WO2017000863A1 - 一种数据传输方法、无线网络节点和通信系统 - Google Patents
一种数据传输方法、无线网络节点和通信系统 Download PDFInfo
- Publication number
- WO2017000863A1 WO2017000863A1 PCT/CN2016/087388 CN2016087388W WO2017000863A1 WO 2017000863 A1 WO2017000863 A1 WO 2017000863A1 CN 2016087388 W CN2016087388 W CN 2016087388W WO 2017000863 A1 WO2017000863 A1 WO 2017000863A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network node
- wireless network
- data packet
- user equipment
- handover
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/14—Mobility data transfer between corresponding nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
- H04W28/20—Negotiating bandwidth
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
- H04W72/1221—Wireless traffic scheduling based on age of data to be sent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/24—Reselection being triggered by specific parameters
- H04W36/30—Reselection being triggered by specific parameters by measured or perceived connection quality data
- H04W36/302—Reselection being triggered by specific parameters by measured or perceived connection quality data due to low signal strength
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/02—Data link layer protocols
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the present invention relates to the field of communications, and in particular, to a data transmission method, a wireless network node, and a communication system.
- the C-RAN system is composed of a RRU (Remote Radio Unit, RRU for short) and a BBU pool.
- the BBU pool includes multiple BBUs (Base Band Units, BBUs).
- the RRUs and BBUs pass through the CPRI.
- the Common Public Radio Interface (CPRI) is connected.
- the current C-RAN scheme can effectively improve the system capacity, but the RRU and the BBU pool need a very ideal transmission network, that is, the CPRI needs an ideal bandwidth and delay, for example, a 20 MHz bandwidth cell supporting 8 antennas, and the baseband is 20 MHz bandwidth.
- the baseband sampling rate is 30.72M, and the sampling bit width is 15bit.
- a single antenna single sector needs a transmission rate of 1228.8M CPRI; if 8 antennas, it needs to be multiplied. 8, the transmission rate of 10Gbit / s.
- This high transmission rate is difficult to implement between the RRU and the BBU pool, so there is an urgent need for a solution that can reduce the transmission bandwidth and delay requirements.
- the technical problem to be solved by the embodiments of the present invention is to provide a data transmission method and a wireless network.
- the network node and the communication system can solve the problem of high transmission bandwidth and delay in the prior art.
- a first aspect of the embodiments of the present invention provides a data transmission method, including:
- the first wireless network node learns the bearer type of the downlink data packet
- the first radio network node sends the downlink data packet to a second radio network node, so that the second radio network node performs a PDCP layer on the downlink data packet.
- the first radio network node performs a PDCP layer function on the downlink data packet, and sends the processed downlink data packet to the second radio network node.
- the method further includes:
- the second wireless network node performs a PHY layer function, a MAC layer function, and an RLC layer on the uplink data packet.
- the bearer type of the uplink data packet is DRB;
- the first wireless network node performs a PDCP layer function on the uplink data packet, and sends the processed uplink data packet to the core network.
- the method further includes:
- the first wireless network node acquires DRB security information and SRB security information from the core network, the first wireless network node stores the DRB security information, and sends the SRB security information to the second wireless network node;
- the function of the first wireless network node to perform the PDCP layer on the downlink data packet includes:
- the first wireless network node performs a function of a PDCP layer on the downlink data packet according to the DRB security information.
- the SRB security information and the DRB security information include: an integrity protection algorithm, an integrity check algorithm, an encryption algorithm, One or more of a decryption algorithm and a security key.
- the method before the first wireless network node learns the bearer type of the downlink data packet, the method further includes:
- the first wireless network node returns a criterion for carrying the user equipment identifier to the second wireless network node, where the user equipment corresponding to the user equipment identifier has the right to access the second wireless network node.
- the admission indication is used to indicate that the user equipment establishes an SRB with the second wireless network node.
- the method further includes:
- the first wireless network node After the UE completes the handover operation, the first wireless network node transmits the service data to the UE via the target wireless access network node according to the transmission state parameter.
- the first wireless network node determines, from the set of wireless network nodes under the jurisdiction, other than the second wireless network node
- the target wireless network nodes include:
- the first wireless network node acquires a link quality parameter between each wireless network node in the wireless network node set and the user equipment, and selects a wireless network node with the best link quality parameter as the target wireless network node.
- the link quality parameter comprises one or more of RSRP, RSSI and RSRQ.
- a second aspect of the embodiments of the present invention provides a wireless network node, including:
- An identification module configured to learn the bearer type of the downlink data packet
- a first sending module configured to: when the bearer type is SRB, the first wireless network node sends the downlink data packet to a second wireless network node, so that the second wireless network node Describe the downlink data packet to perform the function of the PDCP layer;
- a first processing module configured to perform a PDCP layer function on the downlink data packet, and send the processed downlink data packet to the second wireless network section, where the bearer type is DRB point.
- the method further includes:
- a receiving module configured to receive an uplink data packet sent by the second wireless network node, where the uplink data packet performs a function of a PHY layer, a function of a MAC layer, and a function of an RLC layer in the second wireless network node, where
- the bearer type of the uplink data packet is DRB;
- the second processing module is configured to perform a function of the PDCP layer on the uplink data packet, and send the processed uplink data packet to the core network.
- the method further includes:
- a security information obtaining module configured to acquire DRB security information and SRB security information from the core network, where the first wireless network node stores the DRB security information, and sends the SRB security information to the second wireless network node;
- the first processing module is configured to perform a function of a PDCP layer on the downlink data packet according to the DRB security information.
- the SRB security information and the DRB security information include: an integrity protection algorithm, an integrity check algorithm, an encryption algorithm, One or more of a decryption algorithm and a security key.
- the method further includes:
- An SRB establishing module configured to receive a user equipment identifier and a connection request sent by the second wireless network node; where the user equipment corresponding to the user equipment identifier has the right to access the second wireless network node, And the second wireless network node returns an admission indication that carries the user equipment identifier, where the admission indication is used to indicate that the user equipment and the second wireless network node establish an SRB.
- the method further includes:
- a switching module configured to determine, from a set of radio network nodes under the jurisdiction, a target wireless network node other than the second wireless network node, and the target wireless network node, if the UE meets a handover condition
- the identifier is sent to the second wireless network node; the transmission state parameter of the service data is obtained from the second wireless network node; after the UE completes the handover operation, according to the transmission
- the status parameter transmits traffic data to the UE via the target wireless network node.
- the switching module is configured to acquire a chain between each wireless network node in the wireless network node set and the user equipment And a radio quality node that selects an optimal link quality parameter as the target radio network node, where the link quality parameter includes one or more of RSRP, RSSI, and RSRQ.
- a third aspect of the embodiments of the present invention provides a wireless network node, including a memory and a processor, wherein the memory stores instructions for implementing any one of the data transmission methods of the first aspect, and the processor invokes The instruction in the memory is executed to implement the data transmission method according to any one of the first aspects.
- a fourth aspect of the embodiments of the present invention provides a storage medium for controlling a computer device to perform a data transmission method, where the method includes the following steps:
- the bearer type is a signaling radio bearer SRB
- the downlink data packet to a second radio network node, so that the second radio network node performs a packet data convergence protocol PDCP on the downlink data packet.
- Layer function or
- the bearer type is a data radio bearer DRB
- performing a function of a PDCP layer on the downlink data packet and sending the processed downlink data packet to the second radio network node.
- a fifth aspect of the embodiments of the present invention provides a data transmission method, including:
- the second wireless network node learns the bearer type of the uplink data packet sent by the user equipment
- the second radio network node performs a function of a PHY layer and a function of an upper layer of the PHY layer on the uplink data packet;
- the second radio network node performs a function of a PHY layer, a function of a MAC layer, and a function of an RLC layer on the uplink data packet, and sends the processed uplink data packet to the uplink data packet.
- a first wireless network node configured to enable the first wireless network node to perform a PDCP layer function on the processed uplink data packet.
- the performing, by the second wireless network node, the function of performing the PHY layer on the uplink data packet and the function of the upper layer of the PHY layer includes:
- the method further includes:
- the fifth radio network node receives the downlink data packet sent by the first radio network node, where the bearer type of the downlink data packet is SRB;
- the second radio network node performs the functions of the RRC layer and the functions of the RRC layer on the downlink data packet, and sends the processed downlink data packet to the user equipment.
- the method further includes:
- the second wireless network node receives an admission indication that is generated by the first wireless network node after determining that the user equipment has an access right, where the admission indication carries the user equipment identifier;
- the second wireless network node generates a connection establishment message according to the admission indication, and sends the connection establishment message to the user equipment, so that the user equipment establishes an SRB according to the connection establishment message, and succeeds After the SRB is established, returning a connection establishment complete message to the second wireless network node;
- the second wireless network node sends the received connection setup complete message to the first wireless network node.
- the method further includes:
- the second wireless network node forwards the handover command message to the user equipment, where the handover command message carries the SRB security information, so that the user equipment sends the handover operation to the target wireless network.
- the node returns a handover complete message, and after receiving the handover complete message, the target wireless network access node performs security protection on the signaling data according to the SRB security information.
- determining that the target wireless network node to be switched includes :
- the second wireless network node determines that the user equipment meets a handover condition if a signal carrier level of the user equipment is less than a first threshold; or
- the second wireless network node receives an identity identifier that is sent by the first wireless network node and carries the target wireless network node, and determines the target network cable network node according to the identity identifier.
- a wireless network node includes:
- An identification module configured to learn the bearer type of the uplink data packet sent by the user equipment
- a first processing module configured to perform a function of a PHY layer and a function of an upper layer of the PHY layer on the uplink data packet if the bearer type is SRB;
- a first sending module configured to perform a PHY layer function, a MAC layer function, and an RLC layer function on the uplink data packet, and send the processed uplink data packet to the uplink data packet, where the bearer type is DRB a first wireless network node, configured to enable the first wireless network node to perform a PDCP layer function on the processed uplink data packet.
- the first processing module is configured to receive the SRB security information sent by the first radio network node, and perform the uplink data packet according to the SRB security information.
- the function of the PDCP layer is configured to perform the uplink data packet according to the SRB security information.
- the method further includes:
- a receiving module configured to receive a downlink data packet sent by the first wireless network node, where the bearer data type of the downlink data packet is SRB;
- the second processing module is configured to perform the functions of the RRC layer and the functions of the RRC layer on the downlink data packet, and send the processed downlink data packet to the user equipment.
- the method further includes:
- An SRB establishing module configured to forward, by the user equipment, a connection request that carries the user equipment identifier to the first wireless network node, and receive the first wireless network node to generate, after determining that the user equipment has access rights,
- the admission indication wherein the admission indication carries the user equipment identifier; generates a connection establishment message according to the admission indication, and sends the connection establishment message to the user equipment, so that the user equipment Establishing an SRB according to the connection setup message, and returning a connection establishment complete message to the second wireless network node after successfully establishing the SRB; and sending the received connection establishment complete message to the first wireless network node.
- the method further includes:
- a switching module configured to: determine, in a case that the user equipment meets a handover condition, a target wireless network node to be switched; and send, to the target wireless network node, a handover request message that carries the SRB security information, to enable the target
- the radio network node is ready to switch resources, return a handover command message to the second radio network node; and forward the handover command message to the user equipment, where the handover command message carries the SRB security information
- the target wireless network access node performs signaling data according to the SRB security information. safety protection.
- the switching module is configured to:
- a seventh aspect of the embodiments of the present invention provides a wireless network node, including a memory and a processor, wherein the memory stores the data transmission method according to any one of the fifth aspects.
- An instruction, the processor retrieving and executing an instruction in the memory, implementing the data transmission method according to any one of the fifth aspects.
- An eighth aspect of the embodiments of the present invention provides a storage medium for controlling a computer device to perform a data transmission method, where the method includes the following steps:
- the bearer type is SRB
- the bearer type is DRB
- a ninth aspect of the embodiments of the present invention provides a data transmission method, including:
- the first wireless network node Receiving, by the first wireless network node, an uplink data packet sent by the second wireless network device, where the uplink data packet carries first indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- the first wireless network node performs a function of a PDCP layer on the uplink data packet.
- the function of the first radio network node to complete the PDCP layer on the uplink data packet includes:
- the first wireless network node learns the bearer type of the uplink data packet
- the bearer type of the uplink data packet is the DRB, perform the function of the PDCP layer on the second data packet according to the DRB security information, and send the processed uplink data packet to the core network;
- the bearer type of the uplink data packet is SRB
- the function of the PDCP layer and the function of the RRC layer are performed on the second data packet according to the SRB security information.
- the method further includes:
- the first wireless network node receives the downlink data packet sent by the core network, where the downlink data packet carries identity information indicating the user equipment, type information of the bearer, and identity information of the bearer. Second indication information;
- the first wireless network node performs the functions of the RRC layer and the function of the PDCP layer on the data packet, and sends the processed downlink data packet to the second wireless network node, so that the second wireless network node Obtaining, according to the second indication information, a user equipment, a bearer type, and a bearer of the downlink data packet.
- the method further includes:
- the first wireless network node determines a target wireless network node to be handed over and acquires UE context information of the second wireless network node, where the user equipment meets a handover condition;
- the method further includes:
- the first wireless network node determines a target wireless network node to be handed over;
- the handover indication message that carries the identifier of the target radio network node to the second radio network node, where the handover indication message is used to instruct the radio network node to acquire the UE of the user equipment Context information, and transmitting, to the first wireless network node, a handover request message carrying the UE context information;
- the wireless network node Sending, by the first wireless network node, a handover request message to the target wireless network node according to the handover request message, so that the target wireless network node, after determining that the user equipment has access rights, to the first
- the wireless network node returns a handover response message
- the first wireless network node After receiving the handover response message returned by the target wireless network node, the first wireless network node sends the handover response message to the second wireless network node, so that the wireless network node according to the handover response message Sending a handover command message to the user equipment, where the handover command is cancelled
- the information is used to instruct the user equipment to complete the handover operation.
- a tenth aspect of the embodiments of the present invention provides a wireless network node, including:
- a first receiving module configured to receive an uplink data packet sent by the second wireless network device, where the uplink data packet carries first indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- An identification module configured to learn, according to the first indication information, a user equipment, a bearer type, and a bearer corresponding to the uplink data packet;
- the first processing module is configured to perform a function of a PDCP layer on the uplink data packet.
- the first processing module is configured to learn a bearer type of the uplink data packet
- the bearer type of the uplink data packet is the DRB, perform the function of the PDCP layer on the second data packet according to the DRB security information, and send the processed uplink data packet to the core network;
- the bearer type of the uplink data packet is SRB
- the function of the PDCP layer and the function of the RRC layer are performed on the second data packet according to the SRB security information.
- the method further includes:
- a second receiving module configured to receive a downlink data packet sent by the core network, where the downlink data packet carries second indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- a second processing module configured to perform a function of an RRC layer and a function of a PDCP layer on the data packet, and send the processed downlink data packet to the second wireless network node, so that the second wireless network node Obtaining, according to the second indication information, a user equipment, a bearer type, and a bearer of the downlink data packet.
- the method further includes:
- a first switching module configured to determine a target wireless network node to be switched and acquire UE context information of the second wireless network node, if the user equipment meets a handover condition
- the handover The command message is used to instruct the user equipment to complete the handover operation.
- the method further includes:
- a second switching module configured to determine a target wireless network node to be switched if the UE meets a handover condition
- the target wireless network node After receiving the handover response message returned by the target wireless network node, sending the handover response message to the second wireless network node, so that the wireless network node sends a handover to the user equipment according to the handover response message. And a command message, where the handover command message is used to instruct the user equipment to complete a handover operation.
- An eleventh aspect of the present invention provides a wireless network node, including a memory and a processor, wherein the memory stores an instruction for implementing the data transmission method according to any one of the ninth aspects, The processor retrieves and executes the instructions in the memory to implement the data transmission method of any of the ninth aspects.
- a twelfth aspect of the embodiments of the present invention provides a storage medium for controlling a computer device to perform a data transmission method, where the method includes the following steps:
- the uplink data packet carries first indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- the function of the PDCP layer is performed on the uplink data packet.
- a thirteenth aspect of the embodiments of the present invention provides a data transmission method, including:
- the downlink data packet sent by the first wireless network node, where the downlink data packet carries first indication information that identifies the identity information of the user equipment, the type information of the bearer, and the identity information of the bearer;
- the second wireless network node performs the functions of the following layers of the PDCP layer on the downlink data packet.
- the method further includes:
- the second wireless network node Receiving, by the second wireless network node, an uplink data packet sent by the user equipment, where the uplink data packet carries second indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- the second wireless network node Performing, by the second wireless network node, a function of a layer of the PDCP layer on the uplink data packet, and sending the processed uplink data packet to the first wireless network node, so that the first wireless network node pair
- the processed uplink packet performs the function of the PDCP layer.
- the method further includes:
- the second wireless network node After receiving the handover indication carrying the identity identifier of the target wireless network node, the second wireless network node acquires UE context information of the user equipment and sends the UE context to the first wireless network node.
- the message switching request message After receiving the handover indication carrying the identity identifier of the target wireless network node, the second wireless network node acquires UE context information of the user equipment and sends the UE context to the first wireless network node.
- the message switching request message After receiving the handover indication carrying the identity identifier of the target wireless network node, the second wireless network node acquires UE context information of the user equipment and sends the UE context to the first wireless network node.
- a fourteenth aspect of the embodiments of the present invention provides a wireless network node, including:
- a first receiving module configured to receive a downlink data packet sent by the first wireless network node, where the downlink data packet carries first indication information that identifies identity information of the user equipment, type information of the bearer, and identity information of the bearer.
- An identification module configured to learn, according to the first indication information, a user setting corresponding to the downlink data packet Standby, bearer type and bearer;
- the first processing module is configured to perform the function of the following layer of the PDCP layer on the downlink data packet.
- the method further includes:
- a second receiving module configured to receive an uplink data packet sent by the user equipment, where the uplink data packet carries second indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- a second processing module configured to perform a function of a layer of the PDCP layer on the uplink data packet, and send the processed uplink data packet to the first wireless network node, so that the first wireless network node pair
- the processed uplink packet performs the function of the PDCP layer.
- the method further includes:
- a switching module configured to forward the measurement report sent by the user equipment to the first wireless network node, so that the first wireless network node, according to the measurement report, is that the user equipment meets a handover condition, Determining, by the first wireless network node, a target wireless network node to be handed over, the first wireless network node returning, to the second wireless network node, a handover indication carrying an identity of the target wireless network node;
- a wireless network node comprising: a memory and a processor, wherein the memory stores an instruction for implementing the data transmission method according to any one of the third aspects, The processor is operative to retrieve and execute instructions in the memory to implement the data transmission method of any of the third aspects.
- a storage medium for controlling a computer device to perform a gesture control method comprising the steps of:
- the first wireless network node Receiving, by the first wireless network node, a downlink data packet, where the downlink data packet carries first indication information that identifies identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- the functions of the following layers of the PDCP layer are performed on the downlink data packet.
- the first wireless network node is responsible for security protection of the service data carried in the DRB, and the wireless network node is responsible for performing signaling data carried in the SRB by performing re-division of each layer in the first wireless network node and the second wireless network node.
- Security protection; or the first wireless network node is responsible for the RRC layer and the PDCP layer processing, and the second wireless network node is responsible for the processing of the lower layer of the PDCP.
- FIG. 1 is a schematic structural diagram of a network according to an embodiment of the present invention.
- FIG. 2 is a schematic structural diagram of a base station according to an embodiment of the present invention.
- FIG. 3 is another schematic structural diagram of a base station according to an embodiment of the present invention.
- FIG. 4 is a schematic flowchart of a data transmission method according to a first embodiment of the present invention.
- FIG. 5 is a schematic flowchart diagram of a data transmission method according to a second embodiment of the present invention.
- FIG. 6 is a schematic flowchart of a data transmission method according to a third embodiment of the present invention.
- FIG. 7 is a schematic flowchart of a UE handover method according to a first embodiment of the present invention.
- FIG. 8 is a schematic flowchart of a data transmission method according to a fourth embodiment of the present invention.
- FIG. 9 is a schematic flowchart of a data transmission method according to a fifth embodiment of the present invention.
- FIG. 10 is a schematic flowchart diagram of a data transmission method according to a sixth embodiment of the present invention.
- FIG. 11 is a schematic flowchart diagram of a UE handover method according to a second embodiment of the present invention.
- FIG. 12 is a schematic flowchart of a UE handover method according to a third embodiment of the present invention.
- FIG. 13 is a schematic structural diagram of a wireless network node according to a first embodiment of the present invention.
- FIG. 14 is a schematic structural diagram of a wireless network node according to a second embodiment of the present invention.
- 15 is a schematic structural diagram of a wireless network node according to a third embodiment of the present invention.
- 16 is a schematic structural diagram of a wireless network node according to a fourth embodiment of the present invention.
- FIG. 17 is a schematic structural diagram of a wireless network node according to a fifth embodiment of the present invention.
- FIG. 18 is a schematic structural diagram of a wireless network node according to a sixth embodiment of the present invention.
- FIG. 19 is a schematic structural diagram of a wireless network node according to a seventh embodiment of the present invention.
- FIG. 20 is a schematic structural diagram of a wireless network node according to an eighth embodiment of the present invention.
- LTE Long Term Evolution
- the access network includes an RC and a RAP cluster, and an RC (Radio Access Network Controller).
- the RAP Radio Access Point, Radio Access Point, RAP for short
- the RAP cluster contains at least one RAP
- the RC and the RAP cluster are connected by TN (Transportation Network, TN).
- At least one RAP in the UE and the RAP cluster is connected; the RC is connected to the core network through an S1 interface, and the core network includes a mobility management entity MME, a serving gateway SGW, and a data gateway PGW, and the control plane of the core network is separated from the user plane, where The control plane MME and the RC are connected through an S1-MME interface, and are connected between the user plane SGW and the RC through an S1-U interface.
- the RC and the RAP clusters are the equivalent of the eNodeB (evolved Node B) in the LTE network architecture.
- the RC and the eNodeB are connected through the X2 interface.
- the eNodeB and the core network are connected through the S1 interface.
- One RAP in the cluster accesses the core network.
- the present invention can also be applied to GSM (Global System of Mobile communication) or CDMA (Code Division Multiple Access), or can be WCDMA (Wideband Code Division Multiple). Access, Wideband Code Division Multiple Access, or future 5G network standards, or Wireless Local Area Networks (WLAN), Worldwide Interoperability for Other communication formats such as Microwave Access, WiMAX, Bluetooth and Infrared.
- GSM Global System of Mobile communication
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- Access Wideband Code Division Multiple Access
- 5G network standards Fifth Generation
- WLAN Wireless Local Area Networks
- Worldwide Interoperability for Other communication formats such as Microwave Access, WiMAX, Bluetooth and Infrared.
- FIG. 2 is a schematic structural diagram of a base station according to an embodiment of the present invention.
- an evolved base station includes a first wireless network node and a wireless network node, where the first wireless network node includes a first RRC (Radio Resource).
- RRC Radio Resource
- the radio network node includes a second RRC sub-layer, a second PDCP sub-layer, RLC (Radio Link Control, Radio Link Control, RLC for short) layer, MAC (Media Access Control, Media Access Control, MAC) layer, and PHY (Physical, Physical, PHY for short) corresponding functions, of which, first The RRC sublayer and the second RRC sub-combination together form an RRC layer, the function of the first RRC sublayer is for global RRC configuration management, and the function of the second RRC sublayer is for SRB (Signaling Radio Bearers, signaling radio bearers, SRB) generation, transmission, reception, and local RRC configuration management.
- RRC Radio Resource Control
- SRB Signaling radio bearers
- the function of the first PDCP sublayer is used for DRB (Data Radio Bearers, Data Radio Bearers, DRB for short).
- PDCP function of the second sub-layer process for the SRB is used for DRB (Data Radio Bearers, Data Radio Bearers, DRB for short).
- the base station structure of the embodiment of the present invention is compared with the remote interface in the remote RRH (Remote Radio Head, RRH) remote mode, and the amount of data transmitted by the interface transmitted between the RC and the RAP is relatively Less, it is beneficial to reduce the amount of data exchanged between the RC (Radio Access Network Controller, RC) and the RAP (Radio Access Point, RAP for short), thereby reducing the transmission bandwidth and Delay requirements.
- RC Radio Access Network Controller
- RAP Radio Access Point
- FIG. 3 is a schematic structural diagram of a base station according to an embodiment of the present invention.
- an evolved base station includes a first wireless network node and a second wireless network node, where the first wireless network node includes an RRC layer and a PDCP.
- the layer is used to complete the functions corresponding to the RRC layer and the PDCP layer;
- the wireless network node includes an RLC layer, a MAC layer, and a PHY layer, and is used to perform functions corresponding to the RLC layer, the MAC layer, and the PHY layer.
- the functions corresponding to the PDCP layer include: header compression, security, and reordering; the functions corresponding to the RLC layer include splitting, cascading, and automatic repeat request (ARQ); the corresponding functions of the MAC layer include: scheduling, Logical channel priority processing, HARQ (Hybrid Automatic Repeat Request), etc.; PHY layer corresponding functions include: modulation and demodulation, coding, multi-antenna mapping.
- the structure of the base station in the embodiment of the present invention is relatively smaller than the remote interface in the existing RRH remote mode, and the interface transmitted between the RC and the RAP transmits less data, which is beneficial to reduce the relationship between the RC and the RAP. The amount of data that is exchanged, thereby reducing the transmission bandwidth and latency requirements.
- FIG. 4 is a schematic flowchart of a data transmission method according to a first embodiment of the present invention.
- a data protection method according to an embodiment of the present invention is implemented by using the network architecture of FIG. Methods include:
- the first wireless network node learns the bearer type of the downlink data packet.
- the first wireless network node receives the downlink data packet sent by the core network, and the bearer type of the downlink data packet is divided into SRB and DRB, that is, the downlink data packet is divided into service data and signaling data, and the first wireless network node may be configured according to
- the bearer type identifier carried in the downlink data packet is used to learn the bearer type of the downlink data packet.
- the first radio network node sends the downlink data packet to a second radio network node, so that the second radio network node performs the downlink data packet.
- PDCP layer processing If the bearer type is SRB, the first radio network node sends the downlink data packet to a second radio network node, so that the second radio network node performs the downlink data packet.
- the first wireless network node does not process the signaling data, and the first wireless network node forwards the downlink data packet to the second wireless network node.
- the RRC layer of the downlink data packet is learned by the second radio network node as the signaling data, and then the PDCP layer, the RLC layer, the MAC layer, and the PHY layer pair of the second radio network node respectively process the downlink data packet, where The second wireless network node sends the processed downlink data packet to the user equipment.
- the first radio network node performs PDCP layer processing on the downlink data packet, and sends the processed downlink data packet to the second radio network node.
- the first wireless network node performs PDCP layer processing on the downlink data packet, and the PDCP layer processing includes: one of header compression, security, and reordering.
- the first wireless network node sends the downlink data packet processed by the PDCP layer to the second wireless network node, and the second wireless network node continues the RLC layer processing, the MAC layer processing, and the PHY layer on the downlink data packet.
- the second wireless network node completes the foregoing processing, and sends the processed downlink data packet to the user equipment.
- the first wireless network node receives an uplink data packet sent by the second wireless network node, where the uplink data packet performs PHY layer processing, MAC layer processing, and RLC on the second wireless network node.
- Layer processing, and the bearer type of the uplink data packet is DRB;
- the first radio network node performs the PDCP layer processing on the uplink data packet, and then sends the uplink data packet to the core network.
- the second wireless network node is responsible for processing the signaling data
- the first wireless network node is responsible for processing the service data
- the second wireless network node receives the uplink data packet sent by the user equipment, and processes the uplink data packet through the PHY layer.
- the uplink data packet is sent to the first radio network node to continue the PDCP layer processing, and the first radio network node performs PDCP on the uplink data packet.
- the layer processing includes: performing security processing on the uplink data packet according to the obtained DRB security information.
- the method further includes: the first wireless network node acquiring DRB security information and SRB security information from the core network;
- Transmitting, by the first radio network node, the SRB security information to the second radio network node; performing, by the first radio network node, PDCP layer processing on the downlink data packet includes:
- the first radio network node performs PDCP layer processing on the downlink data packet according to the DRB security information.
- the first wireless network node performs the PDCP layer processing on the service data by using the DRB security information, that is, the data packet of the bearer type is the DRB, and the first wireless network node sends the SRB security information to the second wireless network node.
- the second wireless network node performs PDCP layer processing on the signaling data.
- the SRB security information and the DRB security information include at least one of the following: an integrity protection algorithm, an integrity check algorithm, an encryption algorithm, a decryption algorithm, and a security key.
- the integrity protection algorithm is used to add redundant information to the message to protect the message integrity.
- the integrity check algorithm is used to determine whether the message is changed according to the redundant information in the message.
- the encryption algorithm is used to encrypt the message to generate the ciphertext.
- the encryption key is used for encryption; the decryption algorithm is used to decrypt the ciphertext to generate plaintext, and the decryption key is used for decryption; the integrity protection algorithm and the integrity check algorithm can be the same algorithm, and the encryption algorithm and the decryption algorithm can also be The same algorithm; the key used for integrity protection, the key used for integrity check, the encryption key used for encryption, and the decryption key used for decryption can be the same security key or the same security Different security keys derived from the key.
- the SRB security information and the DRB security information can be obtained from the core network, or can be obtained from other network nodes, and the invention is not limited.
- the first wireless network node is responsible for security protection of the service data carried in the DRB, and the wireless network node is responsible for performing security protection on the signaling data carried in the SRB, and the two are divided to reduce the first wireless.
- the amount of data transmission between the network node and the wireless network node reduces the need for transmission bandwidth between the two, and can quickly complete the underlying configuration and maximize business continuity.
- FIG. 5 is a schematic flowchart of a data transmission method according to a second embodiment of the present invention.
- the method includes:
- the second radio network node learns the bearer type of the uplink data packet sent by the UE.
- the UE sends an uplink data packet to the second wireless network node, and the bearer type of the uplink data packet is divided into SRB or DRB, that is, the uplink data packet is divided into service data or signaling data, and the second wireless network node may be configured according to the uplink data packet.
- the bearer type identifier carried in the bearer knows the bearer type of the uplink data packet.
- the second radio network node performs PHY layer processing, MAC layer processing, RLC layer processing, PDCP layer processing, and RRC layer processing on the uplink data packet.
- the second wireless network node completes the PHY layer processing, the MAC layer processing, the RLC layer processing, the PDCP layer processing, and the RRC on the uplink data packet.
- Layer processing after processing, generates RRC signaling.
- the performing, by the second wireless network node, the PDCP layer processing on the uplink data packet includes: using the SRB security information to perform security protection on the uplink data packet.
- the second radio network node sends the uplink data packet to the first radio network node, so that the first radio network node completes the uplink data packet.
- PDCP layer processing If the bearer type is DRB, the second radio network node sends the uplink data packet to the first radio network node, so that the first radio network node completes the uplink data packet.
- the second wireless network node does not perform PDCP layer processing on the service data, and the second wireless network node completes PHY layer processing, MAC layer for the uplink data packet.
- the processed uplink data packet is sent to the first wireless network node, and the first wireless network node continues to perform processing on the uplink data packet by the PDCP layer, where the PDCP layer processing includes: using DRB security Information protects upstream packets.
- the SRB security information and the DRB security information may be obtained by the first wireless network node from the core.
- the network access, the SRB security information and the DRB security information include at least one of the following: an integrity protection algorithm, an integrity check algorithm, an encryption algorithm, a decryption algorithm, and a security key, and the first wireless network node uses the DRB security information to the service data.
- the security protection is performed.
- the first wireless network node sends the SRB security information to the second wireless network node, and the second wireless network node performs security protection on the signaling data according to the SRB security information.
- the first wireless network node is responsible for security protection of the service data carried in the DRB, and the wireless network node is responsible for performing security protection on the signaling data carried in the SRB, and the two are divided to reduce the first wireless.
- the amount of data transmission between the network node and the wireless network node reduces the need for transmission bandwidth between the two, and can quickly complete the underlying configuration and maximize business continuity.
- the data protection method in the embodiment of the present invention is described in detail below by taking the RC as the first wireless network node and the RAP accessed by the UE as the wireless network node.
- FIG. 6 is a schematic flowchart of a data transmission method according to a third embodiment of the present invention.
- the data transmission method according to the embodiment of the present invention is implemented by using the architecture in FIG. 2, where the RC is used in the embodiment of the present invention.
- the RAP is a second wireless network node, and the method includes:
- the UE sends an RRC connection setup request message to the RAP, where the RRC connection request carries the UE identifier of the UE.
- the UE sends an RRC connection setup request message to the RAP, where the RRC connection setup request message is used to establish an RRC connection between the UE and the RAP.
- the RRC connection request is sent through the default SRB (SRB0), and the RRC connection request is used for the UE to establish an RRC connection with the network, and establish a new SRB, for example, SRB1, SRB2, and SRB3.
- the UE identifier may be an S-TMSI or a C-RNTI, etc., for identifying a unique identity of the UE.
- the RAP sends an RRC connection request and the UE identifier to the RC.
- the RC and the RAP are one-to-many correspondences, and the RAP uniquely corresponds to one RC.
- the RAP determines the RC according to the corresponding relationship, and sends the RRC connection request and the UE identifier to the RC, where the UE identifier may be included in the RRC connection request. .
- the RC performs admission control on the user equipment corresponding to the UE identifier.
- the RC determines whether the UE has the right to access the RAP. If the UE has the right to access the RAP, the S604 is performed.
- the method for determining whether the UE has the right to access the RAP may be: The RC determines whether the UE has the right to access the RAP according to one or more of the load state parameter of the RAP and the surrounding RAP, the interference state parameter, the service type information of the UE, and the subscription information of the UE. For example, the load of the RAP is too high, and the access level of the UE in the subscription information of the UE is lower than the preset access level, and the RC rejects the UE accessing the RAP. Otherwise, the RC allows the UE to access the RAP.
- the RC returns an admission indication to the RAP, and carries a UE identifier.
- the admission indication message is used to indicate that the UE is allowed to access the RAP.
- the RAP sends an RRC connection setup message to the UE.
- the RAP receives the admission indication sent by the RC, and generates an RRC connection setup message, and sends the generated RRC connection setup message to the user equipment corresponding to the UE identifier.
- the UE establishes an RRC connection with the RAP. After the RRC connection is established, the UE returns an RRC connection setup complete message to the RAP.
- the UE After the UE successfully establishes an RRC connection, it indicates that the new SRB has been successfully established. The UE returns an RRC Connection Setup Complete message to the RAP for transmission in the new SRB.
- the UE returns an RRC connection setup complete message to the RAP.
- the RAP receives the RRC Connection Setup Complete message to learn that the new SRB is successfully established.
- the RAP returns an RRC connection establishment completion indication to the RC.
- the RC receives the RRC connection setup completion indication to obtain that the new SRB is successfully established.
- the initial context establishment process of the UE is triggered between S609, RC and the core network.
- the RC triggers the completion of the initial context establishment procedure of the UE. For example, the RC sends the UE initial context setup request message. After the UE initialization context establishment process is completed, the core network sends the UE context to the RC. information.
- S610 Send UE context information that carries DRB security information and SRB security information and/or QoS parameters of the DRB.
- the RC sends the DRB security information, the SRB security information, and the QoS parameters of the DRB to the RAP, and the RAP generates an RRC connection reconfiguration message according to one or more of the foregoing information, and is used to complete the DRB establishment of the UE and the SRB weight. Configuration and security activation.
- the RAP saves the SRB security information and the QoS parameters of the DRB.
- the UE context information includes: DRB security information, SRB security information, and QoS parameters of the DRB, and the DRB security information and the SRB security information include a security key, an encryption algorithm, a decryption algorithm, an integrity protection algorithm, and an integrity check algorithm.
- the DRB security information and the SRB security information may be the same, that is, the same security information is used for DRB and SRB for security protection.
- the QoS parameters represent quality of service requirements for traffic data transmitted in the DRB.
- the QoS parameters include a maximum transmission rate, a minimum guaranteed rate, or a transmission delay.
- the QoS parameters can be sent to the RC by the core network, and the RC adjusts the QoS parameters according to the load state parameters of the RAP and the surrounding RAP to generate new QoS parameters.
- the RC also triggers establishment of a DRB for the UE, reconfiguration of the SRB of the UE, and security configuration.
- the security protection process of the service data takes the downlink direction of the data transmission as an example: after the RC receives the service data sent by the core network, the RC completes the PDCP function of the service data, generates a PDCP PDU, and performs header compression on the PDCP PDU according to the encryption algorithm. Encrypt the PDCP PDU with the encryption key, add the serial number to the PDCP PDU, and send the PDCP PDU to the RAP.
- the RAP completes the functions corresponding to the RLC layer, the MAC layer, and the PHY layer of the PDCP PDU. For example, the RAP completes the PDCP. Segmentation, scheduling, modulation coding of the PDU, and performing quality of service control on the service data carried in the DRB according to the generated QoS parameters.
- the RC sends the SRB security information to the RAP.
- the RAP performs security protection on the signaling data carried in the SRB according to the SRB security information.
- the RAP performs security protection on the signaling data carried in the SRB, such as encryption, decryption, integrity protection, and integrity check, and signaling data such as RRC signaling.
- FIG. 7 is a schematic flowchart of a UE handover method according to a first embodiment of the present invention.
- the method includes:
- the UE accesses the source RAP, and the source RAP determines whether the UE meets the handover condition.
- the method may be: the source RAP determines, according to the received signal carrier level of the UE, the signal carrier level of the UE.
- the source RAP determines according to the received signal-to-interference ratio of the UE, when the signal-to-interference ratio of the UE is lower than a given value, The UE satisfies the handover condition; or the source RAP determines from the distance to the UE that when the distance between the source RAP and the UE is greater than a given value, it is determined that the UE satisfies the handover condition.
- the source RAP needs to obtain the target RAP to be switched by the UE when the handover condition is satisfied.
- the determination of the target RAP may be performed by the active RAP, or may be performed by the RC, which is not limited by the present invention.
- the source RAP acquires a target RAP to be switched to the RC.
- the selection of the target RAP is performed by the RC, and the source RAP sends a request for acquiring the target RAP to the corresponding RC, where the request is used to request the RC to select a target RAP other than the source RAP from its own RAP set.
- the RC determines the target RAP to be switched.
- the RC manages the RAP set, and the RAP set includes the RAP and the at least one other RAP.
- the RC can obtain the link state parameter between the RAP and the UE reported by the RAP, and the RC takes the RAP with the best link state parameter as The target RAP to be switched.
- the link state parameters include one or more of RSSI, RSRP, and RSRQ.
- the RC sends the identifier of the target RAP to the RAP.
- the source RAP obtains the SRB security information of the SRB, and sends a handover request message carrying the SRB security information to the target RAP.
- the source RAP obtains SRB security information of the SRB with the UE, and the security information includes one or more of a security key, an encryption algorithm, a decryption algorithm, an integrity protection algorithm, and an integrity check algorithm, and the source RAP
- the target RAP is determined according to the identifier of the target RAP, and a handover request message carrying the SRB security information is sent to the target RAP.
- S706 The target RAP prepares a handover resource, and after the handover preparation is completed, returns a handover command message to the source RAP.
- the handover resource includes a spectrum resource, a hardware resource, and the like
- the target RAP receives and saves the SRB security information of the source RAP, so that the target RAP uses the SRB security information to secure the SRB with the UE after the UE switches to the target RAP. Protection, the DRB security information of the DRB between the RC and the UE remains unchanged. After the UE switches to the target RAP, the RC continues to use the original DRB security information to secure the service data on the DRB.
- the target RAP sends a handover command message to the source RAP.
- the target RAP is ready to switch resource replacement, and sends a handover command message to the source RAP.
- the UE can perform the handover operation.
- the source RAP sends a handover command message to the UE.
- the UE performs a handover operation. After the UE performs the handover operation, it accesses the target RAP.
- the source RAP sends a transmission status parameter to the RC.
- the transmission status parameter may be a PDCP status report, and is divided into an uplink transmission status parameter and a downlink transmission status parameter.
- the transmission status parameter indicates the sequence number of the PDCP data packet that was successfully sent or not successfully transmitted to the UE, and the sequence number of the successfully transmitted PDCP data packet is taken as an example.
- the transmission status parameter indicates the sequence number of the PDCP data packet that is successfully or unsuccessfully sent to the RC, and the RC sends the uplink transmission status parameter to the UE.
- the UE is configured to send the PDCP data packet to the target RAP according to the serial number to avoid repeated transmission of the data.
- FIG. 8 is a schematic flowchart of a data transmission method according to a fourth embodiment of the present invention.
- the data transmission method of the embodiment of the present invention is implemented by using the structural diagram of FIG. 3, where the method includes:
- the first wireless network node receives an uplink data packet sent by the second wireless network device, where the uplink data packet carries first indication information indicating identity information of the UE, type information of the bearer, and identity information of the bearer.
- the second wireless network node receives the uplink data packet sent by the UE, where the uplink data packet carries the identity information of the UE, the type information of the bearer, and the identity information of the bearer, and the second wireless network node passes the uplink data packet to the PHY layer. Processing, MAC layer processing, and RLC layer processing, the processed uplink data packet is sent to the first wireless network node, and the processed uplink data packet carries the first information indicating the identity information of the UE, the type information of the bearer, and the identity information of the bearer. Instructions.
- the first radio network node learns, according to the first indication information, a user equipment, a bearer type, and a bearer corresponding to the uplink data packet.
- the first radio network node learns the user equipment, the bearer type, and the bearer corresponding to the uplink data packet according to the first indication information carried in the uplink data packet, and the bearer type is divided into SRB and DRB.
- the first indication information may be a GTP tunnel identifier.
- the first wireless network node performs PDCP layer processing on the uplink data packet.
- the first wireless network node performs uplink PDTP layer processing on the PDCP layer, where the PDCP layer is located.
- FIG. 9 is a schematic flowchart of a data protection method according to a fifth embodiment of the present invention.
- the method includes:
- the second radio network node receives the downlink data packet sent by the first radio network node, where the downlink data packet carries first indication information that identifies the identity information of the UE, the type information of the bearer, and the identity information of the bearer.
- the core network sends a downlink data packet to the first wireless network node, where the downlink data packet carries the identity information of the UE, the type information of the bearer, and the identity information of the bearer, and the first wireless network node can learn the uplink data packet by using the RRC layer.
- the type information of the bearer, the first radio network node performs PDCP layer processing on the uplink data packet, and sends the processed downlink data packet to the second radio network node, where the processed downlink data packet carries the identity information of the UE and the type of the bearer.
- First indication information of the information and the carried identity information First indication information of the information and the carried identity information.
- the second radio network node learns, according to the first indication information, a user equipment, a bearer type, and a bearer corresponding to the downlink data packet.
- the bearer type is divided into SRB and DRB, and different UEs correspond to different bearers.
- the second wireless network node performs RLC layer processing, MAC layer processing, and PHY layer processing on the downlink data packet.
- the second wireless network node performs the RLC layer processing, the MAC layer processing, and the PHY layer processing on the downlink data packet, and sends the processed downlink data packet to the corresponding user equipment according to the identity information of the UE.
- FIG. 10 is a schematic flowchart of a data transmission method according to a sixth embodiment of the present invention.
- an RC is a first wireless network node
- a RAP is a second wireless network node, where the method includes:
- S1001 The UE sends an RRC connection setup request message carrying the UE identifier to the RAP.
- the UE pre-establishes the default bearer SRB0, and the UE sends an RRC connection request through the SRB0.
- the RRC connection request is used to establish a new SRB for the UE, for example, SRB1, SRB2, or SRB3.
- the UE identifier is used to uniquely identify the identity of the UE, and the UE identifier. It can be S-TMSI or C-RNTI.
- the RAP receives an RRC connection setup request message, and allocates a first SRB identifier to the SRB to be established.
- the RAP allocates a first SRB identifier to the SRB to be established, and the first SRB identifier is used by the RAP to uniquely identify the identity of the SRB to be established (downlink direction), for example, a signaling message that can be transmitted in the SRB to be established.
- the GTP tunnel identifier is added as the first SRB identifier of the SRB to be established.
- the RAP can determine the SRB to be established by knowing the first SRB identifier in the downlink direction.
- the RAP locally saves the mapping relationship between the first SRB identifier and the UE identifier.
- the RAP sends an RRC connection request carrying the UE identifier and the first SRB identifier to the RC, and forwards the RRC connection request to the RC.
- the RAP adds the first SRB identifier and the UE identifier to the RRC connection request, and then sends the RRC connection request to the RC, where the RRC connection request is still sent to the RC through the default bearer SRB0.
- the RC performs admission control on the UE, and allows the UE to allocate the second SRB identifier after accessing the RAP, and generates SRB configuration information.
- the RC parses the UE identifier and the first SRB identifier from the received RRC connection request, and performs admission control on the user equipment corresponding to the UE identifier.
- the method for admission control may be: RC according to the load of the RAP and the surrounding RAP.
- One or more of the status parameter, the interference status parameter, the service type information of the UE, and the subscription information of the UE determine whether the UE has the right to access the RAP. For example, the load of the RAP is too high, and the access level of the UE in the subscription information of the UE is lower than the preset access level, and the RC rejects the UE accessing the RAP. Otherwise, the RC allows the UE to access the RAP.
- the RC determines that the UE has the right to access the RAP, and allocates a second SRB identifier to the SRB to be established.
- the second SRB identifier is used to uniquely identify the identity of the SRB to be established in the RC (upstream direction), and the RC saves the first SRB locally.
- the mapping relationship between the identifier, the second SRB identifier, and the UE identifier is used to uniquely identify the identity of the SRB to be established in the RC (upstream direction), and the RC saves the first SRB locally.
- the RC generates SRB configuration information, where the SRB configuration information includes the first SRB configuration information and the second SRB configuration information, where the first SRB configuration information is used to configure the RLC layer, the MAC layer, and the PHY layer of the RAP, and the second SRB
- the configuration information is used by the UE to configure the RRC layer, the PDCP layer, the RLC layer, the MAC layer, and the PHY layer.
- the UE establishes a new SRB.
- the first SRB configuration information and the second SRB configuration information may be distinguished by carrying different identifiers in the SRB configuration information, where the first SRB information is used for sending to the RAP, and the second SRB configuration information is used for sending to the UE.
- the RC sends an RRC connection setup message carrying the first SRB identifier, the second SRB identifier, and the SRB configuration information to the RAP.
- the RAP completes the bottom layer configuration according to the first SRB configuration information.
- the RAP parses the first SRB identifier, the second SRB identifier, and the SRB configuration information from the received RRC connection setup message, and the RAP learns the SRB to be established by the UE according to the first SRB identifier, and learns the SRB configuration information.
- An SRB configuration information is configured to configure the RLC layer, the MAC layer, and the PHY layer according to the first SRB configuration information.
- the RAP learns the second SRB configuration information in the SRB configuration information, and adds the second SRB configuration information to the RRC connection setup message.
- the first SRB configuration information or/and the second SRB configuration information includes a third SRB identifier, where the third SRB identifier is used to learn signaling data between the UE and the RAP.
- the RAP saves the relationship between the third SRB identifier and the first SRB identifier/second SRB identifier.
- the RAP sends an RRC connection setup message carrying the second SRB configuration information to the UE.
- the UE configures the RRC layer, the PDCP layer, the RLC layer, the MAC layer, and the PHY layer according to the second SRB configuration information to establish a new SRB (for example, SRB1), and the UE returns to the RAP after successfully establishing the SRB1.
- the RRC Connection Setup Complete message is sent by the new SRB1, and the RRC connection setup complete message carries the UE identifier.
- the UE sends an RRC connection setup complete message carrying the UE identifier to the RAP, to notify the RC that the new SRB is successfully established.
- the RAP sends an RRC connection setup complete message carrying the second SRB identifier to the RC.
- the third SRB identifier indicates the identifier of the second SRB configuration information, and the RAP queries the second SRB identifier according to the mapping relationship between the third SRB identifier and the second SRB identifier, and adds the second SRB identifier to the RRC connection setup complete message.
- the RC learns the new SRB of the UE according to the second SRB identifier.
- the initial context establishment process is triggered between the S1010, the RC, and the core network.
- the RC obtains the SRB security information of the newly established SRB, the DRB security information of the DRB to be established, and the QoS parameters of the DRB to be established from the core network through the initial context establishment process of the UE.
- S1011, RC acquires DRB security information, SRB security information, and QoS parameters of the DRB.
- the RC obtains the DRB security information of the DRB to be established, the SRB security information of the new SRB, and the security information of the DRB to be established, and the RC generates the DRB configuration information, and the DRB configuration information is classified into two types: the first DRB configuration.
- the information is configured on the RAP, and the second DRB configuration information is used to establish the DRB configuration on the UE, the second DRB configuration information, and the second DRB configuration.
- Information can be distinguished by different representations.
- the DRB to be established by the RC allocates a first DRB identifier, and is used by the RC to uniquely know the identity of the DRB of the UE.
- S1012 The RC sends the first DRB configuration information and the first DRB identifier.
- the RAP learns the first DRB configuration information, and performs DRB configuration on the RLC layer, the MAC layer, and the PHY layer according to the first DRB configuration information. After the RAP completes the DRB configuration, the second DRB identifier is allocated to the DRB, and the second DRB identifier is used in the RAP. The only one is the identity of the DRB of the UE. The RAP learns the second DRB configuration information in the DRB configuration information. The third DRB identifier is included in the first DRB configuration information and/or the second DRB configuration information, and the third DRB identifier is used to learn the DRB between the UE and the RAP.
- the RAP sends a DRB configuration complete message carrying the first DRB identifier and the second DRB identifier to the RC.
- the RC After receiving the DRB configuration complete message, the RC generates an RRC connection reconfiguration message, where the RRC connection reconfiguration message is used to instruct the UE to establish a DRB.
- the RC sends an RRC connection reconfiguration message carrying the first SRB identifier and the second DRB configuration information to the RAP.
- the RAP learns, according to the first SRB identifier, the UE to which the SRB belongs.
- the RAP sends an RRC connection reconfiguration message carrying the second DRB configuration information to the UE.
- the UE configures the DRB according to the second DRB configuration information, and establishes a DRB. After the DRB is successfully established, the UE returns an RRC connection reconfiguration complete message to the RAP, where the RRC connection reconfiguration message carries the identifier of the second SRB configuration message.
- the RAP sends an RRC connection reconfiguration complete message carrying the second SRB identifier to the RC.
- the RC secures the created SRB and DRB according to the SRB security information and the DRB security information.
- the RC sends the security-protected service data to the RAP, where the service data carries the first DRB identifier and the second DRB identifier, where the signaling data carries the first SRB identifier and the second SRB identifier, and in the uplink direction, the RC is based on the service data.
- the first DRB identifier carried in the information indicates that the service message belongs to the UE, and the signaling message belongs to the UE according to the second SRB identifier carried in the signaling data.
- FIG. 11 is a schematic flowchart of a UE handover method according to a second embodiment of the present invention.
- the method includes:
- S1101 The UE triggers a random access procedure, and a random access channel is established between the UE and the source RAP and the RC.
- the source RAP sends the UE context information to the RC.
- the UE context information includes C-RNTI or radio resource configuration information and the like.
- S1104 The UE performs RRM measurement.
- S1105 The UE sends a measurement report generated after performing the RRM measurement to the RAP.
- the source RAP sends a measurement report to the RC.
- S1107 The RC detects, according to the measurement report, whether the UE meets the handover condition. If yes, prepares the handover, and performs S1107, and the UE determines that the target RAP to be switched can be determined according to the measurement report.
- S1108 The RC sends a handover request message carrying the UE context information to the target RAP.
- S1109 The target RAP performs admission control on the UE, and determines whether the UE is allowed to access the target RAP. If the UE allows access to the target RAP, S1110 is performed.
- S1110 The target RAP returns a handover response message to the RC.
- RC sends a handover command message to the source RAP.
- S1112 Perform a handover operation, and the UE switches from the source RAP to the target RAP. After the handover succeeds, the target RAP uses the SRB security information in the UE context information to secure the signaling data, and uses the DRB security information to secure the service data. protection.
- FIG. 12 is a schematic flowchart of a UE handover method according to a third embodiment of the present invention.
- the method includes:
- S1201 The UE performs RRM measurement.
- S1202 The UE sends a measurement report that performs RRM generation to the RAP.
- the source RAP forwards the measurement report to the RC.
- S1204 The RC detects, according to the measurement report, whether the UE meets the handover condition. If yes, execute S705, and the RC determines the target RAP to be switched at the same time.
- S1205 The RC sends a handover indication carrying the identifier of the target RAP to the source RAP.
- S1206 The source RAP returns a handover request message carrying the identifier of the target RAP to the RC.
- S1207 The RC sends a handover request message carrying the UE context information to the target RAP.
- S1208 The target RAP performs admission control on the UE, and prepares the handover after the UE is allowed to access.
- S1209 The target RAP sends a handover response message to the RC.
- S1210 The RC sends a handover command message to the source RAP.
- the UE is switched from the source RAP to the target RAP.
- the target RAP uses the SRB security information in the UE context information to secure the signaling data, and uses the DRB security information to secure the service data.
- FIG. 13 is a schematic structural diagram of a wireless network node according to a first embodiment of the present invention.
- the wireless network node includes: an identification module 1301, a first sending module 1302, and a first processing module. 1303.
- the identification module 1301 is configured to learn the bearer type of the downlink data packet.
- the first sending module 1302 is configured to: when the bearer type is SRB, the first wireless network node sends the downlink data packet to a second wireless network node, so that the second wireless network node pair The downlink data packet performs the function of the PDCP layer.
- the first processing module 1303 is configured to perform a PDCP layer function on the downlink data packet when the bearer type is a DRB, and send the processed downlink data packet to the second wireless network node.
- the wireless network node of the embodiment of the present invention further includes:
- a receiving module configured to receive an uplink data packet sent by the second wireless network node, where the second wireless network node performs a PHY layer function, a MAC layer function, and an RLC layer function on the uplink data packet, where The bearer type of the uplink data packet is DRB;
- the second processing module is configured to perform a function of the PDCP layer on the uplink data packet, and send the processed uplink data packet to the core network.
- the wireless network node of the embodiment of the present invention further includes:
- a security information obtaining module configured to acquire DRB security information and SRB security information from the core network, where the first wireless network node stores the DRB security information, and sends the SRB security information to the second wireless network node;
- the first processing module is configured to perform a function of a PDCP layer on the downlink data packet according to the DRB security information.
- the SRB security information and the DRB security information include: a integrity protection algorithm, One or more of an integrity check algorithm, an encryption algorithm, a decryption algorithm, and a security key.
- the wireless network node of the embodiment of the present invention further includes:
- An SRB establishing module configured to receive a user equipment identifier and a connection request sent by the second wireless network node; where the user equipment corresponding to the user equipment identifier has the right to access the second wireless network node, And the second wireless network node returns an admission indication that carries the user equipment identifier, where the admission indication is used to indicate that the user equipment and the second wireless network node establish an SRB.
- the wireless network node of the embodiment of the present invention further includes:
- a switching module configured to determine, from a set of radio network nodes under the jurisdiction, a target wireless network node other than the second wireless network node, and the target wireless network node, if the UE meets a handover condition
- the identifier is sent to the second wireless network node; the transmission state parameter of the service data is obtained from the second wireless network node; after the UE completes the handover operation, the target wireless connection network is used according to the transmission state parameter
- the node transmits the service data with the UE.
- the switching module is configured to acquire a link quality parameter between each wireless network node in the wireless network node set and the user equipment, and select a wireless network node with the best link quality parameter as the target.
- a wireless network node wherein the link quality parameter comprises one or more of RSRP, RSSI, and RSRQ.
- a wireless network node includes: an identification module 1401, a first processing module 1402, and a first sending module 1403.
- An identification module configured to learn the bearer type of the uplink data packet sent by the user equipment
- a first processing module configured to perform a function of a PHY layer and a function of an upper layer of the PHY layer on the uplink data packet if the bearer type is SRB;
- a first sending module configured to perform a PHY layer function, a MAC layer function, and an RLC layer function on the uplink data packet, and send the processed uplink data packet to the uplink data packet, where the bearer type is DRB a first wireless network node, configured to enable the first wireless network node to perform a PDCP layer function on the processed uplink data packet.
- the first processing module is configured to receive the SRB sent by the first wireless network node.
- the security information performs a function of the PDCP layer on the uplink data packet according to the SRB security information.
- the wireless network node of the embodiment of the present invention further includes:
- a receiving module configured to receive a downlink data packet sent by the first wireless network node, where the bearer data type of the downlink data packet is SRB;
- the second processing module is configured to perform the functions of the RRC layer and the functions of the RRC layer on the downlink data packet, and send the processed downlink data packet to the user equipment.
- the wireless network node of the embodiment of the present invention further includes:
- An SRB establishing module configured to forward, by the user equipment, a connection request that carries the user equipment identifier to the first wireless network node, and receive the first wireless network node to generate, after determining that the user equipment has access rights,
- the admission indication wherein the admission indication carries the user equipment identifier; generates a connection establishment message according to the admission indication, and sends the connection establishment message to the user equipment, so that the user equipment Establishing an SRB according to the connection setup message, and returning a connection establishment complete message to the second wireless network node after successfully establishing the SRB; and sending the received connection establishment complete message to the first wireless network node.
- the wireless network node of the embodiment of the present invention further includes:
- a switching module configured to: determine, in a case that the user equipment meets a handover condition, a target wireless network node to be switched; and send, to the target wireless network node, a handover request message that carries the SRB security information, to enable the target
- the radio network node is ready to switch resources, return a handover command message to the second radio network node; and forward the handover command message to the user equipment, where the handover command message carries the SRB security information
- the target wireless network access node performs signaling data according to the SRB security information. safety protection.
- the switching module is configured to:
- a wireless network node includes: a first receiving module 1501, an identifying module 1502, and a first processing module 1503.
- the first receiving module 1501 is configured to receive an uplink data packet sent by the second wireless network device, where the uplink data packet carries first indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer. .
- the identification module 1502 is configured to learn, according to the first indication information, a user equipment, a bearer type, and a bearer corresponding to the uplink data packet.
- the first processing module 1503 is configured to perform a function of the PDCP layer on the uplink data packet.
- the first processing module is configured to learn a bearer type of the uplink data packet.
- the bearer type of the uplink data packet is the DRB, perform the function of the PDCP layer on the second data packet according to the DRB security information, and send the processed uplink data packet to the core network;
- the bearer type of the uplink data packet is SRB
- the function of the PDCP layer and the function of the RRC layer are performed on the second data packet according to the SRB security information.
- the wireless network node of the embodiment of the present invention further includes:
- a second receiving module configured to receive a downlink data packet sent by the core network, where the downlink data packet carries second indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- a second processing module configured to perform a function of an RRC layer and a function of a PDCP layer on the data packet, and send the processed downlink data packet to the second wireless network node, so that the second wireless network node Obtaining, according to the second indication information, a user equipment, a bearer type, and a bearer of the downlink data packet.
- the wireless network node of the embodiment of the present invention further includes:
- a first switching module configured to determine a target wireless network node to be switched and acquire UE context information of the second wireless network node, if the user equipment meets a handover condition
- the handover The command message is used to instruct the user equipment to complete the handover operation.
- the wireless network node of the embodiment of the present invention further includes:
- a second switching module configured to determine a target wireless network node to be switched if the UE meets a handover condition
- the target wireless network node After receiving the handover response message returned by the target wireless network node, sending the handover response message to the second wireless network node, so that the wireless network node sends a handover to the user equipment according to the handover response message. And a command message, where the handover command message is used to instruct the user equipment to complete a handover operation.
- FIG. 16 is a schematic structural diagram of a wireless network node according to a fourth embodiment of the present invention.
- the wireless network node includes: a first receiving module 1601, an identifying module 1602, and a first processing module. 1603.
- the first receiving module 1601 is configured to receive a downlink data packet sent by the first wireless network node, where the downlink data packet carries a first indication that identifies identity information of the user equipment, type information of the bearer, and identity information of the bearer. information.
- the identification module 1602 is configured to learn, according to the first indication information, a user equipment, a bearer type, and a bearer corresponding to the downlink data packet.
- the first processing module 1603 is configured to perform the function of the following layer of the PDCP layer on the downlink data packet.
- the wireless network node of the embodiment of the present invention further includes:
- a second receiving module configured to receive an uplink data packet sent by the user equipment, where the uplink data packet carries second indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- a second processing module configured to perform a function of a layer of the PDCP layer on the uplink data packet, and send the processed uplink data packet to the first wireless network node, so that the first wireless network node pair
- the processed uplink packet performs the function of the PDCP layer.
- the wireless network node of the embodiment of the present invention further includes:
- a switching module configured to forward the measurement report sent by the user equipment to the first wireless network node, so that the first wireless network node, according to the measurement report, is that the user equipment meets a handover condition, Determining, by the first wireless network node, a target wireless network node to be handed over, the first wireless network node returning, to the second wireless network node, a handover indication carrying an identity of the target wireless network node;
- a fifth embodiment of the present invention further provides a wireless network node.
- the wireless network node includes a processor 171, a memory 173, and a communication interface 172.
- Communication interface 172 is used to communicate with external devices.
- the number of processors in the wireless network node 17 may be one or more.
- processor 171, memory 173, and communication interface 172 may be connected by a bus or other means.
- the wireless network node can be used to perform the method illustrated in FIG. For the meaning and examples of the terms involved in the embodiment, reference may be made to the corresponding embodiment of FIG. I will not repeat them here.
- the program code is stored in the memory 173.
- the processor 171 is configured to call the program code stored in the memory 173 for performing the following operations:
- the bearer type is a signaling radio bearer SRB
- the downlink data packet to a second radio network node, so that the second radio network node performs a packet data convergence protocol PDCP on the downlink data packet.
- Layer function or
- the bearer type is a data radio bearer DRB
- performing a function of a PDCP layer on the downlink data packet and sending the processed downlink data packet to the second radio network node.
- the processor is further configured to:
- the second wireless network node Receiving, by the second wireless network node, an uplink data packet, where the second wireless network node performs a physical PHY layer function, a medium access control MAC layer function, and a logical link control RLC layer on the uplink data packet.
- the bearer type of the uplink data packet is DRB;
- the processor is further configured to:
- the functions of performing the PDCP layer on the downlink data packet include:
- the SRB security information and the DRB security information comprise one or more of a integrity protection algorithm, an integrity check algorithm, an encryption algorithm, a decryption algorithm, and a security key.
- the processor before the processor performs the learning of the bearer type of the downlink data packet, the processor is further configured to:
- the user equipment corresponding to the user equipment identifier has the right to access the second wireless network node, returning an admission indication carrying the user equipment identifier to the second wireless network node, where the access
- the indication is for indicating that the SRB is established between the user equipment and the second wireless network node.
- the processor is further configured to:
- the user equipment satisfies the handover condition, it is determined from the set of wireless network nodes under its jurisdiction Determining a target wireless network node other than the second wireless network node, and transmitting an identifier of the target wireless network node to the second wireless network node;
- the service data is transmitted to the user equipment via the target wireless access network node according to the transmission status parameter.
- the determining, by the processor, to determine a target wireless network node other than the second wireless network node from the set of wireless network nodes under management includes:
- the quality parameters include one or more of a reference signal received power RSRP, a received signal strength indicator RSSI, and a reference signal received quality RSRQ.
- a sixth embodiment of the present invention further provides a wireless network node.
- the wireless network node includes a processor 181, a memory 183, and a communication interface 182.
- Communication interface 182 is used to communicate with external devices.
- the number of processors in the wireless network node 18 can be one or more.
- processor 181, memory 183, and communication interface 182 may be connected by a bus or other means.
- a wireless network node can be used to perform the method illustrated in FIG. For the meaning and examples of the terms involved in the embodiment, reference may be made to the embodiment corresponding to FIG. 5. I will not repeat them here.
- 183 memory stores program code.
- the 181 processor is configured to call the program code stored in the memory 183 for performing the following operations:
- the bearer type is SRB
- the bearer type is DRB
- the performing, by the processor, the function of performing the PHY layer on the uplink data packet and the function of the upper layer of the PHY layer includes:
- the processor is further configured to:
- the processor is further configured to:
- the received connection setup complete message is sent to the first wireless network node.
- the processor is further configured to:
- the target wireless network access node After receiving the handover complete message, the target wireless network access node performs security protection on the signaling data according to the SRB security information.
- the determining, by the processor, that the user equipment meets the handover condition, determining that the target wireless network node to be switched includes:
- a seventh embodiment of the present invention further provides a wireless network node.
- the wireless network node includes a processor 191, a memory 193, and a communication interface 192.
- the communication interface 192 is for communicating with an external device.
- the number of processors in the wireless network node 19 may be one or more.
- the processor 191, the memory 193, and the communication interface may be connected by a bus or other means.
- a wireless network node can be used to perform the method illustrated in FIG. For the meanings and examples of the terms involved in the embodiment, reference may be made to the corresponding embodiment of FIG. 8. I will not repeat them here.
- 193 memory stores program code.
- the processor 181 is configured to call the program code stored in the memory 183 for performing the following operations:
- the uplink data packet carries first indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- the function of the PDCP layer is performed on the uplink data packet.
- the performing, by the processor, the function of completing the PDCP layer on the uplink data packet includes:
- the bearer type of the uplink data packet is the DRB, perform the function of the PDCP layer on the second data packet according to the DRB security information, and send the processed uplink data packet to the core network;
- the bearer type of the uplink data packet is SRB
- the function of the PDCP layer and the function of the RRC layer are performed on the second data packet according to the SRB security information.
- the processor is further configured to:
- the core network Receiving, by the core network, a downlink data packet, where the downlink data packet carries second indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- the first wireless network node performs the functions of the RRC layer and the function of the PDCP layer on the data packet, and sends the processed downlink data packet to the second wireless network node, so that the second wireless network node Obtaining, according to the second indication information, a user equipment, a bearer type, and a bearer of the downlink data packet.
- the processor is further configured to:
- the handover The command message is used to instruct the user equipment to complete the handover operation.
- the processor is further configured to:
- a handover indication message that carries the identifier of the target wireless network node, where the handover indication message is used to instruct the wireless network node to acquire UE context information of the user equipment, and The handover request message of the UE context information;
- the target wireless network node After receiving the handover response message returned by the target wireless network node, sending the handover response message to the second wireless network node, so that the wireless network node sends a handover to the user equipment according to the handover response message. And a command message, where the handover command message is used to instruct the user equipment to complete a handover operation.
- an eighth embodiment of the present invention further provides a wireless network node.
- the wireless network node 20 includes a processor 201, a memory 203, and a communication interface 202.
- the communication interface 202 is for communicating with an external device.
- the number of processors in the wireless network node 20 may be one or more.
- processor 201, memory 203, and communication interface 202 may be connected by a bus or other means.
- a wireless network node can be used to perform the method illustrated in FIG. turn off For the meanings and examples of the terms involved in this embodiment, reference may be made to the corresponding embodiment of FIG. I will not repeat them here.
- the program code is stored in the memory 203.
- the processor 201 is configured to call program code stored in the memory 202 for performing the following operations:
- the first wireless network node Receiving, by the first wireless network node, a downlink data packet, where the downlink data packet carries first indication information that identifies identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- the functions of the following layers of the PDCP layer are performed on the downlink data packet.
- the processor is further configured to:
- the uplink data packet carries second indication information indicating identity information of the user equipment, type information of the bearer, and identity information of the bearer;
- Performing a function of a layer of the PDCP layer on the uplink data packet, and transmitting the processed uplink data packet to the first wireless network node, so that the first wireless network node performs processing on the processed uplink data packet The function of the PDCP layer.
- the processor is further configured to:
- the first wireless network node Forwarding the measurement report sent by the user equipment to the first wireless network node, so that the first wireless network node, according to the measurement report, whether the user equipment meets a handover condition, the first Determining, by the wireless network node, a target wireless network node to be handed over, the first wireless network node returning a handover indication carrying the identity of the target wireless network node;
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (51)
- 一种数据传输方法,其特征在于,包括:第一无线网络节点获知下行数据包的承载类型;在所述承载类型为信令无线承载SRB的情况下,所述第一无线网络节点将所述下行数据包发送给第二无线网络节点,以使所述第二无线网络节点对所述下行数据包执行分组数据汇聚协议PDCP层的功能;或者在所述承载类型为数据无线承载DRB的情况下,所述第一无线网络节点对所述下行数据包执行PDCP层的功能,并将处理后的下行数据包发送给所述第二无线网络节点。
- 如权利要求1所述的方法,其特征在于,还包括:所述第一无线网络节点接收所述第二无线网络节点发送的上行数据包;其中,所述第二无线网络节点对所述上行数据包执行物理PHY层的功能、介质访问控制MAC层的功能和逻辑链路控制RLC层的功能,所述上行数据包的承载类型为DRB;所述第一无线网络节点对所述上行数据包执行PDCP层的功能,并将处理后上行数据包发送给所述核心网。
- 如权利要求1或2所述的方法,其特征在于,还包括:所述第一无线网络节点从所述核心网获取DRB安全信息和SRB安全信息,所述第一无线网络节点存储所述DRB安全信息,以及将所述SRB安全信息发送给所述第二无线网络节点;其中,所述第一无线网络节点对所述下行数据包执行PDCP层的功能包括:所述第一无线网络节点根据所述DRB安全信息对所述下行数据包执行PDCP层的功能。
- 如权利要求3所述的方法,其特征在于,所述SRB安全信息和所述DRB安全信息包括:整性保护算法、完整性校验算法、加密算法、解密算法 和安全密钥中的一种或多种。
- 如权利要求1所述的方法,其特征在于,所述第一无线网络节点获知下行数据包的承载类型之前,还包括:所述第一无线网络节点接收所述第二无线网络节点发送的用户设备标识和连接请求;在所述用户设备标识对应的用户设备具有接入所述第二无线网络节点的权限的情况下,所述第一无线网络节点向所述第二无线网络节点返回携带所述用户设备标识的准入指示,所述准入指示用于指示所述用户设备与所述第二无线网络节点之间建立SRB。
- 如权利要求1-5任意一项所述的方法,其特征在于,还包括:在所述用户设备满足切换条件的情况下,所述第一无线网络节点从所辖的无线网络节点集合中确定除所述第二无线网络节点之外的目标无线网络节点,并将所述目标无线网络节点的标识发送至所述第二无线网络节点;所述第一无线网络节点从所述第二无线网络节点获取业务数据的传输状态参数;在所述用户设备完成切换操作后,所述第一无线网络节点根据所述传输状态参数经由所述目标无线接网络节点与所述用户设备传输业务数据。
- 如权利要求6所述的方法,其特征在于,所述第一无线网络节点从所辖的无线网络节点集合中确定除所述第二无线网络节点之外的目标无线网络节点包括:所述第一无线网络节点获取所述无线网络节点集合中各个无线网络节点与所述用户设备之间的链路质量参数,选择链路质量参数最优的无线网络节点作为所述目标无线网络节点;其中,所述链路质量参数包括:参考信号接收功率RSRP、接收信号强度指示RSSI和参考信号接收质量RSRQ中的一种或多种。
- 一种无线网络节点,其特征在于,包括:识别模块,用于获知下行数据包的承载类型;第一发送模块,用于在所述承载类型为SRB的情况下,所述第一无线网络节点将所述下行数据包发送给第二无线网络节点,以使所述第二无线网络节点对所述下行数据包执行PDCP层的功能;或第一处理模块,用于在所述承载类型为DRB的情况下,对所述下行数据包执行PDCP层的功能,并将处理后的下行数据包发送给所述第二无线网络节点。
- 如权利要求8所述的节点,其特征在于,还包括:接收模块,用于接收所述第二无线网络节点发送的上行数据包;其中,所述第二无线网络节点对所述上行数据包执行PHY层的功能、MAC层的功能和RLC层的功能,所述上行数据包的承载类型为DRB;第二处理模块,用于对所述上行数据包执行PDCP层的功能,并将处理后上行数据包发送给所述核心网。
- 如权利要求8或9所述的节点,其特征在于,还包括:安全信息获取模块,用于从所述核心网获取DRB安全信息和SRB安全信息,所述第一无线网络节点存储所述DRB安全信息,以及将所述SRB安全信息发送给所述第二无线网络节点;其中,所述第一处理模块用于根据所述DRB安全信息对所述下行数据包执行PDCP层的功能。
- 如权利要求10所述的节点,其特征在于,所述SRB安全信息和所述DRB安全信息包括:整性保护算法、完整性校验算法、加密算法、解密算法和安全密钥中的一种或多种。
- 如权利要求8所述的节点,其特征在于,还包括:SRB建立模块,用于接收所述第二无线网络节点发送的用户设备标识和 连接请求;在所述用户设备标识对应的用户设备具有接入所述第二无线网络节点的权限的情况下,向所述第二无线网络节点返回携带所述用户设备标识的准入指示,所述准入指示用于指示所述用户设备与所述第二无线网络节点之间建立SRB。
- 如权利要求8-12任意一项所述的节点,其特征在于,还包括:切换模块,用于在所述用户设备满足切换条件的情况下,从所辖的无线网络节点集合中确定除所述第二无线网络节点之外的目标无线网络节点,并将所述目标无线网络节点的标识发送至所述第二无线网络节点;从所述第二无线网络节点获取业务数据的传输状态参数;在所述用户设备完成切换操作后,根据所述传输状态参数经由所述目标无线接网络节点与所述用户设备传输业务数据。
- 如权利要求13所述的节点,其特征在于,所述切换模块用于获取所述无线网络节点集合中各个无线网络节点与所述用户设备之间的链路质量参数,选择链路质量参数最优的无线网络节点作为所述目标无线网络节点;其中,所述链路质量参数包括:RSRP、RSSI和RSRQ中的一种或多种。
- 一种无线网络节点,其特征在于,包括存储器和处理器,其特征在于,所述存储器保存有实现如权利要求1-7任意一项所述的数据传输方法的指令,所述处理器调取并执行所述存储器中的指令,实现如权利要求1-7任意一项所述的数据传输方法。
- 一种存储介质,用于控制计算机设备执行数据传输方法,所述方法包括以下步骤:获知下行数据包的承载类型;在所述承载类型为信令无线承载SRB的情况下,将所述下行数据包发送给第二无线网络节点,以使所述第二无线网络节点对所述下行数据包执行分组数据汇聚协议PDCP层的功能;或者在所述承载类型为数据无线承载DRB的情况下,对所述下行数据包执行PDCP层的功能,并将处理后的下行数据包发送给所述第二无线网络节点。
- 一种数据传输方法,其特征在于,包括:第二无线网络节点获知用户设备发送的上行数据包的承载类型;在所述承载类型为SRB的情况下,所述第二无线网络节点对所述上行数据包执行PHY层的功能以及所述PHY层的以上层的功能;或在所述承载类型为DRB的情况下,所述第二无线网络节点对所述上行数据包执行PHY层的功能、MAC层的功能和RLC层的功能,并将处理后的上行数据包发送给第一无线网络节点,以使所述第一无线网络节点对所述处理后的上行数据包执行PDCP层的功能。
- 如权利要求17所述的方法,其特征在于,所述第二无线网络节点对所述上行数据包执行PHY层的功能以及所述PHY层的以上层的功能包括:所述第二无线网络节点接收所述第一无线网络节点发送的SRB安全信息,根据所述SRB安全信息对所述上行数据包执行PDCP层的功能。
- 如权利要求17或18所述的方法,其特征在于,还包括:所述第二无线网络节点接收所述第一无线网络节点发送的下行数据包;其中,所述下行数据包的承载类型为SRB;所述第二无线网络节点对所述下行数据包执行RRC层的功能以及所述RRC层的以下层的功能,并将处理后的下行数据包发送给用户设备。
- 如权利要求17所述的方法,其特征在于,还包括:所述第二无线网络节点将所述用户设备发送的携带用户设备标识的连接请求转发至所述第一无线网络节点;所述第二无线网络节点接收所述第一无线网络节点在确定所述用户设备具有接入权限后生成的准入指示;其中,所述准入指示携带所述用户设备标识;所述第二无线网络节点根据所述准入指示生成连接建立消息,并将所述连接建立消息发送给所述用户设备,以使所述用户设备根据所述连接建立消息建立SRB,并在成功建立SRB后,向所述第二无线网络节点返回连接建立完成消息;所述第二无线网络节点将接收到的连接建立完成消息发送至所述第一无线网络节点。
- 如权利要求18所述的方法,其特征在于,还包括:所述第二无线网络节点在所述用户设备满足切换条件的情况下,确定待切换的目标无线网络节点;所述第二无线网络节点向所述目标无线网络节点发送携带所述SRB安全信息的切换请求消息,以使所述目标无线网络节点在准备好切换资源后,向所述第二无线网络节点返回切换命令消息;所述第二无线网络节点向所述用户设备转发所述切换命令消息,其中,所述切换命令消息携带所述SRB安全信息,以使所述用户设备在完成切换操作后向所述目标无线网络节点返回切换完成消息,所述目标无线网络接入节点接收到所述切换完成消息后,根据所述SRB安全信息对信令数据进行安全保护。
- 如权利要求21所述的方法,其特征在于,所述第二无线网络节点在所述用户设备满足切换条件的情况下,确定待切换的目标无线网络节点包括:所述第二无线网络节点在所述用户设备的信号载波电平小于第一阈值的情况下,确定所述用户设备满足切换条件;或所述第二无线网络节点在所述用户设备的信号载干比小于第二阈值的情况下,确定所述用户设备满足切换条件;或所述第二无线网络节点在与所述用户设备的距离大于第三阈值的情况下,确定所述用户设备满足切换条件;所述第二无线网络节点接收所述第一无线网络节点发送的携带所述目标无线网络节点的身份标识,根据所述身份标识确定所述目标网线网络节点。
- 一种无线网络节点,其特征在于,包括:识别模块,用于获知用户设备发送的上行数据包的承载类型;第一处理模块,用于在所述承载类型为SRB的情况下,对所述上行数据包执行PHY层的功能以及所述PHY层的以上层的功能;或第一发送模块,用于在所述承载类型为DRB的情况下,对所述上行数据包执行PHY层的功能、MAC层的功能和RLC层的功能,并将处理后的上行数据包发送给第一无线网络节点,以使所述第一无线网络节点对所述处理后的上行数据包执行PDCP层的功能。
- 如权利要求23所述的节点,其特征在于,所述第一处理模块用于接收所述第一无线网络节点发送的SRB安全信息,根据所述SRB安全信息对所述上行数据包执行PDCP层的功能。
- 如权利要求22或23所述的节点,其特征在于,还包括:接收模块,用于接收所述第一无线网络节点发送的下行数据包;其中,所述下行数据包的承载类型为SRB;第二处理模块,用于对所述下行数据包执行RRC层的功能以及所述RRC层的以下层的功能,并将处理后的下行数据包发送给用户设备。
- 如权利要求22所述的节点,其特征在于,还包括:SRB建立模块,用于将所述用户设备发送的携带用户设备标识的连接请求转发至所述第一无线网络节点;接收所述第一无线网络节点在确定所述用户设备具有接入权限后生成的准入指示;其中,所述准入指示携带所述用户设备标识;根据所述准入指示生成连接建立消息,并将所述连接建立消息发送给所述用户设备,以使所述用户设备根据所述连接建立消息建立SRB,并在成功建立SRB后,向所述第二无线网络节点返回连接建立完成消息;将接收到的连接建立完成消息发送至所述第一无线网络节点。
- 如权利要求23所述的节点,其特征在于,还包括:切换模块,用于在所述用户设备满足切换条件的情况下,确定待切换的目标无线网络节点;向所述目标无线网络节点发送携带所述SRB安全信息的切换请求消息,以使所述目标无线网络节点在准备好切换资源后,向所述第二无线网络节点返回切换命令消息;向所述用户设备转发所述切换命令消息,其中,所述切换命令消息携带所述SRB安全信息,以使所述用户设备在完成切换操作后向所述目标无线网络节点返回切换完成消息,所述目标无线网络接入节点接收到所述切换完成消息后,根据所述SRB安全信息对信令数据进行安全保护。
- 如权利要求27所述的节点,其特征在于,所述切换模块用于:在所述用户设备的信号载波电平小于第一阈值的情况下,确定所述用户设备满足切换条件;或在所述用户设备的信号载干比小于第二阈值的情况下,确定所述用户设备满足切换条件;或在与所述用户设备的距离大于第三阈值的情况下,确定所述用户设备满足切换条件;接收所述第一无线网络节点发送的携带所述目标无线网络节点的身份标识,根据所述身份标识确定所述目标网线网络节点。
- 一种无线网络节点,其特征在于,包括存储器和处理器,其特征在于,所述存储器保存有实现如权利要求17-22任意一项所述的数据传输方法的指令,所述处理器调取并执行所述存储器中的指令,实现如权利要求17-22任意一项所述的数据传输方法。
- 一种存储介质,用于控制计算机设备执行数据传输方法,所述方法包括以下步骤:获知用户设备发送的上行数据包的承载类型;在所述承载类型为SRB的情况下,对所述上行数据包执行PHY层的功能以及所述PHY层的以上层的功能;或在所述承载类型为DRB的情况下,对所述上行数据包执行PHY层的功能、MAC层的功能和RLC层的功能,并将处理后的上行数据包发送给第一无线网络节点,以使所述第一无线网络节点对所述处理后的上行数据包执行PDCP层的功能。
- 一种数据的传输方法,其特征在于,包括:第一无线网络节点接收第二无线网络设备发送的上行数据包,其中,所述上行数据包中携带表示用户设备的身份信息、承载的类型信息和承载的身份信息的第一指示信息;所述第一无线网络节点根据所述第一指示信息获知所述上行数据包对应的用户设备、承载类型以及承载;所述第一无线网络节点对所述上行数据包执行PDCP层的功能。
- 如权利要求31所述的方法,其特征在于,所述第一无线网络节点对所述上行数据包完成PDCP层的功能包括:所述第一无线网络节点获知所述上行数据包的承载类型;在所述上行数据包的承载类型为DRB的情况下,根据DRB安全信息对所述第二数据包执行PDCP层的功能,将处理后的上行数据包发送给核心网;在所述上行数据包的承载类型为SRB的情况下,根据SRB安全信息对所述第二数据包执行PDCP层的功能和RRC层的功能。
- 如权利要求32所述的方法,其特征在于,还包括:所述第一无线网络节点接收所述核心网发送的下行数据包,其中,所述下行数据包携带表示用户设备的身份信息、承载的类型信息和承载的身份信息的第二指示信息;所述第一无线网节点对所述数据包完成RRC层的功能和PDCP层的功能,并将处理后的下行数据包发送给所述第二无线网络节点,以使所述第二无线网络节点根据所述第二指示信息获知下行数据包的用户设备、承载类型和承载。
- 如权利要求31-33任意一项所述的方法,其特征在于,还包括:在所述用户设备满足切换条件的情况下,所述第一无线网络节点确定待切换的目标无线网络节点以及获取所述第二无线网络节点的UE上下文信息;所述第一无线网络节点向所述目标无线网络节点发送携带所述UE上下文信息的切换请求消息,以使所述目标无线网络节点在确定所述用户设备具有接入权限并准备好切换资源后,向所述第一无线网络节点返回切换响应消息;所述第一无线网络节点接收所述目标无线网络节点返回的切换响应消息转发至所述第二无线网络节点,以使所述第二无线网络节点根据所述切换响应消息向所述用户设备发送切换命令消息,所述切换命令消息用于指示所述用户设备完成切换操作。
- 如权利要求33-34任意一项所述的方法,其特征在于,还包括:在所述用户设备满足切换条件的情况下,所述第一无线网络节点确定待切换的目标无线网络节点;所述第一无线网络节点向所述第二无线网络节点发送携带所述目标无线网络节点的标识的切换指示消息,所述切换指示消息用于指示所述无线网络节点获取所述用户设备的UE上下文信息,并向所述第一无线网络节点发送携带所述UE上下文信息的切换要求消息;所述第一无线网络节点根据所述切换要求消息向所述目标无线网络节点发送切换请求消息,以使所述目标无线网络节点在确定所述用户设备具有接入权限后,向所述第一无线网络节点返回切换响应消息;所述第一无线网络节点接收所述目标无线网络节点返回的切换响应消息后,将所述切换响应消息发送至所述第二无线网络节点,以使所述无线网络节点根据所述切换响应消息向所述用户设备发送切换命令消息,所述切换命令消息用于指示所述用户设备完成切换操作。
- 一种无线网络节点,其特征在于,包括:第一接收模块,用于接收第二无线网络设备发送的上行数据包,其中,所述上行数据包中携带表示用户设备的身份信息、承载的类型信息和承载的身份 信息的第一指示信息;识别模块,用于根据所述第一指示信息获知所述上行数据包对应的用户设备、承载类型以及承载;第一处理模块,用于对所述上行数据包执行PDCP层的功能。
- 如权利要求36所述的节点,其特征在于,所述第一处理模块用于获知所述上行数据包的承载类型;在所述上行数据包的承载类型为DRB的情况下,根据DRB安全信息对所述第二数据包执行PDCP层的功能,将处理后的上行数据包发送给核心网;在所述上行数据包的承载类型为SRB的情况下,根据SRB安全信息对所述第二数据包执行PDCP层的功能和RRC层的功能。
- 如权利要求36或37所述的节点,其特征在于,还包括:第二接收模块,用于接收所述核心网发送的下行数据包,其中,所述下行数据包携带表示用户设备的身份信息、承载的类型信息和承载的身份信息的第二指示信息;第二处理模块,用于对所述数据包完成RRC层的功能和PDCP层的功能,并将处理后的下行数据包发送给所述第二无线网络节点,以使所述第二无线网络节点根据所述第二指示信息获知下行数据包的用户设备、承载类型和承载。
- 如权利要求36-38任意一项所述的节点,其特征在于,还包括:第一切换模块,用于在所述用户设备满足切换条件的情况下,确定待切换的目标无线网络节点以及获取所述第二无线网络节点的UE上下文信息;向所述目标无线网络节点发送携带所述UE上下文信息的切换请求消息,以使所述目标无线网络节点在确定所述用户设备具有接入权限并准备好切换资源后,向所述第一无线网络节点返回切换响应消息;接收所述目标无线网络节点返回的切换响应消息转发至所述第二无线网络节点,以使所述第二无线网络节点根据所述切换响应消息向所述用户设备发 送切换命令消息,所述切换命令消息用于指示所述用户设备完成切换操作。
- 如权利要求36-38任意一项所述的节点,其特征在于,还包括:第二切换模块,用于在所述用户设备满足切换条件的情况下,确定待切换的目标无线网络节点;向所述第二无线网络节点发送携带所述目标无线网络节点的标识的切换指示消息,所述切换指示消息用于指示所述无线网络节点获取所述用户设备的UE上下文信息,并向所述第一无线网络节点发送携带所述UE上下文信息的切换要求消息;根据所述切换要求消息向所述目标无线网络节点发送切换请求消息,以使所述目标无线网络节点在确定所述用户设备具有接入权限后,向所述第一无线网络节点返回切换响应消息;接收所述目标无线网络节点返回的切换响应消息后,将所述切换响应消息发送至所述第二无线网络节点,以使所述无线网络节点根据所述切换响应消息向所述用户设备发送切换命令消息,所述切换命令消息用于指示所述用户设备完成切换操作。
- 一种无线网络节点,其特征在于,包括存储器和处理器,其特征在于,所述存储器保存有实现如权利要求31-35任意一项所述的数据传输方法的指令,所述处理器调取并执行所述存储器中的指令,实现如权利要求31-35任意一项所述的数据传输方法。
- 一种存储介质,用于控制计算机设备执行数据传输方法,所述方法包括以下步骤:接收第二无线网络设备发送的上行数据包,其中,所述上行数据包中携带表示用户设备的身份信息、承载的类型信息和承载的身份信息的第一指示信息;根据所述第一指示信息获知所述上行数据包对应的用户设备、承载类型以及承载;对所述上行数据包执行PDCP层的功能。
- 一种数据传输方法,其特征在于,包括:第二无线网络节点接收所述第一无线网络节点发送的下行数据包,其中,所述下行数据包携带标识用户设备的身份信息、承载的类型信息和承载的身份信息的第一指示信息;所述第二无线网络节点根据所述第一指示信息获知所述下行数据包对应的用户设备、承载类型和承载;所述第二无线网络节点对所述下行数据包执行PDCP层的以下层的功能。
- 如权利要求43所述的方法,其特征在于,还包括:所述第二无线网络节点接收用户设备发送的上行数据包,其中,所述上行数据包携带表示所述用户设备的身份信息、承载的类型信息和承载的身份信息的第二指示信息;所述第二无线网络节点对所述上行数据包执行PDCP层的以下层的功能,并将处理后的上行数据包发送给所述第一无线网络节点,以使所述第一无线网络节点对处理后的上行数据包执行PDCP层的功能。
- 如权利要求43或44所述的方法,其特征在于,还包括:所述第二无线网络节点将所述用户设备发送的测量报告转发给所述第一无线网络节点,以使所述第一无线网络节点根据所述测量报告在所述用户设备是否满足切换条件的情况下,所述第一无线网络节点确定待切换的目标无线网络节点,所述第一无线网络节点向所述第二无线网络节点返回携带所述目标无线网络节点的身份标识的切换指示;所述第二无线网络节点接收到所述携带所述目标无线网络节点的身份标识的切换指示后,获取所述用户设备的UE上下文信息以及向所述第一无线网络节点发送携带所述UE上下文信息的切换要求消息。
- 一种无线网络节点,其特征在于,包括:第一接收模块,用于接收所述第一无线网络节点发送的下行数据包,其中, 所述下行数据包携带标识用户设备的身份信息、承载的类型信息和承载的身份信息的第一指示信息;识别模块,用于根据所述第一指示信息获知所述下行数据包对应的用户设备、承载类型和承载;第一处理模块,用于对所述下行数据包执行PDCP层的以下层的功能。
- 如权利要求46所述的节点,其特征在于,还包括:第二接收模块,用于接收用户设备发送的上行数据包,其中,所述上行数据包携带表示所述用户设备的身份信息、承载的类型信息和承载的身份信息的第二指示信息;第二处理模块,用于对所述上行数据包执行PDCP层的以下层的功能,并将处理后的上行数据包发送给所述第一无线网络节点,以使所述第一无线网络节点对处理后的上行数据包执行PDCP层的功能。
- 如权利要求46或47所述的节点,其特征在于,还包括:切换模块,用于将所述用户设备发送的测量报告转发给所述第一无线网络节点,以使所述第一无线网络节点根据所述测量报告在所述用户设备满足切换条件的情况下,所述第一无线网络节点确定待切换的目标无线网络节点,所述第一无线网络节点向所述第二无线网络节点返回携带所述目标无线网络节点的身份标识的切换指示;接收到所述携带所述目标无线网络节点的身份标识的切换指示后,获取所述用户设备的UE上下文信息以及向所述第一无线网络节点发送携带所述UE上下文信息的切换要求消息。
- 一种无线网络节点,其特征在于,包括存储器和处理器,其特征在于,所述存储器保存有实现如权利要求43-45任意一项所述的数据传输方法的指令,所述处理器调取并执行所述存储器中的指令,实现如权利要求43-45任意一项所述的数据传输方法。
- 一种存储介质,用于控制计算机设备执行手势控制方法,所述方法包括以下步骤:接收所述第一无线网络节点发送的下行数据包,其中,所述下行数据包携带标识用户设备的身份信息、承载的类型信息和承载的身份信息的第一指示信息;根据所述第一指示信息获知所述下行数据包对应的用户设备、承载类型和承载;对所述下行数据包执行PDCP层的以下层的功能。
- 一种通信系统,其特征在于,包括:如权利要求8-15任意一项所述的无线网络节点和至少一个如权利要求23-29的无线网络节点;或如权利要求36-41的任意一项所述的无线网络节点和至少一个如权利要求46-49任意一项所述的无线网络节点。
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP16817227.8A EP3300443B1 (en) | 2015-06-30 | 2016-06-28 | Data transmission method and wireless network node |
| PL16817227T PL3300443T3 (pl) | 2015-06-30 | 2016-06-28 | Sposób transmisji danych i węzeł sieci bezprzewodowej |
| JP2017566086A JP6933350B2 (ja) | 2015-06-30 | 2016-06-28 | データ伝送方法、無線ネットワークノード、および通信システム |
| ZA2017/08698A ZA201708698B (en) | 2015-06-30 | 2017-12-20 | Data transmission method, wireless network node, and communication system |
| US15/856,438 US10834638B2 (en) | 2015-06-30 | 2017-12-28 | Data transmission method, wireless network node, and communications system |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510374525.6 | 2015-06-30 | ||
| CN201510374525.6A CN106332048B (zh) | 2015-06-30 | 2015-06-30 | 一种数据传输方法、无线网络节点和通信系统 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/856,438 Continuation US10834638B2 (en) | 2015-06-30 | 2017-12-28 | Data transmission method, wireless network node, and communications system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017000863A1 true WO2017000863A1 (zh) | 2017-01-05 |
Family
ID=57607859
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/087388 Ceased WO2017000863A1 (zh) | 2015-06-30 | 2016-06-28 | 一种数据传输方法、无线网络节点和通信系统 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US10834638B2 (zh) |
| EP (1) | EP3300443B1 (zh) |
| JP (1) | JP6933350B2 (zh) |
| CN (2) | CN106332048B (zh) |
| PL (1) | PL3300443T3 (zh) |
| WO (1) | WO2017000863A1 (zh) |
| ZA (1) | ZA201708698B (zh) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2018171734A1 (en) * | 2017-03-24 | 2018-09-27 | Mediatek Inc. | User equipment and methods for pdcp duplication in 5g ran |
| JP2020511087A (ja) * | 2017-03-16 | 2020-04-09 | 中興通訊股▲ふん▼有限公司Zte Corporation | 無線通信のための方法、及び無線通信装置 |
| KR20200106938A (ko) * | 2018-01-13 | 2020-09-15 | 후아웨이 테크놀러지 컴퍼니 리미티드 | 노드 및 통신 방법 |
| US11265770B2 (en) | 2017-05-05 | 2022-03-01 | Huawei Technologies Co., Ltd. | Communication method and apparatus for use in an inactive state |
| US11722899B2 (en) | 2018-03-15 | 2023-08-08 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Data processing method, access network device, and core network device |
Families Citing this family (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3282806B1 (en) * | 2016-08-10 | 2020-05-27 | HTC Corporation | Device and method of handling a signaling radio bearer for narrowband internet of things communication |
| WO2018170646A1 (zh) * | 2017-03-19 | 2018-09-27 | 南通朗恒通信技术有限公司 | 一种用于下行传输的方法和装置 |
| WO2018170833A1 (zh) * | 2017-03-23 | 2018-09-27 | Oppo广东移动通信有限公司 | 一种上行数据传输方法、终端、网络侧设备及系统 |
| CN110519814A (zh) * | 2017-03-23 | 2019-11-29 | 展讯通信(上海)有限公司 | 数据传输方法及装置、存储介质、基站 |
| CN108632892B (zh) * | 2017-03-24 | 2022-02-25 | 华为技术有限公司 | 无线通信方法、终端、接入网设备和网络系统 |
| CN110431861B (zh) * | 2017-04-07 | 2020-11-06 | 华为技术有限公司 | 基站功能部署方法及设备 |
| US12096292B2 (en) | 2017-05-05 | 2024-09-17 | Samsung Electronics Co., Ltd. | System, data transmission method and network equipment supporting PDCP duplication function method and device for transferring supplementary uplink carrier configuration information and method and device for performing connection mobility adjustment |
| US11212048B2 (en) | 2017-05-05 | 2021-12-28 | Samsung Electronics Co., Ltd. | System, data transmission method and network equipment supporting PDCP duplication function method and device for transferring supplementary uplink carrier configuration information and method and device for performing connection mobility adjustment |
| CN109150388B (zh) * | 2017-06-16 | 2022-06-21 | 北京三星通信技术研究有限公司 | 支持pdcp重复功能的系统、数据传输方法及网络设备 |
| EP3625988A4 (en) * | 2017-05-14 | 2021-01-27 | Fg Innovation Company Limited | METHODS, DEVICES AND SYSTEMS FOR BEAM REFINING DURING A HANDOVER |
| CN109246837B (zh) * | 2017-06-12 | 2023-05-05 | 华为技术有限公司 | 通信方法和装置以及无线接入网络 |
| US10512002B2 (en) * | 2017-06-23 | 2019-12-17 | Apple Inc. | Lossless split data bearer for inter-RAT dual connectivity wireless device |
| CN113543214A (zh) | 2017-08-09 | 2021-10-22 | 中兴通讯股份有限公司 | 用于分离用户面的服务质量实现 |
| US10582556B2 (en) * | 2017-08-11 | 2020-03-03 | Htc Corporation | Device and method for handling a bearer type change |
| JP6564827B2 (ja) * | 2017-09-28 | 2019-08-21 | 株式会社Nttドコモ | ネットワークノード及び通信システム |
| CN109803330B (zh) | 2017-11-16 | 2021-01-15 | 维沃移动通信有限公司 | 无线承载的处理方法及网络设备 |
| CN109802809B (zh) * | 2017-11-17 | 2021-02-09 | 华为技术有限公司 | 网络接入的方法、终端设备和网络设备 |
| CN116017785A (zh) * | 2018-02-09 | 2023-04-25 | 中兴通讯股份有限公司 | Rrc状态转换方法、终端、cu、du和计算机可读存储介质 |
| EP3576441A1 (en) * | 2018-05-31 | 2019-12-04 | Koninklijke Philips N.V. | Device for wireless communication handover |
| FI3811666T3 (fi) * | 2018-06-21 | 2023-09-20 | Zte Corp | Tekniikoita siirtonopeuden säätämiseksi |
| KR102602381B1 (ko) * | 2018-10-05 | 2023-11-16 | 삼성전자주식회사 | 무선 통신 시스템에서 무선 통신망을 이용한 동기화를 위한 장치 및 방법 |
| CN111436163B (zh) * | 2019-03-28 | 2022-03-01 | 维沃移动通信有限公司 | 配置协商方法及网络节点 |
| US11785632B2 (en) * | 2019-10-02 | 2023-10-10 | Ofinno, Llc | On demand system information for sidelink communications |
| CN114390699B (zh) * | 2020-10-22 | 2025-08-19 | 大唐移动通信设备有限公司 | 状态参量处理方法及装置、网络设备 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2688328A1 (en) * | 2012-07-17 | 2014-01-22 | Motorola Mobility LLC | Security in wireless communication system and device |
| CN103582054A (zh) * | 2012-07-27 | 2014-02-12 | 电信科学技术研究院 | 一种进行切换的方法和装置 |
| CN103702422A (zh) * | 2012-09-28 | 2014-04-02 | 电信科学技术研究院 | 一种本地承载管理方法及设备 |
| CN103987124A (zh) * | 2014-05-07 | 2014-08-13 | 电信科学技术研究院 | 一种配置调度的方法及设备 |
Family Cites Families (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7580388B2 (en) * | 2004-06-01 | 2009-08-25 | Lg Electronics Inc. | Method and apparatus for providing enhanced messages on common control channel in wireless communication system |
| US9131526B2 (en) | 2012-05-31 | 2015-09-08 | Telefonaktiebolaget L M Ericsson (Publ) | Pooled transport and control functions in a 3GPP LTE network |
| CN101753181B (zh) * | 2008-12-12 | 2015-04-29 | 电信科学技术研究院 | 一种数据传输方法、系统及装置 |
| US8743905B2 (en) | 2008-12-22 | 2014-06-03 | Qualcomm Incorporated | Method and apparatus for bundling and ciphering data |
| CN102036256B (zh) * | 2009-09-28 | 2013-03-20 | 华为技术有限公司 | 数据传输方法、装置及系统 |
| US8514756B1 (en) * | 2010-10-15 | 2013-08-20 | Juniper Networks, Inc. | Collectively addressing wireless devices |
| ES2734310T3 (es) | 2011-11-25 | 2019-12-05 | Nec Corp | Estación de radio y método de procesamiento de datos de usuario con estación de radio |
| US8958422B2 (en) * | 2012-03-17 | 2015-02-17 | Blackberry Limited | Handling packet data convergence protocol data units |
| CN103582124B (zh) * | 2012-07-24 | 2016-12-21 | 电信科学技术研究院 | 一种业务建立的方法、系统和设备 |
| JP6397819B2 (ja) * | 2012-08-23 | 2018-09-26 | インターデイジタル パテント ホールディングス インコーポレイテッド | ワイヤレスシステムにおける複数のスケジューラによる動作 |
| US10581813B2 (en) * | 2012-09-14 | 2020-03-03 | Interdigital Patent Holdings, Inc. | System enhancements for enabling non-3GPP offload in 3GPP |
| EP2912918B1 (en) * | 2012-10-23 | 2017-12-06 | LG Electronics Inc. | Method and apparatus for performing backoff in wireless communication system |
| EP2959693B1 (en) * | 2013-02-21 | 2017-11-22 | Altiostar Networks, Inc. | Systems and methods for coordinating transmission of data packets based on frame type detection in a base station |
| WO2014163309A1 (en) * | 2013-04-02 | 2014-10-09 | Lg Electronics Inc. | Method for performing a cell change procedure in a wireless communication system and a device therefor |
| ES2733065T3 (es) * | 2013-05-16 | 2019-11-27 | Intel Ip Corp | Múltiples grupos de control de enlace de radio (RLC) |
| CN104244426B (zh) * | 2013-06-09 | 2019-02-05 | 华为技术有限公司 | 一种数据无线承载drb的资源分配方法及装置 |
| US9819469B2 (en) * | 2013-07-01 | 2017-11-14 | Qualcomm Incorporated | Techniques for enabling quality of service (QoS) on WLAN for traffic related to a bearer on cellular networks |
| US9648514B2 (en) * | 2013-08-09 | 2017-05-09 | Blackberry Limited | Method and system for protocol layer enhancements in data offload over small cells |
| WO2015030845A1 (en) * | 2013-08-30 | 2015-03-05 | Intel IP Corporation | Measurement triggers for customer care in a wireless network |
| MX361250B (es) * | 2014-01-28 | 2018-11-30 | Huawei Tech Co Ltd | Método y sistema de configuración de portador de radio. |
| US9713044B2 (en) * | 2014-01-30 | 2017-07-18 | Sharp Kabushiki Kaisha | Systems and methods for dual-connectivity operation |
| WO2015123871A1 (zh) * | 2014-02-21 | 2015-08-27 | 华为技术有限公司 | 一种网络故障的处理方法和设备 |
| US9706469B2 (en) * | 2014-06-03 | 2017-07-11 | Intel Corporation | Radio resource control (RRC) protocol for cell selection and traffic steering for integrated WLAN/3GPP radio access technologies |
| EP3238480A1 (en) * | 2014-12-23 | 2017-11-01 | Interdigital Patent Holdings, Inc. | Methods for wifi integration in cellular systems |
| WO2016143560A1 (ja) * | 2015-03-06 | 2016-09-15 | 京セラ株式会社 | 無線端末及び基地局 |
| US10880941B2 (en) * | 2015-03-13 | 2020-12-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for traffic aggregation setup between WLAN and 3GPP |
| EP3267758B1 (en) * | 2015-03-31 | 2020-09-02 | Huawei Technologies Co., Ltd. | Communication method and user equipment |
| WO2016163432A1 (ja) * | 2015-04-10 | 2016-10-13 | 京セラ株式会社 | ユーザ端末及び無線通信装置 |
| EP3297382B1 (en) * | 2015-05-15 | 2021-01-20 | Samsung Electronics Co., Ltd. | Methods and devices for transmitting or receiving scheduling request in mobile communication system |
-
2015
- 2015-06-30 CN CN201510374525.6A patent/CN106332048B/zh active Active
- 2015-06-30 CN CN202210941044.9A patent/CN115474245B/zh active Active
-
2016
- 2016-06-28 EP EP16817227.8A patent/EP3300443B1/en active Active
- 2016-06-28 PL PL16817227T patent/PL3300443T3/pl unknown
- 2016-06-28 WO PCT/CN2016/087388 patent/WO2017000863A1/zh not_active Ceased
- 2016-06-28 JP JP2017566086A patent/JP6933350B2/ja active Active
-
2017
- 2017-12-20 ZA ZA2017/08698A patent/ZA201708698B/en unknown
- 2017-12-28 US US15/856,438 patent/US10834638B2/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2688328A1 (en) * | 2012-07-17 | 2014-01-22 | Motorola Mobility LLC | Security in wireless communication system and device |
| CN103582054A (zh) * | 2012-07-27 | 2014-02-12 | 电信科学技术研究院 | 一种进行切换的方法和装置 |
| CN103702422A (zh) * | 2012-09-28 | 2014-04-02 | 电信科学技术研究院 | 一种本地承载管理方法及设备 |
| CN103987124A (zh) * | 2014-05-07 | 2014-08-13 | 电信科学技术研究院 | 一种配置调度的方法及设备 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP3300443A4 * |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2020511087A (ja) * | 2017-03-16 | 2020-04-09 | 中興通訊股▲ふん▼有限公司Zte Corporation | 無線通信のための方法、及び無線通信装置 |
| JP7083840B2 (ja) | 2017-03-16 | 2022-06-13 | 中興通訊股▲ふん▼有限公司 | 無線通信のための方法、及び無線通信装置 |
| US11647551B2 (en) | 2017-03-16 | 2023-05-09 | Zte Corporation | Method and system for user information management |
| WO2018171734A1 (en) * | 2017-03-24 | 2018-09-27 | Mediatek Inc. | User equipment and methods for pdcp duplication in 5g ran |
| US10536878B2 (en) | 2017-03-24 | 2020-01-14 | Mediatek Inc. | User equipment and methods for PDCP duplication in 5G RAN |
| US11265770B2 (en) | 2017-05-05 | 2022-03-01 | Huawei Technologies Co., Ltd. | Communication method and apparatus for use in an inactive state |
| KR20200106938A (ko) * | 2018-01-13 | 2020-09-15 | 후아웨이 테크놀러지 컴퍼니 리미티드 | 노드 및 통신 방법 |
| KR102391106B1 (ko) * | 2018-01-13 | 2022-04-26 | 후아웨이 테크놀러지 컴퍼니 리미티드 | 노드 및 통신 방법 |
| US11647561B2 (en) | 2018-01-13 | 2023-05-09 | Huawei Technologies Co., Ltd. | Node and communication method |
| US11722899B2 (en) | 2018-03-15 | 2023-08-08 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Data processing method, access network device, and core network device |
Also Published As
| Publication number | Publication date |
|---|---|
| JP6933350B2 (ja) | 2021-09-08 |
| EP3300443A4 (en) | 2018-06-20 |
| CN106332048B (zh) | 2022-08-19 |
| EP3300443B1 (en) | 2020-05-27 |
| CN115474245A (zh) | 2022-12-13 |
| ZA201708698B (en) | 2018-11-28 |
| US20180124647A1 (en) | 2018-05-03 |
| US10834638B2 (en) | 2020-11-10 |
| EP3300443A1 (en) | 2018-03-28 |
| PL3300443T3 (pl) | 2020-11-16 |
| CN115474245B (zh) | 2025-06-13 |
| JP2018519741A (ja) | 2018-07-19 |
| CN106332048A (zh) | 2017-01-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN115474245B (zh) | 一种数据传输方法、无线网络节点和通信系统 | |
| US11950314B2 (en) | Configuration method and apparatus, and system | |
| EP3927107B1 (en) | Method for establishing a fronthaul interface and base station | |
| EP3629630B1 (en) | Communication method, network node, and radio access network system | |
| EP3316625B1 (en) | Method, network device, and user equipment for secondary base station handover | |
| EP3222079B1 (en) | Apparatus configured to report aperiodic channel state information for dual connectivity | |
| CN103139911B (zh) | 实现载波聚合的方法、基站和用户设备 | |
| EP2941050B1 (en) | Inter-cell movement in small cell enhancement scenario | |
| CN107155200B (zh) | 应用于超级小区的通信方法和装置 | |
| US9276810B2 (en) | System and method of radio bearer management for multiple point transmission | |
| KR102810779B1 (ko) | 차세대 무선 통신 시스템에서 자동 이웃 관계 형성을 위한 노드 간 협업 방법 | |
| CN108496408B (zh) | 基站及发送方法 | |
| CN110120830A (zh) | 一种基站、用户设备中的用于无线通信的方法和装置 | |
| JP2025148389A (ja) | 通信方法、ユーザ装置、プロセッサ、プログラム及びシステム | |
| CN107809770B (zh) | 传输数据的方法、基站和用户设备 | |
| CN110049558B (zh) | 一种用于无线通信的通信节点中的方法和装置 | |
| EP3852481B1 (en) | Mode switching method and data stream distribution method and apparatus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16817227 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2017566086 Country of ref document: JP Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2016817227 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWG | Wipo information: grant in national office |
Ref document number: 202038020215 Country of ref document: IN |