WO2024050838A1 - Communication method and apparatus - Google Patents

Communication method and apparatus Download PDF

Info

Publication number
WO2024050838A1
WO2024050838A1 PCT/CN2022/118233 CN2022118233W WO2024050838A1 WO 2024050838 A1 WO2024050838 A1 WO 2024050838A1 CN 2022118233 W CN2022118233 W CN 2022118233W WO 2024050838 A1 WO2024050838 A1 WO 2024050838A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
data
logical link
message
data service
Prior art date
Application number
PCT/CN2022/118233
Other languages
French (fr)
Chinese (zh)
Inventor
习燕
严学强
赵明宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2022/118233 priority Critical patent/WO2024050838A1/en
Publication of WO2024050838A1 publication Critical patent/WO2024050838A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/26Resource reservation

Definitions

  • the present application relates to the field of communication technology, and in particular, to a communication method and device.
  • Data service can refer to providing data as a service product after collecting, preprocessing, and analyzing data.
  • data in the communication network can be processed to implement data services.
  • current data transmission methods cannot meet data service needs.
  • This application provides a communication method and device, which provides a transmission method for data corresponding to data service tasks that meets data service requirements.
  • a communication method including: a first node obtains data service requirement information; the first node selects a second node for performing a data service task based on the data service requirement information; the first node selects a second node for performing a data service task based on the data service requirement information; Send a first message to the second node; the first message includes first configuration information, the first configuration information includes the type of the first logical link, and the type of the first logical link is a bidirectional logical link, a unidirectional downlink, or In the unidirectional uplink, the first logical link is a logical link between the first node and the second node, and the first logical link is used to transmit data corresponding to the data service task.
  • the first node can send configuration information including the type of logical link to the second node that performs the data service task according to the data service requirement information, so that the logical link established by the second node according to the type of the logical link can satisfy Data service requirements, and logical links are used to transmit data corresponding to data service tasks, which provides a transmission method for data corresponding to data service tasks that meets data service requirements.
  • the logical link is used to transmit data corresponding to the data service task, it can reduce interference to the transmission of existing business data.
  • the method further includes: the first node receiving capability information sent by one or more third nodes; the capability information is used to indicate that the one or more third nodes support at least one of the following: data collection capabilities, data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities; the first node selects the second node for performing data service tasks based on the data service requirement information, including: the first node based on The data service requirement information and capability information are used to select the second node from one or more third nodes.
  • the first node can use the data service requirement information and the capability information of one or more third nodes to select the second node for performing the data service task from the one or more third nodes, so that the selected second node The node has the capability to meet the data service requirement information.
  • the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
  • the method further includes: the first node sending a system message to one or more third nodes; wherein the system message is used to indicate that the first node supports data service capabilities. It can be seen that the first node sends a system message to one or more third nodes, and the system message is used to indicate that the first node supports the data service capability, so that the one or more third nodes can learn that the first node supports the data service capability.
  • the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and data protection used by the first node. algorithm, the data compression algorithm used by the first node, the interval between data transmission by the first node, the amount of data transmitted by the first node in a single time, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the second node The data compression algorithm used, the interval for data transmission by the second node, the amount of data transmitted by the second node in a single transmission, the maximum data transmission amount by the second node, and the minimum data transmission amount by the second node in a single transmission.
  • the second node can learn that the first node has implemented data security protection, data privacy protection, etc., and the second node can also learn the relevant algorithms used for data security protection, data privacy protection, etc.
  • the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, data used by the first node The protection algorithm, the data compression algorithm used by the first node, the interval between data transmission by the first node, and the amount of data transmitted by the first node in a single time. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by issuing this information, the second node can learn that the first node has implemented data security protection, data privacy protection, etc.
  • the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and data used by the second node. Protection algorithm, the data compression algorithm used by the second node, the interval between data transmission by the second node, the amount of data transmitted by the second node in a single time, the maximum data transmission amount by the second node in data transmission, the number of data transmitted by the second node in a single time Minimum data transfer amount. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by issuing this information, the second node can learn the relevant algorithms used for data security protection, data privacy protection, etc.
  • the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
  • the method further includes: the first node sends multicast data, and the multicast data is associated
  • the first logical links corresponding to different nodes among the plurality of second nodes, and the multicast data are data corresponding to the data service task. It can be seen that because the multicast data sent by the first node can be associated with the first logical links corresponding to different nodes among the multiple second nodes, the first node will not send the same data to different nodes respectively, saving downlink air interface resources. , which improves resource utilization and enables different nodes to receive the same multicast data.
  • the method further includes: if the data corresponding to the data service task is transmitted on the first logical link, the first node sends a second message to the second node, and the second message is used to indicate the second message.
  • the second node deletes the first logical link. It can be seen that when the data corresponding to the data service task is transmitted on the first logical link, the second node can be notified to delete the first logical link, which reduces the power consumed by the second node when maintaining the first logical link. Energy consumption is saved.
  • the method further includes: if the first node determines that the cell after the second node performs cell switching is the first cell of the first node, the first node sends a third message to the second node, The three messages are also used to instruct the second node to retain the first configuration information. It can be seen that when the cell after the second node performs cell switching is the first cell of the first node, the second node can be notified to retain the first configuration information, so that the first node does not need to send the first configuration information to the first node again. .
  • the method further includes: if the first node determines that the cell after the second node performs cell switching is the fourth node's cell, the first node sends a fourth message to the second node, and the fourth message Used to instruct the second node to delete the first logical link. It can be seen that when the first node determines that the cell after the second node performs cell switching is not the first node's cell, the first node can notify the second node to delete the first logical link, which reduces the need for the second node to maintain the first logical link. The power consumed during the link saves energy consumption.
  • the method further includes: if the number of second nodes currently used to perform the data service task is less than the first number, the first node reselects the node used to perform the data service task according to the data service requirement information.
  • the first number of nodes is the number determined by the first node based on the data service requirement information. It can be seen that when the number of second nodes currently used to perform data service tasks is less than the first number, the first node can re-select a new node to perform data service tasks, ensuring that the number of nodes performing data service tasks is always the same. Meet the quantity determined based on data service requirement information.
  • the method further includes: if the first node determines that the cell selected by the second node after call reestablishment is the first node's second cell, the first node resends the first message to the second node. . It can be seen that when the first node determines that the cell selected by the second node after call reestablishment is the first node's second cell, the first node re-sends the first message to the second node so that the second node can establish a new cell. The first logical link under the new cell can then transmit the data corresponding to the data service task on the first logical link under the new cell, ensuring the continuity of data services.
  • the method further includes: if the first node determines that the cell selected by the second node after call reestablishment is the cell of the fifth node, and the number of second nodes currently used to perform data service tasks If the number is less than the second number, the first node reselects a node for performing the data service task based on the data service requirement information.
  • the first number is the number determined by the first node based on the data service requirement information.
  • the first node determines that the cell selected by the second node after call reestablishment is not the first node's cell, and the number of second nodes currently used to perform data service tasks is less than the second number, the first node can Re-selecting new nodes to perform data service tasks ensures that the number of nodes performing data service tasks always meets the number determined based on data service requirement information.
  • a communication method including: a second node receiving a first message from a first node; the first message includes first configuration information, the first configuration information includes a type of a first logical link, and the first logical link
  • the type of the link is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink.
  • the first logical link is a logical link between the first node and the second node, and the first logical link is used to transmit data. Data corresponding to the service task; the second node establishes the first logical link according to the type of the first logical link.
  • the method further includes: the second node sending capability information of the second node to the first node; the capability information of the second node being used to indicate that the second node supports at least one of the following: data collection. capabilities, data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities.
  • the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
  • the method further includes: the second node receiving a system message sent by the first node; wherein the system message is used to indicate that the first node supports data service capabilities.
  • the first configuration information is used to indicate at least one of the following: the task that the second node needs to perform, the data protection algorithm used by the first node, The data compression algorithm used by the first node, the interval between data transmission by the first node, the amount of data transmitted by the first node in a single time, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the Data compression algorithm, interval for data transmission by the second node, data volume for a single transmission by the second node, maximum data transmission volume for data transmission by the second node, and minimum data transmission volume for a single transmission by the second node.
  • the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and the data protection algorithm used by the first node. , the data compression algorithm used by the first node, the interval between data transmission by the first node, and the amount of data transmitted by the first node in a single time.
  • the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and the data protection algorithm used by the second node. , the data compression algorithm used by the second node, the interval of data transmission by the second node, the amount of data transmitted by the second node in a single time, the maximum data transmission amount of the second node in data transmission, the minimum data transmitted by the second node in a single time Transmission volume.
  • the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
  • the method further includes: the second node receiving a second message sent by the first node, the second message being used to instruct the second node to delete the first logical link.
  • the cell after the second node performs cell switching is the first cell of the first node.
  • the method further includes: the second node receives a third message sent by the first node, and the third message is used to Instruct the second node to retain the first configuration information; the second node establishes the first logical link under the first cell according to the type of the first logical link in the first configuration information; the second node communicates with the first logical link through the first logical link.
  • One node transmits the remaining data corresponding to the data service task.
  • the second node can be notified to retain the first configuration information, so that the first node does not need to send the first configuration information to the first node again. , also allows the second node to quickly establish the first logical link under the new cell, and then continue to transmit the remaining data corresponding to the data service task on the first logical link under the new cell, ensuring the continuity of data services.
  • the cell after the second node performs cell switching is the cell of the fourth node.
  • the method further includes: the second node receives a fourth message sent by the first node, and the fourth message is used to indicate the fourth node.
  • the second node deletes the first logical link.
  • the method further includes: the second node does not establish a logical link with the fourth node.
  • the cell selected by the second node after call reestablishment is the second cell of the first node.
  • the method further includes: the second node re-receives the first message sent by the first node; According to the type of the first logical link in the first message, the first logical link under the second cell is established; the second node transmits the remaining data corresponding to the data service task with the first node through the first logical link.
  • the cell selected by the second node after call reestablishment is the cell of the fifth node
  • the method further includes: the second node does not establish a logical link with the fifth node.
  • a communication device is provided.
  • the communication device is a first node.
  • the first node includes a processing module and a transceiver module.
  • the transceiver module is used to obtain data service requirement information; the processing module is used to select according to the data service requirement information.
  • a second node used to perform data service tasks a transceiver module, also used to send a first message to the second node based on data service requirement information;
  • the first message includes first configuration information, and the first configuration information includes a first logical link type, the type of the first logical link is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink, the first logical link is a logical link between the first node and the second node, the first Logical links are used to transmit data corresponding to data service tasks.
  • the transceiver module is also used to receive capability information sent by one or more third nodes; the capability information is used to indicate that one or more third nodes support at least one of the following: data collection capability, Data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities; when selecting the second node for performing data service tasks based on the data service requirement information, the processing module is used for the first node to perform the data service task according to the data service requirement information.
  • the data service requirement information and capability information are used to select the second node from one or more third nodes.
  • the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
  • the transceiver module is also configured to send a system message to one or more third nodes; wherein the system message is used to indicate that the first node supports data service capabilities.
  • the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and data protection used by the first node. algorithm, the data compression algorithm used by the first node, the interval between data transmission by the first node, the amount of data transmitted by the first node in a single time, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the second node The data compression algorithm used, the interval for data transmission by the second node, the amount of data transmitted by the second node in a single transmission, the maximum data transmission amount by the second node, and the minimum data transmission amount by the second node in a single transmission.
  • the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, data used by the first node The protection algorithm, the data compression algorithm used by the first node, the interval between data transmission by the first node, and the amount of data transmitted by the first node in a single time.
  • the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, data used by the second node Protection algorithm, the data compression algorithm used by the second node, the interval between data transmission by the second node, the amount of data transmitted by the second node in a single time, the maximum data transmission amount by the second node in data transmission, the number of data transmitted by the second node in a single time Minimum data transfer amount.
  • the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
  • the transceiver module is also used to send multicast data, and the multicast data is associated with multiple
  • the first logical links corresponding to different nodes in the second node, and the multicast data are data corresponding to the data service task.
  • the transceiver module is also used to: if the data corresponding to the data service task is transmitted on the first logical link, the first node sends a second message to the second node, and the second message is used to Instruct the second node to delete the first logical link.
  • the transceiver module is also configured to: if the first node determines that the cell after the second node performs cell switching is the first cell of the first node, the first node sends a third message to the second node. , the third message is also used to instruct the second node to retain the first configuration information.
  • the transceiver module is also configured to: if the first node determines that the cell after the second node performs cell switching is the fourth node's cell, the first node sends a fourth message to the second node, and The four message is used to instruct the second node to delete the first logical link.
  • the processing module is also configured to: if the number of second nodes currently used to perform data service tasks is less than the first number, reselect the first node for performing data services according to the data service requirement information.
  • the first number of task nodes is the number determined by the first node based on the data service requirement information.
  • the transceiver module is also configured to: if the first node determines that the cell selected by the second node after call reestablishment is the second cell of the first node, the first node re-sends the second cell to the second node. A message.
  • the processing module is also configured to: if the first node determines that the cell selected by the second node after call reestablishment is the cell of the fifth node, and the second node is currently used to perform the data service task The number is less than the second number, the first node reselects a node for performing the data service task according to the data service requirement information, and the first number is the number determined by the first node according to the data service requirement information.
  • a communication device is provided.
  • the communication device is a second node.
  • the second node includes a processing module and a transceiver module.
  • the transceiver module is used to receive a first message from the first node; the first message includes first configuration information,
  • the first configuration information includes a type of the first logical link.
  • the type of the first logical link is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink.
  • the first logical link is a link between the first node and the second node. Logical links between nodes, the first logical link is used to transmit data corresponding to the data service task; the processing module is used to establish the first logical link according to the type of the first logical link.
  • the transceiver module is also used to send the capability information of the second node to the first node; the capability information of the second node is used to indicate that the second node supports at least one of the following: data collection capability, Data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities.
  • the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
  • the transceiver module is also configured to receive a system message sent by the first node; wherein the system message is used to indicate that the first node supports data service capabilities.
  • the first configuration information is used to indicate at least one of the following: the task that the second node needs to perform, the data protection algorithm used by the first node, The data compression algorithm used by the first node, the interval between data transmission by the first node, the amount of data transmitted by the first node in a single time, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the Data compression algorithm, interval for data transmission by the second node, data volume for a single transmission by the second node, maximum data transmission volume for data transmission by the second node, and minimum data transmission volume for a single transmission by the second node.
  • the first configuration information is used to indicate at least one of the following: a task that the second node needs to perform, and a data protection algorithm used by the first node. , the data compression algorithm used by the first node, the interval between data transmission by the first node, and the amount of data transmitted by the first node in a single time.
  • the first configuration information is used to indicate at least one of the following: a task that the second node needs to perform, and a data protection algorithm used by the second node. , the data compression algorithm used by the second node, the interval of data transmission by the second node, the amount of data transmitted by the second node in a single time, the maximum data transmission amount of the second node in data transmission, the minimum data transmitted by the second node in a single time Transmission volume.
  • the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
  • the transceiver module is further configured to receive a second message sent by the first node, where the second message is used to instruct the second node to delete the first logical link.
  • the cell after the second node performs cell switching is the first cell of the first node.
  • the transceiver module is also configured to receive a third message sent by the first node, and the third message is used to indicate the third message.
  • the two nodes retain the first configuration information; the processing module is also used to establish the first logical link under the first cell according to the type of the first logical link in the first configuration information; the transceiver module is also used to pass the first logical link The link transmits remaining data corresponding to the data service task with the first node.
  • the cell after the second node performs cell switching is the cell of the fourth node.
  • the transceiver module is also used to receive a fourth message sent by the first node, and the fourth message is used to instruct the second node. Delete the first logical link.
  • the processing module is also used to not establish a logical link with the fourth node.
  • the cell selected by the second node after call reestablishment is the second cell of the first node.
  • the transceiver module is also used to re-receive the first message sent by the first node; the processing module is also used Establishing the first logical link under the second cell according to the type of the first logical link in the first message; the transceiver module is also configured to transmit the remaining data corresponding to the data service task with the first node through the first logical link .
  • the cell selected by the second node after call reestablishment is the cell of the fifth node, and the processing module is also configured not to establish a logical link with the fifth node.
  • a fifth aspect provides a communication device, including a processor.
  • the processor calls a computer program stored in a memory to implement the method in any one of the first aspect or the second aspect.
  • the communication device may be a chip that implements the method in the first aspect or the second aspect or a device containing the chip.
  • a communication device including a logic circuit and an input-output interface.
  • the logic circuit is used to read and execute stored instructions.
  • the communication device executes the instructions as in the first aspect or the second aspect. any of the methods described.
  • a computer-readable storage medium is provided.
  • a computer program is stored in the computer-readable storage medium.
  • the method as described in any one of the first aspect or the second aspect is implemented.
  • An eighth aspect provides a computer program product containing instructions that, when executed on a computer, causes the method described in any one of the first aspect or the second aspect to be executed.
  • a ninth aspect provides a communication system, including a first node for performing the method according to any one of the first aspects and a second node for performing the method according to any one of the second aspects.
  • Figure 1 is the infrastructure of a communication system provided by an embodiment of the present application.
  • Figure 2 shows a schematic diagram of the hardware structure of a communication device applicable to embodiments of the present application
  • Figure 3 is a schematic flow chart of a communication method provided by an embodiment of the present application.
  • Figure 4 is a schematic diagram of a logical link established between an access network device and a terminal device provided by an embodiment of the present application;
  • Figure 5 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 6 is a schematic structural diagram of a simplified terminal device provided by an embodiment of the present application.
  • Figure 7 is a schematic structural diagram of a simplified access network device provided by an embodiment of the present application.
  • At least one of the following or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
  • at least one of a, b, or c can mean: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be one or more .
  • words such as “first” and “second” are used to distinguish identical or similar items with basically the same functions and effects. Those skilled in the art can understand that words such as “first” and “second” do not limit the number and execution order, and words such as "first” and “second” do not limit the number and execution order.
  • the technical solutions of the embodiments of the present application can be applied to long term evolution (long term evolution, LTE) architecture, fifth generation mobile communication technology (5th generation mobile networks, 5G), wireless local area networks (wireless local area networks, WLAN) systems , V2X communication system, etc.
  • LTE long term evolution
  • 5G fifth generation mobile communication technology
  • WLAN wireless local area networks
  • V2X communication system etc.
  • the technical solutions of the embodiments of this application can also be applied to other future communication systems, such as 6G communication systems.
  • future communication systems the functions may remain the same, but the names may change.
  • Figure 1 shows the infrastructure of a communication system provided by an embodiment of the present application.
  • the communication system may include an access network device and one or more terminal devices communicating with the access network device.
  • Figure 1 is only a schematic diagram and does not constitute a limitation on the applicable scenarios of the technical solution provided by this application.
  • the access network device is an entity on the network side that is used to send signals, or receive signals, or send signals and receive signals.
  • Access network equipment can be a device deployed in a radio access network (RAN) to provide wireless communication functions for terminal equipment, such as a transmission reception point (TRP), base station, various forms of control node.
  • RAN radio access network
  • TRP transmission reception point
  • base station various forms of control node.
  • network controller wireless controller, wireless controller in cloud radio access network (cloud radio access network, CRAN) scenario, etc.
  • the access network equipment can be various forms of macro base stations, micro base stations (also called small stations), relay stations, access points (access points, AP), wireless network controllers (radio network controller, RNC), Node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand unit, BBU), transmission point (transmitting and receiving point, TRP), transmitting point (TP), mobile switching center), satellite, drone, etc., can also be the antenna panel of the base station.
  • the control node can connect to multiple base stations and configure resources for multiple terminals covered by multiple base stations.
  • the names of devices with base station functions may be different.
  • it can be the gNB in 5G, or the network side equipment in the network after 5G or the access network equipment in the future evolved PLMN network, or device-to-device (D2D) communication, machine-to-machine (Machine-to-Machine, M2M) communications, equipment that performs base station functions in Internet of Vehicles communications, etc.
  • D2D device-to-device
  • M2M machine-to-machine
  • M2M machine-to-machine
  • This application does not limit the specific names of access network equipment.
  • access network equipment may also include distributed units (DU) and centralized units (CU). Among them, CU and DU are connected through the F1 interface.
  • DU distributed units
  • CU centralized units
  • a terminal device is an entity on the user side that is used to receive signals, or send signals, or receive signals and send signals.
  • the terminal device is used to provide one or more of voice services and data connectivity services to users.
  • the terminal device may be a device that includes wireless transceiver functions and can cooperate with access network equipment to provide communication services to users.
  • the terminal equipment may refer to user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, terminal, wireless communication equipment, user agent or User device.
  • the terminal device can also be a drone, an Internet of things (IoT) device, a station (ST) in a WLAN, a cellular phone, a smart phone, a cordless phone, or a wireless data card , tablet computers, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital assistant (PDA) devices, laptop computers (laptop computers) , machine type communication (MTC) terminals, handheld devices with wireless communication capabilities, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices (also known as wearable smart devices), Virtual reality (VR) terminals, augmented reality (AR) terminals, wireless terminals in industrial control, wireless terminals in self-driving, and remote medical Wireless terminals, wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, etc.
  • IoT Internet of things
  • ST in a WLAN
  • a cellular phone a smart phone
  • smart phone a cordless phone
  • the terminal device can also be a device to device (D2D) device, such as an electric meter, a water meter, etc.
  • D2D device to device
  • the terminal device may also be a terminal in a 5G system or a terminal in a next-generation communication system, which is not limited in the embodiments of the present application.
  • access network equipment and terminal equipment may be deployed with data agent (data agent, DA) network elements.
  • data agent data agent
  • the number of data proxy network elements deployed in the access network device may be one or more, and the number of data proxy network elements deployed in the terminal device may be one or more.
  • the data proxy network element can implement one or more of the following functions: data collection, preprocessing, storage, analysis, and data protection. Different data proxy network elements can have the same or different data service capabilities and can implement the same or different functions.
  • the data proxy network element can interact with the data orchestration network element (data orchestration, DO) (not shown in Figure 1), obtain relevant operations that need to be performed to achieve service requirements, and perform the operations.
  • the number of data orchestration network elements may be one or more.
  • the data agent network element can also establish a logical network topology to form a dynamic data pipeline (also known as data flow, business logic, function chain, operation chain, etc.).
  • the data pipeline consists of one or more data agent network elements.
  • the corresponding functions are composed according to service requirements, and the output of the previous function is the input of the next function, thereby realizing responsive data services.
  • the data proxy network element can be evolved from the NWDAF network element and can realize the functions of the NWDAF network element and the scenario use cases based on the NWDAF network element.
  • the data orchestration network element can obtain the service request, translate the service request into a service requirement for data, determine the data agent network element used to realize the service requirement, orchestrate the functions of each data agent network element, and enable the data agent network element to perform corresponding operations. And establish a dynamic logical network topology to achieve corresponding service requirements.
  • the data orchestration network element can be deployed on any core network element, transfer network (TN) network element, access network equipment or other network element (such as operation, management and maintenance (operation administration and maintenance, OAM) ) network elements, etc.), or data orchestration network elements can be deployed independently.
  • data orchestration network elements can be deployed hierarchically on the core network or access network equipment side.
  • Data orchestration network elements can be deployed in network service (NS) network elements.
  • NS network service
  • data orchestration network elements can be independently deployed in the network as network functions (NF) or network elements. In actual deployment, one or more NFs can form a network element.
  • core network elements can be located on the network side of the communication system and can be used to provide network services for access network equipment, terminal equipment, etc.
  • the core network elements may include but are not limited to one or more of the following: mobility management network elements, session management network elements, user plane network elements, policy control network elements, network opening network elements, application network elements, and network data analysis functions. (network data analysis function, NWDAF) network element, and/or operation, management and maintenance (operation administration and maintenance, OAM) network element.
  • NWDAF network data analysis function
  • OAM operation administration and maintenance
  • Mobility management network element mainly used for mobility management and access management.
  • the access management network element can be an access and mobility management function (AMF) network element, which mainly performs functions such as mobility management and access authentication/authorization.
  • AMF access and mobility management function
  • the mobility management network element can also be responsible for transmitting user policies between the terminal and the policy control function (PCF) network element.
  • PCF policy control function
  • Session management network element Mainly used for session management (such as creation, deletion, etc.), maintaining session context and user plane forwarding pipeline information, Internet protocol (IP) address allocation and management of terminal equipment, and selecting manageable users Termination points of plane functions, policy control and charging function interfaces, and downlink data notifications, etc.
  • IP Internet protocol
  • the session management network element can be a session management function (SMF) network element, which completes terminal IP address allocation, UPF selection, accounting and QoS policy control, etc.
  • SMF session management function
  • User plane network element As an interface with the data network, it completes functions such as user plane data forwarding, session/flow-level accounting statistics, and bandwidth limitation. That is, packet routing and forwarding and quality of service (QoS) processing of user plane data, etc.
  • the user plane network element may be a user plane function (UPF) network element.
  • UPF user plane function
  • Policy control network element including user subscription data management function, policy control function, billing policy control function, quality of service (QoS) control, etc. It is a unified policy framework used to guide network behavior and is a control plane functional network element (such as AMF, SMF network elements, etc.) to provide policy rule information, etc.
  • the policy control network element may be the PCF.
  • Network open network element It can be used to provide frameworks, authentications and interfaces related to network capability opening, and to transfer information between 5G system network functions and other network functions.
  • the network open network element can be a network element function (NEF) network element, which is mainly used to open the services and capabilities of 3GPP network functions to AF, and also allows AF to provide 3GPP network functions. information.
  • NEF network element function
  • Application network elements can be used to provide various business services, can interact with the core network through network element function (NEF) network elements, and can interact with the policy management framework for policy management.
  • the application network element can be an application function (AF) network element or a time-sensitive network application function (TSNAF) network element, which represents the application function of a third party or operator. It is the interface for the 5G network to obtain external application data, and is mainly used to convey the needs of the application side to the network side.
  • AF application function
  • TNAF time-sensitive network application function
  • NWDAF network element can be used to collect data from the core network and OAM network elements and feed back data analysis results to NF, AF or OAM.
  • the NWDAF network element can collect OAM data from the OAM network element and collect non-OAM data from the core network NF or AF.
  • the non-OAM data can include collecting non-OAM data at the terminal, terminal group, service and other levels.
  • OAM network element can collect data from access network equipment.
  • the data orchestration network element can be a logical entity or a physical entity
  • the data proxy network element can be a logical entity or a physical entity, which is not limited in this application.
  • the data proxy network element can be deployed in a centralized manner or in a distributed manner.
  • Distributed deployment methods can include distributed hash table (DHT) methods, etc.
  • DHT distributed hash table
  • Data proxy network elements are distributed and flexibly deployed on demand, which can meet diverse and flexible data service needs and reduce the cost of data collection.
  • the terminal device can also deploy a protocol processing unit to implement standard protocols.
  • the communication system may also include other devices, such as trusted anchors (trust anchors, TAs) and service requesting network elements, which are not shown in Figure 1 .
  • trusted anchors trust anchors, TAs
  • service requesting network elements which are not shown in Figure 1 .
  • Trusted anchors can provide trusted services such as authentication, authentication, and access control (AAA), for example, through distributed ledger technology (DLT).
  • AAA authentication, authentication, and access control
  • DLT distributed ledger technology
  • Trusted anchor points can store data that cannot be tampered with, such as public keys, identifiers, indexes of terminal devices or network elements, transaction-related data, or important data that cannot be tampered with.
  • the storage capabilities of distributed ledger technology can be expanded by combining on-chain and off-chain storage, such as storing original data locally in the data broker network element or in the data storage network element.
  • off-chain store the hash value of the original data, or the hash value of the digest of the packaged original data, in the extended DLT (on-chain), and at the same time save the hash value pointing to the original data in the DLT (on-chain) address.
  • the trusted anchor may be deployed in a distributed or centralized manner.
  • Trusted anchors for distributed deployment can be nodes of distributed ledger technology DLT (such as blockchain), and trusted anchors for centralized deployment can be existing security and trustworthiness mechanisms such as authentication, authorization, and access control. Achieved through transformation and evolution.
  • DLT distributed ledger technology
  • trusted anchors for centralized deployment can be existing security and trustworthiness mechanisms such as authentication, authorization, and access control. Achieved through transformation and evolution.
  • the trusted anchor point can realize the security and privacy protection mechanism of the entire data service process through data access control such as authentication, authorization, access control, etc., combined with the data security and privacy protection technology library, and can support the entire data service process.
  • Security and privacy protection can support trusted data service requirements such as traceability, auditing, and autonomous control of user data, can support the realization of data sharing and transactions, and other requirements for trustworthy mechanisms such as traceability and auditing, and can meet the requirements of the Personal Information Protection Law (personal information protection law).
  • Information protection law, PIPL Information protection law
  • General Data Protection Regulation general data protection regulation, GDPR
  • Compliance testing for user data processing can implement a decentralized verification mechanism to avoid single-point trust and failure issues.
  • the service requesting network element may include an application, an application server or a network service NS network element, etc.
  • the application may be an operator (or communication service provider (CSP)) used for network planning, network optimization, and/or network artificial intelligence.
  • CSP communication service provider
  • Applications such as artificial intelligence (AI) can also be applications outside the mobile communication network (also called third-party applications).
  • Service requesting network elements can be independently deployed in the network as network functions or network elements.
  • each device in Figure 1 can be implemented by one device, or can be implemented by multiple devices together, or can be a functional module within one device.
  • This application implements The example does not specifically limit this. It can be understood that the above functions can be either network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (eg, cloud platform).
  • FIG. 2 is a schematic diagram of the hardware structure of a communication device applicable to embodiments of the present application.
  • the communication device 200 includes at least one processor 201, a communication line 202, a memory 203 and at least one communication interface 204.
  • the processor 201 can be a general central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more processors used to control the execution of the program of the present application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • Communication line 202 may include a path for communicating information between the above-mentioned components.
  • the communication interface 204 is any transceiver-type device (such as an antenna, etc.) used to communicate with other devices or communication networks, such as Ethernet, RAN, wireless local area networks (WLAN), etc.
  • transceiver-type device such as an antenna, etc.
  • WLAN wireless local area networks
  • the memory 203 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory (RAM)) or other type that can store information and instructions.
  • a dynamic storage device can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be used by a computer Any other medium for access, but not limited to this.
  • the memory may exist independently and be connected to the processor through the communication line 202 . Memory can also be integrated with the processor.
  • the memory provided by the embodiment of the present application may generally be non-volatile.
  • the memory 203 is used to store computer execution instructions for executing the solution of the present application, and is controlled by the processor 201 for execution.
  • the processor 201 is used to execute computer execution instructions stored in the memory 203, thereby implementing the methods provided by the following embodiments of the application.
  • the computer-executed instructions in the embodiments of the present application may also be called application codes, which are not specifically limited in the embodiments of the present application.
  • the processor 201 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 2 .
  • the communication device 200 may include multiple processors, such as the processor 201 and the processor 207 in FIG. 2 . Each of these processors may be a single-CPU processor or a multi-CPU processor.
  • a processor here may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the communication device 200 may also include an output device 205 and an input device 206.
  • Output device 205 communicates with processor 201 and can display information in a variety of ways.
  • the output device 205 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. wait.
  • Input device 206 communicates with processor 201 and may receive user input in a variety of ways.
  • the input device 206 may be a mouse, a keyboard, a touch screen device, a sensing device, or the like.
  • the above-mentioned communication device 200 may be a general-purpose device or a special-purpose device.
  • the communication device 200 may be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, or a device with a similar structure as shown in Figure 2 equipment.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of communication device 200.
  • the first node, the fourth node and the fifth node may be the access network equipment in Figure 1, and the second node and the third node may be the terminal equipment in Figure 1.
  • the first node may be called the first access network device
  • the fourth node may be called the second access network device
  • the fifth node may be called the third access network device
  • the second node may be called The first terminal device and the third node are called second terminal devices.
  • Figure 3 is a schematic flow chart of a communication method provided by an embodiment of the present application. As shown in Figure 3, the method includes but is not limited to the following steps:
  • the first access network device obtains data service requirement information.
  • step 301 may include: the first access network device receiving the data service request sent by the service requesting network element; and the first access network device determining the data service requirement information according to the data service request.
  • the first access network device receiving the data service request sent by the service requesting network element can be understood as: the first access network device receives the data service request sent by the data orchestration network element, and the data orchestration network element receives the data service request sent by the service requesting network element.
  • Data service request can be understood as: the first access network device receives the data service request sent by the data orchestration network element, and the data orchestration network element receives the data service request sent by the service requesting network element.
  • data service requests can be used to request application services or business services.
  • Application services may refer to services requested by applications or application servers, and business services may refer to services requested by network service network elements.
  • business services may refer to services requested by network service network elements.
  • the services requested by data service requests may be different.
  • the data service request can be used to request at least one of the following services: network data-related services, user data-related services, artificial intelligence model data-related services, and Internet of Things data-related services.
  • Network data may include at least one of the following: logs (such as debugging logs, security logs, call history record (CHR) logs, etc.), alarms, traffic statistics, configuration data, minimization of drive-tests , MDT) data, user session information, integrated sensing and communication (ISAC) data, digital twin network data, network metadata, network status, and network behavior.
  • logs such as debugging logs, security logs, call history record (CHR) logs, etc.
  • alarms traffic statistics, configuration data, minimization of drive-tests , MDT data, user session information, integrated sensing and communication (ISAC) data, digital twin network data, network metadata, network status, and network behavior.
  • User data may include user subscription information. For example, user portrait (profile), etc.
  • the Internet of Things data may include but is not limited to one or more of the following: environmental data, sensor data, and measurement data of the first terminal device (the first terminal device is an Internet of Things device).
  • Artificial Intelligence (AI) model data can include at least one of the following: training data sets for data service tasks, test data sets for data service tasks, local/global model data, and artificial intelligence metadata.
  • the data service task may be, for example, an artificial intelligence model training task or a subtask of the artificial intelligence model training task.
  • the artificial intelligence model training task is the task of training the artificial intelligence model through the training data set.
  • After training the artificial intelligence model it is also necessary to use the test data set to verify the effect of the artificial intelligence model.
  • this data service task is an artificial intelligence model training task, which means that the artificial intelligence model can be trained through the training data set as a data service task, or the test data set can be used to verify the effect of the artificial intelligence model as a Data service tasks.
  • This data service task is a subtask of the artificial intelligence model training task, which means that the artificial intelligence model can be trained through the training data set, and the test data set can be used to verify the effect of the artificial intelligence model as a data service task, and through the training data Training the artificial intelligence model and using the test data set to verify the effect of the artificial intelligence model are regarded as a sub-task.
  • the data service request is used to request services related to network data. If the network data is minimized drive test data, the data service task can collect the minimized drive test data for the first terminal device and report it to the first access network equipment.
  • the data service request is used to request artificial intelligence model data-related services.
  • the data service request is used to request training of a federated learning model, and the federated learning model is used for service quality prediction.
  • the data service task may be that the first access network device sends global model data to the first terminal device, and the first terminal device trains a local federated learning model after receiving the global model data.
  • the data service requirement information is such as It can include at least one of the following: the type of data to be collected, the amount of data collected each time, the total amount of data, the frequency of collecting data, data preprocessing of the collected data, data analysis, etc.
  • the data type may be, for example, one or more of network data, user data, artificial intelligence model data, Internet of Things data, and the like.
  • Perform data preprocessing on the collected data such as performing the following processing on the collected data: field extraction, format conversion, redundant data removal, compression, fusion, etc.
  • Data analysis can, for example, perform AI training or AI inference on preprocessed data (for example, data after data preprocessing with redundant data removed), or can also be used to conduct network behavior analysis using collected data.
  • the first access network device may also register with the data orchestration network element.
  • the method may also include step 302.
  • the first access network device selects the first terminal device for performing the data service task according to the data service requirement information.
  • first terminal devices may be one or more, and is not limited here.
  • the method further includes: the first access network device receiving capability information sent by one or more second terminal devices; the capability information is used to indicate that the one or more second terminal devices support at least one of the following: data Collection capabilities, data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities; the first access network device selects the first terminal device for performing data service tasks based on the data service demand information, including : The first access network device selects the first terminal device for performing the data service task from one or more second terminal devices according to the data service requirement information and the capability information. This enables the selected first terminal device to meet the data service requirement information in terms of capabilities.
  • the capability information can be carried, for example, in the UE capability information (UE capability information) message or in the data service capability information (DS capability information) message.
  • the UE capability information message and the data service capability information message can be Radio resource control (RRC) message. It should be understood that the data service capability information message is newly added signaling in this application.
  • RRC Radio resource control
  • the data collection capability may include, for example, the type of data collected.
  • data preprocessing capabilities can include data field extraction, format conversion, redundant data removal, compression, fusion, etc.
  • the data here may be, for example, data obtained by the first terminal device from the first access network device, or may be data generated by the first terminal device.
  • the first terminal device may use the data proxy network element to perform data preprocessing.
  • the data proxy network element of the first terminal device provides an interface for the application software (APP) on the first terminal device to write data and then report it to the first access network device, so that the first access network device can use the data proxy.
  • APP application software
  • the data storage capability may include at least one of the following: storable data capacity, encryption algorithm for storing data, and storage method.
  • the data reporting capability may include, for example, at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
  • the data analysis capability may include, for example, at least one of the following: supported analysis tasks, whether to support AI training, and whether to support AI inference.
  • the data protection capability may be, for example, a data protection algorithm, such as one or more of k-anonymity, l-diversity, differential privacy, homomorphic encryption, secure multi-party computation, etc. .
  • the data compression capability may be, for example, one or more of data compression algorithms, such as Huffman coding (Huffman Coding), arithmetic coding, etc.
  • Huffman coding Huffman Coding
  • arithmetic coding etc.
  • the first access network device selects the first terminal device for performing the data service task from one or more second terminal devices according to the data service requirement information and the capability information, which may include: in the service requesting network element
  • the first access network device selects the first terminal device for performing the data service task from one or more second terminal devices based on the data service requirement information and the capability information. .
  • This can achieve end-to-end (E2E) trusted service requirements for data.
  • the data corresponding to the data service task may be, for example, one or more of network data, user data, artificial intelligence model data, Internet of Things data, and the like.
  • the data service task collects minimized drive test data for the first terminal device and reports it to the first access network device
  • the data corresponding to the data service task may be minimized drive test data.
  • the data service task can be that the first access network device sends global model data to the first terminal device, and the first terminal device trains a local federated learning model after receiving the global model data
  • the data corresponding to the data service task Can be global model data.
  • the data service request may also include the identity of the service requesting network element.
  • the first access network device determines the request based on the data service requirement information and the capability information.
  • the method may further include: the first access network device sends an authorization request (authorization request) message to the trusted anchor point , the authorization request message includes the identity of the service requesting network element, and the authorization request message is used to request verification whether the service requesting network element has access rights to the data corresponding to the data service task; the first access network device receives the authorization sent by the trusted anchor point Response (authorization response) message.
  • the authorization response message is used to indicate that the service requesting network element has access rights to the data corresponding to the data service task.
  • the method further includes: the first access network device sending a system message to one or more second terminal devices; the system message is used to indicate that the first access network device supports data service capabilities.
  • the system message may be, for example, system information block 1 (SIB1).
  • SIB1 system information block 1
  • a new field in SIB1 is used to indicate that the first access network device supports data service capabilities.
  • data service capabilities may include at least one of the following: supporting the type of logical link established with the terminal device, data collection capabilities, data preprocessing capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities.
  • the type of logical link that is supported to be established with the terminal device may include, for example, one or more of a bidirectional logical link, a unidirectional downlink, a unidirectional uplink, and the like. It should be understood that the specific content included in the data service capabilities is not visible to the terminal device, and the terminal device does not care.
  • a logical link can be called a logical path, and can be understood as an air interface data plane bearer.
  • the bidirectional logical link can be called a dedicated data plane bearer.
  • the access network device can deliver data to the terminal device through the bidirectional logical link, and the terminal device can also report data to the access network device through the bidirectional logical link.
  • the unidirectional downlink can be called a multicast data plane bearer.
  • the access network device can deliver multicast data to one or more terminal devices through the unidirectional downlink, so that one or more terminal devices can The same multicast data is received.
  • the unidirectional uplink can be called an aggregate data plane bearer.
  • one or more terminal devices can report data to the access network device through the unidirectional uplink.
  • FIG. 4 is a schematic diagram of a logical link established by an access network device and a terminal device according to an embodiment of the present application.
  • the type of logical link established between the access network device and any terminal device is a bidirectional logical link.
  • the type of logical link established by the access network device and multiple terminal devices is a unidirectional downlink logical link.
  • the type of logical link established between the access network device and any terminal device is a unidirectional uplink logical link.
  • the method may also include step 303.
  • the first access network device sends a first message to the first terminal device based on the data service requirement information; the first message includes first configuration information, and the first configuration information includes the type of the first logical link, the first logical link
  • the type is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink.
  • the first logical link is a logical link between the first node and the second node. The first logical link is used to transmit data services. Data corresponding to the task.
  • the first terminal device receives the first message sent by the first access network device.
  • the first message may be, for example, a data service radio resource control reconfiguration (DS RRC reconfiguration) message, which can satisfy backward compatibility.
  • DS RRC reconfiguration data service radio resource control reconfiguration
  • the first message may be:
  • linkmode can represent the type of logical link.
  • the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, and a data protection algorithm used by the first access network device. , the data compression algorithm used by the first access network device, the interval between data transmission by the first access network device, the amount of data transmitted by the first access network device in a single time, the tasks that the first terminal device needs to perform, the first terminal.
  • the minimum data transmission amount of a single transmission by the first terminal device issuing this information, the first terminal device can learn that the first access network device has performed data security protection, data privacy protection, etc., and also the first terminal device can learn the methods used for data security protection, data privacy protection, etc. related algorithms.
  • the data protection algorithm used by the first access network device and the data protection algorithm used by the first terminal device may be the same or different, and the data compression algorithm used by the first access network device and the data compression algorithm used by the first terminal device may be Same or different.
  • the local data of the first terminal device reaches the minimum data transmission amount of a single transmission of the first terminal device, data transmission can be started. That is to say, the minimum data transmission amount of a single transmission of the first terminal device can be understood as starting data transmission. threshold.
  • the first access network device may, for example, use the data compression algorithm according to the first access network device. Compress the data generated by the first access network device, and then perform privacy protection on the compressed data according to the data protection algorithm used by the first access network device to obtain data corresponding to the data service task.
  • the first terminal device After the first terminal device obtains the data corresponding to the data service task, for example, it can first perform privacy protection verification, decompress the data after the privacy protection verification, and then decompress the decompressed data (the decompressed data is the first Data generated by an access network device) are processed, such as field extraction, format conversion, redundant data removal, compression, fusion, etc. of the decompressed data.
  • the first terminal device may, for example, compress the first terminal device according to the data compression algorithm used by the first terminal device.
  • the generated data is compressed, and then privacy protection is performed on the compressed data according to the data protection algorithm used by the first terminal device to obtain data corresponding to the data service task.
  • the first access network device obtains the data corresponding to the data service task, for example, it can first perform privacy protection verification, decompress the data after the privacy protection verification, and then decompress the decompressed data (decompressed data (data generated by the first terminal device), such as field extraction, format conversion, redundant data removal, compression, fusion, etc. of the decompressed data.
  • the first configuration information is used to indicate at least one of the following: tasks that the first terminal device needs to perform, and data protection used by the first access network device. algorithm, the data compression algorithm used by the first access network device, the interval for data transmission by the first access network device, and the amount of data transmitted by the first access network device in a single time. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by delivering this information, the first terminal device can learn that the first access network device has implemented data security protection, data privacy protection, etc.
  • the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, a data protection algorithm used by the first terminal device, The data compression algorithm used by the first terminal device, the interval of data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, the maximum data transmission amount of data transmission by the first terminal device, the data transmission amount of the first terminal device in a single time Minimum amount of data transferred. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by issuing this information, the first terminal device learns the relevant algorithms used for data security protection, data privacy protection, etc.
  • the task that the first terminal device needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
  • the type of the first logical link is a bidirectional logical link.
  • the first configuration information includes an identifier of the data service task and a data pipeline (data pipeline, DP) identifier (ID).
  • the data channel identifier is used to indicate the data service task. subtasks. It should be understood that when there are multiple first terminal devices, the tasks that different terminal devices among the multiple first terminal devices need to perform may be the same or different, that is, the first access network device delivers the tasks to the multiple first terminal devices.
  • the data channel identifiers of different terminal devices can be the same or different.
  • the type of the first logical link is a unidirectional downlink
  • the first configuration information includes an identifier of the data service task and a multicast identifier
  • the multicast identifier is used to indicate a sub-task of the data service task.
  • the type of the first logical link is a unidirectional uplink
  • the first configuration information includes an identifier of the data service task and a convergence identifier
  • the convergence identifier is used to indicate a sub-task of the data service task.
  • the method may also include step 304.
  • the first terminal device establishes the first logical link according to the type of the first logical link.
  • the first terminal device may also send a response message to the first message to the first access network device, where the response message to the first message is used to indicate that the first terminal device has successfully established the first logical link.
  • the response message of the first message may be, for example, a data service radio resource control reconfiguration complete (DS RRC reconfiguration complete) message.
  • DS RRC reconfiguration complete data service radio resource control reconfiguration complete
  • the first access network device can send configuration information including the type of logical link to the first terminal device performing the data service task according to the data service requirement information, so that the first terminal device establishes the configuration information according to the type of the logical link.
  • Logical links can meet data service requirements, and logical links are used to transmit data corresponding to data service tasks. This provides a transmission method for data corresponding to data service tasks that meets data service requirements. At the same time, because the logical link is used to transmit data corresponding to the data service task, it can reduce interference to the transmission of existing business data.
  • the method further includes: the first access network device sends multicast data, and the multicast data is associated with multiple A first logical link corresponding to different terminal devices among the first terminal devices, and the multicast data is data corresponding to the data service task. It can be seen that because the multicast data sent by the first access network device can be associated with the first logical links corresponding to different terminal devices among the multiple first terminal devices, the first access network device will not send the multicast data to different nodes respectively. The same data saves downlink air interface resources, improves resource utilization, and allows different terminal devices to receive the same multicast data.
  • step 304 cell switching and call drop do not occur.
  • Example 1 For details, please refer to Example 1.
  • Example 2 for details.
  • call reestablishment needs to be initiated.
  • the method further includes: if the data corresponding to the data service task is transmitted on the first logical link, the first access network device sends a second message to the first terminal device.
  • the first terminal device receives the second message sent by the first access network device.
  • the second message is used to instruct the first terminal device to delete the first logical link. It can be seen that when the data corresponding to the data service task is transmitted on the first logical link, the first terminal device can be notified to delete the first logical link, which reduces the time consumed by the first terminal device when maintaining the first logical link. power, saving energy consumption.
  • the end of transmission of the data corresponding to the data service task on the first logical link can be understood as at least one of the following: from the first access network The data corresponding to the data service task of the device is transmitted on the first logical link, and the data corresponding to the data service task from the first terminal device is transmitted on the first logical link.
  • the type of the first logical link is a unidirectional downlink logical link
  • the end of transmission of the data corresponding to the data service task on the first logical link can be understood as: the corresponding data service task from the first access network device The data transmission ends on the first logical link.
  • the end of transmission of data corresponding to the data service task on the first logical link can be understood as: data corresponding to the data service task from the first terminal device The transmission ends on the first logical link.
  • the second message may also be used to instruct the first terminal device to delete the first configuration information.
  • the second message may be, for example, a data service radio resource control reconfiguration message. It should be understood that after the first terminal device deletes the first logical link, the first terminal device may also send a response message of the second message to the first access network device, and accordingly, the first access network device may receive the second message. A response message to the second message sent by a terminal device. The response message of the second message is used to indicate that the first terminal device has successfully deleted the first logical link.
  • the response message to the second message may be, for example, a data service radio resource control reconfiguration complete message.
  • the method further includes: if the first access network device determines that the cell after the first terminal device performs cell switching is the first cell of the first access network device, the first access network device The first terminal device sends a third message, and the third message is also used to instruct the first terminal device to retain the first configuration information. It can be seen that when the cell after the first terminal device performs cell switching is the first cell of the first access network device, the first terminal device can be notified to retain the first configuration information, so that the first access network device does not need to report to the first cell again.
  • the first access network device sends first configuration information. That is to say, when the first terminal device is in the same base station before and after switching, the data service context information (such as the first configuration information) does not need to be transmitted, thus ensuring the continuity of data services.
  • the third message may be, for example, a handover command.
  • a new information element in the handover command is used to instruct the first terminal device to retain the first configuration information.
  • the first terminal device can establish the first logical link under the first cell according to the type of the first logical link in the first configuration information.
  • the first terminal device can also transmit remaining data corresponding to the data service task with the first access network device through the first logical link. This ensures the continuity of data services.
  • the first terminal device may initiate random access.
  • a message indicating successful cell handover may be sent to the first access network device.
  • the message may be, for example, a radio resource control reconfiguration complete (RRC reconfiguration complete) message.
  • RRC reconfiguration complete radio resource control reconfiguration complete
  • the method further includes: if the first access network device determines that the cell after the first terminal device performs cell switching is the cell of the second access network device, the first access network device sends a message to the second access network device.
  • a terminal device sends a fourth message, and correspondingly, the first terminal device receives the fourth message sent by the first access network device.
  • the fourth message is used to instruct the first terminal device to delete the first logical link. It can be seen that when the first access network device determines that the cell after the first terminal device performs cell switching is not the cell of the first access network device, the first access network device may notify the first terminal device to delete the first logical link. path, which reduces the power consumed by the first terminal device when maintaining the first logical link and saves energy consumption.
  • the data service of the first terminal device is terminated, that is, the first terminal device is notified to delete the first terminal device. logical link.
  • the fourth message may also be used to instruct the first terminal device to delete the first configuration information, and the fourth message may be, for example, a handover command.
  • the first access network device is the access network device before the first terminal device performs cell switching, which may be called the source access network device
  • the second access network device is the access network device after the first terminal device performs cell switching.
  • Access network equipment can be called target access network equipment.
  • the first terminal device may initiate random access.
  • a message indicating successful cell handover may be sent to the second access network device.
  • the message may be, for example, a radio resource control reconfiguration complete (RRC reconfiguration complete) message.
  • RRC reconfiguration complete radio resource control reconfiguration complete
  • the method further includes: if the third cell currently used to perform the data service task The number of a terminal device is less than the first number, and the first access network device reselects a terminal device for performing the data service task based on the data service requirement information.
  • the first number is determined by the first access network device based on the data service requirement information. quantity. It can be seen that when the number of first terminal devices currently used to perform data service tasks is less than the first number, the first access network device can reselect a new terminal device to perform the data service tasks, ensuring the execution of the data service tasks.
  • the number of terminal devices always meets the number determined based on the data service demand information.
  • the method further includes: if the first access network device determines that the cell selected by the first terminal device after call reestablishment is the second cell of the first access network device, the first access network device Resend the first message to the first terminal device. It can be seen that when the first access network device determines that the cell selected by the first terminal device after call reestablishment is the second cell of the first access network device, the first access network device re-sends the second cell to the first terminal device. This message allows the first terminal device to establish the first logical link under the new cell, and then transmit the data corresponding to the data service task on the first logical link under the new cell, thus ensuring the continuity of the data service.
  • the first terminal device can establish the first logical link in the second cell according to the type of the first logical link in the first message.
  • the logical link may also transmit remaining data corresponding to the data service task with the first access network device through the first logical link. This ensures the continuity of data services.
  • the first terminal device can establish the first logical link in the second cell according to the type of the first logical link in the first message, and then the first terminal device can also re-send the message to the first access network device. The response message to the first message.
  • the first terminal device may also complete a connection reestablishment process with the first access network device.
  • the first terminal device sends a radio resource control reestablishment request (RRC reestablishment request) message to the first access network device, and the radio resource control reestablishment request message is used to request access to the second cell.
  • RRC reestablishment response radio resource control reestablishment response
  • the radio resource control reestablishment response message is used to indicate that the first terminal device is allowed to access. Enter the second community.
  • the first terminal device may also send a radio resource control reestablishment complete (RRC reestablishment complete) message to the first access network device, and the radio resource control reestablishment complete message is used to indicate the third A terminal device successfully accesses the second cell.
  • RRC reestablishment complete radio resource control reestablishment complete
  • the first terminal device can delete the first logical link, the first configuration information, and so on.
  • the method further includes: if the first access network device determines that the cell selected by the first terminal device after call reestablishment is a cell of the third access network device and is currently used to perform data services
  • the number of first terminal devices for the task is less than the second number.
  • the first access network device reselects the terminal device for performing the data service task according to the data service requirement information.
  • the first number is the first terminal device for performing the data service task according to the data service requirement.
  • Information determines the quantity. It can be seen that, after the first access network device determines that the cell selected after the first terminal device performs call reestablishment is not the cell of the first access network device, and the number of first terminal devices currently used to perform data service tasks is less than the first terminal device.
  • the first access network device can reselect a new terminal device to perform the data service task, ensuring that the number of nodes performing the data service task always meets the number determined based on the data service requirement information.
  • the first terminal device when the cell that the first terminal device accesses after performing call reestablishment is the cell of the third access network device, the first terminal device does not establish a logical link with the third access network device, that is to say , after the first terminal device accesses the cell of the new base station, it does not establish a logical link under the cell of the new base station.
  • the third access network device will not send the first message.
  • the first terminal device may also complete a connection reestablishment process with the third access network device, and the specific process will not be described again.
  • the first access network device is the access network device before the first terminal device performs call reestablishment, which may be called the source access network device, and the third access network device is the first terminal device after the call reestablishment is performed.
  • Access network equipment can be called target access network equipment.
  • the above-mentioned implementation devices include corresponding hardware structures and/or software modules for executing each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving the hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each specific application, but such implementations should not be considered beyond the scope of this application.
  • Embodiments of the present application can divide access network equipment or terminal equipment into functional modules according to the above method examples.
  • each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical function division. In actual implementation, there may be other division methods.
  • FIG. 5 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the communication device 500 can be applied to the method shown in FIG. 3 .
  • the communication device 500 includes: a processing module 501 and a transceiver module 502 .
  • the processing module 501 may be one or more processors, and the transceiver module 502 may be a transceiver or a communication interface.
  • the communication device can be used to implement functions involving terminal equipment or access network equipment in any of the above method embodiments, or to implement functions involving network elements in any of the above method embodiments.
  • the network element or network function can be a network element in a hardware device, a software function running on dedicated hardware, or a virtualized function instantiated on a platform (eg, cloud platform).
  • the communication device 500 may also include a storage module 503 for storing program codes and data of the communication device 500 .
  • the communication device serves as the first access network device or is a chip applied in the first access network device, and performs the steps performed by the first access network device in the above method embodiment.
  • the transceiver module 502 is used to support communication with a terminal device (such as a first terminal device, a second terminal device, etc.).
  • the transceiver module specifically performs the sending and/or receiving performed by the first access network device in Figure 3. Actions, such as supporting the first access network device to perform other processes of the technology described herein.
  • the processing module 501 may be used to support the communication device 500 to perform the processing actions in the above method embodiments, for example, to support the first access network device to perform one or more steps such as step 301, step 302, and/or the technology described herein. other processes.
  • the transceiver module 502 is used to obtain data service requirement information; the processing module 501 is used to select the first terminal device for performing the data service task according to the data service requirement information; the transceiver module 502 is also used to The service requirement information sends a first message to the first terminal device; the first message includes first configuration information, the first configuration information includes the type of the first logical link, and the type of the first logical link is a bidirectional logical link or a unidirectional link. Downlink or unidirectional uplink, the first logical link is a logical link between the first access network device and the first terminal device, and the first logical link is used to transmit data corresponding to the data service task.
  • the transceiver module 502 is also used to receive capability information sent by one or more second terminal devices; the capability information is used to indicate that one or more second terminal devices support at least one of the following: data collection capability, data preset processing capability, data reporting capability, data analysis capability, data protection capability, data compression capability; when selecting the first terminal device for performing data service tasks according to the data service requirement information, the processing module 501 is used for the first access The network device selects a first terminal device from one or more second terminal devices according to the data service requirement information and capability information.
  • the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
  • the transceiver module 502 is also configured to send a system message to one or more second terminal devices; wherein the system message is used to indicate that the first access network device supports data service capabilities.
  • the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, and a data protection algorithm used by the first access network device.
  • the data compression algorithm used by the first access network device the interval between data transmission by the first access network device, the amount of data transmitted by the first access network device in a single time, the tasks that the first terminal device needs to perform, the first terminal
  • the first configuration information is used to indicate at least one of the following: tasks that the first terminal device needs to perform, and data protection used by the first access network device. algorithm, the data compression algorithm used by the first access network device, the interval for data transmission by the first access network device, and the amount of data transmitted by the first access network device in a single time.
  • the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, a data protection algorithm used by the first terminal device, The data compression algorithm used by the first terminal device, the interval of data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, the maximum data transmission amount of data transmission by the first terminal device, the data transmission amount of the first terminal device in a single time Minimum amount of data transferred.
  • the task that the first terminal device needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
  • the transceiver module 502 is also used to send multicast data, and the multicast data is associated with multiple first terminals.
  • the first logical link corresponding to different nodes in the device, and the multicast data is the data corresponding to the data service task.
  • the transceiver module 502 is also configured to: if the data corresponding to the data service task is transmitted on the first logical link, the first access network device sends a second message to the first terminal device, and the second message is used to Instruct the first terminal device to delete the first logical link.
  • the transceiver module 502 is also configured to: if the first access network device determines that the cell after the first terminal device performs cell switching is the first cell of the first access network device, the first access network device sends a message to the first cell of the first access network device. A terminal device sends a third message, and the third message is also used to instruct the first terminal device to retain the first configuration information.
  • the transceiver module 502 is also configured to: if the first access network device determines that the cell after the first terminal device performs cell switching is the cell of the second access network device, the first access network device sends a message to the first terminal device. The device sends a fourth message, and the fourth message is used to instruct the first terminal device to delete the first logical link.
  • the processing module 501 is also configured to: if the number of first terminal devices currently used to perform data service tasks is less than the first number, the first access network device reselects the first terminal device for performing data services according to the data service requirement information.
  • the first number of task nodes is the number determined by the first access network device based on the data service requirement information.
  • the transceiver module 502 is also configured to: if the first access network device determines that the cell selected by the first terminal device after call reestablishment is the second cell of the first access network device, the first access network device re- Send the first message to the first terminal device.
  • the processing module 501 is also configured to: if the first access network device determines that the cell selected by the first terminal device after call reestablishment is the cell of the third access network device, and the cell currently used to perform data service tasks The number of first terminal devices is less than the second number.
  • the first access network device reselects nodes for performing data service tasks based on the data service requirement information. The first number is determined by the first access network device based on the data service requirement information. quantity.
  • the communication device serves as a first terminal device or is a chip applied in the first terminal device, and performs the steps performed by the first terminal device in the above method embodiment.
  • the transceiver module 502 is used to support communication with access network equipment (such as a first access network device, a second access network device, a third access device, etc.), etc.
  • the transceiver module specifically executes the first step in Figure 3.
  • the sending and/or receiving actions performed by the terminal device for example, support the first terminal device to perform other processes of the technology described herein.
  • the processing module 501 may be used to support the communication device 500 to perform the processing actions in the above method embodiments, for example, to support the first terminal device to perform step 304, and/or other processes of the technology described herein.
  • the transceiver module 502 is configured to receive a first message from the first access network device; the first message includes first configuration information, the first configuration information includes the type of the first logical link, and the type of the first logical link is bidirectional logic. link, a unidirectional downlink or a unidirectional uplink, the first logical link is a logical link between the first access network device and the first terminal device, and the first logical link is used to transmit data service tasks
  • the corresponding data processing module 501 is used to establish the first logical link according to the type of the first logical link.
  • the transceiving module 502 is also used to send the capability information of the first terminal device to the first access network device; the capability information of the first terminal device is used to indicate that the first terminal device supports at least one of the following: data collection. capabilities, data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities.
  • the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
  • the transceiving module 502 is also configured to receive a system message sent by the first access network device; wherein the system message is used to indicate that the first access network device supports data service capabilities.
  • the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, a data protection algorithm used by the first access network device, The data compression algorithm used by the first access network device, the interval between data transmission by the first access network device, the amount of data transmitted by the first access network device in a single time, the tasks that the first terminal device needs to perform, and the use of the first terminal device
  • the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, a data protection algorithm used by the first access network device, The data compression algorithm used by the first access network device, the interval for data transmission by the first access network device, and the amount of data transmitted by the first access network device in a single time.
  • the first configuration information is used to indicate at least one of the following: the task that the first terminal device needs to perform, the data protection algorithm used by the first terminal device, the first The data compression algorithm used by the terminal device, the interval between data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, the maximum data transmission amount by the first terminal device in data transmission, the number of data transmitted by the first terminal device in a single time Minimum data transfer amount.
  • the task that the first terminal device needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
  • the transceiving module 502 is also configured to receive a second message sent by the first access network device, where the second message is used to instruct the first terminal device to delete the first logical link.
  • the cell after the first terminal device performs cell switching is the first cell of the first access network device.
  • the transceiver module 502 is also used to receive the third message sent by the first access network device. The third message is Instructing the first terminal device to retain the first configuration information; the processing module 501 is also used to establish the first logical link under the first cell according to the type of the first logical link in the first configuration information; the transceiving module 502 is also configured to Used to transmit remaining data corresponding to the data service task with the first access network device through the first logical link.
  • the cell after the first terminal device performs cell switching is the cell of the second access network device.
  • the transceiver module 502 is also configured to receive a fourth message sent by the first access network device. The fourth message is used to indicate The first terminal device deletes the first logical link.
  • the processing module 501 is also configured not to establish a logical link with the second access network device.
  • the cell selected by the first terminal device after call reestablishment is the second cell of the first access network device.
  • the transceiver module 502 is also configured to re-receive the first message sent by the first access network device; the processing module 501 is also used to establish the first logical link in the second cell according to the type of the first logical link in the first message; the transceiver module 502 is also used to communicate with the first access network device through the first logical link. Transfer the remaining data corresponding to the data service task.
  • the cell selected by the first terminal device after call reestablishment is the cell of the third access network device.
  • the processing module 501 is also configured not to establish a logical link with the third access network device.
  • the transceiver module 502 may be a communication interface, a pin or a circuit, etc.
  • the communication interface can be used to input data to be processed to the processor, and can output the processing results of the processor to the outside.
  • the communication interface can be a general purpose input output (GPIO) interface, which can communicate with multiple peripheral devices (such as display (LCD), camera (camara), radio frequency (RF) module, antenna, etc. etc.) connection.
  • the communication interface is connected to the processor through a bus.
  • the processing module 501 may be a processor, and the processor may execute computer execution instructions stored in the storage module, so that the chip executes the method involved in the embodiment of FIG. 3 .
  • the processor may include a controller, arithmetic unit, and a register.
  • the controller is mainly responsible for decoding instructions and sending control signals for operations corresponding to the instructions.
  • the arithmetic unit is mainly responsible for performing fixed-point or floating-point arithmetic operations, shift operations, and logical operations. It can also perform address operations and conversions.
  • Registers are mainly responsible for storing register operands and intermediate operation results temporarily stored during instruction execution.
  • the hardware architecture of the processor can be application specific integrated circuits (ASIC) architecture, microprocessor without interlocked piped stages architecture (MIPS) architecture, advanced reduced instructions Set machine (advanced RISC machines, ARM) architecture or network processor (network processor, NP) architecture, etc.
  • the processor can be single-core or multi-core.
  • the storage module can be a storage module within the chip, such as a register, cache, etc.
  • the storage module can also be a storage module located outside the chip, such as Read Only Memory (ROM) or other types of static storage devices that can store static information and instructions, Random Access Memory (Random Access Memory, RAM), etc. .
  • ROM Read Only Memory
  • RAM Random Access Memory
  • processors and the interface can be realized through hardware design, software design, or a combination of software and hardware. There are no restrictions here.
  • Figure 6 is a schematic structural diagram of a simplified terminal device provided by an embodiment of the present application.
  • the terminal device takes a mobile phone as an example.
  • the terminal device includes at least one processor, and may also include a radio frequency circuit, an antenna, and an input and output device.
  • the processor can be used to process communication protocols and communication data, and can also be used to control terminal devices, execute software programs, process data of software programs, etc.
  • the terminal device may also include a memory, which is mainly used to store software programs and data. These related programs can be loaded into the memory when the communication device leaves the factory, or can be loaded into the memory when needed later.
  • Radio frequency circuits are mainly used for conversion of baseband signals and radio frequency signals and processing of radio frequency signals.
  • the antenna is mainly used to transmit and receive radio frequency signals in the form of electromagnetic waves, and the antenna is the antenna provided in the embodiment of the present application.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal equipment may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and then sends the radio frequency signal out in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor.
  • the processor converts the baseband signal into data and processes the data.
  • FIG. 6 only one memory and processor are shown in FIG. 6 . In an actual terminal device product, there may be one or more processors and one or more memories. Memory can also be called storage media or storage devices.
  • the memory may be provided independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the antenna and the radio frequency circuit with the transceiver function can be regarded as the receiving unit and the transmitting unit of the terminal device (which can also be collectively referred to as the transceiver unit), and the processor with the processing function can be regarded as the processing unit of the terminal device.
  • the terminal device includes a receiving module 31 , a processing module 32 and a sending module 33 .
  • the receiving module 31 may also be called a receiver, a receiver, a receiving circuit, etc.
  • the sending module 33 may also be called a transmitter, a transmitter, a transmitter, a transmitting circuit, etc.
  • the processing module 32 may also be called a processor, a processing board, a processing device, etc.
  • the processing module 32 is used to perform the functions of the terminal device in the embodiment shown in FIG. 3 .
  • FIG. 7 is a schematic structural diagram of a simplified access network device provided by an embodiment of the present application.
  • the access network equipment includes a radio frequency signal transceiver and conversion part and a baseband part 42.
  • the radio frequency signal transceiver and conversion part further includes a receiving module 41 part and a transmitting module 43 part (which may also be collectively referred to as a transceiver module).
  • the radio frequency signal transceiving and conversion part is mainly used for transmitting and receiving radio frequency signals and converting radio frequency signals and baseband signals; the baseband part 42 is mainly used for baseband processing, controlling access network equipment, etc.
  • the receiving module 41 may also be called a receiver, a receiver, a receiving circuit, etc.
  • the sending module 43 may also be called a transmitter, a transmitter, a transmitter, a transmitting circuit, etc.
  • the baseband part 42 is usually the control center of the access network equipment, which can also be called a processing module, and is used to perform the steps performed by the access network equipment in FIG. 3 above. For details, please refer to the descriptions in the relevant sections above.
  • the baseband part 42 may include one or more single boards. Each single board may include one or more processors and one or more memories. The processor is used to read and execute programs in the memory to implement baseband processing functions and docking. Control of network access equipment. If there are multiple boards, each board can be interconnected to increase processing capabilities. As an optional implementation, multiple single boards may share one or more processors, or multiple single boards may share one or more memories, or multiple single boards may share one or more processors at the same time. device.
  • the sending module 43 is used to perform the functions of the access network device in the embodiment shown in FIG. 3 .
  • An embodiment of the present application also provides a communication device, including a processor.
  • the processor calls a computer program stored in a memory to implement any one of the methods in Figure 3 .
  • Embodiments of the present application also provide a communication device, including a logic circuit and an input and output interface.
  • the logic circuit is used to read and execute stored instructions.
  • the communication device executes any one of the instructions in Figure 3. method described.
  • Embodiments of the present application also provide a computer-readable storage medium.
  • a computer program is stored in the computer-readable storage medium. When the computer program is run, the method described in any one of Figure 3 is implemented.
  • An embodiment of the present application also provides a computer program product containing instructions that, when executed on a computer, causes the method described in any one of Figure 3 to be executed.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted over a computer-readable storage medium.
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media. Available media may be magnetic media (eg, floppy disk, hard disk, tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD)), etc.
  • Modules in the device embodiments of the present application can be merged, divided, and deleted according to actual needs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of the present application provide a communication method and apparatus. According to acquired data service requirement information, a first node may select a second node for executing a data service task, and send to the second node configuration information comprising a type of a logical link, such that a logical link established by the second node according to the type of the logical link can satisfy a data service requirement. In addition, the logical link is used for transmitting data corresponding to the data service task, thus providing, for the data corresponding to the data service task, a transmission mode satisfying the data service requirement.

Description

一种通信方法及装置A communication method and device 技术领域Technical field
本申请涉及通信技术领域,尤其涉及一种通信方法及装置。The present application relates to the field of communication technology, and in particular, to a communication method and device.
背景技术Background technique
数据服务(data service,DS)可以指对数据进行采集、预处理、以及分析等操作后将数据作为一种服务产品提供。随着通信网络规模、新技术等的发展,通信网络中的数据越来越多,对数据服务的需求也越来越多。Data service (DS) can refer to providing data as a service product after collecting, preprocessing, and analyzing data. With the development of communication network scale, new technologies, etc., there is more and more data in the communication network, and the demand for data services is also increasing.
为此,可以对通信网络中的数据进行处理,以实现数据服务。但是,目前的数据传输方式无法满足数据服务需求。To this end, data in the communication network can be processed to implement data services. However, current data transmission methods cannot meet data service needs.
发明内容Contents of the invention
本申请提供了一种通信方法及装置,为数据服务任务对应的数据提供了满足数据服务需求的传输方式。This application provides a communication method and device, which provides a transmission method for data corresponding to data service tasks that meets data service requirements.
第一方面,提供一种通信方法,包括:第一节点获取数据服务需求信息;第一节点根据数据服务需求信息,选取用于执行数据服务任务的第二节点;第一节点基于数据服务需求信息向第二节点发送第一消息;第一消息包括第一配置信息,第一配置信息包括第一逻辑链路的类型,第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,第一逻辑链路为第一节点与第二节点之间的逻辑链路,第一逻辑链路用于传输数据服务任务对应的数据。可以看出,第一节点可以根据数据服务需求信息向执行数据服务任务的第二节点发送包括逻辑链路的类型的配置信息,使得第二节点根据逻辑链路的类型建立的逻辑链路可以满足数据服务需求,而逻辑链路用于传输数据服务任务对应的数据,这为数据服务任务对应的数据提供了满足数据服务需求的传输方式。同时,因为逻辑链路用于传输数据服务任务对应的数据,所以可以减少对传输现有业务数据的干扰。In a first aspect, a communication method is provided, including: a first node obtains data service requirement information; the first node selects a second node for performing a data service task based on the data service requirement information; the first node selects a second node for performing a data service task based on the data service requirement information; Send a first message to the second node; the first message includes first configuration information, the first configuration information includes the type of the first logical link, and the type of the first logical link is a bidirectional logical link, a unidirectional downlink, or In the unidirectional uplink, the first logical link is a logical link between the first node and the second node, and the first logical link is used to transmit data corresponding to the data service task. It can be seen that the first node can send configuration information including the type of logical link to the second node that performs the data service task according to the data service requirement information, so that the logical link established by the second node according to the type of the logical link can satisfy Data service requirements, and logical links are used to transmit data corresponding to data service tasks, which provides a transmission method for data corresponding to data service tasks that meets data service requirements. At the same time, because the logical link is used to transmit data corresponding to the data service task, it can reduce interference to the transmission of existing business data.
可选的,结合第一方面,该方法还包括:第一节点接收一个或多个第三节点发送的能力信息;能力信息用于指示一个或多个第三节点支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力;第一节点根据数据服务需求信息,选取用于执行数据服务任务的第二节点,包括:第一节点根据数据服务需求信息和能力信息,从一个或多个第三节点中选取第二节点。可以看出,第一节点可以数据服务需求信息和一个或多个第三节点的能力信息,从一个或多个第三节点中选取用于执行数据服务任务的第二节点,使得选取的第二节点在能力上能够满足数据服务需求信息。Optionally, combined with the first aspect, the method further includes: the first node receiving capability information sent by one or more third nodes; the capability information is used to indicate that the one or more third nodes support at least one of the following: data collection capabilities, data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities; the first node selects the second node for performing data service tasks based on the data service requirement information, including: the first node based on The data service requirement information and capability information are used to select the second node from one or more third nodes. It can be seen that the first node can use the data service requirement information and the capability information of one or more third nodes to select the second node for performing the data service task from the one or more third nodes, so that the selected second node The node has the capability to meet the data service requirement information.
可选的,结合第一方面,数据上报能力包括以下至少一项:上报的数据类型、数据传输间隔、单次传输的数据量、最大数据传输量、单次传输的最小数据传输量。Optionally, combined with the first aspect, the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
可选的,结合第一方面,该方法还包括:第一节点向一个或多个第三节点发送系统消息;其中,系统消息用于指示第一节点支持数据服务能力。可以看出,第一节点向一个或多个第三节点发送系统消息,系统消息用于指示第一节点支持数据服务能力,使得一个或多个第三节点可以获知第一节点支持数据服务能力。Optionally, combined with the first aspect, the method further includes: the first node sending a system message to one or more third nodes; wherein the system message is used to indicate that the first node supports data service capabilities. It can be seen that the first node sends a system message to one or more third nodes, and the system message is used to indicate that the first node supports the data service capability, so that the one or more third nodes can learn that the first node supports the data service capability.
可选的,结合第一方面,若第一逻辑链路的类型为双向逻辑链路,第一配置信息用于指 示以下至少一项:第二节点需要执行的任务、第一节点使用的数据保护算法、第一节点使用的数据压缩算法、第一节点进行数据传输的间隔、第一节点单次传输的数据量、第二节点需要执行的任务、第二节点使用的数据保护算法、第二节点使用的数据压缩算法、第二节点进行数据传输的间隔、第二节点单次传输的数据量、第二节点进行数据传输的最大数据传输量、第二节点单次传输的最小数据传输量。可以看出,这实现了数据安全保护、数据隐私保护等。同时,通过下发这些信息,使得第二节点可以获知第一节点进行了数据安全保护、数据隐私保护等,也使得第二节点获知进行数据安全保护、数据隐私保护等所使用的相关算法。Optionally, combined with the first aspect, if the type of the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and data protection used by the first node. algorithm, the data compression algorithm used by the first node, the interval between data transmission by the first node, the amount of data transmitted by the first node in a single time, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the second node The data compression algorithm used, the interval for data transmission by the second node, the amount of data transmitted by the second node in a single transmission, the maximum data transmission amount by the second node, and the minimum data transmission amount by the second node in a single transmission. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by issuing this information, the second node can learn that the first node has implemented data security protection, data privacy protection, etc., and the second node can also learn the relevant algorithms used for data security protection, data privacy protection, etc.
可选的,结合第一方面,若第一逻辑链路的类型为单向下行链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第一节点使用的数据保护算法、第一节点使用的数据压缩算法、第一节点进行数据传输的间隔、第一节点单次传输的数据量。可以看出,这实现了数据安全保护、数据隐私保护等。同时,通过下发这些信息,使得第二节点可以获知第一节点进行了数据安全保护、数据隐私保护等。Optionally, combined with the first aspect, if the type of the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, data used by the first node The protection algorithm, the data compression algorithm used by the first node, the interval between data transmission by the first node, and the amount of data transmitted by the first node in a single time. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by issuing this information, the second node can learn that the first node has implemented data security protection, data privacy protection, etc.
可选的,结合第一方面,若第一逻辑链路的类型为单向上行链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第二节点使用的数据保护算法、第二节点使用的数据压缩算法、第二节点进行数据传输的间隔、第二节点单次传输的数据量、第二节点进行数据传输的最大数据传输量、第二节点单次传输的最小数据传输量。可以看出,这实现了数据安全保护、数据隐私保护等。同时,通过下发这些信息,使得第二节点获知进行数据安全保护、数据隐私保护等所使用的相关算法。Optionally, combined with the first aspect, if the type of the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and data used by the second node. Protection algorithm, the data compression algorithm used by the second node, the interval between data transmission by the second node, the amount of data transmitted by the second node in a single time, the maximum data transmission amount by the second node in data transmission, the number of data transmitted by the second node in a single time Minimum data transfer amount. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by issuing this information, the second node can learn the relevant algorithms used for data security protection, data privacy protection, etc.
可选的,结合第一方面,第二节点需要执行的任务由数据服务任务的标识和数据服务任务的子任务的标识进行唯一标识。Optionally, combined with the first aspect, the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
可选的,结合第一方面,若第一逻辑链路的类型为单向下行链路,第二节点的数量为多个,该方法还包括:第一节点发送组播数据,组播数据关联多个第二节点中不同节点对应的第一逻辑链路,组播数据为数据服务任务对应的数据。可以看出,因为第一节点发送的组播数据可以关联多个第二节点中不同节点对应的第一逻辑链路,所以第一节点不会分别向不同节点发送同一数据,节约了下行空口资源,提高了资源利用率,也使得不同节点可以收到相同的组播数据。Optionally, combined with the first aspect, if the type of the first logical link is a unidirectional downlink and the number of second nodes is multiple, the method further includes: the first node sends multicast data, and the multicast data is associated The first logical links corresponding to different nodes among the plurality of second nodes, and the multicast data are data corresponding to the data service task. It can be seen that because the multicast data sent by the first node can be associated with the first logical links corresponding to different nodes among the multiple second nodes, the first node will not send the same data to different nodes respectively, saving downlink air interface resources. , which improves resource utilization and enables different nodes to receive the same multicast data.
可选的,结合第一方面,该方法还包括:若数据服务任务对应的数据在第一逻辑链路上传输结束,第一节点向第二节点发送第二消息,第二消息用于指示第二节点删除第一逻辑链路。可以看出,在数据服务任务对应的数据在第一逻辑链路上传输结束时,可以通知第二节点删除第一逻辑链路,减少了第二节点维护第一逻辑链路时消耗的电量,节省了能耗。Optionally, combined with the first aspect, the method further includes: if the data corresponding to the data service task is transmitted on the first logical link, the first node sends a second message to the second node, and the second message is used to indicate the second message. The second node deletes the first logical link. It can be seen that when the data corresponding to the data service task is transmitted on the first logical link, the second node can be notified to delete the first logical link, which reduces the power consumed by the second node when maintaining the first logical link. Energy consumption is saved.
可选的,结合第一方面,该方法还包括:若第一节点确定第二节点进行小区切换后的小区为第一节点的第一小区,第一节点向第二节点发送第三消息,第三消息还用于指示第二节点保留第一配置信息。可以看出,在第二节点进行小区切换后的小区为第一节点的第一小区时,可以通知第二节点保留第一配置信息,使得第一节点无需再次向第一节点发送第一配置信息。Optionally, combined with the first aspect, the method further includes: if the first node determines that the cell after the second node performs cell switching is the first cell of the first node, the first node sends a third message to the second node, The three messages are also used to instruct the second node to retain the first configuration information. It can be seen that when the cell after the second node performs cell switching is the first cell of the first node, the second node can be notified to retain the first configuration information, so that the first node does not need to send the first configuration information to the first node again. .
可选的,结合第一方面,该方法还包括:若第一节点确定第二节点进行小区切换后的小区为第四节点的小区,第一节点向第二节点发送第四消息,第四消息用于指示第二节点删除第一逻辑链路。可以看出,在第一节点确定第二节点进行小区切换后的小区不是第一节点的小区时,第一节点可以通知第二节点删除第一逻辑链路,减少了第二节点维护第一逻辑链路时消耗的电量,节省了能耗。Optionally, combined with the first aspect, the method further includes: if the first node determines that the cell after the second node performs cell switching is the fourth node's cell, the first node sends a fourth message to the second node, and the fourth message Used to instruct the second node to delete the first logical link. It can be seen that when the first node determines that the cell after the second node performs cell switching is not the first node's cell, the first node can notify the second node to delete the first logical link, which reduces the need for the second node to maintain the first logical link. The power consumed during the link saves energy consumption.
可选的,结合第一方面,该方法还包括:若当前用于执行数据服务任务的第二节点的数 量小于第一数量,第一节点根据数据服务需求信息重新选取用于执行数据服务任务的节点,第一数量是第一节点根据数据服务需求信息确定的数量。可以看出,在当前用于执行数据服务任务的第二节点的数量小于第一数量时,第一节点可以重新选取新的节点来执行数据服务任务,保障了执行数据服务任务的节点的数量始终满足基于数据服务需求信息确定的数量。Optionally, combined with the first aspect, the method further includes: if the number of second nodes currently used to perform the data service task is less than the first number, the first node reselects the node used to perform the data service task according to the data service requirement information. The first number of nodes is the number determined by the first node based on the data service requirement information. It can be seen that when the number of second nodes currently used to perform data service tasks is less than the first number, the first node can re-select a new node to perform data service tasks, ensuring that the number of nodes performing data service tasks is always the same. Meet the quantity determined based on data service requirement information.
可选的,结合第一方面,该方法还包括:若第一节点确定第二节点进行呼叫重建后选择的小区为第一节点的第二小区,第一节点重新向第二节点发送第一消息。可以看出,在第一节点确定第二节点进行呼叫重建后选择的小区为第一节点的第二小区时,第一节点重新向第二节点发送第一消息,使得第二节点可以建立新小区下的第一逻辑链路,进而可以在新小区下的第一逻辑链路上传输数据服务任务对应的数据,保障了数据服务的连续性。Optionally, combined with the first aspect, the method further includes: if the first node determines that the cell selected by the second node after call reestablishment is the first node's second cell, the first node resends the first message to the second node. . It can be seen that when the first node determines that the cell selected by the second node after call reestablishment is the first node's second cell, the first node re-sends the first message to the second node so that the second node can establish a new cell. The first logical link under the new cell can then transmit the data corresponding to the data service task on the first logical link under the new cell, ensuring the continuity of data services.
可选的,结合第一方面,该方法还包括:若第一节点确定第二节点进行呼叫重建后选择的小区为第五节点的小区,且当前用于执行数据服务任务的第二节点的数量小于第二数量,第一节点根据数据服务需求信息重新选取用于执行数据服务任务的节点,第一数量是第一节点根据数据服务需求信息确定的数量。可以看出,在第一节点确定第二节点进行呼叫重建后选择的小区不是第一节点的小区,且当前用于执行数据服务任务的第二节点的数量小于第二数量时,第一节点可以重新选取新的节点来执行数据服务任务,保障了执行数据服务任务的节点的数量始终满足基于数据服务需求信息确定的数量。Optionally, combined with the first aspect, the method further includes: if the first node determines that the cell selected by the second node after call reestablishment is the cell of the fifth node, and the number of second nodes currently used to perform data service tasks If the number is less than the second number, the first node reselects a node for performing the data service task based on the data service requirement information. The first number is the number determined by the first node based on the data service requirement information. It can be seen that when the first node determines that the cell selected by the second node after call reestablishment is not the first node's cell, and the number of second nodes currently used to perform data service tasks is less than the second number, the first node can Re-selecting new nodes to perform data service tasks ensures that the number of nodes performing data service tasks always meets the number determined based on data service requirement information.
第二方面,提供一种通信方法,包括:第二节点从第一节点接收第一消息;第一消息包括第一配置信息,第一配置信息包括第一逻辑链路的类型,第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,第一逻辑链路为第一节点与第二节点之间的逻辑链路,第一逻辑链路用于传输数据服务任务对应的数据;第二节点根据第一逻辑链路的类型,建立第一逻辑链路。In a second aspect, a communication method is provided, including: a second node receiving a first message from a first node; the first message includes first configuration information, the first configuration information includes a type of a first logical link, and the first logical link The type of the link is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink. The first logical link is a logical link between the first node and the second node, and the first logical link is used to transmit data. Data corresponding to the service task; the second node establishes the first logical link according to the type of the first logical link.
可选的,结合第二方面,该方法还包括:第二节点向第一节点发送的第二节点的能力信息;第二节点的能力信息用于指示第二节点支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力。Optionally, combined with the second aspect, the method further includes: the second node sending capability information of the second node to the first node; the capability information of the second node being used to indicate that the second node supports at least one of the following: data collection. capabilities, data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities.
可选的,结合第二方面,数据上报能力包括以下至少一项:上报的数据类型、数据传输间隔、单次传输的数据量、最大数据传输量、单次传输的最小数据传输量。Optionally, combined with the second aspect, the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
可选的,结合第二方面,该方法还包括:第二节点接收第一节点发送的系统消息;其中,系统消息用于指示第一节点支持数据服务能力。Optionally, combined with the second aspect, the method further includes: the second node receiving a system message sent by the first node; wherein the system message is used to indicate that the first node supports data service capabilities.
可选的,结合第二方面,若第一逻辑链路为双向逻辑链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第一节点使用的数据保护算法、第一节点使用的数据压缩算法、第一节点进行数据传输的间隔、第一节点单次传输的数据量、第二节点需要执行的任务、第二节点使用的数据保护算法、第二节点使用的数据压缩算法、第二节点进行数据传输的间隔、第二节点单次传输的数据量、第二节点进行数据传输的最大数据传输量、第二节点单次传输的最小数据传输量。Optionally, combined with the second aspect, if the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: the task that the second node needs to perform, the data protection algorithm used by the first node, The data compression algorithm used by the first node, the interval between data transmission by the first node, the amount of data transmitted by the first node in a single time, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the Data compression algorithm, interval for data transmission by the second node, data volume for a single transmission by the second node, maximum data transmission volume for data transmission by the second node, and minimum data transmission volume for a single transmission by the second node.
可选的,结合第二方面,若第一逻辑链路为单向下行链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第一节点使用的数据保护算法、第一节点使用的数据压缩算法、第一节点进行数据传输的间隔、第一节点单次传输的数据量。Optionally, combined with the second aspect, if the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and the data protection algorithm used by the first node. , the data compression algorithm used by the first node, the interval between data transmission by the first node, and the amount of data transmitted by the first node in a single time.
可选的,结合第二方面,若第一逻辑链路为单向上行链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第二节点使用的数据保护算法、第二节点使用的数据压缩算法、第二节点进行数据传输的间隔、第二节点单次传输的数据量、第二节点进行数据传输的最大数据传输量、第二节点单次传输的最小数据传输量。Optionally, combined with the second aspect, if the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and the data protection algorithm used by the second node. , the data compression algorithm used by the second node, the interval of data transmission by the second node, the amount of data transmitted by the second node in a single time, the maximum data transmission amount of the second node in data transmission, the minimum data transmitted by the second node in a single time Transmission volume.
可选的,结合第二方面,第二节点需要执行的任务由数据服务任务的标识和数据服务任务的子任务的标识进行唯一标识。Optionally, combined with the second aspect, the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
可选的,结合第二方面,该方法还包括:第二节点接收第一节点发送的第二消息,第二消息用于指示第二节点删除第一逻辑链路。Optionally, combined with the second aspect, the method further includes: the second node receiving a second message sent by the first node, the second message being used to instruct the second node to delete the first logical link.
可选的,结合第二方面,第二节点进行小区切换后的小区为第一节点的第一小区,该方法还包括:第二节点接收第一节点发送的第三消息,第三消息用于指示第二节点保留第一配置信息;第二节点根据第一配置信息中第一逻辑链路的类型,建立第一小区下的第一逻辑链路;第二节点通过第一逻辑链路与第一节点传输数据服务任务对应的剩余数据。可以看出,在第二节点进行小区切换后的小区为第一节点的第一小区时,可以通知第二节点保留第一配置信息,使得第一节点无需再次向第一节点发送第一配置信息,也使得第二节点可以快速建立新小区下的第一逻辑链路,进而可以继续在新小区下的第一逻辑链路传输数据服务任务对应的剩余数据,保障了数据服务的连续性。Optionally, combined with the second aspect, the cell after the second node performs cell switching is the first cell of the first node. The method further includes: the second node receives a third message sent by the first node, and the third message is used to Instruct the second node to retain the first configuration information; the second node establishes the first logical link under the first cell according to the type of the first logical link in the first configuration information; the second node communicates with the first logical link through the first logical link. One node transmits the remaining data corresponding to the data service task. It can be seen that when the cell after the second node performs cell switching is the first cell of the first node, the second node can be notified to retain the first configuration information, so that the first node does not need to send the first configuration information to the first node again. , also allows the second node to quickly establish the first logical link under the new cell, and then continue to transmit the remaining data corresponding to the data service task on the first logical link under the new cell, ensuring the continuity of data services.
可选的,结合第二方面,第二节点进行小区切换后的小区为第四节点的小区,该方法还包括:第二节点接收第一节点发送的第四消息,第四消息用于指示第二节点删除第一逻辑链路。Optionally, combined with the second aspect, the cell after the second node performs cell switching is the cell of the fourth node. The method further includes: the second node receives a fourth message sent by the first node, and the fourth message is used to indicate the fourth node. The second node deletes the first logical link.
可选的,结合第二方面,该方法还包括:第二节点不与第四节点建立逻辑链路。Optionally, combined with the second aspect, the method further includes: the second node does not establish a logical link with the fourth node.
可选的,结合第二方面,第二节点进行呼叫重建后选择的小区为第一节点的第二小区,该方法还包括:第二节点重新接收第一节点发送的第一消息;第二节点根据第一消息中第一逻辑链路的类型,建立第二小区下的第一逻辑链路;第二节点通过第一逻辑链路与第一节点传输数据服务任务对应的剩余数据。Optionally, combined with the second aspect, the cell selected by the second node after call reestablishment is the second cell of the first node. The method further includes: the second node re-receives the first message sent by the first node; According to the type of the first logical link in the first message, the first logical link under the second cell is established; the second node transmits the remaining data corresponding to the data service task with the first node through the first logical link.
可选的,结合第二方面,第二节点进行呼叫重建后选择的小区为第五节点的小区,该方法还包括:第二节点不与第五节点建立逻辑链路。Optionally, combined with the second aspect, the cell selected by the second node after call reestablishment is the cell of the fifth node, and the method further includes: the second node does not establish a logical link with the fifth node.
第三方面,提供一种通信装置,通信装置为第一节点,第一节点包括处理模块和收发模块,收发模块,用于获取数据服务需求信息;处理模块,用于根据数据服务需求信息,选取用于执行数据服务任务的第二节点;收发模块,还用于基于数据服务需求信息向第二节点发送第一消息;第一消息包括第一配置信息,第一配置信息包括第一逻辑链路的类型,第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,第一逻辑链路为第一节点与第二节点之间的逻辑链路,第一逻辑链路用于传输数据服务任务对应的数据。In a third aspect, a communication device is provided. The communication device is a first node. The first node includes a processing module and a transceiver module. The transceiver module is used to obtain data service requirement information; the processing module is used to select according to the data service requirement information. A second node used to perform data service tasks; a transceiver module, also used to send a first message to the second node based on data service requirement information; the first message includes first configuration information, and the first configuration information includes a first logical link type, the type of the first logical link is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink, the first logical link is a logical link between the first node and the second node, the first Logical links are used to transmit data corresponding to data service tasks.
可选的,结合第三方面,收发模块,还用于接收一个或多个第三节点发送的能力信息;能力信息用于指示一个或多个第三节点支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力;在根据数据服务需求信息,选取用于执行数据服务任务的第二节点时,处理模块,用于第一节点根据数据服务需求信息和能力信息,从一个或多个第三节点中选取第二节点。Optionally, combined with the third aspect, the transceiver module is also used to receive capability information sent by one or more third nodes; the capability information is used to indicate that one or more third nodes support at least one of the following: data collection capability, Data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities; when selecting the second node for performing data service tasks based on the data service requirement information, the processing module is used for the first node to perform the data service task according to the data service requirement information. The data service requirement information and capability information are used to select the second node from one or more third nodes.
可选的,结合第三方面,数据上报能力包括以下至少一项:上报的数据类型、数据传输间隔、单次传输的数据量、最大数据传输量、单次传输的最小数据传输量。Optionally, combined with the third aspect, the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
可选的,结合第三方面,收发模块,还用于向一个或多个第三节点发送系统消息;其中,系统消息用于指示第一节点支持数据服务能力。Optionally, combined with the third aspect, the transceiver module is also configured to send a system message to one or more third nodes; wherein the system message is used to indicate that the first node supports data service capabilities.
可选的,结合第三方面,若第一逻辑链路的类型为双向逻辑链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第一节点使用的数据保护算法、第一节点使用的数据压缩算法、第一节点进行数据传输的间隔、第一节点单次传输的数据量、第二节点需要执行的任务、第二节点使用的数据保护算法、第二节点使用的数据压缩算法、第二节点进 行数据传输的间隔、第二节点单次传输的数据量、第二节点进行数据传输的最大数据传输量、第二节点单次传输的最小数据传输量。Optionally, combined with the third aspect, if the type of the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, and data protection used by the first node. algorithm, the data compression algorithm used by the first node, the interval between data transmission by the first node, the amount of data transmitted by the first node in a single time, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the second node The data compression algorithm used, the interval for data transmission by the second node, the amount of data transmitted by the second node in a single transmission, the maximum data transmission amount by the second node, and the minimum data transmission amount by the second node in a single transmission.
可选的,结合第三方面,若第一逻辑链路的类型为单向下行链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第一节点使用的数据保护算法、第一节点使用的数据压缩算法、第一节点进行数据传输的间隔、第一节点单次传输的数据量。Optionally, combined with the third aspect, if the type of the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, data used by the first node The protection algorithm, the data compression algorithm used by the first node, the interval between data transmission by the first node, and the amount of data transmitted by the first node in a single time.
可选的,结合第三方面,若第一逻辑链路的类型为单向上行链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第二节点使用的数据保护算法、第二节点使用的数据压缩算法、第二节点进行数据传输的间隔、第二节点单次传输的数据量、第二节点进行数据传输的最大数据传输量、第二节点单次传输的最小数据传输量。Optionally, combined with the third aspect, if the type of the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: tasks that the second node needs to perform, data used by the second node Protection algorithm, the data compression algorithm used by the second node, the interval between data transmission by the second node, the amount of data transmitted by the second node in a single time, the maximum data transmission amount by the second node in data transmission, the number of data transmitted by the second node in a single time Minimum data transfer amount.
可选的,结合第三方面,第二节点需要执行的任务由数据服务任务的标识和数据服务任务的子任务的标识进行唯一标识。Optionally, combined with the third aspect, the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
可选的,结合第三方面,若第一逻辑链路的类型为单向下行链路,第二节点的数量为多个,收发模块,还用于发送组播数据,组播数据关联多个第二节点中不同节点对应的第一逻辑链路,组播数据为数据服务任务对应的数据。Optionally, combined with the third aspect, if the type of the first logical link is a unidirectional downlink and the number of second nodes is multiple, the transceiver module is also used to send multicast data, and the multicast data is associated with multiple The first logical links corresponding to different nodes in the second node, and the multicast data are data corresponding to the data service task.
可选的,结合第三方面,收发模块,还用于:若数据服务任务对应的数据在第一逻辑链路上传输结束,第一节点向第二节点发送第二消息,第二消息用于指示第二节点删除第一逻辑链路。Optionally, combined with the third aspect, the transceiver module is also used to: if the data corresponding to the data service task is transmitted on the first logical link, the first node sends a second message to the second node, and the second message is used to Instruct the second node to delete the first logical link.
可选的,结合第三方面,收发模块,还用于:若第一节点确定第二节点进行小区切换后的小区为第一节点的第一小区,第一节点向第二节点发送第三消息,第三消息还用于指示第二节点保留第一配置信息。Optionally, combined with the third aspect, the transceiver module is also configured to: if the first node determines that the cell after the second node performs cell switching is the first cell of the first node, the first node sends a third message to the second node. , the third message is also used to instruct the second node to retain the first configuration information.
可选的,结合第三方面,收发模块,还用于:若第一节点确定第二节点进行小区切换后的小区为第四节点的小区,第一节点向第二节点发送第四消息,第四消息用于指示第二节点删除第一逻辑链路。Optionally, combined with the third aspect, the transceiver module is also configured to: if the first node determines that the cell after the second node performs cell switching is the fourth node's cell, the first node sends a fourth message to the second node, and The four message is used to instruct the second node to delete the first logical link.
可选的,结合第三方面,处理模块,还用于:若当前用于执行数据服务任务的第二节点的数量小于第一数量,第一节点根据数据服务需求信息重新选取用于执行数据服务任务的节点,第一数量是第一节点根据数据服务需求信息确定的数量。Optionally, combined with the third aspect, the processing module is also configured to: if the number of second nodes currently used to perform data service tasks is less than the first number, reselect the first node for performing data services according to the data service requirement information. The first number of task nodes is the number determined by the first node based on the data service requirement information.
可选的,结合第三方面,收发模块,还用于:若第一节点确定第二节点进行呼叫重建后选择的小区为第一节点的第二小区,第一节点重新向第二节点发送第一消息。Optionally, combined with the third aspect, the transceiver module is also configured to: if the first node determines that the cell selected by the second node after call reestablishment is the second cell of the first node, the first node re-sends the second cell to the second node. A message.
可选的,结合第三方面,处理模块,还用于:若第一节点确定第二节点进行呼叫重建后选择的小区为第五节点的小区,且当前用于执行数据服务任务的第二节点的数量小于第二数量,第一节点根据数据服务需求信息重新选取用于执行数据服务任务的节点,第一数量是第一节点根据数据服务需求信息确定的数量。Optionally, combined with the third aspect, the processing module is also configured to: if the first node determines that the cell selected by the second node after call reestablishment is the cell of the fifth node, and the second node is currently used to perform the data service task The number is less than the second number, the first node reselects a node for performing the data service task according to the data service requirement information, and the first number is the number determined by the first node according to the data service requirement information.
第四方面,提供一种通信装置,通信装置为第二节点,第二节点包括处理模块和收发模块,收发模块,用于从第一节点接收第一消息;第一消息包括第一配置信息,第一配置信息包括第一逻辑链路的类型,第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,第一逻辑链路为第一节点与第二节点之间的逻辑链路,第一逻辑链路用于传输数据服务任务对应的数据;处理模块,用于根据第一逻辑链路的类型,建立第一逻辑链路。In a fourth aspect, a communication device is provided. The communication device is a second node. The second node includes a processing module and a transceiver module. The transceiver module is used to receive a first message from the first node; the first message includes first configuration information, The first configuration information includes a type of the first logical link. The type of the first logical link is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink. The first logical link is a link between the first node and the second node. Logical links between nodes, the first logical link is used to transmit data corresponding to the data service task; the processing module is used to establish the first logical link according to the type of the first logical link.
可选的,结合第四方面,收发模块,还用于向第一节点发送的第二节点的能力信息;第二节点的能力信息用于指示第二节点支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力。Optionally, combined with the fourth aspect, the transceiver module is also used to send the capability information of the second node to the first node; the capability information of the second node is used to indicate that the second node supports at least one of the following: data collection capability, Data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities.
可选的,结合第四方面,数据上报能力包括以下至少一项:上报的数据类型、数据传输 间隔、单次传输的数据量、最大数据传输量、单次传输的最小数据传输量。Optionally, combined with the fourth aspect, the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
可选的,结合第四方面,收发模块,还用于接收第一节点发送的系统消息;其中,系统消息用于指示第一节点支持数据服务能力。Optionally, combined with the fourth aspect, the transceiver module is also configured to receive a system message sent by the first node; wherein the system message is used to indicate that the first node supports data service capabilities.
可选的,结合第四方面,若第一逻辑链路为双向逻辑链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第一节点使用的数据保护算法、第一节点使用的数据压缩算法、第一节点进行数据传输的间隔、第一节点单次传输的数据量、第二节点需要执行的任务、第二节点使用的数据保护算法、第二节点使用的数据压缩算法、第二节点进行数据传输的间隔、第二节点单次传输的数据量、第二节点进行数据传输的最大数据传输量、第二节点单次传输的最小数据传输量。Optionally, combined with the fourth aspect, if the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: the task that the second node needs to perform, the data protection algorithm used by the first node, The data compression algorithm used by the first node, the interval between data transmission by the first node, the amount of data transmitted by the first node in a single time, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the Data compression algorithm, interval for data transmission by the second node, data volume for a single transmission by the second node, maximum data transmission volume for data transmission by the second node, and minimum data transmission volume for a single transmission by the second node.
可选的,结合第四方面,若第一逻辑链路为单向下行链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第一节点使用的数据保护算法、第一节点使用的数据压缩算法、第一节点进行数据传输的间隔、第一节点单次传输的数据量。Optionally, combined with the fourth aspect, if the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: a task that the second node needs to perform, and a data protection algorithm used by the first node. , the data compression algorithm used by the first node, the interval between data transmission by the first node, and the amount of data transmitted by the first node in a single time.
可选的,结合第四方面,若第一逻辑链路为单向上行链路,第一配置信息用于指示以下至少一项:第二节点需要执行的任务、第二节点使用的数据保护算法、第二节点使用的数据压缩算法、第二节点进行数据传输的间隔、第二节点单次传输的数据量、第二节点进行数据传输的最大数据传输量、第二节点单次传输的最小数据传输量。Optionally, combined with the fourth aspect, if the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: a task that the second node needs to perform, and a data protection algorithm used by the second node. , the data compression algorithm used by the second node, the interval of data transmission by the second node, the amount of data transmitted by the second node in a single time, the maximum data transmission amount of the second node in data transmission, the minimum data transmitted by the second node in a single time Transmission volume.
可选的,结合第四方面,第二节点需要执行的任务由数据服务任务的标识和数据服务任务的子任务的标识进行唯一标识。Optionally, combined with the fourth aspect, the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
可选的,结合第四方面,收发模块,还用于接收第一节点发送的第二消息,第二消息用于指示第二节点删除第一逻辑链路。Optionally, in conjunction with the fourth aspect, the transceiver module is further configured to receive a second message sent by the first node, where the second message is used to instruct the second node to delete the first logical link.
可选的,结合第四方面,第二节点进行小区切换后的小区为第一节点的第一小区,收发模块,还用于接收第一节点发送的第三消息,第三消息用于指示第二节点保留第一配置信息;处理模块,还用于根据第一配置信息中第一逻辑链路的类型,建立第一小区下的第一逻辑链路;收发模块,还用于通过第一逻辑链路与第一节点传输数据服务任务对应的剩余数据。Optionally, combined with the fourth aspect, the cell after the second node performs cell switching is the first cell of the first node. The transceiver module is also configured to receive a third message sent by the first node, and the third message is used to indicate the third message. The two nodes retain the first configuration information; the processing module is also used to establish the first logical link under the first cell according to the type of the first logical link in the first configuration information; the transceiver module is also used to pass the first logical link The link transmits remaining data corresponding to the data service task with the first node.
可选的,结合第四方面,第二节点进行小区切换后的小区为第四节点的小区,收发模块,还用于接收第一节点发送的第四消息,第四消息用于指示第二节点删除第一逻辑链路。Optionally, combined with the fourth aspect, the cell after the second node performs cell switching is the cell of the fourth node. The transceiver module is also used to receive a fourth message sent by the first node, and the fourth message is used to instruct the second node. Delete the first logical link.
可选的,结合第四方面,处理模块,还用于不与第四节点建立逻辑链路。Optionally, combined with the fourth aspect, the processing module is also used to not establish a logical link with the fourth node.
可选的,结合第四方面,第二节点进行呼叫重建后选择的小区为第一节点的第二小区,收发模块,还用于重新接收第一节点发送的第一消息;处理模块,还用于根据第一消息中第一逻辑链路的类型,建立第二小区下的第一逻辑链路;收发模块,还用于通过第一逻辑链路与第一节点传输数据服务任务对应的剩余数据。Optionally, combined with the fourth aspect, the cell selected by the second node after call reestablishment is the second cell of the first node. The transceiver module is also used to re-receive the first message sent by the first node; the processing module is also used Establishing the first logical link under the second cell according to the type of the first logical link in the first message; the transceiver module is also configured to transmit the remaining data corresponding to the data service task with the first node through the first logical link .
可选的,结合第四方面,第二节点进行呼叫重建后选择的小区为第五节点的小区,处理模块,还用于不与第五节点建立逻辑链路。Optionally, combined with the fourth aspect, the cell selected by the second node after call reestablishment is the cell of the fifth node, and the processing module is also configured not to establish a logical link with the fifth node.
第五方面,提供一种通信装置,包括处理器,处理器调用存储器中存储的计算机程序实现如第一方面或第二方面中任意一项的方法。A fifth aspect provides a communication device, including a processor. The processor calls a computer program stored in a memory to implement the method in any one of the first aspect or the second aspect.
在一种可能的设计中,该通信装置可以是实现第一方面或第二方面中方法的芯片或者包含芯片的设备。In a possible design, the communication device may be a chip that implements the method in the first aspect or the second aspect or a device containing the chip.
第六方面,提供一种通信装置,包括逻辑电路和输入输出接口,逻辑电路用于读取并执行存储的指令,当该指令被运行时,使得通信装置执行如第一方面或第二方面中任一项所述的方法。In a sixth aspect, a communication device is provided, including a logic circuit and an input-output interface. The logic circuit is used to read and execute stored instructions. When the instructions are executed, the communication device executes the instructions as in the first aspect or the second aspect. any of the methods described.
第七方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序, 当计算机程序被运行时,实现如第一方面或第二方面中任一项所述的方法。In a seventh aspect, a computer-readable storage medium is provided. A computer program is stored in the computer-readable storage medium. When the computer program is run, the method as described in any one of the first aspect or the second aspect is implemented.
第八方面,提供一种包含指令的计算机程序产品,当其在计算机上执行时,使得第一方面或第二方面中任一项所述的方法被执行。An eighth aspect provides a computer program product containing instructions that, when executed on a computer, causes the method described in any one of the first aspect or the second aspect to be executed.
第九方面,提供一种通信系统,包括用于执行如第一方面中任一项所述方法的第一节点和用于执行如第二方面中任一项所述方法的第二节点。A ninth aspect provides a communication system, including a first node for performing the method according to any one of the first aspects and a second node for performing the method according to any one of the second aspects.
附图说明Description of the drawings
下面将对实施例描述中所需要使用的附图作简单地介绍。The following will briefly introduce the drawings needed to describe the embodiments.
图1为本申请实施例提供的一种通信系统的基础架构;Figure 1 is the infrastructure of a communication system provided by an embodiment of the present application;
图2所示为可适用于本申请实施例的一种通信装置的硬件结构示意图;Figure 2 shows a schematic diagram of the hardware structure of a communication device applicable to embodiments of the present application;
图3为本申请实施例提供的一种通信方法的流程示意图;Figure 3 is a schematic flow chart of a communication method provided by an embodiment of the present application;
图4为本申请实施例提供的一种接入网设备与终端设备建立的逻辑链路的示意图;Figure 4 is a schematic diagram of a logical link established between an access network device and a terminal device provided by an embodiment of the present application;
图5为本申请实施例提供的一种通信装置的结构示意图;Figure 5 is a schematic structural diagram of a communication device provided by an embodiment of the present application;
图6为本申请实施例提供的一种简化的终端设备的结构示意图;Figure 6 is a schematic structural diagram of a simplified terminal device provided by an embodiment of the present application;
图7为本申请实施例提供的一种简化的接入网设备的结构示意图。Figure 7 is a schematic structural diagram of a simplified access network device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,本申请实施例中的术语“系统”和“网络”可被互换使用。除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是一个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Among them, the terms "system" and "network" in the embodiments of this application can be used interchangeably. Unless otherwise stated, "/" indicates that the related objects are in an "or" relationship. For example, A/B can represent A or B; "and/or" in this application is only a way to describe related objects. Association relationship means that there can be three relationships. For example, A and/or B can mean: A exists alone, A and B exist simultaneously, and B exists alone. A and B can be singular or plural. Furthermore, in the description of this application, unless otherwise specified, "plurality" means two or more than two. "At least one of the following" or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items). For example, at least one of a, b, or c can mean: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be one or more . In addition, in order to facilitate a clear description of the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as “first” and “second” are used to distinguish identical or similar items with basically the same functions and effects. Those skilled in the art can understand that words such as "first" and "second" do not limit the number and execution order, and words such as "first" and "second" do not limit the number and execution order.
在本申请实施例中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。以下的具体实施方式,对本申请的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以下仅为本申请的具体实施方式而已,并不用于限定本申请的保护范围,凡在本申请的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本申请的保护范围之内。Reference in describing an embodiment of the application to "one embodiment" or "some embodiments" or the like means that a particular feature, structure or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Therefore, the phrases "in one embodiment", "in some embodiments", "in other embodiments", "in other embodiments", etc. appearing in different places in this specification are not necessarily References are made to the same embodiment, but rather to "one or more but not all embodiments" unless specifically stated otherwise. The terms “including,” “includes,” “having,” and variations thereof all mean “including but not limited to,” unless otherwise specifically emphasized. The following specific implementations further describe the purpose, technical solutions and beneficial effects of this application in detail. It should be understood that the following are only specific implementations of this application and are not intended to limit the scope of protection of this application. Any modifications, equivalent substitutions, improvements, etc. made based on the technical solutions of this application shall be included in the protection scope of this application.
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系 可以组合形成新的实施例。In the various embodiments of this application, if there is no special explanation or logical conflict, the terms and/or descriptions between different embodiments are consistent and can be referenced to each other. The technical features in different embodiments are based on their inherent Logical relationships can be combined to form new embodiments.
应理解,本申请实施例的技术方案可以应用于长期演进(long term evolution,LTE)架构、第五代移动通信技术(5th generation mobile networks,5G)、无线局域网(wireless local area networks,WLAN)系统、V2X通信系统等等。本申请实施例的技术方案还可以应用于未来其它的通信系统,例如6G通信系统等,在未来通信系统中,可能保持功能相同,但名称可能会改变。It should be understood that the technical solutions of the embodiments of the present application can be applied to long term evolution (long term evolution, LTE) architecture, fifth generation mobile communication technology (5th generation mobile networks, 5G), wireless local area networks (wireless local area networks, WLAN) systems , V2X communication system, etc. The technical solutions of the embodiments of this application can also be applied to other future communication systems, such as 6G communication systems. In future communication systems, the functions may remain the same, but the names may change.
下面介绍本申请实施例提供的通信系统的基础架构。参见图1,图1为本申请实施例提供的一种通信系统的基础架构。如图1中的所示,该通信系统可以包括接入网设备以及与接入网设备通信的一个或多个终端设备。图1仅为示意图,并不构成对本申请提供的技术方案的适用场景的限定。The following introduces the basic architecture of the communication system provided by the embodiment of the present application. Referring to Figure 1, Figure 1 shows the infrastructure of a communication system provided by an embodiment of the present application. As shown in Figure 1, the communication system may include an access network device and one or more terminal devices communicating with the access network device. Figure 1 is only a schematic diagram and does not constitute a limitation on the applicable scenarios of the technical solution provided by this application.
接入网设备为网络侧的一种用于发送信号,或者,接收信号,或者,发送信号和接收信号的实体。接入网设备可以为部署在无线接入网(radio access network,RAN)中为终端设备提供无线通信功能的装置,例如可以为传输接收点(transmission reception point,TRP)、基站、各种形式的控制节点。例如,网络控制器、无线控制器、云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器等。具体的,接入网设备可以为各种形式的宏基站,微基站(也称为小站),中继站,接入点(access point,AP)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(baseBand unit,BBU)、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、移动交换中心)、卫星、无人机等,也可以为基站的天线面板。控制节点可以连接多个基站,并为多个基站覆盖下的多个终端配置资源。在采用不同的无线接入技术的系统中,具备基站功能的设备的名称可能会有所不同。例如,可以是5G中的gNB,或者5G之后的网络中的网络侧设备或未来演进的PLMN网络中的接入网设备,或者设备对设备(Device-to-Device,D2D)通信、机器对机器(Machine-to-Machine,M2M)通信、车联网通信中承担基站功能的设备等,本申请对接入网设备的具体名称不作限定。另外,接入网设备还可以包括分布式单元(distributed unit,DU)和集中式单元(centralized unit,CU)。其中,CU和DU之间通过F1接口进行连接。The access network device is an entity on the network side that is used to send signals, or receive signals, or send signals and receive signals. Access network equipment can be a device deployed in a radio access network (RAN) to provide wireless communication functions for terminal equipment, such as a transmission reception point (TRP), base station, various forms of control node. For example, network controller, wireless controller, wireless controller in cloud radio access network (cloud radio access network, CRAN) scenario, etc. Specifically, the access network equipment can be various forms of macro base stations, micro base stations (also called small stations), relay stations, access points (access points, AP), wireless network controllers (radio network controller, RNC), Node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand unit, BBU), transmission point (transmitting and receiving point, TRP), transmitting point (TP), mobile switching center), satellite, drone, etc., can also be the antenna panel of the base station. The control node can connect to multiple base stations and configure resources for multiple terminals covered by multiple base stations. In systems using different wireless access technologies, the names of devices with base station functions may be different. For example, it can be the gNB in 5G, or the network side equipment in the network after 5G or the access network equipment in the future evolved PLMN network, or device-to-device (D2D) communication, machine-to-machine (Machine-to-Machine, M2M) communications, equipment that performs base station functions in Internet of Vehicles communications, etc. This application does not limit the specific names of access network equipment. In addition, access network equipment may also include distributed units (DU) and centralized units (CU). Among them, CU and DU are connected through the F1 interface.
终端设备是用户侧的一种用于接收信号,或者,发送信号,或者,接收信号和发送信号的实体。终端设备用于向用户提供语音服务和数据连通性服务中的一种或多种。终端设备可以为包含无线收发功能、且可以与接入网设备配合为用户提供通讯服务的设备。具体地,终端设备可以指用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、终端、无线通信设备、用户代理或用户装置。终端设备也可以是无人机、物联网(internet of things,IoT)设备、WLAN中的站点(station,ST)、蜂窝电话(cellular phone)、智能电话(smart phone)、无绳电话、无线数据卡、平板型电脑、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)设备、膝上型电脑(laptop computer)、机器类型通信(machine type communication,MTC)终端、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备(也可以称为穿戴式智能设备)、虚拟现实(virtual reality,VR)终端、增强现实(augmented reality,AR)终端、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全 (transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。终端设备也可以是设备到设备(device to device,D2D)设备,例如,电表、水表等。终端设备还可以为5G系统中的终端,也可以为下一代通信系统中的终端,本申请实施例对此不作限定。A terminal device is an entity on the user side that is used to receive signals, or send signals, or receive signals and send signals. The terminal device is used to provide one or more of voice services and data connectivity services to users. The terminal device may be a device that includes wireless transceiver functions and can cooperate with access network equipment to provide communication services to users. Specifically, the terminal equipment may refer to user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, terminal, wireless communication equipment, user agent or User device. The terminal device can also be a drone, an Internet of things (IoT) device, a station (ST) in a WLAN, a cellular phone, a smart phone, a cordless phone, or a wireless data card , tablet computers, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital assistant (PDA) devices, laptop computers (laptop computers) , machine type communication (MTC) terminals, handheld devices with wireless communication capabilities, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices (also known as wearable smart devices), Virtual reality (VR) terminals, augmented reality (AR) terminals, wireless terminals in industrial control, wireless terminals in self-driving, and remote medical Wireless terminals, wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, etc. The terminal device can also be a device to device (D2D) device, such as an electric meter, a water meter, etc. The terminal device may also be a terminal in a 5G system or a terminal in a next-generation communication system, which is not limited in the embodiments of the present application.
在本申请中,接入网设备和终端设备可以部署有数据代理(data agent,DA)网元。应理解的,接入网设备中部署的数据代理网元的数量可以为一个或多个,终端设备中部署的数据代理网元的数量可以为一个或多个。In this application, access network equipment and terminal equipment may be deployed with data agent (data agent, DA) network elements. It should be understood that the number of data proxy network elements deployed in the access network device may be one or more, and the number of data proxy network elements deployed in the terminal device may be one or more.
数据代理网元可以实现如下一项或多项功能:数据采集、预处理、存储、分析、和数据保护等。不同的数据代理网元可以具有相同或不同的数据服务能力,可以实现相同或不同的功能。数据代理网元可以与数据编排网元(data orchestration,DO)(图1中未示出)交互,获得为实现服务需求需要执行的相关操作,并执行该操作。其中,数据编排网元的数量可以为一个或多个。数据代理网元还可以建立逻辑网络拓扑,形成动态的数据管道(data pipeline)(或称为数据流、业务逻辑、功能链、操作链等),该数据管道由一个或多个数据代理网元对应的功能按服务需求组成,前一个功能的输出是下一个功能的输入,从而实现响应的数据服务。The data proxy network element can implement one or more of the following functions: data collection, preprocessing, storage, analysis, and data protection. Different data proxy network elements can have the same or different data service capabilities and can implement the same or different functions. The data proxy network element can interact with the data orchestration network element (data orchestration, DO) (not shown in Figure 1), obtain relevant operations that need to be performed to achieve service requirements, and perform the operations. The number of data orchestration network elements may be one or more. The data agent network element can also establish a logical network topology to form a dynamic data pipeline (also known as data flow, business logic, function chain, operation chain, etc.). The data pipeline consists of one or more data agent network elements. The corresponding functions are composed according to service requirements, and the output of the previous function is the input of the next function, thereby realizing responsive data services.
例如,数据代理网元可以是由NWDAF网元演进而来的,能够实现NWDAF网元具有的功能、以及基于NWDAF网元实现的场景用例等。For example, the data proxy network element can be evolved from the NWDAF network element and can realize the functions of the NWDAF network element and the scenario use cases based on the NWDAF network element.
数据编排网元可以获取服务请求,将服务请求转译为对数据的服务需求,确定用于实现该服务需求的数据代理网元,编排各个数据代理网元的功能,使数据代理网元执行相应操作并建立动态的逻辑网络拓扑,实现相应的服务需求。The data orchestration network element can obtain the service request, translate the service request into a service requirement for data, determine the data agent network element used to realize the service requirement, orchestrate the functions of each data agent network element, and enable the data agent network element to perform corresponding operations. And establish a dynamic logical network topology to achieve corresponding service requirements.
示例性地,数据编排网元可以部署在任意核心网网元、传输网(transfer network,TN)网元、接入网设备或其他网元(例如操作、管理和维护(operation administration and maintenance,OAM)网元等)中,或者数据编排网元可以独立部署。例如,数据编排网元可以分级部署在核心网或接入网设备侧。数据编排网元可以部署在网络业务(network service,NS)网元中。又例如,数据编排网元可以作为网络功能(network function,NF)或网元独立部署在网络中。在实际部署时,一个或多个NF可以组成一个网元。Illustratively, the data orchestration network element can be deployed on any core network element, transfer network (TN) network element, access network equipment or other network element (such as operation, management and maintenance (operation administration and maintenance, OAM) ) network elements, etc.), or data orchestration network elements can be deployed independently. For example, data orchestration network elements can be deployed hierarchically on the core network or access network equipment side. Data orchestration network elements can be deployed in network service (NS) network elements. For another example, data orchestration network elements can be independently deployed in the network as network functions (NF) or network elements. In actual deployment, one or more NFs can form a network element.
其中,核心网网元可以位于通信系统的网络侧,可用于为接入网设备、终端设备等提供网络服务。核心网网元可以包括但不限于如下一项或多项:移动性管理网元、会话管理网元、用户面网元、策略控制网元、网络开放网元、应用网元、网络数据分析功能(network data analysis function,NWDAF)网元、和/或操作、管理和维护(operation administration and maintenance,OAM)网元。Among them, core network elements can be located on the network side of the communication system and can be used to provide network services for access network equipment, terminal equipment, etc. The core network elements may include but are not limited to one or more of the following: mobility management network elements, session management network elements, user plane network elements, policy control network elements, network opening network elements, application network elements, and network data analysis functions. (network data analysis function, NWDAF) network element, and/or operation, management and maintenance (operation administration and maintenance, OAM) network element.
移动性管理网元:主要用于移动性管理和接入管理等。在5G移动通信系统中,该接入管理网元可以是接入和移动性管理功能(access and mobility management function,AMF)网元,主要进行移动性管理、接入鉴权/授权等功能。此外,移动性管理网元还可以负责在终端与策略控制功能(policy control function,PCF)网元间传递用户策略。Mobility management network element: mainly used for mobility management and access management. In the 5G mobile communication system, the access management network element can be an access and mobility management function (AMF) network element, which mainly performs functions such as mobility management and access authentication/authorization. In addition, the mobility management network element can also be responsible for transmitting user policies between the terminal and the policy control function (PCF) network element.
会话管理网元:主要用于会话管理(例如创建、删除等)、维护会话上下文及用户面转发管道信息、终端设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理用户平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。Session management network element: Mainly used for session management (such as creation, deletion, etc.), maintaining session context and user plane forwarding pipeline information, Internet protocol (IP) address allocation and management of terminal equipment, and selecting manageable users Termination points of plane functions, policy control and charging function interfaces, and downlink data notifications, etc.
在5G通信系统中,该会话管理网元可以是会话管理功能(session management function,SMF)网元,完成终端IP地址分配,UPF选择,及计费与QoS策略控制等。In the 5G communication system, the session management network element can be a session management function (SMF) network element, which completes terminal IP address allocation, UPF selection, accounting and QoS policy control, etc.
用户面网元:作为和数据网络的接口,完成用户面数据转发、基于会话/流级的计费统计, 带宽限制等功能。即分组路由和转发以及用户面数据的服务质量(quality of service,QoS)处理等。在5G通信系统中,该用户面网元可以是用户面功能(user plane function,UPF)网元。User plane network element: As an interface with the data network, it completes functions such as user plane data forwarding, session/flow-level accounting statistics, and bandwidth limitation. That is, packet routing and forwarding and quality of service (QoS) processing of user plane data, etc. In the 5G communication system, the user plane network element may be a user plane function (UPF) network element.
策略控制网元:包括用户签约数据管理功能、策略控制功能、计费策略控制功能、服务质量(quality of service,QoS)控制等,用于指导网络行为的统一策略框架,为控制面功能网元(例如AMF,SMF网元等)提供策略规则信息等。在5G移动通信系统中,该策略控制网元可以是PCF。Policy control network element: including user subscription data management function, policy control function, billing policy control function, quality of service (QoS) control, etc. It is a unified policy framework used to guide network behavior and is a control plane functional network element (such as AMF, SMF network elements, etc.) to provide policy rule information, etc. In the 5G mobile communication system, the policy control network element may be the PCF.
网络开放网元:可用于提供网络能力开放相关的框架、鉴权和接口,在5G系统网络功能和其他网络功能之间传递信息。在5G通信系统中,该网络开放网元可以是网络开放功能(network element function,NEF)网元,主要用于向AF开放3GPP网络功能的业务和能力,同时也可以让AF向3GPP网络功能提供信息。Network open network element: It can be used to provide frameworks, authentications and interfaces related to network capability opening, and to transfer information between 5G system network functions and other network functions. In the 5G communication system, the network open network element can be a network element function (NEF) network element, which is mainly used to open the services and capabilities of 3GPP network functions to AF, and also allows AF to provide 3GPP network functions. information.
应用网元:可用于提供各种业务服务,能够通过网络开放功能(network element function,NEF)网元与核心网交互,以及能够和策略管理框架交互进行策略管理。在5G通信系统中,该应用网元可以是应用功能(application function,AF)网元、或时间敏感应用功能(time sensitive network application function,TSNAF)网元,表示第三方或运营商的应用功能,是5G网络获取外部应用数据的接口,主要用于传递应用侧对网络侧的需求。Application network elements: can be used to provide various business services, can interact with the core network through network element function (NEF) network elements, and can interact with the policy management framework for policy management. In the 5G communication system, the application network element can be an application function (AF) network element or a time-sensitive network application function (TSNAF) network element, which represents the application function of a third party or operator. It is the interface for the 5G network to obtain external application data, and is mainly used to convey the needs of the application side to the network side.
NWDAF网元:可用于从核心网和OAM网元收集数据,向NF或者AF或者OAM反馈数据分析结果。例如,NWDAF网元可从OAM网元采集OAM数据,从核心网NF或AF收集非OAM数据,非OAM数据可以包括收集终端、终端群组、业务等级别的非OAM数据。NWDAF network element: can be used to collect data from the core network and OAM network elements and feed back data analysis results to NF, AF or OAM. For example, the NWDAF network element can collect OAM data from the OAM network element and collect non-OAM data from the core network NF or AF. The non-OAM data can include collecting non-OAM data at the terminal, terminal group, service and other levels.
OAM网元:可从收集来自接入网设备的数据。OAM network element: can collect data from access network equipment.
需要说明的是,数据编排网元可以是逻辑实体或者物理实体,数据代理网元可以是逻辑实体或者物理实体,本申请对此不限定。It should be noted that the data orchestration network element can be a logical entity or a physical entity, and the data proxy network element can be a logical entity or a physical entity, which is not limited in this application.
示例性地,数据代理网元可以集中式部署,也可以分布式部署。分布式部署方式可以包括分布式哈希表(distributed hash table,DHT)方式等。For example, the data proxy network element can be deployed in a centralized manner or in a distributed manner. Distributed deployment methods can include distributed hash table (DHT) methods, etc.
数据代理网元分布式按需灵活部署,可以满足多样性及灵活的数据服务需求,可以减少收集数据的开销。Data proxy network elements are distributed and flexibly deployed on demand, which can meet diverse and flexible data service needs and reduce the cost of data collection.
可选的,终端设备还可以部署协议处理单元,用于实现标准协议。Optionally, the terminal device can also deploy a protocol processing unit to implement standard protocols.
可选的,该通信系统还可以包括其他设备,例如可信锚点(trust anchor,TA)和服务请求网元等,图1中未示出。Optionally, the communication system may also include other devices, such as trusted anchors (trust anchors, TAs) and service requesting network elements, which are not shown in Figure 1 .
可信锚点可提供鉴权、认证和接入控制(authentication authorization access control,AAA)等可信服务,例如,可以通过分布式账本技术(distributed ledge technology,DLT)来实现。可信锚点可以存储不可被纂改的数据,例如终端设备或者网元的公钥、标识、索引,交易相关数据、或不能被篡改的重要数据等。Trusted anchors can provide trusted services such as authentication, authentication, and access control (AAA), for example, through distributed ledger technology (DLT). Trusted anchor points can store data that cannot be tampered with, such as public keys, identifiers, indexes of terminal devices or network elements, transaction-related data, or important data that cannot be tampered with.
可选地,可以通过链上(on-chain)结合链下(off-chain)存储的方式来扩展分布式账本技术的存储能力,例如在数据代理网元本地或数据存储网元中存储原始数据(链下),将原始数据的哈希值,或打包后的原始数据的摘要的哈希值存储在扩展DLT(链上)上,并同时在DLT(链上)保存用于指向原始数据的地址。通过对链下存储的原始数据或其摘要生成的新哈希值,与链上保存的哈希值进行对比,从而防止链下原始数据被篡改。Optionally, the storage capabilities of distributed ledger technology can be expanded by combining on-chain and off-chain storage, such as storing original data locally in the data broker network element or in the data storage network element. (off-chain), store the hash value of the original data, or the hash value of the digest of the packaged original data, in the extended DLT (on-chain), and at the same time save the hash value pointing to the original data in the DLT (on-chain) address. By comparing the new hash value generated from the original data or its digest stored off-chain with the hash value saved on the chain, this prevents the original data off-chain from being tampered with.
示例性地,可信锚点可以是分布式或集中式的部署形式。分布式部署的可信锚点可以是分布式账本技术DLT(比如区块链)的节点等,集中式部署的可信锚点可以是现有的认证、授权、接入控制等安全可信机制经过改造演进而实现的。By way of example, the trusted anchor may be deployed in a distributed or centralized manner. Trusted anchors for distributed deployment can be nodes of distributed ledger technology DLT (such as blockchain), and trusted anchors for centralized deployment can be existing security and trustworthiness mechanisms such as authentication, authorization, and access control. Achieved through transformation and evolution.
示例性地,可信锚点通过认证、授权、接入控制等数据访问控制,结合数据安全及隐私保护技术库,可以实现数据服务全流程的安全和隐私保护机制,可支持对数据服务全流程的安全和隐私保护,可支持溯源、审计、用户数据自主控制等可信数据服务要求,能够支撑实现数据共享及交易等对溯源及审计等可信机制的要求,可满足个人信息保护法(personal information protection law,PIPL)、通用数据保护条例(general data protection regulation,GDPR)等合规要求,可提供可信的数据服务。对用户数据处理的合规检测,可以实现去中心化的验证机制,避免单点可信及失效问题。For example, the trusted anchor point can realize the security and privacy protection mechanism of the entire data service process through data access control such as authentication, authorization, access control, etc., combined with the data security and privacy protection technology library, and can support the entire data service process. Security and privacy protection, can support trusted data service requirements such as traceability, auditing, and autonomous control of user data, can support the realization of data sharing and transactions, and other requirements for trustworthy mechanisms such as traceability and auditing, and can meet the requirements of the Personal Information Protection Law (personal information protection law). Information protection law, PIPL), General Data Protection Regulation (general data protection regulation, GDPR) and other compliance requirements can provide trusted data services. Compliance testing for user data processing can implement a decentralized verification mechanism to avoid single-point trust and failure issues.
服务请求网元可以包括应用、应用服务器或网络业务NS网元等,应用可以是运营商(或通信服务提供商(communication service provider,CSP))的用于网规网优、和/或网络人工智能(artificial intelligence,AI)等的应用,也可以是移动通信网络外部的应用(也可以称为第三方应用)。服务请求网元可以作为网络功能或网元独立部署在网络中。The service requesting network element may include an application, an application server or a network service NS network element, etc. The application may be an operator (or communication service provider (CSP)) used for network planning, network optimization, and/or network artificial intelligence. Applications such as artificial intelligence (AI) can also be applications outside the mobile communication network (also called third-party applications). Service requesting network elements can be independently deployed in the network as network functions or network elements.
可选的,图1中的各设备(例如接入网设备、终端设备等)可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。可以理解的是,上述功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。Optionally, each device in Figure 1 (such as access network equipment, terminal equipment, etc.) can be implemented by one device, or can be implemented by multiple devices together, or can be a functional module within one device. This application implements The example does not specifically limit this. It can be understood that the above functions can be either network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (eg, cloud platform).
例如,图1中的各设备均可以通过图2中的通信装置200来实现。图2所示为可适用于本申请实施例的一种通信装置的硬件结构示意图。该通信装置200包括至少一个处理器201,通信线路202,存储器203以及至少一个通信接口204。For example, each device in Figure 1 can be implemented by the communication device 200 in Figure 2 . FIG. 2 is a schematic diagram of the hardware structure of a communication device applicable to embodiments of the present application. The communication device 200 includes at least one processor 201, a communication line 202, a memory 203 and at least one communication interface 204.
处理器201可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。The processor 201 can be a general central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more processors used to control the execution of the program of the present application. integrated circuit.
通信线路202可包括一通路,在上述组件之间传送信息。Communication line 202 may include a path for communicating information between the above-mentioned components.
通信接口204,是任何收发器一类的装置(如天线等),用于与其他设备或通信网络通信,如以太网,RAN,无线局域网(wireless local area networks,WLAN)等。The communication interface 204 is any transceiver-type device (such as an antenna, etc.) used to communicate with other devices or communication networks, such as Ethernet, RAN, wireless local area networks (WLAN), etc.
存储器203可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路202与处理器相连接。存储器也可以和处理器集成在一起。本申请实施例提供的存储器通常可以具有非易失性。The memory 203 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory (RAM)) or other type that can store information and instructions. A dynamic storage device can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be used by a computer Any other medium for access, but not limited to this. The memory may exist independently and be connected to the processor through the communication line 202 . Memory can also be integrated with the processor. The memory provided by the embodiment of the present application may generally be non-volatile.
其中,存储器203用于存储执行本申请方案的计算机执行指令,并由处理器201来控制执行。处理器201用于执行存储器203中存储的计算机执行指令,从而实现本申请下述实施例提供的方法。Among them, the memory 203 is used to store computer execution instructions for executing the solution of the present application, and is controlled by the processor 201 for execution. The processor 201 is used to execute computer execution instructions stored in the memory 203, thereby implementing the methods provided by the following embodiments of the application.
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。Optionally, the computer-executed instructions in the embodiments of the present application may also be called application codes, which are not specifically limited in the embodiments of the present application.
在一种可能的实施方式中,处理器201可以包括一个或多个CPU,例如图2中的CPU0和CPU1。In a possible implementation, the processor 201 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 2 .
在一种可能的实施方式中,通信装置200可以包括多个处理器,例如图2中的处理器201和处理器207。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。In a possible implementation, the communication device 200 may include multiple processors, such as the processor 201 and the processor 207 in FIG. 2 . Each of these processors may be a single-CPU processor or a multi-CPU processor. A processor here may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
在一种可能的实施方式中,通信装置200还可以包括输出设备205和输入设备206。输出设备205和处理器201通信,可以以多种方式来显示信息。例如,输出设备205可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备206和处理器201通信,可以以多种方式接收用户的输入。例如,输入设备206可以是鼠标、键盘、触摸屏设备或传感设备等。In a possible implementation, the communication device 200 may also include an output device 205 and an input device 206. Output device 205 communicates with processor 201 and can display information in a variety of ways. For example, the output device 205 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. wait. Input device 206 communicates with processor 201 and may receive user input in a variety of ways. For example, the input device 206 may be a mouse, a keyboard, a touch screen device, a sensing device, or the like.
上述的通信装置200可以是一个通用设备或者是一个专用设备。在具体实现中,通信装置200可以是台式机、便携式电脑、网络服务器、掌上电脑(personal digital assistant,PDA)、移动手机、平板电脑、无线终端设备、嵌入式设备或有图2中类似结构的设备。本申请实施例不限定通信装置200的类型。The above-mentioned communication device 200 may be a general-purpose device or a special-purpose device. In a specific implementation, the communication device 200 may be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, or a device with a similar structure as shown in Figure 2 equipment. The embodiment of the present application does not limit the type of communication device 200.
以下结合附图,对本申请提供的通信方法进行说明。应理解的,在本申请中,第一节点、第四节点和第五节点可以为图1中的接入网设备,第二节点和第三节点可以为图1中的终端设备。为便于理解,可以将第一节点称为第一接入网设备,将第四节点称为第二接入网设备,将第五节点称为第三接入网设备,将第二节点称为第一终端设备,将第三节点称为第二终端设备。The communication method provided by this application will be described below with reference to the accompanying drawings. It should be understood that in this application, the first node, the fourth node and the fifth node may be the access network equipment in Figure 1, and the second node and the third node may be the terminal equipment in Figure 1. For ease of understanding, the first node may be called the first access network device, the fourth node may be called the second access network device, the fifth node may be called the third access network device, and the second node may be called The first terminal device and the third node are called second terminal devices.
参见图3,图3为本申请实施例提供的一种通信方法的流程示意图。如图3所示,该方法包括但不限于以下步骤:Referring to Figure 3, Figure 3 is a schematic flow chart of a communication method provided by an embodiment of the present application. As shown in Figure 3, the method includes but is not limited to the following steps:
301、第一接入网设备获取数据服务需求信息。301. The first access network device obtains data service requirement information.
可选的,步骤301可以包括:第一接入网设备接收服务请求网元发送的数据服务请求;第一接入网设备根据数据服务请求确定数据服务需求信息。其中,第一接入网设备接收服务请求网元发送的数据服务请求可以理解为:第一接入网设备接收数据编排网元发送的数据服务请求,数据编排网元接收服务请求网元发送的数据服务请求。Optionally, step 301 may include: the first access network device receiving the data service request sent by the service requesting network element; and the first access network device determining the data service requirement information according to the data service request. Wherein, the first access network device receiving the data service request sent by the service requesting network element can be understood as: the first access network device receives the data service request sent by the data orchestration network element, and the data orchestration network element receives the data service request sent by the service requesting network element. Data service request.
应理解的,数据服务请求可用于请求应用服务或业务服务。应用服务可指由应用、或应用服务器请求的服务,业务服务可指由网络业务网元请求的服务,在不同的场景中,数据服务请求所请求的服务可以不同。It should be understood that data service requests can be used to request application services or business services. Application services may refer to services requested by applications or application servers, and business services may refer to services requested by network service network elements. In different scenarios, the services requested by data service requests may be different.
示例性的,数据服务请求可用于请求以下至少一项服务:网络数据相关的服务、用户数据相关的服务、人工智能模型数据相关服务、物联网数据相关的服务。For example, the data service request can be used to request at least one of the following services: network data-related services, user data-related services, artificial intelligence model data-related services, and Internet of Things data-related services.
网络数据可以包括以下至少一项:日志(例如调试日志、安全日志、呼叫历史记录(call history record,CHR)日志等)、告警、话统、配置数据、最小化路测(minimization of drive-tests,MDT)数据、用户会话信息、通信感知一体化(integrated sensing and communication,ISAC)数据、数字孪生网络数据、网络元数据、网络状态、网络行为。Network data may include at least one of the following: logs (such as debugging logs, security logs, call history record (CHR) logs, etc.), alarms, traffic statistics, configuration data, minimization of drive-tests , MDT) data, user session information, integrated sensing and communication (ISAC) data, digital twin network data, network metadata, network status, and network behavior.
用户数据可以包括用户签约信息。例如,用户画像(profile)等。User data may include user subscription information. For example, user portrait (profile), etc.
物联网数据可以包括但不限于如下一项或多项:环境数据、传感器类数据、第一终端设备(第一终端设备为物联网设备)的测量数据。The Internet of Things data may include but is not limited to one or more of the following: environmental data, sensor data, and measurement data of the first terminal device (the first terminal device is an Internet of Things device).
人工智能(artificial intelligence,AI)模型数据可以包括以下至少一项:数据服务任务的训练数据集、数据服务任务的测试数据集、本地/全局模型数据、人工智能元数据。应理解的, 该数据服务任务例如可以是人工智能模型训练任务,也可以是人工智能模型训练任务的子任务。其中,人工智能模型训练任务即通过训练数据集对人工智能模型进行训练的任务,一般来说,在对人工智能模型训练后,还需要采用测试数据集验证人工智能模型的效果。Artificial Intelligence (AI) model data can include at least one of the following: training data sets for data service tasks, test data sets for data service tasks, local/global model data, and artificial intelligence metadata. It should be understood that the data service task may be, for example, an artificial intelligence model training task or a subtask of the artificial intelligence model training task. Among them, the artificial intelligence model training task is the task of training the artificial intelligence model through the training data set. Generally speaking, after training the artificial intelligence model, it is also necessary to use the test data set to verify the effect of the artificial intelligence model.
需要说明的,该数据服务任务是人工智能模型训练任务,这意味着可以通过训练数据集对人工智能模型进行训练作为一个数据服务任务,或者,将采用测试数据集验证人工智能模型的效果作为一个数据服务任务。该数据服务任务是人工智能模型训练任务的子任务,这意味着可以通过训练数据集对人工智能模型进行训练,并采用测试数据集验证人工智能模型的效果作为一个数据服务任务,而通过训练数据集对人工智能模型进行训练以及采用测试数据集验证人工智能模型的效果分别作为一个子任务。It should be noted that this data service task is an artificial intelligence model training task, which means that the artificial intelligence model can be trained through the training data set as a data service task, or the test data set can be used to verify the effect of the artificial intelligence model as a Data service tasks. This data service task is a subtask of the artificial intelligence model training task, which means that the artificial intelligence model can be trained through the training data set, and the test data set can be used to verify the effect of the artificial intelligence model as a data service task, and through the training data Training the artificial intelligence model and using the test data set to verify the effect of the artificial intelligence model are regarded as a sub-task.
应理解的,在本申请中,数据服务请求所请求的服务不同,数据服务任务也不同。It should be understood that in this application, the services requested by the data service requests are different, and the data service tasks are also different.
示例性的,数据服务请求用于请求网络数据相关的服务,若该网络数据为最小化路测数据,数据服务任务可以为第一终端设备采集最小化路测数据,并上报给第一接入网设备。For example, the data service request is used to request services related to network data. If the network data is minimized drive test data, the data service task can collect the minimized drive test data for the first terminal device and report it to the first access network equipment.
又示例性的,数据服务请求用于请求人工智能模型数据相关服务,具体的,数据服务请求用于请求训练联邦学习模型,该联邦学习模型用于进行服务质量预测。此时,数据服务任务可以为第一接入网设备向第一终端设备发送全局模型数据,第一终端设备在接收到全局模型数据后训练本地的联邦学习模型。In another example, the data service request is used to request artificial intelligence model data-related services. Specifically, the data service request is used to request training of a federated learning model, and the federated learning model is used for service quality prediction. At this time, the data service task may be that the first access network device sends global model data to the first terminal device, and the first terminal device trains a local federated learning model after receiving the global model data.
在本申请中,当数据服务请求用于请求以下至少一项服务:网络数据相关的服务、用户数据相关的服务、人工智能模型数据相关服务、物联网数据相关的服务时,数据服务需求信息例如可以包括以下至少一项:需要采集的数据类型、每次采集的数据量、总的数据量、采集数据的频率、对采集的数据进行数据预处理、数据分析等。其中,在本申请中,数据类型例如可以为网络数据、用户数据、人工智能模型数据和物联网数据等中的一项或多项。对采集的数据进行数据预处理例如对采集的数据进行以下一项处理:字段提取、格式转化、冗余数据清除、压缩、融合等。数据分析例如可以为对数据预处理后的数据(例如数据预处理后的数据去除了冗余数据)进行AI训练或AI推理,还可以为利用采集的数据进行网络行为分析等。In this application, when the data service request is used to request at least one of the following services: network data-related services, user data-related services, artificial intelligence model data-related services, and Internet of Things data-related services, the data service requirement information is such as It can include at least one of the following: the type of data to be collected, the amount of data collected each time, the total amount of data, the frequency of collecting data, data preprocessing of the collected data, data analysis, etc. In this application, the data type may be, for example, one or more of network data, user data, artificial intelligence model data, Internet of Things data, and the like. Perform data preprocessing on the collected data, such as performing the following processing on the collected data: field extraction, format conversion, redundant data removal, compression, fusion, etc. Data analysis can, for example, perform AI training or AI inference on preprocessed data (for example, data after data preprocessing with redundant data removed), or can also be used to conduct network behavior analysis using collected data.
另外,在一可能的实施方式中,在第一接入网设备接收数据编排网元发送的数据服务请求之前,第一接入网设备还可以向数据编排网元进行注册。In addition, in a possible implementation, before the first access network device receives the data service request sent by the data orchestration network element, the first access network device may also register with the data orchestration network element.
可选的,该方法还可以包括步骤302。Optionally, the method may also include step 302.
302、第一接入网设备根据数据服务需求信息,选取用于执行数据服务任务的第一终端设备。302. The first access network device selects the first terminal device for performing the data service task according to the data service requirement information.
应理解的,第一终端设备的数量可以为一个或多个,在此不做限定。It should be understood that the number of first terminal devices may be one or more, and is not limited here.
可选的,该方法还包括:第一接入网设备接收一个或多个第二终端设备发送的能力信息;该能力信息用于指示一个或多个第二终端设备支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力;第一接入网设备根据数据服务需求信息,选取用于执行数据服务任务的第一终端设备,包括:第一接入网设备根据数据服务需求信息和该能力信息,从一个或多个第二终端设备中选取用于执行数据服务任务的第一终端设备。这使得选取的第一终端设备在能力上能够满足数据服务需求信息。Optionally, the method further includes: the first access network device receiving capability information sent by one or more second terminal devices; the capability information is used to indicate that the one or more second terminal devices support at least one of the following: data Collection capabilities, data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities; the first access network device selects the first terminal device for performing data service tasks based on the data service demand information, including : The first access network device selects the first terminal device for performing the data service task from one or more second terminal devices according to the data service requirement information and the capability information. This enables the selected first terminal device to meet the data service requirement information in terms of capabilities.
在本申请中,能力信息例如可以携带在UE能力信息(UE capability information)消息中,也可以携带在数据服务能力信息(DS capability information)消息中,UE能力信息消息和数据服务能力信息消息可以为无线资源控制(radioresource control,RRC)消息。应理解的,数据服务能力信息消息为本申请新增的信令。In this application, the capability information can be carried, for example, in the UE capability information (UE capability information) message or in the data service capability information (DS capability information) message. The UE capability information message and the data service capability information message can be Radio resource control (RRC) message. It should be understood that the data service capability information message is newly added signaling in this application.
可选的,数据采集能力例如可以包括采集的数据类型。Optionally, the data collection capability may include, for example, the type of data collected.
可选的,数据预处理能力例如可以对数据的字段提取、格式转化、冗余数据清除、压缩、融合等。这里的数据例如可以是第一终端设备从第一接入网设备获取的数据,也可以是第一终端设备生成的数据。如第一终端设备从第一接入网设备获取数据后,第一终端设备可以利用数据代理网元进行数据预处理。又如,第一终端设备的数据代理网元提供接口供第一终端设备上的应用软件(APP)写入数据后上报给第一接入网设备,使得第一接入网设备可以利用数据代理网元进行数据预处理。Optionally, data preprocessing capabilities can include data field extraction, format conversion, redundant data removal, compression, fusion, etc. The data here may be, for example, data obtained by the first terminal device from the first access network device, or may be data generated by the first terminal device. For example, after the first terminal device obtains data from the first access network device, the first terminal device may use the data proxy network element to perform data preprocessing. For another example, the data proxy network element of the first terminal device provides an interface for the application software (APP) on the first terminal device to write data and then report it to the first access network device, so that the first access network device can use the data proxy. Network elements perform data preprocessing.
可选的,数据存储能力可以包括以下至少一项:可存储的数据容量、存储数据的加密算法、存储方式。Optionally, the data storage capability may include at least one of the following: storable data capacity, encryption algorithm for storing data, and storage method.
可选的,数据上报能力例如可以包括以下至少一项:上报的数据类型、数据传输间隔、单次传输的数据量、最大数据传输量、单次传输的最小数据传输量。Optionally, the data reporting capability may include, for example, at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
可选的,数据分析能力例如可以包括以下至少一项:支持的分析任务、是否支持AI训练、是否支持AI推理。数据保护能力例如可以为数据保护算法,例如,k-匿名化(k-anonymity)、l-多样化(l-diversity)、差分隐私、同态加密、安全多方计算等中的一项或多项。Optionally, the data analysis capability may include, for example, at least one of the following: supported analysis tasks, whether to support AI training, and whether to support AI inference. The data protection capability may be, for example, a data protection algorithm, such as one or more of k-anonymity, l-diversity, differential privacy, homomorphic encryption, secure multi-party computation, etc. .
可选的,数据压缩能力例如可以为数据压缩算法,例如,哈夫曼编码(Huffman Coding)、算术编码等中的一项或多项。Optionally, the data compression capability may be, for example, one or more of data compression algorithms, such as Huffman coding (Huffman Coding), arithmetic coding, etc.
可选的,第一接入网设备根据数据服务需求信息和该能力信息,从一个或多个第二终端设备中选取用于执行数据服务任务的第一终端设备可以包括:在服务请求网元对数据服务任务对应的数据具有访问权限时,第一接入网设备根据数据服务需求信息和该能力信息,从一个或多个第二终端设备中选取用于执行数据服务任务的第一终端设备。这可以实现数据的端到端(end to end,E2E)的可信服务要求。Optionally, the first access network device selects the first terminal device for performing the data service task from one or more second terminal devices according to the data service requirement information and the capability information, which may include: in the service requesting network element When having access rights to the data corresponding to the data service task, the first access network device selects the first terminal device for performing the data service task from one or more second terminal devices based on the data service requirement information and the capability information. . This can achieve end-to-end (E2E) trusted service requirements for data.
其中,数据服务任务对应的数据例如可以为网络数据、用户数据、人工智能模型数据和物联网数据等中的一项或多项。如,当数据服务任务为第一终端设备采集最小化路测数据,并上报给第一接入网设备时,数据服务任务对应的数据可以为最小化路测数据。又如,当数据服务任务可以为第一接入网设备向第一终端设备发送全局模型数据,第一终端设备在接收到全局模型数据后训练本地的联邦学习模型时,数据服务任务对应的数据可以为全局模型数据。The data corresponding to the data service task may be, for example, one or more of network data, user data, artificial intelligence model data, Internet of Things data, and the like. For example, when the data service task collects minimized drive test data for the first terminal device and reports it to the first access network device, the data corresponding to the data service task may be minimized drive test data. For another example, when the data service task can be that the first access network device sends global model data to the first terminal device, and the first terminal device trains a local federated learning model after receiving the global model data, the data corresponding to the data service task Can be global model data.
可选的,数据服务请求还可以包括服务请求网元的身份标识,在服务请求网元对数据服务任务对应的数据具有访问权限时,第一接入网设备根据数据服务需求信息和该能力信息,从一个或多个第二终端设备中选取用于执行数据服务任务的第一终端设备之前,该方法还可以包括:第一接入网设备向可信锚点发送授权请求(authorization request)消息,授权请求消息包括服务请求网元的身份标识,授权请求消息用于请求验证服务请求网元是否对数据服务任务对应的数据具有访问权限;第一接入网设备接收可信锚点发送的授权响应(authorization response)消息,授权响应消息用于指示服务请求网元对数据服务任务对应的数据具有访问权限。Optionally, the data service request may also include the identity of the service requesting network element. When the service requesting network element has access rights to the data corresponding to the data service task, the first access network device determines the request based on the data service requirement information and the capability information. , before selecting the first terminal device for performing the data service task from one or more second terminal devices, the method may further include: the first access network device sends an authorization request (authorization request) message to the trusted anchor point , the authorization request message includes the identity of the service requesting network element, and the authorization request message is used to request verification whether the service requesting network element has access rights to the data corresponding to the data service task; the first access network device receives the authorization sent by the trusted anchor point Response (authorization response) message. The authorization response message is used to indicate that the service requesting network element has access rights to the data corresponding to the data service task.
可选的,该方法还包括:第一接入网设备向一个或多个第二终端设备发送系统消息;系统消息用于指示第一接入网设备支持数据服务能力。这使得一个或多个第二终端设备可以获知第一接入网设备支持数据服务能力。应理解的,第一接入网设备向一个或多个第二终端设备发送系统消息可以在步骤302之前执行。其中,系统消息例如可以为系统信息块1(system information block,SIB1),如SIB1中新增字段用于指示第一接入网设备支持数据服务能力。Optionally, the method further includes: the first access network device sending a system message to one or more second terminal devices; the system message is used to indicate that the first access network device supports data service capabilities. This enables one or more second terminal devices to learn that the first access network device supports data service capabilities. It should be understood that sending the system message from the first access network device to one or more second terminal devices may be performed before step 302. The system message may be, for example, system information block 1 (SIB1). For example, a new field in SIB1 is used to indicate that the first access network device supports data service capabilities.
数据服务能力例如可以包括以下至少一项:支持与终端设备建立的逻辑链路的类型、数 据采集能力、数据预处理能力、数据分析能力、数据保护能力、数据压缩能力。支持与终端设备建立的逻辑链路的类型例如可以包括双向逻辑链路、单向下行链路、单向上行链路等中的一项或多项。应理解的,数据服务能力具体包括的内容对于终端设备来说不可见,终端设备也不关心。For example, data service capabilities may include at least one of the following: supporting the type of logical link established with the terminal device, data collection capabilities, data preprocessing capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities. The type of logical link that is supported to be established with the terminal device may include, for example, one or more of a bidirectional logical link, a unidirectional downlink, a unidirectional uplink, and the like. It should be understood that the specific content included in the data service capabilities is not visible to the terminal device, and the terminal device does not care.
在本申请中,逻辑链路可以称为逻辑通路,可以理解为空口数据面承载。双向逻辑链路可以称为专用(dedicated)数据面承载,如接入网设备通过双向逻辑链路可以下发数据给终端设备,终端设备也可以通过双向逻辑链路上报数据给接入网设备。单向下行链路可以称为组播(multicast)数据面承载,如接入网设备可以通过单向下行链路下发组播数据给一个或多个终端设备,使得一个或多个终端设备可以收到相同的组播数据。单向上行链路可以称为汇聚(aggregate)数据面承载,如一个或多个终端设备可以通过单向上行链路上报数据给接入网设备。In this application, a logical link can be called a logical path, and can be understood as an air interface data plane bearer. The bidirectional logical link can be called a dedicated data plane bearer. For example, the access network device can deliver data to the terminal device through the bidirectional logical link, and the terminal device can also report data to the access network device through the bidirectional logical link. The unidirectional downlink can be called a multicast data plane bearer. For example, the access network device can deliver multicast data to one or more terminal devices through the unidirectional downlink, so that one or more terminal devices can The same multicast data is received. The unidirectional uplink can be called an aggregate data plane bearer. For example, one or more terminal devices can report data to the access network device through the unidirectional uplink.
示例性的,参见图4,图4为本申请实施例提供的一种接入网设备与终端设备建立的逻辑链路的示意图。在图4的4-1中,接入网设备与任意一个终端设备建立的逻辑链路的类型为双向逻辑链路。在图4的4-2中,接入网设备与多个终端设备建立的逻辑链路的类型为单向下行逻辑链路。在图4的4-3中,接入网设备与任意一个终端设备建立的逻辑链路的类型为单向上行逻辑链路。For example, see FIG. 4 , which is a schematic diagram of a logical link established by an access network device and a terminal device according to an embodiment of the present application. In 4-1 of Figure 4, the type of logical link established between the access network device and any terminal device is a bidirectional logical link. In 4-2 of Figure 4, the type of logical link established by the access network device and multiple terminal devices is a unidirectional downlink logical link. In 4-3 of Figure 4, the type of logical link established between the access network device and any terminal device is a unidirectional uplink logical link.
可选的,该方法还可以包括步骤303。Optionally, the method may also include step 303.
303、第一接入网设备基于数据服务需求信息向第一终端设备发送第一消息;第一消息包括第一配置信息,第一配置信息包括第一逻辑链路的类型,第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,第一逻辑链路为第一节点与第二节点之间的逻辑链路,第一逻辑链路用于传输数据服务任务对应的数据。303. The first access network device sends a first message to the first terminal device based on the data service requirement information; the first message includes first configuration information, and the first configuration information includes the type of the first logical link, the first logical link The type is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink. The first logical link is a logical link between the first node and the second node. The first logical link is used to transmit data services. Data corresponding to the task.
相应的,第一终端设备接收第一接入网设备发送的第一消息。Correspondingly, the first terminal device receives the first message sent by the first access network device.
其中,第一消息例如可以为数据服务无线资源控制重配(DS RRC reconfiguration)消息,这可以满足后向兼容性。The first message may be, for example, a data service radio resource control reconfiguration (DS RRC reconfiguration) message, which can satisfy backward compatibility.
示例性的,第一消息例如可以为:For example, the first message may be:
Figure PCTCN2022118233-appb-000001
Figure PCTCN2022118233-appb-000001
其中,通过linkmode可以表示逻辑链路的类型。Among them, linkmode can represent the type of logical link.
可选的,若第一逻辑链路的类型为双向逻辑链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一接入网设备使用的数据保护算法、第一接入网设备使用的数据压缩算法、第一接入网设备进行数据传输的间隔、第一接入网设备单次传输的数据量、第一终端设备需要执行的任务、第一终端设备使用的数据保护算法、第一终端设备使用的数 据压缩算法、第一终端设备进行数据传输的间隔、第一终端设备单次传输的数据量、第一终端设备进行数据传输的最大数据传输量、第一终端设备单次传输的最小数据传输量。可以看出,这实现了数据安全保护、数据隐私保护等。同时,通过下发这些信息,使得第一终端设备可以获知第一接入网设备进行了数据安全保护、数据隐私保护等,也使得第一终端设备获知进行数据安全保护、数据隐私保护等所使用的相关算法。Optionally, if the type of the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, and a data protection algorithm used by the first access network device. , the data compression algorithm used by the first access network device, the interval between data transmission by the first access network device, the amount of data transmitted by the first access network device in a single time, the tasks that the first terminal device needs to perform, the first terminal The data protection algorithm used by the device, the data compression algorithm used by the first terminal device, the interval between data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, and the maximum data transmission amount by the first terminal device. , the minimum data transmission amount of a single transmission by the first terminal device. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by issuing this information, the first terminal device can learn that the first access network device has performed data security protection, data privacy protection, etc., and also the first terminal device can learn the methods used for data security protection, data privacy protection, etc. related algorithms.
其中,第一接入网设备使用的数据保护算法和第一终端设备使用的数据保护算法可以相同或不同,第一接入网设备使用的数据压缩算法和第一终端设备使用的数据压缩算法可以相同或不同。在第一终端设备的本地数据到达第一终端设备单次传输的最小数据传输量时,可以启动数据传输,也就是说,第一终端设备单次传输的最小数据传输量可以理解为启动数据传输的阈值。Wherein, the data protection algorithm used by the first access network device and the data protection algorithm used by the first terminal device may be the same or different, and the data compression algorithm used by the first access network device and the data compression algorithm used by the first terminal device may be Same or different. When the local data of the first terminal device reaches the minimum data transmission amount of a single transmission of the first terminal device, data transmission can be started. That is to say, the minimum data transmission amount of a single transmission of the first terminal device can be understood as starting data transmission. threshold.
应理解的,第一接入网设备通过第一逻辑链路向第一终端设备发送数据服务任务对应的数据之前,第一接入网设备例如可以根据第一接入网设备使用的数据压缩算法对第一接入网设备生成的数据进行压缩,再根据第一接入网设备使用的数据保护算法对压缩后的数据进行隐私保护,得到数据服务任务对应的数据。当第一终端设备获取数据服务任务对应的数据后,例如可以先进行隐私保护验证,并根据对隐私保护验证后的数据进行解压缩,再对解压缩后的数据(解压缩后的数据为第一接入网设备生成的数据)进行处理,如对解压缩后的数据的字段提取、格式转化、冗余数据清除、压缩、融合等。It should be understood that before the first access network device sends data corresponding to the data service task to the first terminal device through the first logical link, the first access network device may, for example, use the data compression algorithm according to the first access network device. Compress the data generated by the first access network device, and then perform privacy protection on the compressed data according to the data protection algorithm used by the first access network device to obtain data corresponding to the data service task. After the first terminal device obtains the data corresponding to the data service task, for example, it can first perform privacy protection verification, decompress the data after the privacy protection verification, and then decompress the decompressed data (the decompressed data is the first Data generated by an access network device) are processed, such as field extraction, format conversion, redundant data removal, compression, fusion, etc. of the decompressed data.
同理,第一终端设备通过第一逻辑链路向第一接入网设备发送数据服务任务对应的数据之前,第一终端设备例如可以根据第一终端设备使用的数据压缩算法对第一终端设备生成的数据进行压缩,再根据第一终端设备使用的数据保护算法对压缩后的数据进行隐私保护,得到数据服务任务对应的数据。当第一接入网设备获取数据服务任务对应的数据后,例如可以先进行隐私保护验证,并根据对隐私保护验证后的数据进行解压缩,再对解压缩后的数据(解压缩后的数据为第一终端设备生成的数据)进行处理,如对解压缩后的数据的字段提取、格式转化、冗余数据清除、压缩、融合等。Similarly, before the first terminal device sends data corresponding to the data service task to the first access network device through the first logical link, the first terminal device may, for example, compress the first terminal device according to the data compression algorithm used by the first terminal device. The generated data is compressed, and then privacy protection is performed on the compressed data according to the data protection algorithm used by the first terminal device to obtain data corresponding to the data service task. After the first access network device obtains the data corresponding to the data service task, for example, it can first perform privacy protection verification, decompress the data after the privacy protection verification, and then decompress the decompressed data (decompressed data (data generated by the first terminal device), such as field extraction, format conversion, redundant data removal, compression, fusion, etc. of the decompressed data.
可选的,若第一逻辑链路的类型为单向下行链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一接入网设备使用的数据保护算法、第一接入网设备使用的数据压缩算法、第一接入网设备进行数据传输的间隔、第一接入网设备单次传输的数据量。可以看出,这实现了数据安全保护、数据隐私保护等。同时,通过下发这些信息,使得第一终端设备可以获知第一接入网设备进行了数据安全保护、数据隐私保护等。Optionally, if the type of the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: tasks that the first terminal device needs to perform, and data protection used by the first access network device. algorithm, the data compression algorithm used by the first access network device, the interval for data transmission by the first access network device, and the amount of data transmitted by the first access network device in a single time. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by delivering this information, the first terminal device can learn that the first access network device has implemented data security protection, data privacy protection, etc.
可选的,若第一逻辑链路的类型为单向上行链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一终端设备使用的数据保护算法、第一终端设备使用的数据压缩算法、第一终端设备进行数据传输的间隔、第一终端设备单次传输的数据量、第一终端设备进行数据传输的最大数据传输量、第一终端设备单次传输的最小数据传输量。可以看出,这实现了数据安全保护、数据隐私保护等。同时,通过下发这些信息,使得第一终端设备获知进行数据安全保护、数据隐私保护等所使用的相关算法。Optionally, if the type of the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, a data protection algorithm used by the first terminal device, The data compression algorithm used by the first terminal device, the interval of data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, the maximum data transmission amount of data transmission by the first terminal device, the data transmission amount of the first terminal device in a single time Minimum amount of data transferred. It can be seen that this achieves data security protection, data privacy protection, etc. At the same time, by issuing this information, the first terminal device learns the relevant algorithms used for data security protection, data privacy protection, etc.
其中,第一终端设备需要执行的任务由数据服务任务的标识和数据服务任务的子任务的标识进行唯一标识。Wherein, the task that the first terminal device needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
示例性的,第一逻辑链路的类型为双向逻辑链路,第一配置信息包括数据服务任务的标识和数据通道(data pipeline,DP)标识(ID),数据通道标识用于指示数据服务任务的子任务。应理解的,第一终端设备的数量为多个时,多个第一终端设备中不同终端设备需要执行的任务可以相同或不同,即第一接入网设备下发给多个第一终端设备中不同终端设备的数据 通道标识可以相同或不同。Exemplarily, the type of the first logical link is a bidirectional logical link. The first configuration information includes an identifier of the data service task and a data pipeline (data pipeline, DP) identifier (ID). The data channel identifier is used to indicate the data service task. subtasks. It should be understood that when there are multiple first terminal devices, the tasks that different terminal devices among the multiple first terminal devices need to perform may be the same or different, that is, the first access network device delivers the tasks to the multiple first terminal devices. The data channel identifiers of different terminal devices can be the same or different.
又示例性的,第一逻辑链路的类型为单向下行链路,第一配置信息包括数据服务任务的标识和组播标识,组播标识用于指示数据服务任务的子任务。应理解的,第一终端设备的数量为多个时,多个第一终端设备中不同终端设备需要执行的任务可以相同或不同,即第一接入网设备下发给多个第一终端设备中不同终端设备的组播标识可以相同或不同。在组播场景下,多个第一终端设备也可以称为一组终端设备。另外,多个第一终端设备中任意一个第一终端设备获取到组播标识后,可以根据组播标识监听对应的空口资源。In another example, the type of the first logical link is a unidirectional downlink, and the first configuration information includes an identifier of the data service task and a multicast identifier, and the multicast identifier is used to indicate a sub-task of the data service task. It should be understood that when there are multiple first terminal devices, the tasks that different terminal devices among the multiple first terminal devices need to perform may be the same or different, that is, the first access network device delivers the tasks to the multiple first terminal devices. The multicast identifiers of different terminal devices can be the same or different. In a multicast scenario, multiple first terminal devices may also be called a group of terminal devices. In addition, after any first terminal device among the plurality of first terminal devices obtains the multicast identifier, it can monitor the corresponding air interface resource according to the multicast identifier.
又示例性的,第一逻辑链路的类型为单向上行链路,第一配置信息包括数据服务任务的标识和汇聚标识,汇聚标识用于指示数据服务任务的子任务。应理解的,第一终端设备的数量为多个时,多个第一终端设备中不同终端设备需要执行的任务可以相同或不同,即第一接入网设备下发给多个第一终端设备中不同终端设备的汇聚标识可以相同或不同。In another example, the type of the first logical link is a unidirectional uplink, and the first configuration information includes an identifier of the data service task and a convergence identifier, and the convergence identifier is used to indicate a sub-task of the data service task. It should be understood that when there are multiple first terminal devices, the tasks that different terminal devices among the multiple first terminal devices need to perform may be the same or different, that is, the first access network device delivers the tasks to the multiple first terminal devices. The aggregation identifiers of different terminal devices can be the same or different.
可选的,该方法还可以包括步骤304。Optionally, the method may also include step 304.
304、第一终端设备根据第一逻辑链路的类型,建立第一逻辑链路。304. The first terminal device establishes the first logical link according to the type of the first logical link.
可选的,第一终端设备还可以向第一接入网设备发送第一消息的响应消息,第一消息的响应消息用于指示第一终端设备已成功建立第一逻辑链路。其中,第一消息的响应消息例如可以为数据服务无线资源控制重配完成(DS RRC reconfiguration complete)消息。Optionally, the first terminal device may also send a response message to the first message to the first access network device, where the response message to the first message is used to indicate that the first terminal device has successfully established the first logical link. The response message of the first message may be, for example, a data service radio resource control reconfiguration complete (DS RRC reconfiguration complete) message.
可以看出,第一接入网设备可以根据数据服务需求信息向执行数据服务任务的第一终端设备发送包括逻辑链路的类型的配置信息,使得第一终端设备根据逻辑链路的类型建立的逻辑链路可以满足数据服务需求,而逻辑链路用于传输数据服务任务对应的数据,这为数据服务任务对应的数据提供了满足数据服务需求的传输方式。同时,因为逻辑链路用于传输数据服务任务对应的数据,所以可以减少对传输现有业务数据的干扰。It can be seen that the first access network device can send configuration information including the type of logical link to the first terminal device performing the data service task according to the data service requirement information, so that the first terminal device establishes the configuration information according to the type of the logical link. Logical links can meet data service requirements, and logical links are used to transmit data corresponding to data service tasks. This provides a transmission method for data corresponding to data service tasks that meets data service requirements. At the same time, because the logical link is used to transmit data corresponding to the data service task, it can reduce interference to the transmission of existing business data.
可选的,若第一逻辑链路的类型为单向下行链路,第一终端设备的数量为多个,该方法还包括:第一接入网设备发送组播数据,组播数据关联多个第一终端设备中不同终端设备对应的第一逻辑链路,组播数据为数据服务任务对应的数据。可以看出,因为第一接入网设备发送的组播数据可以关联多个第一终端设备中不同终端设备对应的第一逻辑链路,所以第一接入网设备不会分别向不同节点发送同一数据,节约了下行空口资源,提高了资源利用率,也使得不同终端设备可以收到相同的组播数据。Optionally, if the type of the first logical link is a unidirectional downlink and the number of first terminal devices is multiple, the method further includes: the first access network device sends multicast data, and the multicast data is associated with multiple A first logical link corresponding to different terminal devices among the first terminal devices, and the multicast data is data corresponding to the data service task. It can be seen that because the multicast data sent by the first access network device can be associated with the first logical links corresponding to different terminal devices among the multiple first terminal devices, the first access network device will not send the multicast data to different nodes respectively. The same data saves downlink air interface resources, improves resource utilization, and allows different terminal devices to receive the same multicast data.
可选的,在步骤304之后,未发生小区切换和掉话的场景,具体可以参考示例一。或者,发生小区切换的场景,具体可以参考示例二。或者,由于第一终端设备处于弱覆盖区域或第一终端设备受到干扰导致第一终端设备出现掉话,需要发起呼叫重建,具体可以参考示例三。Optionally, after step 304, cell switching and call drop do not occur. For details, please refer to Example 1. Or, for the scenario where cell switching occurs, please refer to Example 2 for details. Or, because the first terminal device is in a weak coverage area or the first terminal device is interfered with, resulting in a call drop, call reestablishment needs to be initiated. For details, please refer to Example 3.
示例一Example 1
可选的,该方法还包括:若数据服务任务对应的数据在第一逻辑链路上传输结束,第一接入网设备向第一终端设备发送第二消息。相应的,第一终端设备接收第一接入网设备发送的第二消息。第二消息用于指示第一终端设备删除第一逻辑链路。可以看出,在数据服务任务对应的数据在第一逻辑链路上传输结束时,可以通知第一终端设备删除第一逻辑链路,减少了第一终端设备维护第一逻辑链路时消耗的电量,节省了能耗。Optionally, the method further includes: if the data corresponding to the data service task is transmitted on the first logical link, the first access network device sends a second message to the first terminal device. Correspondingly, the first terminal device receives the second message sent by the first access network device. The second message is used to instruct the first terminal device to delete the first logical link. It can be seen that when the data corresponding to the data service task is transmitted on the first logical link, the first terminal device can be notified to delete the first logical link, which reduces the time consumed by the first terminal device when maintaining the first logical link. power, saving energy consumption.
需要说明的,在第一逻辑链路的类型为双向逻辑链路的情况下,数据服务任务对应的数据在第一逻辑链路上传输结束可以理解为以下至少一项:来自第一接入网设备的数据服务任务对应的数据在第一逻辑链路上传输结束、来自第一终端设备的数据服务任务对应的数据在第一逻辑链路上传输结束。在第一逻辑链路的类型为单向下行逻辑链路的情况下,数据服务 任务对应的数据在第一逻辑链路上传输结束可以理解为:来自第一接入网设备的数据服务任务对应的数据在第一逻辑链路上传输结束。在第一逻辑链路的类型为单向上行逻辑链路的情况下,数据服务任务对应的数据在第一逻辑链路上传输结束可以理解为:来自第一终端设备的数据服务任务对应的数据在第一逻辑链路上传输结束。It should be noted that when the type of the first logical link is a bidirectional logical link, the end of transmission of the data corresponding to the data service task on the first logical link can be understood as at least one of the following: from the first access network The data corresponding to the data service task of the device is transmitted on the first logical link, and the data corresponding to the data service task from the first terminal device is transmitted on the first logical link. When the type of the first logical link is a unidirectional downlink logical link, the end of transmission of the data corresponding to the data service task on the first logical link can be understood as: the corresponding data service task from the first access network device The data transmission ends on the first logical link. When the type of the first logical link is a unidirectional uplink logical link, the end of transmission of data corresponding to the data service task on the first logical link can be understood as: data corresponding to the data service task from the first terminal device The transmission ends on the first logical link.
可选的,第二消息还可以用于指示第一终端设备删除第一配置信息。Optionally, the second message may also be used to instruct the first terminal device to delete the first configuration information.
其中,第二消息例如可以为数据服务无线资源控制重配消息。应理解的,当第一终端设备删除第一逻辑链路后,第一终端设备还可以向第一接入网设备发送第二消息的响应消息,相应的,第一接入网设备可以接收第一终端设备发送的第二消息的响应消息。第二消息的响应消息用于指示第一终端设备已成功删除第一逻辑链路。第二消息的响应消息例如可以为数据服务无线资源控制重配完成消息。The second message may be, for example, a data service radio resource control reconfiguration message. It should be understood that after the first terminal device deletes the first logical link, the first terminal device may also send a response message of the second message to the first access network device, and accordingly, the first access network device may receive the second message. A response message to the second message sent by a terminal device. The response message of the second message is used to indicate that the first terminal device has successfully deleted the first logical link. The response message to the second message may be, for example, a data service radio resource control reconfiguration complete message.
示例二Example 2
在一可能的实施方式中,该方法还包括:若第一接入网设备确定第一终端设备进行小区切换后的小区为第一接入网设备的第一小区,第一接入网设备向第一终端设备发送第三消息,第三消息还用于指示第一终端设备保留第一配置信息。可以看出,在第一终端设备进行小区切换后的小区为第一接入网设备的第一小区时,可以通知第一终端设备保留第一配置信息,使得第一接入网设备无需再次向第一接入网设备发送第一配置信息。也就是说,当第一终端设备切换前后处于同一个基站内,数据服务上下文信息(如第一配置信息)无须进行传递,保障了数据服务的连续性。In a possible implementation, the method further includes: if the first access network device determines that the cell after the first terminal device performs cell switching is the first cell of the first access network device, the first access network device The first terminal device sends a third message, and the third message is also used to instruct the first terminal device to retain the first configuration information. It can be seen that when the cell after the first terminal device performs cell switching is the first cell of the first access network device, the first terminal device can be notified to retain the first configuration information, so that the first access network device does not need to report to the first cell again. The first access network device sends first configuration information. That is to say, when the first terminal device is in the same base station before and after switching, the data service context information (such as the first configuration information) does not need to be transmitted, thus ensuring the continuity of data services.
其中,第三消息例如可以为切换命令(handover command),如切换命令中新增信元用于指示第一终端设备保留第一配置信息。The third message may be, for example, a handover command. For example, a new information element in the handover command is used to instruct the first terminal device to retain the first configuration information.
需要说明的,第一终端设备在接收第一接入网设备发送的第三消息后,第一终端设备可以根据第一配置信息中第一逻辑链路的类型,建立第一小区下的第一逻辑链路,第一终端设备还可以通过该第一逻辑链路与第一接入网设备传输数据服务任务对应的剩余数据。这保障了数据服务的连续性。It should be noted that after the first terminal device receives the third message sent by the first access network device, the first terminal device can establish the first logical link under the first cell according to the type of the first logical link in the first configuration information. The first terminal device can also transmit remaining data corresponding to the data service task with the first access network device through the first logical link. This ensures the continuity of data services.
应理解的,第一终端设备通过该第一逻辑链路与第一接入网设备传输数据服务任务对应的剩余数据之前,第一终端设备可以发起随机接入,当第一终端设备成功接入第一小区时,可以向第一接入网设备指示小区切换成功的消息,该消息例如可以是无线资源控制重配完成(RRC reconfiguration complete)消息。当数据服务任务对应的剩余数据在该第一逻辑链路传输结束后,第一终端设备可以删除该第一逻辑链路和第一配置信息等。It should be understood that before the first terminal device transmits the remaining data corresponding to the data service task with the first access network device through the first logical link, the first terminal device may initiate random access. When the first terminal device successfully accesses In the first cell, a message indicating successful cell handover may be sent to the first access network device. The message may be, for example, a radio resource control reconfiguration complete (RRC reconfiguration complete) message. After the remaining data corresponding to the data service task is transmitted on the first logical link, the first terminal device can delete the first logical link, the first configuration information, and so on.
在另一可能的实施方式中,该方法还包括:若第一接入网设备确定第一终端设备进行小区切换后的小区为第二接入网设备的小区,第一接入网设备向第一终端设备发送第四消息,相应的,第一终端设备接收第一接入网设备发送的第四消息。第四消息用于指示第一终端设备删除第一逻辑链路。可以看出,在第一接入网设备确定第一终端设备进行小区切换后的小区不是第一接入网设备的小区时,第一接入网设备可以通知第一终端设备删除第一逻辑链路,减少了第一终端设备维护第一逻辑链路时消耗的电量,节省了能耗。也就是说,当第一终端设备切换前后处于不同基站内,因为迁移个体的数据到新基站并不能满足整体要求,所以终止该第一终端设备的数据服务,即通知第一终端设备删除第一逻辑链路。In another possible implementation, the method further includes: if the first access network device determines that the cell after the first terminal device performs cell switching is the cell of the second access network device, the first access network device sends a message to the second access network device. A terminal device sends a fourth message, and correspondingly, the first terminal device receives the fourth message sent by the first access network device. The fourth message is used to instruct the first terminal device to delete the first logical link. It can be seen that when the first access network device determines that the cell after the first terminal device performs cell switching is not the cell of the first access network device, the first access network device may notify the first terminal device to delete the first logical link. path, which reduces the power consumed by the first terminal device when maintaining the first logical link and saves energy consumption. That is to say, when the first terminal device is in different base stations before and after switching, because migrating individual data to the new base station cannot meet the overall requirements, the data service of the first terminal device is terminated, that is, the first terminal device is notified to delete the first terminal device. logical link.
其中,第四消息还可以用于指示第一终端设备删除第一配置信息,第四消息例如可以为切换命令(handover command)。The fourth message may also be used to instruct the first terminal device to delete the first configuration information, and the fourth message may be, for example, a handover command.
应理解的,第一接入网设备为第一终端设备进行小区切换前的接入网设备,可以称为源接入网设备,第二接入网设备为第一终端设备进行小区切换后的接入网设备,可以称为目标 接入网设备。It should be understood that the first access network device is the access network device before the first terminal device performs cell switching, which may be called the source access network device, and the second access network device is the access network device after the first terminal device performs cell switching. Access network equipment can be called target access network equipment.
可选的,第一终端设备接收第一接入网设备发送的第四消息后,第一终端设备可以发起随机接入,当第一终端设备成功接入第二接入网设备的小区时,可以向第二接入网设备指示小区切换成功的消息,该消息例如可以是无线资源控制重配完成(RRC reconfiguration complete)消息。此时,第一终端设备不与第二接入网设备建立逻辑链路,也就说,第一终端设备接入新基站的小区后,不建立逻辑链路。Optionally, after the first terminal device receives the fourth message sent by the first access network device, the first terminal device may initiate random access. When the first terminal device successfully accesses the cell of the second access network device, A message indicating successful cell handover may be sent to the second access network device. The message may be, for example, a radio resource control reconfiguration complete (RRC reconfiguration complete) message. At this time, the first terminal device does not establish a logical link with the second access network device. That is to say, after the first terminal device accesses the cell of the new base station, no logical link is established.
可选的,在第一接入网设备确定第一终端设备进行小区切换后的小区为第二接入网设备的小区的情况下,该方法还包括:若当前用于执行数据服务任务的第一终端设备的数量小于第一数量,第一接入网设备根据数据服务需求信息重新选取用于执行数据服务任务的终端设备,第一数量是第一接入网设备根据数据服务需求信息确定的数量。可以看出,在当前用于执行数据服务任务的第一终端设备的数量小于第一数量时,第一接入网设备可以重新选取新的终端设备来执行数据服务任务,保障了执行数据服务任务的终端设备的数量始终满足基于数据服务需求信息确定的数量。Optionally, when the first access network device determines that the cell after the first terminal device performs cell switching is the cell of the second access network device, the method further includes: if the third cell currently used to perform the data service task The number of a terminal device is less than the first number, and the first access network device reselects a terminal device for performing the data service task based on the data service requirement information. The first number is determined by the first access network device based on the data service requirement information. quantity. It can be seen that when the number of first terminal devices currently used to perform data service tasks is less than the first number, the first access network device can reselect a new terminal device to perform the data service tasks, ensuring the execution of the data service tasks. The number of terminal devices always meets the number determined based on the data service demand information.
示例三Example three
在一可能的实施方式中,该方法还包括:若第一接入网设备确定第一终端设备进行呼叫重建后选择的小区为第一接入网设备的第二小区,第一接入网设备重新向第一终端设备发送第一消息。可以看出,在第一接入网设备确定第一终端设备进行呼叫重建后选择的小区为第一接入网设备的第二小区时,第一接入网设备重新向第一终端设备发送第一消息,使得第一终端设备可以建立新小区下的第一逻辑链路,进而可以在新小区下的第一逻辑链路上传输数据服务任务对应的数据,保障了数据服务的连续性。In a possible implementation, the method further includes: if the first access network device determines that the cell selected by the first terminal device after call reestablishment is the second cell of the first access network device, the first access network device Resend the first message to the first terminal device. It can be seen that when the first access network device determines that the cell selected by the first terminal device after call reestablishment is the second cell of the first access network device, the first access network device re-sends the second cell to the first terminal device. This message allows the first terminal device to establish the first logical link under the new cell, and then transmit the data corresponding to the data service task on the first logical link under the new cell, thus ensuring the continuity of the data service.
需要说明的,在第一终端设备重新接收第一接入网设备发送的第一消息后,第一终端设备可以根据第一消息中第一逻辑链路的类型,建立第二小区下的第一逻辑链路,还可以通过该第一逻辑链路与第一接入网设备传输数据服务任务对应的剩余数据。这保障了数据服务的连续性。It should be noted that after the first terminal device re-receives the first message sent by the first access network device, the first terminal device can establish the first logical link in the second cell according to the type of the first logical link in the first message. The logical link may also transmit remaining data corresponding to the data service task with the first access network device through the first logical link. This ensures the continuity of data services.
可选的,第一终端设备可以根据第一消息中第一逻辑链路的类型,建立第二小区下的第一逻辑链路后,第一终端设备还可以重新向第一接入网设备发送第一消息的响应消息。Optionally, the first terminal device can establish the first logical link in the second cell according to the type of the first logical link in the first message, and then the first terminal device can also re-send the message to the first access network device. The response message to the first message.
应理解的,第一终端设备通过该第一逻辑链路与第一接入网设备传输数据服务任务对应的剩余数据之前,第一终端设备还可以与第一接入网设备完成重建连接过程。示例性的,第一终端设备向第一接入网设备发送无线资源控制重建请求(RRC reestablishment request)消息,该无线资源控制重建请求消息用于请求接入第二小区。当第一接入网设备接收无线资源控制重建请求消息后,可以向第一终端设备发送无线资源控制重建响应(RRC reestablishment response)消息,无线资源控制重建响应消息用于指示允许第一终端设备接入第二小区。当第一终端设备接收无线资源控制重建响应消息后,第一终端设备还可以向第一接入网设备发送无线资源控制重建完成(RRC reestablishment complete)消息,无线资源控制重建完成消息用于指示第一终端设备成功接入第二小区。It should be understood that before the first terminal device transmits the remaining data corresponding to the data service task with the first access network device through the first logical link, the first terminal device may also complete a connection reestablishment process with the first access network device. Exemplarily, the first terminal device sends a radio resource control reestablishment request (RRC reestablishment request) message to the first access network device, and the radio resource control reestablishment request message is used to request access to the second cell. After receiving the radio resource control reestablishment request message, the first access network device may send a radio resource control reestablishment response (RRC reestablishment response) message to the first terminal device. The radio resource control reestablishment response message is used to indicate that the first terminal device is allowed to access. Enter the second community. After the first terminal device receives the radio resource control reestablishment response message, the first terminal device may also send a radio resource control reestablishment complete (RRC reestablishment complete) message to the first access network device, and the radio resource control reestablishment complete message is used to indicate the third A terminal device successfully accesses the second cell.
可选的,当数据服务任务对应的剩余数据在该第一逻辑链路传输结束后,第一终端设备可以删除该第一逻辑链路和第一配置信息等。Optionally, after the remaining data corresponding to the data service task is transmitted on the first logical link, the first terminal device can delete the first logical link, the first configuration information, and so on.
在另一可能的实施方式中,该方法还包括:若第一接入网设备确定第一终端设备进行呼叫重建后选择的小区为第三接入网设备的小区,且当前用于执行数据服务任务的第一终端设备的数量小于第二数量,第一接入网设备根据数据服务需求信息重新选取用于执行数据服务任务的终端设备,第一数量是第一接入网设备根据数据服务需求信息确定的数量。可以看出, 在第一接入网设备确定第一终端设备进行呼叫重建后选择的小区不是第一接入网设备的小区,且当前用于执行数据服务任务的第一终端设备的数量小于第二数量时,第一接入网设备可以重新选取新的终端设备来执行数据服务任务,保障了执行数据服务任务的节点的数量始终满足基于数据服务需求信息确定的数量。In another possible implementation, the method further includes: if the first access network device determines that the cell selected by the first terminal device after call reestablishment is a cell of the third access network device and is currently used to perform data services The number of first terminal devices for the task is less than the second number. The first access network device reselects the terminal device for performing the data service task according to the data service requirement information. The first number is the first terminal device for performing the data service task according to the data service requirement. Information determines the quantity. It can be seen that, after the first access network device determines that the cell selected after the first terminal device performs call reestablishment is not the cell of the first access network device, and the number of first terminal devices currently used to perform data service tasks is less than the first terminal device. When the number is 2, the first access network device can reselect a new terminal device to perform the data service task, ensuring that the number of nodes performing the data service task always meets the number determined based on the data service requirement information.
可选的,在第一终端设备进行呼叫重建后接入的小区为第三接入网设备的小区的情况下,第一终端设备不与第三接入网设备建立逻辑链路,也就是说,第一终端设备接入新基站的小区后,不在新基站的小区下建立逻辑链路。当然,第三接入网设备也不会下发第一消息。其中,第一终端设备还可以与第三接入网设备完成重建连接过程,具体过程不加赘述。Optionally, when the cell that the first terminal device accesses after performing call reestablishment is the cell of the third access network device, the first terminal device does not establish a logical link with the third access network device, that is to say , after the first terminal device accesses the cell of the new base station, it does not establish a logical link under the cell of the new base station. Of course, the third access network device will not send the first message. The first terminal device may also complete a connection reestablishment process with the third access network device, and the specific process will not be described again.
应理解的,第一接入网设备为第一终端设备进行呼叫重建前的接入网设备,可以称为源接入网设备,第三接入网设备为第一终端设备进行呼叫重建后的接入网设备,可以称为目标接入网设备。It should be understood that the first access network device is the access network device before the first terminal device performs call reestablishment, which may be called the source access network device, and the third access network device is the first terminal device after the call reestablishment is performed. Access network equipment can be called target access network equipment.
上述主要从各个设备之间交互的角度对本申请提供的方案进行了介绍。可以理解的是,上述实现各设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。The above mainly introduces the solution provided by this application from the perspective of interaction between various devices. It can be understood that, in order to realize the above functions, the above-mentioned implementation devices include corresponding hardware structures and/or software modules for executing each function. Persons skilled in the art should easily realize that, with the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein, the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving the hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each specific application, but such implementations should not be considered beyond the scope of this application.
本申请实施例可以根据上述方法示例对接入网设备或终端设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中,上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。Embodiments of the present application can divide access network equipment or terminal equipment into functional modules according to the above method examples. For example, each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module. , the above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical function division. In actual implementation, there may be other division methods.
在采用集成的模块的情况下,参见图5,图5为本申请实施例提供的一种通信装置的结构示意图。该通信装置500可应用于上述图3所示的方法中,如图5所示,该通信装置500包括:处理模块501和收发模块502。处理模块501可以是一个或多个处理器,收发模块502可以是收发器或者通信接口。该通信装置可用于实现上述任一方法实施例中涉及终端设备或接入网设备,或用于实现上述任一方法实施例中涉及网元的功能。该网元或者网络功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。可选的,该通信装置500还可以包括存储模块503,用于存储通信装置500的程序代码和数据。In the case of using an integrated module, see FIG. 5 , which is a schematic structural diagram of a communication device provided by an embodiment of the present application. The communication device 500 can be applied to the method shown in FIG. 3 . As shown in FIG. 5 , the communication device 500 includes: a processing module 501 and a transceiver module 502 . The processing module 501 may be one or more processors, and the transceiver module 502 may be a transceiver or a communication interface. The communication device can be used to implement functions involving terminal equipment or access network equipment in any of the above method embodiments, or to implement functions involving network elements in any of the above method embodiments. The network element or network function can be a network element in a hardware device, a software function running on dedicated hardware, or a virtualized function instantiated on a platform (eg, cloud platform). Optionally, the communication device 500 may also include a storage module 503 for storing program codes and data of the communication device 500 .
一种实例,当该通信装置作为第一接入网设备或为应用于第一接入网设备中的芯片,并执行上述方法实施例中由第一接入网设备执行的步骤。收发模块502用于支持与终端设备(如第一终端设备、第二终端设备等)等之间的通信,收发模块具体执行图3中由第一接入网设备执行的发送和/或接收的动作,例如支持第一接入网设备执行本文中所描述的技术的其他过程。处理模块501可用于支持通信装置500执行上述方法实施例中的处理动作,例如,支持第一接入网设备执行步骤301、步骤302等一个或多个步骤,和/或本文中所描述的技术的其他过程。In one example, when the communication device serves as the first access network device or is a chip applied in the first access network device, and performs the steps performed by the first access network device in the above method embodiment. The transceiver module 502 is used to support communication with a terminal device (such as a first terminal device, a second terminal device, etc.). The transceiver module specifically performs the sending and/or receiving performed by the first access network device in Figure 3. Actions, such as supporting the first access network device to perform other processes of the technology described herein. The processing module 501 may be used to support the communication device 500 to perform the processing actions in the above method embodiments, for example, to support the first access network device to perform one or more steps such as step 301, step 302, and/or the technology described herein. other processes.
可选的,收发模块502,用于获取数据服务需求信息;处理模块501,用于根据数据服务需求信息,选取用于执行数据服务任务的第一终端设备;收发模块502,还用于基于数据服 务需求信息向第一终端设备发送第一消息;第一消息包括第一配置信息,第一配置信息包括第一逻辑链路的类型,第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,第一逻辑链路为第一接入网设备与第一终端设备之间的逻辑链路,第一逻辑链路用于传输数据服务任务对应的数据。Optionally, the transceiver module 502 is used to obtain data service requirement information; the processing module 501 is used to select the first terminal device for performing the data service task according to the data service requirement information; the transceiver module 502 is also used to The service requirement information sends a first message to the first terminal device; the first message includes first configuration information, the first configuration information includes the type of the first logical link, and the type of the first logical link is a bidirectional logical link or a unidirectional link. Downlink or unidirectional uplink, the first logical link is a logical link between the first access network device and the first terminal device, and the first logical link is used to transmit data corresponding to the data service task.
可选的,收发模块502,还用于接收一个或多个第二终端设备发送的能力信息;能力信息用于指示一个或多个第二终端设备支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力;在根据数据服务需求信息,选取用于执行数据服务任务的第一终端设备时,处理模块501,用于第一接入网设备根据数据服务需求信息和能力信息,从一个或多个第二终端设备中选取第一终端设备。Optionally, the transceiver module 502 is also used to receive capability information sent by one or more second terminal devices; the capability information is used to indicate that one or more second terminal devices support at least one of the following: data collection capability, data preset processing capability, data reporting capability, data analysis capability, data protection capability, data compression capability; when selecting the first terminal device for performing data service tasks according to the data service requirement information, the processing module 501 is used for the first access The network device selects a first terminal device from one or more second terminal devices according to the data service requirement information and capability information.
可选的,数据上报能力包括以下至少一项:上报的数据类型、数据传输间隔、单次传输的数据量、最大数据传输量、单次传输的最小数据传输量。Optionally, the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
可选的,收发模块502,还用于向一个或多个第二终端设备发送系统消息;其中,系统消息用于指示第一接入网设备支持数据服务能力。Optionally, the transceiver module 502 is also configured to send a system message to one or more second terminal devices; wherein the system message is used to indicate that the first access network device supports data service capabilities.
可选的,若第一逻辑链路的类型为双向逻辑链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一接入网设备使用的数据保护算法、第一接入网设备使用的数据压缩算法、第一接入网设备进行数据传输的间隔、第一接入网设备单次传输的数据量、第一终端设备需要执行的任务、第一终端设备使用的数据保护算法、第一终端设备使用的数据压缩算法、第一终端设备进行数据传输的间隔、第一终端设备单次传输的数据量、第一终端设备进行数据传输的最大数据传输量、第一终端设备单次传输的最小数据传输量。Optionally, if the type of the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, and a data protection algorithm used by the first access network device. , the data compression algorithm used by the first access network device, the interval between data transmission by the first access network device, the amount of data transmitted by the first access network device in a single time, the tasks that the first terminal device needs to perform, the first terminal The data protection algorithm used by the device, the data compression algorithm used by the first terminal device, the interval between data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, and the maximum data transmission amount by the first terminal device. , the minimum data transmission amount of a single transmission by the first terminal device.
可选的,若第一逻辑链路的类型为单向下行链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一接入网设备使用的数据保护算法、第一接入网设备使用的数据压缩算法、第一接入网设备进行数据传输的间隔、第一接入网设备单次传输的数据量。Optionally, if the type of the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: tasks that the first terminal device needs to perform, and data protection used by the first access network device. algorithm, the data compression algorithm used by the first access network device, the interval for data transmission by the first access network device, and the amount of data transmitted by the first access network device in a single time.
可选的,若第一逻辑链路的类型为单向上行链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一终端设备使用的数据保护算法、第一终端设备使用的数据压缩算法、第一终端设备进行数据传输的间隔、第一终端设备单次传输的数据量、第一终端设备进行数据传输的最大数据传输量、第一终端设备单次传输的最小数据传输量。Optionally, if the type of the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, a data protection algorithm used by the first terminal device, The data compression algorithm used by the first terminal device, the interval of data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, the maximum data transmission amount of data transmission by the first terminal device, the data transmission amount of the first terminal device in a single time Minimum amount of data transferred.
可选的,第一终端设备需要执行的任务由数据服务任务的标识和数据服务任务的子任务的标识进行唯一标识。Optionally, the task that the first terminal device needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
可选的,若第一逻辑链路的类型为单向下行链路,第一终端设备的数量为多个,收发模块502,还用于发送组播数据,组播数据关联多个第一终端设备中不同节点对应的第一逻辑链路,组播数据为数据服务任务对应的数据。Optionally, if the type of the first logical link is a unidirectional downlink and the number of first terminal devices is multiple, the transceiver module 502 is also used to send multicast data, and the multicast data is associated with multiple first terminals. The first logical link corresponding to different nodes in the device, and the multicast data is the data corresponding to the data service task.
可选的,收发模块502,还用于:若数据服务任务对应的数据在第一逻辑链路上传输结束,第一接入网设备向第一终端设备发送第二消息,第二消息用于指示第一终端设备删除第一逻辑链路。Optionally, the transceiver module 502 is also configured to: if the data corresponding to the data service task is transmitted on the first logical link, the first access network device sends a second message to the first terminal device, and the second message is used to Instruct the first terminal device to delete the first logical link.
可选的,收发模块502,还用于:若第一接入网设备确定第一终端设备进行小区切换后的小区为第一接入网设备的第一小区,第一接入网设备向第一终端设备发送第三消息,第三消息还用于指示第一终端设备保留第一配置信息。Optionally, the transceiver module 502 is also configured to: if the first access network device determines that the cell after the first terminal device performs cell switching is the first cell of the first access network device, the first access network device sends a message to the first cell of the first access network device. A terminal device sends a third message, and the third message is also used to instruct the first terminal device to retain the first configuration information.
可选的,收发模块502,还用于:若第一接入网设备确定第一终端设备进行小区切换后的小区为第二接入网设备的小区,第一接入网设备向第一终端设备发送第四消息,第四消息用于指示第一终端设备删除第一逻辑链路。Optionally, the transceiver module 502 is also configured to: if the first access network device determines that the cell after the first terminal device performs cell switching is the cell of the second access network device, the first access network device sends a message to the first terminal device. The device sends a fourth message, and the fourth message is used to instruct the first terminal device to delete the first logical link.
可选的,处理模块501,还用于:若当前用于执行数据服务任务的第一终端设备的数量 小于第一数量,第一接入网设备根据数据服务需求信息重新选取用于执行数据服务任务的节点,第一数量是第一接入网设备根据数据服务需求信息确定的数量。Optionally, the processing module 501 is also configured to: if the number of first terminal devices currently used to perform data service tasks is less than the first number, the first access network device reselects the first terminal device for performing data services according to the data service requirement information. The first number of task nodes is the number determined by the first access network device based on the data service requirement information.
可选的,收发模块502,还用于:若第一接入网设备确定第一终端设备进行呼叫重建后选择的小区为第一接入网设备的第二小区,第一接入网设备重新向第一终端设备发送第一消息。Optionally, the transceiver module 502 is also configured to: if the first access network device determines that the cell selected by the first terminal device after call reestablishment is the second cell of the first access network device, the first access network device re- Send the first message to the first terminal device.
可选的,处理模块501,还用于:若第一接入网设备确定第一终端设备进行呼叫重建后选择的小区为第三接入网设备的小区,且当前用于执行数据服务任务的第一终端设备的数量小于第二数量,第一接入网设备根据数据服务需求信息重新选取用于执行数据服务任务的节点,第一数量是第一接入网设备根据数据服务需求信息确定的数量。Optionally, the processing module 501 is also configured to: if the first access network device determines that the cell selected by the first terminal device after call reestablishment is the cell of the third access network device, and the cell currently used to perform data service tasks The number of first terminal devices is less than the second number. The first access network device reselects nodes for performing data service tasks based on the data service requirement information. The first number is determined by the first access network device based on the data service requirement information. quantity.
又一种实例,当该通信装置作为第一终端设备或为应用于第一终端设备中的芯片,并执行上述方法实施例中由第一终端设备执行的步骤。收发模块502用于支持与接入网设备(如第一接入网设备、第二接入网设备、第三接入设备等)等之间的通信,收发模块具体执行图3中由第一终端设备执行的发送和/或接收的动作,例如支持第一终端设备执行本文中所描述的技术的其他过程。处理模块501可用于支持通信装置500执行上述方法实施例中的处理动作,例如,支持第一终端设备执行步骤304,和/或本文中所描述的技术的其他过程。In another example, when the communication device serves as a first terminal device or is a chip applied in the first terminal device, and performs the steps performed by the first terminal device in the above method embodiment. The transceiver module 502 is used to support communication with access network equipment (such as a first access network device, a second access network device, a third access device, etc.), etc. The transceiver module specifically executes the first step in Figure 3. The sending and/or receiving actions performed by the terminal device, for example, support the first terminal device to perform other processes of the technology described herein. The processing module 501 may be used to support the communication device 500 to perform the processing actions in the above method embodiments, for example, to support the first terminal device to perform step 304, and/or other processes of the technology described herein.
收发模块502,用于从第一接入网设备接收第一消息;第一消息包括第一配置信息,第一配置信息包括第一逻辑链路的类型,第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,第一逻辑链路为第一接入网设备与第一终端设备之间的逻辑链路,第一逻辑链路用于传输数据服务任务对应的数据;处理模块501,用于根据第一逻辑链路的类型,建立第一逻辑链路。The transceiver module 502 is configured to receive a first message from the first access network device; the first message includes first configuration information, the first configuration information includes the type of the first logical link, and the type of the first logical link is bidirectional logic. link, a unidirectional downlink or a unidirectional uplink, the first logical link is a logical link between the first access network device and the first terminal device, and the first logical link is used to transmit data service tasks The corresponding data processing module 501 is used to establish the first logical link according to the type of the first logical link.
可选的,收发模块502,还用于向第一接入网设备发送的第一终端设备的能力信息;第一终端设备的能力信息用于指示第一终端设备支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力。Optionally, the transceiving module 502 is also used to send the capability information of the first terminal device to the first access network device; the capability information of the first terminal device is used to indicate that the first terminal device supports at least one of the following: data collection. capabilities, data preprocessing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities.
可选的,数据上报能力包括以下至少一项:上报的数据类型、数据传输间隔、单次传输的数据量、最大数据传输量、单次传输的最小数据传输量。Optionally, the data reporting capability includes at least one of the following: reported data type, data transmission interval, data amount for a single transmission, maximum data transmission amount, and minimum data transmission amount for a single transmission.
可选的,收发模块502,还用于接收第一接入网设备发送的系统消息;其中,系统消息用于指示第一接入网设备支持数据服务能力。Optionally, the transceiving module 502 is also configured to receive a system message sent by the first access network device; wherein the system message is used to indicate that the first access network device supports data service capabilities.
可选的,若第一逻辑链路为双向逻辑链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一接入网设备使用的数据保护算法、第一接入网设备使用的数据压缩算法、第一接入网设备进行数据传输的间隔、第一接入网设备单次传输的数据量、第一终端设备需要执行的任务、第一终端设备使用的数据保护算法、第一终端设备使用的数据压缩算法、第一终端设备进行数据传输的间隔、第一终端设备单次传输的数据量、第一终端设备进行数据传输的最大数据传输量、第一终端设备单次传输的最小数据传输量。Optionally, if the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, a data protection algorithm used by the first access network device, The data compression algorithm used by the first access network device, the interval between data transmission by the first access network device, the amount of data transmitted by the first access network device in a single time, the tasks that the first terminal device needs to perform, and the use of the first terminal device The data protection algorithm, the data compression algorithm used by the first terminal device, the interval of data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, the maximum data transmission amount of data transmission by the first terminal device, the third The minimum data transmission amount for a single transmission by a terminal device.
可选的,若第一逻辑链路为单向下行链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一接入网设备使用的数据保护算法、第一接入网设备使用的数据压缩算法、第一接入网设备进行数据传输的间隔、第一接入网设备单次传输的数据量。Optionally, if the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: a task that the first terminal device needs to perform, a data protection algorithm used by the first access network device, The data compression algorithm used by the first access network device, the interval for data transmission by the first access network device, and the amount of data transmitted by the first access network device in a single time.
可选的,若第一逻辑链路为单向上行链路,第一配置信息用于指示以下至少一项:第一终端设备需要执行的任务、第一终端设备使用的数据保护算法、第一终端设备使用的数据压缩算法、第一终端设备进行数据传输的间隔、第一终端设备单次传输的数据量、第一终端设备进行数据传输的最大数据传输量、第一终端设备单次传输的最小数据传输量。Optionally, if the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: the task that the first terminal device needs to perform, the data protection algorithm used by the first terminal device, the first The data compression algorithm used by the terminal device, the interval between data transmission by the first terminal device, the amount of data transmitted by the first terminal device in a single time, the maximum data transmission amount by the first terminal device in data transmission, the number of data transmitted by the first terminal device in a single time Minimum data transfer amount.
可选的,第一终端设备需要执行的任务由数据服务任务的标识和数据服务任务的子任务的标识进行唯一标识。Optionally, the task that the first terminal device needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
可选的,收发模块502,还用于接收第一接入网设备发送的第二消息,第二消息用于指示第一终端设备删除第一逻辑链路。Optionally, the transceiving module 502 is also configured to receive a second message sent by the first access network device, where the second message is used to instruct the first terminal device to delete the first logical link.
可选的,第一终端设备进行小区切换后的小区为第一接入网设备的第一小区,收发模块502,还用于接收第一接入网设备发送的第三消息,第三消息用于指示第一终端设备保留第一配置信息;处理模块501,还用于根据第一配置信息中第一逻辑链路的类型,建立第一小区下的第一逻辑链路;收发模块502,还用于通过第一逻辑链路与第一接入网设备传输数据服务任务对应的剩余数据。Optionally, the cell after the first terminal device performs cell switching is the first cell of the first access network device. The transceiver module 502 is also used to receive the third message sent by the first access network device. The third message is Instructing the first terminal device to retain the first configuration information; the processing module 501 is also used to establish the first logical link under the first cell according to the type of the first logical link in the first configuration information; the transceiving module 502 is also configured to Used to transmit remaining data corresponding to the data service task with the first access network device through the first logical link.
可选的,第一终端设备进行小区切换后的小区为第二接入网设备的小区,收发模块502,还用于接收第一接入网设备发送的第四消息,第四消息用于指示第一终端设备删除第一逻辑链路。Optionally, the cell after the first terminal device performs cell switching is the cell of the second access network device. The transceiver module 502 is also configured to receive a fourth message sent by the first access network device. The fourth message is used to indicate The first terminal device deletes the first logical link.
可选的,处理模块501,还用于不与第二接入网设备建立逻辑链路。Optionally, the processing module 501 is also configured not to establish a logical link with the second access network device.
可选的,第一终端设备进行呼叫重建后选择的小区为第一接入网设备的第二小区,收发模块502,还用于重新接收第一接入网设备发送的第一消息;处理模块501,还用于根据第一消息中第一逻辑链路的类型,建立第二小区下的第一逻辑链路;收发模块502,还用于通过第一逻辑链路与第一接入网设备传输数据服务任务对应的剩余数据。Optionally, the cell selected by the first terminal device after call reestablishment is the second cell of the first access network device. The transceiver module 502 is also configured to re-receive the first message sent by the first access network device; the processing module 501 is also used to establish the first logical link in the second cell according to the type of the first logical link in the first message; the transceiver module 502 is also used to communicate with the first access network device through the first logical link. Transfer the remaining data corresponding to the data service task.
可选的,第一终端设备进行呼叫重建后选择的小区为第三接入网设备的小区,处理模块501,还用于不与第三接入网设备建立逻辑链路。Optionally, the cell selected by the first terminal device after call reestablishment is the cell of the third access network device. The processing module 501 is also configured not to establish a logical link with the third access network device.
在一种可能的实施方式中,当终端设备或接入网设备为芯片时,收发模块502可以是通信接口、管脚或电路等。通信接口可用于输入待处理的数据至处理器,并可以向外输出处理器的处理结果。具体实现中,通信接口可以是通用输入输出(general purpose input output,GPIO)接口,可以和多个外围设备(如显示器(LCD)、摄像头(camara)、射频(radio frequency,RF)模块、天线等等)连接。通信接口通过总线与处理器相连。In a possible implementation, when the terminal device or the access network device is a chip, the transceiver module 502 may be a communication interface, a pin or a circuit, etc. The communication interface can be used to input data to be processed to the processor, and can output the processing results of the processor to the outside. In specific implementation, the communication interface can be a general purpose input output (GPIO) interface, which can communicate with multiple peripheral devices (such as display (LCD), camera (camara), radio frequency (RF) module, antenna, etc. etc.) connection. The communication interface is connected to the processor through a bus.
处理模块501可以是处理器,该处理器可以执行存储模块存储的计算机执行指令,以使该芯片执行图3实施例涉及的方法。The processing module 501 may be a processor, and the processor may execute computer execution instructions stored in the storage module, so that the chip executes the method involved in the embodiment of FIG. 3 .
进一步的,处理器可以包括控制器、运算器和寄存器。示例性的,控制器主要负责指令译码,并为指令对应的操作发出控制信号。运算器主要负责执行定点或浮点算数运算操作、移位操作以及逻辑操作等,也可以执行地址运算和转换。寄存器主要负责保存指令执行过程中临时存放的寄存器操作数和中间操作结果等。具体实现中,处理器的硬件架构可以是专用集成电路(application specific integrated circuits,ASIC)架构、无互锁管道阶段架构的微处理器(microprocessor without interlocked piped stages architecture,MIPS)架构、进阶精简指令集机器(advanced RISC machines,ARM)架构或者网络处理器(network processor,NP)架构等等。处理器可以是单核的,也可以是多核的。Further, the processor may include a controller, arithmetic unit, and a register. For example, the controller is mainly responsible for decoding instructions and sending control signals for operations corresponding to the instructions. The arithmetic unit is mainly responsible for performing fixed-point or floating-point arithmetic operations, shift operations, and logical operations. It can also perform address operations and conversions. Registers are mainly responsible for storing register operands and intermediate operation results temporarily stored during instruction execution. In specific implementation, the hardware architecture of the processor can be application specific integrated circuits (ASIC) architecture, microprocessor without interlocked piped stages architecture (MIPS) architecture, advanced reduced instructions Set machine (advanced RISC machines, ARM) architecture or network processor (network processor, NP) architecture, etc. The processor can be single-core or multi-core.
该存储模块可以为该芯片内的存储模块,如寄存器、缓存等。存储模块也可以是位于芯片外部的存储模块,如只读存储器(Read Only Memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(Random Access Memory,RAM)等。The storage module can be a storage module within the chip, such as a register, cache, etc. The storage module can also be a storage module located outside the chip, such as Read Only Memory (ROM) or other types of static storage devices that can store static information and instructions, Random Access Memory (Random Access Memory, RAM), etc. .
需要说明的,处理器、接口各自对应的功能既可以通过硬件设计实现,也可以通过软件设计来实现,还可以通过软硬件结合的方式来实现,这里不作限制。It should be noted that the corresponding functions of the processor and the interface can be realized through hardware design, software design, or a combination of software and hardware. There are no restrictions here.
图6为本申请实施例提供的一种简化的终端设备的结构示意图。便于理解和图示方便,图6中,终端设备以手机作为例子,如图6所示,终端设备包括至少一个处理器,还可以包括射频电路、天线以及输入输出装置。其中,处理器可用于对通信协议以及通信数据进行处理,还可以用于对终端设备进行控制,执行软件程序,处理软件程序的数据等。该终端设备还可以包括存储器,存储器主要用于存储软件程序和数据,这些涉及的程序可以在该通信装置出厂时即装载再存储器中,也可以在后期需要的时候再装载入存储器。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号,且天线为本申请实施例提供的天线。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的终端设备可以不具有输入输出装置。Figure 6 is a schematic structural diagram of a simplified terminal device provided by an embodiment of the present application. For ease of understanding and illustration, in Figure 6, the terminal device takes a mobile phone as an example. As shown in Figure 6, the terminal device includes at least one processor, and may also include a radio frequency circuit, an antenna, and an input and output device. Among them, the processor can be used to process communication protocols and communication data, and can also be used to control terminal devices, execute software programs, process data of software programs, etc. The terminal device may also include a memory, which is mainly used to store software programs and data. These related programs can be loaded into the memory when the communication device leaves the factory, or can be loaded into the memory when needed later. Radio frequency circuits are mainly used for conversion of baseband signals and radio frequency signals and processing of radio frequency signals. The antenna is mainly used to transmit and receive radio frequency signals in the form of electromagnetic waves, and the antenna is the antenna provided in the embodiment of the present application. Input and output devices, such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal equipment may not have input and output devices.
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。为便于说明,图6中仅示出了一个存储器和处理器。在实际的终端设备产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。When data needs to be sent, the processor performs baseband processing on the data to be sent and outputs the baseband signal to the radio frequency circuit. The radio frequency circuit performs radio frequency processing on the baseband signal and then sends the radio frequency signal out in the form of electromagnetic waves through the antenna. When data is sent to the terminal device, the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor. The processor converts the baseband signal into data and processes the data. For ease of illustration, only one memory and processor are shown in FIG. 6 . In an actual terminal device product, there may be one or more processors and one or more memories. Memory can also be called storage media or storage devices. The memory may be provided independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
在本申请实施例中,可以将具有收发功能的天线和射频电路视为终端设备的接收单元和发送单元(也可以统称为收发单元),将具有处理功能的处理器视为终端设备的处理单元。如图6所示,终端设备包括接收模块31、处理模块32和发送模块33。接收模块31也可以称为接收器、接收机、接收电路等,发送模块33也可以称为发送器、发射器、发射机、发射电路等。处理模块32也可以称为处理器、处理单板、处理装置等。In the embodiment of the present application, the antenna and the radio frequency circuit with the transceiver function can be regarded as the receiving unit and the transmitting unit of the terminal device (which can also be collectively referred to as the transceiver unit), and the processor with the processing function can be regarded as the processing unit of the terminal device. . As shown in FIG. 6 , the terminal device includes a receiving module 31 , a processing module 32 and a sending module 33 . The receiving module 31 may also be called a receiver, a receiver, a receiving circuit, etc., and the sending module 33 may also be called a transmitter, a transmitter, a transmitter, a transmitting circuit, etc. The processing module 32 may also be called a processor, a processing board, a processing device, etc.
例如,处理模块32用于执行图3所示实施例中终端设备的功能。For example, the processing module 32 is used to perform the functions of the terminal device in the embodiment shown in FIG. 3 .
图7为本申请实施例提供的一种简化的接入网设备的结构示意图。接入网设备包括射频信号收发及转换部分以及基带部分42,该射频信号收发及转换部分又包括接收模块41部分和发送模块43部分(也可以统称为收发模块)。射频信号收发及转换部分主要用于射频信号的收发以及射频信号与基带信号的转换;基带部分42主要用于基带处理,对接入网设备进行控制等。接收模块41也可以称为接收器、接收机、接收电路等,发送模块43也可以称为发送器、发射器、发射机、发射电路等。基带部分42通常是接入网设备的控制中心,也可以称为处理模块,用于执行上述图3中关于接入网设备所执行的步骤。具体可参见上述相关部分的描述。Figure 7 is a schematic structural diagram of a simplified access network device provided by an embodiment of the present application. The access network equipment includes a radio frequency signal transceiver and conversion part and a baseband part 42. The radio frequency signal transceiver and conversion part further includes a receiving module 41 part and a transmitting module 43 part (which may also be collectively referred to as a transceiver module). The radio frequency signal transceiving and conversion part is mainly used for transmitting and receiving radio frequency signals and converting radio frequency signals and baseband signals; the baseband part 42 is mainly used for baseband processing, controlling access network equipment, etc. The receiving module 41 may also be called a receiver, a receiver, a receiving circuit, etc., and the sending module 43 may also be called a transmitter, a transmitter, a transmitter, a transmitting circuit, etc. The baseband part 42 is usually the control center of the access network equipment, which can also be called a processing module, and is used to perform the steps performed by the access network equipment in FIG. 3 above. For details, please refer to the descriptions in the relevant sections above.
基带部分42可以包括一个或多个单板,每个单板可以包括一个或多个处理器和一个或多个存储器,处理器用于读取和执行存储器中的程序以实现基带处理功能以及对接入网设备的控制。若存在多个单板,各个单板之间可以互联以增加处理能力。作为一中可选的实施方式,也可以是多个单板共用一个或多个处理器,或者是多个单板共用一个或多个存储器,或者是多个单板同时共用一个或多个处理器。The baseband part 42 may include one or more single boards. Each single board may include one or more processors and one or more memories. The processor is used to read and execute programs in the memory to implement baseband processing functions and docking. Control of network access equipment. If there are multiple boards, each board can be interconnected to increase processing capabilities. As an optional implementation, multiple single boards may share one or more processors, or multiple single boards may share one or more memories, or multiple single boards may share one or more processors at the same time. device.
例如,发送模块43用于执行图3所示实施例中接入网设备的功能。For example, the sending module 43 is used to perform the functions of the access network device in the embodiment shown in FIG. 3 .
本申请实施例还提供一种通信装置,包括处理器,处理器调用存储器中存储的计算机程序实现如图3中任意一项的方法。An embodiment of the present application also provides a communication device, including a processor. The processor calls a computer program stored in a memory to implement any one of the methods in Figure 3 .
本申请实施例还提供一种通信装置,包括逻辑电路和输入输出接口,逻辑电路用于读取并执行存储的指令,当该指令被运行时,使得通信装置执行如图3中任一项所述的方法。Embodiments of the present application also provide a communication device, including a logic circuit and an input and output interface. The logic circuit is used to read and execute stored instructions. When the instructions are executed, the communication device executes any one of the instructions in Figure 3. method described.
本申请实施例还提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,当计算机程序被运行时,实现如图3中任一项所述的方法。Embodiments of the present application also provide a computer-readable storage medium. A computer program is stored in the computer-readable storage medium. When the computer program is run, the method described in any one of Figure 3 is implemented.
本申请实施例还提供一种包含指令的计算机程序产品,当其在计算机上执行时,使得图3中任一项所述的方法被执行。An embodiment of the present application also provides a computer program product containing instructions that, when executed on a computer, causes the method described in any one of Figure 3 to be executed.
在计算机上加载和执行该计算机指令时,可以全部或部分地实现本申请实施例所描述的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络、或其它可编程装置。该计算机指令可以存储在计算机可读存储介质中,或通过计算机可读存储介质进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或半导体介质(例如,固态硬盘(solid state disk,SSD))等。When the computer instructions are loaded and executed on the computer, the processes or functions described in the embodiments of this application can be realized in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions may be stored in or transmitted over a computer-readable storage medium. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media. Available media may be magnetic media (eg, floppy disk, hard disk, tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD)), etc.
本申请方法实施例中的步骤可以根据实际需要进行顺序调整、合并和删减。The steps in the method embodiments of this application can be sequence adjusted, combined, and deleted according to actual needs.
本申请装置实施例中的模块可以根据实际需要进行合并、划分和删减。Modules in the device embodiments of the present application can be merged, divided, and deleted according to actual needs.

Claims (30)

  1. 一种通信方法,其特征在于,包括:A communication method, characterized by including:
    第一节点获取数据服务需求信息;The first node obtains data service requirement information;
    所述第一节点根据所述数据服务需求信息,选取用于执行数据服务任务的第二节点;The first node selects a second node for performing the data service task according to the data service requirement information;
    所述第一节点基于所述数据服务需求信息向所述第二节点发送第一消息;所述第一消息包括第一配置信息,所述第一配置信息包括第一逻辑链路的类型,所述第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,所述第一逻辑链路为所述第一节点与所述第二节点之间的逻辑链路,所述第一逻辑链路用于传输所述数据服务任务对应的数据。The first node sends a first message to the second node based on the data service requirement information; the first message includes first configuration information, and the first configuration information includes the type of the first logical link, so The type of the first logical link is a bidirectional logical link, a unidirectional downlink or a unidirectional uplink, and the first logical link is a logical link between the first node and the second node. The first logical link is used to transmit data corresponding to the data service task.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1, further comprising:
    所述第一节点接收一个或多个第三节点发送的能力信息;所述能力信息用于指示所述一个或多个第三节点支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力;The first node receives capability information sent by one or more third nodes; the capability information is used to indicate that the one or more third nodes support at least one of the following: data collection capability, data preprocessing capability, data Reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities;
    所述第一节点根据所述数据服务需求信息,选取用于执行数据服务任务的第二节点,包括:The first node selects a second node for performing data service tasks based on the data service requirement information, including:
    所述第一节点根据所述数据服务需求信息和所述能力信息,从所述一个或多个第三节点中选取所述第二节点。The first node selects the second node from the one or more third nodes based on the data service requirement information and the capability information.
  3. 根据权利要求2所述的方法,其特征在于,所述方法还包括:The method of claim 2, further comprising:
    所述第一节点向所述一个或多个第三节点发送系统消息;其中,所述系统消息用于指示所述第一节点支持数据服务能力。The first node sends a system message to the one or more third nodes; wherein the system message is used to indicate that the first node supports data service capabilities.
  4. 根据权利要求1-3任意一项所述的方法,其特征在于,若所述第一逻辑链路的类型为双向逻辑链路,所述第一配置信息用于指示以下至少一项:所述第二节点需要执行的任务、所述第一节点使用的数据保护算法、所述第一节点使用的数据压缩算法、所述第一节点进行数据传输的间隔、所述第一节点单次传输的数据量、所述第二节点需要执行的任务、所述第二节点使用的数据保护算法、所述第二节点使用的数据压缩算法、所述第二节点进行数据传输的间隔、所述第二节点单次传输的数据量、所述第二节点进行数据传输的最大数据传输量、所述第二节点单次传输的最小数据传输量。The method according to any one of claims 1-3, characterized in that, if the type of the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: the The tasks that the second node needs to perform, the data protection algorithm used by the first node, the data compression algorithm used by the first node, the interval between data transmission by the first node, the number of single transmissions by the first node The amount of data, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the data compression algorithm used by the second node, the interval between data transmission by the second node, the second The amount of data transmitted by a node in a single time, the maximum data transmission amount of the second node in data transmission, and the minimum data transmission amount of the second node in a single transmission.
  5. 根据权利要求1-3任意一项所述的方法,其特征在于,若所述第一逻辑链路的类型为单向下行链路,所述第一配置信息用于指示以下至少一项:所述第二节点需要执行的任务、所述第一节点使用的数据保护算法、所述第一节点使用的数据压缩算法、所述第一节点进行数据传输的间隔、所述第一节点单次传输的数据量。The method according to any one of claims 1-3, characterized in that, if the type of the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: The tasks that the second node needs to perform, the data protection algorithm used by the first node, the data compression algorithm used by the first node, the interval between data transmission by the first node, and the single transmission by the first node amount of data.
  6. 根据权利要求1-3任意一项所述的方法,其特征在于,若所述第一逻辑链路的类型为单向上行链路,所述第一配置信息用于指示以下至少一项:所述第二节点需要执行的任务、所述第二节点使用的数据保护算法、所述第二节点使用的数据压缩算法、所述第二节点进行数据传输的间隔、所述第二节点单次传输的数据量、所述第二节点进行数据传输的最大数据传输量、所述第二节点单次传输的最小数据传输量。The method according to any one of claims 1-3, characterized in that, if the type of the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: The tasks that the second node needs to perform, the data protection algorithm used by the second node, the data compression algorithm used by the second node, the interval between data transmission by the second node, and the single transmission by the second node The amount of data, the maximum data transmission amount of the second node for data transmission, and the minimum data transmission amount of the second node for a single transmission.
  7. 根据权利要求1-6任意一项所述的方法,其特征在于,若所述第一逻辑链路的类型为单向下行链路,所述第二节点的数量为多个,所述方法还包括:The method according to any one of claims 1 to 6, characterized in that if the type of the first logical link is a unidirectional downlink and the number of the second nodes is multiple, the method further include:
    所述第一节点发送组播数据,所述组播数据关联多个第二节点中不同节点对应的所述第一逻辑链路,所述组播数据为所述数据服务任务对应的数据。The first node sends multicast data, the multicast data is associated with the first logical links corresponding to different nodes among the plurality of second nodes, and the multicast data is data corresponding to the data service task.
  8. 根据权利要求1-7任意一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-7, characterized in that the method further includes:
    若所述数据服务任务对应的数据在所述第一逻辑链路上传输结束,所述第一节点向所述 第二节点发送第二消息,所述第二消息用于指示所述第二节点删除所述第一逻辑链路。If the data corresponding to the data service task is transmitted on the first logical link, the first node sends a second message to the second node, and the second message is used to instruct the second node Delete the first logical link.
  9. 根据权利要求1-7任意一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-7, characterized in that the method further includes:
    若所述第一节点确定所述第二节点进行小区切换后的小区为所述第一节点的第一小区,所述第一节点向所述第二节点发送第三消息,所述第三消息还用于指示所述第二节点保留所述第一配置信息。If the first node determines that the cell after the second node performs cell switching is the first cell of the first node, the first node sends a third message to the second node, and the third message It is also used to instruct the second node to retain the first configuration information.
  10. 根据权利要求1-7任意一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-7, characterized in that the method further includes:
    若所述第一节点确定所述第二节点进行小区切换后的小区为第四节点的小区,所述第一节点向所述第二节点发送第四消息,所述第四消息用于指示所述第二节点删除所述第一逻辑链路。If the first node determines that the cell after the second node performs cell switching is the fourth node's cell, the first node sends a fourth message to the second node, and the fourth message is used to indicate that the cell is the fourth node's cell. The second node deletes the first logical link.
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:The method of claim 10, further comprising:
    若当前用于执行数据服务任务的所述第二节点的数量小于第一数量,所述第一节点根据所述数据服务需求信息重新选取用于执行所述数据服务任务的节点,所述第一数量是第一节点根据所述数据服务需求信息确定的数量。If the number of the second nodes currently used to perform the data service task is less than the first number, the first node reselects the node used to perform the data service task according to the data service requirement information, and the first node The quantity is the quantity determined by the first node based on the data service requirement information.
  12. 根据权利要求1-7任意一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-7, characterized in that the method further includes:
    若所述第一节点确定所述第二节点进行呼叫重建后选择的小区为所述第一节点的第二小区,所述第一节点重新向所述第二节点发送所述第一消息。If the first node determines that the cell selected by the second node after call reestablishment is the second cell of the first node, the first node re-sends the first message to the second node.
  13. 根据权利要求12所述的方法,其特征在于,所述方法还包括:The method of claim 12, further comprising:
    若所述第一节点确定所述第二节点进行呼叫重建后选择的小区为第五节点的小区,且当前用于执行所述数据服务任务的所述第二节点的数量小于第二数量,所述第一节点根据所述数据服务需求信息重新选取用于执行所述数据服务任务的节点,所述第一数量是第一节点根据所述数据服务需求信息确定的数量。If the first node determines that the cell selected by the second node after call reestablishment is the cell of the fifth node, and the number of the second nodes currently used to perform the data service task is less than the second number, then The first node reselects nodes for performing the data service task according to the data service requirement information, and the first number is a number determined by the first node according to the data service requirement information.
  14. 一种通信方法,其特征在于,包括:A communication method, characterized by including:
    第二节点接收第一节点发送的第一消息;所述第一消息包括第一配置信息,所述第一配置信息包括第一逻辑链路的类型,所述第一逻辑链路的类型为双向逻辑链路、单向下行链路或单向上行链路,所述第一逻辑链路为所述第一节点与所述第二节点之间的逻辑链路,所述第一逻辑链路用于传输所述数据服务任务对应的数据;The second node receives the first message sent by the first node; the first message includes first configuration information, the first configuration information includes the type of the first logical link, and the type of the first logical link is bidirectional. A logical link, a unidirectional downlink or a unidirectional uplink. The first logical link is a logical link between the first node and the second node. The first logical link is For transmitting data corresponding to the data service task;
    所述第二节点根据所述第一逻辑链路的类型,建立所述第一逻辑链路。The second node establishes the first logical link according to the type of the first logical link.
  15. 根据权利要求14所述的方法,其特征在于,所述方法还包括:The method of claim 14, further comprising:
    所述第二节点向所述第一节点发送的所述第二节点的能力信息;所述第二节点的能力信息用于指示所述第二节点支持以下至少一项:数据采集能力、数据预处理能力、数据上报能力、数据分析能力、数据保护能力、数据压缩能力。The capability information of the second node sent by the second node to the first node; the capability information of the second node is used to indicate that the second node supports at least one of the following: data collection capability, data pre-processing Processing capabilities, data reporting capabilities, data analysis capabilities, data protection capabilities, and data compression capabilities.
  16. 根据权利要求14或15所述的方法,其特征在于,所述方法还包括:The method according to claim 14 or 15, characterized in that the method further includes:
    所述第二节点接收所述第一节点发送的系统消息;The second node receives the system message sent by the first node;
    其中,所述系统消息用于指示所述第一节点支持数据服务能力。Wherein, the system message is used to indicate that the first node supports data service capabilities.
  17. 根据权利要求14-16任意一项所述的方法,其特征在于,若所述第一逻辑链路的类型为双向逻辑链路,所述第一配置信息用于指示以下至少一项:所述第二节点需要执行的任务、所述第一节点使用的数据保护算法、所述第一节点使用的数据压缩算法、所述第一节点进行数据传输的间隔、所述第一节点单次传输的数据量、所述第二节点需要执行的任务、所述第二节点使用的数据保护算法、所述第二节点使用的数据压缩算法、所述第二节点进行数据传输的间隔、所述第二节点单次传输的数据量、所述第二节点进行数据传输的最大数据传输量、所述第二节点单次传输的最小数据传输量。The method according to any one of claims 14-16, characterized in that, if the type of the first logical link is a bidirectional logical link, the first configuration information is used to indicate at least one of the following: the The tasks that the second node needs to perform, the data protection algorithm used by the first node, the data compression algorithm used by the first node, the interval between data transmission by the first node, the number of single transmissions by the first node The amount of data, the tasks that the second node needs to perform, the data protection algorithm used by the second node, the data compression algorithm used by the second node, the interval between data transmission by the second node, the second The amount of data transmitted by a node in a single time, the maximum data transmission amount of the second node in data transmission, and the minimum data transmission amount of the second node in a single transmission.
  18. 根据权利要求14-16任意一项所述的方法,其特征在于,若所述第一逻辑链路的类型为单向下行链路,所述第一配置信息用于指示以下至少一项:所述第二节点需要执行的任务、所述第一节点使用的数据保护算法、所述第一节点使用的数据压缩算法、所述第一节点进行数据传输的间隔、所述第一节点单次传输的数据量。The method according to any one of claims 14-16, characterized in that, if the type of the first logical link is a unidirectional downlink, the first configuration information is used to indicate at least one of the following: The tasks that the second node needs to perform, the data protection algorithm used by the first node, the data compression algorithm used by the first node, the interval between data transmission by the first node, and the single transmission by the first node amount of data.
  19. 根据权利要求14-16任意一项所述的方法,其特征在于,若所述第一逻辑链路的类型为单向上行链路,所述第一配置信息用于指示以下至少一项:所述第二节点需要执行的任务、所述第二节点使用的数据保护算法、所述第二节点使用的数据压缩算法、所述第二节点进行数据传输的间隔、所述第二节点单次传输的数据量、所述第二节点进行数据传输的最大数据传输量、所述第二节点单次传输的最小数据传输量。The method according to any one of claims 14-16, characterized in that, if the type of the first logical link is a unidirectional uplink, the first configuration information is used to indicate at least one of the following: The tasks that the second node needs to perform, the data protection algorithm used by the second node, the data compression algorithm used by the second node, the interval between data transmission by the second node, and the single transmission by the second node The amount of data, the maximum data transmission amount of the second node for data transmission, and the minimum data transmission amount of the second node for a single transmission.
  20. 根据权利要求17-19任意一项所述的方法,其特征在于,所述第二节点需要执行的任务由数据服务任务的标识和所述数据服务任务的子任务的标识进行唯一标识。The method according to any one of claims 17 to 19, characterized in that the task that the second node needs to perform is uniquely identified by the identifier of the data service task and the identifier of the sub-task of the data service task.
  21. 根据权利要求14-20任意一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 14-20, characterized in that the method further includes:
    所述第二节点接收所述第一节点发送的第二消息,所述第二消息用于指示所述第二节点删除所述第一逻辑链路。The second node receives a second message sent by the first node, and the second message is used to instruct the second node to delete the first logical link.
  22. 根据权利要求14-20任意一项所述的方法,其特征在于,所述第二节点进行小区切换后的小区为所述第一节点的第一小区,所述方法还包括:The method according to any one of claims 14 to 20, characterized in that the cell after the second node performs cell switching is the first cell of the first node, and the method further includes:
    所述第二节点接收所述第一节点发送的第三消息,所述第三消息用于指示所述第二节点保留所述第一配置信息;The second node receives a third message sent by the first node, where the third message is used to instruct the second node to retain the first configuration information;
    所述第二节点根据所述第一配置信息中所述第一逻辑链路的类型,建立所述第一小区下的所述第一逻辑链路;The second node establishes the first logical link under the first cell according to the type of the first logical link in the first configuration information;
    所述第二节点通过所述第一逻辑链路与所述第一节点传输所述数据服务任务对应的剩余数据。The second node transmits the remaining data corresponding to the data service task with the first node through the first logical link.
  23. 根据权利要求14-20任意一项所述的方法,其特征在于,所述第二节点进行小区切换后的小区为第四节点的小区,所述方法还包括:The method according to any one of claims 14 to 20, characterized in that the cell after the second node performs cell switching is the cell of the fourth node, and the method further includes:
    所述第二节点接收所述第一节点发送的第四消息,所述第四消息用于指示所述第二节点删除所述第一逻辑链路。The second node receives a fourth message sent by the first node, where the fourth message is used to instruct the second node to delete the first logical link.
  24. 根据权利要求14-20任意一项所述的方法,其特征在于,所述第二节点进行呼叫重建后选择的小区为所述第一节点的第二小区,所述方法还包括:The method according to any one of claims 14 to 20, characterized in that the cell selected by the second node after call reestablishment is the second cell of the first node, and the method further includes:
    所述第二节点重新接收所述第一节点发送的所述第一消息;The second node re-receives the first message sent by the first node;
    所述第二节点根据所述第一消息中所述第一逻辑链路的类型,建立所述第二小区下的所述第一逻辑链路;The second node establishes the first logical link under the second cell according to the type of the first logical link in the first message;
    所述第二节点通过所述第一逻辑链路与所述第一节点传输所述数据服务任务对应的剩余数据。The second node transmits the remaining data corresponding to the data service task with the first node through the first logical link.
  25. 一种通信装置,其特征在于,所述通信装置包括用于执行如权利要求1-24中任一项所述方法的单元或模块。A communication device, characterized in that the communication device includes a unit or module for executing the method according to any one of claims 1-24.
  26. 一种通信装置,其特征在于,包括处理器,所述处理器调用存储器中存储的计算机程序实现如权利要求1-24任意一项的方法。A communication device, characterized by comprising a processor that calls a computer program stored in a memory to implement the method according to any one of claims 1-24.
  27. 一种通信装置,其特征在于,包括逻辑电路和输入输出接口,所述逻辑电路用于读取并执行存储的指令,当所述指令被运行时,使得所述通信装置执行如权利要求1-24任一项所述的方法。A communication device, characterized in that it includes a logic circuit and an input and output interface, the logic circuit is used to read and execute stored instructions, and when the instructions are executed, the communication device executes the instructions as claimed in claim 1- The method described in any one of 24.
  28. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算 机程序,当所述计算机程序被运行时,实现如权利要求1-24任一项所述的方法。A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium. When the computer program is run, the method according to any one of claims 1-24 is implemented.
  29. 一种包含指令的计算机程序产品,当其在计算机上执行时,使得权利要求1-24任一项所述的方法被执行。A computer program product containing instructions that, when executed on a computer, causes the method of any one of claims 1-24 to be executed.
  30. 一种通信系统,其特征在于,包括用于执行如权利要求1-13中任一项所述方法的第一节点和用于执行如权利要求14-24中任一项所述方法的第二节点。A communication system, characterized in that it includes a first node for performing the method according to any one of claims 1-13 and a second node for performing the method according to any one of claims 14-24. node.
PCT/CN2022/118233 2022-09-09 2022-09-09 Communication method and apparatus WO2024050838A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/118233 WO2024050838A1 (en) 2022-09-09 2022-09-09 Communication method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/118233 WO2024050838A1 (en) 2022-09-09 2022-09-09 Communication method and apparatus

Publications (1)

Publication Number Publication Date
WO2024050838A1 true WO2024050838A1 (en) 2024-03-14

Family

ID=90192576

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/118233 WO2024050838A1 (en) 2022-09-09 2022-09-09 Communication method and apparatus

Country Status (1)

Country Link
WO (1) WO2024050838A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017209746A1 (en) * 2016-06-01 2017-12-07 Intel IP Corporation User equipment (ue) and methods for reception of downlink data services
CN113766535A (en) * 2020-06-05 2021-12-07 华为技术有限公司 Wireless communication method, device and system
CN114630341A (en) * 2020-12-11 2022-06-14 华为技术有限公司 Communication method, device and system
WO2022147725A1 (en) * 2021-01-07 2022-07-14 华为技术有限公司 Communication method and apparatus
CN114765829A (en) * 2020-12-31 2022-07-19 华为技术有限公司 Multi-access session management method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017209746A1 (en) * 2016-06-01 2017-12-07 Intel IP Corporation User equipment (ue) and methods for reception of downlink data services
CN113766535A (en) * 2020-06-05 2021-12-07 华为技术有限公司 Wireless communication method, device and system
CN114630341A (en) * 2020-12-11 2022-06-14 华为技术有限公司 Communication method, device and system
CN114765829A (en) * 2020-12-31 2022-07-19 华为技术有限公司 Multi-access session management method, device and system
WO2022147725A1 (en) * 2021-01-07 2022-07-14 华为技术有限公司 Communication method and apparatus

Similar Documents

Publication Publication Date Title
EP3694181B1 (en) Session establishment method, device and system
US20230232213A1 (en) Information transmission methods and apparatuses, and communication devices and storage medium
CN111434083B (en) Network management equipment and centralized authorization server for NETCONF
CN114303347A (en) Method, apparatus and machine-readable medium relating to machine learning in a communication network
JP2022191337A (en) Quality-of-service monitoring method, system and device
EP3860176A1 (en) Method, apparatus, and system for obtaining capability information of terminal
CN112788542B (en) Communication method, device and system
WO2022082356A1 (en) Communication method and apparatus
JP2023535520A (en) COMMUNICATION METHOD, APPARATUS, AND SYSTEM
TWI775009B (en) Base station and data transmission method thereof for mobile communication system
CN115278639A (en) Perception data acquisition method, device, equipment and storage medium
Xu et al. Design of oneM2M-based fog computing architecture
WO2019214355A1 (en) Method and device for determining rrm measurement configuration
WO2024050838A1 (en) Communication method and apparatus
WO2021197160A1 (en) Communication method and communication device
WO2022155853A1 (en) Wireless communication method, communication apparatus and communication system
CN112218285B (en) Method, equipment and system for transmitting uplink user data
EP4333533A1 (en) Computing power resource scheduling method and related apparatus
CN115567899B (en) Error analysis method and device for intelligent ammeter
WO2023231713A1 (en) Communication method, device, and system
WO2023231770A1 (en) Communication method and apparatus
WO2024007271A1 (en) Sensing service switching method and apparatus, electronic device, and storage medium
WO2023231714A1 (en) Communication method, apparatus, and system
WO2023213159A1 (en) Communication method and apparatus
WO2023202206A1 (en) Communication method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22957806

Country of ref document: EP

Kind code of ref document: A1