to indicate the completion of connection establishment
  • the fourth response message may be a direct communication accept message.
  • This application does not limit the specific implementation of the fourth response message.
  • the fourth response message includes address information of the target terminal.
  • the relay terminal can learn the address information of the target terminal through the fourth response message.
  • the address information of the target terminal is obtained by the relay terminal after the fourth response message.
  • the relay terminal and the target terminal may negotiate IP addresses, so that the relay terminal obtains the address of the target terminal. information.
  • the relay terminal and the target terminal may allocate IP addresses, so that the relay terminal obtains the IP address of the target terminal. Address information.
  • the address information of the target terminal is obtained by the relay terminal from the target terminal, or from the second link between the relay terminal and the target terminal stored on the relay terminal.
  • the context of the target connection is obtained, or is obtained during the secure interaction process between the relay terminal and the target terminal, or is negotiated by the relay terminal and the target terminal, or is provided by the relay terminal to the assigned by the target terminal.
  • the method 300 further includes:
  • the relay terminal receives a first request message sent by the initiating terminal.
  • the first request message is used to request the use of a first target connection between the initiating terminal and the target terminal. Communication between target terminals.
  • the first request message includes identification information of the target terminal and/or address information of the initiating terminal.
  • the first request message is a link modification request message.
  • the method 300 further includes:
  • the relay terminal sends a first response message to the initiating terminal, where the first response message is used to indicate that it is determined to use the first target connection for communication between the initiating terminal and the target terminal.
  • the first response message includes address information of the target terminal.
  • the address information of the target terminal is obtained by the relay terminal from the target terminal.
  • the address information of the target terminal is negotiated between the relay terminal and the relay terminal.
  • the address information of the target terminal is allocated by the relay terminal to the target terminal.
  • the address information of the target terminal is obtained by the relay terminal from the target terminal, including:
  • the relay terminal obtains the address information of the target terminal from a third response message and/or a fourth response message of the target terminal, where the third response message is used to indicate that it is determined to use the second target connection to perform all operations. Communication between the initiating terminal and the target terminal, the fourth response message is used to indicate the completion of the establishment of the second target connection; and/or
  • the relay terminal obtains the address information of the target terminal during the secure interaction process between the relay terminal and the target terminal.
  • the first response message is a link modification accept message.
  • the method 300 further includes:
  • the relay terminal receives a second request message sent by the initiating terminal.
  • the second request message is used to request the establishment of a first target connection between the initiating terminal and the target terminal. Communication between target terminals.
  • the second request message includes at least one of the following information:
  • the identification information of the initiating terminal, the identification information of the target terminal, the address information of the initiating terminal, and the information of the service to be transmitted are transmitted.
  • the identification information of the target terminal is used by the relay terminal to determine whether a connection for the service to be transmitted has been established between the target terminal and the relay terminal.
  • the information about the service to be transmitted is used by the relay terminal to determine whether a connection for the service to be transmitted has been established between the relay terminal and the target terminal.
  • the second request message is a direct communication request message.
  • the method 300 further includes:
  • the relay terminal obtains the address information of the initiating terminal.
  • the method 300 further includes:
  • the relay terminal sends a second response message to the initiating terminal, where the second response message is used to indicate completion of establishment of the first target connection.
  • the second response message includes address information of the target terminal.
  • the second response message is a direct communication accept message.
  • first request message first response message
  • second request message second response message
  • the relay terminal can perform the corresponding process according to whether the connection between the relay terminal and the target terminal for the service to be transmitted between the initiating terminal and the target terminal has been established to perform the initiating terminal communication with the target terminal.
  • connection reuse process may be executed.
  • connection establishment process may be executed.
  • the PC5 connection between the relay terminal and the target terminal can serve multiple initiating terminals.
  • the relay terminal performs data routing based on the address information of the initiating terminal, for example, based on the IP address of the initiating terminal. This way, data from different initiating terminals can be distinguished by different IP addresses on the same connection, which is helpful to avoid establishing a separate PC5 between the relay terminal and the target terminal for each initiating terminal.
  • Connections that is, the connections between the initiating terminal and the relay terminal, and the connections between the relay terminal and the target terminal do not require one-to-one mapping, which is beneficial to reducing the number of connections for relay communication through the relay terminal and reducing the number of Following the processing complexity of the terminal.
  • Embodiment 3 and Embodiment 4 in method 300 and Embodiment 1 and Embodiment 2 in method 200 can be implemented in combination.
  • Embodiment 1 and Embodiment 3 can be combined.
  • Embodiment 2 and Embodiment 3 may be implemented in combination, or Embodiment 1 and Embodiment 4 may be implemented in combination, and Embodiment 2 and Embodiment 4 may be implemented in combination.
  • the initiating terminal can reuse the first target connection, and the relay terminal can Reuse the secondary target connection.
  • the initiating terminal can reuse the first target connection, and the relay terminal A secondary target connection can be established.
  • the initiating terminal can establish the first target connection, and the relay terminal
  • the secondary target connection can be reused.
  • the initiating terminal may establish the first target connection, and the relay terminal A secondary target connection can be established.
  • the relay communication method according to the embodiment of the present application is described in detail from the perspective of the initiating terminal and the relay terminal respectively in conjunction with Figure 5 and Figure 6.
  • the method of relay communication according to the embodiment of the present application is described in detail from the perspective of the target terminal.
  • a method of relaying communications according to an embodiment It should be understood that the description on the target device side corresponds to the description on the relay terminal side. Similar descriptions can be found above. To avoid duplication, they will not be described again here.
  • FIG. 7 is a schematic flowchart of a method 400 for relaying communications according to another embodiment of the present application. As shown in Figure 7, the method 400 includes the following content:
  • the target terminal receives the third request message or the fourth request message from the relay terminal.
  • the third request message is used to request the use of the second target connection between the relay terminal and the target terminal for the initiating terminal and the target terminal.
  • the fourth request message is used to request the establishment of a second target connection between the relay terminal and the target terminal for communication between the initiating terminal and the target terminal. communication.
  • the third request message is sent by the relay terminal when the second target connection has been established.
  • the third request message includes identification information of the initiating terminal and/or address information of the initiating terminal.
  • the third request message is a link modification request message.
  • the method 400 further includes:
  • the target terminal sends a third response message to the relay terminal, where the third response message is used to indicate that it is determined to use the second target connection for communication between the initiating terminal and the target terminal.
  • the third response message includes address information of the target terminal.
  • the third response message is a link modification accept message.
  • the fourth request message is sent by the relay terminal when the second target connection is not established between the relay terminal and the target terminal.
  • the fourth request message includes at least one of the following information:
  • the identification information of the initiating terminal, the identification information of the target terminal, the address information of the initiating terminal, and the information of the service to be transmitted are transmitted.
  • the identification information of the initiating terminal is obtained by the relay terminal from the first request information and/or the second request message of the initiating terminal, wherein the first request message is used to request Use the first target connection to communicate between the initiating terminal and the target terminal, and the second request message is used to request the establishment of the first target connection; or
  • the identification information of the initiating terminal is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the identification information of the target terminal is obtained by the relay terminal from the first request information or the second request message of the initiating terminal, wherein the first request message is used to request the use of the Communication between the initiating terminal and the target terminal is carried out following the first target connection between the terminal and the initiating terminal, and the second request message is used to request the establishment of the first target connection.
  • the address information of the initiating terminal is obtained by the relay terminal from the first request information or the second request message of the initiating terminal, wherein the first request message is used to request to use the
  • the first target connection carries out communication between the initiating terminal and the target terminal, and the second request message is used to request the establishment of the first target connection;
  • the address information of the initiating terminal is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal; or,
  • the address information of the initiating terminal is obtained by the relay terminal during the security interaction process between the relay terminal and the initiating terminal.
  • the information about the service to be transmitted is obtained by the relay terminal from a second request message from the initiating terminal, wherein the second request message is used to request the establishment of the first target connection; or,
  • the information about the service to be transmitted is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the fourth request message is a direct communication request message.
  • the method 400 further includes:
  • the target terminal sends the address information of the target terminal to the relay terminal.
  • the method 400 further includes:
  • the target terminal sends a fourth response message to the relay terminal, where the fourth response message is used to indicate completion of establishment of the second target connection.
  • the fourth response message includes address information of the target terminal.
  • the fourth response message is a direct communication accept message.
  • the third request message, the third response message, the fourth request message and the fourth response message please refer to the relevant description in the method 300. For the sake of brevity, they will not be described again here.
  • the relay communication method according to the embodiment of the present application is described in detail from the perspective of the initiating terminal, the relay terminal and the target terminal respectively with reference to Figures 5 to 7.
  • Figures 8 to 10 from the perspective of device interaction
  • the method of relaying communication according to the embodiment of the present application is described in detail.
  • Figure 8 is a schematic interaction diagram of a method of relaying communications according to an embodiment of the present application.
  • the PC5 connection is not established between the initiating UE and the relay UE, or the PC5 connection for the service to be transmitted between the initiating UE and the target UE is not established between the initiating UE and the relay UE.
  • the relay A PC5 connection has been established between the UE and the target UE, or a PC5 connection has been established between the relay UE and the target UE for the service to be transmitted between the initiating UE and the target UE, that is, no PC5 connection has been established between the initiating UE and the relay UE.
  • the first target connection and the second target connection have been established between the relay UE and the target UE.
  • the method 500 may include the following steps:
  • the initiating UE sends a second request message to the relay UE, which is used to request the establishment of a PC5 connection between the initiating UE and the relay UE, or to establish a PC5 between the initiating UE and the relay UE for the service to be transmitted. connect.
  • the initiating UE sends the second request message to the relay UE.
  • the second request message includes identification information of the initiating UE and identification information of the target UE.
  • the identification information of the initiating UE may include an application layer identification and/or a link layer identification of the initiating UE, such as layer 2-ID.
  • the identification information of the target UE may include an application layer identification and/or a link layer identification of the target UE, such as layer 2-ID.
  • the second request information may also include information about the service to be transmitted.
  • the application identifier, service type, relay service code, etc. of the service to be transmitted may also include information about the service to be transmitted.
  • the second request message may also include address information of the initiating UE.
  • address information of the initiating UE may be the IP address, MAC address of the initiating UE, etc.
  • S502 The relay UE and the initiating UE perform secure interaction.
  • the initiating UE may send the address information of the initiating UE to the relay UE.
  • the relay UE sends a third request message to the target UE, used to request to use the second target connection to transmit the service to be transmitted between the initiating UE and the target UE.
  • the relay UE sends the third request message to the target UE.
  • the third request message may be a link modification request message for the established PC5 connection.
  • the third request message may include identification information of the initiating UE.
  • the third request message may also include address information of the initiating UE.
  • address information of the initiating UE may be the IP address, MAC address of the initiating UE, etc.
  • the target UE sends a third response message to the relay UE, indicating that it is determined to reuse the second target connection.
  • the third response message may be a link modification accept message for the established PC5 connection.
  • the third response message may include address information of the target UE.
  • it may be the IP address, MAC address, etc. of the target UE.
  • the relay UE sends a second response message to the initiating UE to indicate completion of the establishment of the PC5 connection between the relay UE and the initiating UE.
  • the second response message includes address information of the target UE.
  • the address information of the target UE may be obtained by the relay UE from the third response message.
  • a second target connection has been established between the relay UE and the target UE, the context of the second target connection is saved on the relay UE, and the address information of the target UE is It may also be that the relay UE obtains the context from the locally stored context of the second target connection.
  • the PC5 connection between the relay UE and the target UE can serve multiple originating UEs.
  • the relay UE performs routing according to the address information. For example, when data from different originating UEs is transmitted through the same connection, it can be transmitted through different originating UEs. IP addresses are distinguished.
  • the establishment of a separate PC5 connection between the relay UE and the target UE for each originating UE is avoided. That is, the connection between the initiating UE and the relay UE, and the connection between the relay UE and the target UE do not require one-to-one mapping, which is beneficial to reducing the number of connections for relay communication through the relay terminal and reducing the number of relay terminals. processing complexity.
  • Figure 9 is a schematic interaction diagram of a method of relaying communications according to yet another embodiment of the present application.
  • a PC5 connection has been established between the initiating UE and the relay UE, or a PC5 connection has been established between the initiating UE and the relay UE for the service to be transmitted between the initiating UE and the target UE.
  • the relay The PC5 connection is not established between the UE and the target UE, or the PC5 connection for the service to be transmitted between the initiating UE and the target UE is not established between the relay UE and the target UE. That is, the PC5 connection between the initiating UE and the relay UE has been established.
  • the first target connection is established, and the second target connection is not established between the relay UE and the target UE.
  • the method 500 may include the following steps:
  • the initiating UE sends a first request message to the relay UE, for requesting to use the established PC5 connection between the initiating UE and the relay UE.
  • the initiating UE sends the first request message to the relay UE.
  • the first request message includes identification information of the target UE.
  • the identification information of the target UE may include an application layer identification and/or a link layer identification of the target UE, such as layer 2-ID.
  • the first request message may also include address information of the initiating UE.
  • address information of the initiating UE may be the IP address, MAC address of the initiating UE, etc.
  • the relay UE sends a fourth request message to the target UE, used to request the establishment of the second target connection to transmit the to-be-transmitted service between the initiating UE and the target UE.
  • the relay UE sends a fourth request message to the target UE.
  • the fourth request message may directly communicate the request message.
  • the fourth request message may include identification information of the initiating UE and identification information of the target UE.
  • the fourth request message also includes information about the service to be transmitted.
  • the application identification, service type, relay service code, etc. of the service to be transmitted For example, the application identification, service type, relay service code, etc. of the service to be transmitted.
  • the fourth request message also includes address information of the initiating UE.
  • address information of the initiating UE For example, it may be the IP address, MAC address of the initiating UE, etc.
  • the identification information of the initiating UE may be obtained by the relay UE from the locally stored context of the first target connection, or obtained from the initiating UE.
  • the address information of the target UE may be obtained by the relay UE from the locally stored context of the first target connection, or obtained from the initiating UE.
  • the information about the service to be transmitted may be obtained by the relay UE from the locally stored context of the first target connection, or obtained from the initiating UE.
  • S503 The relay UE and the target UE perform secure interaction.
  • the target UE may send the address information of the target UE to the relay UE.
  • the target UE sends a fourth response message to the relay UE, indicating that it is determined to establish the second target connection.
  • the fourth response message may be a direct communication acceptance message.
  • the fourth response message may include address information of the target UE.
  • it may be the IP address, MAC address, etc. of the target UE.
  • IP address negotiation or allocation is performed between the relay UE and the target UE, so that the relay UE obtains the address information of the target UE.
  • the relay UE sends a first response message to the initiating UE, indicating that it is determined to reuse the PC5 connection between the relay UE and the initiating UE.
  • the first response message may be a link modification accept message for the established PC5 connection.
  • the first response message includes address information of the target UE.
  • the address information of the target UE may be obtained by the relay UE from the fourth response message, or obtained after the fourth response message.
  • the PC5 link between the relay UE and the originating UE can serve multiple target UEs.
  • the relay UE performs routing according to the address information. For example, when data sent to different target UEs is transmitted through the same connection, it can Distinguish by different IP addresses.
  • the establishment of a separate PC5 link between the relay UE and the originating UE for each target UE is avoided. That is, the link between the initiating UE and the relay UE, and the link between the relay UE and the target UE do not need to be mapped one-to-one, which is beneficial to reducing the number of links for relay communication through the relay terminal and reducing The processing complexity of the relay terminal.
  • Figure 10 is a schematic interaction diagram of a method of relaying communication according to yet another embodiment of the present application.
  • a PC5 connection has been established between the initiating UE and the relay UE, or a PC5 connection has been established between the initiating UE and the relay UE for the service to be transmitted between the initiating UE and the target UE.
  • the relay A PC5 connection has been established between the UE and the target UE, or a PC5 connection has been established between the relay UE and the target UE for the service to be transmitted between the initiating UE and the target UE, that is, a PC5 connection has been established between the initiating UE and the relay UE.
  • the first target connection and the second target connection have been established between the relay UE and the target UE.
  • the method 500 may include the following steps:
  • the initiating UE sends a first request message to the relay UE, for requesting to use the established PC5 connection between the initiating UE and the relay UE.
  • the initiating UE sends the first request message to the relay UE.
  • the first request message includes identification information of the target UE.
  • the identification information of the target UE may include an application layer identification and/or a link layer identification of the target UE, such as layer 2-ID.
  • the first request message may also include address information of the initiating UE.
  • address information of the initiating UE may be the IP address, MAC address of the initiating UE, etc.
  • the relay UE sends a third request message to the target UE, used to request to use the second target connection to transmit the service to be transmitted between the initiating UE and the target UE.
  • the relay UE sends the third request message to the target UE.
  • the third request message may be a link modification request message for the established PC5 connection.
  • the third request message may include identification information of the initiating UE.
  • the third request message may also include address information of the initiating UE.
  • address information of the initiating UE may be the IP address, MAC address of the initiating UE, etc.
  • the identification information of the initiating UE may be obtained by the relay UE from the locally stored context of the first target connection, or obtained from the initiating UE.
  • the address information of the initiating UE may be obtained by the relay UE from the locally stored context of the first target connection, or obtained from the initiating UE.
  • the target UE sends a third response message to the relay UE, indicating that it is determined to reuse the second target connection.
  • the third response message may be a link modification accept message for the established PC5 connection.
  • the third response message may include address information of the target UE.
  • it may be the IP address, MAC address, etc. of the target UE.
  • the relay UE sends a first response message to the initiating UE, indicating that it is determined to reuse the PC5 connection between the relay UE and the initiating UE.
  • the first response message may be a link modification accept message for the established PC5 connection.
  • the first response message includes address information of the target UE.
  • the address information of the target UE may be obtained by the relay UE from the third response message, or obtained from the context of the second target connection stored locally by the relay UE.
  • the PC5 connection between the relay UE and the initiating UE can serve multiple target UEs
  • the PC5 connection between the relay UE and the target UE can serve multiple initiating UEs
  • the relay UE performs operations based on the address information. Routing, for example, when data sent to different target UEs is transmitted through the same connection, it can be distinguished by different IP addresses, and when data from different originating UEs is transmitted through the same connection, it can be distinguished by different IP addresses. It is avoided to establish a separate PC5 connection between the relay UE and the initiating UE for each target UE, and a separate PC5 connection between the relay UE and the target UE for each initiating UE.
  • connection between the initiating UE and the relay UE, and the connection between the relay UE and the target UE do not require one-to-one mapping, which is beneficial to reducing the number of connections for relay communication through the relay terminal and reducing the number of relay terminals. processing complexity.
  • FIG 11 shows a schematic block diagram of an initiating terminal 1000 according to an embodiment of the present application.
  • the initiating terminal 1000 includes:
  • the processing unit 1010 is configured to determine whether to use the first target connection for communication between the initiating terminal and the target terminal according to the establishment of the first target connection between the initiating terminal and the relay terminal.
  • processing unit 1010 is also used to:
  • the first target connection When the first target connection is not established between the initiating terminal and the relay terminal, it is determined to establish the first target connection for communication between the initiating terminal and the target terminal.
  • the initiating terminal 1000 further includes:
  • a communication unit configured to send a first request message to the relay terminal when it is determined to use the first target connection for communication between the initiating terminal and the target terminal, the first request message Used to request to use the first target connection for communication between the initiating terminal and the target terminal.
  • the first request message includes identification information of the target terminal and/or address information of the initiating terminal.
  • the first request message is a link modification request message.
  • the initiating terminal 1000 further includes:
  • a communication unit configured to receive a first response message sent by the relay terminal, where the first response message is used to indicate that it is determined to use the first target connection for communication between the initiating terminal and the target terminal.
  • the first response message includes address information of the target terminal.
  • the first response message is a link modification accept message.
  • the initiating terminal 1000 further includes:
  • a communication unit configured to send a second request message to the relay terminal when it is determined that the first target connection is established, where the second request message is used to request the establishment of the first target connection.
  • the second request message is a direct communication request message.
  • the second request message includes at least one of the following information:
  • the identification information of the initiating terminal, the identification information of the target terminal, the address information of the initiating terminal, and the information of the service to be transmitted are transmitted.
  • the initiating terminal 1000 further includes:
  • a communication unit configured to send the address information of the initiating terminal to the relay terminal during the secure interaction process of the initiating terminal and the relay terminal.
  • the initiating terminal 1000 further includes:
  • a communication unit configured to receive a second response message sent by the relay terminal, where the second response message is used to indicate completion of establishment of the first target connection.
  • the second response message includes address information of the target terminal.
  • the second response message is a direct communication accept message.
  • the address information of the initiating terminal includes network protocol IP address information of the initiating terminal and/or media access control MAC address information of the initiating terminal.
  • the address information of the target terminal includes IP address information of the target terminal and/or MAC address information of the target terminal.
  • the information about the service to be transmitted includes at least one of the following: an application identifier of the service to be transmitted, a service type, and a relay service code.
  • the information about the service to be transmitted is used by the relay terminal to determine whether a connection for the service to be transmitted has been established between the relay terminal and the target terminal.
  • the identification information of the target terminal includes an application layer identification and/or a link layer identification of the target terminal.
  • the identification information of the initiating terminal includes an application layer identification and/or a link layer identification of the initiating terminal.
  • the first target connection is a direct communication connection between the initiating terminal and the relay terminal, or the first target connection is between the initiating terminal and the relay terminal.
  • the above-mentioned communication unit may be a communication interface or transceiver, or an input/output interface of a communication chip or a system on a chip.
  • the above-mentioned processing unit may be one or more processors.
  • the initiating terminal 1000 may correspond to the initiating terminal in the method embodiment of the present application, and the above and other operations and/or functions of each unit in the initiating terminal 1000 are respectively to implement Figures 5 to 10
  • the corresponding process of initiating the terminal in the method embodiment shown is not repeated here for the sake of brevity.
  • FIG 12 shows a schematic block diagram of a relay terminal 1100 according to an embodiment of the present application.
  • the relay terminal 1100 includes:
  • the processing unit 1110 is configured to determine whether to use the second target connection for communication between the initiating terminal and the target terminal according to the establishment of the second target connection between the relay terminal and the target terminal.
  • processing unit 1110 is also used to:
  • the second target connection When the second target connection is not established between the relay terminal and the target terminal, it is determined to establish the second target connection for communication between the initiating terminal and the target terminal.
  • the relay terminal 1100 further includes:
  • a communication unit configured to send a third request message to the target terminal when it is determined to use the second target connection for communication between the initiating terminal and the target terminal, where the third request message is Requesting to use the second target connection for communication between the initiating terminal and the target terminal.
  • the third request message includes identification information of the initiating terminal and/or address information of the initiating terminal.
  • the third request message is a link modification request message.
  • the relay terminal 1100 further includes:
  • a communication unit configured to receive a third response message sent by the target terminal, where the third response message is used to indicate that it is determined to use the second target connection for communication between the initiating terminal and the target terminal.
  • the third response message includes address information of the target terminal.
  • the third response message is a link modification accept message.
  • the relay terminal 1100 further includes:
  • a communication unit configured to send a fourth request message to the target terminal when it is determined to establish the second target connection between the relay terminal and the target terminal, the fourth request message being used to request establishment A second target connection between the relay terminal and the target terminal.
  • the fourth request message includes at least one of the following information:
  • the identification information of the initiating terminal, the identification information of the target terminal, the address information of the initiating terminal, and the information of the service to be transmitted are transmitted.
  • the fourth request message is a direct communication request message.
  • the relay terminal 1100 further includes:
  • a communication unit configured for the relay terminal to obtain the address information of the target terminal during the secure interaction process between the relay terminal and the target terminal.
  • the relay terminal 1100 further includes:
  • a communication unit configured to receive a fourth response message sent by the target terminal, where the fourth response message is used to indicate completion of establishment of the second target connection.
  • the fourth response message includes address information of the target terminal.
  • the fourth response message is a direct communication accept message.
  • processing unit 1110 is also used to:
  • the address information of the target terminal is negotiated with the target terminal.
  • the processing unit 1110 is further configured to allocate address information of the target terminal to the target terminal.
  • the relay terminal 1100 further includes:
  • a communication unit configured to receive a first request message sent by the initiating terminal, where the first request message is used to request the use of a first target connection between the initiating terminal and the target terminal. Communication between target terminals.
  • the first request message includes identification information of the target terminal and/or address information of the initiating terminal.
  • the first request message is a link modification request message.
  • the relay terminal 1100 further includes:
  • a communication unit configured to send a first response message to the initiating terminal, where the first response message is used to indicate that it is determined to use the first target connection for communication between the initiating terminal and the target terminal.
  • the first response message includes address information of the target terminal.
  • the first response message is a link modification accept message.
  • the relay terminal 1100 further includes:
  • a communication unit configured to receive a second request message sent by the initiating terminal.
  • the second request message is used to request the establishment of a first target connection between the initiating terminal and the target terminal. Communication between target terminals.
  • the second request message includes at least one of the following information:
  • the identification information of the initiating terminal, the identification information of the target terminal, the address information of the initiating terminal, and the information of the service to be transmitted are transmitted.
  • the information about the service to be transmitted is used by the relay terminal to determine whether a connection for the service to be transmitted has been established between the relay terminal and the target terminal.
  • the second request message is a direct communication request message.
  • the relay terminal 1100 further includes:
  • a communication unit configured for the relay terminal to obtain the address information of the initiating terminal during the secure interaction process between the initiating terminal and the relay terminal.
  • the relay terminal 1100 further includes:
  • a communication unit configured to send a second response message to the initiating terminal, where the second response message is used to indicate completion of establishment of the first target connection.
  • the second response message includes address information of the target terminal.
  • the second response message is a direct communication accept message.
  • the identification information of the initiating terminal is obtained by the relay terminal from the first request information and/or the second request message of the initiating terminal, wherein the first request message is used to request Use the first target connection to communicate between the initiating terminal and the target terminal, and the second request message is used to request the establishment of the first target connection; or
  • the identification information of the initiating terminal is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the identification information of the target terminal is obtained by the relay terminal from the first request information or the second request message of the initiating terminal, wherein the first request message is used to request the use of the Communication between the initiating terminal and the target terminal is carried out following the first target connection between the terminal and the initiating terminal, and the second request message is used to request the establishment of the first target connection.
  • the address information of the initiating terminal is obtained by the relay terminal from the first request information or the second request message of the initiating terminal, wherein the first request message is used to request to use the
  • the first target connection carries out communication between the initiating terminal and the target terminal, and the second request message is used to request the establishment of the first target connection;
  • the address information of the initiating terminal is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal; or,
  • the address information of the initiating terminal is obtained by the relay terminal during the security interaction process between the relay terminal and the initiating terminal.
  • the information about the service to be transmitted is obtained by the relay terminal from a second request message from the initiating terminal, wherein the second request message is used to request the establishment of the first target connection; or,
  • the information about the service to be transmitted is obtained by the relay terminal from the context of the first target connection between the relay terminal and the initiating terminal stored on the relay terminal.
  • the address information of the target terminal is obtained by the relay terminal from the target terminal.
  • the address information of the target terminal is negotiated between the relay terminal and the relay terminal.
  • the address information of the target terminal is allocated by the relay terminal to the target terminal.
  • the address information of the target terminal is obtained by the relay terminal from the target terminal, including:
  • the relay terminal obtains the address information of the target terminal from a third response message and/or a fourth response message of the target terminal, where the third response message is used to indicate that it is determined to use the second target connection to perform all operations. Communication between the initiating terminal and the target terminal, the fourth response message is used to indicate the completion of the establishment of the second target connection; and/or
  • the relay terminal obtains the address information of the target terminal during the secure interaction process between the relay terminal and the target terminal.
  • the identification information of the initiating terminal includes an application layer identification and/or a link layer identification of the initiating terminal.
  • the identification information of the target terminal includes an application layer identification and/or a link layer identification of the target terminal.
  • the address information of the initiating terminal includes network protocol IP address information of the initiating terminal and/or media access control MAC address information of the initiating terminal.
  • the address information of the target terminal includes IP address information of the target terminal and/or MAC address information of the target terminal.
  • the information about the service to be transmitted includes at least one of the following: application identification of the service to be transmitted, service type, and relay service code.
  • the second target connection is a direct communication connection between the relay terminal and the target terminal, or the second target connection is between the relay terminal and the target terminal.
  • the above-mentioned communication unit may be a communication interface or transceiver, or an input/output interface of a communication chip or a system on a chip.
  • the above-mentioned processing unit may be one or more processors.
  • relay terminal 1100 may correspond to the relay terminal in the method embodiment of the present application, and the above and other operations and/or functions of each unit in the relay terminal 1100 are respectively to implement Figure 5 As for the corresponding process of the relay terminal in the method embodiment shown in Figure 10, for the sake of brevity, it will not be described again here.
  • FIG. 13 shows a schematic block diagram of a target terminal 1200 according to an embodiment of the present application.
  • the target terminal 1200 includes:
  • the communication unit 1210 is configured to receive a third request message or a fourth request message from the relay terminal, where the third request message is used to request the use of the second target connection between the relay terminal and the target terminal for the initiating terminal and the target terminal.
  • the fourth request message is used to request the establishment of a second target connection between the relay terminal and the target terminal for communication between the initiating terminal and the target terminal. communication.
  • the third request message is sent by the relay terminal when the second target connection has been established.
  • the third request message includes identification information of the initiating terminal and/or address information of the initiating terminal.
  • the third request message is a link modification request message.
  • the communication unit 1210 is further configured to: send a third response message to the relay terminal, where the third response message is used to indicate that it is determined to use the second target connection for the initiating terminal and Communication between the target terminals.
  • the third response message includes address information of the target terminal.
  • the third response message is a link modification accept message.
  • the fourth request message is sent by the relay terminal when the second target connection is not established between the relay terminal and the target terminal.
  • the fourth request message includes at least one of the following information:
  • the identification information of the initiating terminal, the identification information of the target terminal, the address information of the initiating terminal, and the information of the service to be transmitted are transmitted.
  • the fourth request message is a direct communication request message.
  • the communication unit 1210 is also used to:
  • the address information of the target terminal is sent to the relay terminal.
  • the communication unit 1210 is also used to:
  • a fourth response message is sent to the relay terminal, where the fourth response message is used to indicate completion of establishment of the second target connection.
  • the fourth response message includes address information of the target terminal.
  • the fourth response message is a direct communication accept message.
  • the identification information of the initiating terminal includes an application layer identification and/or a link layer identification of the initiating terminal.
  • the identification information of the target terminal includes an application layer identification and/or a link layer identification of the target terminal.
  • the address information of the initiating terminal includes network protocol IP address information of the initiating terminal and/or media access control MAC address information of the initiating terminal.
  • the address information of the target terminal includes IP address information of the target terminal and/or MAC address information of the target terminal.
  • the information about the service to be transmitted includes at least one of the following: an application identifier of the service to be transmitted, a service type, and a relay service code.
  • the second target connection is a direct communication connection between the relay terminal and the target terminal, or the second target connection is between the relay terminal and the target terminal.
  • the above-mentioned communication unit may be a communication interface or transceiver, or an input/output interface of a communication chip or a system on a chip.
  • the above-mentioned processing unit may be one or more processors.
  • target terminal 1200 may correspond to the target terminal in the method embodiment of the present application, and the above and other operations and/or functions of each unit in the target terminal 1200 are respectively to implement Figures 5 to 10
  • the corresponding process of the target terminal in the method embodiment shown is not repeated here for the sake of brevity.
  • Figure 14 is a schematic structural diagram of a communication device 600 provided by an embodiment of the present application.
  • the communication device 600 shown in Figure 14 includes a processor 610.
  • the processor 610 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the communication device 600 may further include a memory 620.
  • the processor 610 can call and run the computer program from the memory 620 to implement the method in the embodiment of the present application.
  • the memory 620 may be a separate device independent of the processor 610 , or may be integrated into the processor 610 .
  • the communication device 600 may also include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
  • the transceiver 630 may include a transmitter and a receiver.
  • the transceiver 630 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 600 can specifically be the initiating terminal in the embodiment of the present application, and the communication device 600 can implement the corresponding processes implemented by the initiating terminal in the various methods of the embodiment of the present application. For the sake of brevity, details will not be repeated here. .
  • the communication device 600 can be a relay terminal in the embodiment of the present application, and the communication device 600 can implement the corresponding processes implemented by the relay terminal in the various methods of the embodiment of the present application. For the sake of brevity, they are not mentioned here. Again.
  • the communication device 600 may specifically be a target terminal in the embodiment of the present application, and the communication device 600 may implement the corresponding processes implemented by the target terminal in the various methods of the embodiment of the present application. For the sake of brevity, details will not be repeated here. .
  • Figure 15 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 700 shown in Figure 15 includes a processor 710.
  • the processor 710 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the chip 700 may also include a memory 720 .
  • the processor 710 can call and run the computer program from the memory 720 to implement the method in the embodiment of the present application.
  • the memory 720 may be a separate device independent of the processor 710 , or may be integrated into the processor 710 .
  • the chip 700 may also include an input interface 730.
  • the processor 710 can control the input interface 730 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
  • the chip 700 may also include an output interface 740.
  • the processor 710 can control the output interface 740 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
  • the chip can be applied to the initiating terminal in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the initiating terminal in the various methods of the embodiment of the present application. For the sake of brevity, details will not be described here.
  • the chip can be applied to the relay terminal in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the relay terminal in the various methods of the embodiment of the present application.
  • the chip can implement the corresponding processes implemented by the relay terminal in the various methods of the embodiment of the present application.
  • the chip can be applied to the target terminal in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the target terminal in the various methods of the embodiment of the present application.
  • the details will not be described again.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Figure 16 is a schematic block diagram of a communication system 900 provided by an embodiment of the present application. As shown in FIG. 16 , the communication system 900 includes an originating terminal 910 , a relay terminal 920 and a target terminal 930 .
  • the initiating terminal 910 can be used to implement the corresponding functions implemented by the initiating terminal in the above method
  • the relay terminal 920 can be used to implement the corresponding functions implemented by the relay terminal in the above method
  • the target terminal 930 can It is used to implement the corresponding functions implemented by the target terminal in the above method. For the sake of simplicity, they will not be described again here.
  • the processor in the embodiment of the present application may be an integrated circuit chip and has signal processing capabilities.
  • each step of the above method embodiment can be completed through an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other available processors.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
  • the steps of the method disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other mature storage media in this field.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory may be Random Access Memory (RAM), which is used as an external cache.
  • RAM Random Access Memory
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • Synchlink DRAM SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiment of the present application can also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, memories in embodiments of the present application are intended to include, but are not limited to, these and any other suitable types of memories.
  • Embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium can be applied to the initiating terminal in the embodiment of the present application, and the computer program causes the computer to execute the corresponding processes implemented by the initiating terminal in the various methods of the embodiment of the present application. For the sake of simplicity, here No longer.
  • the computer-readable storage medium can be applied to the relay terminal in the embodiment of the present application, and the computer program causes the computer to execute the corresponding processes implemented by the relay terminal in the various methods of the embodiment of the present application. For the sake of simplicity, I won’t go into details here.
  • the computer-readable storage medium can be applied to the target terminal in the embodiment of the present application, and the computer program causes the computer to execute the corresponding processes implemented by the target terminal in the various methods of the embodiment of the present application. For the sake of simplicity, here No longer.
  • An embodiment of the present application also provides a computer program product, including computer program instructions.
  • the computer program product can be applied to the initiating terminal in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the initiating terminal in the various methods of the embodiment of the present application. For the sake of brevity, these are not included here. Again.
  • the computer program product can be applied to the relay terminal in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the relay terminal in the various methods of the embodiment of the present application. For simplicity, in This will not be described again.
  • the computer program product can be applied to the target terminal in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the target terminal in the various methods of the embodiment of the present application. For the sake of brevity, they are not included here. Again.
  • An embodiment of the present application also provides a computer program.
  • the computer program can be applied to the initiating terminal in the embodiment of the present application.
  • the computer program When the computer program is run on the computer, it causes the computer to execute the corresponding processes implemented by the initiating terminal in the various methods of the embodiment of the present application. For the sake of simplicity , which will not be described in detail here.
  • the computer program can be applied to the relay terminal in the embodiment of the present application.
  • the computer program When the computer program is run on the computer, it causes the computer to execute the corresponding processes implemented by the relay terminal in the various methods of the embodiment of the present application.
  • the computer program When the computer program is run on the computer, it causes the computer to execute the corresponding processes implemented by the relay terminal in the various methods of the embodiment of the present application.
  • the computer program For the sake of brevity, no further details will be given here.
  • the computer program can be applied to the target terminal in the embodiment of the present application.
  • the computer program When the computer program is run on the computer, it causes the computer to execute the corresponding processes implemented by the target terminal in the various methods of the embodiment of the present application. For the sake of simplicity , which will not be described in detail here.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种中继通信的方法、发起终端、中继终端和目标终端,该方法包括:发起终端根据所述发起终端和中继终端之间是否已建立第一目标连接,确定是否使用所述第一目标连接进行所述发起终端和目标终端之间的通信。

Description

中继通信的方法、发起终端、中继终端和目标终端 技术领域
本申请实施例涉及通信领域,具体涉及一种中继通信的方法、发起终端、中继终端和目标终端。
背景技术
在一些场景中,具有临近业务(Proximity-based Services,Prose)能力的发起终端可以通过具有Prose能力的中继(Relay)终端和目标终端进行业务的交互,具体地,在发起终端和中继终端之间以及中继终端和目标终端之间分别建立一条链路,用于该发起终端与该目标终端之间的通信。
当通过中继终端通信的终端数量增多时,需要为每个发起终端以及每个目标终端建立对应的链路,则链路的数量非常多,增加了中继终端的处理复杂度,并且由于中继终端能处理的链路数量有限,也限制了可以通过中继终端进行通信的终端数量,因此如何提升中继通信性能是一项亟需解决的问题。
发明内容
本申请提供了一种中继通信的方法、发起终端、中继终端和目标终端,有利于降低通过中继终端进行中继通信的链路数量,提升中继性能。
第一方面,提供了一种中继通信的方法,包括:发起终端根据所述发起终端和中继终端之间的第一目标连接的建立情况,确定是否使用所述第一目标连接进行所述发起终端和目标终端之间的通信。
第二方面,提供了一种中继通信的方法,包括:中继终端根据所述中继终端和目标终端之间的第二目标连接的建立情况,确定是否使用所述第二目标连接进行发起终端和目标终端之间的通信。
第三方面,提供了一种中继通信的方法,包括:目标终端接收中继终端的第三请求消息或第四请求消息,所述第三请求消息用于请求使用所述中继终端和所述目标终端之间的第二目标连接进行发起终端和所述目标终端之间的通信,所述第四请求消息用于请求建立所述中继终端和所述目标终端之间的第二目标连接以进行所述发起终端和所述目标终端之间的通信。
第四方面,提供了一种发起终端,用于执行上述第一方面或其各实现方式中的方法。
具体地,该发起终端包括用于执行上述第一方面或其各实现方式中的方法的功能模块。
第五方面,提供了一种中继终端,用于执行上述第二方面或其各实现方式中的方法。
具体地,该中继终端包括用于执行上述第二方面或其各实现方式中的方法的功能模块。
第六方面,提供了一种目标终端,用于执行上述第三方面或其各实现方式中的方法。
具体地,该目标终端包括用于执行上述第三方面或其各实现方式中的方法的功能模块。
第七方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
第八方面,提供了一种芯片,用于实现上述第一方面至第三方面中的任一方面或其各实现方式中的方法。具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该装置的设备执行如上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
第九方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
第十方面,提供了一种计算机程序产品,包括计算机程序指令,所述计算机程序指令使得计算机执行上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
第十一方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
通过上述技术方案,发起终端可以根据发起终端和中继终端是否已建立用于发起终端和目标终端之间的待传输业务的连接,确定是否使用所述连接传输发起终端和目标终端之间的业务;和/或
中继终端可以根据中继终端和目标终端之间是否已建立用于发起终端和目标终端之间的待传输业务的连接,确定是否使用所述连接传输发起终端和目标终端之间的业务。
也就是说,在本申请实施例中,发起终端和中继终端之间的连接可以服务于多个发起终端,和/或,中继终端和目标终端之间的连接可以服务于多个发起终端,即发起终端与中继终端之间的连接,以及中继终端与目标终端之间的连接不需要进行一对一映射,有利于降低通过中继终端进行中继通信的连接数量,降低中继终端的处理复杂度。
附图说明
图1是本申请实施例提供的一种通信系统架构的示意性图。
图2是UE之间建立PC5连接的示意性交互图。
图3是两个UE通过中继UE进行通信的示意性图。
图4是UE之间通过中继UE进行通信的示意性图。
图5是本申请实施例提供的一种中继通信的方法的示意性图。
图6是本申请实施例提供的另一种中继通信的方法的示意性图。
图7是本申请实施例提供的又一种中继通信的方法的示意性图。
图8是本申请实施例提供的一种中继通信的方法的示意性交互图。
图9是本申请实施例提供的另一种中继通信的方法的示意性交互图。
图10是本申请实施例提供的又一种中继通信的方法的示意性交互图。
图11是本申请实施例提供的一种发起终端的示意性框图。
图12是本申请实施例提供的一种中继终端的示意性框图。
图13是本申请实施例提供的一种目标终端的示意性框图。
图14是本申请实施例提供的一种通信设备的示意性框图。
图15是本申请实施例提供的一种芯片的示意性框图。
图16是本申请实施例提供的一种通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。针对本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新空口(New Radio,NR)系统、NR系统的演进系统、免授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、免授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、下一代通信系统或其他通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),以及车辆间(Vehicle to Vehicle,V2V)通信等,本申请实施例也可以应用于这些通信系统。
可选地,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。
本申请实施例对应用的频谱并不限定。例如,本申请实施例可以应用于授权频谱,也可以应用于免授权频谱。
图1示例性地示出了一种本申请应用的通信系统100的示意图。如图1所示,该通信系统100主要包括终端设备(User Equipment,UE)101、接入网(Access Network,AN)或无线接入网(radio access network,RAN)设备102、接入与移动性管理功能(Access and Mobility Management Function,AMF)实体103、会话管理功能(Session Management Function,SMF)实体104、用户面功能(User Plane Function,UPF)实体105、策略控制功能(Policy Control function,PCF)实体106、统一数据管理(Unified Data Management,UDM)实体107、数据网络(Data Network,DN)108、应用功能(Application Function,AF)实体109、鉴权服务器功能(Authentication Server Function,AUSF)实体110、网络切片选择功能(Network Slice Selection Function,NSSF)实体111。
具体地,在通信系统100中,UE 101通过Uu接口与AN或RAN设备102进行接入层连接,以交互接入层消息及无线数据传输,UE 101通过N1接口与AMF实体103进行非接入层(Non-Access Stratum,NAS)连接,以交互NAS消息;AN或RAN设备102通过N2接口与AMF实体103连接,以及AN或RAN设备102通过N3接口与UPF实体105连接;多个UPF实体105之间通过N9接口连接,UPF实体105通过N6接口与DN 108连接,同时,UPF实体105通过N4接口与SMF实体104连接;SMF实体104通过N7接口与PCF实体106连接,SMF实体104通过N10接口与UDM实体 107连接,SMF实体104通过N4接口控制UPF实体105,同时,SMF实体104通过N11接口与AMF实体103连接;多个AMF实体103之间通过N14接口连接,AMF实体103通过N8接口与UDM实体107连接,AMF实体103通过N12接口与AUSF实体110连接,AMF实体103通过N22接口与NSSF实体111连接,同时,AMF实体103通过N15接口与PCF实体106连接;PCF实体106通过N5接口与AF实体109连接;AUSF实体110通过N13接口与UDM实体107连接。
在通信系统100中,UDM实体107是核心网中的签约数据库,存储用户在5G网络中的签约数据。AMF实体103是核心网中的移动性管理功能,SMF实体104是核心网中的会话管理功能,AMF实体103在对UE 101进行移动性管理之外,还负责将从会话管理相关消息在UE 101和SMF实体104之间的转发。PCF实体106是核心网中的策略管理功能,负责制定对UE 101的移动性管理、会话管理、计费等相关的策略。UPF实体105是核心网中的用户面功能,通过N6接口与外部数据网络进行数据传输,通过N3接口与AN设备102进行数据传输。UE 101通过Uu口接入5G网络后,在SMF实体104的控制下建立UE 101到UPF实体105的协议数据单元(Protocol Data Unit,PDU)会话数据连接,从而进行数据传输。AMF实体103和SMF实体104分别通过N8和N10接口从UDM实体107获取用户签约数据,通过N15和N7接口从PCF实体106获取策略数据。
另外,通信系统100中还存在网络开放功能(Network Exposure Function,NEF)实体,用于与第三方应用服务器接口,在核心网节点与第三方应用之间进行信息传递。
需要说明的是,上述通信系统100是以5G通信系统为例进行说明,当然,本申请也可以适用于其他3GPP通信系统,例如4G通信系统,或者未来的3GPP通信系统,本申请对此并不限定。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。
本申请实施例结合终端设备和网络设备描述了各个实施例,其中:终端设备也可以称为用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。终端设备可以是WLAN中的站点(STAION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备以及下一代通信系统,例如,NR网络中的终端设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端设备等。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
上述AN设备102可以是用于与移动设备通信的设备,AN设备102可以是WLAN中的接入点(Access Point,AP),GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA中的基站(NodeB,NB),还可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的基站(例如gNB)或者未来演进的PLMN网络中的网络设备等。
在本申请实施例中,网络设备为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本申请的实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。
在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可 以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。
在一些场景中,具有临近业务(Proximity-based Services,Prose)能力的UE可以通过PC5接口与具有Prose能力的另外一个UE直接通信。图2是UE之间建立PC5连接的示意性交互图。
如图2所示,UE1为连接建立的发起UE,UE2,UE3和UE4为连接建立的目标UE。
步骤1:目标UE确定用于信令接收的目标层2(layer-2)标识(identity,ID)。
例如,UE-2确定用于信令接收的目标layer-2ID,UE-3确定用于信令接收的目标layer-2ID,UE-4确定用于信令接收的目标layer-2ID。
步骤2:UE-1的应用层提供用于单播近距离通信的应用层信息。
步骤3:UE-1提供广播或单播方式发送直接通信请求消息。
在一些情况中,UE-1可以发起目标为UE的近距离链路建立,以建立目标为UE-2为例,具体可以包括如下步骤:
步骤4a:UE-1和UE-2进行安全建立。
步骤5a:UE-2采用单播方式发送直接通信接受消息。
步骤6a:UE-1和UE-2通过建立的近距离链路进行单播数据单元传输。
在另一些情况中,UE-1可以发起目标为业务的近距离链路建立,以发起UE-1和UE-2之间的目标为业务的近距离链路建立,以及UE-1和UE-4之间的目标为业务的近距离链路建立为例进行说明,具体可以包括如下步骤:
步骤4b:UE-1和UE-2进行安全建立,以及UE-1和UE-4进行安全建立。
步骤5b:UE-2采用单播方式发送直接通信接受消息,以及UE-4采用单播方式发送直接通信接受消息。
步骤6b:UE-1和UE-2通过建立的近距离链路进行单播数据单元传输,以及UE-1和UE-4通过建立的近距离链路进行单播数据单元传输。
在一些场景中,当两个具有Prose能力的UE距离较远,无法直接通过PC5接口建立通信时,还可以通过一个具有Prose能力的中继(Relay)UE进行通信的中转。图3是通过中继UE进行业务交互的示意性图。
如图3所示,Relay UE可以通过PC5接口与UE-1进行直接通信,还可以通过PC5接口与UE-2直接通信,则UE-1和UE-2可以通过Relay UE进行业务交互。
在相关技术中,一种UE之间通过Relay UE(记为UE-R)通信的方法如图4所示,UE-1为每个目标UE(例如UE-2,UE-3)在UE-1和UE-R之间都单独建立一个链路,例如,链路1-a用于UE-1与UE-2通信,链路2-a用于UE-1和UE-3通信,UE-4也为每个目标UE在UE-4和UE-R之间单独建立一个链路,例如,链路3-a用于UE-4和UE-2通信,链路4-a用于UE-4和UE-3通信。
相应的,对于每个发起UE(例如UE-1,UE-4),UE-R和目标UE之间也都单独建立一个链路,例如,链路1-b用于UE-1与UE-2之间的通信,链路3-b用于UE-4与UE-2之间的通信,链路2-b用于UE-1与UE-3之间的通信,链路4-b用于UE-4与UE-3之间的通信,这样UE-R只需要将链路1-a与链路1-b关联,就可以进行UE-1与UE-2之间的数据转发,类似地,将链路2-a与链路2-b关联,可以进行UE-1与UE-3之间的数据转发,将链路3-a与链路3-b关联,可以进行UE-4与UE-2之间的数据转发,将链路4-a与链路4-b关联,可以进行UE-4与UE-3之间的数据转发。
但是,当通过中继UE通信的UE数量增加时,需要建立的链路也会相应的增加,增加了中继UE的处理复杂度,并且由于中继UE能处理的链路数量有限,也限制了可以通过中继UE进行通信的UE数量。
为便于理解本申请实施例的技术方案,以下通过具体实施例详述本申请的技术方案。以下相关技术作为可选方案与本申请实施例的技术方案可以进行任意结合,其均属于本申请实施例的保护范围。本申请实施例包括以下内容中的至少部分内容。
图5是根据本申请实施例的中继通信的方法200的示意性图,如图5所示,该方法200包括如下内容:
S210,发起终端根据所述发起终端和中继终端之间的第一目标连接的建立情况,确定是否使用所述第一目标连接进行所述发起终端和目标终端之间的通信。
在一些实施例中,所述发起终端可以为图1所示的通信系统中的UE 101,该发起终端的具体实现参考图1所示实施例的相关描述,这里不再赘述。
需要说明的是,在本申请实施例中,连接也可以替换为链路,路径等,例如,第一目标连接可以替换为第一目标链路,第二目标连接可以替换为第二目标链路,PC5连接可以替换为PC5链路,本申请对此不作限定。
在一些实施例中,所述发起终端已选择通过所述中继终端与所述目标终端进行通信。
在一些实施例中,所述发起终端和所述中继终端之间的第一目标连接的建立情况可以包括:
所述发起终端和所述中继终端之间是否已建立第一目标连接。
在一些实施例中,所述第一目标连接为所述发起终端和所述中继终端之间的直接通信连接。
例如,所述第一目标连接为所述发起终端和所述中继终端之间的PC5连接。
在另一些实施例中,所述第一目标连接为所述发起终端和所述中继终端之间的用于特定业务的直接通信连接,所述特定业务为所述发起终端和所述目标终端之间的待传输业务。
也即,发起终端和中继终端之间的连接可以是业务粒度的,或者,也可以是不区分业务的。
在一些实施例中,所述发起终端和中继终端之间是否已建立第一目标连接,包括:
所述发起终端和所述中继终端之间是否已建立PC5连接。
例如,在发起终端有待传输业务发送给目标终端的情况下,发起终端可以确定发起终端和中继终端之间是否已建立PC5连接。
可选地,在所述发起终端和中继终端之间已建立PC5连接的情况下,发起终端可以确定发起终端和中继终端之间已建立第一目标连接,否则,确定发起终端和中继终端之间未建立第一目标连接。
在另一些实施例中,所述发起终端和所述中继终端之间是否已建立第一目标连接,包括:
所述发起终端和所述中继终端之间是否已建立用于所述待传输业务的PC5连接。
例如,在发起终端有待传输业务发送给目标终端的情况下,发起终端可以确定发起终端和中继终端是否已建立用于所述待传输业务的PC5连接。
可选地,在所述发起终端和中继终端之间已建立用于所述待传输业务的PC5连接的情况下,发起终端可以确定发起终端和中继终端之间已建立第一目标连接,否则,确定发起终端和中继终端之间未建立第一目标连接。
以下,结合实施例一和实施例二,对本申请实施例的中继通信的方法200进行说明。
实施例一:
在本申请一些实施例中,所述S210包括:
在所述发起终端和所述中继终端之间已建立所述第一目标连接的情况下,所述发起终端确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信(或者说,业务交互),或者说,重用所述第一目标连接进行所述发起终端和所述目标终端之间的通信(或者说,业务交互)。
因此,在本申请实施例中,在发起终端和中继终端之间已建立第一目标连接的情况下,发起终端可以重用所述第一目标连接与目标终端进行通信,而不是为所述目标终端建立新的连接,有利于降低通过中继终端进行中继通信的连接数量,降低了中继终端的处理复杂度。
为便于区分和说明,本申请实施例中的目标终端记为第一目标终端,已建立的所述第一目标连接用于所述发起终端和第二目标终端之间的通信,即,发起终端可以重用第一目标连接进行发起终端和第一目标终端之间的通信,以及发起终端和第二目标终端之间的通信,或者,也可以重用第一目标连接进行发起终端和更多个目标终端之间的通信,即第一目标连接可以服务多个目标终端。
在本申请一些实施例中,所述待传输业务为所述发起终端和所述第一目标终端之间的待传输业务。
在申请一些实施例中,所述方法200还包括:
所述发起终端向所述中继终端发送第一请求消息,所述第一请求消息用于请求使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信,或者说,所述第一请求消息用于请求重用所述第一目标连接传输所述发起终端和所述目标终端之间的待传输业务。
对应地,所述中继终端接收所述发起终端的第一请求消息。
例如,在所述发起终端和所述中继终端之间已建立所述第一目标连接的情况下,所述发起终端向所述中继终端发送所述第一请求消息。
又例如,在所述发起终端确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信的情况下,所述发起终端向所述中继终端发送所述第一请求消息。
在一些实施例中,所述发起终端可以复用已有消息实现所述第一请求消息的功能,例如,利用链路修改请求消息请求重用已建立的连接,或者,也可以新增消息实现第一请求消息的功能,本申请对于第一请求消息的具体实现不作限定。
例如,所述第一请求消息为链路修改请求消息,或者,也可以新增连接修改请求消息,或连接重用请求消息进行已建立连接的重用。
可选地,第一请求消息可以用于对已建立的第一目标连接进行修改,比如,新增该第一目标连接所服务的目标终端。
作为示例,第一目标连接是UE-1到UE-R的连接,第一目标连接用于UE-1与UE-2的通信,即发起终端为UE-1,中继终端为UE-R,目标终端为UE-2。当UE-1还选择通过UE-R与UE-3进行通信时,也可以使用该第一目标连接,则第一目标连接可以用于UE-1与UE-2以及UE-3的通信,即将第一目标连接所服务的目标终端由UE-2修改为UE-2和UE-3。
在一些实施例中,所述第一请求消息包括所述目标终端的标识信息和/或发起终端的地址信息。
在一些实施例中,通过在所述第一请求消息中携带所述目标终端的标识信息,可以通知所述中继终端重用所述第一目标连接的中继通信对应的目标终端,或者说,新增的所述第一目标连接所服务的目标终端。
在一些实施例中,所述发起终端的地址信息可以用于所述中继终端确定将待传输业务路由或转发给哪个终端设备,或者,待传输业务来自哪个发起终端。
在一些实施例中,所述发起终端的地址信息包括但不限于所述发起终端的网络协议(Internet Protocol,IP)地址信息和/或所述发起终端的媒体接入控制(Media Access Control,MAC)地址信息。
在一些实施例中,所述目标终端的标识信息可以用于标识所述目标终端,例如所述目标终端的标识信息可以包括但不限于所述目标终端的应用层标识和/或链路层标识,例如层2-ID。
可选地,所述中继终端可以根据所述目标终端的标识信息确定所述中继终端和所述目标终端之间是否已建立第二目标连接,进一步可以确定是否进行第二目标连接的重用,具体实现在方法300中进行说明,这里不作赘述。
在一些实施例中,所述第二目标连接为所述中继终端和所述目标终端之间的直接通信连接。
例如,所述第二目标连接为所述中继终端和所述目标终端之间的PC5连接。
在另一些实施例中,所述第二目标连接为所述中继终端和所述目标终端之间的用于特定业务的直接通信连接,所述特定业务为所述发起终端和所述目标终端之间的待传输业务。
也即,所述中继终端和所述目标终端之间的连接可以是业务粒度的,或者,也可以是不区分业务的。
因此,在本申请一些实施例中,所述发起终端可以通过所述第一目标连接与多个目标终端进行通信,和/或,所述中继终端可以通过第二目标连接中继多个发起终端的待传输业务,则对于所述中继终端而言,如何区分待传输业务的发起终端和/或目标终端以便进行正确的数据转发也是一个需要解决的问题。
在一些实施例中,所述中继终端可以根据所述发起终端的地址信息和/或所述目标终端的地址信息进行数据的转发或路由。
例如,当第一目标连接服务于多个目标终端时,中继终端可以根据目标终端的地址信息确定将待传输业务转发给哪个目标终端。
又例如,当第二目标连接服务于多个发起终端时,中继终端可以根据发起终端的地址信息确定待传输业务来自哪个发起终端。
在申请一些实施例中,所述方法200还包括:
所述中继终端向所述发起终端发送第一响应消息。
对应地,所述发起终端接收所述中继终端发送的第一响应消息,所述第一响应消息为所述第一请求消息的响应消息。
在一些实施例中,所述第一响应消息用于指示确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信,或者说,第一响应消息用于指示确定重用所述第一目标连接传输发起终端和目标终端之间的待传输业务。
即,所述中继终端可以通过第一响应消息告知所述发起终端确定重用第一目标连接。
在一些实施例中,所述中继终端可以复用已有消息实现所述第一响应消息的功能,例如,利用链路修改接受消息确认重用已建立的连接,或者,也可以新增消息实现第一响应消息的功能,本申请对于第一响应消息的具体实现不作限定。
例如,所述第一响应消息为链路修改接受消息,或者,也可以新增连接修改接受消息,或连接重用接受消息进行已建立连接的重用。
可选地,所述第一响应消息可以用于指示接受对已建立的第一目标连接进行修改,例如接受新增所述第一目标连接所服务的目标终端。
在一些实施例中,所述第一响应消息包括所述目标终端的地址信息。
即,所述发起终端可以通过所述第一响应消息获知所述目标终端的地址信息。
在一些实施例中,所述目标终端的地址信息可以用于所述中继终端确定将待传输业务路由或转发给哪个终端设备。
在一些实施例中,所述目标终端的地址信息包括但不限于所述目标终端的IP地址信息和/或所述目标终端的MAC地址信息。
应理解,本申请实施例并不限定所述中继终端对于所述目标终端的地址信息的获取方式,以下结合具体实施例对目标终端的地址信息的获取方式进行说明,但本申请并不限于此。
在一些实现方式中,所述目标终端的地址信息是所述中继终端从所述目标终端获取的。
例如,所述目标终端的地址信息是从所述目标终端的第三响应消息和/或第四响应消息获取的,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信,所述第四响应消息用于指示完成所述第二目标连接的建立,所述第三响应消息和所述第四响应消息的具体实现在方法300中进行说明,这里不再赘述。
在另一些实现方式中,所述目标终端的地址信息是所述中继终端和所述目标终端协商的,或者,所述中继终端给所述目标终端分配的。
例如,所述中继终端在接收到所述目标终端的第四响应消息之后,所述中继终端与所述目标终端可以进行IP地址协商,从而所述中继终端可以获得所述目标终端的地址信息。
又例如,所述中继终端在接收到所述目标终端的第四响应消息之后,所述中继终端与所述目标终端可以进行IP地址分配,从而所述中继终端获得所述目标终端的地址信息。
在又一些实现方式中,所述目标终端的地址信息是所述中继终端从所述中继终端上存储的所述中继终端和所述目标终端之间的第二目标连接的上下文获得的。
例如,在所述中继终端和所述目标终端之间已建立所述第二目标连接的情况下,所述中继终端上可以存储所述第二目标连接的上下文,所述第二目标连接的上下文可以包括所述目标终端的地址信息。
在再一些实现方式中,所述目标终端的地址信息是所述中继终端在所述中继终端和所述目标终端的安全交互流程中获得的。
例如,在所述中继终端和所述目标终端之间未建立所述第二目标连接的情况下,所述中继终端可以发起所述第二目标连接的建立流程,在所述第二目标连接的建立流程中,所述中继终端和所述目标终端可以进行安全交互,在安全交互流程中所述目标终端可以向所述中继终端发送所述目标终端的地址信息。
实施例二:
在本申请另一些实施例中,所述S210包括:
在所述发起终端和所述中继终端之间未建立所述第一目标连接的情况下,所述发起终端确定建立所述第一目标连接以进行所述发起终端和所述目标终端之间的通信。
因此,在本申请实施例中,在所述发起终端和所述中继终端之间未建立所述第一目标连接的情况下,所述发起终端可以发起所述第一目标连接的建立流程,以进行所述发起终端和所述目标终端之间的通信。
在申请一些实施例中,所述方法200还包括:
所述发起终端向所述中继终端发送第二请求消息,所述第二请求消息用于请求建立所述第一目标连接。
对应地,所述中继终端接收所述发起终端发送的第二请求消息。
例如,在所述发起终端和所述中继终端之间未建立所述第一目标连接的情况下,所述发起终端向所述中继终端发送第二请求消息。
又例如,所述发起终端在确定建立所述第一目标连接的情况下,向所述中继终端发送所述第二请求消息。
在一些实施例中,所述发起终端可以复用已有消息实现所述第二请求消息的功能,例如,利用直接通信请求消息请求连接的建立(即第二请求消息可以为直接通信请求消息),或者,也可以新增消息实现第二请求消息的功能,本申请对于第二请求消息的具体实现不作限定。
在一些实施例中,所述第二请求消息包括以下信息中的至少一项:
所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
可选地,所述中继终端根据所述第二请求消息中携带的所述发起终端的标识信息和所述目标终端的标识信息可以确定待建立的连接所服务的发起终端和目标终端。
可选地,所述中继终端可以根据所述目标终端的标识信息确定所述中继终端和所述目标终端之间是否已建立第二目标连接,进一步可以确定是否进行第二目标连接的重用,具体实现在方法300中进行说明,这里不作赘述。
可选地,所述发起终端的地址信息可以用于中继终端确定将待传输业务路由或转发给哪个终端设备,或者,待传输业务来自哪个发起终端。
可选地,所述待传输业务的信息用于所述中继终端确定所述中继终端和所述目标终端之间是否已建立用于所述待传输业务的连接,即是否建立所述第二目标连接,从而确定是否重用所述第二目标连接。
在一些实施例中,所述发起终端的标识信息用于标识所述发起终端,例如,所述发起终端的标识信息可以包括但不限于所述发起终端的应用层标识和/或链路层标识,例如层2-ID。
在一些实施例中,所述目标终端的标识信息用于标识所述目标终端,例如所述目标终端的标识信息可以包括但不限于所述目标终端的应用层标识和/或链路层标识,例如层2-ID。
在一些实施例中,所述发起终端的地址信息包括但不限于所述发起终端的IP地址信息和/或所述发起终端的MAC地址信息。
在一些实施例中,所述待传输业务的信息包括但不限于以下中的至少一项:
待传输业务的应用标识,业务类型,中继服务码(Relay Service Code,RSC)。
在本申请一些实施例中,所述方法200还包括:
所述发起终端和所述中继终端进行安全交互流程。
可选地,在所述发起终端和所述中继终端的安全交互流程中,所述发起终端向所述中继终端发送所述发起终端的地址信息。
即,所述中继终端可以通过所述第二请求消息获知所述发起终端的地址信息,或者,也可以在发起终端和所述中继终端的安全交互流程中获知所述发起终端的地址信息。
在本申请一些实施例中,所述200包括:
所述中继终端向所述发起终端发送第二响应消息。
对应地,所述发起终端接收所述中继终端发送的第二响应消息,所述第二响应消息为所述第二请求消息的响应消息。
在一些实施例中,所述第二响应消息用于指示完成所述第一目标连接的建立。
在一些实施例中,所述中继终端可以复用已有消息实现所述第二响应消息的功能,例如,利用直接通信接受消息指示完成连接的建立(即第二响应消息可以为直接通信接受消息),或者,也可以新增消息实现第二响应消息的功能,本申请对于第二响应消息的具体实现不作限定。
在一些实施例中,所述第二响应消息包括所述目标终端的地址信息。
即,所述发起终端可以通过所述第二响应消息获知所述目标终端的地址信息。
在一些实施例中,对于中继终端而言,所述目标终端的地址信息的获取方式可以参考实施例一的相关描述,这里不再赘述。
综上,在本申请实施例中,发起终端可以根据发起终端和中继终端是否已建立用于发起终端和目标终端之间的待传输业务的连接,执行相应的流程以进行发起终端和目标终端之间的业务交互。
例如,在发起终端和中继终端之间已建立用于所述待传输业务的连接时,可以执行实施例一中所述的连接重用流程。
又例如,在发起终端和中继终端之间未建立用于所述待传输业务的连接时,可以执行实施例二中所述的连接建立流程。
因此,在本申请实施例中,发起终端与中继终端之间的PC5连接可以服务于多个目标终端,中继终端根据目标终端的地址信息进行数据的路由,例如根据目标终端的IP地址多种进行IP数据的转发,这样,发往不同目标终端的数据在同一个连接上可以通过不同的IP地址进行区分,有利于避免为每个目标终端在中继终端与发起终端之间建立单独的PC5连接,也即发起终端与中继终端之间的连接,以及中继终端与目标终端之间的连接不需要进行一对一映射,有利于降低通过中继终端进行中继通信的连接数量,降低中继终端的处理复杂度,提升中继通信性能。
上文结合图5,从发起终端的角度详细描述了根据本申请实施例的中继通信的方法,下文结合图6,从中继终端的角度详细描述根据本申请另一实施例的中继通信的方法。应理解,中继设备侧的描述与发起终端侧的描述相互对应,相似的描述可以参见上文,为避免重复,此处不再赘述。
图6是根据本申请另一实施例的中继通信的方法300的示意性流程图,如图3所示,该方法300包括如下内容:
S310,中继终端根据所述中继终端和目标终端之间的第二目标连接的建立情况,确定是否使用所述第二目标连接进行发起终端和目标终端之间的通信。
在一些实施例中,所述中继终端可以为图1所示的通信系统中的UE 101,该中继终端的具体实现参考图1所示实施例的相关描述,这里不再赘述。
需要说明的是,在本申请实施例中,连接也可以替换为链路,路径等,例如,第一目标连接也可以替换为第一目标链路,第二目标连接可以替换为第二目标链路,PC5连接可以替换为PC5链路,本申请对此不作限定。
在一些实施例中,所述发起终端已选择通过所述中继终端与所述目标终端进行通信。
在一些实施例中,所述中继终端和目标终端之间的第二目标连接的建立情况可以包括:所述中继终端和所述目标终端之间是否已建立第二目标连接。
在一些实施例中,所述第二目标连接为所述中继终端和所述目标终端之间的直接通信连接。
例如,所述第二目标连接为所述中继终端和所述目标终端之间的PC5连接。
在另一些实施例中,所述第二目标连接为所述中继终端和所述目标终端之间的用于特定业务的直接通信连接,所述特定业务为所述发起终端和所述目标终端之间的待传输业务。
也即,中继终端和目标终端之间的连接可以是业务粒度的,或者,也可以是不区分业务的。
在一些实施例中,所述中继终端和目标终端之间是否已建立第二目标连接,包括:
所述中继终端和所述目标终端之间是否已建立PC5连接。
例如,在发起终端有待传输业务需要发送给目标终端的情况下,或者,在中继终端接收到发起终端的第一请求消息或第二请求消息的情况下,中继终端可以确定中继终端和目标终端之间是否已建立PC5连接。其中,第一请求消息或第二请求消息的具体实现参考方法200的相关说明,为了简洁,这里不再赘述。
可选地,在所述中继终端和所述目标终端之间已建立PC5连接的情况下,中继终端可以确定所述中继终端和所述目标终端之间已建立第二目标连接,否则,确定所述中继终端和所述目标终端之间未建立第二目标连接。
在另一些实施例中,所述中继终端和目标终端之间是否已建立第二目标连接,包括:
所述中继终端和所述目标终端之间是否已建立用于所述待传输业务的PC5连接。
例如,在发起终端有待传输业务需要发送给目标终端的情况下,或者,在中继终端接收到发起终端的第一请求消息或第二请求消息的情况下,中继终端可以确定中继终端和目标终端之间是否已建立用于所述待传输业务的PC5连接。其中,第一请求消息或第二请求消息的具体实现参考方法200的相关说明,为了简洁,这里不再赘述。
可选地,在所述中继终端和所述目标终端之间已建立用于所述待传输业务的PC5连接的情况下,中继终端可以确定所述中继终端和所述目标终端之间已建立第二目标连接,否则,确定所述中继终端和所述目标终端之间未建立第二目标连接。
以下,结合实施例三和实施例四,对本申请实施例的中继通信的方法300进行说明。
实施例三:
在本申请一些实施例中,所述310包括:
在所述中继终端和所述目标终端之间已建立所述第二目标连接的情况下,所述中继终端确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信(或者说,业务交互),或者说,重用所述第二目标连接进行所述发起终端和所述目标终端之间的通信(或者说,业务交互)。
因此,在本申请实施例中,在所述中继终端和所述目标终端之间已建立所述第二目标连接的情况下,所述中继终端可以重用所述第二目标连接进行所述发起终端和所述目标终端之间的通信,而不是为所述发起终端建立新的连接,有利于降低通过中继终端进行中继通信的连接数量,降低了中继终端的处理复杂度。
为便于区分和说明,本申请实施例中的发起终端记为第一发起终端,已建立的所述第二目标连接用于第二发起终端和目标终端之间的通信,即,中继终端可以重用第二目标连接进行第一发起终端和目标终端之间的通信,以及第二发起终端和目标终端之间的通信,或者,也可以重用第二目标连接进行更多个发起终端和目标终端之间的通信,即第二目标连接可以服务多个发起终端。
在本申请一些实施例中,所述待传输业务为所述第一发起终端和所述目标终端之间的待传输业务。
在本申请一些实施例中,所述方法300还包括:
所述中继终端向所述目标终端发送第三请求消息,所述第三请求消息用于请求使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信。
对应地,所述目标终端接收所述中继终端发送的第三请求消息。
例如,在所述中继终端和所述目标终端之间已建立所述第二目标连接的情况下,所述中继终端向所述目标终端发送第三请求消息。
又例如,在所述中继终端确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通 信的情况下,所述中继终端向所述目标终端发送第三请求消息。
在一些实施例中,所述中继终端可以复用已有消息实现所述第三请求消息的功能,例如,利用链路修改请求消息请求重用已建立的连接,或者,也可以新增消息实现第三请求消息的功能,本申请对于第三请求消息的具体实现不作限定。
例如,所述第三请求消息为链路修改请求消息,或者,也可以新增连接修改请求消息,或连接重用请求消息进行已建立连接的重用。
可选地,第三请求消息可以用于对已建立的第二目标连接进行修改,比如,新增所述第二目标连接所服务的发起终端。
作为示例,第二目标连接是UE-R到UE-4的连接,第二目标连接用于UE-5和UE-4之间的通信,当UE-6也选择通过UE-R与UE-4进行通信时,也可以使用该第二目标连接,则第二目标连接可以用于UE-5以及UE-6与UE-4之间的通信,即第二目标连接所服务的发起终端由UE-5修改为UE-5和UE-6。
在一些实施例中,所述第三请求消息包括所述发起终端的标识信息和/或发起终端的地址信息。
在一些实施例中,通过在所述第一请求消息中携带所述发起终端的标识信息,可以通知所述中继终端重用所述第二目标连接的中继通信对应的发起终端,或者说,新增的所述第二目标连接所服务的发起终端。
在一些实施例中,所述发起终端的地址信息可以用于所述中继终端确定将待传输业务路由或转发给哪个终端设备,或者,待传输业务来自哪个发起终端。
在一些实施例中,所述发起终端的标识信息用于标识所述发起终端,例如发起终端的标识信息可以包括但不限于所述发起终端的应用层标识和/或链路层标识,例如层2-ID。
应理解,本申请实施例并不限定所述中继终端对于所述发起终端的标识信息的获取方式,以下结合具体实施例对发起终端的标识信息的获取方式进行说明,但本申请并不限于此。
在一些实现方式中:所述发起终端的标识信息是所述中继终端从所述发起终端获得的。
例如,从所述发起终端的第一请求信息和/或第二请求消息获得的。其中,所述第一请求消息和所述第二请求消息的具体实现参考方法200的相关说明,为了简洁,这里不再赘述。
在另一些实现方式中:所述发起终端的标识信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得。
例如,在所述发起终端和所述中继终端之间已建立第一目标连接的情况下,所述中继终端上可以存储所述第一目标连接的上下文,所述第一目标连接的上下文可以包括所述发起终端的标识信息。
应理解,本申请实施例并不限定所述中继终端对于所述发起终端的地址信息的获取方式,以下结合具体实施例对发起终端的地址信息的获取方式进行说明,但本申请并不限于此。
在一些实现方式中,所述发起终端的地址信息是所述中继终端从所述发起终端获得的。
例如,从所述发起终端的第一请求信息和/或第二请求消息获得。其中,所述第一请求消息和所述第二请求消息的具体实现参考方法200的相关说明,为了简洁,这里不再赘述。
在一些实现方式中,所述发起终端的地址信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得。
例如,在所述发起终端和所述中继终端之间已建立第一目标连接的情况下,所述中继终端上可以存储所述第一目标连接的上下文,所述第一目标连接的上下文可以包括所述发起终端的地址信息。
在又一些实现方式中,所述发起终端的地址信息是所述中继终端在所述中继终端和所述发起终端的安全交互流程中获得。
例如,在所述发起终端和所述中继终端之间未建立第一目标连接的情况下,所述发起终端可以发起第一目标连接的建立流程,在所述第一目标连接的建立流程中,所述发起终端和所述中继终端可以进行安全交互,在安全交互流程中,所述发起终端可以向所述中继终端发送所述发起终端的地址信息。
在本申请一些实施例中,所述方法200还包括:
所述目标终端向所述中继终端发送第三响应消息。
对应地,所述中继终端接收所述目标终端发送的第三响应消息,第三响应消息为所述第三请求消息的响应消息。
在一些实施例中,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信,或者说,第三响应消息用于指示确定重用所述第二目标连接传输发起终端和目标终端之间的待传输业务。
即,所述目标终端可以通过第三响应消息告知所述中继终端确定重用第二目标连接。
在一些实施例中,所述目标终端可以复用已有消息实现所述第三响应消息的功能,例如,利用链 路修改接受消息确认重用已建立的连接,或者,也可以新增消息实现第三响应消息的功能,本申请对于第一响应消息的具体实现不作限定。
例如,所述第三响应消息为链路修改接受消息,或者,也可以新增连接修改接受消息,或连接重用接受消息进行已建立连接的重用。
可选地,第三响应消息可以用于指示接受对已建立的第二目标连接进行修改,例如接受新增所述第二目标连接所服务的发起终端。
在一些实施例中,所述第三响应消息包括所述目标终端的地址信息。
即,所述中继终端可以通过第三响应消息获知所述目标终端的地址信息。
在一些实施例中,所述目标终端的地址信息可以用于所述中继终端确定将待传输业务路由或转发给哪个终端设备。
在一些实施例中,所述目标终端的地址信息包括但不限于所述目标终端的IP地址信息和/或所述目标终端的MAC地址信息。
实施例四:
在本申请另一些实施例中,所述310包括:
在所述中继终端和所述目标终端之间未建立所述第二目标连接的情况下,所述中继终端确定建立所述第二目标连接以进行所述发起终端和所述目标终端之间的通信。
因此,在本申请实施例中,在中继终端和目标终端之间未建立第二目标连接的情况下,中继终端可以发起所述第二目标连接的建立流程,以进行所述发起终端和所述目标终端之间的通信。
在申请一些实施例中,所述方法200还包括:
所述中继终端向所述目标终端发送第四请求消息,所述第四请求消息用于请求建立所述中继终端和所述目标终端之间的第二目标连接。
对应地,所述目标终端接收所述中继终端发送的第四请求消息。
例如,在中继终端和目标终端之间未建立第二目标连接的情况下,所述中继终端向所述目标终端发送第四请求消息。
又例如,在确定建立所述第二目标连接的情况下,中继终端向所述目标终端发送第四请求消息。
在一些实施例中,所述中继终端可以复用已有消息实现所述第四请求消息的功能,例如,利用直接通信请求消息请求连接的建立(即第四请求消息可以为直接通信请求消息),或者,也可以新增消息实现第四请求消息的功能,本申请对于第四请求消息的具体实现不作限定。
在一些实施例中,所述第四请求消息包括以下信息中的至少一项:
所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
可选地,所述目标终端根据所述第四请求消息中携带的所述发起终端的标识信息和所述目标终端的标识信息可以确定待建立的连接所服务的发起终端和目标终端。
在一些实施例中,所述发起终端的标识信息用于标识所述发起终端,例如所述发起终端的标识信息可以包括但不限于所述发起终端的应用层标识和/或链路层标识,例如层2-ID。
在一些实施例中,所述目标终端的标识信息用于标识所述目标终端,例如,所述目标终端的标识信息包括但不限于所述目标终端的应用层标识和/或链路层标识,例如层2-ID。
在一些实施例中,所述发起终端的地址信息包括但不限于所述发起终端的IP地址信息和/或所述发起终端的MAC地址信息。
在一些实施例中,所述待传输业务的信息包括但不限于以下中的至少一项:
待传输业务的应用标识,业务类型,中继服务码(Relay Service Code,RSC)。
应理解,本申请实施例并不限定所述中继终端对于所述发起终端的标识信息的获取方式,以下结合具体实施例对发起终端的标识信息的获取方式进行说明,但本申请并不限于此。
在一些实现方式中:所述发起终端的标识信息是所述中继终端从所述发起终端获得的。
例如,从所述发起终端的第一请求信息和/或第二请求消息获得。其中,所述第一请求消息和所述第二请求消息的具体实现参考方法200的相关说明,为了简洁,这里不再赘述。
在另一些实现方式中:所述发起终端的标识信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得。
例如,在发起终端和中继终端之间已建立第一目标连接的情况下,中继终端上可以存储第一目标连接的上下文,所述第一目标连接的上下文可以包括所述发起终端的标识信息。
应理解,本申请实施例并不限定所述中继终端对于所述目标终端的标识信息的获取方式,以下结合具体实施例对目标终端的标识信息的获取方式进行说明,但本申请并不限于此。
在一些实现方式中:所述目标终端的标识信息是所述中继终端从所述发起终端获得的。
例如,从所述发起终端的第一请求信息和/或第二请求消息获得。其中,所述第一请求消息和所述第二请求消息的具体实现参考方法200的相关说明,为了简洁,这里不再赘述。
应理解,本申请实施例并不限定所述中继终端对于所述发起终端的地址信息的获取方式,以下结合具体实施例对发起终端的地址信息的获取方式进行说明,但本申请并不限于此。
在一些实现方式中:所述发起终端的地址信息是所述中继终端从所述发起终端获得的。
例如,从所述发起终端的第一请求信息和/或第二请求消息获得。其中,所述第一请求消息和所述第二请求消息的具体实现参考方法200的相关说明,为了简洁,这里不再赘述。
在一些实现方式中:所述发起终端的地址信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得。
例如,在所述发起终端和所述中继终端之间已建立第一目标连接的情况下,所述中继终端上可以存储所述第一目标连接的上下文,所述第一目标连接的上下文可以包括所述发起终端的地址信息。
在又一些实现方式中:所述发起终端的地址信息是所述中继终端在所述中继终端和所述发起终端的安全交互流程中获得。
例如,在所述发起终端和所述中继终端之间未建立第一目标连接的情况下,所述发起终端可以发起第一目标连接的建立流程,在所述第一目标连接的建立流程中,所述发起终端和所述中继终端可以进行安全交互,在安全交互流程中,所述发起终端可以向所述中继终端发送所述发起终端的地址信息。
在一些实施例中,所述待传输业务的信息是所述中继终端从所述发起终端获得的。
例如,所述待传输业务的信息是从所述发起终端的第二请求消息获得的,所述第二请求消息用于请求建立所述第一目标连接。
在一些实施例中,所述待传输业务的信息是从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的。
例如,在中继终端和发起终端之间已建立第一目标连接的情况下,中继终端上可以存储所述第一目标连接的上下文,所述第一目标连接的上下文可以包括所述待传输业务的信息。
在本申请一些实施例中,所述方法300还包括:
所述中继终端和所述目标终端可以进行安全交互流程。
可选地,在所述中继终端和所述目标终端的安全交互流程中,所述目标终端向所述中继终端发送所述目标终端的地址信息。
即,所述中继终端可以在所述中继终端和所述目标终端的安全交互流程中获知所述目标终端的地址信息。
在本申请一些实施例中,所述方法300还包括:
所述目标终端向所述中继终端发送第四响应消息。
对应的,所述中继终端接收所述目标终端发送的第四响应消息,所述第四响应消息为所述第四请求消息的响应消息。
在一些实施例中,所述第四响应消息用于指示完成所述第二目标连接的建立。
在一些实施例中,所述目标终端可以复用已有消息实现所述第四响应消息的功能,例如,利用直接通信接受消息指示完成连接的建立(即第四响应消息可以为直接通信接受消息),或者,也可以新增消息实现第四响应消息的功能,本申请对于第四响应消息的具体实现不作限定。
在一些实施例中,所述第四响应消息包括所述目标终端的地址信息。
即,所述中继终端可以通过所述第四响应消息获知所述目标终端的地址信息。
在一些实施例中,所述目标终端的地址信息是所述中继终端在所述第四响应消息之后获得的。
例如,所述中继终端在接收到所述目标终端的第四响应消息之后,所述中继终端与所述目标终端可以进行IP地址协商,从而所述中继终端获得所述目标终端的地址信息。
又例如,所述中继终端在接收到所述目标终端的第四响应消息之后,所述中继终端与所述目标终端可以进行IP地址分配,从而所述中继终端获得所述目标终端的地址信息。
综上,所述目标终端的地址信息是所述中继终端从所述目标终端获得的,或者,从所述中继终端上存储的所述中继终端和所述目标终端之间的第二目标连接的上下文获得,或者,在所述中继终端和所述目标终端的安全交互流程中获得,或者,是所述中继终端和所述目标终端协商的,或者是中继终端给所述目标终端分配的。
在本申请一些实施例中,所述方法300还包括:
所述中继终端接收所述发起终端发送的第一请求消息,所述第一请求消息用于请求使用所述发起终端和所述目标终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第一请求消息包括所述目标终端的标识信息和/或发起终端的地址信息。
在一些实施例中,所述第一请求消息为链路修改请求消息。
在本申请一些实施例中,所述方法300还包括:
所述中继终端向所述发起终端发送第一响应消息,所述第一响应消息用于指示确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第一响应消息包括所述目标终端的地址信息。
在一些实施例中,所述目标终端的地址信息是所述中继终端从所述目标终端获取的。
在一些实施例中,所述目标终端的地址信息是所述中继终端和所述中继终端协商的。
在一些实施例中,所述目标终端的地址信息是所述中继终端给所述目标终端分配的。
在一些实施例中,所述目标终端的地址信息是所述中继终端从所述目标终端获取的,包括:
所述中继终端从所述目标终端的第三响应消息和/或第四响应消息获取所述目标终端的地址信息,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信,所述第四响应消息用于指示完成所述第二目标连接的建立;和/或
所述中继终端在所述中继终端和所述目标终端的安全交互流程中获取所述目标终端的地址信息。
在一些实施例中,所述第一响应消息为链路修改接受消息。
在本申请一些实施例中,所述方法300还包括:
所述中继终端接收所述发起终端发送的第二请求消息,所述第二请求消息用于请求建立所述发起终端和所述目标终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第二请求消息包括以下信息中的至少一项:
所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
在一些实施例中,所述目标终端的标识信息用于所述中继终端确定所述目标终端和所述中继终端之间是否已建立用于待传输业务的连接。
在一些实施例中,所述待传输业务的信息用于所述中继终端确定所述中继终端和所述目标终端之间是否已建立用于所述待传输业务的连接。
在一些实施例中,所述第二请求消息为直接通信请求消息。
在一些实施例中,所述方法300还包括:
在所述中继终端和所述发起终端的安全交互流程中,所述中继终端获取所述发起终端的地址信息。
在一些实施例中,所述方法300还包括:
所述中继终端向所述发起终端发送第二响应消息,所述第二响应消息用于指示完成所述第一目标连接的建立。
在一些实施例中,所述第二响应消息包括所述目标终端的地址信息。
其中,所述目标终端的地址信息的获取方式参考前述实施例的相关描述,这里不再赘述。
在一些实施例中,所述第二响应消息为直接通信接受消息。
上述第一请求消息,第一响应消息,第二请求消息和第二响应消息的具体实现参考方法200中的相关描述,为了简洁,这里不再赘述。
综上,在本申请实施例中,中继终端可以根据中继终端和目标终端之间是否已建立用于发起终端和目标终端之间的待传输业务的连接,执行相应的流程以进行发起终端和目标终端之间的通信。
例如,在中继终端和目标终端之间已建立用于待传输业务的连接时,可以执行连接重用流程。
又例如,在中继终端和目标终端之间未建立用于待传输业务的连接时,可以执行连接建立流程。
因此,在本申请实施例中,中继终端和目标终端之间的PC5连接可以服务于多个发起终端,中继终端根据发起终端的地址信息进行数据的路由,例如根据发起终端的IP地址多种进行IP数据的转发,这样,来自不同发起终端的数据在同一个连接上可以通过不同的IP地址进行区分,有利于避免为每个发起终端在中继终端与目标终端之间建立单独的PC5连接,即发起终端与中继终端之间的连接,以及中继终端与目标终端之间的连接不需要进行一对一映射,有利于降低通过中继终端进行中继通信的连接数量,降低中继终端的处理复杂度。
需要说明的是,在本申请实施例中,方法300中的实施例三和实施例四和方法200中的实施例一和实施例二可以结合实施,例如,实施例一和实施例三可以结合实施,或者,实施例二和实施例三可以结合实施,或者,实施例一和实施例四可以结合实施,实施例二和实施例四可以结合实施。
例如,在发起终端和中继终端之间已建立第一目标连接,并且中继终端和目标终端之间已建立第 二目标连接的情况下,发起终端可以重用第一目标连接,中继终端可以重用第二目标连接。
又例如,在发起终端和中继终端之间已建立第一目标连接,并且中继终端和目标终端之间未建立第二目标连接的情况下,发起终端可以重用第一目标连接,中继终端可以建立第二目标连接。
又例如,在发起终端和中继终端之间未建立第一目标连接,并且中继终端和目标终端之间已建立第二目标连接的情况下,发起终端可以建立第一目标连接,中继终端可以重用第二目标连接。
再例如,在发起终端和中继终端之间未建立第一目标连接,并且中继终端和目标终端之间未建立第二目标连接的情况下,发起终端可以建立第一目标连接,中继终端可以建立第二目标连接。
上文结合图5和图6,分别从发起终端和中继终端的角度详细描述了根据本申请实施例的中继通信的方法,下文结合图7,从目标终端的角度详细描述根据本申请又一实施例的中继通信的方法。应理解,目标设备侧的描述与中继终端侧的描述相互对应,相似的描述可以参见上文,为避免重复,此处不再赘述。
图7是根据本申请另一实施例的中继通信的方法400的示意性流程图,如图7所示,该方法400包括如下内容:
S410,目标终端接收中继终端的第三请求消息或第四请求消息,所述第三请求消息用于请求使用所述中继终端和所述目标终端之间的第二目标连接进行发起终端和所述目标终端之间的通信,所述第四请求消息用于请求建立所述中继终端和所述目标终端之间的第二目标连接以进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第三请求消息是所述中继终端在所述第二目标连接已建立的情况下发送的。
在一些实施例中,所述第三请求消息包括所述发起终端的标识信息和/或所述发起终端的地址信息。
在一些实施例中,所述第三请求消息为链路修改请求消息。
在一些实施例中,所述方法400还包括:
所述目标终端向所述中继终端发送第三响应消息,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第三响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第三响应消息为链路修改接受消息。
在一些实施例中,所述第四请求消息是所述中继终端在所述中继终端和所述目标终端之间未建立所述第二目标连接的情况下发送的。
在一些实施例中,所述第四请求消息包括以下信息中的至少一项:
所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
在一些实施例中,所述发起终端的标识信息是所述中继终端从所述发起终端的第一请求信息和/或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接;或者
所述发起终端的标识信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的。
在一些实施例中,所述目标终端的标识信息是所述中继终端从发起终端的第一请求信息或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述中继终端和所述发起终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接。
在一些实施例中,所述发起终端的地址信息是所述中继终端从所述发起终端的第一请求信息或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接;或者
所述发起终端的地址信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的;或者,
所述发起终端的地址信息是所述中继终端在所述中继终端和所述发起终端的安全交互流程中获得的。
在一些实施例中,所述待传输业务的信息是所述中继终端从发起终端的第二请求消息获得,其中,所述第二请求消息用于请求建立所述第一目标连接;或者,
所述待传输业务的信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的。
在一些实施例中,所述第四请求消息为直接通信请求消息。
在一些实施例中,所述方法400还包括:
在所述目标终端和所述中继终端的安全交互流程中,所述目标终端向所述中继终端发送所述目标终端的地址信息。
在一些实施例中,所述方法400还包括:
所述目标终端向所述中继终端发送第四响应消息,所述第四响应消息用于指示完成所述第二目标连接的建立。
在一些实施例中,所述第四响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第四响应消息为直接通信接受消息。
上述第三请求消息,第三响应消息,第四请求消息和第四响应消息的具体实现参考方法300中的相关描述,为了简洁,这里不再赘述。
上文结合图5至图7,分别从发起终端、中继终端和目标终端的角度详细描述了根据本申请实施例的中继通信的方法,下文结合图8至图10,从设备交互的角度详细描述根据本申请实施例的中继通信的方法。
图8是根据本申请一个实施例的中继通信的方法的示意性交互图。
在该实施例中,发起UE和中继UE之间未建立PC5连接,或者,发起UE和中继UE之间未建立用于发起UE和目标UE之间的待传输业务的PC5连接,中继UE和目标UE之间已建立PC5连接,或者,中继UE和目标UE之间建立有用于发起UE和目标UE之间的待传输业务的PC5连接,即发起UE和中继UE之间未建立所述第一目标连接,中继UE和目标UE之间已建立第二目标连接。
如图8所示,该方法500可以包括如下步骤:
S501,发起UE向中继UE发送第二请求消息,用于请求建立发起UE和中继UE之间的PC5连接,或者建立发起UE和中继UE之间的用于所述待传输业务的PC5连接。
例如,在发起UE和中继UE之间未建立PC5连接或未建立用于所述待传输业务的PC5连接的情况下,发起UE向所述中继UE发送所述第二请求消息。
在一些实施例中,所述第二请求消息包括发起UE的标识信息和目标UE的标识信息。
可选地,所述发起UE的标识信息可以包括所述发起UE的应用层标识和/或链路层标识,例如层2-ID。
可选地,所述目标UE的标识信息可以包括所述目标UE的应用层标识和/或链路层标识,例如层2-ID。
可选地,所述第二请求信息还可以包括待传输业务的信息。例如待传输业务的应用标识、业务类型、中继服务码等。
可选地,所述第二请求消息还可以包括发起UE的地址信息。例如可以是发起UE的IP地址、MAC地址等。
S502,中继UE和发起UE进行安全交互。
可选地,在安全交互流程中,发起UE可以向中继UE发送所述发起UE的地址信息。
S503,中继UE向目标UE发送第三请求消息,用于请求使用所述第二目标连接传输发起UE和目标UE之间的待传输业务。
例如,在中继UE和目标UE之间已建立PC5连接或已建立用于所述待传输业务的PC5连接的情况下,中继UE向目标UE发送第三请求消息。
在一些实施例中,所述第三请求消息可以为对已建立的PC5连接的链路修改请求消息。
在一些实施例中,所述第三请求消息可以包括发起UE的标识信息。
可选地,所述第三请求消息还可以包括发起UE的地址信息。例如可以是发起UE的IP地址、MAC地址等。
S504,目标UE向中继UE发送第三响应消息,用于指示确定重用所述第二目标连接。
在一些实施例中,所述第三响应消息可以为对已建立的PC5连接的链路修改接受消息。
在一些实施例中,所述第三响应消息可以包括目标UE的地址信息。例如可以是目标UE的IP地址、MAC地址等。
S505,中继UE向发起UE发送第二响应消息,用于指示完成中继UE与发起UE之间的PC5连接的建立。
在一些实施例中,所述第二响应消息包括目标UE的地址信息。
在一些实施例中,所述目标UE的地址信息可以是中继UE从第三响应消息获取的。
在另一些实施例中,所述中继UE和所述目标UE之间已建立第二目标连接,所述中继UE上保 存有所述第二目标连接的上下文,所述目标UE的地址信息也可以是所述中继UE从本地存储的第二目标连接的上下文获得的。
基于该实施例,中继UE与目标UE之间的PC5连接可以服务于多个发起UE,中继UE根据地址信息进行路由,例如来自不同发起UE的数据通过同一个连接传输时,可以通过不同的IP地址进行区分。避免了为每个发起UE在中继UE与目标UE之间均建立单独的PC5连接。即发起UE与中继UE之间的连接,以及中继UE与目标UE之间的连接不需要进行一对一映射,有利于降低通过中继终端进行中继通信的连接数量,降低中继终端的处理复杂度。
图9是根据本申请又一个实施例的中继通信的方法的示意性交互图。
在该实施例中,发起UE和中继UE之间已建立PC5连接,或者,发起UE和中继UE之间已建立用于发起UE和目标UE之间的待传输业务的PC5连接,中继UE和目标UE之间未建立PC5连接,或者,中继UE和目标UE之间未建立用于发起UE和目标UE之间的待传输业务的PC5连接,即发起UE和中继UE之间已建立所述第一目标连接,中继UE和目标UE之间未建立所述第二目标连接。
如图9所示,该方法500可以包括如下步骤:
S511,发起UE向中继UE发送第一请求消息,用于请求使用发起UE和中继UE之间的已建立的PC5连接。
例如,在发起UE和中继UE之间已建立PC5连接或已建立用于所述待传输业务的PC5连接的情况下,发起UE向中继UE发送第一请求消息。
在一些实施例中,所述第一请求消息包括所述目标UE的标识信息。
可选地,所述目标UE的标识信息可以包括所述目标UE的应用层标识和/或链路层标识,例如层2-ID。
可选地,所述第一请求消息还可以包括发起UE的地址信息。例如可以是发起UE的IP地址、MAC地址等。
S512,中继UE向目标UE发送第四请求消息,用于请求建立所述第二目标连接以传输发起UE和目标UE之间的待传输业务。
例如,在中继UE和目标UE之间未建立PC5连接或未建立用于所述待传输业务的PC5连接的情况下,中继UE向目标UE发送第四请求消息。
在一些实施例中,所述第四请求消息可以直接通信请求消息。
在一些实施例中,所述第四请求消息可以包括发起UE的标识信息和目标UE的标识信息。
可选地,所述第四请求消息还包括待传输业务的信息。例如待传输业务的应用标识,业务类型,中继服务码等。
可选地,所述第四请求消息还包括发起UE的地址信息。例如可以是发起UE的IP地址、MAC地址等。
可选地,所述发起UE的标识信息可以是所述中继UE从本地存储的第一目标连接的上下文获得的,或者,从所述发起UE获得的。
可选地,所述目标UE的地址信息可以是所述中继UE从本地存储的第一目标连接的上下文获得的,或者,从所述发起UE获得的。
可选地,所述待传输业务的信息可以是所述中继UE从本地存储的第一目标连接的上下文获得的,或者,从所述发起UE获得的。
S503,中继UE和目标UE进行安全交互。
可选地,在安全交互流程中,目标UE可以向中继UE发送所述目标UE的地址信息。
S504,目标UE向中继UE发送第四响应消息,用于指示确定建立所述第二目标连接。
在一些实施例中,所述第四响应消息可以为直接通信接受消息。
在一些实施例中,所述第四响应消息可以包括目标UE的地址信息。例如可以是目标UE的IP地址、MAC地址等。
在另一些实施例中,在第四响应消息之后,中继UE与目标UE之间进行IP地址协商或分配,从而中继UE获得目标UE的地址信息。
S505,中继UE向发起UE发送第一响应消息,用于指示确定重用中继UE与发起UE之间的PC5连接。
在一些实施例中,所述第一响应消息可以为对已建立的PC5连接的链路修改接受消息。
在一些实施例中,所述第一响应消息包括目标UE的地址信息。
在一些实施例中,所述目标UE的地址信息可以是中继UE从第四响应消息获得的,或在第四响应消息之后获得的。
基于该实施例,中继UE与发起UE之间的PC5链路可以服务于多个目标UE,中继UE根据地址信息进行路由,例如发给不同目标UE的数据通过同一个连接传输时,可以通过不同的IP地址进行区分。避免了为每个目标UE在中继UE与发起UE之间均建立单独的PC5链路。即发起UE与中继UE之间的链路,以及中继UE与目标UE之间的链路不需要进行一对一映射,有利于降低通过中继终端进行中继通信的链路数量,降低中继终端的处理复杂度。
图10是根据本申请再一个实施例的中继通信的方法的示意性交互图。
在该实施例中,发起UE和中继UE之间已建立PC5连接,或者,发起UE和中继UE之间已建立用于发起UE和目标UE之间的待传输业务的PC5连接,中继UE和目标UE之间已建立PC5连接,或者,中继UE和目标UE之间建立有用于发起UE和目标UE之间的待传输业务的PC5连接,即发起UE和中继UE之间已建立所述第一目标连接,中继UE和目标UE之间已建立所述第二目标连接。
如图10所示,该方法500可以包括如下步骤:
S521,发起UE向中继UE发送第一请求消息,用于请求使用发起UE和中继UE之间的已建立的PC5连接。
例如,在发起UE和中继UE之间已建立PC5连接或已建立用于所述待传输业务的PC5连接的情况下,发起UE向中继UE发送第一请求消息。
在一些实施例中,所述第一请求消息包括所述目标UE的标识信息。
可选地,所述目标UE的标识信息可以包括所述目标UE的应用层标识和/或链路层标识,例如层2-ID。
可选地,所述第一请求消息还可以包括发起UE的地址信息。例如可以是发起UE的IP地址、MAC地址等。
S522,中继UE向目标UE发送第三请求消息,用于请求使用所述第二目标连接传输发起UE和目标UE之间的待传输业务。
例如,在中继UE和目标UE之间已建立PC5连接或已建立用于所述待传输业务的PC5连接的情况下,中继UE向目标UE发送第三请求消息。
在一些实施例中,所述第三请求消息可以为对已建立的PC5连接的链路修改请求消息。
在一些实施例中,所述第三请求消息可以包括发起UE的标识信息。
可选地,所述第三请求消息还可以包括发起UE的地址信息。例如可以是发起UE的IP地址、MAC地址等。
可选地,所述发起UE的标识信息可以是所述中继UE从本地存储的第一目标连接的上下文获得的,或者,从所述发起UE获得的。
可选地,所述发起UE的地址信息可以是所述中继UE从本地存储的第一目标连接的上下文获得的,或者,从所述发起UE获得的。
S523,目标UE向中继UE发送第三响应消息,用于指示确定重用所述第二目标连接。
在一些实施例中,所述第三响应消息可以为对已建立的PC5连接的链路修改接受消息。
在一些实施例中,所述第三响应消息可以包括目标UE的地址信息。例如可以是目标UE的IP地址、MAC地址等。
S524,中继UE向发起UE发送第一响应消息,用于指示确定重用中继UE与发起UE之间的PC5连接。
在一些实施例中,所述第一响应消息可以为对已建立的PC5连接的链路修改接受消息。
在一些实施例中,所述第一响应消息包括目标UE的地址信息。
在一些实施例中,所述目标UE的地址信息可以是中继UE从第三响应消息获得的,或者,从所述中继UE本地存储的第二目标连接的上下文获得。
基于该实施例,中继UE与发起UE之间的PC5连接可以服务于多个目标UE,中继UE与目标UE之间的PC5连接可以服务于多个发起UE,中继UE根据地址信息进行路由,例如发给不同目标UE的数据通过同一个连接传输时,可以通过不同的IP地址进行区分,以及来自不同发起UE的数据通过同一个连接传输时,可以通过不同的IP地址进行区分。避免了为每个目标UE在中继UE与发起UE之间均建立单独的PC5连接,以及为每个发起UE在中继UE和目标UE之间建立单独的PC5连接。即发起UE与中继UE之间的连接,以及中继UE与目标UE之间的连接不需要进行一对一映射,有利于降低通过中继终端进行中继通信的连接数量,降低中继终端的处理复杂度。
上文结合图5至图10,详细描述了本申请的方法实施例,下文结合图11至图16,详细描述本申请的装置实施例,应理解,装置实施例与方法实施例相互对应,类似的描述可以参照方法实施例。
图11示出了根据本申请实施例的发起终端1000的示意性框图。如图11所示,该发起终端1000 包括:
处理单元1010,用于根据所述发起终端和中继终端之间的第一目标连接的建立情况,确定是否使用所述第一目标连接进行所述发起终端和目标终端之间的通信。
在一些实施例中,所述处理单元1010还用于:
在所述发起终端和所述中继终端之间已建立所述第一目标连接的情况下,确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信;或者
在所述发起终端和所述中继终端之间未建立所述第一目标连接的情况下,确定建立所述第一目标连接以进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述发起终端1000还包括:
通信单元,用于在确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信的情况下,向所述中继终端发送第一请求消息,所述第一请求消息用于请求使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第一请求消息包括所述目标终端的标识信息和/或所述发起终端的地址信息。
在一些实施例中,所述第一请求消息为链路修改请求消息。
在一些实施例中,所述发起终端1000还包括:
通信单元,用于接收所述中继终端发送的第一响应消息,所述第一响应消息用于指示确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第一响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第一响应消息为链路修改接受消息。
在一些实施例中,所述发起终端1000还包括:
通信单元,用于在确定建立所述第一目标连接的情况下,向所述中继终端发送第二请求消息,所述第二请求消息用于请求建立所述第一目标连接。
在一些实施例中,所述第二请求消息为直接通信请求消息。
在一些实施例中,所述第二请求消息包括以下信息中的至少一项:
所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
在一些实施例中,所述发起终端1000还包括:
通信单元,用于在所述发起终端的所述中继终端的安全交互流程中,向所述中继终端发送所述发起终端的地址信息。
在一些实施例中,所述发起终端1000还包括:
通信单元,用于接收所述中继终端发送的第二响应消息,所述第二响应消息用于指示完成所述第一目标连接的建立。
在一些实施例中,所述第二响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第二响应消息为直接通信接受消息。
在一些实施例中,所述发起终端的地址信息包括所述发起终端的网络协议IP地址信息和/或所述发起终端的媒体接入控制MAC地址信息。
在一些实施例中,所述目标终端的地址信息包括所述目标终端的IP地址信息和/或所述目标终端的MAC地址信息。
在一些实施例中,所述待传输业务的信息包括以下中的至少一项:待传输业务的应用标识,业务类型,中继服务码。
在一些实施例中,所述待传输业务的信息用于所述中继终端确定所述中继终端和所述目标终端之间是否已建立用于所述待传输业务的连接。
在一些实施例中,所述目标终端的标识信息包括所述目标终端的应用层标识和/或链路层标识。
在一些实施例中,所述发起终端的标识信息包括所述发起终端的应用层标识和/或链路层标识。
在一些实施例中,所述第一目标连接为所述发起终端和所述中继终端之间的直接通信连接,或者,所述第一目标连接为所述发起终端和所述中继终端之间的用于特定业务的直接通信连接,所述特定业务为所述发起终端和所述目标终端之间的待传输业务。
可选地,在一些实施例中,上述通信单元可以是通信接口或收发器,或者是通信芯片或者片上系统的输入输出接口。上述处理单元可以是一个或多个处理器。
应理解,根据本申请实施例的发起终端1000可对应于本申请方法实施例中的发起终端,并且发起终端1000中的各个单元的上述和其它操作和/或功能分别为了实现图5至图10所示方法实施例中 发起终端的相应流程,为了简洁,在此不再赘述。
图12示出了根据本申请实施例的中继终端1100的示意性框图。如图12所示,该中继终端1100包括:
处理单元1110,用于根据所述中继终端和目标终端之间的第二目标连接的建立情况,确定是否使用所述第二目标连接进行发起终端和目标终端之间的通信。
在一些实施例中,所述处理单元1110还用于:
在所述中继终端和所述目标终端之间已建立所述第二目标连接的情况下,确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信;或
在所述中继终端和所述目标终端之间未建立所述第二目标连接的情况下,确定建立所述第二目标连接以进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于在确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信的情况下,向所述目标终端发送第三请求消息,所述第三请求消息用于请求使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第三请求消息包括所述发起终端的标识信息和/或所述发起终端的地址信息。
在一些实施例中,所述第三请求消息为链路修改请求消息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于接收所述目标终端发送的第三响应消息,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第三响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第三响应消息为链路修改接受消息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于在确定建立所述中继终端和所述目标终端之间的第二目标连接的情况下,向所述目标终端发送第四请求消息,所述第四请求消息用于请求建立所述中继终端和所述目标终端之间的第二目标连接。
在一些实施例中,所述第四请求消息包括以下信息中的至少一项:
所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
在一些实施例中,所述第四请求消息为直接通信请求消息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于在所述中继终端和所述目标终端的安全交互流程中,所述中继终端获取所述目标终端的地址信息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于接收所述目标终端发送的第四响应消息,所述第四响应消息用于指示完成所述第二目标连接的建立。
在一些实施例中,所述第四响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第四响应消息为直接通信接受消息。
在一些实施例中,所述处理单元1110还用于:
在所述第四响应消息之后,和所述目标终端协商所述目标终端的地址信息。
在一些实施例中,所述处理单元1110还用于:给所述目标终端分配所述目标终端的地址信息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于接收所述发起终端发送的第一请求消息,所述第一请求消息用于请求使用所述发起终端和所述目标终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第一请求消息包括所述目标终端的标识信息和/或所述发起终端的地址信息。
在一些实施例中,所述第一请求消息为链路修改请求消息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于向所述发起终端发送第一响应消息,所述第一响应消息用于指示确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第一响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第一响应消息为链路修改接受消息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于接收所述发起终端发送的第二请求消息,所述第二请求消息用于请求建立所述发起终端和所述目标终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第二请求消息包括以下信息中的至少一项:
所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
在一些实施例中,所述待传输业务的信息用于所述中继终端确定所述中继终端和所述目标终端之间是否已建立用于所述待传输业务的连接。
在一些实施例中,所述第二请求消息为直接通信请求消息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于在所述发起终端和所述中继终端的安全交互流程中,所述中继终端获取所述发起终端的地址信息。
在一些实施例中,所述中继终端1100还包括:
通信单元,用于向所述发起终端发送第二响应消息,所述第二响应消息用于指示完成所述第一目标连接的建立。
在一些实施例中,所述第二响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第二响应消息为直接通信接受消息。
在一些实施例中,所述发起终端的标识信息是所述中继终端从所述发起终端的第一请求信息和/或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接;或者
所述发起终端的标识信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的。
在一些实施例中,所述目标终端的标识信息是所述中继终端从发起终端的第一请求信息或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述中继终端和所述发起终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接。
在一些实施例中,所述发起终端的地址信息是所述中继终端从所述发起终端的第一请求信息或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接;或者
所述发起终端的地址信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的;或者,
所述发起终端的地址信息是所述中继终端在所述中继终端和所述发起终端的安全交互流程中获得的。
在一些实施例中,所述待传输业务的信息是所述中继终端从发起终端的第二请求消息获得,其中,所述第二请求消息用于请求建立所述第一目标连接;或者,
所述待传输业务的信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的。
在一些实施例中,所述目标终端的地址信息是所述中继终端从所述目标终端获取的。
在一些实施例中,所述目标终端的地址信息是所述中继终端和所述中继终端协商的。
在一些实施例中,所述目标终端的地址信息是所述中继终端给所述目标终端分配的。
在一些实施例中,所述目标终端的地址信息是所述中继终端从所述目标终端获取的,包括:
所述中继终端从所述目标终端的第三响应消息和/或第四响应消息获取所述目标终端的地址信息,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信,所述第四响应消息用于指示完成所述第二目标连接的建立;和/或
所述中继终端在所述中继终端和所述目标终端的安全交互流程中获取所述目标终端的地址信息。
在一些实施例中,所述发起终端的标识信息包括所述发起终端的应用层标识和/或链路层标识。
在一些实施例中,所述目标终端的标识信息包括所述目标终端的应用层标识和/或链路层标识。
在一些实施例中,所述发起终端的地址信息包括所述发起终端的网络协议IP地址信息和/或所述发起终端的媒体接入控制MAC地址信息。
在一些实施例中,所述目标终端的地址信息包括所述目标终端的IP地址信息和/或所述目标终端的MAC地址信息。
在一些实施例中,所述待传输业务的信息包括以下中的至少一项:待传输业务的应用标识,业务 类型,中继服务码。
在一些实施例中,所述第二目标连接为所述中继终端和所述目标终端之间的直接通信连接,或者,所述第二目标连接为所述中继终端和所述目标终端之间的用于特定业务的直接通信连接,所述特定业务为所述发起终端和所述目标终端之间的待传输业务。
可选地,在一些实施例中,上述通信单元可以是通信接口或收发器,或者是通信芯片或者片上系统的输入输出接口。上述处理单元可以是一个或多个处理器。
应理解,根据本申请实施例的中继终端1100可对应于本申请方法实施例中的中继终端,并且中继终端1100中的各个单元的上述和其它操作和/或功能分别为了实现图5至图10所示方法实施例中中继终端的相应流程,为了简洁,在此不再赘述。
图13示出了根据本申请实施例的目标终端1200的示意性框图。如图13所示,该目标终端1200包括:
通信单元1210,用于接收中继终端的第三请求消息或第四请求消息,所述第三请求消息用于请求使用所述中继终端和目标终端之间的第二目标连接进行发起终端和所述目标终端之间的通信,所述第四请求消息用于请求建立所述中继终端和所述目标终端之间的第二目标连接以进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第三请求消息是所述中继终端在所述第二目标连接已建立的情况下发送的。
在一些实施例中,所述第三请求消息包括所述发起终端的标识信息和/或所述发起终端的地址信息。
在一些实施例中,所述第三请求消息为链路修改请求消息。
在一些实施例中,所述通信单元1210还用于:向所述中继终端发送第三响应消息,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信。
在一些实施例中,所述第三响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第三响应消息为链路修改接受消息。
在一些实施例中,所述第四请求消息是所述中继终端在所述中继终端和所述目标终端之间未建立所述第二目标连接的情况下发送的。
在一些实施例中,所述第四请求消息包括以下信息中的至少一项:
所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
在一些实施例中,所述第四请求消息为直接通信请求消息。
在一些实施例中,所述通信单元1210还用于:
在安全交互流程中,向所述中继终端发送所述目标终端的地址信息。
在一些实施例中,所述通信单元1210还用于:
向所述中继终端发送第四响应消息,所述第四响应消息用于指示完成所述第二目标连接的建立。
在一些实施例中,所述第四响应消息包括所述目标终端的地址信息。
在一些实施例中,所述第四响应消息为直接通信接受消息。
在一些实施例中,所述发起终端的标识信息包括所述发起终端的应用层标识和/或链路层标识。
在一些实施例中,所述目标终端的标识信息包括所述目标终端的应用层标识和/或链路层标识。
在一些实施例中,所述发起终端的地址信息包括所述发起终端的网络协议IP地址信息和/或所述发起终端的媒体接入控制MAC地址信息。
在一些实施例中,所述目标终端的地址信息包括所述目标终端的IP地址信息和/或所述目标终端的MAC地址信息。
在一些实施例中,所述待传输业务的信息包括以下中的至少一项:待传输业务的应用标识,业务类型,中继服务码。
在一些实施例中,所述第二目标连接为所述中继终端和所述目标终端之间的直接通信连接,或者,所述第二目标连接为所述中继终端和所述目标终端之间的用于特定业务的直接通信连接,所述特定业务为所述发起终端和所述目标终端之间的待传输业务。
可选地,在一些实施例中,上述通信单元可以是通信接口或收发器,或者是通信芯片或者片上系统的输入输出接口。上述处理单元可以是一个或多个处理器。
应理解,根据本申请实施例的目标终端1200可对应于本申请方法实施例中的目标终端,并且目标终端1200中的各个单元的上述和其它操作和/或功能分别为了实现图5至图10所示方法实施例中目标终端的相应流程,为了简洁,在此不再赘述。
图14是本申请实施例提供的一种通信设备600示意性结构图。图14所示的通信设备600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图14所示,通信设备600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。
可选地,如图14所示,通信设备600还可以包括收发器630,处理器610可以控制该收发器630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器630可以包括发射机和接收机。收发器630还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备600具体可为本申请实施例的发起终端,并且该通信设备600可以实现本申请实施例的各个方法中由发起终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备600具体可为本申请实施例的中继终端,并且该通信设备600可以实现本申请实施例的各个方法中由中继终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备600具体可为本申请实施例的目标终端,并且该通信设备600可以实现本申请实施例的各个方法中由目标终端实现的相应流程,为了简洁,在此不再赘述。
图15是本申请实施例的芯片的示意性结构图。图15所示的芯片700包括处理器710,处理器710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图15所示,芯片700还可以包括存储器720。其中,处理器710可以从存储器720中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器720可以是独立于处理器710的一个单独的器件,也可以集成在处理器710中。
可选地,该芯片700还可以包括输入接口730。其中,处理器710可以控制该输入接口730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片700还可以包括输出接口740。其中,处理器710可以控制该输出接口740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的发起终端,并且该芯片可以实现本申请实施例的各个方法中由发起终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的中继终端,并且该芯片可以实现本申请实施例的各个方法中由中继终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的目标终端,并且该芯片可以实现本申请实施例的各个方法中由目标终端实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
图16是本申请实施例提供的一种通信系统900的示意性框图。如图16所示,该通信系统900包括发起终端910、中继终端920和目标终端930。
其中,该发起终端910可以用于实现上述方法中由发起终端实现的相应的功能,该中继终端920可以用于实现上述方法中由中继终端实现的相应的功能,以及该目标终端930可以用于实现上述方法中由目标终端实现的相应的功能,为了简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明, 许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的发起终端,并且该计算机程序使得计算机执行本申请实施例的各个方法中由发起终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的中继终端,并且该计算机程序使得计算机执行本申请实施例的各个方法中由中继终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的目标终端,并且该计算机程序使得计算机执行本申请实施例的各个方法中由目标终端实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的发起终端,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由发起终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的中继终端,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由中继终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的目标终端,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由目标终端实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的发起终端,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由发起终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的中继终端,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由中继终端实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的目标终端,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由目标终端实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分 或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (85)

  1. 一种中继通信的方法,其特征在于,包括:
    发起终端根据所述发起终端和中继终端之间的第一目标连接的建立情况,确定是否使用所述第一目标连接进行所述发起终端和目标终端之间的通信。
  2. 根据权利要求1所述的方法,其特征在于,所述发起终端根据所述发起终端和中继终端之间的第一目标连接的建立情况,确定是否使用所述第一目标连接进行所述发起终端和目标终端之间的通信,包括:
    在所述发起终端和所述中继终端之间已建立所述第一目标连接的情况下,所述发起终端确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信;或者
    在所述发起终端和所述中继终端之间未建立所述第一目标连接的情况下,所述发起终端确定建立所述第一目标连接以进行所述发起终端和所述目标终端之间的通信。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    在确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信的情况下,所述发起终端向所述中继终端发送第一请求消息,所述第一请求消息用于请求使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信。
  4. 根据权利要求3所述的方法,其特征在于,所述第一请求消息包括以下中的至少之一:
    所述目标终端的标识信息、所述发起终端的地址信息。
  5. 根据权利要求3所述的方法,其特征在于,所述第一请求消息为链路修改请求消息。
  6. 根据权利要求3-5中任一项所述的方法,其特征在于,所述方法还包括:
    所述发起终端接收所述中继终端发送的第一响应消息,所述第一响应消息用于指示确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信。
  7. 根据权利要求6所述的方法,其特征在于,所述第一响应消息包括所述目标终端的地址信息。
  8. 根据权利要求6或7所述的方法,其特征在于,所述第一响应消息为链路修改接受消息。
  9. 根据权利要求1-8中任一项所述的方法,其特征在于,所述方法还包括:
    在确定建立所述第一目标连接的情况下,所述发起终端向所述中继终端发送第二请求消息,所述第二请求消息用于请求建立所述第一目标连接。
  10. 根据权利要求9所述的方法,其特征在于,所述第二请求消息包括以下信息中的至少一项:
    所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
  11. 根据权利要求9或10所述的方法,其特征在于,所述方法还包括:
    在所述发起终端的所述中继终端的安全交互流程中,所述发起终端向所述中继终端发送所述发起终端的地址信息。
  12. 根据权利要求9-11中任一项所述的方法,其特征在于,所述方法还包括:
    所述发起终端接收所述中继终端发送的第二响应消息,所述第二响应消息用于指示完成所述第一目标连接的建立。
  13. 根据权利要求12所述的方法,其特征在于,所述第二响应消息包括所述目标终端的地址信息。
  14. 根据权利要求4、10或11所述的方法,其特征在于,所述发起终端的地址信息包括所述发起终端的网络协议IP地址信息和/或所述发起终端的媒体接入控制MAC地址信息。
  15. 根据权利要求7或13所述的方法,其特征在于,所述目标终端的地址信息包括所述目标终端的IP地址信息和/或所述目标终端的MAC地址信息。
  16. 根据权利要求10所述的方法,其特征在于,所述待传输业务的信息包括以下中的至少一项:
    待传输业务的应用标识,业务类型,中继服务码。
  17. 根据权利要求10或16所述的方法,其特征在于,所述待传输业务的信息用于所述中继终端确定所述中继终端和所述目标终端之间是否已建立用于所述待传输业务的连接。
  18. 根据权利要求4或10所述的方法,其特征在于,所述目标终端的标识信息包括所述目标终端的应用层标识和/或链路层标识。
  19. 根据权利要求10所述的方法,其特征在于,所述发起终端的标识信息包括所述发起终端的应用层标识和/或链路层标识。
  20. 根据权利要求1-19中任一项所述的方法,其特征在于,所述第一目标连接为所述发起终端和所述中继终端之间的直接通信连接,或者,所述第一目标连接为所述发起终端和所述中继终端之间的用于特定业务的直接通信连接,所述特定业务为所述发起终端和所述目标终端之间的待传输业务。
  21. 一种中继通信的方法,其特征在于,包括:
    中继终端根据所述中继终端和目标终端之间的第二目标连接的建立情况,确定是否使用所述第二目标连接进行发起终端和目标终端之间的通信。
  22. 根据权利要求21所述的方法,其特征在于,所述中继终端根据所述中继终端和目标终端之间的第二目标连接的建立情况,确定是否使用所述第二目标连接进行发起终端和目标终端之间的通信,包括:
    在所述中继终端和所述目标终端之间已建立所述第二目标连接的情况下,所述中继终端确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信;或
    在所述中继终端和所述目标终端之间未建立所述第二目标连接的情况下,所述中继终端确定建立所述第二目标连接以进行所述发起终端和所述目标终端之间的通信。
  23. 根据权利要求21或22所述的方法,其特征在于,所述方法还包括:
    在确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信的情况下,所述中继终端向所述目标终端发送第三请求消息,所述第三请求消息用于请求使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信。
  24. 根据权利要求23所述的方法,其特征在于,所述第三请求消息包括以下信息中的至少一项:
    所述发起终端的标识信息、所述发起终端的地址信息。
  25. 根据权利要求24所述的方法,其特征在于,所述发起终端的标识信息是所述中继终端从所述发起终端的第一请求信息和/或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述发起终端和所述中继终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接;或者
    所述发起终端的标识信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的。
  26. 根据权利要求24或25所述的方法,其特征在于,所述发起终端的地址信息是所述中继终端从所述发起终端的第一请求信息或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述发起终端和所述中继终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接;或者
    所述发起终端的地址信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的;或者,
    所述发起终端的地址信息是所述中继终端在所述中继终端和所述发起终端的安全交互流程中获得的。
  27. 根据权利要求23-26中任一项所述的方法,其特征在于,所述第三请求消息为链路修改请求消息。
  28. 根据权利要求23-27中任一项所述的方法,其特征在于,所述方法还包括:
    所述中继终端接收所述目标终端发送的第三响应消息,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信。
  29. 根据权利要求28所述的方法,其特征在于,所述第三响应消息包括所述目标终端的地址信息。
  30. 根据权利要求28或29所述的方法,其特征在于,所述第三响应消息为链路修改接受消息。
  31. 根据权利要求21-30中任一项所述的方法,其特征在于,所述方法还包括:
    在确定建立所述中继终端和所述目标终端之间的第二目标连接的情况下,所述中继终端向所述目标终端发送第四请求消息,所述第四请求消息用于请求建立所述中继终端和所述目标终端之间的第二目标连接。
  32. 根据权利要求31所述的方法,其特征在于,所述第四请求消息包括以下信息中的至少一项:
    所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
  33. 根据权利要求32所述的方法,其特征在于,所述发起终端的标识信息是所述中继终端从所述发起终端的第一请求信息和/或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述中继终端和所述发起终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接;或者
    所述发起终端的标识信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的。
  34. 根据权利要求32或33所述的方法,其特征在于,所述目标终端的标识信息是所述中继终端 从发起终端的第一请求信息和/或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述中继终端和所述发起终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接。
  35. 根据权利要求32-34中任一项所述的方法,其特征在于,所述发起终端的地址信息是所述中继终端从所述发起终端的第一请求信息和/或第二请求消息获得的,其中,所述第一请求消息用于请求使用所述中继终端和所述发起终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信,所述第二请求消息用于请求建立所述第一目标连接;或者
    所述发起终端的地址信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的;或者,
    所述发起终端的地址信息是所述中继终端在所述中继终端和所述发起终端的安全交互流程中获得的。
  36. 根据权利要求32-35中任一项所述的方法,其特征在于,所述待传输业务的信息是所述中继终端从发起终端的第二请求消息获得的,其中,所述第二请求消息用于请求建立所述中继终端和所述发起终端之间的第一目标连接;或者,
    所述待传输业务的信息是所述中继终端从所述中继终端上存储的所述中继终端和所述发起终端之间的第一目标连接的上下文获得的。
  37. 根据权利要求31-36中任一项所述的方法,其特征在于,所述方法还包括:
    在所述中继终端和所述目标终端的安全交互流程中,所述中继终端获取所述目标终端的地址信息。
  38. 根据权利要求31-37中任一项所述的方法,其特征在于,所述方法还包括:
    所述中继终端接收所述目标终端发送的第四响应消息,所述第四响应消息用于指示完成所述第二目标连接的建立。
  39. 根据权利要求38所述的方法,其特征在于,所述第四响应消息包括所述目标终端的地址信息。
  40. 根据权利要求38或39所述的方法,其特征在于,在所述第四响应消息之后,所述方法还包括:所述中继终端和所述目标终端协商所述目标终端的地址信息。
  41. 根据权利要求38或39所述的方法,其特征在于,在所述第四响应消息之后,所述方法还包括:所述中继终端给所述目标终端分配所述目标终端的地址信息。
  42. 根据权利要求21-41中任一项所述的方法,其特征在于,所述方法还包括:
    所述中继终端接收所述发起终端发送的第一请求消息,所述第一请求消息用于请求使用所述发起终端和所述目标终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信。
  43. 根据权利要求42所述的方法,其特征在于,所述第一请求消息包括所述目标终端的标识信息和/或所述发起终端的地址信息。
  44. 根据权利要求43所述的方法,其特征在于,所述目标终端的标识信息用于所述中继终端确定所述中继终端和所述目标终端之间是否已建立所述第二目标连接。
  45. 根据权利要求42-44中任一项所述的方法,其特征在于,所述第一请求消息为链路修改请求消息。
  46. 根据权利要求42-45中任一项所述的方法,其特征在于,所述方法还包括:
    所述中继终端向所述发起终端发送第一响应消息,所述第一响应消息用于指示确定使用所述第一目标连接进行所述发起终端和所述目标终端之间的通信。
  47. 根据权利要求46所述的方法,其特征在于,所述第一响应消息包括所述目标终端的地址信息。
  48. 根据权利要求46或47所述的方法,其特征在于,所述第一响应消息为链路修改接受消息。
  49. 根据权利要求21-48中任一项所述的方法,其特征在于,所述方法还包括:
    所述中继终端接收所述发起终端发送的第二请求消息,所述第二请求消息用于请求建立所述发起终端和所述目标终端之间的第一目标连接进行所述发起终端和所述目标终端之间的通信。
  50. 根据权利要求49所述的方法,其特征在于,所述第二请求消息包括以下信息中的至少一项:
    所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
  51. 根据权利要求50所述的方法,其特征在于,所述目标终端的标识信息用于所述中继终端确定所述中继终端和所述目标终端之间是否已建立所述第二目标连接。
  52. 根据权利要求50或51所述的方法,其特征在于,所述待传输业务的信息用于所述中继终端 确定所述中继终端和所述目标终端之间是否已建立用于所述待传输业务的连接。
  53. 根据权利要求49-52中任一项所述的方法,其特征在于,所述方法还包括:
    在所述中继终端和所述发起终端的安全交互流程中,所述中继终端获取所述发起终端的地址信息。
  54. 根据权利要求49-53中任一项所述的方法,其特征在于,所述方法还包括:
    所述中继终端向所述发起终端发送第二响应消息,所述第二响应消息用于指示完成所述第一目标连接的建立。
  55. 根据权利要求54所述的方法,其特征在于,所述第二响应消息包括所述目标终端的地址信息。
  56. 根据权利要求47或55所述的方法,其特征在于,
    所述目标终端的地址信息是所述中继终端从所述目标终端获取的;或者
    所述目标终端的地址信息是所述中继终端从所述中继终端上存储的所述中继终端和所述目标终端之间的第二目标连接的上下文获取的;或者
    所述目标终端的地址信息是所述中继终端和所述目标终端协商的;或者
    所述目标终端的地址信息是所述中继终端给所述目标终端分配的。
  57. 根据权利要求56所述的方法,其特征在于,所述目标终端的地址信息是所述中继终端从所述目标终端获取的,包括:
    所述目标终端的地址信息是所述中继终端从所述目标终端的第三响应消息和/或第四响应消息获得的,其中,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信,所述第四响应消息用于指示完成所述第二目标连接的建立;和/或
    所述目标终端的地址信息是所述中继终端在所述中继终端和所述目标终端的安全交互流程中从所述目标终端获得的。
  58. 根据权利要求24、32、43、50或53所述的方法,其特征在于,所述发起终端的地址信息包括所述发起终端的网络协议IP地址信息和/或所述发起终端的媒体接入控制MAC地址信息。
  59. 根据权利要求29、37、39、或47所述的方法,其特征在于,所述目标终端的地址信息包括所述目标终端的IP地址信息和/或所述目标终端的MAC地址信息。
  60. 根据权利要求32或50所述的方法,其特征在于,所述待传输业务的信息包括以下中的至少一项:待传输业务的应用标识,业务类型,中继服务码。
  61. 根据权利要求32、43或50所述的方法,其特征在于,所述目标终端的标识信息包括所述目标终端的应用层标识和/或链路层标识。
  62. 根据权利要求24、32或50所述的方法,其特征在于,所述发起终端的标识信息包括所述发起终端的应用层标识和/或链路层标识。
  63. 根据权利要求21-62中任一项所述的方法,其特征在于,所述第二目标连接为所述中继终端和所述目标终端之间的直接通信连接,或者,所述第二目标连接为所述中继终端和所述目标终端之间的用于特定业务的直接通信连接,所述特定业务为所述发起终端和所述目标终端之间的待传输业务。
  64. 一种中继通信的方法,其特征在于,包括:
    目标终端接收中继终端的第三请求消息或第四请求消息,所述第三请求消息用于请求使用所述中继终端和所述目标终端之间的第二目标连接进行发起终端和所述目标终端之间的通信,所述第四请求消息用于请求建立所述中继终端和所述目标终端之间的第二目标连接以进行所述发起终端和所述目标终端之间的通信。
  65. 根据权利要求64所述的方法,其特征在于,所述第三请求消息是所述中继终端在所述第二目标连接已建立的情况下发送的。
  66. 根据权利要求64或65所述的方法,其特征在于,所述第三请求消息包括以下信息中的至少一项:所述发起终端的标识信息、所述发起终端的地址信息。
  67. 根据权利要求64-66中任一项所述的方法,其特征在于,所述第三请求消息为链路修改请求消息。
  68. 根据权利要求64-67中任一项所述的方法,其特征在于,所述方法还包括:
    所述目标终端向所述中继终端发送第三响应消息,所述第三响应消息用于指示确定使用所述第二目标连接进行所述发起终端和所述目标终端之间的通信。
  69. 根据权利要求68所述的方法,其特征在于,所述第三响应消息包括所述目标终端的地址信息。
  70. 根据权利要求68或69所述的方法,其特征在于,所述第三响应消息为链路修改接受消息。
  71. 根据权利要求64-70中任一项所述的方法,其特征在于,所述第四请求消息是所述中继终端在所述中继终端和所述目标终端之间未建立所述第二目标连接的情况下发送的。
  72. 根据权利要求71所述的方法,其特征在于,所述第四请求消息包括以下信息中的至少一项:
    所述发起终端的标识信息、所述目标终端的标识信息、所述发起终端的地址信息、待传输业务的信息。
  73. 根据权利要求62-72中任一项所述的方法,其特征在于,所述方法还包括:
    在所述目标终端和所述中继终端的安全交互流程中,所述目标终端向所述中继终端发送所述目标终端的地址信息。
  74. 根据权利要求64-73中任一项所述的方法,其特征在于,所述方法还包括:
    所述目标终端向所述中继终端发送第四响应消息,所述第四响应消息用于指示完成所述第二目标连接的建立。
  75. 根据权利要求74所述的方法,其特征在于,所述第四响应消息包括所述目标终端的地址信息。
  76. 一种发起终端,其特征在于,包括:
    处理单元,用于根据所述发起终端和中继终端之间的第一目标连接的建立情况,确定是否使用所述第一目标连接进行所述发起终端和目标终端之间的通信。
  77. 一种中继终端,其特征在于,包括:
    处理单元,用于根据所述中继终端和目标终端之间的第二目标连接的建立情况,确定是否使用所述第二目标连接进行发起终端和目标终端之间的通信。
  78. 一种目标终端,其特征在于,包括:
    通信单元,用于接收中继终端的第三请求消息或第四请求消息,所述第三请求消息用于请求使用所述中继终端和目标终端之间的第二目标连接进行发起终端和所述目标终端之间的通信,所述第四请求消息用于请求建立所述中继终端和所述目标终端之间的第二目标连接以进行所述发起终端和所述目标终端之间的通信。
  79. 一种发起终端,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至20中任一项所述的方法。
  80. 一种中继终端,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求21至63中任一项所述的方法。
  81. 一种目标终端,其特征在于,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求64至75中任一项所述的方法。
  82. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至20中任一项所述的方法,或如权利要求21至63中任一项所述的方法,或如权利要求64至75中任一项所述的方法。
  83. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至20中任一项所述的方法,或如权利要求21至63中任一项所述的方法,或如权利要求64至75中任一项所述的方法。
  84. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至20中任一项所述的方法,或如权利要求21至63中任一项所述的方法,或如权利要求64至75中任一项所述的方法。
  85. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求1至20中任一项所述的方法,或如权利要求21至63中任一项所述的方法,或如权利要求64至75中任一项所述的方法。
PCT/CN2022/081688 2022-03-18 2022-03-18 中继通信的方法、发起终端、中继终端和目标终端 WO2023173405A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280088509.9A CN118542068A (zh) 2022-03-18 2022-03-18 中继通信的方法、发起终端、中继终端和目标终端
PCT/CN2022/081688 WO2023173405A1 (zh) 2022-03-18 2022-03-18 中继通信的方法、发起终端、中继终端和目标终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/081688 WO2023173405A1 (zh) 2022-03-18 2022-03-18 中继通信的方法、发起终端、中继终端和目标终端

Publications (1)

Publication Number Publication Date
WO2023173405A1 true WO2023173405A1 (zh) 2023-09-21

Family

ID=88021916

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/081688 WO2023173405A1 (zh) 2022-03-18 2022-03-18 中继通信的方法、发起终端、中继终端和目标终端

Country Status (2)

Country Link
CN (1) CN118542068A (zh)
WO (1) WO2023173405A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012010281A (ja) * 2010-06-28 2012-01-12 Nippon Telegr & Teleph Corp <Ntt> 無線中継装置、省電力制御方法および無線中継方法
WO2021138764A1 (zh) * 2020-01-06 2021-07-15 华为技术有限公司 通信方法和装置
CN113543266A (zh) * 2020-04-16 2021-10-22 展讯半导体(南京)有限公司 无线通信链路建立方法与装置、终端和中继设备
CN113545118A (zh) * 2019-03-29 2021-10-22 本田技研工业株式会社 中继装置、程序、通信系统和通信方法
US20210336967A1 (en) * 2019-07-01 2021-10-28 Soracom, Inc. Relay method, relay system, and relay program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012010281A (ja) * 2010-06-28 2012-01-12 Nippon Telegr & Teleph Corp <Ntt> 無線中継装置、省電力制御方法および無線中継方法
CN113545118A (zh) * 2019-03-29 2021-10-22 本田技研工业株式会社 中继装置、程序、通信系统和通信方法
US20210336967A1 (en) * 2019-07-01 2021-10-28 Soracom, Inc. Relay method, relay system, and relay program
WO2021138764A1 (zh) * 2020-01-06 2021-07-15 华为技术有限公司 通信方法和装置
CN113543266A (zh) * 2020-04-16 2021-10-22 展讯半导体(南京)有限公司 无线通信链路建立方法与装置、终端和中继设备

Also Published As

Publication number Publication date
CN118542068A (zh) 2024-08-23

Similar Documents

Publication Publication Date Title
WO2022036555A1 (zh) 中继传输的方法、中继终端和远端终端
WO2020077577A1 (zh) 数据包传输方法和设备
WO2020150876A1 (zh) 会话建立方法、终端设备和网络设备
WO2021196185A1 (zh) 无线通信方法、终端设备和网络设备
WO2021109470A1 (en) Method for sidelink relay communication under dual connectivity
EP4050939A1 (en) Wireless communication method and terminal device
CN116746085A (zh) 传输数据的方法和装置
WO2022160123A1 (zh) 接入方式选择方法、终端设备和网络设备
WO2022056676A1 (zh) 业务识别方法、终端设备和网络设备
WO2023102940A1 (zh) 无线通信方法、远端终端以及中继终端
WO2022160205A1 (zh) 一种数据传输方法、终端设备和网络设备
WO2022126641A1 (zh) 无线通信方法、终端设备、第一接入网设备以及网元
WO2023173405A1 (zh) 中继通信的方法、发起终端、中继终端和目标终端
WO2021189368A1 (zh) 上报释放辅小区组的方法和终端设备
WO2021212465A1 (zh) 无线通信方法和终端设备
WO2023141909A1 (zh) 无线通信方法、远端ue以及网元
WO2022233011A1 (zh) 建立连接的方法和终端设备
WO2024036579A1 (zh) 无线通信的方法及设备
WO2024119491A1 (zh) 无线通信的方法、终端设备和中继节点
WO2022174726A1 (zh) 无线通信的方法及终端设备
WO2022061829A1 (zh) 无线通信方法和设备
WO2023015573A1 (zh) 通信方法、设备及存储介质
WO2022061838A1 (zh) 启用反向映射机制方法、终端设备和网络设备
WO2023070684A1 (zh) 无线通信的方法和设备
WO2022213393A1 (zh) 寻呼方法、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22931437

Country of ref document: EP

Kind code of ref document: A1

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112024018197

Country of ref document: BR