WO2024046176A1 - 通信方法和通信装置 - Google Patents

通信方法和通信装置 Download PDF

Info

Publication number
WO2024046176A1
WO2024046176A1 PCT/CN2023/114327 CN2023114327W WO2024046176A1 WO 2024046176 A1 WO2024046176 A1 WO 2024046176A1 CN 2023114327 W CN2023114327 W CN 2023114327W WO 2024046176 A1 WO2024046176 A1 WO 2024046176A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
terminal device
configuration
access network
network device
Prior art date
Application number
PCT/CN2023/114327
Other languages
English (en)
French (fr)
Inventor
朱锦顺
汪波
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024046176A1 publication Critical patent/WO2024046176A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Definitions

  • the present application relates to the field of wireless communications, and in particular, to a communication method and a communication device.
  • the fifth generation mobile communication technology (5G) stand alone (SA) has enhanced mobile broadband (eMMB), high-reliable low-latency communication,
  • eMMB enhanced mobile broadband
  • URLLC massive machine type of communication
  • mMTC massive machine type of communication
  • VR virtual reality
  • AR augmented reality
  • SA networking can support idle access and inactive access to realize communication between terminal equipment and network equipment.
  • This application provides a communication method and communication device, which can reduce access delay and improve communication efficiency.
  • a communication method includes: the access network device sends a first configuration message to the terminal device, where the first configuration message is used to configure a security algorithm for the terminal device; the access network device sends a third configuration message to the terminal device.
  • Two configuration messages, the second configuration message is used for radio resource control (RRC) reconfiguration, the first configuration message and the second configuration message are sent in parallel; the access network device receives the first configuration completion message from the terminal device, The first configuration complete message is used to indicate that the security algorithm has been configured; the access network device receives the second configuration complete message from the terminal device, and the second configuration complete message is used to indicate that the RRC reconfiguration is completed.
  • RRC radio resource control
  • the access network device can be a base station (gNodeB), and the terminal device can be a user equipment (UE), but this application is not limited to this.
  • gNodeB base station
  • UE user equipment
  • the first configuration message may be a security mode command message
  • the second configuration message may be an RRC reconfiguration message. Sending the first configuration message and the second configuration message in parallel means that after the first configuration message is transmitted, the second configuration message is transmitted immediately without waiting for a feedback message of the first configuration message.
  • the access network device may receive a configuration failure message from the terminal device or does not receive the first configuration completion message. If the terminal device fails to configure the security algorithm based on the second configuration message, message, the RRC reconfiguration fails, the access network device may receive the RRC reconfiguration failure message from the terminal device or does not receive the second configuration completion message, and the access network device may send the first configuration message and the second configuration to the terminal device again. information. If the access network device receives a configuration failure message and a second configuration completion message from the terminal device, the access network device may send the first configuration message to the terminal device. If the access network device receives the first configuration completion message and the RRC reconfiguration failure message from the terminal device, the access network device may send the second configuration message to the terminal device.
  • the access network device may receive the first configuration completion message and the second configuration completion message in parallel. That is, the access network device may receive the second configuration completion message after receiving the first configuration completion message, or may receive the second configuration completion message after receiving the second configuration completion message. The first configuration completion message is then received, which is not limited in this application.
  • the access network device After the access network device sends the first configuration message to the terminal device, it can immediately send the second configuration message to the terminal device without waiting for the first configuration completion message to be received before sending the second configuration message. This is beneficial to saving the delay of waiting to receive the first configuration completion message, reducing access delay, and improving communication efficiency.
  • the first configuration message and the second configuration message occupy the same time frequency. resource.
  • the first configuration message and the second configuration message occupy the same time-frequency resource, which may mean that the first configuration message and the second configuration message occupy the same time slot or the same symbol, which is not limited in this application.
  • the first configuration message and the second configuration message occupy the same time-frequency resource, and may also be called the first configuration message and the second configuration message being sent together, which is not limited in the embodiment of the present application.
  • the first configuration message and the second configuration message occupy the same time-frequency resource, which can save the overhead of time-frequency resources.
  • the first configuration completion message and the second configuration completion message occupy the same time-frequency resource.
  • the first configuration complete message and the second configuration complete message occupy the same time-frequency resource. It can also be called that the access network device receives the first configuration complete message and the second configuration complete message together. This application does not limit this.
  • the first configuration completion message and the second configuration completion message occupy the same time-frequency resources, which can save the overhead of time-frequency resources.
  • the above method before the access network device sends the second configuration message to the terminal device, the above method further includes: the access network device sends a query message to the terminal device, and the query message is In order to query the capability of the terminal device, the first configuration message, the query message and the second configuration message are sent in parallel.
  • the access network device may also send a query message to the terminal device.
  • the query message may be the UECapabilityEnquiry message in the specific embodiment, but the application is not limited to this.
  • the first configuration message, the query message and the second configuration message are sent in parallel, which means that after the first configuration message is transmitted, the query message is transmitted immediately without waiting for the feedback message of the first configuration message, and after the query message is transmitted, the second configuration message is transmitted immediately. Configure messages without waiting for feedback messages from query messages.
  • the first configuration message, the query message and the second configuration message are all sent in parallel, which is beneficial to saving the delay of waiting to receive the first configuration completion message and waiting to receive the feedback message of the query message, further reducing the Reduce access delay and improve communication efficiency.
  • the above method further includes: the access network device receives the capability information from the terminal device, Capability information includes capabilities of the terminal device.
  • the capability information may be sent by the terminal device to the access network device based on the above query message.
  • the capability information may be UECapabilityInformation in specific embodiments, but this application is not limited to this.
  • the access network device may receive the first configuration completion message, the second configuration completion message and the capability information in parallel. That is, the access network device may receive the second configuration completion message after receiving the first configuration completion message, or may receive the second configuration completion message after receiving the second configuration completion message.
  • the first configuration completion message is received after the configuration completion message, which is not limited in this application.
  • the access network device receives the first configuration completion message, the second configuration completion message and the capability information in parallel, the delay can be further reduced and the communication efficiency can be improved.
  • the first configuration message and the query message occupy the same time-frequency resource.
  • the first configuration message and the query message occupy the same time-frequency resource, which may mean that the first configuration message and the query message occupy the same time slot or the same symbol, which is not limited in this application.
  • the first configuration completion message and the capability information occupy the same time-frequency resource.
  • the first configuration message and the capability information occupy the same time-frequency resource, and may also be called the first configuration message and the capability information being sent together, which is not limited in the embodiments of the present application.
  • the first configuration message and the capability information occupy the same time-frequency resource, which can save the overhead of time-frequency resources.
  • a communication method including: the access network device sends a first configuration message to the terminal device, where the first configuration message is used to configure a security algorithm for the terminal device; the access network device sends a query message to the terminal device, The query message is used to query the capabilities of the terminal device, and the first configuration message and the query message are sent in parallel; the access network device receives the first configuration completion message from the terminal device, and the first configuration completion message is used to indicate that the security algorithm has been configured; The network access device receives energy from the terminal device. Capability information includes the capabilities of the terminal device.
  • the access network device can be a gNodeB and the terminal device can be a UE, but this application is not limited to this.
  • the first configuration message may be a safe mode command message, and in a specific embodiment the query message may be a UECapabilityEnquiry message, but the application is not limited thereto.
  • the first configuration message and the query message are sent in parallel, which means that after the first configuration message is transmitted, the query message is transmitted immediately without waiting for the feedback message of the first configuration message.
  • the access network device may receive a configuration failure message from the terminal device or does not receive the first configuration completion message. If the terminal device fails to configure the security algorithm based on the query message, If no message is fed back and the access network device does not receive the capability information, the access network device can send the first configuration message and the query message to the terminal device again. If the access network device receives a configuration failure message and capability information from the terminal device, the access network device may send the first configuration message to the terminal device. If the access network device receives the first configuration completion message from the terminal device and does not receive the capability information, the access network device may send query information to the terminal device.
  • the access network device may receive the first configuration completion message and the capability information in parallel, that is, the access network device may receive the capability information after receiving the first configuration completion message, or may receive the first configuration completion message after receiving the capability information. There are no restrictions on this application.
  • the access network device After the access network device sends the first configuration message to the terminal device, it can immediately send a query message to the terminal device. There is no need to wait for the first configuration completion message to be received before sending the query message, which is beneficial to saving time waiting for reception.
  • the delay to the first configuration completion message reduces access delay and improves communication efficiency.
  • the above method further includes: the access network device sends a second configuration message to the terminal device, and the second configuration message is used for radio resource control RRC reconfiguration; the access network device The device receives a second configuration complete message from the terminal device, and the second configuration complete message is used to indicate that the RRC reconfiguration is completed.
  • the access network device may also send a second configuration message to the terminal device.
  • the second configuration message may be an RRC reconfiguration message in a specific embodiment, but the application is not limited thereto.
  • the access network device receives the second configuration completion message from the terminal device to implement the initial context establishment process.
  • the access network device enables the terminal device to implement RRC reconfiguration through the second configuration message, thereby realizing the initial context establishment process, which is conducive to completing the access process.
  • the first configuration message and the query message occupy the same time-frequency resource.
  • the first configuration completion message and the capability information occupy the same time-frequency resource.
  • a communication method including: the access network device sends a first message to a terminal device, the first message including a contention resolution message; the access network device sends a second message to the terminal device, the second message includes a wireless Resource control RRC configuration message, the first message and the second message are sent in parallel, where the RRC configuration message is an RRC recovery message or an RRC establishment message; the access network device receives the first feedback message from the terminal device, and the first feedback message is used to It indicates that the terminal device has received the first message; the access network device receives the second feedback message from the terminal device, and the second feedback message is used to indicate that the terminal device has received the second message.
  • the access network device can be a gNodeB and the terminal device can be a UE, but this application is not limited to this.
  • the RRC configuration message may be an RRC establishment message, an RRC recovery message or other messages, which are not limited in the embodiment of this application.
  • the first message may be message 4 (Msg4) in a specific embodiment, and Msg4 may include a contention resolution message.
  • the contention resolution message may be a contention resolution medium access control protocol control element (MAC CE) message.
  • the second message may be the RRC setup message (RRCSetupRequest) or the RRC recovery (RRCResume) message in the specific embodiment, but the application is not limited thereto.
  • Sending the first message and the second message in parallel means that after the first message is transmitted, the second message is transmitted immediately without waiting for the feedback message of the first message.
  • the access network device can send the first message and the second message to the terminal device again. If the access network device receives the feedback message It is used to indicate that the terminal device has not received the first message, but has received the second message, and the access network device can send the first message to the terminal device. If the feedback message received by the access network device is used to indicate that the terminal device has received the first message but not the second message, the access network device may send the second message to the terminal device.
  • the access network device may receive the first feedback message and the second feedback message in parallel, that is, the access network device may receive the second feedback message after receiving the first feedback message, or receive the first feedback after receiving the second feedback message. message, this application does not limit this.
  • the access network device after the access network device sends the first configuration message to the terminal device, it can immediately send the second configuration message to the terminal device without waiting for the first feedback message to be received before sending the second configuration message, which is beneficial This saves the delay of waiting for the first feedback message, reduces access delay, and improves communication efficiency.
  • the first feedback message and the second feedback message occupy the same time-frequency resource.
  • the first feedback message and the second feedback message occupy the same time-frequency resource, which may mean that the first feedback message and the second feedback message occupy the same time slot or the same symbol, which is not limited in this application.
  • the first feedback message and the second feedback message occupy the same time-frequency resource, and may also be called the first feedback message and the second feedback message being sent together, which is not limited in the embodiment of the present application.
  • the first feedback message and the second feedback message occupy the same time-frequency resource, which can save the overhead of time-frequency resources.
  • the first message and the second message occupy the same time-frequency resource.
  • the first message and the second message occupy the same time-frequency resource, which can also be called the access network device receiving the first message and the second message in a combined manner, which is not limited in this application.
  • the first message and the second message occupy the same time-frequency resource, which can save the overhead of time-frequency resources.
  • the second message is transmitted in fragments.
  • the second message includes M blocks of data.
  • the M blocks of data are obtained by fragmenting the second message.
  • N in the M blocks of data The block data and the first message occupy the same time-frequency resource, M is greater than N, and M is an integer greater than 1, and N is an integer greater than or equal to 1.
  • the second message can be transmitted in fragments (for example, RRC recovery message) and is divided into M blocks of data
  • part of the data in the second message that is, N blocks of data in the M blocks of data
  • Time-frequency resources, the remaining data in the second message may occupy the same time-frequency resources, or may occupy different time-frequency resources, which is not limited in the embodiment of the present application.
  • the N blocks of data in the M blocks of data and the first message occupy the same time-frequency resources. Compared with the M blocks of data occupying different time-frequency resources respectively, the overhead of time-frequency resources can be saved.
  • a communication method including: a terminal device receiving a first configuration message from an access network device, where the first configuration message is used to configure a security algorithm for the terminal device; and the terminal device receiving a third configuration message from the access network device.
  • Two configuration messages the second configuration message is used for radio resource control RRC reconfiguration, the first configuration message and the second configuration message are received in parallel; the terminal device performs security algorithm configuration based on the first configuration message; after the security algorithm configuration is completed, The access network device sends a first configuration completion message, which is used to indicate that the security algorithm has been configured; the terminal device performs RRC reconfiguration based on the second configuration message; after the RRC reconfiguration is completed, the terminal device A second configuration complete message is sent, and the second configuration complete message is used to indicate that the RRC reconfiguration is completed.
  • the first configuration message and the second configuration message occupy the same time-frequency resource.
  • the first configuration completion message and the second configuration completion message occupy the same time-frequency resource.
  • the method before the terminal device receives the second configuration message from the access network device, the method further includes: the terminal device receives a query message from the access network device, and the query message For querying the capabilities of the terminal device, the first configuration message, the query message and the second configuration message are received in parallel.
  • the method further includes: the terminal device sends capability information to the access network device based on the query message, where the capability information includes the capabilities of the terminal device.
  • the first configuration message and the query message occupy the same time-frequency resource.
  • the first configuration completion message and the capability information occupy the same time frequency resource.
  • a communication method including: a terminal device receiving a first configuration message from an access network device, where the first configuration message is used to configure a security algorithm for the terminal device; and the terminal device receiving a query from the access network device.
  • message the query message is used to query the capabilities of the terminal device, and the first configuration message and the query message are received in parallel; the terminal device performs security algorithm configuration based on the first configuration message; after the security algorithm configuration is completed, sends the first configuration message to the access network device Configuration completion message, the first configuration completion message is used to indicate that the security algorithm has been configured; the terminal device sends capability information to the access network device based on the query message, and the capability information includes the capabilities of the terminal device.
  • the method further includes: the terminal device receives a second configuration message from the access network device, the second configuration message is used for radio resource control RRC reconfiguration; the terminal device is based on The second configuration message is used to perform RRC reconfiguration; after the RRC reconfiguration is completed, a second configuration completion message is sent to the access network device, and the second configuration completion message is used to indicate that the RRC reconfiguration is completed.
  • the first configuration message and the query message occupy the same time-frequency resource.
  • the first configuration completion message and the capability information occupy the same time-frequency resource.
  • a communication method including: a terminal device receiving a first message from an access network device, where the first message includes a contention resolution message; and the terminal device receiving a second message from the access network device, and the second message Including a radio resource control RRC configuration message, the first message and the second message are received in parallel, where the RRC configuration message is an RRC recovery message or an RRC establishment message; the terminal device sends a first feedback message to the access network device, and the first feedback message is Indicates that the terminal device has not received or has received the first message; the terminal device sends a second feedback message to the access network device, and the second feedback message is used to indicate that the terminal device has not received or has received the second message.
  • the first feedback message and the second feedback message occupy the same time-frequency resource.
  • the first message and the second message occupy the same time-frequency resource.
  • the second message is transmitted in fragments.
  • the second message includes M blocks of data.
  • the M blocks of data are obtained by fragmenting the second message.
  • N in the M blocks of data The block data and the first message occupy the same time-frequency resource, M is greater than N, and M is an integer greater than 1, and N is an integer greater than or equal to 1.
  • a communication device which device includes: a sending unit and a receiving unit.
  • the sending unit is used to: send a first configuration message to the terminal device, the first configuration message is used to configure a security algorithm for the terminal device; send a second configuration message to the terminal device, the second configuration message is used for radio resource control RRC reconfiguration , the first configuration message and the second configuration message are sent in parallel;
  • the receiving unit is used to: receive the first configuration completion message from the terminal device, the first configuration completion message is used to indicate that the security algorithm has been configured; receive the second configuration completion message from the terminal device.
  • Configuration completion message the second configuration completion message is used to indicate that RRC reconfiguration is completed.
  • the first configuration message and the second configuration message occupy the same time-frequency resource.
  • the first configuration completion message and the second configuration completion message occupy the same time-frequency resource.
  • the above-mentioned sending unit is also used to: send a query message to the terminal device, the query message is used to query the capabilities of the terminal device, the first configuration message, the query message and the second Configure messages to be sent in parallel.
  • the above-mentioned receiving unit is further configured to: receive capability information from the terminal device, where the capability information includes capabilities of the terminal device.
  • the first configuration message and the query message occupy the same time-frequency resource.
  • the first configuration completion message and the capability information occupy the same time-frequency resource.
  • a communication device including: a sending unit and a receiving unit.
  • the sending unit is used to: send a first configuration message to the terminal device, the first configuration message is used to configure a security algorithm for the terminal device; send a query message to the terminal device, the query message is used to query the capabilities of the terminal device, the first configuration message and the query message are sent in parallel;
  • the receiving unit is used to: receive the first configuration completion message from the terminal device, the first configuration completion message is used to indicate that the security algorithm has been configured; receive capability information from the terminal device, the capability information includes the terminal device ability.
  • the above-mentioned sending unit is also used to: send a second configuration message to the terminal device, and the second configuration message is used for radio resource control RRC reconfiguration; the above-mentioned receiving unit is also used to: At: receiving a second configuration completion message from the terminal device, where the second configuration completion message is used to indicate that the RRC reconfiguration is completed.
  • the first configuration message and the query message occupy the same time-frequency resource.
  • the first configuration completion message and the capability information occupy the same time-frequency resource.
  • a communication device including: a sending unit and a receiving unit.
  • the sending unit is configured to: send a first message to the terminal device, the first message including a contention resolution message; send a second message to the terminal device, the second message includes a radio resource control RRC configuration message, the first message and the second message are in parallel Send, where the RRC configuration message is an RRC recovery message or an RRC establishment message;
  • the receiving unit is configured to: receive a first feedback message from the terminal device, where the first feedback message is used to indicate that the terminal device has received the first message; receive a message from the terminal device. A second feedback message from the device. The second feedback message is used to indicate that the terminal device has received the second message.
  • the first feedback message and the second feedback message occupy the same time-frequency resource.
  • the first message and the second message occupy the same time-frequency resource.
  • the second message is transmitted in fragments.
  • the second message includes M blocks of data.
  • the M blocks of data are obtained by fragmenting the second message.
  • N in the M blocks of data The block data and the first message occupy the same time-frequency resource, M is greater than N, and M is an integer greater than 1, and N is an integer greater than or equal to 1.
  • a communication device including: a receiving unit, a sending unit and a processing unit.
  • the receiving unit is configured to: receive a first configuration message from the access network device, the first configuration message is used to configure a security algorithm; receive a second configuration message from the access network device, the second configuration message is used for wireless resources Control RRC reconfiguration, and receive the first configuration message and the second configuration message in parallel;
  • the processing unit is used to: perform security algorithm configuration based on the first configuration message;
  • the sending unit is used: after the security algorithm configuration is completed, send a message to the access network device Send a first configuration completion message, the first configuration completion message is used to indicate that the security algorithm has been configured;
  • the processing unit is also used to: perform RRC reconfiguration based on the second configuration message; the sending unit is also used to: after the RRC reconfiguration is completed , sending a second configuration completion message to the access network device, where the second configuration completion message is used to indicate that the RRC reconfiguration is completed.
  • the first configuration message and the second configuration message occupy the same time-frequency resource.
  • the first configuration completion message and the second configuration completion message occupy the same time-frequency resource.
  • the above-mentioned receiving unit is further configured to: receive a query message from the access network device, the query message is used to query the capability, the first configuration message, the query message and the third Two configuration messages are received in parallel.
  • the above-mentioned sending unit is further configured to: send capability information to the access network device based on the query message, where the capability information includes capabilities.
  • the first configuration message and the query message occupy the same time-frequency resource.
  • the first configuration completion message and the capability information occupy the same time-frequency resource.
  • a communication device including: a receiving unit, a sending unit and a processing unit.
  • the receiving unit is configured to: receive a first configuration message from the access network device, the first configuration message is used to configure a security algorithm; receive a query message from the access network device, the query message is used to query the capability of the first The configuration message and the query message are received in parallel;
  • the processing unit is configured to: perform security algorithm configuration based on the first configuration message;
  • the sending unit is configured to: after the security algorithm configuration is completed, send the first configuration completion message to the access network device, the first The configuration completion message is used to indicate that the security algorithm has been configured; based on the query message, capability information is sent to the access network device, and the capability information includes capabilities.
  • the above-mentioned receiving unit is configured to: receive a second configuration message from the access network device, where the second configuration message is used for radio resource control RRC reconfiguration; the above-mentioned The processing unit is configured to: perform RRC reconfiguration based on the second configuration message; the above-mentioned sending unit is configured to: after the RRC reconfiguration is completed, send a second configuration completion message to the access network device, and the second configuration completion message is used to indicate the RRC Reconfiguration completed.
  • the first configuration message and the query message occupy the same time frequency resource.
  • the first configuration completion message and the capability information occupy the same time-frequency resource.
  • a communication device including a receiving unit and a sending unit.
  • the receiving unit is configured to: receive a first message from the access network device, the first message including a contention resolution message; receive a second message from the access network device, the second message includes a radio resource control RRC configuration message, the first The message and the second message are received in parallel, wherein the RRC configuration message is an RRC recovery message or an RRC establishment message; the sending unit is used to: send a first feedback message to the access network device, and the first feedback message is used to indicate that it has not been received or has been received. The first message is received; and a second feedback message is sent to the access network device, where the second feedback message is used to indicate that the second message has not been received or that the second message has been received.
  • the first feedback message and the second feedback message occupy the same time-frequency resource.
  • the first message and the second message occupy the same time-frequency resource.
  • the second message is transmitted in fragments.
  • the second message includes M blocks of data.
  • the M blocks of data are obtained by fragmenting the second message.
  • the N pieces of data occupy the same time-frequency resource as the first message, M is greater than N, and M is an integer greater than 1, and N is an integer greater than or equal to 1.
  • a communication device including a processor and a memory.
  • the memory is used to store a computer program.
  • the processor is used to call and run the computer program from the memory, so that the device performs any of the above aspects. method in any of the possible implementations.
  • processors there are one or more processors and one or more memories.
  • the memory may be integrated with the processor, or the memory may be provided separately from the processor.
  • the communication device also includes a transmitter (transmitter) and a receiver (receiver).
  • the transmitter and receiver can be set separately or integrated together, called a transceiver (transceiver).
  • the present application provides a processor, including: an input circuit, an output circuit and a processing circuit.
  • the processing circuit is configured to receive signals through the input circuit and transmit signals through the output circuit, so that the processor performs the method in any of the possible implementations of any of the above aspects.
  • the above-mentioned processor can be a chip, the input circuit can be an input pin, the output circuit can be an output pin, and the processing circuit can be a transistor, a gate circuit, a flip-flop, and various logic circuits.
  • the input signal received by the input circuit may be received and input by, for example, but not limited to, the receiver, and the signal output by the output circuit may be, for example, but not limited to, output to and transmitted by the transmitter, and the input circuit and the output A circuit may be the same circuit that functions as an input circuit and an output circuit at different times.
  • This application does not limit the specific implementation methods of the processor and various circuits.
  • a computer-readable storage medium stores a computer program (which may also be called a code, or an instruction), and when run on a computer, causes the computer to execute any of the above.
  • a computer program which may also be called a code, or an instruction
  • a computer program product includes: a computer program (which may also be called a code, or an instruction).
  • a computer program which may also be called a code, or an instruction.
  • the computer program When the computer program is run, it causes the computer to perform any of the above aspects. method in any of the possible implementations.
  • Figure 1 is a schematic flow chart of the idle state access method
  • Figure 2 is a schematic flow chart of the inactive access method
  • Figure 3 is a schematic flow chart of a communication method provided by an embodiment of the present application.
  • Figure 4 is a schematic flow chart of another communication method provided by an embodiment of the present application.
  • Figure 5 is a schematic flow chart of yet another communication method provided by an embodiment of the present application.
  • Figure 6 is a timing comparison diagram provided by an embodiment of the present application.
  • Figure 7 is another timing comparison diagram provided by an embodiment of the present application.
  • Figure 8 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • Figure 9 is a schematic block diagram of another communication device provided by an embodiment of the present application.
  • WLAN wireless local area network
  • LTE long term evolution
  • LTE frequency division duplex frequency division duplex
  • FDD frequency division duplex
  • TDD LTE time division duplex
  • 5G fifth generation mobile communication
  • 5G fifth generation mobile communication
  • NR new radio, NR
  • 6G sixth generation mobile communication system
  • WiMAX global interoperability for microwave access
  • 5G systems usually include the following three major application scenarios: enhanced mobile broadband (eMBB), ultra-reliable and low latency communications (URLLC) and massive machine type of communications (massive machine type of communication, mMTC), various communication systems in the future.
  • eMBB enhanced mobile broadband
  • URLLC ultra-reliable and low latency communications
  • mMTC massive machine type of communications
  • the terminal equipment in the embodiment of this application may also be called: user equipment (UE), mobile station (MS), mobile terminal (mobile terminal, MT), access terminal, user unit, user station, Mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
  • UE user equipment
  • MS mobile station
  • MT mobile terminal
  • access terminal user unit, user station, Mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
  • the terminal device may be a device that provides voice/data connectivity to the user, such as a handheld device, a vehicle-mounted device, etc. with wireless connectivity capabilities.
  • some examples of terminals are: vehicles, mobile phones, tablets, laptops, PDAs, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, Augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, smart grid ), wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, cellular phones, cordless phones, session initiation protocols initiation protocol (SIP) telephone, wireless local loop (WLL) station, personal digital assistant (personal digital assistant (PDA)), handheld device with wireless communication capabilities, computing device or other processing device connected to a wireless modem , vehicle-mounted equipment, wearable equipment, drones, terminal equipment in the 5G network or terminal equipment in the future evolved public land mobile communication network (public land mobile network, PLMN), etc., the embodiments of this application are not limited
  • the terminal device may also be a terminal device in the Internet of things (IoT) system.
  • IoT Internet of things
  • Its main technical feature is to transfer items through communication technology. Connect with the network to realize an intelligent network of human-computer interconnection and physical-object interconnection.
  • the main function of the access network device in the embodiment of the present application is to control the terminal device to access the mobile communication network through wireless access.
  • Access network equipment is part of the mobile communication system and implements a wireless access technology.
  • the access network equipment may be a base station (base station), an evolved base station (evolved NodeB, eNodeB), a transmission reception point (TRP), or a next generation base station (next generation) in a 5G mobile communication system.
  • NodeB, gNB the next generation base station in the sixth generation (6th generation, 6G) mobile communication system, the base station in the future mobile communication system or the access node in the WiFi system, etc.; it can also be a module or module that completes some functions of the base station.
  • a unit for example, can be a centralized unit (CU) or a distributed unit (DU).
  • the wireless access network equipment can be a macro base station, a micro base station or an indoor station, or a relay node or a donor node, etc. It can be understood that all or part of the functions of the radio access network equipment in this application can also be implemented through software functions running on hardware, or through virtualization functions instantiated on a platform (such as a cloud platform). The embodiments of this application do not limit the specific technology and specific equipment form used by the access network equipment.
  • the core network equipment in the embodiment of the present application mainly includes user plane functions (user equipment, UPF) of the data plane and control plane functions.
  • the user plane function is mainly responsible for the forwarding of packet data packets, quality of service (QoS) control, billing information statistics and connection to external networks, etc. It includes the service gateway of long term evolution technology (long term evolution, LTE) (serving gateway, SGW) and public data network gateway (public data network gateway, PDN-GW) related functions.
  • the control plane function is mainly responsible for business process interaction, delivering data packet forwarding strategies, QoS control strategies, etc. to the user plane.
  • the network elements in the control plane function mainly include: mobility management function (access and mobility function, AMF), session management function (session management function, SMF), policy control function (policy control function, PCF), Application function (AF), network exposure function (NEF), etc.
  • AMF network elements and access network equipment are connected through NG interfaces, which can manage the access of terminal equipment to the core network.
  • the LMF network element can locate the terminal device based on the positioning request of the AMF network element. It should be understood that the functions of the LMF network element mentioned here can also be called the functions of the LMF. It can also be said that the LMF network element is used to implement the functions of the LMF.
  • the SMF network element is mainly responsible for managing the creation and deletion of user protocol data unit (PDU) sessions, maintaining PDU session context and user plane forwarding pipeline information.
  • PCF is mainly responsible for executing policy control, similar to the policy and charging rules function (PCRF) network element in long term evolution (LTE), including generating, managing users, sessions, quality of service ( Quality of service (QoS) flow processing policy, service quality and charging rules are generated, and the corresponding rules are delivered to UPF network elements through SMF.
  • the AF network element is mainly responsible for providing various business service functions. It can interact with the core network through the NEF network element and interact with the policy management framework for policy management. NEF is used to provide frameworks, authentication and interfaces related to network capability opening, and to transfer information between 5G system network functions and other network functions.
  • the fifth generation mobile communication technology (5G) stand alone (SA) is a completely independently constructed 5G network with enhanced mobile broadband (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability and low latency (eMMB), high reliability
  • SA networking can support two access modes: idle access and inactive access to achieve communication between terminal equipment and network equipment.
  • the inactive access method may also be called a deactivated access method, which is not limited in the embodiments of the present application.
  • the embodiments of this application have studied the idle state access method and the inactive state access method, and found that whether it is the idle state access or the inactive state access, there is a problem of prolonged access time.
  • Figure 1 shows a schematic flow chart of the idle state access method 100 under NR SA networking conditions.
  • the idle state access method 100 may include the following steps:
  • the user equipment user equipment, UE
  • the base station gNodeB
  • radio resource control radio resource control, RRC
  • the gNodeB sends an initial UE message to the core network equipment (5G core network, 5GC) to trigger 5GC establishment.
  • the 5GC receives the initial UE message.
  • the initial UE message may be INITIAL UE MESSAGE, but the embodiment of the present application is not limited to this.
  • Non-access stratum (NAS) messages are transmitted between S103, UE, gNodeB and 5GC.
  • NAS Non-access stratum
  • gNodeB transparently transmits NAS messages between UE and 5GC, completing IDENTITY query, authentication, NAS security mode and registration process, etc.
  • S104. 5GC sends an initial context establishment request message to the gNodeB.
  • the initial context establishment request message is used to request to start the initial context establishment process.
  • the gNodeB can receive the initial context establishment request message.
  • the initial context establishment request message may be INITIAL CONTEXT SETUP REQUEST, but the embodiment of the present application is not limited to this.
  • the gNodeB sends a security mode command message to the UE.
  • the security mode command message is used to configure a security algorithm for the UE.
  • the UE receives the security mode command message.
  • the security mode command message may be a SecurityModeCommand message, and the gNodeB may configure the integrity protection and encryption algorithm for the UE through the SecurityModeCommand message, but the embodiment of the present application is not limited to this.
  • the UE can send a security mode completion message to the gNodeB.
  • the security mode completion message is used to indicate that the security mode configuration is completed.
  • the gNodeB receives the security mode completion message.
  • the security mode completion message may be a SecurityModeComplete message, but the embodiment of the present application is not limited to this.
  • the gNodeB sends a UE capability query message to the UE.
  • the UE capability query message is used to query the UE's capabilities.
  • the UE receives the UE capability query message of the gNodeB.
  • the UE capability query message may be a UECapabilityEnquiry message, but the embodiment of the present application is not limited to this.
  • the UE sends UE capability information to the gNodeB.
  • the UE capability information includes the capabilities of the UE.
  • the gNodeB Receive the UE capability information.
  • the UE capability information may be UECapabilityInformation, but the embodiments of the present application are not limited thereto.
  • the gNodeB sends a UE wireless capability information indication message to the 5GC.
  • the UE wireless capability information indication message may be UE RADIO CAPABILITY INFO INDICATION, but the embodiment of the present application is not limited to this.
  • the gNodeB sends an RRC reconfiguration message to the UE.
  • the RRC reconfiguration message is used to perform RRC reconfiguration for the UE.
  • the UE receives the RRC reconfiguration message.
  • the RRC reconfiguration message may be RRCReconfiguration, but the embodiment of the present application is not limited to this.
  • the RRC reconfiguration message is used to perform RRC reconfiguration for the terminal device, that is, configuring the data radio bearer (DRB) and signaling radio bearer (SRB) for the UE.
  • DRB data radio bearer
  • SRB signaling radio bearer
  • the UE After the UE performs RRC reconfiguration, the UE sends an RRC reconfiguration complete message to the gNodeB.
  • the RRC reconfiguration complete message is used to indicate that the RRC reconfiguration is completed.
  • the RRC reconfiguration completion message may be an RRCReconfigurationComplete message, but the embodiment of the present application is not limited to this.
  • the gNodeB sends an initial context establishment response message to the 5GC.
  • the initial context establishment response message is used to indicate the end of the initial context establishment process.
  • the initial context establishment response message may be INITIAL CONTEXT SETUP RESPONSE, but the embodiment of the present application is not limited to this.
  • the embodiment of this application analyzes the above access process and finds that before gNodeB sends the UE capability query message to the UE, it must receive the security mode completion message from the UE. That is, the above S107 must be after S106 and must wait for the security configuration to be completed. Reporting the capabilities of the terminal device results in too long delay.
  • the gNodeB must receive the capability information from the UE before sending the RRC reconfiguration message to the UE. That is, the above S110 must be after S108 and must wait for the capability message to be reported before proceeding. RRC reconfiguration results in long delays and reduces communication efficiency.
  • the reason for the delay process can also be understood as the signaling process in the initial context establishment process is serial transmission, that is, after the security configuration process is completed, the UE capability query process is performed, and after the UE capability query process, the RRC reconfiguration process is performed. .
  • the initial context establishment process includes the UE capability query process, that is, the above method 100 includes S107 to S109.
  • the security mode configuration process and the UE capability query process are carried out in series. After receiving the security mode completion (SecurityModeComplete) message, the gNodeB issues the UE capability query message (UECapabilityEnquiry).
  • the initial context establishment process does not include the UE capability query process, that is, the above method 100 does not include S107 ⁇ S109 .
  • the security mode configuration process and the RRC reconfiguration process are carried out in series. After receiving the security mode completion (SecurityModeComplete) message, the gNodeB sends the RRC reconfiguration (RRCReconfiguration) message.
  • Figure 2 shows a schematic flow chart of the inactive access method 200 under NR SA networking conditions.
  • the inactive access method may include the following steps:
  • the UE sends message 1 (message 1, Msg 1) to gNodeB.
  • message 1 messages 1, Msg 1
  • gNodeB receives the Msg 1.
  • the UE that sends Msg 1 to the gNodeB may be one or multiple, and this is not limited in the embodiment of the present application.
  • the Msg 1 sent by each UE may be the same or different, and this is not limited in the embodiment of the present application.
  • the UE shown in Figure 2 may be one of the devices that sends Msg 1 to the gNodeB.
  • Msg 1 can carry a preamble (Preamble).
  • the preamble identifier can be used to inform the gNodeB that a random access request exists.
  • the preamble identifier may also be called a random access preamble, which is not limited in the embodiments of this application.
  • the gNodeB sends message 2 (message 2, Msg 2) to the UE based on Msg 1.
  • the Msg 2 carries uplink transmission control information.
  • the uplink transmission control information is used to instruct the UE to send message 3 (message 3, Msg 3).
  • Msg 2 can be a random access response (RAR) message.
  • Uplink transmission control information may also be called uplink scheduling control information, uplink transmission indication information or uplink scheduling indication information, The embodiments of the present application do not limit this.
  • the uplink transmission control information can be sent through Msg 2. That is to say, the gNodeB sends Msg 2 to the UE.
  • the Msg 2 includes the uplink transmission control information.
  • the uplink transmission control information is used to instruct the UE to send Msg 3.
  • the Msg 2 may also include information with other functions, which is not limited in the embodiments of this application.
  • gNodeB can send Msg 2 to multiple UEs.
  • the UE sends Msg 3 to the gNodeB to trigger the gNodeB to perform the RRC recovery process.
  • the gNodeB receives the Msg 3 sent by the UE.
  • Msg 3 may carry a recovery request message and a unique identifier of the UE.
  • the recovery request message may be RRCResumeRequest, but the embodiment of the present application is not limited to this.
  • the UE's unique identifier is used for conflict resolution.
  • the gNodeB sends message 4 (message 4, Msg 4) to the UE based on Msg 3. Correspondingly, the UE receives Msg4.
  • Msg 4 may carry a contention resolution message, which may be a contention resolution medium access control control element (MAC CE) message, for example, Contention Resolution Identity MAC CE, but the embodiments of the present application are not limited to this.
  • MAC CE contention resolution medium access control control element
  • each UE in the multiple UEs can send Msg 3 to gNodeB.
  • gNodeB can determine a random access target from multiple UEs based on the Msg 3 sent by each UE.
  • UE and send Msg4 to it.
  • the UE sends a feedback message A to the gNodeB.
  • the feedback message A is used to indicate that Msg 4 has not been received or has been received.
  • the gNodeB receives the feedback message A.
  • the feedback message A may be an acknowledgment (ACK) or a negative acknowledgment (NACK), but the embodiment of the present application is not limited to this.
  • the UE If the UE successfully receives Msg 4, it can send ACK to the gNodeB. If the UE does not successfully receive Msg 4, it can send a NACK to the gNodeB.
  • Feedback message A is used to indicate that the UE has received Msg 4.
  • the gNodeB sends an RRC recovery message to the UE.
  • the RRC recovery message is used to instruct the UE to perform RRC recovery.
  • the UE receives the RRC recovery message.
  • the RRC recovery message may be an RRCResume, but the embodiment of the present application is not limited to this.
  • the UE sends a feedback message B to the gNodeB.
  • the feedback message B is used to indicate that the RRC recovery message has not been received or that the RRC recovery message has been received.
  • the gNodeB receives the feedback message B.
  • Feedback message B may be ACK or NACK, but the embodiment of the present application is not limited to this.
  • the UE If the UE successfully receives the RRC recovery message, it can send ACK to the gNodeB. If the UE does not successfully receive the RRC recovery message, it can send a NACK to the gNodeB.
  • Feedback message B is used to indicate that the RRC recovery message has been received.
  • the UE performs RRC connection recovery processing according to the RRC recovery message.
  • the processing can send an RRC recovery completion message to the gNodeB.
  • the gNodeB receives the RRC recovery completion message. message, that is, the inactive access process is completed.
  • the RRC recovery completion message may be RRCResumeComplete, but the embodiment of the present application is not limited to this.
  • the embodiment of this application analyzes the above access process and finds that before the above gNodeB sends the RRC recovery message to the UE, it needs to receive the feedback message A, that is, the above S206 must be after S205, and it must be determined that the UE has received the feedback message A before proceeding. RRC resumes, resulting in long delays.
  • the reason for the delay process can also be understood as that Msg 4 and the RRC recovery message are transmitted serially, that is, the gNodeB sends Msg 4 first, and must confirm that the UE has received the feedback message A before sending the RRC recovery message.
  • the existing technology uses a serial transmission mechanism: the security mode command message (SecurityModeCommand) message and the UE capability query (UECapabilityEnquiry) message are serially transmitted (gNodeB needs to query the UE capability), or the Security Mode Command message (SecurityModeCommand) message and the RRC Reconfiguration (RRCReconfiguration) message are transmitted serially (when the gNodeB does not need to query the UE capability).
  • the serial transmission mechanism is used, the initial context establishment process will have a large delay.
  • the existing technology also uses a serial transmission mechanism: Msg 4 and RRC Resume messages are sent serially.
  • Msg 4 and RRC Resume messages are sent serially.
  • embodiments of the present application provide a communication method and a communication device.
  • a parallel transmission mechanism or a combined transmission mechanism is used, which is conducive to reducing idle state access.
  • the initial context establishment process and the access delay of the inactive dynamic access process are reduced to improve communication efficiency.
  • words such as “first” and “second” are used to distinguish the same or similar items with basically the same functions and effects. Those skilled in the art can understand that words such as “first” and “second” do not limit the number and execution order, and words such as “first” and “second” do not limit the number and execution order.
  • At least one means one or more
  • plural means two or more.
  • “And/or” describes the association of associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the related objects are in an “or” relationship.
  • “At least one of the following” or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
  • At least one of a, b and c can mean: a, or b, or c, or a and b, or a and c, or b and c, or a, b and c, where a, b, c can be single or multiple.
  • Figure 3 shows a schematic flow chart of a communication method 300.
  • the method 300 may include the following steps:
  • the core network device sends an initial context establishment request message to the access network device.
  • the initial context establishment request message is used to request to start the initial context establishment process.
  • the access network device can receive the initial context establishment request message.
  • the core network device may be the 5GC and the access network device may be the gNodeB, but the embodiments of the present application are not limited thereto.
  • the initial context establishment request message may be INITIAL CONTEXT SETUP REQUEST, but the embodiment of the present application is not limited to this.
  • the access network device sends a security mode command message to the terminal device.
  • the security mode command message is used to configure a security algorithm for the terminal device.
  • the terminal device receives the security mode command message.
  • the terminal device may be a UE, but the embodiments of the present application are not limited thereto.
  • the security mode command message may be a SecurityModeCommand message, and the access network device may configure integrity protection and encryption algorithms for the terminal device through the SecurityModeCommand message, but the embodiments of the present application are not limited to this.
  • the access network device sends a UE capability query message to the terminal device.
  • the UE capability query message is used to request the terminal device to report capabilities of the terminal device.
  • the terminal device receives the UE capability query message of the access network device.
  • the UE capability query message may be a UE CapabilityEnquiry message, but the embodiment of the present application is not limited to this.
  • the terminal device can send a security mode completion message to the access network device.
  • the security mode completion message is used to indicate that the security mode configuration is completed.
  • the access network device receives the security mode completion message. Safe mode complete message.
  • the security mode completion message may be a SecurityModeComplete message, but the embodiment of the present application is not limited to this.
  • the terminal device sends UE capability information to the access network device according to the UE capability query message.
  • the UE capability information includes the capabilities of the terminal device.
  • the access network device receives the UE capability information.
  • the UE capability information may be terminal equipment CapabilityInformation, but the embodiments of the present application are not limited thereto.
  • the access network device sends a UE wireless capability information indication message to the core network device.
  • the UE radio capability information indication message may be terminal equipment RADIO CAPABILITY INFO INDICATION.
  • the access network device sends an RRC reconfiguration message to the terminal device.
  • the RRC reconfiguration message is used to perform RRC reconfiguration for the terminal device.
  • the terminal device receives the RRC reconfiguration message.
  • the RRC reconfiguration message may be RRCReconfiguration, but the embodiment of the present application is not limited to this.
  • the RRC reconfiguration message is used to perform RRC reconfiguration for the terminal device, that is, configuring the data radio bearer (DRB), signaling radio bearer (SRB), etc. for the terminal device.
  • DRB data radio bearer
  • SRB signaling radio bearer
  • the terminal device After the terminal device performs RRC reconfiguration, the terminal device sends an RRC reconfiguration complete message to the access network device.
  • the RRC reconfiguration complete message is used to indicate that the RRC reconfiguration is completed.
  • the RRC reconfiguration completion message may be an RRCReconfigurationComplete message, but the embodiment of the present application is not limited to this.
  • the access network device sends an initial context establishment response message to the core network device.
  • the initial context establishment response message is used to indicate the end of the initial context establishment process.
  • the communication method provided by the embodiment of the present application is used when the initial context establishment process of idle state access includes the UE capability query process (that is, the initial context establishment request message does not carry the capability information of the terminal device, or the access network device needs to report to the terminal device Query the capability information of the terminal device), the security mode command message (SecurityModeCommand) message and the UE capability query message (UECapabilityEnquiry) are transmitted in parallel. That is to say, after the access network device sends the security mode command message to the terminal device, it can immediately send the message to the terminal device. Sending a UE Capability Inquiry message eliminates the need to send a UE Capability Inquiry message (UECapabilityEnquiry) after receiving the Security Mode Complete message. This can save time waiting for the Security Mode Completion message and help reduce the initial context of idle access. The access delay in the establishment process is improved to improve communication efficiency.
  • the above security mode command message (SecurityModeCommand) message and UE capability query message (UECapabilityEnquiry) may occupy the same time and frequency resources, or may occupy different time and frequency resources, which is not limited in the embodiment of the present application.
  • the time-frequency resources occupied by the security mode command message and the time-frequency resources occupied by the UE capability query message may be adjacent.
  • This method may also be called the combined transmission of the security mode command message and the UE capability query message, which is not limited in the embodiments of the present application.
  • the security mode completion message (SecurityModeComplete) and the UE capability information (CapabilityInformation) may occupy the same time-frequency resource, or may occupy different time-frequency resources, which is not limited in the embodiments of the present application.
  • This method may also be called the combined transmission of the security mode completion message and the UE capability information, which is not limited in the embodiments of the present application.
  • the above security mode command message (SecurityModeCommand) message, UE capability query message (UECapabilityEnquiry) and RRC reconfiguration message all use parallel transmission, that is to say, the access network device sends the security mode command to the terminal device After receiving the message, the UE capability inquiry message can be sent to the terminal device, and the RRC reconfiguration message can be sent to the terminal device first.
  • the security mode command message (SecurityModeCommand) message, UE capability query message (UECapabilityEnquiry) and RRC reconfiguration message can occupy the same time and frequency resources, or they can occupy different time and frequency resources.
  • the embodiments of this application are Not limited.
  • security mode command message UE capability query message and RRC reconfiguration message occupy the same time and frequency resources, time and frequency resources can be saved.
  • This method may also be called the combined transmission of the security mode command message, the UE capability query message and the RRC reconfiguration message, which is not limited in the embodiments of the present application.
  • the security mode completion message (SecurityModeComplete), UE capability information (CapabilityInformation) and RRC reconfiguration completion message may occupy the same time and frequency resources, or may occupy different time and frequency resources, which are not limited in the embodiments of this application.
  • security mode completion message UE capability information and RRC reconfiguration completion message occupy the same time and frequency resources, time and frequency resources can be saved.
  • This method may also be called the combined transmission of the security mode configuration completion message, UE capability information and RRC reconfiguration completion message, which is not limited in the embodiments of the present application.
  • the initial context establishment process includes the terminal device capability query process.
  • the embodiment of the present application also provides a communication method.
  • the initial context establishment process does not include the terminal device capability query process.
  • FIG. 4 shows a schematic flowchart of a communication method 400.
  • the method 400 may include the following steps:
  • the core network device sends an initial context establishment request message to the access network device.
  • the initial context establishment request message It is used to request to start the initial context establishment process.
  • the access network device can receive the initial context establishment request message.
  • the core network device may be the 5GC and the access network device may be the gNodeB, but the embodiments of the present application are not limited thereto.
  • the initial context establishment request message may be INITIAL CONTEXT SETUP REQUEST, but the embodiment of the present application is not limited to this.
  • the access network device sends a security mode command message to the terminal device.
  • the security mode command message is used to configure a security algorithm for the terminal device.
  • the terminal device receives the security mode command message.
  • the terminal device may be a UE, but the embodiments of the present application are not limited thereto.
  • the security mode command message may be a SecurityModeCommand message, and the access network device may configure integrity protection and encryption algorithms for the terminal device through the SecurityModeCommand message, but the embodiments of the present application are not limited to this.
  • the access network device sends an RRC reconfiguration message to the terminal device.
  • the RRC reconfiguration message is used to perform RRC reconfiguration for the terminal device.
  • the terminal device receives the RRC reconfiguration message.
  • the RRC reconfiguration message may be RRCReconfiguration, but the embodiment of the present application is not limited to this.
  • the RRC reconfiguration message is used to perform RRC reconfiguration for the terminal device, that is, configuring the data radio bearer (DRB) and signaling radio bearer (SRB) for the terminal device.
  • DRB data radio bearer
  • SRB signaling radio bearer
  • the terminal device can send a security mode completion message to the access network device.
  • the security mode completion message is used to indicate that the security mode configuration is completed.
  • the access network device receives the security mode completion message. Safe mode complete message.
  • the security mode completion message may be a SecurityModeComplete message, but the embodiment of the present application is not limited to this.
  • the terminal device After the terminal device performs RRC reconfiguration, the terminal device sends an RRC reconfiguration complete message to the access network device.
  • the RRC reconfiguration complete message is used to indicate that the RRC reconfiguration is completed.
  • the RRC reconfiguration completion message may be an RRCReconfigurationComplete message, but the embodiment of the present application is not limited to this.
  • the access network device sends an initial context establishment response message to the core network device.
  • the initial context establishment response message is used to indicate the end of the initial context establishment process.
  • the communication method provided by the embodiment of the present application is used when the initial context establishment process of idle state access does not include the UE capability query process (that is, the initial context establishment request message carries the UE capability information of the terminal device, or the access network device does not need to Query the UE capability information of the terminal device from the terminal device), the security mode command message (SecurityModeCommand) message and the RRC reconfiguration message (RRCReconfiguration) are transmitted in parallel. That is to say, after the access network device sends the security mode command message to the terminal device, it can Immediately send the RRC reconfiguration message to the terminal device. There is no need to send the RRC reconfiguration message after receiving the Security Mode Complete message. This can save the time of waiting for the security mode complete message and help reduce the initial cost of idle state access. The access delay in the context establishment process is reduced to improve communication efficiency.
  • the above security mode command message (SecurityModeCommand) message and RRC reconfiguration message (RRCReconfiguration) may occupy the same time and frequency resources, or may occupy different time and frequency resources, which is not limited in the embodiment of the present application.
  • This method may also be called the combined transmission of the security mode command message and the RRC reconfiguration message, which is not limited in the embodiment of the present application.
  • the security mode completion message (SecurityModeComplete) and the RRC reconfiguration completion message (RRCReconfigurationComplete) may occupy the same time and frequency resources, or may occupy different time and frequency resources, which is not limited in the embodiments of the present application.
  • This method may also be called the combined transmission of the security mode completion message and the RRC reconfiguration completion message, which is not limited in the embodiments of the present application.
  • the above method 300 and method 400 are the initial context establishment process of idle state access.
  • the inactive state access process will be described below.
  • FIG. 5 shows a schematic flowchart of a communication method 500.
  • the method 500 may include the following steps:
  • the terminal device sends Msg 1 to the access network device, and correspondingly, the access network device receives the Msg 1.
  • Msg 1 can carry leading identifier.
  • the preamble identifier can be used to inform the access network device that a random access request exists.
  • the access network device Based on Msg 1, the access network device sends Msg 2 to the terminal device.
  • the Msg 2 carries uplink transmission control information.
  • the uplink transmission control information is used to instruct the terminal device to send Msg 3.
  • the uplink transmission control information may also be called uplink scheduling control information, uplink transmission indication information or uplink scheduling indication information, which is not limited in the embodiments of the present application.
  • the uplink transmission control information can be sent through Msg 2. That is to say, the access network device sends Msg 2 to the terminal device.
  • the Msg 2 includes the uplink transmission control information.
  • the uplink transmission control information is used to instruct the terminal device to send Msg 3.
  • the Msg 2 may also include information with other functions, which is not limited in the embodiments of this application.
  • the access network device can send Msg 2 to multiple terminal devices.
  • the terminal device Based on Msg 2, the terminal device sends Msg 3 to the access network device to trigger the access network device to perform the RRC recovery process. Correspondingly, the access network device receives Msg 3 sent by the terminal device.
  • Msg 3 may carry a recovery request message and a unique identifier of the terminal device.
  • the recovery request message may be RRCResumeRequest, but the embodiment of the present application is not limited to this.
  • the unique identification of the terminal device is used for conflict resolution.
  • the access network device sends Msg 4 to the terminal device, and correspondingly, the terminal device receives the Msg 4.
  • Msg 4 may carry a contention resolution medium access control protocol control element (MAC CE) message, for example, Contention Resolution Identity MAC CE, but the embodiment of the present application is not limited to this.
  • MAC CE contention resolution medium access control protocol control element
  • the access network device sends an RRC recovery message to the terminal device.
  • the RRC recovery message is used to instruct the terminal device to perform RRC recovery.
  • the RRC recovery message may be RRCResume, but the embodiment of the present application is not limited to this.
  • the terminal device sends a feedback message A to the access network device according to Msg 4.
  • the feedback message A is used to indicate that Msg 4 has not been received or has been received.
  • the access network device receives the feedback message A.
  • the terminal device sends a feedback message B to the access network device according to the RRC recovery message.
  • the feedback message B is used to indicate that the RRC recovery message has not been received or that the RRC recovery message has been received.
  • the access network device receives the feedback message B.
  • the feedback message B may be an acknowledgment character (ACK), but the embodiment of the present application is not limited to this.
  • ACK acknowledgment character
  • Feedback message B is used to indicate that the RRC recovery message has been received.
  • the terminal device performs RRC connection recovery processing according to the RRC recovery message.
  • the RRC recovery completion message can be sent to the access network device.
  • access When the network device receives the RRC recovery completion message, the inactive access process is completed.
  • the RRC recovery completion message may be RRCResumeComplete, but the embodiment of the present application is not limited to this.
  • this application does not limit the order in which the terminal device sends feedback message A and feedback message B to the access network device. That is to say, the terminal device can first send feedback message A to the access network device, and then send feedback message A to the access network device.
  • the network device sends feedback message B, or it may first send feedback message B to the access network device, and then send feedback message A to the access network device.
  • Msg 4 is transmitted in parallel with the RRC Resume message. That is to say, after the access network device sends Msg 4 to the terminal device, it can immediately send the message to the terminal device. When the device sends an RRC recovery message, it is not necessary to send an RRC recovery message after receiving feedback message A. This can save the time waiting for feedback message A, help reduce the access delay in the inactive access process, and improve communication efficiency.
  • Msg 4 is used to represent contention resolution messages. Msg 4 is transmitted in parallel with the RRC Resume message, that is, the contention resolution message is transmitted in parallel with the RRC Resume message.
  • Msg 3 in the above method 500 can carry the RRC establishment request message.
  • Msg 3 can carry RRCSetupRequest.
  • the access network device can send Msg 4, that is, the contention resolution message, to the terminal device based on Msg 3, and send an RRC establishment message to the terminal device.
  • the terminal device can receive Msg 4, and can send feedback message A to the access network device.
  • Feedback message A is used to indicate that Msg 4 has not been received or has been received. It can also send feedback message B to the access network device.
  • Feedback message A Message B is used to indicate an RRC establishment completion message or an RRC establishment failure message.
  • the establishment process provided by the embodiment of the present application can also be applied to the RRC establishment process in the idle state access process.
  • S101 in the above method 100 may include the establishment process provided by the embodiment of the present application.
  • Msg 4 that is, the contention resolution message
  • RRC Resume RRC Resume
  • RRC establishment message can occupy the same time and frequency resources, or they can occupy different time and frequency resources. This is not limited in the embodiment of the present application. .
  • Msg 4 ie, contention resolution message
  • RRC recovery message or RRC establishment message
  • time and frequency resources can be saved. This method may also be called combined transmission of Msg 4 and RRC recovery message (or RRC establishment message), which is not limited in the embodiments of the present application.
  • feedback message A and feedback message B may occupy the same time-frequency resource, or may occupy different time-frequency resources, which is not limited in the embodiment of the present application.
  • feedback message A and feedback message B occupy the same time-frequency resources, time-frequency resources can be saved.
  • This method may also be called the combined transmission of feedback message A and feedback message B, which is not limited in the embodiments of the present application.
  • the combined transmission of Msg 4 i.e., the contention resolution message
  • the RRC recovery message or RRC establishment message
  • the combined transmission of feedback message A and feedback message B are beneficial to reducing latency compared to serial transmission.
  • FIG. 6 shows a timing comparison diagram of serial transmission and combined transmission.
  • 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 and 11 are used to represent different time slots. Each number represents 1 time slot.
  • the terminal device receives Msg 4 from the access network device in time slot 0, and after a delay of 2 time slots, it sends feedback message A to the access network device in time slot 3.
  • the feedback message A is used to indicate that Msg 4 has been received.
  • the access network device delays for 2 time slots, that is, sends an RRC recovery message to the terminal device in time slot 6.
  • the terminal device delays for 2 time slots, that is, sends a feedback message B to the access network device in time slot 9.
  • the feedback message B is used to indicate that the RRC recovery message has been received.
  • the terminal device receives the Msg 4 message and the RRC recovery message from the access network device in time slot 0, and after a delay of 2 time slots, it sends a feedback message to the access network device in time slot 3.
  • a and feedback message B are used to indicate that Msg 4 has been received
  • feedback message B is used to indicate that the RRC recovery message has been received.
  • the RRC Resume message when the above-mentioned RRC Resume message occupies a large amount of data, fragmentation processing is required during transmission at the medium access control (MAC) layer.
  • the RRC Resume message can be divided into Multiple chips are transmitted in different transmission slots.
  • the RRC Resume message can include multiple pieces of data.
  • the RRC Resume message includes M blocks of data, that is, the RRC Resume message is divided into M pieces.
  • the remaining M-N blocks of data may occupy the same time-frequency resource or may occupy different time-frequency resources. This is not limited in the embodiments of the present application.
  • the RRC Resume message needs to be divided into 2 pieces for transmission at the MAC layer, then M equals 2 and N equals 1.
  • the RRC Resume message can include RRC resume message fragment 1 (RRC Resume fragment 1) and RRC resume message fragment 2. (RRC Resume Shard 2).
  • Msg 4 can occupy the same time-frequency resource as RRC recovery message fragment 1, and the terminal device feeds back the message in the same time slot.
  • the data after RRC recovery message fragmentation is merged and transmitted with Msg 4 (i.e., the contention resolution message).
  • Msg 4 i.e., the contention resolution message.
  • the merged transmission of feedback message A and feedback message B is beneficial to reducing the delay compared with serial transmission. .
  • Figure 7 shows a timing comparison diagram of serial transmission and combined transmission in a fragmentation scenario.
  • 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 and 11 are used to represent different time slots. Each number represents 1 time slot.
  • the terminal device receives Msg 4 from the access network device in time slot 0, and after a delay of 2 time slots, it sends feedback message A to the access network device in time slot 3.
  • the access network device delays for 2 time slots, that is, sends RRC recovery message fragment 1 to the terminal device in time slot 6, and sends RRC recovery message fragment 2 to the terminal device in time slot 7.
  • the terminal device sends feedback message B to the access network device in time slot 9, where the feedback message B includes feedback message B fragment 1 and feedback message B fragment Film 2.
  • feedback message B fragment 1 and feedback message B fragment 2 can occupy one time slot as shown in Figure 7, or can occupy different time slots (for example, adjacent time slots). This application implements This example does not limit this. It should also be noted that if RRC resumes its The information includes more than two fragments, and these two or more fragments may occupy two time slots or more than two time slots. This is not limited in the embodiment of the present application. It should be understood that the number of time slots that the RRC recovery message can occupy is at most equal to the number of fragments.
  • the terminal device receives Msg 4 and RRC recovery message fragment 1 from the access network device in time slot 0, and receives RRC recovery message fragment 2 from the access network device in time slot 1.
  • Feedback message A and feedback message B are sent to the access network device in time slot 3, where feedback message B includes feedback message B fragment 1 and feedback message B fragment 2.
  • the size of the serial numbers of the above processes does not mean the order of execution.
  • the execution order of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiment of the present application.
  • FIG. 8 shows a schematic block diagram of a communication device 800 provided by an embodiment of the present application.
  • the communication device 800 may include: a sending unit 810 and a receiving unit 820.
  • the communication device 800 can perform the steps performed by the access network device in the above method 300, method 400 or method 500.
  • the communication device 800 can perform the steps performed by the terminal device in the above method 300, method 400 or method 500. Wherein, when the communication device 800 executes the method 300 or the method 400, the communication device 800 further includes a processing unit.
  • the communication device 800 here is embodied in the form of a functional unit.
  • the term "unit” as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (such as a shared processor, a proprietary processor, or a group of processors) used to execute one or more software or firmware programs. processor, etc.) and memory, merged logic circuitry, and/or other suitable components to support the described functionality.
  • ASIC application specific integrated circuit
  • the communication device 800 can be specifically the access network equipment and the terminal equipment in the above embodiments, and the communication device 800 can be used to perform the above method embodiments with the access network equipment. To avoid duplication, the various processes and/or steps corresponding to the terminal device will not be described again here.
  • the communication device 800 of each of the above solutions has the function of realizing the corresponding steps performed by the access network equipment and the terminal equipment in the above method; the above functions can be realized by hardware, or can also be realized by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the communication device 800 in Figure 8 may also be a chip or a chip system, such as a system on chip (SoC).
  • SoC system on chip
  • FIG. 9 shows a schematic block diagram of another communication device 900 provided by an embodiment of the present application.
  • the communication device 900 includes a processor 910, a transceiver 920 and a memory 930.
  • the processor 910, the transceiver 920 and the memory 930 communicate with each other through internal connection paths.
  • the memory 930 is used to store instructions, and the processor 910 is used to execute the instructions stored in the memory 930 to control the transceiver 920 to send signals and /or receive a signal.
  • the communication device 900 may be specifically the access network equipment and terminal equipment in the above embodiments, and may be used to perform various steps and/or processes corresponding to the access network equipment and terminal equipment in the above method embodiments.
  • the memory 930 may include read-only memory and random access memory and provide instructions and data to the processor. A portion of the memory may also include non-volatile random access memory.
  • the memory may also store device type information.
  • the processor 910 may be used to execute instructions stored in the memory, and when the processor 910 executes the instructions stored in the memory, the processor 910 is used to execute the above method embodiments corresponding to the access network device and the terminal device. various steps and/or processes.
  • the transceiver 920 may include a transmitter and a receiver.
  • the transmitter may be used to implement the steps and/or processes corresponding to the above-mentioned transceiver for performing sending actions.
  • the receiver may be used to implement the functions corresponding to the above-mentioned transceiver. To perform various steps and/or processes of receiving actions.
  • the processor of the above device can be a central processing unit (CPU), and the processor can also be other general-purpose processors, digital signal processors (DSP), or application-specific integrated circuits. (ASIC), field programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
  • each step of the above method can be completed by instructions in the form of hardware integrated logic circuits or software in the processor.
  • the steps of the method disclosed in conjunction with the embodiments of the present application can be directly embodied as executed by a hardware processor, or implemented using The combination of hardware and software units in the processor is executed.
  • the software unit can be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other mature storage media in this field.
  • the storage medium is located in the memory, and the processor executes the instructions in the memory and completes the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
  • Embodiments of the present application also provide a communication system, which may include the access network equipment and terminal equipment in the above embodiments.
  • Embodiments of the present application provide a readable computer storage medium.
  • the readable computer storage medium is used to store a computer program.
  • the computer program is used to implement the access network equipment corresponding to various possible implementations shown in the above embodiments. method.
  • Embodiments of the present application provide another readable computer storage medium.
  • the readable computer storage medium is used to store a computer program.
  • the computer program is used to implement the methods corresponding to the terminal devices shown in various possible implementations in the above embodiments. .
  • Embodiments of the present application provide a computer program product.
  • the computer program product includes a computer program (which can also be called a code, or an instruction).
  • the computer program When the computer program is run on a computer, the computer can execute the interfaces shown in the above embodiments.
  • the computer program product includes a computer program (which can also be called a code, or an instruction).
  • a computer program which can also be called a code, or an instruction.
  • the computer program When the computer program is run on a computer, the computer can execute various tasks in the above embodiments. Possible implementations show the methods corresponding to the terminal devices.
  • Embodiments of the present application provide a chip system, which is used to support the above-mentioned access network device to implement the functions shown in the embodiments of the present application.
  • the embodiment of the present application provides another chip system, which is used to support the above terminal device to implement the functions shown in the embodiment of the present application.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or integrated. to another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • a unit described as a separate component may or may not be physically separate.
  • a component shown as a unit may or may not be a physical unit, that is, it may be located in one place, or it may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • Functions may be stored in a computer-readable storage medium when implemented in the form of software functional units and sold or used as independent products.
  • the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which can be a personal computer, a server, a receiving end, etc.) to execute all or part of the steps of the methods of various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种通信方法和通信装置,在idle态接入过程和inactive态接入过程中,采用并行传输机制,有利于降低idle态接入过程以及inactive态接入过程的接入时延,提高通信效率。在idle态接入过程中,若包括UE能力查询过程,接入网设备可以采用并行传输方式向终端设备传输安全模式命令消息、UE能力查询消息以及RRC重配消息中的任意两个。在inactive态接入过程,接入网设备可以采用并行传输方式向终端设备传输竞争解决消息与RRC恢复消息。其中,并行传输方式是指在传输一个消息时无需等待该消息的反馈消息即可传输另一个消息。

Description

通信方法和通信装置
本申请要求于2022年08月30日提交中国国家知识产权局、申请号为202211048899.5、申请名称为“通信方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及无线通信领域,尤其涉及一种通信方法和通信装置。
背景技术
第五代移动通信技术(5th generation mobile communication technology,5G)独立组网(stand alone,SA)具备增强移动宽带(enhanced mobile broadband,eMMB)、高可靠低时延(ultra-reliable low-latency communication,URLLC)以及海量机器类通信(massive machine type of communication,mMTC)三大应用场景,可以为用户提供虚拟现实(virtual reality,VR)、增强现实(augmented reality,AR)等丰富多彩的5G应用。
SA组网可以支持空闲态(idle)接入和非激活态(inactive)接入,以实现终端设备与网络设备的通信。
但是,SA组网中,不论是空闲态接入还是非激活态接入,均存在接入时延长的问题。
发明内容
本申请提供了一种通信方法和通信装置,可以降低接入时延,提高通信效率。
第一方面,提供了一种通信方法,该方法包括:接入网设备向终端设备发送第一配置消息,第一配置消息用于为终端设备配置安全算法;接入网设备向终端设备发送第二配置消息,第二配置消息用于无线资源控制(radio resource control,RRC)重配,第一配置消息和第二配置消息并行发送;接入网设备接收来自终端设备的第一配置完成消息,第一配置完成消息用于表示安全算法已配置完成;接入网设备接收来自终端设备的第二配置完成消息,第二配置完成消息用于表示RRC重配完成。
若本申请提供的通信方法应用于5G场景,接入网设备可以是基站(gNodeB),终端设备可以是用户设备(user equipment,UE),但本申请并不限于此。
第一配置消息在具体实施例中可以是安全模式命令消息,第二配置消息在具体实施例中可以是RRC重配消息。第一配置消息和第二配置消息并行发送,是指第一配置消息传输之后,立即传输第二配置消息,无需等待第一配置消息的反馈消息。
可以理解的是,若终端设备基于第一配置消息,配置安全算法失败,则接入网设备可以接收来自终端设备配置失败的消息或者未接收到第一配置完成消息,若终端设备基于第二配置消息,RRC重配失败,接入网设备可以接收来自终端设备RRC重配失败的消息或者未接收到第二配置完成消息,接入网设备可以再次向终端设备发送第一配置消息和第二配置消息。若接入网设备接收来自终端设备配置失败的消息和第二配置完成消息,接入网设备可以向终端设备发送第一配置消息。若接入网设备接收来自终端设备第一配置完成消息和RRC重配失败的消息,接入网设备可以向终端设备发送第二配置消息。
接入网设备可以并行接收第一配置完成消息和第二配置完成消息,也就是接入网设备在接收第一配置完成消息之后可以接收第二配置完成消息,或者,在接收第二配置完成消息之后接收第一配置完成消息,本申请对此不作限定。
本申请提供的通信方法,接入网设备向终端设备发送第一配置消息之后,可以立即向终端设备发送第二配置消息,无需等待接收到第一配置完成消息之后再发送第二配置消息,有利于节省等待接收到第一配置完成消息的时延,降低接入时延,提高通信效率。
结合第一方面,在第一方面的某些实现方式中,第一配置消息和第二配置消息占用同一时频 资源。
第一配置消息和第二配置消息占用同一时频资源,可以是指第一配置消息和第二配置消息占用同一个时隙或者占用同一个符号,本申请对此不作限定。
第一配置消息和第二配置消息占用同一时频资源,也可以称为第一配置消息和第二配置消息合并发送,本申请实施例对此不作限定。
本申请提供的通信方法,第一配置消息和第二配置消息占用同一时频资源,可以节省时频资源的开销。
结合第一方面,在第一方面的某些实现方式中,第一配置完成消息和第二配置完成消息占用同一时频资源。
第一配置完成消息和第二配置完成消息占用同一时频资源,也可以称为接入网设备合并接收第一配置完成消息和第二配置完成消息,本申请对此不作限定。
本申请提供的通信方法,第一配置完成消息和第二配置完成消息占用同一时频资源,可以节省时频资源的开销。
结合第一方面,在第一方面的某些实现方式中,在接入网设备向终端设备发送第二配置消息之前,上述方法还包括:接入网设备向终端设备发送查询消息,查询消息用于查询终端设备的能力,第一配置消息、查询消息以及第二配置消息并行发送。
在上述接入过程中,接入网设备还可以向终端设备发送查询消息。其中,查询消息可以是具体实施例中的UECapabilityEnquiry消息,但本申请并不限于此。
第一配置消息、查询消息以及第二配置消息并行发送,是指第一配置消息传输之后,立即传输查询消息,无需等待第一配置消息的反馈消息,且在传输查询消息之后,立即传输第二配置消息,无需等待查询消息的反馈消息。
本申请提供的通信方法,第一配置消息、查询消息以及第二配置消息均并行发送,有利于节省等待接收到第一配置完成消息的时延和等待接收到查询消息的反馈消息,进一步地降低接入时延,提高通信效率。
结合第一方面,在第一方面的某些实现方式中,在接入网设备接收来自终端设备的第二配置完成消息之前,上述方法还包括:接入网设备接收来自终端设备的能力信息,能力信息包括终端设备的能力。
能力信息可以是终端设备基于上述查询消息向接入网设备发送的。其中,能力信息可以是具体实施例中的UECapabilityInformation,但本申请并不限于此。
接入网设备可以并行接收第一配置完成消息、第二配置完成消息以及能力信息,也就是接入网设备在接收第一配置完成消息之后可以接收第二配置完成消息,或者,在接收第二配置完成消息之后接收第一配置完成消息,本申请对此不作限定。
可以理解的是,若接入网设备并行接收第一配置完成消息、第二配置完成消息以及能力信息,可以进一步降低时延,提高通信效率。
结合第一方面,在第一方面的某些实现方式中,第一配置消息和查询消息占用同一时频资源。
第一配置消息和查询消息占用同一时频资源,可以是指第一配置消息和查询消息占用同一个时隙或者占用同一个符号,本申请对此不作限定。
结合第一方面,在第一方面的某些实现方式中,第一配置完成消息和能力信息占用同一时频资源。
第一配置消息和能力信息占用同一时频资源,也可以称为第一配置消息和能力信息合并发送,本申请实施例对此不作限定。
本申请提供的通信方法,第一配置消息和能力信息占用同一时频资源,可以节省时频资源的开销。
第二方面,提供了一种通信方法,包括:接入网设备向终端设备发送第一配置消息,第一配置消息用于为终端设备配置安全算法;接入网设备向终端设备发送查询消息,查询消息用于查询终端设备的能力,第一配置消息和查询消息并行发送;接入网设备接收来自终端设备的第一配置完成消息,第一配置完成消息用于表示安全算法已配置完成;接入网设备接收来自终端设备的能 力信息,能力信息包括终端设备的能力。
若本申请提供的通信方法应用于5G场景,接入网设备可以是gNodeB,终端设备可以是UE,但本申请并不限于此。
第一配置消息在具体实施例中可以是安全模式命令消息,查询消息在具体实施例中可以是UECapabilityEnquiry消息,但本申请并不限于此。
第一配置消息和查询消息并行发送,是指第一配置消息传输之后,立即传输查询消息,无需等待第一配置消息的反馈消息。
可以理解的是,若终端设备基于第一配置消息,配置安全算法失败,则接入网设备可以接收来自终端设备配置失败的消息或者未接收到第一配置完成消息,若终端设备基于查询消息,未反馈消息,接入网设备未接收到能力信息,接入网设备可以再次向终端设备发送第一配置消息和查询消息。若接入网设备接收来自终端设备配置失败的消息和能力信息,接入网设备可以向终端设备发送第一配置消息。若接入网设备接收来自终端设备第一配置完成消息,且未接收到能力信息,接入网设备可以向终端设备发送查询信息。
接入网设备可以并行接收第一配置完成消息和能力信息,也就是接入网设备在接收第一配置完成消息之后可以接收能力信息,或者,在接收能力信息之后接收第一配置完成消息,本申请对此不作限定。
本申请提供的通信方法,接入网设备向终端设备发送第一配置消息之后,可以立即向终端设备发送查询消息,无需等待接收到第一配置完成消息之后再发送查询消息,有利于节省等待接收到第一配置完成消息的时延,降低接入时延,提高通信效率。
结合第二方面,在第二方面的某些实现方式中,上述方法还包括:接入网设备向终端设备发送第二配置消息,第二配置消息用于无线资源控制RRC重配;接入网设备接收来自终端设备的第二配置完成消息,第二配置完成消息用于表示RRC重配完成。
在上述接入过程中,接入网设备还可以向终端设备发送第二配置消息。其中,第二配置消息可以是具体实施例中的RRC重配消息,但本申请并不限于此。
若终端设备基于第二配置消息实现RRC重配,则接入网设备接收来自终端设备的第二配置完成消息,实现初始上下文建立过程。
本申请提供的通信方法,接入网设备通过第二配置消息使终端设备实现RRC重配,实现初始上下文建立过程,有利于完成接入过程。
结合第二方面,在第二方面的某些实现方式中,第一配置消息和查询消息占用同一时频资源。
结合第二方面,在第二方面的某些实现方式中,第一配置完成消息和能力信息占用同一时频资源。
第三方面,提供了一种通信方法,包括:接入网设备向终端设备发送第一消息,第一消息包括竞争解决消息;接入网设备向终端设备发送第二消息,第二消息包括无线资源控制RRC配置消息,第一消息和第二消息并行发送,其中,RRC配置消息为RRC恢复消息或者RRC建立消息;接入网设备接收来自终端设备的第一反馈消息,第一反馈消息用于表示终端设备已接收到第一消息;接入网设备接收来自终端设备的第二反馈消息,第二反馈消息用于表示终端设备已接收到第二消息。
若本申请提供的通信方法应用于5G场景,接入网设备可以是gNodeB,终端设备可以是UE,但本申请并不限于此。
RRC配置消息可以为RRC建立消息、RRC恢复消息或者其他消息,本申请实施例不作限定。
第一消息可以是具体实施例中的消息4(message 4,Msg4),Msg4可以包括竞争解决消息。其中,竞争解决消息可以是竞争解决介质访问控制协议控制元素(medium access control control element,MAC CE)消息。第二消息可以是具体实施例中的RRC建立消息(RRCSetupRequest)或者RRC恢复(RRCResume)消息,但本申请并不限于此。第一消息和第二消息并行发送,是指第一消息传输之后,立即传输第二消息,无需等待第一消息的反馈消息。
可以理解的是,若接入网设备接收到反馈消息用于表示终端设备未接收到第一消息和第二消息,接入网设备可以再次向终端设备发送第一消息和第二消息。若接入网设备接收到的反馈消息 用于表示终端设备未接收到第一消息,但接收到了第二消息,接入网设备可以向终端设备发送第一消息。若接入网设备接收到的反馈消息用于表示终端设备接收到第一消息,但未接收到第二消息,接入网设备可以向终端设备发送第二消息。
接入网设备可以并行接收第一反馈消息和第二反馈消息,也就是接入网设备在接收第一反馈消息之后可以接收第二反馈消息,或者,在接收第二反馈消息之后接收第一反馈消息,本申请对此不作限定。
本申请提供的通信方法,接入网设备向终端设备发送第一配置消息之后,可以立即向终端设备发送第二配置消息,无需等待接收到第一反馈消息之后再发送第二配置消息,有利于节省等待接收到第一反馈消息的时延,降低接入时延,提高通信效率。
结合第三方面,在第三方面的某些实现方式中,第一反馈消息和第二反馈消息占用同一时频资源。
第一反馈消息和第二反馈消息占用同一时频资源,可以是指第一反馈消息和第二反馈消息占用同一个时隙或者占用同一个符号,本申请对此不作限定。
第一反馈消息和第二反馈消息占用同一时频资源,也可以称为第一反馈消息和第二反馈消息合并发送,本申请实施例对此不作限定。
本申请提供的通信方法,第一反馈消息和第二反馈消息占用同一时频资源,可以节省时频资源的开销。
结合第三方面,在第三方面的某些实现方式中,第一消息和第二消息占用同一时频资源。
第一消息和第二消息占用同一时频资源,也可以称为接入网设备合并接收第一消息和第二消息,本申请对此不作限定。
本申请提供的通信方法,第一消息和第二消息占用同一时频资源,可以节省时频资源的开销。
结合第三方面,在第三方面的某些实现方式中,第二消息分片传输,第二消息包括M块数据,M块数据是对第二消息分片得到的,M块数据中的N块数据与第一消息占用同一时频资源,M大于N,且M为大于1的整数,N为大于或等于1的整数。
若第二消息可以分片传输(例如,RRC恢复消息),且被分为M块数据,第二消息中的部分数据,也就是M块数据中的N块数据,可以与第一消息占用同一时频资源,第二消息中剩余的数据可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
本申请提供的通信方法,M块数据中的N块数据与第一消息占用同一时频资源,相比M块数据分别占用不同的时频资源,可以节省时频资源的开销。
第四方面,提供了一种通信方法,包括:终端设备接收来自接入网设备的第一配置消息,第一配置消息用于为终端设备配置安全算法;终端设备接收来自接入网设备的第二配置消息,第二配置消息用于无线资源控制RRC重配,第一配置消息和第二配置消息并行接收;终端设备基于第一配置消息,进行安全算法配置;在安全算法配置完成之后,向接入网设备发送第一配置完成消息,第一配置完成消息用于表示安全算法已配置完成;终端设备基于第二配置消息,进行RRC重配;在RRC重配完成之后,向接入网设备发送第二配置完成消息,第二配置完成消息用于表示RRC重配完成。
结合第四方面,在第四方面的某些实现方式中,第一配置消息和第二配置消息占用同一时频资源。
结合第四方面,在第四方面的某些实现方式中,第一配置完成消息和第二配置完成消息占用同一时频资源。
结合第四方面,在第四方面的某些实现方式中,在终端设备接收来自接入网设备的第二配置消息之前,方法还包括:终端设备接收来自接入网设备的查询消息,查询消息用于查询终端设备的能力,第一配置消息、查询消息以及第二配置消息并行接收。
结合第四方面,在第四方面的某些实现方式中,方法还包括:终端设备基于查询消息,向接入网设备发送能力信息,能力信息包括终端设备的能力。
结合第四方面,在第四方面的某些实现方式中,第一配置消息和查询消息占用同一时频资源。
结合第四方面,在第四方面的某些实现方式中,第一配置完成消息和能力信息占用同一时频 资源。
第五方面,提供了一种通信方法,包括:终端设备接收来自接入网设备的第一配置消息,第一配置消息用于为终端设备配置安全算法;终端设备接收来自接入网设备的查询消息,查询消息用于查询终端设备的能力,第一配置消息和查询消息并行接收;终端设备基于第一配置消息,进行安全算法配置;在安全算法配置完成之后,向接入网设备发送第一配置完成消息,第一配置完成消息用于表示安全算法已配置完成;终端设备基于查询消息,向接入网设备发送能力信息,能力信息包括终端设备的能力。
结合第五方面,在第五方面的某些实现方式中,方法还包括:终端设备接收来自接入网设备的第二配置消息,第二配置消息用于无线资源控制RRC重配;终端设备基于第二配置消息,进行RRC重配;在RRC重配完成之后,向接入网设备发送第二配置完成消息,第二配置完成消息用于表示RRC重配完成。
结合第五方面,在第五方面的某些实现方式中,第一配置消息和查询消息占用同一时频资源。
结合第五方面,在第五方面的某些实现方式中,第一配置完成消息和能力信息占用同一时频资源。
第六方面,提供了一种通信方法,包括:终端设备接收来自接入网设备的第一消息,第一消息包括竞争解决消息;终端设备接收来自接入网设备的第二消息,第二消息包括无线资源控制RRC配置消息,第一消息和第二消息并行接收,其中,RRC配置消息为RRC恢复消息或者RRC建立消息;终端设备向接入网设备发送第一反馈消息,第一反馈消息用于表示终端设备未接收到或者已接收到第一消息;终端设备向接入网设备发送第二反馈消息,第二反馈消息用于表示终端设备未接收到或者已接收到第二消息。
结合第六方面,在第六方面的某些实现方式中,第一反馈消息和第二反馈消息占用同一时频资源。
结合第六方面,在第六方面的某些实现方式中,第一消息和第二消息占用同一时频资源。
结合第六方面,在第六方面的某些实现方式中,第二消息分片传输,第二消息包括M块数据,M块数据是对第二消息分片得到的,M块数据中的N块数据与第一消息占用同一时频资源,M大于N,且M为大于1的整数,N为大于或等于1的整数。
第七方面,提供了一种通信装置,该装置包括:发送单元和接收单元。其中,发送单元用于:向终端设备发送第一配置消息,第一配置消息用于为终端设备配置安全算法;向终端设备发送第二配置消息,第二配置消息用于无线资源控制RRC重配,第一配置消息和第二配置消息并行发送;接收单元用于:接收来自终端设备的第一配置完成消息,第一配置完成消息用于表示安全算法已配置完成;接收来自终端设备的第二配置完成消息,第二配置完成消息用于表示RRC重配完成。
结合第七方面,在第七方面的某些实现方式中,第一配置消息和第二配置消息占用同一时频资源。
结合第七方面,在第七方面的某些实现方式中,第一配置完成消息和第二配置完成消息占用同一时频资源。
结合第七方面,在第七方面的某些实现方式中,上述发送单元还用于:向终端设备发送查询消息,查询消息用于查询终端设备的能力,第一配置消息、查询消息以及第二配置消息并行发送。
结合第七方面,在第七方面的某些实现方式中,上述接收单元还用于:接收来自终端设备的能力信息,能力信息包括终端设备的能力。
结合第七方面,在第七方面的某些实现方式中,第一配置消息和查询消息占用同一时频资源。
结合第七方面,在第七方面的某些实现方式中,第一配置完成消息和能力信息占用同一时频资源。
第八方面,提供了一种通信装置,包括:发送单元和接收单元。其中,发送单元用于:向终端设备发送第一配置消息,第一配置消息用于为终端设备配置安全算法;向终端设备发送查询消息,查询消息用于查询终端设备的能力,第一配置消息和查询消息并行发送;接收单元用于:接收来自终端设备的第一配置完成消息,第一配置完成消息用于表示安全算法已配置完成;接收来自终端设备的能力信息,能力信息包括终端设备的能力。
结合第八方面,在第八方面的某些实现方式中,上述发送单元还用于:向终端设备发送第二配置消息,第二配置消息用于无线资源控制RRC重配;上述接收单元还用于:接收来自终端设备的第二配置完成消息,第二配置完成消息用于表示RRC重配完成。
结合第八方面,在第八方面的某些实现方式中,第一配置消息和查询消息占用同一时频资源。
结合第八方面,在第八方面的某些实现方式中,第一配置完成消息和能力信息占用同一时频资源。
第九方面,提供了一种通信装置,包括:发送单元和接收单元。其中,发送单元用于:向终端设备发送第一消息,第一消息包括竞争解决消息;向终端设备发送第二消息,第二消息包括无线资源控制RRC配置消息,第一消息和第二消息并行发送,其中,RRC配置消息为RRC恢复消息或者RRC建立消息;接收单元用于:接收来自终端设备的第一反馈消息,第一反馈消息用于表示终端设备已接收到第一消息;接收来自终端设备的第二反馈消息,第二反馈消息用于表示终端设备已接收到第二消息。
结合第九方面,在第九方面的某些实现方式中,第一反馈消息和第二反馈消息占用同一时频资源。
结合第九方面,在第九方面的某些实现方式中,第一消息和第二消息占用同一时频资源。
结合第九方面,在第九方面的某些实现方式中,第二消息分片传输,第二消息包括M块数据,M块数据是对第二消息分片得到的,M块数据中的N块数据与第一消息占用同一时频资源,M大于N,且M为大于1的整数,N为大于或等于1的整数。
第十方面,提供了一种通信装置,包括:接收单元、发送单元以及处理单元。其中,接收单元用于:接收来自接入网设备的第一配置消息,第一配置消息用于为配置安全算法;接收来自接入网设备的第二配置消息,第二配置消息用于无线资源控制RRC重配,第一配置消息和第二配置消息并行接收;处理单元用于:基于第一配置消息,进行安全算法配置;发送单元用于:在安全算法配置完成之后,向接入网设备发送第一配置完成消息,第一配置完成消息用于表示安全算法已配置完成;处理单元还用于:基于第二配置消息,进行RRC重配;发送单元还用于:在RRC重配完成之后,向接入网设备发送第二配置完成消息,第二配置完成消息用于表示RRC重配完成。
结合第十方面,在第十方面的某些实现方式中,第一配置消息和第二配置消息占用同一时频资源。
结合第十方面,在第十方面的某些实现方式中,第一配置完成消息和第二配置完成消息占用同一时频资源。
结合第十方面,在第十方面的某些实现方式中,上述接收单元还用于:接收来自接入网设备的查询消息,查询消息用于查询的能力,第一配置消息、查询消息以及第二配置消息并行接收。
结合第十方面,在第十方面的某些实现方式中,上述发送单元还用于:基于查询消息,向接入网设备发送能力信息,能力信息包括的能力。
结合第十方面,在第十方面的某些实现方式中,第一配置消息和查询消息占用同一时频资源。
结合第十方面,在第十方面的某些实现方式中,第一配置完成消息和能力信息占用同一时频资源。
第十一方面,提供了一种通信装置,包括:接收单元、发送单元以及处理单元。其中,接收单元用于:接收来自接入网设备的第一配置消息,第一配置消息用于为配置安全算法;接收来自接入网设备的查询消息,查询消息用于查询的能力,第一配置消息和查询消息并行接收;处理单元用于:基于第一配置消息,进行安全算法配置;发送单元用于:在安全算法配置完成之后,向接入网设备发送第一配置完成消息,第一配置完成消息用于表示安全算法已配置完成;基于查询消息,向接入网设备发送能力信息,能力信息包括的能力。
结合第十一方面,在第十一方面的某些实现方式中,上述接收单元用于:接收来自接入网设备的第二配置消息,第二配置消息用于无线资源控制RRC重配;上述处理单元用于:基于第二配置消息,进行RRC重配;上述发送单元用于:在RRC重配完成之后,向接入网设备发送第二配置完成消息,第二配置完成消息用于表示RRC重配完成。
结合第十一方面,在第十一方面的某些实现方式中,第一配置消息和查询消息占用同一时频 资源。
结合第十一方面,在第十一方面的某些实现方式中,第一配置完成消息和能力信息占用同一时频资源。
第十二方面,提供了一种通信装置,包括:接收单元和发送单元。其中,接收单元用于:接收来自接入网设备的第一消息,第一消息包括竞争解决消息;接收来自接入网设备的第二消息,第二消息包括无线资源控制RRC配置消息,第一消息和第二消息并行接收,其中,RRC配置消息为RRC恢复消息或者RRC建立消息;发送单元用于:向接入网设备发送第一反馈消息,第一反馈消息用于表示未接收到或者已接收到第一消息;向接入网设备发送第二反馈消息,第二反馈消息用于表示未接收到或者已接收到第二消息。
结合第十二方面,在第十二方面的某些实现方式中,第一反馈消息和第二反馈消息占用同一时频资源。
结合第十二方面,在第十二方面的某些实现方式中,第一消息和第二消息占用同一时频资源。
结合第十二方面,在第十二方面的某些实现方式中,第二消息分片传输,第二消息包括M块数据,M块数据是对第二消息分片得到的,M块数据中的N块数据与第一消息占用同一时频资源,M大于N,且M为大于1的整数,N为大于或等于1的整数。
第十三方面,提供了一种通信装置,包括,处理器和存储器,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得该装置执行上述任一方面中任一种可能实现方式中的方法。
可选地,所述处理器为一个或多个,所述存储器为一个或多个。
可选地,所述存储器可以与所述处理器集成在一起,或者所述存储器与处理器分离设置。
可选地,该通信装置还包括发射机(发射器)和接收机(接收器),发射机和接收机可以分离设置,也可以集成在一起,称为收发机(收发器)。
第十四方面,本申请提供了一种处理器,包括:输入电路、输出电路和处理电路。处理电路用于通过输入电路接收信号,并通过输出电路发射信号,使得处理器执行上述任一方面中任一种可能实现方式中的方法。
在具体实现过程中,上述处理器可以为芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是由例如但不限于接收器接收并输入的,输出电路所输出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请对处理器及各种电路的具体实现方式不做限定。
第十五方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得计算机执行上述任一方面中任一种可能实现方式中的方法。
第十六方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序(也可以称为代码,或指令),当所述计算机程序被运行时,使得计算机执行上述任一方面中任一种可能实现方式中的方法。
附图说明
图1是空闲态接入方式的示意性流程图;
图2是非激活态接入方式的示意性流程图;
图3是本申请实施例提供的一种通信方法的示意性流程图;
图4是本申请实施例提供的另一种通信方法的示意性流程图;
图5是本申请实施例提供的又一种通信方法的示意性流程图;
图6是本申请实施例提供的一种时序对比示意图;
图7是本申请实施例提供的另一种时序对比示意图;
图8是本申请实施例提供的一种通信装置的示意性框图;
图9是本申请实施例提供的另一种通信装置的示意性框图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:无线局域网(wireless local area network,WLAN)通信系统、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、第五代移动通信(5th generation,5G)系统或新无线(new radio,NR)、第六代移动通信系统(6th generation,6G),全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统或者其他演进的通信系统等。5G系统通常包括以下三大应用场景:增强移动宽带(enhanced mobile broadband,eMBB),超高可靠与低时延通信(ultra-reliable and low latency communications,URLLC)和海量机器类通信(massive machine type of communication,mMTC),未来的各类通信系统。
本申请实施例中的终端设备也可以称为:用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。
终端设备可以是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例为:车辆、手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、无人机,5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。
此外,在本申请实施例中,终端设备还可以是物联网(internet of things,IoT)系统中的终端设备,IoT是未来信息技术发展的重要组成部分,其主要技术特点是将物品通过通信技术与网络连接,从而实现人机互连,物物互连的智能化网络。
本申请实施例中的接入网设备主要功能是控制终端设备通过无线接入到移动通信网络。接入网设备是移动通信系统的一部分,它实现了一种无线接入技术。示例性地,接入网设备例如可以是基站(base station)、演进型基站(evolved NodeB,eNodeB)、发送接收点(transmission reception point,TRP)、5G移动通信系统中的下一代基站(next generation NodeB,gNB)、第六代(6th generation,6G)移动通信系统中的下一代基站、未来移动通信系统中的基站或WiFi系统中的接入节点等;也可以是完成基站部分功能的模块或单元,例如,可以是集中式单元(central unit,CU),也可以是分布式单元(distributed unit,DU)。无线接入网设备可以是宏基站,也可以是微基站或室内站,还可以是中继节点或施主节点等。可以理解,本申请中的无线接入网设备的全部或部分功能也可以通过在硬件上运行的软件功能来实现,或者通过平台(例如云平台)上实例化的虚拟化功能来实现。本申请的实施例对接入网设备所采用的具体技术和具体设备形态不做限定。
本申请实施例中的核心网设备主要包括数据面的用户面功能(user equipment,UPF)和控制面功能。其中,用户面功能主要负责分组数据包的转发、服务质量(quality of service,QoS)控制、计费信息统计和连接外部网络等,其包括了长期演进技术(long term evolution,LTE)的服务网关(serving gateway,SGW)和共用数据网网关(public data network gateway,PDN-GW)的相关功能。控制面功能主要负责业务流程交互、向用户面下发数据包转发策略、QoS控制策略等。示例性地,控制面功能中的网元主要包括:移动性管理功能(acess and mobility function,AMF)、会话管理功能(session management function,SMF)、策略控制功能(policy control function,PCF)、 应用功能(application function,AF)、网络开放功能(network exposure function,NEF)等。其中,AMF网元与接入网设备通过NG接口相连,可以对终端设备接入核心网络进行管理。LMF网元可以基于AMF网元的定位请求对终端设备定位。应理解,这里所说的LMF网元的功能也可以称为是LMF的功能。也可以说,LMF网元用于实现LMF的功能。SMF网元主要负责管理用户协议数据单元(protocol data unit,PDU)会话的创建、删除等,维护PDU会话上下文以及用户面转发管道信息。PCF主要负责执行策略控制,类似于长期演进技术(long term evolution,LTE)中的策略与计费规则功能(policy and charging rules function,PCRF)网元,包括生成、管理用户、会话、服务质量(quality of service,QoS)流处理策略、服务质量以及计费规则的生成,并将相应规则通过SMF下发到UPF网元。AF网元主要负责提供各种业务服务的功能,能够通过NEF网元与核心网交互,以及能够和策略管理框架交互进行策略管理。NEF用于提供网络能力开放相关的框架、鉴权和接口,在5G系统网络功能和其他网络功能之间传递信息。
第五代移动通信技术(5th generation mobile communication technology,5G)独立组网(stand alone,SA)是完全独立建设的5G网络,具备增强移动宽带(enhanced mobile broadband,eMMB)、高可靠低时延(ultra-reliable&low-latency communication,URLLC)、海量机器类通信(massive machine type of communication,mMTC)三大应用场景及网络切片、边缘计算、云网融合等5G全新特性,可为广大用户提供虚拟现实(Virtual Reality,VR)、增强现实(Augmented Reality,AR)、超高清视频及智慧工业、智慧医疗、智慧教育、智慧商业等丰富多彩的5G应用。
SA组网可以支持空闲态(idle)接入和非激活态(inactive)接入两种接入方式,以实现终端设备与网络设备的通信。其中,非激活态(inactive)接入方式也可以称为去激活态接入方式,本申请实施例对此不作限定。
本申请实施例对空闲态接入方式和非激活态接入方式进行了研究,发现不论是空闲态接入还是非激活态接入,均存在接入时延长的问题。
示例性地,图1示出了NR SA组网条件下空闲态接入方式100的示意性流程图。如图1所示,空闲态接入方式100可以包括如下步骤:
S101、用户设备(user equipment,UE)和基站(gNodeB)进行无线资源控制(radio resource control,RRC)建立。
S102、gNodeB向核心网设备(5G core network,5GC)发送初始UE消息以与触发5GC建立,对应地,5GC接收该初始UE消息。
初始UE消息可以是INITIAL UE MESSAGE,但本申请实施例并不限于此。
S103、UE、gNodeB以及5GC之间进行非接入层(non-access stratum,NAS)消息传输。
gNodeB透传UE和5GC之间的NAS消息,完成IDENTITY查询、鉴权、NAS安全模式以及注册过程等。
S104、5GC向gNodeB发送初始上下文建立请求消息,该初始上下文建立请求消息用于请求启动初始上下文建立过程,对应地,gNodeB可以接收该初始上下文建立请求消息。
初始上下文建立请求消息可以是INITIAL CONTEXT SETUP REQUEST,但本申请实施例并不限于此。
S105、gNodeB向UE发送安全模式命令消息,该安全模式命令消息用于为UE配置安全算法,对应地,UE接收该安全模式命令消息。
该安全模式命令消息可以是SecurityModeCommand消息,gNodeB可以通过SecurityModeCommand消息为UE配置完整性保护和加密算法,但本申请实施例并不限于此。
S106、当UE根据安全模式命令消息配置完成后,UE可以向gNodeB发送安全模式完成消息,该安全模式完成消息用于表示安全模式配置完成,对应地,gNodeB接收该安全模式完成消息。
安全模式完成消息可以是SecurityModeComplete消息,但本申请实施例并不限于此。
S107、gNodeB向UE发送UE能力查询消息,该UE能力查询消息用于查询UE的能力,对应地,UE接收gNodeB的UE能力查询消息。
UE能力查询消息可以为UECapabilityEnquiry消息,但本申请实施例并不限于此。
S108、UE向gNodeB发送UE能力信息,该UE能力信息包括UE的能力,对应地,gNodeB 接收该UE能力信息。
UE能力信息可以是UECapabilityInformation,但本申请实施例并不限于此。
S109、gNodeB向5GC发送UE无线能力信息指示消息。
UE无线能力信息指示消息可以是UE RADIO CAPABILITY INFO INDICATION,但本申请实施例并不限于此。
S110、gNodeB向UE发送RRC重配消息,该RRC重配消息用于为UE进行RRC重配,对应地,UE接收RRC重配消息。
RRC重配消息可以是RRCReconfiguration,但本申请实施例并不限于此。该RRC重配消息用于为终端设备进行RRC重配,也就是为UE配置数据无线承载(data radio bearer,DRB)和信令无线承载(signaling radio bearer,SRB)等。
S111、当UE进行RRC重配之后,UE向gNodeB发送RRC重配完成消息,该RRC重配完成消息用于表示RRC重配完成。
RRC重配完成消息可以是RRCReconfigurationComplete消息,但本申请实施例并不限于此。
S112、gNodeB向5GC发送初始上下文建立响应消息,该初始上下文建立响应消息用于表示初始上下文建立过程结束。
初始上下文建立响应消息可以是INITIAL CONTEXT SETUP RESPONSE,但本申请实施例并不限于此。
本申请实施例对上述接入过程进行分析,发现gNodeB向UE发送UE能力查询消息之前,必须接收到来自UE的安全模式完成消息,也就是上述S107必须在S106之后,必须等待安全配置完成之后才能进行终端设备能力的上报,导致时延过长,另外,gNodeB向UE发送RRC重配消息之前,必须接收来自UE的能力信息,也就是上述S110必须在S108之后,必须等待上报能力消息之后才能进行RRC重配,导致时延过长,降低通信效率。造成时延过程的原因也可以理解为初始上下文建立过程中信令流程为串行发送,即安全配置过程完成之后、在进行UE能力查询过程,在进行UE能力查询过程之后再进行RRC重配过程。
需要说明的是,初始上下文建立过程中,S107~S109是可选。当初始上下文建立请求消息(即INITIAL CONTEXT SETUP REQUEST)中没有携带UE能力或者gNodeB需要向UE查询UE的能力时,初始上下文建立流程包含UE能力查询过程,即上述方法100包括S107~S109。安全模式配置过程与UE能力查询过程串行进行,gNodeB在收到安全模式完成(SecurityModeComplete)消息后,再下发UE能力查询消息(UECapabilityEnquiry)。
当初始上下文建立请求消息(即INITIAL CONTEXT SETUP REQUEST)中已经携带UE能力或者gNodeB不需要向UE查询UE的能力时,初始上下文建立流程不包含UE能力查询过程,即上述方法100不包括S107~S109。安全模式配置过程与RRC重配过程串行进行,gNodeB在收到安全模式完成(SecurityModeComplete)消息后,再下发RRC重配(RRCReconfiguration)消息。
示例性地,图2示出了NR SA组网条件下非激活态接入方式200的示意性流程图。如图1所示,非激活态接入方式可以包括如下步骤:
S201、UE向gNodeB发送消息1(message 1,Msg 1),对应地,gNodeB接收该Msg 1。
向gNodeB发送Msg 1的UE可以是一个,也可以是多个,本申请实施例对此不作限定。当多个UE向gNodeB发送Msg 1时,每个UE发送的Msg 1可以相同,也可以不相同,本申请实施例对此不作限定。
当gNodeB接收多个UE发送的Msg 1时,图2中所示的UE可以是向gNodeB发送Msg 1的设备中的一个。
Msg 1可以携带前导标识(Preamble)。前导标识可以用于告知gNodeB存在随机接入请求。前导标识也可以称为随机接入前导(random access preamble),本申请实施例对此不作限定。
S202、gNodeB基于Msg 1,向UE发送消息2(message 2,Msg 2),该Msg 2携带上行传输控制信息,该上行传输控制信息用于指示UE发送消息3(message 3,Msg 3)。
Msg 2可以为随机接入响应(random access response,RAR)消息。
上行传输控制信息也可以称为上行调度控制信息、上行传输指示信息或者上行调度指示信息, 本申请实施例对此不作限定。
上行传输控制信息可以通过Msg 2发送,也就是说,gNodeB向UE发送Msg 2,该Msg 2中包括上行传输控制信息,该上行传输控制信息用于指示UE发送Msg 3。该Msg 2还可以包括具有其他功能的信息,本申请实施例对此不作限定。
当多个UE向gNodeB发送Msg 1时,gNodeB可以向多个UE发送Msg 2。
S203、UE基于Msg 2,向gNodeB发送Msg 3以触发gNodeB进行RRC恢复过程,对应地,gNodeB接收UE发送的Msg 3。
Msg 3可以携带恢复请求消息和UE唯一的标识,该恢复请求消息可以是RRCResumeRequest,但本申请实施例并不限于此。该UE唯一的标识用于冲突解决。当多个UE向gNodeB发送Msg 1时,这多个UE中的每个UE均可以向gNodeB发送Msg 3,且不同UE的Msg 3中包括不同的标识。
S204、gNodeB基于Msg 3,向UE发送消息4(message 4,Msg 4),对应地,UE接收Msg4。
Msg 4可以携带竞争解决消息,该竞争解决消息可以是竞争解决介质访问控制协议控制元素(medium access control control element,MAC CE)消息,例如,Contention Resolution Identity MAC CE,但本申请实施例并不限于此。
当多个UE向gNodeB发送Msg 1时,这多个UE中的每个UE均可以向gNodeB发送Msg 3,gNodeB可以根据每个UE发送的Msg 3,从多个UE中确定一个随机接入的UE,并向其发送Msg4。
S205、UE向gNodeB发送反馈消息A,该反馈消息A用于表示未接收到或者已接收到Msg 4,对应地,gNodeB接收该反馈消息A。
反馈消息A可以是确认标识(acknowledgement,ACK)或者否定标识(negative acknowledgment,NACK),但本申请实施例并不限于此。
若UE成功接收到Msg 4,则可以向gNodeB发送ACK。若UE未成功接收到Msg 4,则可以向gNodeB发送NACK。
S206、反馈消息A用于表示UE已接收到Msg 4,gNodeB向UE发送RRC恢复消息,该RRC恢复消息用于指示UE进行RRC恢复,对应地,UE接收该RRC恢复消息。
RRC恢复消息可以是RRCResume,但本申请实施例并不限于此。
S207、UE向gNodeB发送反馈消息B,该反馈消息B用于表示未接收到或者已接收到RRC恢复消息,对应地,gNodeB接收该反馈消息B。
反馈消息B可以是ACK或者NACK,但本申请实施例并不限于此。
若UE成功接收到RRC恢复消息,则可以向gNodeB发送ACK。若UE未成功接收到RRC恢复消息,则可以向gNodeB发送NACK。
S208、反馈消息B用于表示已接收到RRC恢复消息,UE根据RRC恢复消息,进行RRC连接恢复处理,当处理完成后,可以向gNodeB发送RRC恢复完成消息,对应地,gNodeB接收该RRC恢复完成消息,即完成了非激活态接入过程。
RRC恢复完成消息可以是RRCResumeComplete,但本申请实施例并不限于此。
本申请实施例对上述接入过程进行分析,发现上述gNodeB向UE发送RRC恢复消息之前,需要接收到反馈消息A,也就是上述S206必须在S205之后,必须确定UE接收到反馈消息A之后才能进行RRC恢复,导致时延过长。造成时延过程的原因也可以理解为Msg 4和RRC恢复消息是串行传输的,即gNodeB先发送Msg 4,且必须确定UE接收到反馈消息A后再发送RRC恢复消息。
综上所述,在idle态接入的初始上下文建立过程中,现有技术采用串行传输机制:安全模式命令消息(SecurityModeCommand)消息与UE能力查询(UECapabilityEnquiry)消息串行传输(gNodeB需要查询UE能力时),或安全模式命令消息(SecurityModeCommand)消息与RRC重配(RRCReconfiguration)消息串行传输(gNodeB不需要查询UE能力时)。采用串行传输机制时,导致初始上下文建立过程时延较大。
在inactive态接入过程中,现有技术也采用串行传输机制:Msg 4与RRC恢复(RRC Resume)消息串行发送。采用串行传输机制时,导致inactive态过程时延较大。
有鉴于此,本申请实施例提供一种通信方法和通信装置,在idle态接入的初始上下文建立过程以及inactive态接入过程中,采用并行传输机制或者合并传输机制,有利于降低idle态接入的初始上下文建立过程以及inactive态接入过程的接入时延,提高通信效率。
为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
需要说明的是,本申请中,“示例性地”或者“例如”等词用于表示作例子、例证或说明。本申请中被描述为“示例性地”或者“例如”的任何实施例或设计方案不应被解释为比其他实施例或设计方案更优选或更具优势。确切而言,使用“示例性地”或者“例如”等词旨在以具体方式呈现相关概念。
此外,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a、b和c中的至少一项(个),可以表示:a,或b,或c,或a和b,或a和c,或b和c,或a、b和c,其中a,b,c可以是单个,也可以是多个。
图3示出了一种通信方法300的示意性流程图。该方法300可以包括如下步骤:
S301、核心网设备向接入网设备发送初始上下文建立请求消息,该初始上下文建立请求消息用于请求启动初始上下文建立过程,对应地,接入网设备可以接收该初始上下文建立请求消息。
若该方法300应用于5G技术中,核心网设备可以是5GC,接入网设备可以是gNodeB,但本申请实施例并不限于此。
初始上下文建立请求消息可以是INITIAL CONTEXT SETUP REQUEST,但本申请实施例并不限于此。
S302、接入网设备向终端设备发送安全模式命令消息,该安全模式命令消息用于为终端设备配置安全算法,对应地,终端设备接收该安全模式命令消息。
终端设备可以是UE,但本申请实施例并不限于此。
该安全模式命令消息可以是SecurityModeCommand消息,接入网设备可以通过SecurityModeCommand消息为终端设备配置完整性保护和加密算法,但本申请实施例并不限于此。
S303、接入网设备向终端设备发送UE能力查询消息,该UE能力查询消息用于请求终端设备上报终端设备的能力,对应地,终端设备接收接入网设备的UE能力查询消息。
UE能力查询消息可以为UE CapabilityEnquiry消息,但本申请实施例并不限于此。
S304、当终端设备根据安全模式命令消息配置完成后,终端设备可以向接入网设备发送安全模式完成消息,该安全模式完成消息用于表示安全模式配置完成,对应地,接入网设备接收该安全模式完成消息。
安全模式完成消息可以是SecurityModeComplete消息,但本申请实施例并不限于此。
S305、终端设备根据UE能力查询消息,向接入网设备发送UE能力信息,该UE能力信息包括终端设备的能力,对应地,接入网设备接收该UE能力信息。
UE能力信息可以是终端设备CapabilityInformation,但本申请实施例并不限于此。
S306、接入网设备向核心网设备发送UE无线能力信息指示消息。
UE无线能力信息指示消息可以是终端设备RADIO CAPABILITY INFO INDICATION。
S307、接入网设备向终端设备发送RRC重配消息,该RRC重配消息用于为终端设备进行RRC重配,对应地,终端设备接收RRC重配消息。
RRC重配消息可以是RRCReconfiguration,但本申请实施例并不限于此。该RRC重配消息用于为终端设备进行RRC重配,也就是为终端设备配置数据无线承载(data radio bearer,DRB)和信令无线承载(signaling radio bearer,SRB)等。
S308、当终端设备进行RRC重配之后,终端设备向接入网设备发送RRC重配完成消息,该RRC重配完成消息用于表示RRC重配完成。
RRC重配完成消息可以是RRCReconfigurationComplete消息,但本申请实施例并不限于此。
S309、接入网设备向核心网设备发送初始上下文建立响应消息,该初始上下文建立响应消息用于表示初始上下文建立过程结束。
本申请实施例提供的通信方法,在idle态接入的初始上下文建立过程包含UE能力查询过程时(即初始上下文建立请求消息中未携带终端设备的能力信息、或接入网设备需要向终端设备查询终端设备的能力信息),安全模式命令消息(SecurityModeCommand)消息与UE能力查询消息(UECapabilityEnquiry)并行传输,也就是说,接入网设备向终端设备发送安全模式命令消息后,可以立即向终端设备发送UE能力查询消息,无需在收到安全模式完成(SecurityModeComplete)消息后,再下发UE能力查询消息(UECapabilityEnquiry),可以节省等待安全模式完成消息的时间,有利于降低idle态接入的初始上下文建立过程的接入时延,提高通信效率。
可选地,上述安全模式命令消息(SecurityModeCommand)消息与UE能力查询消息(UECapabilityEnquiry)可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
若安全模式命令消息与UE能力查询消息占用不同的时频资源,则安全模式命令消息所占的时频资源与UE能力查询消息所占的时频资源可以是相邻的。
若安全模式命令消息与UE能力查询消息占用同一时频资源,可以节省时频资源。该方法也可以称为安全模式命令消息与UE能力查询消息合并传输,本申请实施例对此不作限定。
可选地,安全模式完成消息(SecurityModeComplete)和UE能力信息(CapabilityInformation)可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
若安全模式完成消息和UE能力信息占用同一时频资源,可以节省时频资源。该方法也可以称为安全模式完成消息和UE能力信息合并传输,本申请实施例对此不作限定。
作为一个可选的实施例,上述安全模式命令消息(SecurityModeCommand)消息、UE能力查询消息(UECapabilityEnquiry)以及RRC重配消息均使用并行传输,也就是说,接入网设备向终端设备发送安全模式命令消息后,可以向终端设备发送UE能力查询消息,并先可以向终端设备发送RRC重配消息,无需在收到安全模式完成(SecurityModeComplete)消息后,再下发UE能力查询消息(UECapabilityEnquiry),也无需在接收到UE能力信息之后在向终端设备发送RRC重配消息,可以节省等待安全模式完成消息的时间和等待接收UE能力信息的时间,有利于降低idle态接入的初始上下文建立过程的接入时延,提高通信效率。
在这种实现方式中,安全模式命令消息(SecurityModeCommand)消息、UE能力查询消息(UECapabilityEnquiry)以及RRC重配消息可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
若安全模式命令消息、UE能力查询消息以及RRC重配消息占用同一时频资源,可以节省时频资源。该方法也可以称为安全模式命令消息、UE能力查询消息以及RRC重配消息合并传输,本申请实施例对此不作限定。
安全模式完成消息(SecurityModeComplete)、UE能力信息(CapabilityInformation)以及RRC重配完成消息可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
若安全模式完成消息、UE能力信息以及RRC重配完成消息占用同一时频资源,可以节省时频资源。该方法也可以称为安全模式配置完成消息、UE能力信息以及RRC重配完成消息合并传输,本申请实施例对此不作限定。
上述方法300中,初始上下文建立请求消息(即INITIAL CONTEXT SETUP REQUEST)中没有携带终端设备的能力或者接入网设备需要向终端设备查询终端设备的能力时,初始上下文建立流程包含终端设备能力查询过程。本申请实施例还提供了一种通信方法,初始上下文建立流程不包含终端设备能力查询过程。
示例性地,图4示出了一种通信方法400的示意性流程图。该方法400可以包括如下步骤:
S401、核心网设备向接入网设备发送初始上下文建立请求消息,该初始上下文建立请求消息 用于请求启动初始上下文建立过程,对应地,接入网设备可以接收该初始上下文建立请求消息。
若该方法400应用于5G技术中,核心网设备可以是5GC,接入网设备可以是gNodeB,但本申请实施例并不限于此。
初始上下文建立请求消息可以是INITIAL CONTEXT SETUP REQUEST,但本申请实施例并不限于此。
S402、接入网设备向终端设备发送安全模式命令消息,该安全模式命令消息用于为终端设备配置安全算法,对应地,终端设备接收该安全模式命令消息。
终端设备可以是UE,但本申请实施例并不限于此。
该安全模式命令消息可以是SecurityModeCommand消息,接入网设备可以通过SecurityModeCommand消息为终端设备配置完整性保护和加密算法,但本申请实施例并不限于此。
S403、接入网设备向终端设备发送RRC重配消息,该RRC重配消息用于为终端设备进行RRC重配,对应地,终端设备接收RRC重配消息。
RRC重配消息可以是RRCReconfiguration,但本申请实施例并不限于此。该RRC重配消息用于为终端设备进行RRC重配,也就是为终端设备配置数据无线承载(data radio bearer,DRB)和信令无线承载(signaling radio bearer,SRB)等。
S404、当终端设备根据安全模式命令消息配置完成后,终端设备可以向接入网设备发送安全模式完成消息,该安全模式完成消息用于表示安全模式配置完成,对应地,接入网设备接收该安全模式完成消息。
安全模式完成消息可以是SecurityModeComplete消息,但本申请实施例并不限于此。
S405、当终端设备进行RRC重配之后,终端设备向接入网设备发送RRC重配完成消息,该RRC重配完成消息用于表示RRC重配完成。
RRC重配完成消息可以是RRCReconfigurationComplete消息,但本申请实施例并不限于此。
S406、接入网设备向核心网设备发送初始上下文建立响应消息,该初始上下文建立响应消息用于表示初始上下文建立过程结束。
本申请实施例提供的通信方法,在idle态接入的初始上下文建立过程不包含UE能力查询过程时(即初始上下文建立请求消息中携带了终端设备的UE能力信息、或接入网设备不需要向终端设备查询终端设备的UE能力信息),安全模式命令消息(SecurityModeCommand)消息与RRC重配消息(RRCReconfiguration)并行传输,也就是说,接入网设备向终端设备发送安全模式命令消息后,可以立即向终端设备发送RRC重配消息,无需在收到安全模式完成(SecurityModeComplete)消息后,再下发RRC重配消息,可以节省等待安全模式完成消息的时间,有利于降低idle态接入的初始上下文建立过程的接入时延,提高通信效率。
可选地,上述安全模式命令消息(SecurityModeCommand)消息与RRC重配消息(RRCReconfiguration)可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
若安全模式命令消息与RRC重配消息占用同一时频资源,可以节省时频资源。该方法也可以称为安全模式命令消息与RRC重配消息合并传输,本申请实施例对此不作限定。
可选地,安全模式完成消息(SecurityModeComplete)和RRC重配完成消息(RRCReconfigurationComplete)可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
若安全模式完成消息和RRC重配完成消息占用同一时频资源,可以节省时频资源。该方法也可以称为安全模式完成消息和RRC重配完成消息合并传输,本申请实施例对此不作限定。
上述方法300和方法400为idle态接入的初始上下文建立过程,下面将描述inactive态接入过程。
示例性地,图5示出了一种通信方法500的示意性流程图。该方法500可以包括如下步骤:
S501、终端设备向接入网设备发送Msg 1,对应地,接入网设备接收该Msg 1。
向接入网设备发送Msg 1的终端设备可以是一个,也可以是多个,本申请实施例对此不作限定。
Msg 1可以携带前导标识。前导标识可以用于告知接入网设备存在随机接入请求。
S502、接入网设备基于Msg 1,向终端设备发送Msg 2,该Msg 2携带上行传输控制信息,该上行传输控制信息用于指示终端设备发送Msg 3。
Msg 2可以为RAR消息。上行传输控制信息也可以称为上行调度控制信息、上行传输指示信息或者上行调度指示信息,本申请实施例对此不作限定。
上行传输控制信息可以通过Msg 2发送,也就是说,接入网设备向终端设备发送Msg 2,该Msg 2中包括上行传输控制信息,该上行传输控制信息用于指示终端设备发送Msg 3。该Msg 2还可以包括具有其他功能的信息,本申请实施例对此不作限定。
当多个终端设备向接入网设备发送Msg 1时,接入网设备可以向多个终端设备发送Msg 2。
S503、终端设备基于Msg 2,向接入网设备发送Msg 3以触发接入网设备进行RRC恢复过程,对应地,接入网设备接收终端设备发送的Msg 3。
Msg 3可以携带恢复请求消息和终端设备唯一的标识,该恢复请求消息可以是RRCResumeRequest,但本申请实施例并不限于此。该终端设备唯一的标识用于冲突解决。当多个终端设备向接入网设备发送Msg 1时,这多个终端设备中的每个终端设备均可以向接入网设备发送Msg 3,且不同终端设备的Msg 3中包括不同的标识。
S504、接入网设备向终端设备发送Msg 4,对应地,终端设备接收该Msg 4。
Msg 4可以携带竞争解决介质访问控制协议控制元素(medium access control control element,MAC CE)消息,例如,Contention Resolution Identity MAC CE,但本申请实施例并不限于此。
S505、接入网设备向终端设备发送RRC恢复消息,该RRC恢复消息用于指示终端设备进行RRC恢复。
RRC恢复消息可以是RRCResume,但本申请实施例并不限于此。
S506、终端设备根据Msg 4,向接入网设备发送反馈消息A,该反馈消息A用于表示未接收到或者已接收到Msg 4,对应地,接入网设备接收该反馈消息A。
S507、终端设备根据RRC恢复消息,向接入网设备发送反馈消息B,该反馈消息B用于表示未接收到或者已接收到RRC恢复消息,对应地,接入网设备接收该反馈消息B。
反馈消息B可以是确认字符(acknowledgement,ACK),但本申请实施例并不限于此。
S508、反馈消息B用于表示已接收到RRC恢复消息,终端设备根据RRC恢复消息,进行RRC连接恢复处理,当处理完成后,可以向接入网设备发送RRC恢复完成消息,对应地,接入网设备接收该RRC恢复完成消息,即完成了非激活态接入过程。
RRC恢复完成消息可以是RRCResumeComplete,但本申请实施例并不限于此。
需要说明的是,本申请不限定终端设备向接入网设备发送反馈消息A和反馈消息B的前后顺序,也就是说,终端设备可以先向接入网设备发送反馈消息A,再向接入网设备发送反馈消息B,也可以先向接入网设备发送反馈消息B,再向接入网设备发送反馈消息A。
本申请实施例提供的通信方法,在inactive态接入过程中,Msg 4与RRC恢复(RRC Resume)消息并行传输,也就是说,接入网设备向终端设备发送Msg 4后,可以立即向终端设备发送RRC恢复消息,无需在收到反馈消息A后,再下发RRC恢复消息,可以节省等待反馈消息A的时间,有利于降低inactive态接入过程的接入时延,提高通信效率。
需要说明的是,Msg 4用于表示竞争解决消息。Msg 4与RRC恢复(RRC Resume)消息并行传输,也就是说,竞争解决消息与RRC恢复(RRC Resume)消息并行传输。
本申请实施例提供的方法还可以适用于RRC建立过程,若为RRC建立过程,上述方法500中的Msg 3可以携带RRC建立请求消息。例如,Msg 3可以携带RRCSetupRequest。接入网设备可以基于Msg 3,向终端设备发送Msg 4,即竞争解决消息,并向发送RRC建立消息。对应地,终端设备可以接收Msg 4,可以向接入网设备发送反馈消息A,反馈消息A用于表示未接收到或者已接收到Msg 4,还可以向接入网设备发送反馈消息B,反馈消息B用于表示RRC建立完成消息或者RRC建立失败消息。
本申请实施例提供的建立过程还可以应用于idle态接入过程中的RRC建立过程,上述方法100中的S101可以包括本申请实施例提供的建立过程。
可选地,Msg 4(即竞争解决消息)与RRC恢复(RRC Resume)消息(或者RRC建立消息)可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
若Msg 4(即竞争解决消息)与RRC恢复消息(或者RRC建立消息)占用同一时频资源,可以节省时频资源。该方法也可以称为Msg 4与RRC恢复消息(或者RRC建立消息)合并传输,本申请实施例对此不作限定。
可选地,反馈消息A和反馈消息B可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
若反馈消息A和反馈消息B占用同一时频资源,可以节省时频资源。该方法也可以称为反馈消息A和反馈消息B合并传输,本申请实施例对此不作限定。
Msg 4(即竞争解决消息)与RRC恢复消息(或者RRC建立消息)合并传输、反馈消息A和反馈消息B合并传输相比于串行传输,有利于降低时延。
示例性地,图6示出了一种串行传输和合并传输的时序对比示意图。如图6所示,为了区分不同的时隙,使用1、2、3、4、5、6、7、8、9、10以及11表示不同的时隙。每一个数字表示1个时隙。
在串行传输的方式中,终端设备在时隙0接收到来自接入网设备的Msg 4,延迟2个时隙后,也就是在时隙3向接入网设备发送反馈消息A,反馈消息A用于表示已接收到Msg 4。接入网设备接收到反馈消息A后,延迟2个时隙后,也就是在时隙6向终端设备发送RRC恢复消息。终端设备接收该RRC恢复消息后,延迟2个时隙后,也就是在时隙9向接入网设备发送反馈消息B,反馈消息B用于表示已接收到RRC恢复消息。
在并行传输的方式中,终端设备在时隙0接收到来自接入网设备的Msg 4消息和RRC恢复消息,延迟2个时隙后,也就是在时隙3向接入网设备发送反馈消息A和反馈消息B。其中,反馈消息A用于表示已接收到Msg 4,反馈消息B用于表示已接收到RRC恢复消息。
并行传输方式相比于串行传输方式,可以获得9-3=6个时隙的时延增益。
需要说明的是,本申请实施例仅仅是以图6为例进行说明,并不对此作任何限定。
作为一个可选的实施例,当上述RRC恢复(RRC Resume)消息所占数据量较大时,在媒体介入控制(medium access control,MAC)层传输时需要分片处理,RRC Resume消息可以被分成多片在不同的传输时隙(slot)进行传输。当RRC Resume消息被分成多片时,RRC Resume消息可以包括多块数据。若RRC Resume消息包括M块数据,也就是RRC Resume消息被分成M片,这M块数据中可以存在N块数据与竞争解决MAC CE并行传输,也就是说,N块数据与竞争解决MAC CE占用同一时频资源,剩余的M-N块数据可以占用同一时频资源,也可以占用不同的时频资源,本申请实施例对此不作限定。
示例性地,RRC恢复消息在MAC层需要分成2片传输,则M等于2,N等于1,RRC Resume消息可以包括RRC恢复消息分片1(RRC Resume分片1)和RRC恢复消息分片2(RRC Resume分片2)。Msg 4可以与RRC恢复消息分片1占用同一时频资源,且终端设备在相同的时隙反馈消息。
当RRC恢复消息分片传输时,RRC恢复消息分片后的数据与Msg 4(即竞争解决消息)合并传输、反馈消息A和反馈消息B合并传输相比于串行传输,有利于降低时延。
示例性地,图7示出了一种分片场景下,串行传输和合并传输的时序对比示意图。如图7所示,为了区分不同的时隙,使用1、2、3、4、5、6、7、8、9、10以及11表示不同的时隙。每一个数字表示1个时隙。
在串行传输的方式中,终端设备在时隙0接收到来自接入网设备的Msg 4,延迟2个时隙后,也就是在时隙3向接入网设备发送反馈消息A。接入网设备接收到反馈消息A后,延迟2个时隙后,也就是在时隙6向终端设备发送RRC恢复消息分片1,在时隙7向终端设备发送RRC恢复消息分片2。终端设备接收该RRC恢复消息分片1和RRC恢复消息分片2后,在时隙9向接入网设备发送反馈消息B,其中,反馈消息B包括反馈消息B分片1和反馈消息B分片2。需要说明的是,反馈消息B分片1和反馈消息B分片2可以占用如图7所示的一个时隙,也可以占用不同的时隙(例如,相邻的时隙),本申请实施例对此不作限定。还需要说明的是,若RRC恢复消 息包括两个以上的分片,这两个以上的分片可以占用两个时隙,也可以占用两个以上的时隙,本申请实施例对此不作限定。应理解,RRC恢复消息可占用的时隙的个数最多等于分片的个数。
在并行传输的方式中,终端设备在时隙0接收到来自接入网设备的Msg 4和RRC恢复消息分片1,在时隙1接收到来自接入网设备的RRC恢复消息分片2,在时隙3向接入网设备发送反馈消息A和反馈消息B,其中,反馈消息B包括反馈消息B分片1和反馈消息B分片2。
并行传输方式相比于串行传输方式,可以获得9-3=6个时隙的时延增益。
需要说明的是,本申请实施例仅仅是以图7为例进行说明,并不对此作任何限定。
上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
上文中结合图1至图7,详细描述了本申请实施例的方法,下面将结合图8和图9,详细描述本申请实施例的装置。
图8示出了本申请实施例提供的一种通信装置800的示意性框图,该通信装置800可以包括:发送单元810和接收单元820。
在一种可能的实现方式中,该通信装置800可以执行上述方法300、方法400或者方法500中接入网设备执行的步骤。
在另一种可能的实现方式中,该通信装置800可以执行上述方法300、方法400或者方法500中终端设备执行的步骤。其中,当通信装置800执行方法300或者方法400时,通信装置800还包括处理单元。
应理解,这里的通信装置800以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,通信装置800可以具体为上述实施例中的接入网设备和终端设备,通信装置800可以用于执行上述方法实施例中与接入网设备和终端设备对应的各个流程和/或步骤,为避免重复,在此不再赘述。
上述各个方案的通信装置800具有实现上述方法中接入网设备和终端设备执行的相应步骤的功能;上述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在本申请的实施例,图8中的通信装置800也可以是芯片或者芯片系统,例如:片上系统(system on chip,SoC)。
图9示出了本申请实施例提供的另一种通信装置900的示意性框图。该通信装置900包括处理器910、收发器920和存储器930。其中,处理器910、收发器920和存储器930通过内部连接通路互相通信,该存储器930用于存储指令,该处理器910用于执行该存储器930存储的指令,以控制该收发器920发送信号和/或接收信号。
应理解,通信装置900可以具体为上述实施例中的接入网设备和终端设备,并且可以用于执行上述方法实施例中与接入网设备和终端设备对应的各个步骤和/或流程。可选地,该存储器930可以包括只读存储器和随机存取存储器,并向处理器提供指令和数据。存储器的一部分还可以包括非易失性随机存取存储器。例如,存储器还可以存储设备类型的信息。该处理器910可以用于执行存储器中存储的指令,并且当该处理器910执行存储器中存储的指令时,该处理器910用于执行上述与该接入网设备和终端设备对应的方法实施例的各个步骤和/或流程。该收发器920可以包括发射器和接收器,该发射器可以用于实现上述收发器对应的用于执行发送动作的各个步骤和/或流程,该接收器可以用于实现上述收发器对应的用于执行接收动作的各个步骤和/或流程。
应理解,在本申请实施例中,上述装置的处理器可以是中央处理单元(central processing unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用 处理器中的硬件及软件单元组合执行完成。软件单元可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器执行存储器中的指令,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。
本申请实施例还提供了一种通信系统,该通信系统可以包括上述实施例中的接入网设备和终端设备。
本申请实施例提供一种可读计算机存储介质,该可读计算机存储介质用于存储计算机程序,该计算机程序用于实现上述实施例中各种可能的实现方式所示的接入网设备对应的方法。
本申请实施例提供另一种可读计算机存储介质,该可读计算机存储介质用于存储计算机程序,该计算机程序用于实现上述实施例中各种可能的实现方式所示的终端设备对应的方法。
本申请实施例提供一种计算机程序产品,该计算机程序产品包括计算机程序(也可以称为代码,或指令),当该计算机程序在计算机上运行时,该计算机可以执行上述实施例所示的接入网设备对应的方法。
本申请实施例提供另一种计算机程序产品,该计算机程序产品包括计算机程序(也可以称为代码,或指令),当该计算机程序在计算机上运行时,该计算机可以执行上述实施例中各种可能的实现方式所示的终端设备对应的方法。
本申请实施例提供一种芯片系统,该芯片系统用于支持上述接入网设备实现本申请实施例所示的功能。
本申请实施例提供另一种芯片系统,该芯片系统用于支持上述终端设备实现本申请实施例所示的功能。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者接收端等)执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (29)

  1. 一种通信方法,其特征在于,包括:
    接入网设备向终端设备发送第一配置消息,所述第一配置消息用于为所述终端设备配置安全算法;
    所述接入网设备向所述终端设备发送第二配置消息,所述第二配置消息用于无线资源控制RRC重配,所述第一配置消息和所述第二配置消息并行发送;
    所述接入网设备接收来自所述终端设备的第一配置完成消息,所述第一配置完成消息用于表示所述安全算法已配置完成;
    所述接入网设备接收来自所述终端设备的第二配置完成消息,所述第二配置完成消息用于表示所述RRC重配完成。
  2. 根据权利要求1所述的方法,其特征在于,所述第一配置消息和所述第二配置消息占用同一时频资源。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一配置完成消息和所述第二配置完成消息占用同一时频资源。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,在所述接入网设备向所述终端设备发送第二配置消息之前,所述方法还包括:
    所述接入网设备向所述终端设备发送查询消息,所述查询消息用于查询所述终端设备的能力,所述第一配置消息、所述查询消息以及所述第二配置消息并行发送。
  5. 根据权利要求4所述的方法,其特征在于,在所述接入网设备接收来自所述终端设备的第二配置完成消息之前,所述方法还包括:
    所述接入网设备接收来自所述终端设备的能力信息,所述能力信息包括所述终端设备的能力。
  6. 根据权利要求4或5所述的方法,其特征在于,所述第一配置消息和所述查询消息占用同一时频资源。
  7. 根据权利要求5或6所述的方法,其特征在于,所述第一配置完成消息和所述能力信息占用同一时频资源。
  8. 一种通信方法,其特征在于,包括:
    接入网设备向终端设备发送第一配置消息,所述第一配置消息用于为所述终端设备配置安全算法;
    所述接入网设备向所述终端设备发送查询消息,所述查询消息用于查询所述终端设备的能力,所述第一配置消息和所述查询消息并行发送;
    所述接入网设备接收来自所述终端设备的第一配置完成消息,所述第一配置完成消息用于表示所述安全算法已配置完成;
    所述接入网设备接收来自所述终端设备的能力信息,所述能力信息包括所述终端设备的能力。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    所述接入网设备向所述终端设备发送第二配置消息,所述第二配置消息用于无线资源控制RRC重配;
    所述接入网设备接收来自所述终端设备的第二配置完成消息,所述第二配置完成消息用于表示所述RRC重配完成。
  10. 根据权利要求8或9所述的方法,其特征在于,所述第一配置消息和所述查询消息占用同一时频资源。
  11. 根据权利要求8至10中任一项所述的方法,其特征在于,所述第一配置完成消息和所述能力信息占用同一时频资源。
  12. 一种通信方法,其特征在于,包括:
    接入网设备向终端设备发送第一消息,所述第一消息包括竞争解决标识;
    所述接入网设备向所述终端设备发送第二消息,所述第二消息包括无线资源控制RRC配置消息,所述第一消息和所述第二消息并行发送,其中,所述RRC配置消息为RRC恢复消息或者RRC 建立消息;
    所述接入网设备接收来自所述终端设备的第一反馈消息,所述第一反馈消息用于表示所述终端设备已接收到所述第一消息;
    所述接入网设备接收来自所述终端设备的第二反馈消息,所述第二反馈消息用于表示所述终端设备已接收到所述第二消息。
  13. 根据权利要求12所述的方法,其特征在于,所述第一反馈消息和所述第二反馈消息占用同一时频资源。
  14. 根据权利要求12或13所述的方法,其特征在于,所述第一消息和所述第二消息占用同一时频资源。
  15. 根据权利要求12或13所述的方法,其特征在于,所述第二消息分片传输,所述第二消息包括M块数据,所述M块数据是对所述第二消息分片得到的,所述M块数据中的N块数据与所述第一消息占用同一时频资源,所述M大于所述N,且所述M为大于1的整数,所述N为大于或等于1的整数。
  16. 一种通信方法,其特征在于,包括:
    终端设备接收来自接入网设备的第一配置消息,所述第一配置消息用于为所述终端设备配置安全算法;
    所述终端设备接收来自所述接入网设备的第二配置消息,所述第二配置消息用于无线资源控制RRC重配,所述第一配置消息和所述第二配置消息并行接收;
    所述终端设备基于所述第一配置消息,进行安全算法配置;
    在安全算法配置完成之后,向所述接入网设备发送第一配置完成消息,所述第一配置完成消息用于表示所述安全算法已配置完成;
    所述终端设备基于所述第二配置消息,进行RRC重配;
    在RRC重配完成之后,向所述接入网设备发送第二配置完成消息,所述第二配置完成消息用于表示所述RRC重配完成。
  17. 根据权利要求16所述的方法,其特征在于,所述第一配置消息和所述第二配置消息占用同一时频资源。
  18. 根据权利要求16或17所述的方法,其特征在于,在所述终端设备接收来自所述接入网设备的第二配置消息之前,所述方法还包括:
    所述终端设备接收来自所述接入网设备的查询消息,所述查询消息用于查询所述终端设备的能力,所述第一配置消息、所述查询消息以及所述第二配置消息并行接收。
  19. 根据权利要求18所述的方法,其特征在于,所述方法还包括:
    所述终端设备基于所述查询消息,向所述接入网设备发送能力信息,所述能力信息包括所述终端设备的能力。
  20. 根据权利要求18或19所述的方法,其特征在于,所述第一配置消息和所述查询消息占用同一时频资源。
  21. 一种通信方法,其特征在于,包括:
    终端设备接收来自接入网设备的第一配置消息,所述第一配置消息用于为所述终端设备配置安全算法;
    所述终端设备接收来自所述接入网设备的查询消息,所述查询消息用于查询所述终端设备的能力,所述第一配置消息和所述查询消息并行接收;
    所述终端设备基于所述第一配置消息,进行安全算法配置;
    在安全算法配置完成之后,向所述接入网设备发送第一配置完成消息,所述第一配置完成消息用于表示所述安全算法已配置完成;
    所述终端设备基于所述查询消息,向所述接入网设备发送能力信息,所述能力信息包括所述终端设备的能力。
  22. 根据权利要求21所述的方法,其特征在于,所述方法还包括:
    所述终端设备接收来自所述接入网设备的第二配置消息,所述第二配置消息用于无线资源控 制RRC重配;
    所述终端设备基于所述第二配置消息,进行RRC重配;
    在RRC重配完成之后,向所述接入网设备发送第二配置完成消息,所述第二配置完成消息用于表示所述RRC重配完成。
  23. 根据权利要求21或22所述的方法,其特征在于,所述第一配置消息和所述查询消息占用同一时频资源。
  24. 一种通信方法,其特征在于,包括:
    终端设备接收来自接入网设备的第一消息,所述第一消息包括竞争解决标识;
    所述终端设备接收来自所述接入网设备的第二消息,所述第二消息包括无线资源控制RRC配置消息,所述第一消息和所述第二消息并行接收,其中,所述RRC配置消息为RRC恢复消息或者RRC建立消息;
    所述终端设备向所述接入网设备发送第一反馈消息,所述第一反馈消息用于表示所述终端设备未接收到或者已接收到所述第一消息;
    所述终端设备向所述接入网设备发送第二反馈消息,所述第二反馈消息用于表示所述终端设备未接收到或者已接收到所述第二消息。
  25. 根据权利要求24所述的方法,其特征在于,所述第一消息和所述第二消息占用同一时频资源。
  26. 根据权利要求24或25所述的方法,其特征在于,所述第二消息分片传输,所述第二消息包括M块数据,所述M块数据是对所述第二消息分片得到的,所述M块数据中的N块数据与所述第一消息占用同一时频资源,所述M大于所述N,且所述M为大于1的整数,所述N为大于或等于1的整数。
  27. 一种通信装置,其特征在于,包括:处理器和存储器,所述存储器用于存储计算机程序或指令,所述处理器用于运行所述计算机程序或指令,以执行如权利要求1至7中任一项所述的方法、8至11中任一项所述的方法、12至15中任一项所述的方法、16至20中任一项所述的方法、21至23中任一项所述的方法、或者24至26中任一项所述的方法。
  28. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序或指令,所述计算机程序或指令用于实现权利要求1至7中任一项所述的方法、8至11中任一项所述的方法、12至15中任一项所述的方法、16至20中任一项所述的方法、21至23中任一项所述的方法、或者24至26中任一项所述的方法。
  29. 一种计算机程序产品,其特征在于,所述计算机程序产品包括指令,当所述指令被执行时,使得权利要求1至7中任一项所述的方法、8至11中任一项所述的方法、12至15中任一项所述的方法、16至20中任一项所述的方法、21至23中任一项所述的方法、或者24至26中任一项所述的方法被执行。
PCT/CN2023/114327 2022-08-30 2023-08-22 通信方法和通信装置 WO2024046176A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211048899.5 2022-08-30
CN202211048899.5A CN117676627A (zh) 2022-08-30 2022-08-30 通信方法和通信装置

Publications (1)

Publication Number Publication Date
WO2024046176A1 true WO2024046176A1 (zh) 2024-03-07

Family

ID=90075715

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/114327 WO2024046176A1 (zh) 2022-08-30 2023-08-22 通信方法和通信装置

Country Status (2)

Country Link
CN (1) CN117676627A (zh)
WO (1) WO2024046176A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019242756A1 (zh) * 2018-06-21 2019-12-26 华为技术有限公司 通信方法及装置
CN112399422A (zh) * 2019-08-16 2021-02-23 大唐移动通信设备有限公司 一种安全算法配置方法、控制平面中心节点及终端
US20210352743A1 (en) * 2019-01-25 2021-11-11 Huawei Technologies Co.,Ltd. Communication method and apparatus
WO2022151917A1 (zh) * 2021-01-15 2022-07-21 大唐移动通信设备有限公司 消息处理方法、装置、终端及网络侧设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019242756A1 (zh) * 2018-06-21 2019-12-26 华为技术有限公司 通信方法及装置
US20210352743A1 (en) * 2019-01-25 2021-11-11 Huawei Technologies Co.,Ltd. Communication method and apparatus
CN112399422A (zh) * 2019-08-16 2021-02-23 大唐移动通信设备有限公司 一种安全算法配置方法、控制平面中心节点及终端
WO2022151917A1 (zh) * 2021-01-15 2022-07-21 大唐移动通信设备有限公司 消息处理方法、装置、终端及网络侧设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "RRC state transition between CONNECTED and INACTIVE", 3GPP DRAFT; R2-1708714 STATE TRANSITION BETWEEN RRC CONNECTED AND INACTIVE, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Berlin, Germany; 20170821 - 20170825, 20 August 2017 (2017-08-20), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051318519 *

Also Published As

Publication number Publication date
CN117676627A (zh) 2024-03-08

Similar Documents

Publication Publication Date Title
US20200221538A1 (en) Data transmission method, terminal device, and network device
EP3624530A1 (en) Information processing method and related apparatus
JP6888099B2 (ja) 多数接続通信方法、装置、及び端末
WO2021159989A1 (zh) 用户设备能力传输方法、信息传输方法及相关产品
WO2022036555A1 (zh) 中继传输的方法、中继终端和远端终端
WO2020191781A1 (zh) 一种数据传输方法及装置
WO2020156521A1 (zh) 一种无线资源控制rrc消息发送方法及装置
WO2021035535A1 (zh) 无线通信的方法、终端设备和网络设备
WO2022110168A1 (zh) 通信配置的方法和通信装置
EP4192082A1 (en) Communication method, apparatus and system
WO2018121435A1 (zh) 资源映射方法和装置
EP4187820A1 (en) Methods and devices for indicating and determining sequence number
WO2021047478A1 (zh) 一种通信方法及装置
WO2021189235A1 (zh) 一种数据传输方法及装置、通信设备
WO2021056703A1 (zh) 信息更新方法、设备及系统
WO2021031035A1 (zh) 一种通信方法及装置
WO2024046176A1 (zh) 通信方法和通信装置
WO2022027523A1 (zh) 一种辅助信息的配置方法及通信装置
WO2019028922A1 (zh) 一种发送小区配置信息的方法及装置
WO2023131220A1 (zh) 一种通信方法、装置及系统
WO2023023958A1 (zh) 一种寻呼消息的传输方法及装置、设备
WO2024046294A1 (zh) 通信方法和装置
WO2022213393A1 (zh) 寻呼方法、设备及存储介质
WO2023108564A1 (zh) 无线通信方法、终端设备以及网络设备
WO2023103958A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23859209

Country of ref document: EP

Kind code of ref document: A1