WO2024099159A1 - 确定丢包的方法、装置、通信设备及可读存储介质 - Google Patents

确定丢包的方法、装置、通信设备及可读存储介质 Download PDF

Info

Publication number
WO2024099159A1
WO2024099159A1 PCT/CN2023/128051 CN2023128051W WO2024099159A1 WO 2024099159 A1 WO2024099159 A1 WO 2024099159A1 CN 2023128051 W CN2023128051 W CN 2023128051W WO 2024099159 A1 WO2024099159 A1 WO 2024099159A1
Authority
WO
WIPO (PCT)
Prior art keywords
data packet
target data
lost
group
target
Prior art date
Application number
PCT/CN2023/128051
Other languages
English (en)
French (fr)
Inventor
陈力
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024099159A1 publication Critical patent/WO2024099159A1/zh

Links

Definitions

  • the present application belongs to the field of wireless communication technology, and specifically relates to a method, apparatus, communication equipment and readable storage medium for determining packet loss.
  • data flows pass through multiple different interfaces (such as N1 interface, N2 interface, N3 interface..., or X1 interface, X2 interface..., etc.) to reach different nodes.
  • interfaces such as N1 interface, N2 interface, N3 interface..., or X1 interface, X2 interface..., etc.
  • the data packets are processed at the node according to the defined protocol stack.
  • the embodiments of the present application provide a method, apparatus, communication device and readable storage medium for determining packet loss, which can solve the problem of how to effectively optimize the scheduling, discarding and other processing of data packets.
  • a method for determining packet loss comprising:
  • the first object determines that the target data packet is lost at the second object, where the second object is one or more objects before the first object in the data transmission path of the data packet.
  • a device for determining packet loss including:
  • the determination module is used to determine that a target data packet is lost in a second object, where the second object is one or more objects before the first object in the data transmission path of the data packet.
  • a communication device comprising a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method for determining packet loss as described in the first aspect are implemented.
  • a communication device comprising a processor and a communication interface, wherein the processor is used to determine that a target data packet is lost at a second object, and the second object is one or more objects before the first object in a data transmission path of the data packet.
  • a readable storage medium on which a program or instruction is stored.
  • the program or instruction is executed by a processor, the steps of the method for determining packet loss described in the first aspect are implemented.
  • a chip comprising a processor and a communication interface, the communication interface and the The processor is coupled, and the processor is used to run a program or instruction to implement the steps of the method for determining packet loss as described in the first aspect.
  • a computer program/program product is provided, wherein the computer program/program product is stored in a storage medium and is executed by at least one processor to implement the steps of the method for determining packet loss as described in the first aspect.
  • a first object when a first object processes a data packet, it can be determined whether one or more previous second objects have lost the data packet, thereby effectively optimizing the scheduling, discarding, and other processing of the data packet.
  • FIG1 is a block diagram of a wireless communication system applicable to an embodiment of the present application.
  • FIG2 is a schematic diagram of the architecture of a 5G system
  • FIG3 is a schematic diagram of the structure of an access network
  • FIG4 is a schematic diagram of the structure of a 5G system based on a service interface in a non-roaming situation
  • FIG5 is a schematic diagram of a 5G system structure using reference points in a non-roaming situation
  • FIG6 is a schematic diagram showing a situation where a UE uses multiple PDU sessions to simultaneously access two data networks under non-roaming conditions
  • FIG7 is a schematic diagram of a structure for simultaneously accessing two data networks using a single PDU session in a roaming scenario
  • FIG8 is a schematic diagram of a UE accessing a data network via a non-3gpp network
  • FIG9 is a schematic diagram of the structure of 5GC and EPC interoperation in a non-roaming scenario
  • FIG10 is a schematic diagram of the structure of the NG-U protocol stack
  • FIG11 is a schematic diagram of the structure of the NG-C protocol stack
  • FIG12 is a schematic diagram of the structure of the N2 interface protocol stack of the AN and AMF;
  • FIG13 is a schematic diagram of the structure of the N2 interface protocol stack between AN and AMF and the N11 interface protocol stack between AMF and AMF;
  • FIG14 is a schematic diagram of the structure of the Xn-C protocol stack
  • FIG15 is a schematic diagram of the structure of a user plane protocol stack
  • FIG16 is a schematic diagram of the structure of a control plane protocol stack
  • FIG17 is a schematic diagram of the structure of NAS transmission of SM, SMS, UE policy, and LCS;
  • FIG18 is a schematic diagram of the structure of the interface between the UE and the AMF
  • FIG19 is a schematic diagram of the structure of the interface between the UE and the SMF;
  • FIG20 is a schematic diagram of the structure of the user plane protocol stack of a UE PDU session
  • FIG21 is a schematic diagram of the F1 interface protocol
  • FIG22 is a schematic diagram of the control plane before establishing a signaling IPsec SA between the UE and the N3IWF;
  • FIG23 is a schematic diagram of the user plane before establishing a signaling IPsec SA between the UE and the N3IWF;
  • FIG24 is a schematic diagram of a protocol stack at an interface between a UE and a N3IWF;
  • FIG25 is a schematic diagram of the SBI protocol stack
  • FIG26 is a flow chart of a method for determining packet loss according to an embodiment of the present application.
  • FIG27 is a schematic diagram of the structure of an apparatus for determining packet loss according to an embodiment of the present application.
  • FIG28 is a schematic diagram of the structure of a communication device according to an embodiment of the present application.
  • FIG29 is a schematic diagram of the structure of a terminal according to an embodiment of the present application.
  • FIG30 is a schematic diagram of a structure of a network side device according to an embodiment of the present application.
  • FIG31 is a second schematic diagram of the structure of the network side device according to an embodiment of the present application.
  • first, second, etc. in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the terms used in this way are interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by “first” and “second” are generally of the same type, and the number of objects is not limited.
  • the first object can be one or more.
  • “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally represents that the objects associated with each other are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • 6G 6th Generation
  • FIG1 shows a block diagram of a wireless communication system applicable to an embodiment of the present application.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) device, a robot, a wearable device (Wearable Device), a vehicle user equipment (VUE), a pedestrian terminal (Pedestrian User Equipment, PUE), a smart home (home equipment with wireless communication function, such as a refrigerator, a television, a washing machine or furniture, etc.), a game console, a personal computer (personal
  • the terminal side devices 12 include: computer, PC), ATM
  • the network side device 12 may include access network equipment or core network equipment, wherein the access network equipment may also be called wireless access network equipment, wireless access network (Radio Access Network, RAN), wireless access network function or wireless access network unit.
  • the access network equipment may include a base station, a WLAN access point or a WiFi node, etc.
  • the base station may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a home B node, a home evolved B node, a transmitting and receiving point (Transmitting Receiving Point, TRP) or some other suitable term in the field.
  • the base station is not limited to specific technical vocabulary.
  • the core network equipment may include but is not limited to at least one of the following: core network node, core network function, mobility management entity (Mobility Management Entity, MME), access mobility management function (Access and Mobility Management Function, AMF), session management function (Session Management Function, SMF), user plane function (User Plane Function, UPF), policy control function (Policy Control Function, PCF), policy and charging rules function unit (Policy and Charging Rules Function, PCRF), edge application service discovery function (Edge Application Server Discovery Function, EASDF), unified data management (Unified Data Management, UDM), unified data storage (Unified Data Repository, UDR), home user server (Home Subscriber Server, HSS), centralized network configuration (CNC), network storage function (Network Repository Function, NRF), network exposure function (Network Exposure Function, NEF), local NEF (Local N
  • Extended reality refers to all real and virtual combined environments and human-computer interactions generated by computer technology and wearable devices. It includes representative forms such as augmented reality (AR), mixed reality (MR), virtual reality (VR), and their intersections. The level of virtual world ranges from partial sensory input to fully immersive virtual reality.
  • AR augmented reality
  • MR mixed reality
  • VR virtual reality
  • AR virtual reality
  • a key aspect of XR is the expansion of human experience, especially the experience related to presence (represented by VR) and cognitive acquisition (represented by AR).
  • the uplink is mainly based on the transmission of relatively dense small data packets, which can carry information such as gestures and controls, and serve as input and reference for downlink presentation data;
  • the downlink is mainly based on the transmission of multimedia data such as video and audio, and through the timely reception and presentation of these multimedia data, an immersive experience is provided to users.
  • downlink video data data packets arrive periodically or quasi-periodically, and the data rate can reach tens or even hundreds of megabits per second.
  • the typical value of the frame rate (Frame per Second, FPS) is 60 or 120, and the interval between adjacent data packets is approximately 1/FPS second.
  • FPS Frame per Second
  • These data packets generally need to be successfully transmitted within 10 milliseconds (ms) on the air interface, and the transmission success rate is required to be no less than 99% or even 99.9%.
  • uplink may also transmit multimedia data such as video and audio. Its service characteristics are similar to those of downlink. Usually the data rate is relatively low, for example, at most tens of Mbps, and the time limit for air interface transmission can also be relaxed. For example, it generally needs to be successfully transmitted within 60ms.
  • the downlink data transmission characteristics are basically consistent with VR services.
  • Degree of Freedom describes the number of independent parameters used to define the movement of the viewport in 3D space.
  • XR In XR application scenarios, users can obtain information about new perspectives by turning their heads in a virtual reality experience. At this time, the XR user's head turning action can be notified to the base station by sending an uplink signal. After receiving the uplink signal, the base station will schedule the required downlink data for the XR user to use.
  • XR services mainly include video data, audio data, and some control signaling and special data with control functions.
  • XR service transmission mainly involves uplink and downlink video/audio data transmission and interaction between user equipment (UE, also known as terminal) and wireless new networks (such as LTE/NR, etc.).
  • UE user equipment
  • wireless new networks such as LTE/NR, etc.
  • the UE needs to transmit some control signaling and special data with control functions through the wireless network uplink, in order to control the generation, processing and downlink wireless transmission of video and audio service data in the XR service sent by the control network to the UE.
  • control information and special data with control functions include some service control data generated by the UE XR (extended reality) application encoder and control data information contained in the service transmission protocol, such as:
  • I-frames keyframes
  • non-field-of-view non-FOV frames generated by the video encoder
  • TCP transmission control protocol
  • ACK transmission control protocol
  • TCP feedback transmission control protocol
  • RTP Control Protocol (RTCP) ACK signaling is used to control the real-time transmission of data and confirm the real-time requirements and time synchronization of business data transmission.
  • the network usually needs to receive these control signaling and special data with control functions from the UE in a timely and reliable manner to obtain the transmission status of the current service and related necessary control information; the application server needs to further generate the video and audio service data required for subsequent transmission based on this information, and submit it to the wireless network for processing and transmission. Finally, these service data are sent downlink to the UE.
  • the BSR reporting mechanism was introduced starting from LTE, where the UE reports the amount of uplink data to be transmitted corresponding to each logical channel group to the base station. This mechanism is basically adopted in NR.
  • NR logical channel group
  • LCG logical channel group
  • NR supports the simultaneous configuration of up to 8 logical channel groups for a single UE.
  • BSR is triggered based on the following events:
  • the number of piggybacked (Padding) bits in the new TB is greater than or equal to the number of bits occupied by (a single BSR media access control (MAC) control element (CE) plus its corresponding subheader) (i.e., the Padding bits in the new TB can also accommodate the bits corresponding to a single BSR MAC CE), then the Padding BSR will be triggered;
  • MAC media access control
  • CE control element
  • SR Scheduling Request
  • the UE When the Periodic BSR is triggered, the UE includes a BSR MAC CE in the constructed uplink TB only when there are new uplink transmission resources, but does not actively request new uplink transmission resources from the network by triggering the SR.
  • the UE When the Padding BSR is triggered, the UE directly includes a BSR MAC CE in the new uplink TB.
  • AS Access Stratum
  • the service data generated by the UE's application layer (Application, APP) will be classified into different service data flows according to their corresponding quality of service (Quality-of-service, QoS) requirements, and each service data flow corresponds to the same or similar QoS requirements.
  • QoS quality of service
  • the service data flow corresponds to a QoS flow
  • the service data flow corresponds to an Evolved Packet System (Evolved Packet System, EPS) bearer.
  • EPS Evolved Packet System
  • the service data is delivered to the AS layer in the form of packets, and is further mapped to a radio bearer at the AS layer according to the corresponding QoS flow (NR) or EPS bearer (LTE).
  • a radio bearer consists of a PDCP entity (PDCP protocol layer processing entity), a radio link control (RLC) entity (RLC protocol layer processing entity) and the corresponding logical channel (located in the media access Control (Medium Access Control, MAC) protocol layer).
  • a data packet submitted to the AS layer When a data packet submitted to the AS layer is mapped to a radio bearer, it will be submitted to the corresponding PDCP entity for processing in the form of a PDCP service data unit (SDU).
  • the PDCP entity will generate a corresponding PDCP protocol data unit (PDU) for each arriving PDCP SDU and set a PDCP sequence number (SN) to indicate the transmission order of each PDCP SDU and its corresponding PDCP PDU in the PDCP entity; the value of the PDCP SN is set according to the order in which the PDCP SDU is submitted to the PDCP entity, and the transmission order of the PDCP SDU that arrives first is first, and the order of the later submission is later.
  • PDU PDCP protocol data unit
  • SN PDCP sequence number
  • the PDCP entity maintains an internal variable TX_NEXT, which indicates the total number of PDCP PDUs transmitted by the PDCP entity and is used to set the value of the PDCP SN. It is initialized to 0 when the PDCP entity is established.
  • TX_NEXT indicates the total number of PDCP PDUs transmitted by the PDCP entity and is used to set the value of the PDCP SN. It is initialized to 0 when the PDCP entity is established.
  • TX_NEXT indicates the total number of PDCP PDUs transmitted by the PDCP entity and is used to set the value of the PDCP SN. It is initialized to 0 when the PDCP entity is established.
  • the PDCP entity sets the SN of the PDCP PDU corresponding to the PDCP SDU to TX_NEXT and adds 1 to TX NEXT.
  • the PDCP entity adds a header file to each PDCP SDU and generates a corresponding
  • the PDCP entity usually delivers the PDCP PDUs to the lower protocol layer (RLC) in sequence for subsequent processing and transmission according to the order of the SNs contained in the PDCP PDU.
  • RLC protocol layer
  • SN is an ordinal number, indicating the number of each PDCP SDU transmitted.
  • the general principle is that the earlier the PDCP SDU arrives at the PDCP entity, the smaller the SN value, and the earlier it is transmitted.
  • the PDCP PDU delivered from the PDCP entity to the corresponding RLC entity will be cached in the UE buffer as the RLC SDU to be transmitted and further processed by the RLC entity.
  • the RLC entity will determine which RLC SDUs can be multiplexed into the allocated transmission resources for transmission based on the amount of data that the allocated transmission resources can accommodate and the amount of data of the RLC SDUs to be transmitted in the buffer.
  • the RLC entity For one or more RLC SDUs determined by the RLC entity that can be fully multiplexed into the allocated transmission resources, the RLC entity will add corresponding RLC header files to these RLC SDUs, generate corresponding RLC PDUs, and submit them to the lower protocol layer (MAC) for subsequent processing and transmission.
  • MAC protocol layer
  • the RLC entity After multiplexing the above complete RLC PDUs, if there are still some resources remaining but not enough to reuse another complete RLC SDU (that is, the amount of data that the resources can support is less than the amount of data required to multiplex the next RLC SDU), the RLC entity will perform segmentation processing, that is, add a header file to part of the data of the next RLC SDU to be transmitted, generate an RLC PDU, and submit it to the lower protocol layer for subsequent processing and transmission.
  • segmentation processing that is, add a header file to part of the data of the next RLC SDU to be transmitted, generate an RLC PDU, and submit it to the lower protocol layer for subsequent processing and transmission.
  • the remaining part will still be retained in the UE buffer and wait for the arrival of the next uplink transmission resource before transmission.
  • Each RLC entity corresponding to a radio bearer further corresponds to a logical channel at the MAC layer.
  • the UE's MAC entity will further allocate the uplink transmission resources among multiple logical channels.
  • each logical channel corresponds to a logical channel priority.
  • the UE's MAC entity processes the logical channel priority based on the logical channel priority.
  • the resource allocation mechanism of the LCP is to allocate the available transmission resources for the uplink transmission to each logical channel in the descending order of the logical channel priority, which corresponds to the amount of data that can be transmitted by each logical channel.
  • the corresponding RLC entity will submit one or more RLC PDUs to the corresponding logical channel of the MAC layer.
  • the MAC layer will use these RLC PDUs obtained from the RLC entity for each logical channel as MAC SDUs to be transmitted, add the MAC header file corresponding to the corresponding logical channel, form the MAC subPDU of the corresponding logical channel, and multiplex it into the entire transmission resource as the data sent by this logical channel for this uplink transmission.
  • the MAC subPDUs of multiple logical channels will be combined together to form a MAC PDU, which will be transmitted to the network through wireless signals as the data packet sent in this uplink.
  • the UE since the RLC entity will segment the RLC SDU (as mentioned above), for each uplink transmission resource obtained by the UE, the UE needs to first multiplex the remaining part of the RLC SDU that was segmented in the previous transmission and has not yet been transmitted into the resource for transmission, and then transmit the data packets corresponding to other subsequent RLC SDUs.
  • the UE In general, in the existing LTE and NR networks, the UE usually adopts the principle of "first arrive, first transmit" to implement the above-mentioned uplink data processing and transmission process for the data of each radio bearer. Specifically, for each radio bearer, the UE will process the data packets in the order in which the data packets (SDU) are submitted to the corresponding entity of this layer at each of the above-mentioned protocol layers, and submit the processed data packets (PDU) to the next protocol layer in sequence.
  • SDU data packets
  • PDU processed data packets
  • the corresponding PDCP entity will set a forward PDCP SN value for it, so that it can be processed by the above-mentioned protocol layers first, and be multiplexed into the uplink resources for transmission first; and the data packets that arrive later will be assigned a later PDCP SN value, and will usually be processed, multiplexed and transmitted by the above-mentioned protocol layers after the data packets that arrive first.
  • the UE ultimately executes a sequential transmission mechanism according to the order in which the data packets arrive at the AS.
  • This principle is mainly adopted based on transmission delay considerations: in existing wireless networks, the transmission delay requirements for data in each wireless bearer are basically the same, and the existing wireless networks do not allow the UE AS layer to obtain the specific content of each data packet and cannot perform differentiated processing for each data packet; therefore, performing uplink processing, scheduling, and transmission of data packets in the order in which they arrive is a more reasonable approach from the perspective of minimizing delay.
  • DRB Data Radio Bearer
  • the sending side PDCP entity starts a discard timer associated with this PDCP SDU.
  • the transmitting PDCP entity needs to discard this PDCP SDU and the corresponding PDCP data PDU. If this PDCP data PDU has been passed to the lower layer, it is necessary to instruct the lower layer to discard it.
  • SRB Signaling Radio Bearer
  • a PDU set consists of one or more PDUs that carry the payload of an information unit generated at the application layer.
  • the application layer needs all PDUs in a PDU set to use the corresponding information unit. In other implementations, when some PDUs are lost, the application layer can still recover some or all of the information units.
  • a data burst is data generated by an application in a short period of time, including PDUs from one or more PDU sets.
  • the 5G system consists of the access network (AN) (NG-RAN in the figure) and the core network (5GC). If the non-standalone (NSA) scenario is considered, the 4G network elements also need to be considered.
  • AN access network
  • 5GC core network
  • gNB providing NR user plane and control plane protocol termination points for UE.
  • ng-eNB provides the termination point of the user plane and control plane protocols of E-UTRA for the UE.
  • Each logical gNB consists of a gNB-CU (centralized unit) and several gNB-DUs (distributed units). Each gNB-CU and gNB-DU are connected through the F1 logical interface.
  • Figure 4 is a structural diagram of a 5G system based on a service interface in a non-roaming situation.
  • Figure 5 is a schematic diagram of the 5G system structure using reference points in non-roaming situations. This figure shows the interaction between network element functions. It is similar to the understanding of other traditional cellular mobile network structures.
  • FIG. 6 shows the situation where a UE uses multiple PDU sessions to access two data networks simultaneously under non-roaming conditions.
  • This figure uses reference points to show the scenario of using two SMFs for multiple PDU sessions.
  • each SMF can also control the local and central UPFs for one PDU session.
  • Figure 7 shows the structure of using a single PDU session to simultaneously access two data networks (local and central) in a roaming scenario.
  • FIG. 8 is a schematic diagram of UE accessing a data network via a non-3GPP network.
  • Figure 9 is a structural diagram of the interoperability between 5GC and Evolved Packet Core (EPC) in a non-roaming scenario.
  • EPC Evolved Packet Core
  • Figure 10 is a schematic diagram of the structure of the NG-U protocol stack.
  • FIG. 11 is a schematic diagram of the structure of the NG-C protocol stack.
  • Figure 12 is a schematic diagram of the structure of the N2 interface protocol stack of AN and AMF.
  • Figure 13 is a structural diagram of the N2 interface protocol stack between AN and AMF and the N11 interface protocol stack between AMF and AMF.
  • the N2-SM message is part of the NG-AP message, which is transparently transmitted by the AMF. From the perspective of the access network, the N2-SM message ends at the AMF.
  • FIG. 14 is a schematic diagram of the structure of the Xn-C protocol stack.
  • FIG. 15 is a schematic diagram of the structure of the user plane protocol stack.
  • FIG. 16 is a schematic diagram of the structure of the control plane protocol stack.
  • N1NAS signaling The endpoints of N1NAS signaling are UE and AMF.
  • One NAS signaling connection is used for registration management/connection management (RM/Connection Management, CM) and session management (SM).
  • CM registration management/connection management
  • SM session management
  • the NAS protocol consists of two parts: NAS-MM and NAS-SM.
  • SM Session Management Protocol
  • SMS SMS
  • UE policy UE policy
  • location services etc.
  • RM/CM NAS messages are decoupled from other types of NAS messages, that is, AMF is responsible for RM/CM, and other messages are passed through to the corresponding modules for processing.
  • the UE accesses 5GC through both 3GPP and non-3GPP access networks, there is an N1NAS signaling connection in each access mode.
  • Figure 17 is a structural diagram of NAS transmission of SM, SMS, UE policy, and LCS.
  • Figure 18 is a structural diagram of the interface between UE and AMF.
  • Figure 19 is a structural diagram of the interface between UE and SMF.
  • Figure 20 is a structural diagram of the user plane protocol stack of the UE PDU session.
  • FIG. 21 is a schematic diagram of the F1 interface protocol.
  • FIG. 22 is a schematic diagram of a control plane before establishing a signaling IPsec SA between a UE and a non-3GPP InterWorking Function (N3IWF).
  • N3IWF non-3GPP InterWorking Function
  • Figure 23 is a schematic diagram of the user plane before establishing the signaling IPsec SA between the UE and the N3IWF.
  • Figure 24 is a schematic diagram of the protocol stack at the interface between UE and N3IWF.
  • the interface between network elements within 5GC is based on the service interface (SBI) and adopts the form of Hyper Text Transfer Protocol (HTTP) service.
  • SBI interfaces are: Namf, Nsmf, Nudm, Nnrf, Nnssf, Nausf, Nnef, Nsmsf, Nudr, Npcf, N5g-eir, Nlmf.
  • FIG. 25 is a schematic diagram of the SBI protocol stack.
  • an embodiment of the present application provides a method for determining packet loss, including:
  • Step 101 A first object determines that a target data packet is lost at a second object, where the second object is one or more objects before the first object in a data transmission path of the data packet.
  • a first object when a first object processes a data packet, it can be determined whether one or more previous second objects have lost the data packet, thereby effectively optimizing the scheduling, discarding, and other processing of the data packet.
  • the data packet loss includes at least one of the following situations:
  • the target data packet is transmitted or processed by the second object for a delay exceeding a preset time.
  • the target data packet is transmitted in the second object for more than a preset number of times.
  • the first object is a first node.
  • the first object may be any node in the network architecture introduced above.
  • the first object is the first node in the data transmission path of the data packet
  • the second object is one or more communication interfaces before the first node in the data transmission path.
  • the RAN side node (g) NB is the first node
  • the corresponding communication interface includes at least one of the following: N2, N3, N4, ... N12, etc.
  • the first object is a first protocol layer.
  • the first object may be any layer protocol stack in the protocol stack structure introduced above.
  • the second object is one or more second protocol layers before the first protocol layer in the data transmission path of the data packet, and the first protocol layer and the second protocol layer belong to the same node, and the node includes a network node or a terminal node.
  • the MAC in the air interface protocol layer is the first object
  • the corresponding second object is one or more layers of the Service Data Adaptation Protocol (SDAP), PDCP, RLC, etc.
  • SDAP Service Data Adaptation Protocol
  • PDCP Packed Control Protocol
  • RLC Radio Link Control Protocol
  • the first object determines that the target data packet is lost in the second object according to at least one of the following: a timer, a counter, and a number.
  • the first object determining that the target data packet is lost in the second object includes: if the first object does not receive the target data packet within a preset time, determining that the target data packet is lost in the second object.
  • the preset time includes at least one of the following:
  • the preset period includes at least one of the following:
  • the cycle of the data packet that is, the generation cycle of the data packet
  • the period of the data packet group that is, the period of generating the data packet group
  • the transmission period of a packet group is a packet group.
  • the delay of the data packet corresponding to the second object includes at least one of the following:
  • the delay requirement of the data packet in the second object for example, packet delay budget (PDB) or PDU set delay budget (PDU set Delay budget, PSDB).
  • PDB packet delay budget
  • PDU set Delay budget PDU set Delay budget
  • the remaining delay includes at least one of the following:
  • the remaining delay requirement of the data packet in the first object that is, the remaining delay requirement of the PDB/PSDB after the delay of the first object, or the delay requirement on the first object.
  • the remaining delay includes: the delay requirement minus the delay occupied by the first object.
  • the third data packet includes at least one of the following:
  • a preset number of data packets in the same data packet group as the target data packet is a preset number of data packets in the same data packet group as the target data packet.
  • the first object determining that the target data packet is lost in the second object includes:
  • the first object receives a preset number of data packets, and the target data packet is not within the preset number of data packets, it is determined that the target data packet is lost in the second object; or,
  • the first object receives a preset number of data packets and does not receive the target data packet, it is determined that the target data packet is lost in the second object.
  • the preset number includes at least one of the following:
  • the number of data packets included in a data packet group including: the data packet group where the target data packet is located;
  • the first object determines that the target data packet is lost in the second object:
  • the first object receives a preset number of data packets within a preset time, and the target data packet is not within the preset number of data packets, it is determined that the target data packet is lost in the second object; or,
  • the first object receives a preset number of data packets within a preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object.
  • the first object determining that the target data packet is lost in the second object includes at least one of the following:
  • the first object receives one or a preset number of first data packets and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the number of the first data packet is after the number of the target data packet; specifically, for example, the data packets are 1, 2, 3, 4, 5, 6, 7, 8, 9, if any 4 data packets after data packet 3 are received and data packet 3 is not received, it is determined that data packet 3 is lost.
  • the first object receives a preset number of consecutive first data packets and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the number of the first data packet is after the number of the target data packet; specifically, for example, the data packets are 1, 2, 3, 4, 5, 6, 7, 8, 9, if the 4th, 5th, 6th, and 7th data packets after data packet 3 are received, and data packet 3 is not received, it is determined that data packet 3 is lost.
  • the first object receives a data packet with a first number and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the first number is the number of the x-th data packet after the number of the target data packet; the value of x can be 0, 1, 2, etc.
  • the data packets are 1, 2, 3, 4, 5, 6, 7, 8, 9, if the 7th data packet after data packet 3 is received, and data packet 3 is not received, it is determined that data packet 3 is lost.
  • the first object receives the last data packet of the data packet group where the target data packet is located, and does not receive the target data packet, it is determined that the target data packet is lost in the second object; specifically, for example, the data packets are 1, 2, 3, 4, 5, 6, 7, 8, 9, if the 9th data packet after data packet 3 is received, and data packet 3 is not received, it is determined that data packet 3 is lost.
  • the first object receives one or a preset number of second data packets and does not receive the target data packet, it is determined that the target data packet is lost in the second object; the number of the second data packet is located after the last data packet in the data packet group where the target data packet is located, or the number of the second data packet is located in the data packet group where the target data packet is located. After the packet group of ;
  • the first object receives a data packet with a second number and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the second number is the number of the w-th data packet after the number of the last data packet in the data packet group where the target data packet is located, or the second number is the number of the w-th data packet after the data packet group where the target data packet is located; the value of w can be 0, 1, 2...etc.
  • the first object receives one or a preset number of first data packet groups and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives a data packet group with a third number and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the third number is the number of the yth data packet group after the number of the data packet group where the target data packet is located; the value of y can be 0, 1, 2...etc.
  • the first object receives the first data packet in the first data packet group and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives one or a preset number of data packets in the first data packet group and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives a preset number of consecutive data packets in the first data packet group and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives the zth data packet in the first data packet group and does not receive the target data packet, it is determined that the target data packet is lost in the second object; the value of z can be 0, 1, 2, etc.
  • the first data packet group is numbered after the data packet group where the target data packet is located.
  • the first object determining that the target data packet is lost in the second object includes one of the following:
  • the first object receives one or a preset number of first data packets within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the number of the first data packet is after the number of the target data packet;
  • the first object receives a preset number of consecutive first data packets within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the number of the first data packet is after the number of the target data packet;
  • the first object receives a data packet with a first number within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the first number is the number of the xth data packet after the number of the target data packet;
  • the first object receives the last data packet of the data packet group where the target data packet is located within the preset time, and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives one or a preset number of second data packets within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object; the number of the second data packet is After the last data packet in the data packet group where the target data packet is located, or the number of the second data packet is located after the data packet group where the target data packet is located;
  • the first object receives a data packet with a second number within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the second number is the number of the wth data packet after the number of the last data packet in the data packet group where the target data packet is located, or the second number is the number of the wth data packet after the data packet group where the target data packet is located;
  • the first object receives one or a preset number of first data packet groups within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives a data packet group with a third number within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the third number is the number of the yth data packet group after the number of the data packet group where the target data packet is located;
  • the first object receives the first data packet in the first data packet group within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives one or a preset number of data packets in the first data packet group within the preset time, and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives a preset number of consecutive data packets in the first data packet group within the preset time, and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first object receives the zth data packet in the first data packet group within the preset time and does not receive the target data packet, it is determined that the target data packet is lost in the second object;
  • the first data packet group is numbered after the data packet group where the target data packet is located.
  • the numbering in the embodiment of the present application can be numbered from small to large, and the numbering of the later data packets or data packet groups mentioned in the above content is greater than the numbering of the earlier data packets or data packet groups.
  • the numbering in the embodiment of the present application can be numbered from large to small, and the numbering of the later data packets or data packet groups mentioned in the above content is less than the numbering of the earlier data packets or data packet groups.
  • the first object receiving the data packet may also be described as the data packet being transmitted to or successfully transmitted to the first object, or being delivered to or successfully delivered to the first object.
  • the preset time includes at least one of the following:
  • the preset period includes at least one of the following:
  • the transmission period of a packet group is a packet group.
  • the delay of the data packet corresponding to the second object includes at least one of the following:
  • the remaining delay includes at least one of the following:
  • the third data packet includes at least one of the following:
  • a preset number of data packets in the same data packet group as the target data packet is a preset number of data packets in the same data packet group as the target data packet.
  • the preset number includes at least one of the following:
  • the number of data packets included in a data packet group including: the data packet group where the target data packet is located;
  • x, y, w and/or z are network configurations or protocol agreements.
  • the data packet includes at least one of the following:
  • PDU set group group of PDU set
  • PDU group group of PDU
  • the data packet group comprises at least one of the following:
  • the first object performs at least one of the following operations:
  • Other data packets based on the target data packet refer to other data packets that depend on (depends on) the target data packet.
  • the priority includes at least one of the following: scheduling priority, transmission priority, processing priority and decoding priority.
  • the embodiment of the present application is applicable to the processing of data packets of XR services, and is also applicable to the processing of data packets of other services with similar service characteristics to XR services (services in which data packets in a data stream are transmitted sequentially according to numbers).
  • the method for determining packet loss provided in the embodiment of the present application may be performed by a device for determining packet loss.
  • the method for determining packet loss performed by a device for determining packet loss is used as an example to illustrate the device for determining packet loss provided in the embodiment of the present application.
  • an embodiment of the present application further provides a device 200 for determining packet loss, including:
  • the determination module 201 is configured to determine that a target data packet is lost in a second object, where the second object is one or more objects before the first object in a data transmission path of the data packet.
  • a first object when a first object processes a data packet, it can determine whether one or more previous second objects have lost the data packet, thereby effectively optimizing the scheduling, discarding, and other processing of the data packet.
  • the first object is a first node in a data transmission path of a data packet
  • the second object is one or more communication interfaces before the first node in the data transmission path
  • the first object is a first protocol layer in a data transmission path of a data packet
  • the second object is one or more second protocol layers before the first protocol layer in the data transmission path, and the first protocol layer and the second protocol layer belong to the same node.
  • the target data packet loss includes at least one of the following situations:
  • the target data packet is not successfully delivered to the first object
  • the target data packet is not successfully transmitted in the second object
  • the target data packet is lost in the second object
  • the target data packet is transmitted or processed by the second object for a delay exceeding a preset delay
  • the target data packet is transmitted in the second object more than a preset number of times.
  • the determining module 201 includes:
  • the first determining submodule is configured to determine that the target data packet is lost at the second object if the first object does not receive the target data packet within a preset time.
  • the determining module 201 includes:
  • the second determination submodule is used to determine that the target data packet is lost in the second object if a preset number of data packets are received and the target data packet is not within the preset number of data packets; or, if a preset number of data packets are received and the target data packet is not received, determine that the target data packet is lost in the second object.
  • the determining module 201 includes:
  • the third determining submodule is configured to determine that the target data packet is lost in the second object if a preset number of data packets are received within a preset time and the target data packet is not within the preset number of data packets.
  • the determining module 201 includes at least one of the following:
  • a fourth determination submodule configured to determine that the target data packet is lost in the second object if one or a preset number of first data packets are received and the target data packet is not received, and the number of the first data packet is after the number of the target data packet;
  • a fifth determination submodule configured to determine that the target data packet is lost in the second object if a preset number of consecutive first data packets are received and the target data packet is not received, and the number of the first data packet is after the number of the target data packet;
  • a sixth determination submodule configured to determine that the target data packet is lost in the second object if a data packet with a first number is received and the target data packet is not received, wherein the first number is the number of the xth data packet after the number of the target data packet;
  • a seventh determination submodule configured to determine that the target data packet is lost in the second object if the last data packet of the data packet group where the target data packet is located is received and the target data packet is not received;
  • the eighth determination submodule is used to determine if one or a preset number of second data packets are received and the target data packet, determining that the target data packet is lost in the second object; the number of the second data packet is located after the last data packet in the data packet group where the target data packet is located, or the number of the second data packet is located after the data packet group where the target data packet is located;
  • a ninth determination submodule configured to determine that the target data packet is lost in the second object if a data packet with a second number is received and the target data packet is not received, wherein the second number is the number of the wth data packet after the number of the last data packet in the data packet group where the target data packet is located, or the second number is the number of the wth data packet after the data packet group where the target data packet is located;
  • a tenth determining submodule configured to determine that the target data packet is lost in the second object if one or a preset number of first data packet groups are received and the target data packet is not received;
  • an eleventh determining submodule configured to determine that the target data packet is lost in the second object if a data packet group with a third number is received and the target data packet is not received, wherein the third number is the number of the yth data packet group after the number of the data packet group where the target data packet is located;
  • a twelfth determination submodule configured to determine that the target data packet is lost in the second object if the first data packet in the first data packet group is received and the target data packet is not received;
  • a thirteenth determination submodule is used to determine that the target data packet is lost in the second object if one or a preset number of data packets in the first data packet group are received and the target data packet is not received;
  • a fourteenth determination submodule configured to determine that the target data packet is lost in the second object if a preset number of consecutive data packets in the first data packet group are received and the target data packet is not received;
  • a fifteenth determination submodule configured to determine that the target data packet is lost in the second object if the zth data packet in the first data packet group is received and the target data packet is not received;
  • the first data packet group is numbered after the data packet group where the target data packet is located.
  • the determining module 201 includes one of the following:
  • a sixteenth determination submodule configured to determine that the target data packet is lost in the second object if one or a preset number of first data packets are received within the preset time and the target data packet is not received, and the number of the first data packet is after the number of the target data packet;
  • a seventeenth determination submodule configured to determine that the target data packet is lost in the second object if a preset number of consecutive first data packets are received and the target data packet is not received, and the number of the first data packet is after the number of the target data packet;
  • An eighteenth determination submodule configured to determine that the target data packet is lost in the second object if a data packet with a first number is received within the preset time and the target data packet is not received, wherein the first number is the number of the xth data packet after the number of the target data packet;
  • a nineteenth determination submodule configured to determine that the target data packet is lost in the second object if the last data packet of the data packet group where the target data packet is located is received within the preset time and the target data packet is not received;
  • the twentieth determining submodule is configured to, if one or a preset number of second data packets are received within the preset time, and the target data packet is not received, it is determined that the target data packet is lost in the second object; the number of the second data packet is located after the last data packet in the data packet group where the target data packet is located, or the number of the second data packet is located after the data packet group where the target data packet is located;
  • a twenty-first determination submodule configured to determine that the target data packet is lost in the second object if a data packet with a second number is received within the preset time and the target data packet is not received, the second number being the number of the wth data packet after the number of the last data packet in the data packet group where the target data packet is located, or the second number being the number of the wth data packet after the data packet group where the target data packet is located;
  • a twenty-second determination submodule configured to determine that the target data packet is lost in the second object if one or a preset number of first data packet groups are received within the preset time and the target data packet is not received;
  • a twenty-third determining submodule configured to determine that the target data packet is lost in the second object if a data packet group with a third number is received within the preset time and the target data packet is not received, wherein the third number is the number of the yth data packet group after the number of the data packet group where the target data packet is located;
  • a twenty-fourth determination submodule configured to determine that the target data packet is lost in the second object if the first data packet in the first data packet group is received within the preset time and the target data packet is not received;
  • a twenty-fifth determination submodule is configured to determine that the target data packet is lost in the second object if one or a preset number of data packets in the first data packet group are received within the preset time and the target data packet is not received;
  • a twenty-sixth determination submodule configured to determine that the target data packet is lost in the second object if a preset number of consecutive data packets in the first data packet group are received within the preset time and the target data packet is not received;
  • a twenty-seventh determination submodule configured to determine that the target data packet is lost in the second object if the zth data packet in the first data packet group is received within the preset time and the target data packet is not received;
  • the first data packet group is numbered after the data packet group where the target data packet is located.
  • the preset time includes at least one of the following:
  • the preset period includes at least one of the following:
  • the transmission period of a packet group is a packet group.
  • the delay of the data packet corresponding to the second object includes at least one of the following:
  • the remaining delay includes at least one of the following:
  • the third data packet includes at least one of the following:
  • a preset number of data packets in the same data packet group as the target data packet is a preset number of data packets in the same data packet group as the target data packet.
  • the preset number includes at least one of the following:
  • the number of data packets included in a data packet group including: the data packet group where the target data packet is located;
  • x, y, w and/or z are network configurations or protocol agreements.
  • the data packet includes at least one of the following:
  • RLC carries the corresponding data packets
  • the data packet group includes at least one of the following:
  • the device 200 for determining packet loss further includes:
  • the execution module is configured to perform at least one of the following operations after the determination module 201 determines that the target data packet is lost in the second object:
  • the device for determining packet loss in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in the electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a terminal, or may be other devices other than a terminal.
  • the terminal may include but is not limited to the types of terminal 11 listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the device for determining packet loss provided in the embodiment of the present application can implement the various processes implemented in the method embodiment of Figure 26 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • an embodiment of the present application also provides a communication device 300, including a processor 301 and a memory 302, and the memory 302 stores a program or instruction that can be executed on the processor 301.
  • the program or instruction is executed by the processor 301, the various steps of the above-mentioned method for determining packet loss are implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application also provides a terminal, including a processor and a communication interface, the processor is used to determine that a target data packet is lost in a second object, and the second object is one or more objects before the first object in the data transmission path of the data packet.
  • the terminal embodiment corresponds to the above-mentioned method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to the terminal embodiment and can achieve the same technical effect.
  • Figure 29 is a schematic diagram of the hardware structure of a terminal implementing the embodiment of the present application.
  • the terminal 400 includes but is not limited to: a radio frequency unit 401, a network module 402, an audio output unit 403, an input unit 404, a sensor 405, a display unit 406, a user input unit 407, an interface unit 408, a memory 409, and and at least some components of processor 410, etc.
  • the terminal 400 may also include a power source (such as a battery) for supplying power to each component, and the power source may be logically connected to the processor 410 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system.
  • a power source such as a battery
  • the terminal structure shown in FIG29 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
  • the input unit 404 may include a graphics processing unit (GPU) 4041 and a microphone 4042, and the graphics processor 4041 processes the image data of the static picture or video obtained by the image capture device (such as a camera) in the video capture mode or the image capture mode.
  • the display unit 406 may include a display panel 4061, and the display panel 4061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
  • the user input unit 407 includes a touch panel 4071 and at least one of other input devices 4072.
  • the touch panel 4071 is also called a touch screen.
  • the touch panel 4071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
  • the RF unit 401 can transmit the data to the processor 410 for processing; in addition, the RF unit 401 can send uplink data to the network side device.
  • the RF unit 401 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
  • the memory 409 can be used to store software programs or instructions and various data.
  • the memory 409 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
  • the memory 409 may include a volatile memory or a non-volatile memory, or the memory 409 may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM) and a direct memory bus random access memory (DRRAM).
  • the memory 409 in the embodiment of the present application includes but is not limited to these and any other suitable types of memory.
  • the processor 410 may include one or more processing units; optionally, the processor 410 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 410.
  • the processor 410 is used to determine that the target data packet is lost in the second object, and the second object is the data packet. One or more objects that precede the first object in the data transfer path.
  • a first object when a first object processes a data packet, it can be determined whether one or more previous second objects have lost the data packet, thereby effectively optimizing the scheduling, discarding, and other processing of the data packet.
  • the first object is a first node in a data transmission path of a data packet
  • the second object is one or more communication interfaces before the first node in the data transmission path
  • the first object is a first protocol layer in a data transmission path of a data packet
  • the second object is one or more second protocol layers before the first protocol layer in the data transmission path, and the first protocol layer and the second protocol layer belong to the same node.
  • the target data packet loss includes at least one of the following situations:
  • the target data packet is not successfully delivered to the first object
  • the target data packet is not successfully transmitted in the second object
  • the target data packet is lost in the second object
  • the target data packet is transmitted or processed by the second object for a delay exceeding a preset delay
  • the target data packet is transmitted in the second object more than a preset number of times.
  • the processor 410 is configured to determine that the target data packet is lost in the second object if the first object does not receive the target data packet within a preset time.
  • the processor 410 is used to determine that the target data packet is lost in the second object if a preset number of data packets are received and the target data packet is not within the preset number of data packets; or, if a preset number of data packets are received and the target data packet is not received, determine that the target data packet is lost in the second object.
  • the processor 410 is used to determine that the target data packet is lost in the second object if a preset number of data packets are received within a preset time and the target data packet is not within the preset number of data packets; or to determine that the target data packet is lost in the second object if a preset number of data packets are received within a preset time and the target data packet is not received.
  • the processor 410 is configured to perform at least one of the following:
  • the target data packet is lost in the second object, and the first number is the number of the xth data packet after the number of the target data packet;
  • the target data packet is lost in the second object; the number of the second data packet is located in the data packet group where the target data packet is located. or the number of the second data packet is located after the data packet group where the target data packet is located;
  • the second number is the number of the wth data packet after the number of the last data packet in the data packet group where the target data packet is located, or the second number is the number of the wth data packet after the data packet group where the target data packet is located;
  • the third number is the number of the yth data packet group after the number of the data packet group where the target data packet is located;
  • the first data packet group is numbered after the data packet group where the target data packet is located.
  • the processor 410 is configured to perform one of the following:
  • the first object receives a preset number of consecutive first data packets and does not receive the target data packet, it is determined that the target data packet is lost in the second object, and the number of the first data packet is after the number of the target data packet;
  • a data packet with a first number is received and the target data packet is not received, it is determined that the target data packet is lost in the second object, and the first number is the number of the xth data packet after the number of the target data packet;
  • the number of the second data packet is located after the last data packet in the data packet group where the target data packet is located, or the number of the second data packet is located before the target data packet. After the data packet group where the data packet is located;
  • the second number is the number of the wth data packet after the number of the last data packet in the data packet group where the target data packet is located, or the second number is the number of the wth data packet after the data packet group where the target data packet is located;
  • a data packet group with a third number is received and the target data packet is not received, it is determined that the target data packet is lost in the second object, and the third number is the number of the yth data packet group after the number of the data packet group where the target data packet is located;
  • the first data packet in the first data packet group is received and the target data packet is not received, it is determined that the target data packet is lost in the second object;
  • the zth data packet in the first data packet group is received and the target data packet is not received, it is determined that the target data packet is lost in the second object;
  • the first data packet group is numbered after the data packet group where the target data packet is located.
  • the preset time includes at least one of the following:
  • the preset period includes at least one of the following:
  • the transmission period of a packet group is a packet group.
  • the delay of the data packet corresponding to the second object includes at least one of the following:
  • the remaining delay includes at least one of the following:
  • the third data packet includes at least one of the following:
  • a preset number of data packets in the same data packet group as the target data packet is a preset number of data packets in the same data packet group as the target data packet.
  • the preset number includes at least one of the following:
  • the number of data packets included in a data packet group including: the data packet group where the target data packet is located;
  • x, y, w and/or z are network configurations or protocol agreements.
  • the data packet includes at least one of the following:
  • RLC carries the corresponding data packets
  • the data packet group includes at least one of the following:
  • the processor is configured to perform at least one of the following operations after determining that the target data packet is lost in the second object:
  • the embodiment of the present application also provides a network side device, including a processor and a communication interface, the processor is used to determine that a target data packet is lost in a second object, and the second object is one or more objects before the first object in the data transmission path of the data packet.
  • a network side device including a processor and a communication interface
  • the processor is used to determine that a target data packet is lost in a second object
  • the second object is one or more objects before the first object in the data transmission path of the data packet.
  • the embodiment of the present application also provides a network side device.
  • the network side device 500 includes: an antenna 501, a radio frequency device 502, a baseband device 503, a processor 504 and a memory 505.
  • the antenna 501 is connected to the radio frequency device 502.
  • the radio frequency device 502 receives information through the antenna 501 and sends the received information to the baseband device 503 for processing.
  • the baseband device 503 processes the information to be sent and sends it to the radio frequency device 502, and the radio frequency device 502 processes the received information and sends it out through the antenna 501.
  • the method performed by the network side device in the above embodiment can be implemented in the baseband device 503, and the baseband device 503 includes a baseband processor.
  • the baseband device 503 may include, for example, at least one baseband board, and a plurality of chips are arranged on the baseband board, as shown in FIG5030, one of which is, for example, a baseband processor, which is connected to the memory 505 through a bus interface to call the program in the memory 505 and perform the network device operation shown in the above method embodiment.
  • the network side device may also include a network interface 506, which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 500 of the embodiment of the present invention also includes: instructions or programs stored in the memory 505 and executable on the processor 504.
  • the processor 504 calls the instructions or programs in the memory 505 to execute the method executed by each module shown in Figure 27 and achieves the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application further provides a network side device.
  • the network side device 600 includes: a processor 601, a network interface 602 and a memory 603.
  • the network interface 602 is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 600 of the embodiment of the present invention further includes: a memory 603 and a processor
  • the instructions or programs running on 601 the processor 601 calls the instructions or programs in the memory 603 to execute the methods executed by each module shown in Figure 27, and achieves the same technical effect. To avoid repetition, it will not be repeated here.
  • An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored.
  • a program or instruction is stored.
  • each process of the above-mentioned method embodiment for determining packet loss is implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
  • An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned method embodiment for determining packet loss, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • the embodiment of the present application further provides a computer program/program product, which is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the various processes of the above-mentioned method embodiment for determining packet loss, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the technical solution of the present application can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, disk, CD), and includes several instructions for enabling a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in each embodiment of the present application.
  • a terminal which can be a mobile phone, computer, server, air conditioner, or network device, etc.

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种确定丢包的方法、装置、通信设备及可读存储介质,属于无线通信技术领域,本申请实施例的确定丢包的方法包括:第一对象确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中所述第一对象之前的一个或多个对象。

Description

确定丢包的方法、装置、通信设备及可读存储介质
相关申请的交叉引用
本申请主张在2022年11月10日在中国提交的中国专利申请No.202211407179.3的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于无线通信技术领域,具体涉及一种确定丢包的方法、装置、通信设备及可读存储介质。
背景技术
在网络架构中,数据流经过多个不同的接口(如N1接口,N2接口,N3接口…,或者,X1接口、X2接口……等)到达不同的节点,到达不同的节点时,在该节点按定义的协议栈对数据包进行处理。
如何在节点或者协议层对数据包进行处理,以有效优化数据包的调度、丢弃等,是需要解决的问题。
发明内容
本申请实施例提供一种确定丢包的方法、装置、通信设备及可读存储介质,能够解决如何有效优化数据包的调度、丢弃等处理的问题。
第一方面,提供了一种确定丢包的方法,包括:
第一对象确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中所述第一对象之前的一个或多个对象。
第二方面,提供了一种确定丢包的装置,包括:
确定模块,用于确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中所述第一对象之前的一个或多个对象。
第三方面,提供了一种通信设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如上述第一方面所述的确定丢包的方法的步骤。
第四方面,提供了一种通信设备,包括处理器及通信接口,其中,所述处理器用于确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中所述第一对象之前的一个或多个对象。
第五方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现上述第一方面所述的确定丢包的方法的步骤。
第六方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述 处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的确定丢包的方法的步骤。
第七方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的确定丢包的方法的步骤。
在本申请实施例中,在第一对象对数据包进行处理时,可以确定前面一个或多个第二对象是否丢失数据包,从而可以有效优化数据包的调度、丢弃等处理。
附图说明
图1为本申请实施例可应用的一种无线通信系统的框图;
图2为5G系统的架构示意图;
图3为接入网的结构示意图;
图4为非漫游情况下基于业务接口的5G系统的结构示意图;
图5为为非漫游情况下使用参考点的5G系统结构示意图;
图6为非漫游条件下UE使用多个PDU会话同时接入两个数据网络的情况示意图;
图7为漫游场景下使用单一PDU会话同时接入两个数据网络的结构示意图;
图8为UE通过非3gpp接入数据网络的示意图;
图9为非漫游场景下5GC和EPC互操作的结构示意图;
图10为NG-U协议栈的结构示意图;
图11为NG-C协议栈的结构示意图;
图12为AN和AMF的N2接口协议栈的结构示意图;
图13为AN和AMF的N2接口协议栈以及AMF与AMF的N11接口协议栈的结构示意图;
图14为Xn-C协议栈的结构示意图;
图15为用户面协议栈的结构示意图;
图16为控制面协议栈的结构示意图;
图17为SM、SMS、UE策略、LCS的NAS传输的结构示意图;
图18为UE与AMF之间的接口的结构示意图;
图19为UE与SMF之间的接口的结构示意图;
图20为UE PDU会话的用户面协议栈的结构示意图;
图21为F1接口协议的示意图;
图22为在UE和N3IWF之间建立信令IPsec SA之前的控制面的示意图;
图23为在UE和N3IWF之间建立信令IPsec SA之前的用户面的示意图;
图24为在UE和N3IWF的接口的协议栈的示意图;
图25为SBI协议栈的示意图;
图26为本申请实施例的确定丢包的方法的流程示意图;
图27为本申请实施例的确定丢包的装置的结构示意图;
图28为本申请实施例的通信设备的结构示意图;
图29为本申请实施例的终端的结构示意图;
图30为本申请实施例的网络侧设备的结构示意图之一;
图31为本申请实施例的网络侧设备的结构示意图之二。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal  computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备可以包括基站、WLAN接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。核心网设备可以包含但不限于如下至少之一:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM),统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF),网络开放功能(Network Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。
下面首先对本申请涉及的相关技术内容进行说明。
1.XR业务
扩展现实(eXtended reality,XR)是指由计算机技术和可穿戴设备产生的所有真实与虚拟的组合环境和人机交互。它包括增强现实(Augmented Reality,AR)、混合现实(Mixed Reality,MR)、虚拟现实(Virtual Reality,VR)等代表性形式,以及它们之间的交叉领域。虚拟世界的级别从部分感官输入到完全沉浸式虚拟现实。XR的一个关键方面是人类经验的扩展,尤其是与存在感(以VR为代表)和认知习得(以AR为代表)相关的经验。
对于VR业务,上行以较为密集的小数据包传输为主,这些小数据包可承载手势、控制等信息,作为下行呈现数据的输入和参考;下行以视频和音频等多媒体数据传输为主,通过这些多媒体数据的及时接收以及呈现,向用户提供沉浸式的感受。以下行视频数据为例,数据包周期或准周期性到达,数据速率可达几十甚至上百兆比特每秒(megabits per  second,Mbps),帧率(Frame per Second,FPS)的典型值为60或120,相邻数据包之间的间隔大致为1/FPS秒,这些数据在空口一般需要在10毫秒(ms)内成功传输,并且传输成功率要求不低于99%甚至99.9%。
对于AR业务,上行除了上述密集小数据包传输之外,也可能传输视频和音频等多媒体数据,其业务特性和下行类似,通常数据速率相对较低,例如最多几十Mbps,空口传输的时间限制也可以放宽,例如一般需要在60ms内成功传输;下行数据传输特性基本与VR业务一致。
用户希望在扩展现实中进行交互和操作。动作和互动包括动作、手势和身体反应。因此,自由度(Degree of Freedom,DoF)描述了用于定义3D空间中视口移动的独立参数的数量。
在XR的应用场景中,用户在虚拟现实体验中可以通过转头等动作来获取新视野角度的信息。这时XR用户的转头动作可以通过发送一个上行信号告知基站,基站在接收到上行信号后,会为该XR用户调度所需的下行数据以供使用。
XR业务主要包括视频数据、音频数据以及一些具有控制功能的控制信令和特殊数据。在无线网络中,XR业务传输主要涉及用户设备(User Equipment,UE,也可以称为终端)与无线通过新网络(例如LTE/NR等)之间的上行和下行视频/音频数据传输和交互。其中,UE在传输视频、音频数据本身的同时,需要通过无线网络上行传输一些具有控制功能的控制信令和特殊数据,用以对控制网络为UE发送的XR业务中视频和音频业务数据的生成、处理及下行无线传输。
这些具有控制功能的控制信息和特殊数据包括UE XR(扩展现实)应用编码器生成的一些业务控制数据及业务传输协议包含的控制数据信息,例如:
从应用层面,可以包括(但不限于):
1)视频编码器生成的I帧(关键帧)或非视场角(non Field of view,non-FOV)帧;
2)传感器采集的用户行为数据,如姿势(pose)/控制(control)数据等;网络可以通过这些数据的接收,判断用户行为,例如上述的用户转头等动作,进而调整发送的视频数据内容。
从传输协议层面,可以包括:
1)针对下行音频/视频业务传输的传输控制协议(Transmission Control Protocol,TCP)确认字符(Acknowledge character,ACK)信令(TCP反馈),网络需要根据相应视频/音频帧是否已被UE确认,决定是否可以继续发送后续帧;
2)RTP控制协议(RTP Control Protocol,RTCP)ACK信令,用于控制数据实时传输的控制信令,确认业务数据传输的实时性要求及时间同步。
网络通常需要及时、可靠地接收到来自UE的这些具有控制功能的控制信令和特殊数据,用以获取当前业务的传输状态以及相关必要控制信息;应用服务器需要基于这些信息、进一步生成后续所需传输的视频、音频业务数据,并递交给无线网络进行处理和传输,最 终将这些业务数据下行发送给UE。
2.缓存区状态报告(Buffer Status Report,BSR)上报
为了便于网络侧基于上行待传数据执行上行调度,从LTE开始,引入了BSR上报机制,由UE向基站上报各逻辑信道组对应的上行待传数据量,NR中基本沿用了此机制。
BSR上报的粒度为逻辑信道组(Logical Channel Group,LCG),每个建立的逻辑信道可以为其配置一个归属的逻辑信道组,NR中支持为单个UE同时配置最多8个逻辑信道组。
BSR基于下列事件来触发:
1)某个逻辑信道组的某个逻辑信道有新的上行待传数据到来,并且,此逻辑信道的优先级比之前有上行待传数据的逻辑信道的优先级都更高,或者,此新数据到达之前所有逻辑信道都没有上行待传数据,此时将触发常规BSR(Regular BSR);
2)在组织某个上行新传传输块(Transport Block,TB)时,此新传TB中的捎带(Padding)比特数大于等于(单个BSR媒体接入控制(Medium Access Control,MAC)控制单元(Control Element,CE)加其对应的子头(Subheader))占用的比特数(即此新传TB中的Padding比特还可以容纳单个BSR MAC CE对应的比特),此时将触发Padding BSR;
3)retxBSR-Timer计时器超时,并且至少一个逻辑信道存在上行待传数据,此时将触发Regular BSR;
4)periodicBSR-Timer计时器超时,此时将触发周期性(Periodic)BSR。
当触发了Regular BSR,并且没有用于新传的上行资源时,UE将触发调度请求(Scheduling Request,SR),通过物理上行控制信道(Physical Uplink Control Channel,PUCCH)传输或随机接入向网络请求上行新传资源。
当触发了Periodic BSR时,UE仅在有上行新传资源时,在构造的上行TB中包含一个BSR MAC CE,但并不会通过触发SR来主动向网络请求上行新传资源。
当触发了Padding BSR时,UE直接在上行新传TB中包含一个BSR MAC CE。
3.接入层(Access Stratum,AS)数据传输机制
3.1分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层和无线承载(radio bearer)
UE的应用层(Application,APP)生成的业务数据,会按照其对应的服务质量(Quality-of-service,QoS)要求,被归类为不同业务数据流,每个业务数据流对应于同样或相似的QoS需求。在NR系统中,所述业务数据流对应于一个QoS flow,而在LTE系统中,所述的业务数据流对应于一个演进型分组系统(Evolved Packet System,EPS)承载。
业务数据会以数据包(Packet)的形式,递交到AS层,并在AS层根据其所对应的QoS flow(NR)或者EPS承载(LTE),被进一步映射到一个无线承载(Radio Bearer)中。一个无线承载包括一个PDCP实体(PDCP协议层处理实体),一个无线链路控制(Radio Link Control,RLC)实体(RLC协议层处理实体)以及相应的逻辑信道(位于媒体接入 控制(Medium Access Control,MAC)协议层)。
当一个递交到AS层的数据包被映射到一个无线承载后,会以PDCP业务数据单元(service Data Unit,SDU)的形式,递交到相应的PDCP实体进行处理。PDCP实体会为每个到达的PDCP SDU生成一个对应的PDCP协议数据单元(Protocol Data Unit,PDU),并设置一个PDCP序列号(Sequence Number,SN),用于表示PDCP实体中每个PDCP SDU及其相应PDCP PDU对应的传输次序;其中,PDCP SN的取值按照PDCP SDU递交到PDCP实体的顺序设置,先到达的PDCP SDU传输次序在先、后递交的次序在后。具体地,PDCP实体会维护一个内部变量TX_NEXT,表示PDCP实体传输的PDCP PDU的总数,用于设置PDCP SN的值;PDCP实体建立时将其初始化为0,每次一个PDCP SDU从上层(Upper layers)递交到相应PDCP实体后,PDCP实体会将该PDCP SDU对应的PDCP PDU的SN设置为TX_NEXT,并将TX NEXT加1。之后,PDCP实体会为每个PDCP SDU添加头文件,生成相应的PDCP PDU,其中包含为该PDCP PDU设置的SN值。PDCP实体通常会按照PDCP PDU所包含的SN的顺序,将PDCP PDU按序递交给下层协议层(RLC)进行后续处理和传输。其中SN是一个序数,表示每个PDCP SDU是第几个传输的。
总体原则就是PDCP SDU到达PDCP实体越早,SN值越小,传输的越早。
3.2 RLC层
从PDCP实体的递交到相应RLC实体的PDCP PDU,会被当作待传的RLC SDU缓存在UE的缓冲区内,并由RLC实体进行进一步处理。具体地,当某个RLC实体对应的逻辑信道被分配一定的传输资源(见下述对MAC层和逻辑信道的介绍)时,RLC实体将根据所分配传输资源所能容纳的数据量,以及缓冲区内待传数的RLC SDU的数据量,确定哪些RLC SDU可以复用到所分配的传输资源中进行传输。
对于RLC实体确定的、可以完整复用到所分配传输资源的一个或多个RLC SDU,RLC实体会为这些RLC SDU分别添加对应的RLC头文件,并生成对应的RLC PDU,递交给下层协议层(MAC)进行后续的处理和传输。而在复用了上述完整的RLC PDU后,如果仍有一定资源剩余、但不足以再复用一个完整的RLC SDU(即,资源能支持的数据量小于复用下一个RLC SDU所需的数据量),则RLC实体会进行分段处理,即为下一个待传输的RLC SDU的一部分数据添加头文件,生成RLC PDU并递交给下层协议层进行后续处理和传输。
对于这种被分段的RLC SDU,剩余部分将会仍然被保留在UE的缓冲区,等待下次上行传输资源的到来,再行传输。
3.3 MAC层和逻辑信道
每个无线承载对应的RLC实体,在MAC层进一步对应于一个逻辑信道(logical channel)。当UE被分配了一个上行传输资源的授权后(Uplink grant),UE的MAC实体会进一步将本次上行传输的资源,在多个逻辑信道间进行分配。具体地,每个逻辑信道对应于一个逻辑信道优先级,UE的MAC实体基于逻辑信道优先处理(Logical channel  prioritization,LCP)的资源分配机制,按照逻辑信道优先级由高到低的顺序为每个逻辑信道分配本次上行传输可用的传输资源,其对应于每个逻辑信道可以传输的数据量。
如上所述,基于每个逻辑信道所分配到的传输资源,对应的RLC实体将会将一个或者多个RLC PDU递交给MAC层相应的逻辑信道。MAC层会将每个逻辑信道从RLC实体获得的这些RLC PDU作为待传输的MAC SDU,添加相应逻辑信道对应的MAC头文件,形成对应逻辑信道的MAC subPDU,并将其复用到整个传输资源中,作为这个逻辑信道本次上行传输所发送的数据。多个逻辑信道的MAC subPDU会被组合在一起,最终组成一个MAC PDU,作为本次上行发送的数据包,通过无线信号向网络进行传输。
需要指出的是,由于RLC实体会对RLC SDU进行分段处理(如上所述),对于每个UE获得的上行传输资源,UE需要首先将在之前传输中被分段、且尚未传输完毕的RLC SDU的剩余部分复用到资源中进行传输,之后才能传输后续的其他RLC SDU对应的数据包。
总的来说,现有LTE和NR网络中,UE针对每个无线承载的数据,通常采用“先到达、先传输”的原则实现上述上行数据处理和传输过程。具体地,针对每个无线承载,UE在上述每个协议层会按照数据包(SDU)递交到本层对应实体的先后顺序处理数据包,并且将处理后的数据包(PDU)按序递交给下一协议层。也就是说,对于先递交到AS层的数据包,相应PDCP实体将会为其设置靠前的PDCP SN值,使其率先获得个上述各协议层的处理,并率先复用到上行资源中进行传输;而后到达的数据包,则会被分配靠后的PDCP SN取值,通常会在先到达数据包之后被各上述协议层处理、复用及传输。这也意味着,对于映射到每个无线承载上的数据包,UE最终执行的是按照数据包到达AS先后顺序的按序传输机制。
采用这种原则的主要是基于传输时延考虑:由于现有无线网络中,每个无线承载中数据的传输时延要求基本相同,而现有无线网络中不允许UE AS层获取每个数据包具体内容、无法执行针对每个数据包的区分处理;因此,按照数据包到达的顺序来进行数据包的上行处理、调度和传输,从尽量保证时延的角度,是较为合理的方式。
4.PDCP层丢弃计时器(Discard timer)
DiscardTimer的基本原理:数据无线承载(Data Radio Bearer,DRB)丢弃计时器,只有DRB才有。发送侧对每一个从上层来SDU都会启动一个新的计时器,超时后丢弃该SDU。用于防止发送缓冲拥塞。此计时器具体时长是由上层RRC配置。
具体地,当接收到上层递送的PDCP SDU时,则发送侧PDCP实体即启动与此PDCP SDU相关联的一个丢弃计时器。
当此PDCP SDU相关联的丢弃计时器超时,或者此PDCP SDU成功传输时(即由PDCP状态报告确认成功传输),则发送侧PDCP实体需要丢弃此PDCP SDU以及对应的PDCP数据PDU。如果此PDCP数据PDU已经传递到下层,则需要指示下层丢弃。
对于信令无线承载(Signalling Radio Bearer,SRB),当上层请求一个PDCP SDU丢 弃,则PDCP实体需要丢弃所有存储的PDCP SDU和PDCP PDU。
当然,丢弃一个已经与PDCP SN相关联的PDCP SDU,会在传输的PDCP数据PDU中带来一个SN缺口(gap),这会在接收PDCP实体增加对应的PDCP乱序(re-ordering)延时,这时会基于UE实现来保证在SDU丢弃后如何最小化SN gap。
5.PDU集合(set)
PDU集合由一个或多个PDU组成,这些PDU承载在应用层生成的一个信息单元的有效载荷。在一些实现中,应用层需要PDU集合中的所有PDU来使用相应的信息单元。在其他实现中,当一些PDU丢失时,应用层仍然可以恢复部分或全部信息单元。
6.数据突发
数据突发是指应用程序在短时间内产生的数据,包括来自一个或多个PDU集合的PDU。
7. 5G架构
请参考图2,5G系统由接入网(Access Network,AN)(即图中的NG-RAN)和核心网(5GC)组成。若考虑非独立组网(Non-Stand Alone,NSA)场景,则还需要考虑4G的网元。
7.1 AN有两种:
1)gNB,为UE提供NR用户面和控制面协议终结点。
2)ng-eNB,为UE提供E-UTRA的用户面和控制面协议的终结点。
7.2 AN网络结构
请参考图3,每个逻辑gNB由一个gNB-CU(集中单元)和若干个gNB-DU(分布单元)组成。每个gNB-CU和gNB-DU通过F1逻辑接口连接。
7.3非漫游情况下基于业务接口的5G系统
请参考图4,图4为非漫游情况下基于业务接口的5G系统的结构示意图。
请参考图5,图5为非漫游情况下使用参考点的5G系统结构示意图,此图展现网元功能之间相互作用。和其他传统的蜂窝移动网络结构理解思路类似。
请参考图6,图6为非漫游条件下UE使用多个PDU会话(Session)同时接入两个数据网络的情况。此图使用参考点来展示了为多个PDU会话选用两个SMF的场景。在这种情况下每个SMF也能够为一个PDU会话来控制本地(local)和中心(central)的UPF。
请参考图7,图7为漫游场景下使用单一PDU会话同时接入两个数据网络(local andcentral)的结构。
请参考图8,图8为UE通过非3GPP接入数据网络的示意图。
请参考图9,图9为非漫游场景下5GC和演进型分组核心网(Evolved Packet Core,EPC)互操作的结构示意图。
8.协议栈
8.1 5G-AN和5GC的接口(N2)协议栈
请参考图10,图10为NG-U协议栈的结构示意图。
请参考图11,图11为NG-C协议栈的结构示意图。
请参考图12,图12为AN和AMF的N2接口协议栈的结构示意图。
请参考图13,图13为AN和AMF的N2接口协议栈以及AMF与AMF的N11接口协议栈的结构示意图。
N2-SM消息是NG-AP消息的一部分,这部分消息由AMF负责透传。从接入网的角度N2-SM消息终结于AMF。
8.2 Xn接口(用于NG-RAN node之间互联)协议栈
Xn-U协议栈的结构请参见图10中NG-U协议栈的结构示意图。
请参考图14,图14为Xn-C协议栈的结构示意图。
8.3空口协议栈
请参考图15,图15为用户面协议栈的结构示意图。
请参考图16,图16为控制面协议栈的结构示意图。
8.4 UE和5GC接口
N1NAS信令的终结点为UE和AMF,一个NAS信令连接用于注册管理/连接管理(Registration Management,RM/Connection Management,CM)和会话管理(Session Management,SM)。NAS协议由NAS-MM和NAS-SM两部分组成;此外UE和5GC间还有多个其它协议(SM、SMS、UE策略(policy)、位置服务(LoCation Services,LCS)等),这都协议都是通过N1NAS-MM进行透传的。
RM/CM NAS消息和其它类型的NAS消息是解耦的,也就是AMF负责RM/CM,其它的消息就透传给对应的模块去处理。
如果UE同时通过3GPP和non-3GPP接入网接入5GC,那么每个接入模式下都有一个N1NAS信令连接。
请参考图17,图17为SM、SMS、UE策略、LCS的NAS传输的结构示意图。
8.4.1 UE-AMF
请参考图18,图18为UE与AMF之间的接口的结构示意图。
8.4.2 UE-SMF
请参考图19,图19为UE与SMF之间的接口的结构示意图。
8.4.3 UE PDU会话的用户面协议栈
请参考图20,图20为UE PDU会话的用户面协议栈的结构示意图。
8.5 F1接口协议
请参考图21,图21为F1接口协议的示意图。
8.6 non-3GPP接入
请参考图22,图22为在UE和非3GPP交互功能(Non-3GPP InterWorking Function,N3IWF)之间建立信令IPsec SA之前的控制面的示意图。
请参考图23,图23为在UE和N3IWF之间建立信令IPsec SA之前的用户面的示意图。
请参考图24,图24为在UE和N3IWF的接口的协议栈的示意图。
8.5 5GC-5GC
5GC内部网元之间的接口为基于服务接口(Service Based Interface,SBI),采用超文本传输协议(Hyper Text Transfer Protocol,HTTP)服务的形式。SBI接口有:Namf,Nsmf,Nudm,Nnrf,Nnssf,Nausf,Nnef,Nsmsf,Nudr,Npcf,N5g-eir,Nlmf。
请参考图25,图25为SBI协议栈的示意图。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的确定丢包的方法、装置、通信设备及可读存储介质进行详细地说明。
请参考图26,本申请实施例提供一种确定丢包的方法,包括:
步骤101:第一对象确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中所述第一对象之前的一个或多个对象。
在本申请实施例中,在第一对象对数据包进行处理时,可以确定前面一个或多个第二对象是否丢失数据包,从而可以有效优化数据包的调度、丢弃等处理。
本申请实施例中,所述数据包丢失包括以下情况中的至少之一:
1)所述目标数据包未成功送达第一对象。
2)所述目标数据包在第二对象未成功传输。
3)所述目标数据包在第二对象丢失。
4)所述目标数据包在第二对象传输或处理超过预设延时。
5)所述目标数据包在第二对象传输超过预设次数。
本申请实施例中,可选的,所述第一对象为第一节点。
可选的,所述第一对象可以为上述介绍的网络架构中的任一节点。
本申请实施例中,所述第一对象对数据包的数据传输路径中的第一节点,所述第二对象为所述数据传输路径中所述第一节点之前的一个或多个通信接口。比如,RAN侧节点(g)NB为第一节点,则对应的通信接口包括以下至少一项:N2,N3,N4,…N12等。
本申请实施例中,可选的,所述第一对象为第一协议层。
可选的,所述第一对象可以为上述介绍的协议栈结构中的任一层协议栈。
可选的,所述第二对象为数据包的数据传输路径中所述第一协议层之前的一个或多个第二协议层,所述第一协议层和所述第二协议层属于同一节点,所述节点包括网络节点或终端节点。比如,空口协议层中的MAC为第一对象,则对于下行业务,对应的第二对象为服务数据适应协议(Service Data Adaptation Protocol,SDAP),PDCP,RLC等中的一层或多层。
本申请实施例中,可选的,所述第一对象根据以下至少之一确定目标数据包在第二对象丢失:计时器、计数器和编号。
(1)基于计时器确定目标数据包在第二对象丢失
本申请实施例中,可选的,所述第一对象确定目标数据包在第二对象丢失包括:若所述第一对象在预设时间内未接收到所述目标数据包,确定所述目标数据包在第二对象丢失。
本申请实施例中,可选的,所述预设时间包括以下至少之一:
1)预设周期的个数;
本申请实施例中,可选的,所述预设周期包括以下至少之一:
数据包的周期;即数据包的产生周期;
数据包组的周期;即数据包组的产生周期;
业务周期;
数据包的传输周期;
数据包组的传输周期。
2)网络配置的时间;
3)协议约定的时间;
4)所述第二对象对应的数据包的延时;
本申请实施例中,可选的,所述第二对象对应的数据包的延时包括以下至少之一:
数据包在所述第二对象的延时需求;例如包延时预算(packet Delay budget,PDB)或PDU集合延时预算(PDU set Delay budget,PSDB)。
数据包在所述第二对象的延时。
5)所述目标数据包的剩余延时;
本申请实施例中,可选的,所述剩余延时包括以下至少之一:
用于判断数据包丢弃或超时的剩余延时;
数据包在所述第一对象的剩余延时;
数据包在所述第一对象的剩余延时需求。即PDB/PSDB在经过第一对象的延时后的剩余延时需求,或者在第一对象上的延时需求。
具体地,剩余延时包括:延时需求减去第一对象占用的时延。
6)与所述目标数据包在同一数据包组内的第三数据包到达所述第一对象的时间。
本申请实施例中,可选的,所述第三数据包包括以下至少之一:
与所述目标数据包在同一数据包组内的最后一个数据包;
与所述目标数据包在同一数据包组内的预设数量个数据包。
(2)基于计数器确定目标数据包在第二对象丢失
本申请实施例中,可选的,所述第一对象确定目标数据包在第二对象丢失包括:
若所述第一对象接收到预设数量个数据包,且所述目标数据包未在所述预设数量个数据包之内,确定所述目标数据包在第二对象丢失;或,
若所述第一对象接收到预设数量个数据包,且未收到所述目标数据包,确定所述目标数据包在第二对象丢失。
本申请实施例中,可选的,所述预设数量包括以下至少之一:
网络配置的数量;
协议约定的数量;
数据包组内包括的数据包数量,所述数据包组包括:所述目标数据包所在的数据包组;
预设时间内的数据包数量;
预设时间内与所述目标数据包在同一个数据包组内的到达所述第一对象的数据包的数量。
(3)基于计时器和计数器确定目标数据包在第二对象丢失
本申请实施例中,可选的,所述第一对象确定目标数据包在第二对象丢失:
若所述第一对象在预设时间内,接收到预设数量个数据包,且所述目标数据包未在所述预设数量个数据包之内,确定所述目标数据包在第二对象丢失;或,
若所述第一对象在预设时间内,接收到预设数量个数据包,且未收到所述目标数据包,确定所述目标数据包在第二对象丢失。
(4)基于编号确定目标数据包在第二对象丢失
本申请实施例中,可选的,所述第一对象确定所述目标数据包在第二对象丢失包括以下至少之一:
若所述第一对象接收到一个或预设数量个第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;具体地,比如,数据包有1,2,3,4,5,6,7,8,9,如果收到了数据包3后面的任意4个数据包,且没有收到数据包3,则确定数据包3丢失。
若所述第一对象接收到预设数量个连续的第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;具体地,比如,数据包有1,2,3,4,5,6,7,8,9,如果收到了数据包3后面的第4,5,6,7个数据包,且没有收到数据包3,则确定数据包3丢失。
若所述第一对象接收到第一编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一编号是所述目标数据包的编号之后的第x个数据包的编号;所述x的取值可以为0,1,2……等。具体地,比如,数据包有1,2,3,4,5,6,7,8,9,如果收到了数据包3后面的第7个数据包,且没有收到数据包3,则确定数据包3丢失。若所述第一对象接收到所述目标数据包所在的数据包组的最后一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;具体地,比如,数据包有1,2,3,4,5,6,7,8,9,如果收到了数据包3后面的第9个数据包,且没有收到数据包3,则确定数据包3丢失。
若所述第一对象接收到一个或预设数量个第二数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;所述第二数据包的编号位于所述目标数据包所在的数据包组中的最后一个数据包之后,或所述第二数据包的编号位于所述目标数据包所 在的数据包组之后;
若所述第一对象接收到第二编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第二编号是与所述目标数据包所在的数据包组中的最后一个数据包的编号之后的第w个数据包的编号,或所述第二编号是与所述目标数据包所在的数据包组之后的第w个数据包的编号;所述w的取值可以为0,1,2……等。
若所述第一对象接收到一个或者预设数量个第一数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象接收到第三编号的数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第三编号是所述目标数据包所在的数据包组的编号之后的第y个数据包组的编号;所述y的取值可以为0,1,2……等。
若所述第一对象接收到第一数据包组内的第一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象接收到第一数据包组内的一个或预设数量个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象接收到第一数据包组内的预设数量个连续的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象接收到第一数据包组内的第z个的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;所述z的取值可以为0,1,2……等。
其中,所述第一数据包组的编号位于所述目标数据包所在的数据包组之后。
(5)基于编号和计时器确定目标数据包在第二对象丢失
本申请实施例中,可选的,所述第一对象确定目标数据包在第二对象丢失包括以下之一:
若所述第一对象在所述预设时间内,接收到一个或预设数量个第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
若所述第一对象在所述预设时间内,接收到预设数量个连续的第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
若所述第一对象在所述预设时间内,接收到第一编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一编号是所述目标数据包的编号之后的第x个数据包的编号;
若所述第一对象在所述预设时间内,接收到所述目标数据包所在的数据包组的最后一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象在所述预设时间内,接收到一个或预设数量个第二数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;所述第二数据包的编号位 于所述目标数据包所在的数据包组中的最后一个数据包之后,或所述第二数据包的编号位于所述目标数据包所在的数据包组之后;
若所述第一对象在所述预设时间内,接收到第二编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第二编号是与所述目标数据包所在的数据包组中的最后一个数据包的编号之后的第w个数据包的编号,或所述第二编号是与所述目标数据包所在的数据包组之后的第w个数据包的编号;
若所述第一对象在所述预设时间内,接收到一个或者预设数量个第一数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象在所述预设时间内,接收到第三编号的数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第三编号是所述目标数据包所在的数据包组的编号之后的第y个数据包组的编号;
若所述第一对象在所述预设时间内,接收到第一数据包组内的第一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象在所述预设时间内,接收到第一数据包组内的一个或预设数量个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象在所述预设时间内,接收到第一数据包组内的预设数量个连续的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述第一对象在所述预设时间内,接收到第一数据包组内的第z个的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
其中,所述第一数据包组的编号位于所述目标数据包所在的数据包组之后。
需要说明的是,本申请实施例中的编号可以是从小到大编号,则上述内容中所提到的靠后的数据包或数据包组的编号要大于靠前的数据包或数据包组。当然,本申请实施例中的编号可以是从大到小编号,则上述内容中所提到的靠后的数据包或数据包组的编号要小于靠前的数据包或数据包组。
上述实施例中的第一对象接收到数据包也可以描述为数据包传输到或成功传输到第一对象,或者,送达或成功送达到第一对象。
本申请实施例中,可选的,所述预设时间包括以下至少之一:
预设周期的个数;
网络配置的时间;
协议约定的时间;
所述第二对象对应的数据包的延时;
所述目标数据包的剩余延时;
与所述目标数据包在同一数据包组内的第三数据包到达所述第一对象的时间。
本申请实施例中,可选的,所述预设周期包括以下至少之一:
数据包的周期;
数据包组的周期;
业务周期;
数据包的传输周期;
数据包组的传输周期。
本申请实施例中,可选的,所述第二对象对应的数据包的延时包括以下至少之一:
数据包在所述第二对象的延时需求;
数据包在所述第二对象的延时。
本申请实施例中,可选的,所述剩余延时包括以下至少之一:
用于判断数据包丢弃或超时的剩余延时;
数据包在所述第一对象的剩余延时;
数据包在所述第一对象的剩余延时需求。
本申请实施例中,可选的,所述第三数据包包括以下至少之一:
与所述目标数据包在同一数据包组内的最后一个数据包;
与所述目标数据包在同一数据包组内的预设数量个数据包。
本申请实施例中,可选的,所述预设数量包括以下至少之一:
网络配置的数量;
协议约定的数量;
数据包组内包括的数据包数量,所述数据包组包括:所述目标数据包所在的数据包组;
预设时间内的数据包数量;
预设时间内与所述目标数据包位于同一个数据包组内的到达所述第一对象的数据包的数量。
本申请实施例中,可选的,所述x、y、w和/或z为网络配置或协议约定。
本申请实施例中,可选的,所述数据包包括以下至少之一:
PDCP SDU;
PDCP PDU;
PDCP缓存(buffer)中的数据包;
RLC承载(bearer)对应的数据包;
MAC SDU对应的数据包;
MAC PDU对应的数据包;
PDU;
PDU集合(set);
数据突发(Burst);
数据帧(Frame);
数据切片(Slice);
图片(Picture);
图片组(Group of picture,GOP);
PDU集合组(group of PDU set);
PDU组(group of PDU);
IP数据包(packet)。
本申请实施例中,可选的,所述数据包组以下至少之一:
PDU集合组;
PDU集合;
数据突发;
数据帧;
数据切片;
图片;
图片组;
PDU组;
IP数据包。
本申请实施例中,可选的,所述第一对象确定目标数据包在第二对象丢失之后,执行如下操作中的至少之一:
1)继续数据包的传输或处理;
即继续传输或处理所述目标数据包所在的数据包组内的其他数据包。
2)丢弃所述目标数据包所在数据包组其它的数据包;
3)丢弃与所述目标数据包相关联的其它的数据包;
4)丢弃基于所述目标数据包的其它数据包;
基于所述目标数据包的其他数据包是指依赖于(depends on)所述目标数据包的其他数据包。
5)降低所述目标数据包所在数据包组内其它数据包优先级。
所述优先级包括以下至少一项:调度优先级,传输优先级,处理优先级和解码优先级。本申请实施例,适用于XR业务的数据包的处理,同样适用于其他与XR业务具有类似业务特点(数据流中的数据包按照编号依次传输的业务)的数据包的处理。
本申请实施例提供的确定丢包的方法,执行主体可以为确定丢包的装置。本申请实施例中以确定丢包的装置执行确定丢包的方法为例,说明本申请实施例提供的确定丢包的装置。
请参考图27,本申请实施例还提供一种确定丢包的装置200,包括:
确定模块201,用于确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中所述第一对象之前的一个或多个对象。
在本申请实施例中,在第一对象对数据包进行处理时,可以确定前面一个或多个第二对象是否丢失数据包,从而可以有效优化数据包的调度、丢弃等处理。
可选的,所述第一对象为数据包的数据传输路径中的第一节点,所述第二对象为所述数据传输路径中所述第一节点之前的一个或多个通信接口;
或者
所述第一对象为数据包的数据传输路径中的第一协议层,所述第二对象为所述数据传输路径中所述第一协议层之前的一个或多个第二协议层,所述第一协议层和所述第二协议层属于同一节点。
可选的,所述目标数据包丢失包括以下情况中的至少之一:
所述目标数据包未成功送达所述第一对象;
所述目标数据包在所述第二对象未成功传输;
所述目标数据包在所述第二对象丢失;
所述目标数据包在所述第二对象传输或处理超过预设延时;
所述目标数据包在所述第二对象传输超过预设次数。
可选的,所述确定模块201包括:
第一确定子模块,用于若所述第一对象在预设时间内未接收到所述目标数据包,确定所述目标数据包在第二对象丢失。
可选的,所述确定模块201包括:
第二确定子模块,用于若接收到预设数量个数据包,且所述目标数据包未在所述预设数量个数据包之内,确定所述目标数据包在第二对象丢失;或,若接收到预设数量个数据包,且未收到所述目标数据包,确定所述目标数据包在第二对象丢失。
可选的,所述确定模块201包括:
第三确定子模块,用于在预设时间内,接收到预设数量个数据包,且所述目标数据包未在所述预设数量个数据包之内,确定所述目标数据包在第二对象丢失。
可选的,所述确定模块201包括以下至少之一:
第四确定子模块,用于若接收到一个或预设数量个第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
第五确定子模块,用于若接收到预设数量个连续的第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
第六确定子模块,用于若接收到第一编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一编号是所述目标数据包的编号之后的第x个数据包的编号;
第七确定子模块,用于若接收到所述目标数据包所在的数据包组的最后一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第八确定子模块,用于若接收到一个或预设数量个第二数据包,且未接收到所述目标 数据包,确定所述目标数据包在所述第二对象丢失;所述第二数据包的编号位于所述目标数据包所在的数据包组中的最后一个数据包之后,或所述第二数据包的编号位于所述目标数据包所在的数据包组之后;
第九确定子模块,用于若接收到第二编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第二编号是与所述目标数据包所在的数据包组中的最后一个数据包的编号之后的第w个数据包的编号,或所述第二编号是与所述目标数据包所在的数据包组之后的第w个数据包的编号;
第十确定子模块,用于若接收到一个或者预设数量个第一数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第十一确定子模块,用于若接收到第三编号的数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第三编号是所述目标数据包所在的数据包组的编号之后的第y个数据包组的编号;
第十二确定子模块,用于若接收到第一数据包组内的第一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第十三确定子模块,用于若接收到第一数据包组内的一个或预设数量个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第十四确定子模块,用于若接收到第一数据包组内的预设数量个连续的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第十五确定子模块,用于若接收到第一数据包组内的第z个的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
其中,所述第一数据包组的编号位于所述目标数据包所在的数据包组之后。
可选的,所述确定模块201包括以下之一:
第十六确定子模块,用于若在所述预设时间内,接收到一个或预设数量个第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
第十七确定子模块,用于若接收到预设数量个连续的第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
第十八确定子模块,用于若在所述预设时间内,接收到第一编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一编号是所述目标数据包的编号之后的第x个数据包的编号;
第十九确定子模块,用于若在所述预设时间内,接收到所述目标数据包所在的数据包组的最后一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第二十确定子模块,用于若在所述预设时间内,接收到一个或预设数量个第二数据包, 且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;所述第二数据包的编号位于所述目标数据包所在的数据包组中的最后一个数据包之后,或所述第二数据包的编号位于所述目标数据包所在的数据包组之后;
第二十一确定子模块,用于若在所述预设时间内,接收到第二编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第二编号是与所述目标数据包所在的数据包组中的最后一个数据包的编号之后的第w个数据包的编号,或所述第二编号是与所述目标数据包所在的数据包组之后的第w个数据包的编号;
第二十二确定子模块,用于若在所述预设时间内,接收到一个或者预设数量个第一数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第二十三确定子模块,用于若在所述预设时间内,接收到第三编号的数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第三编号是所述目标数据包所在的数据包组的编号之后的第y个数据包组的编号;
第二十四确定子模块,用于若在所述预设时间内,接收到第一数据包组内的第一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第二十五确定子模块,用于若在所述预设时间内,接收到第一数据包组内的一个或预设数量个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第二十六确定子模块,用于若在所述预设时间内,接收到第一数据包组内的预设数量个连续的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
第二十七确定子模块,用于若在所述预设时间内,接收到第一数据包组内的第z个的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
其中,所述第一数据包组的编号位于所述目标数据包所在的数据包组之后。
可选的,所述预设时间包括以下至少之一:
预设周期的个数;
网络配置的时间;
协议约定的时间;
所述第二对象对应的数据包的延时;
所述目标数据包的剩余延时;
与所述目标数据包在同一数据包组内的第三数据包到达所述第一对象的时间。
可选的,所述预设周期包括以下至少之一:
数据包的周期;
数据包组的周期;
业务周期;
数据包的传输周期;
数据包组的传输周期。
可选的,所述第二对象对应的数据包的延时包括以下至少之一:
数据包在所述第二对象的延时需求;
数据包在所述第二对象的延时。
可选的,所述剩余延时包括以下至少之一:
用于判断数据包丢弃或超时的剩余延时;
数据包在所述第一对象的剩余延时;
数据包在所述第一对象的剩余延时需求。
可选的,所述第三数据包包括以下至少之一:
与所述目标数据包在同一数据包组内的最后一个数据包;
与所述目标数据包在同一数据包组内的预设数量个数据包。
可选的,所述预设数量包括以下至少之一:
网络配置的数量;
协议约定的数量;
数据包组内包括的数据包数量,所述数据包组包括:所述目标数据包所在的数据包组;
预设时间内的数据包数量;
预设时间内与所述目标数据包位于同一个数据包组内的到达所述第一对象的数据包的数量。
可选的,所述x、y、w和/或z为网络配置或协议约定。
可选的,所述数据包包括以下至少之一:
PDCP SDU;
PDCP PDU;
PDCP缓存中的数据包;
RLC承载对应的数据包;
MAC SDU对应的数据包;
MAC PDU对应的数据包;
PDU;
PDU集合;
数据突发;
数据帧;
数据切片;
图片;
图片组;
PDU集合组;
PDU组;
IP数据包。
可选的,所述数据包组以下至少之一:
PDU集合组;
PDU集合;
数据突发;
数据帧;
数据切片;
图片;
图片组;
PDU组;
IP数据包。
可选的,所述确定丢包的装置200还包括:
执行模块,用于在所述确定模块201确定目标数据包在第二对象丢失之后,执行如下操作中的至少之一:
继续数据包的传输或处理;
丢弃所述目标数据包所在数据包组其它的数据包;
丢弃与所述目标数据包相关联的其它的数据包;
丢弃基于所述目标数据包的其它数据包;
降低所述目标数据包所在数据包组内其它数据包优先级。
本申请实施例中的确定丢包的装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的确定丢包的装置能够实现图26的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选的,如图28所示,本申请实施例还提供一种通信设备300,包括处理器301和存储器302,存储器302上存储有可在所述处理器301上运行的程序或指令,该程序或指令被处理器301执行时实现上述确定丢包的方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种终端,包括处理器和通信接口,处理器用于确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中第一对象之前的一个或多个对象。该终端实施例与上述方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图29为实现本申请实施例的一种终端的硬件结构示意图。
该终端400包括但不限于:射频单元401、网络模块402、音频输出单元403、输入单元404、传感器405、显示单元406、用户输入单元407、接口单元408、存储器409以 及处理器410等中的至少部分部件。
本领域技术人员可以理解,终端400还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器410逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图29中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元404可以包括图形处理器(Graphics Processing Unit,GPU)4041和麦克风4042,图形处理器4041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元406可包括显示面板4061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板4061。用户输入单元407包括触控面板4071以及其他输入设备4072中的至少一种。触控面板4071,也称为触摸屏。触控面板4071可包括触摸检测装置和触摸控制器两个部分。其他输入设备4072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元401接收来自网络侧设备的下行数据后,可以传输给处理器410进行处理;另外,射频单元401可以向网络侧设备发送上行数据。通常,射频单元401包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器409可用于存储软件程序或指令以及各种数据。存储器409可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器409可以包括易失性存储器或非易失性存储器,或者,存储器409可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器409包括但不限于这些和任意其它适合类型的存储器。
处理器410可包括一个或多个处理单元;可选的,处理器410集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器410中。
其中,处理器410,用于确定目标数据包在第二对象丢失,所述第二对象为数据包的 数据传输路径中第一对象之前的一个或多个对象。
在本申请实施例中,在第一对象对数据包进行处理时,可以确定前面一个或多个第二对象是否丢失数据包,从而可以有效优化数据包的调度、丢弃等处理。
可选的,所述第一对象为数据包的数据传输路径中的第一节点,所述第二对象为所述数据传输路径中所述第一节点之前的一个或多个通信接口;
或者
所述第一对象为数据包的数据传输路径中的第一协议层,所述第二对象为所述数据传输路径中所述第一协议层之前的一个或多个第二协议层,所述第一协议层和所述第二协议层属于同一节点。
可选的,所述目标数据包丢失包括以下情况中的至少之一:
所述目标数据包未成功送达所述第一对象;
所述目标数据包在所述第二对象未成功传输;
所述目标数据包在所述第二对象丢失;
所述目标数据包在所述第二对象传输或处理超过预设延时;
所述目标数据包在所述第二对象传输超过预设次数。
可选的,所述处理器410,用于若所述第一对象在预设时间内未接收到所述目标数据包,确定所述目标数据包在第二对象丢失。
可选的,所述处理器410,用于若接收到预设数量个数据包,且所述目标数据包未在所述预设数量个数据包之内,确定所述目标数据包在第二对象丢失;或,若接收到预设数量个数据包,且未收到所述目标数据包,确定所述目标数据包在第二对象丢失。
可选的,所述处理器410,用于若在预设时间内,接收到预设数量个数据包,且所述目标数据包未在所述预设数量个数据包之内,确定所述目标数据包在第二对象丢失;或,若在预设时间内,接收到预设数量个数据包,且未收到所述目标数据包,确定所述目标数据包在第二对象丢失。
可选的,所述处理器410,用于执行以下至少之一:
若接收到一个或预设数量个第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
若接收到预设数量个连续的第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
若接收到第一编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一编号是所述目标数据包的编号之后的第x个数据包的编号;
若接收到所述目标数据包所在的数据包组的最后一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若接收到一个或预设数量个第二数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;所述第二数据包的编号位于所述目标数据包所在的数据包组 中的最后一个数据包之后,或所述第二数据包的编号位于所述目标数据包所在的数据包组之后;
若接收到第二编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第二编号是与所述目标数据包所在的数据包组中的最后一个数据包的编号之后的第w个数据包的编号,或所述第二编号是与所述目标数据包所在的数据包组之后的第w个数据包的编号;
若接收到一个或者预设数量个第一数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若接收到第三编号的数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第三编号是所述目标数据包所在的数据包组的编号之后的第y个数据包组的编号;
若接收到第一数据包组内的第一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若接收到第一数据包组内的一个或预设数量个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若接收到第一数据包组内的预设数量个连续的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若接收到第一数据包组内的第z个的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
其中,所述第一数据包组的编号位于所述目标数据包所在的数据包组之后。
可选的,所述处理器410,用于执行以下之一:
若在所述预设时间内,接收到一个或预设数量个第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
若在所述预设时间内,所述第一对象接收到预设数量个连续的第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
若在所述预设时间内,接收到第一编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一编号是所述目标数据包的编号之后的第x个数据包的编号;
若在所述预设时间内,接收到所述目标数据包所在的数据包组的最后一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若在所述预设时间内,接收到一个或预设数量个第二数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;所述第二数据包的编号位于所述目标数据包所在的数据包组中的最后一个数据包之后,或所述第二数据包的编号位于所述目标数 据包所在的数据包组之后;
若在所述预设时间内,接收到第二编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第二编号是与所述目标数据包所在的数据包组中的最后一个数据包的编号之后的第w个数据包的编号,或所述第二编号是与所述目标数据包所在的数据包组之后的第w个数据包的编号;
若在所述预设时间内,接收到一个或者预设数量个第一数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若在所述预设时间内,接收到第三编号的数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第三编号是所述目标数据包所在的数据包组的编号之后的第y个数据包组的编号;
若在所述预设时间内,接收到第一数据包组内的第一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若在所述预设时间内,接收到第一数据包组内的一个或预设数量个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若所述预设时间内,接收到第一数据包组内的预设数量个连续的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
若在所述预设时间内,接收到第一数据包组内的第z个的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
其中,所述第一数据包组的编号位于所述目标数据包所在的数据包组之后。
可选的,所述预设时间包括以下至少之一:
预设周期的个数;
网络配置的时间;
协议约定的时间;
所述第二对象对应的数据包的延时;
所述目标数据包的剩余延时;
与所述目标数据包在同一数据包组内的第三数据包到达所述第一对象的时间。
可选的,所述预设周期包括以下至少之一:
数据包的周期;
数据包组的周期;
业务周期;
数据包的传输周期;
数据包组的传输周期。
可选的,所述第二对象对应的数据包的延时包括以下至少之一:
数据包在所述第二对象的延时需求;
数据包在所述第二对象的延时。
可选的,所述剩余延时包括以下至少之一:
用于判断数据包丢弃或超时的剩余延时;
数据包在所述第一对象的剩余延时;
数据包在所述第一对象的剩余延时需求。
可选的,所述第三数据包包括以下至少之一:
与所述目标数据包在同一数据包组内的最后一个数据包;
与所述目标数据包在同一数据包组内的预设数量个数据包。
可选的,所述预设数量包括以下至少之一:
网络配置的数量;
协议约定的数量;
数据包组内包括的数据包数量,所述数据包组包括:所述目标数据包所在的数据包组;
预设时间内的数据包数量;
预设时间内与所述目标数据包位于同一个数据包组内的到达所述第一对象的数据包的数量。
可选的,所述x、y、w和/或z为网络配置或协议约定。
可选的,所述数据包包括以下至少之一:
PDCP SDU;
PDCP PDU;
PDCP缓存中的数据包;
RLC承载对应的数据包;
MAC SDU对应的数据包;
MAC PDU对应的数据包;
PDU;
PDU集合;
数据突发;
数据帧;
数据切片;
图片;
图片组;
PDU集合组;
PDU组;
IP数据包。
可选的,所述数据包组以下至少之一:
PDU集合组;
PDU集合;
数据突发;
数据帧;
数据切片;
图片;
图片组;
PDU组;
IP数据包。
可选的,所述处理器,用于在确定目标数据包在第二对象丢失之后,执行如下操作中的至少之一:
继续数据包的传输或处理;
丢弃所述目标数据包所在数据包组其它的数据包;
丢弃与所述目标数据包相关联的其它的数据包;
丢弃基于所述目标数据包的其它数据包;
降低所述目标数据包所在数据包组内其它数据包优先级。
本申请实施例还提供一种网络侧设备,包括处理器和通信接口,处理器用于确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中所述第一对象之前的一个或多个对象。上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
具体地,本申请实施例还提供了一种网络侧设备。如图30所示,该网络侧设备500包括:天线501、射频装置502、基带装置503、处理器504和存储器505。天线501与射频装置502连接。在上行方向上,射频装置502通过天线501接收信息,将接收的信息发送给基带装置503进行处理。在下行方向上,基带装置503对要发送的信息进行处理,并发送给射频装置502,射频装置502对收到的信息进行处理后经过天线501发送出去。以上实施例中网络侧设备执行的方法可以在基带装置503中实现,该基带装置503包括基带处理器。基带装置503例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图5030所示,其中一个芯片例如为基带处理器,通过总线接口与存储器505连接,以调用存储器505中的程序,执行以上方法实施例中所示的网络设备操作。该网络侧设备还可以包括网络接口506,该接口例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本发明实施例的网络侧设备500还包括:存储在存储器505上并可在处理器504上运行的指令或程序,处理器504调用存储器505中的指令或程序执行图27所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
具体地,本申请实施例还提供了一种网络侧设备。如图31所示,该网络侧设备600包括:处理器601、网络接口602和存储器603。其中,网络接口602例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本发明实施例的网络侧设备600还包括:存储在存储器603上并可在处理器 601上运行的指令或程序,处理器601调用存储器603中的指令或程序执行图27所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述确定丢包的方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述确定丢包的方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述确定丢包的方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (21)

  1. 一种确定丢包的方法,包括:
    第一对象确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中所述第一对象之前的一个或多个对象。
  2. 根据权利要求1所述的方法,其中,
    所述第一对象为第一节点,所述第二对象为数据包的数据传输路径中所述第一节点之前的一个或多个通信接口;
    或者
    所述第一对象为第一协议层,所述第二对象为数据包的数据传输路径中所述第一协议层之前的一个或多个第二协议层,所述第一协议层和所述第二协议层属于同一节点。
  3. 根据权利要求1所述的方法,其中,所述目标数据包丢失包括以下情况中的至少之一:
    所述目标数据包未成功送达所述第一对象;
    所述目标数据包在所述第二对象未成功传输;
    所述目标数据包在所述第二对象丢失;
    所述目标数据包在所述第二对象传输或处理超过预设延时;
    所述目标数据包在所述第二对象传输超过预设次数。
  4. 根据权利要求1所述的方法,其中,所述第一对象确定目标数据包在第二对象丢失包括:
    若所述第一对象在预设时间内未接收到所述目标数据包,确定所述目标数据包在第二对象丢失。
  5. 根据权利要求1所述的方法,其中,所述第一对象确定目标数据包在第二对象丢失:
    若所述第一对象接收到预设数量个数据包,且所述目标数据包未在所述预设数量个数据包之内,确定所述目标数据包在第二对象丢失;或,
    若所述第一对象接收到预设数量个数据包,且未收到所述目标数据包,确定所述目标数据包在第二对象丢失。
  6. 根据权利要求1所述的方法,其中,所述第一对象确定目标数据包在第二对象丢失:
    若所述第一对象在预设时间内,接收到预设数量个数据包,且所述目标数据包未在所述预设数量个数据包之内,确定所述目标数据包在第二对象丢失;或,
    若所述第一对象在预设时间内,接收到预设数量个数据包,且未收到所述目标数据包,确定所述目标数据包在第二对象丢失。
  7. 根据权利要求1所述的方法,其中,所述第一对象确定所述目标数据包在第二对 象丢失包括以下至少之一:
    若所述第一对象接收到一个或预设数量个第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
    若所述第一对象接收到预设数量个连续的第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
    若所述第一对象接收到第一编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一编号是所述目标数据包的编号之后的第x个数据包的编号;
    若所述第一对象接收到所述目标数据包所在的数据包组的最后一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象接收到一个或预设数量个第二数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;所述第二数据包的编号位于所述目标数据包所在的数据包组中的最后一个数据包之后,或所述第二数据包的编号位于所述目标数据包所在的数据包组之后;
    若所述第一对象接收到第二编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第二编号是与所述目标数据包所在的数据包组中的最后一个数据包的编号之后的第w个数据包的编号,或所述第二编号是与所述目标数据包所在的数据包组之后的第w个数据包的编号;
    若所述第一对象接收到一个或者预设数量个第一数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象接收到第三编号的数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第三编号是所述目标数据包所在的数据包组的编号之后的第y个数据包组的编号;
    若所述第一对象接收到第一数据包组内的第一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象接收到第一数据包组内的一个或预设数量个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象接收到第一数据包组内的预设数量个连续的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象接收到第一数据包组内的第z个的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    其中,所述第一数据包组的编号位于所述目标数据包所在的数据包组之后。
  8. 根据权利要求1所述的方法,其中,所述第一对象确定目标数据包在第二对象丢 失包括以下之一:
    若所述第一对象在预设时间内,接收到一个或预设数量个第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
    若所述第一对象在预设时间内,接收到预设数量个连续的第一数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一数据包的编号位于所述目标数据包的编号之后;
    若所述第一对象在预设时间内,接收到第一编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第一编号是所述目标数据包的编号之后的第x个数据包的编号;
    若所述第一对象在预设时间内,接收到所述目标数据包所在的数据包组的最后一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象在预设时间内,接收到一个或预设数量个第二数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;所述第二数据包的编号位于所述目标数据包所在的数据包组中的最后一个数据包之后,或所述第二数据包的编号位于所述目标数据包所在的数据包组之后;
    若所述第一对象在预设时间内,接收到第二编号的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第二编号是与所述目标数据包所在的数据包组中的最后一个数据包的编号之后的第w个数据包的编号,或所述第二编号是与所述目标数据包所在的数据包组之后的第w个数据包的编号;
    若所述第一对象在预设时间内,接收到一个或者预设数量个第一数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象在预设时间内,接收到第三编号的数据包组,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失,所述第三编号是所述目标数据包所在的数据包组的编号之后的第y个数据包组的编号;
    若所述第一对象在预设时间内,接收到第一数据包组内的第一个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象在预设时间内,接收到第一数据包组内的一个或预设数量个数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象在预设时间内,接收到第一数据包组内的第z个的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    若所述第一对象在预设时间内,接收到第一数据包组内的预设数量个连续的数据包,且未接收到所述目标数据包,确定所述目标数据包在所述第二对象丢失;
    其中,所述第一数据包组的编号位于所述目标数据包所在的数据包组之后。
  9. 根据权利要求4或6或8所述的方法,其中,所述预设时间包括以下至少之一:
    预设周期的个数;
    网络配置的时间;
    协议约定的时间;
    所述第二对象对应的数据包的延时;
    所述目标数据包的剩余延时;
    与所述目标数据包在同一数据包组内的第三数据包到达所述第一对象的时间。
  10. 根据权利要求9所述的方法,其中,所述预设周期包括以下至少之一:
    数据包的周期;
    数据包组的周期;
    业务周期;
    数据包的传输周期;
    数据包组的传输周期。
  11. 根据权利要求9所述的方法,其中,所述第二对象对应的数据包的延时包括以下至少之一:
    数据包在所述第二对象的延时需求;
    数据包在所述第二对象的延时。
  12. 根据权利要求9所述的方法,其中,所述剩余延时包括以下至少之一:
    用于判断数据包丢弃或超时的剩余延时;
    数据包在所述第一对象的剩余延时;
    数据包在所述第一对象的剩余延时需求。
  13. 根据权利要求9所述的方法,其中,所述第三数据包包括以下至少之一:
    与所述目标数据包在同一数据包组内的最后一个数据包;
    与所述目标数据包在同一数据包组内的预设数量个数据包。
  14. 根据权利要求5或6或7或8或13所述的方法,其中,所述预设数量包括以下至少之一:
    网络配置的数量;
    协议约定的数量;
    数据包组内包括的数据包数量,所述数据包组包括:所述目标数据包所在的数据包组;
    预设时间内的数据包数量;
    预设时间内与所述目标数据包在同一个数据包组内的到达所述第一对象的数据包的数量。
  15. 根据权利要求7或8所述的方法,其中,所述x、w、y和/或z为网络配置或协议约定。
  16. 根据权利要求1所述的方法,其中,所述数据包包括以下至少之一:
    PDCP SDU;
    PDCP PDU;
    PDCP缓存中的数据包;
    RLC承载对应的数据包;
    MAC SDU对应的数据包;
    MAC PDU对应的数据包;
    PDU;
    PDU集合;
    数据突发;
    数据帧;
    数据切片;
    图片;
    图片组;
    PDU集合组;
    PDU组;
    IP数据包。
  17. 根据权利要求7或8所述的方法,其中,所述数据包组以下至少之一:
    PDU集合组;
    PDU集合;
    数据突发;
    数据帧;
    数据切片;
    图片;
    图片组;
    PDU组;
    IP数据包。
  18. 根据权利要求1所述的方法,其中,所述第一对象确定目标数据包在第二对象丢失之后,执行如下操作中的至少之一:
    继续数据包的传输或处理;
    丢弃所述目标数据包所在数据包组其它的数据包;
    丢弃与所述目标数据包相关联的其它的数据包;
    丢弃基于所述目标数据包的其它数据包;
    降低所述目标数据包所在数据包组内其它数据包优先级。
  19. 一种确定丢包的装置,包括:
    确定模块,用于确定目标数据包在第二对象丢失,所述第二对象为数据包的数据传输路径中第一对象之前的一个或多个对象。
  20. 一种通信设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至18任一项所述的确定丢包的方法的步骤。
  21. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至18任一项所述的确定丢包的方法。
PCT/CN2023/128051 2022-11-10 2023-10-31 确定丢包的方法、装置、通信设备及可读存储介质 WO2024099159A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211407179.3 2022-11-10
CN202211407179.3A CN118019055A (zh) 2022-11-10 2022-11-10 确定丢包的方法、装置、通信设备及可读存储介质

Publications (1)

Publication Number Publication Date
WO2024099159A1 true WO2024099159A1 (zh) 2024-05-16

Family

ID=90950607

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/128051 WO2024099159A1 (zh) 2022-11-10 2023-10-31 确定丢包的方法、装置、通信设备及可读存储介质

Country Status (2)

Country Link
CN (1) CN118019055A (zh)
WO (1) WO2024099159A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065518A (zh) * 2014-07-07 2014-09-24 北京市博汇科技股份有限公司 一种网络数据包丢失位置的确定方法及装置
CN109462857A (zh) * 2017-09-06 2019-03-12 中兴通讯股份有限公司 丢包处理方法、装置、无线网元及计算机可读存储介质
CN111343093A (zh) * 2020-02-28 2020-06-26 腾讯科技(深圳)有限公司 业务数据的传输方法及装置
US20210036946A1 (en) * 2019-07-31 2021-02-04 Microsoft Technology Licensing, Llc Optimizing how test packets are sent during continuous network monitoring
CN114930898A (zh) * 2020-11-30 2022-08-19 北京小米移动软件有限公司 数据丢失检测方法、装置、通信设备及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065518A (zh) * 2014-07-07 2014-09-24 北京市博汇科技股份有限公司 一种网络数据包丢失位置的确定方法及装置
CN109462857A (zh) * 2017-09-06 2019-03-12 中兴通讯股份有限公司 丢包处理方法、装置、无线网元及计算机可读存储介质
US20210036946A1 (en) * 2019-07-31 2021-02-04 Microsoft Technology Licensing, Llc Optimizing how test packets are sent during continuous network monitoring
CN111343093A (zh) * 2020-02-28 2020-06-26 腾讯科技(深圳)有限公司 业务数据的传输方法及装置
CN114930898A (zh) * 2020-11-30 2022-08-19 北京小米移动软件有限公司 数据丢失检测方法、装置、通信设备及存储介质

Also Published As

Publication number Publication date
CN118019055A (zh) 2024-05-10

Similar Documents

Publication Publication Date Title
CN106576279B (zh) 多通信制式传输方法及装置
US20180234877A1 (en) Method for creating media access control entity, device, and system
CN113766567A (zh) 一种通信方法及装置
JP2008289150A (ja) 無線通信システムにおいて待ち行列機能を管理する方法及び装置
CN113923712A (zh) 数据处理的方法及装置
CN116114254A (zh) 一种通信方法及装置
WO2024099159A1 (zh) 确定丢包的方法、装置、通信设备及可读存储介质
WO2022213923A1 (zh) 传输处理方法、装置及通信设备
WO2024099086A1 (zh) 辅助信息发送、接收方法、设备及可读存储介质
WO2023066108A1 (zh) 数据传输方法、装置及终端
WO2023066107A1 (zh) 数据传输方法、装置及终端
WO2023066113A1 (zh) 数据传输方法、装置及终端
WO2024093725A1 (zh) 数据包的处理方法和通信装置
WO2023241445A1 (zh) 数据包集合时延的处理方法、装置及通信设备
WO2024114642A2 (zh) 数据包的处理方法及通信设备
WO2022032669A1 (zh) 一种数据接收方法、装置及终端设备
WO2024066419A1 (zh) 业务传输方法及装置
WO2023066106A1 (zh) 数据丢弃方法、装置、终端及网络侧设备
WO2023217009A1 (zh) 数据传输方法、装置及通信设备
WO2023174198A1 (zh) 一种时延控制方法、应用服务器及通信系统
WO2024098267A1 (zh) 数据传输装置、数据发送装置以及方法
WO2023016402A1 (zh) 数据传输方法、装置及终端、网络侧设备
WO2023066114A1 (zh) 数据处理方法、装置及终端
WO2023241452A1 (zh) 数据处理方法、装置及通信设备
WO2023040586A1 (zh) 定时器处理方法、装置及存储介质