WO2024255615A1 - Procédé, appareil et système de communication de relais - Google Patents

Procédé, appareil et système de communication de relais Download PDF

Info

Publication number
WO2024255615A1
WO2024255615A1 PCT/CN2024/096679 CN2024096679W WO2024255615A1 WO 2024255615 A1 WO2024255615 A1 WO 2024255615A1 CN 2024096679 W CN2024096679 W CN 2024096679W WO 2024255615 A1 WO2024255615 A1 WO 2024255615A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
key
network node
terminal
path
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2024/096679
Other languages
English (en)
Chinese (zh)
Inventor
叶宽
王瑞
彭文杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2024255615A1 publication Critical patent/WO2024255615A1/fr
Anticipated expiration legal-status Critical
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0027Control or signalling for completing the hand-off for data sessions of end-to-end connection for a plurality of data sessions of end-to-end connections, e.g. multi-call or multi-bearer end-to-end data connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0058Transmission of hand-off measurement information, e.g. measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0077Transmission or use of information for re-establishing the radio link of access information of target access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/0085Hand-off measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/30Reselection being triggered by specific parameters by measured or perceived connection quality data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Definitions

  • the embodiments of the present application relate to the field of communication technology, and in particular, to a relay communication method, device and system.
  • Multi-link relay can also be called multi-path relay.
  • a first terminal e.g., a remote user equipment (remote UE)
  • RAN radio access network
  • a direct link e.g., a direct link
  • indirect links e.g., a direct link
  • the remote UE and the RAN node communicate through an air interface (e.g., Uu interface).
  • the remote UE communicates with the RAN node through a second terminal (e.g., a relay UE), wherein the remote UE and the relay UE can communicate through the sidelink interface (e.g., PC5 interface) or through a non-3rd generation partnership project (3GPP) link.
  • the remote UE can improve the throughput and reliability of data transmission and reception by sending and receiving the same or different data on multiple links at the same time.
  • a first terminal communicates with a first RAN node (e.g., a source RAN node) via a first path (e.g., a first non-direct path)
  • a first path e.g., a first non-direct path
  • a direct path between the first terminal and a second RAN node e.g., a target RAN node
  • the embodiments of the present application provide a relay communication method, a communication device and a communication system to reduce delay and signaling overhead.
  • an embodiment of the present application provides a communication method, which can be executed by a first terminal, or by a component of the first terminal (such as a processor, a chip, or a chip system, etc.), or by a logic module or software that can implement all or part of the terminal functions.
  • the method includes: receiving a first message from a first network node, the first terminal communicates with the first network node through a second terminal on a first path; the first message includes first indication information and/or first configuration information of the first path, the first indication information is used to indicate that the first path is retained; the first message includes information for indicating a first cell of the second network node; establishing a third path and retaining the first path, the third path being a direct connection path between the first terminal and the second network node.
  • the first terminal retains the first path when switching to the first cell, avoiding the high delay and high signaling overhead caused by disconnecting the first path when the first terminal updates the path and then re-establishing the first path, thereby improving communication performance.
  • the first path is retained according to the first indication information and/or the first configuration information.
  • the first terminal determines to retain the first path according to the information in the first message, and can instruct the first terminal to retain the first path while instructing the first terminal to access the first cell, thereby reducing latency.
  • the first configuration information includes first key indication information, the first key indication information is used to indicate a second key, the second key is a key for the first terminal to communicate with the first network node after receiving the first message.
  • the first configuration information indicates that the key for the first terminal to communicate with the first network node is updated to ensure communication security.
  • the first key indication information includes indication information for indicating that the second key is the same as the first key; wherein the first key is a key used by the first terminal to communicate with the first network node before receiving the first message.
  • the first configuration information indicates that the key used by the first terminal to communicate with the first network node remains unchanged to ensure communication security.
  • the first configuration information also includes identification information of the second terminal, one or more protocols corresponding to the first terminal
  • the first configuration information configures the configuration of the first terminal in the cross-node multipath, so that the first terminal can implement the cross-node multipath.
  • the method further includes: sending a first measurement result to the first network node, the first measurement result including the communication quality between the first terminal and the second terminal.
  • the first terminal reports the measurement result to the first network node, indicating the communication quality, to assist the network node in making a better decision.
  • the configuration of the first path is updated or determined according to the first configuration information.
  • an embodiment of the present application provides a communication method, which can be performed by a first network node, or by a component of the first network node (such as a processor, a chip, or a chip system, etc.), or by a logic module or software that can implement all or part of the network device functions, including:
  • a first message is sent, and the first network node communicates with the first terminal through the second terminal on the first path; the first message includes first indication information and/or first configuration information, the first indication information is used to indicate that the first path is retained, and the first configuration information includes information for configuring the first path; the first message includes information for indicating the first cell of the second network node; and communication is performed with the first terminal on the first path.
  • the first network node sends information indicating to reserve the first path to the first terminal, so that the first terminal can reserve the first path when the path is updated, thereby reducing delay and signaling overhead.
  • the first configuration information includes first key indication information, where the first key indication information is used to indicate a second key, where the second key is a key used by the first terminal to communicate with the first network node after receiving the first message.
  • the first key indication information includes indication information for indicating that the second key is the same as the first key; wherein the first key is a key used by the first terminal to communicate with the first network node before receiving the first message.
  • the first configuration information also includes one or more of identification information of the second terminal, configuration of one or more protocol layers corresponding to the first terminal, and information indicating a path corresponding to the first configuration.
  • the method also includes: sending a request message, the request message including identification information of the first cell and one or more of the following messages: first bearer information used by the second network node after receiving the request message, the first bearer information including data wireless bearer identification information; information for requesting to retain the first path; or, information for indicating adding a third path, the third path being a direct connection path between the first terminal and the second network node.
  • the method further includes: receiving a first request response message, where the first request response message includes first configuration information.
  • the first request response message also includes one or more of the following information: information indicating a first key derivation parameter, or information indicating to the first terminal to retain the first path; wherein the first key derivation parameter is used to derive the second key.
  • the method further includes: receiving a second message, where the second message is used to request adding an indirect path, and the second message includes identification information of the second terminal.
  • the second message further includes one or more of the following information: information used to indicate the second key to the first network node, or seventh bearer information to be used by the first network node, where the seventh bearer information includes bearer identification information.
  • the method further includes: sending a third message, the third message including the second configuration information, the second configuration information including the second key indication information, the second key indication information being used to indicate the second key.
  • the third message is sent in response to the second message.
  • the method further includes: sending second configuration information, where the second configuration information includes second key indication information, and the second key indication information is used to indicate the second key.
  • the second key indication information includes indication information used to indicate that the second key is the same as the first key, or the second key indication information is used to indicate that the key between the first terminal and the first network node is updated to the second key.
  • sending the second configuration information includes: sending the second configuration information through a request message.
  • the first request response message further includes one or more of the following information:
  • the method further includes: receiving a second request response message, where the second request response message includes information indicating a refusal to reserve the first path.
  • the request message further includes auxiliary information, where the auxiliary information includes information used by the second access network node to determine the first configuration information.
  • the method further includes: receiving a first measurement result, where the first measurement result includes a communication quality between the first terminal and the second terminal.
  • the method further includes: sending a second measurement result, where the second measurement result includes communication quality between the first terminal and the second terminal.
  • an embodiment of the present application provides a communication method, which can be executed by a second network node, or by a component of the second network node (such as a processor, a chip, or a chip system, etc.), or by a logic module or software that can implement all or part of the functions of the network device, including: receiving a request message, the request message is used to request to establish a third path, the third path is a direct path between a first terminal and a second network node, and the first terminal communicates with the first network node through the second terminal on the first path; sending a request response message, the request response message includes a first request response message and/or a second request response message, wherein the first request response message includes first configuration information, and the first configuration information includes information for configuring the first path; the second request response message includes information for indicating a refusal to retain the first path.
  • the second network node sends configuration information of the first path to the first network node, so that the first terminal can retain the first path when the path is updated, reducing latency and signaling overhead, or the second network node sends indication information of refusing to establish cross-node multipaths to the first network node.
  • the first configuration information includes first key indication information, where the first key indication information is used to indicate a second key, where the second key is a key used by the first terminal to communicate with the first network node after receiving the first message.
  • the first key indication information includes indication information for indicating that the second key is the same as the first key; wherein the first key is a key used by the first terminal to communicate with the first network node before receiving the first message.
  • the first configuration information also includes one or more of identification information of the second terminal, configuration of one or more protocol layers corresponding to the first terminal, and information indicating a first path corresponding to the first configuration.
  • the request message includes identification information of the first cell and one or more of the following messages: first bearer information used by the second network node, the first bearer information including data radio bearer identification information; information for requesting to retain the first path; or information for indicating adding a third path, the third path being a direct connection path between the first terminal and the second network node.
  • the first request response message also includes one or more of the following information: information indicating a first key derivation parameter, or information indicating to the first terminal to retain the first path; wherein the first key derivation parameter is used to derive the second key.
  • the method further includes: sending a second message, where the second message is used to request to add an indirect path, and the second message includes identification information of the second terminal.
  • the second message further includes one or more of the following information: information used to indicate the second key to the first network node, or seventh bearer information used by the first network node, where the seventh bearer information includes bearer identification information.
  • the method further includes: receiving a third message, the third message includes second configuration information, the second configuration information includes second key indication information, and the second key indication information is used to indicate the second key.
  • the method further includes: receiving second configuration information, where the second configuration information includes second key indication information, and the second key indication information is used to indicate the second key.
  • the second key indication information includes indication information used to indicate that the second key is the same as the first key, or the second key indication information is used to indicate that the key between the first terminal and the first network node is updated to the second key.
  • receiving the second configuration information includes: receiving the second configuration information through a request message.
  • the first request response message further includes one or more of the following information:
  • the request message further includes auxiliary information, where the auxiliary information includes information used by the second network node to determine the first configuration information.
  • the method further includes: determining the first configuration information according to the second configuration information.
  • the second request response message includes information indicating the reason for rejection.
  • the method further includes: receiving a second measurement result, where the second measurement result includes communication quality between the first terminal and the second terminal.
  • an embodiment of the present application provides a communication method, which can be executed by a first terminal, or by a component of the first terminal (such as a processor, a chip, or a chip system, etc.), or by a logic module or software that can implement all or part of the terminal functions.
  • the method includes: communicating with the first terminal through a second terminal on a first path, the key between the first terminal and the first network node is a fourth key, and the identifier used by the first terminal on the first path includes a first local identifier; receiving a fourth message, the fourth message includes the second local identifier of the first terminal and a fifth key derivation parameter, the fifth key derivation parameter is used to derive a fifth key, and the fifth key is the key between the first terminal and the first network node; receiving a third processing data packet and/or a fourth processing data packet, the third processing data packet includes the first local identifier and third data, and the fourth processing data packet includes the second local identifier and fourth data; determining that the third data is encrypted using the fourth key according to the first local identifier, and/or determining that the fourth data is encrypted using the fifth key according to the second local identifier.
  • receiving the fourth message includes receiving a fourth message from the first network node.
  • the first terminal can continue to transmit data encrypted with the original key, thus avoiding packet loss.
  • a first data packet and/or a second data packet is sent, the first data packet includes a first local identifier and first data, and the second data packet includes a second local identifier and second data; the first data is encrypted using a fourth key, and the second data is encrypted using a fifth key.
  • an embodiment of the present application provides a communication method, which can be executed by a first network node, or by a component of the first network node (such as a processor, a chip, or a chip system, etc.), or by a logic module or software that can implement all or part of the functions of the network device, including: communicating with a first terminal through a second terminal on a first path, the key between the first terminal and the first access network node is a fourth key, and the identifier used by the first terminal on the first path includes a first local identifier; sending a fourth message, the fourth message includes a second local identifier of the first terminal and a fifth key derivation parameter, the fifth key derivation parameter is used to derive a fifth key, and the fifth key is the key between the first terminal and the first access network node; receiving a first processing data packet and/or a second processing data packet, the first processing data packet includes a first local identifier and first data, and the second processing data packet includes a second local
  • sending the fourth message includes sending the fourth message to the first terminal.
  • the first network node can determine whether the data packet is encrypted with a new key or the original key by the local identifier carried in the data packet.
  • the data is encrypted, thereby avoiding the packet error problem caused by key confusion, and the first terminal can continue to transmit the data encrypted by the original key, thus avoiding packet loss.
  • the method also includes: sending a third data packet and/or a fourth data packet, the third data packet includes a first local identifier and third data, and the third data is encrypted using a fourth key; the fourth data packet includes a second local identifier and fourth data, and the fourth data is encrypted using a fifth key.
  • the method further includes: sending a fifth message, wherein the fifth message includes the second local identifier.
  • the fifth message is sent to the second terminal.
  • an embodiment of the present application provides a device that can implement the method in the first aspect, the fourth aspect, any possible implementation of the first aspect, or any possible implementation of the fourth aspect.
  • the device includes corresponding units or modules for executing the above-mentioned method.
  • the units or modules included in the device can be implemented by software and/or hardware.
  • the device can be, for example, a terminal, or a chip, a chip system, or a processor that supports the terminal to implement the above-mentioned method, or a logic module or software that can implement all or part of the terminal functions.
  • an embodiment of the present application provides a device that can implement the method in the second aspect, the third aspect, the fifth aspect, any possible implementation of the second aspect, any possible implementation of the third aspect, or any possible implementation of the fifth aspect.
  • the device includes corresponding units or modules for executing the above-mentioned method.
  • the units or modules included in the device can be implemented by software and/or hardware.
  • the device can be, for example, a network device, or a chip, a chip system, or a processor that supports the network device to implement the above-mentioned method, or a logic module or software that can implement all or part of the functions of the network device.
  • an embodiment of the present application provides a device, comprising: a processor, the processor is coupled to a memory, the memory is used to store instructions, when the instructions are executed by the processor, the device implements the method in the above-mentioned first aspect, the fourth aspect, any possible implementation of the first aspect or any possible implementation of the fourth aspect.
  • an embodiment of the present application provides a device, comprising: a processor, the processor is coupled to a memory, the memory is used to store instructions, when the instructions are executed by the processor, the device implements the method in the above-mentioned second aspect, third aspect, fifth aspect, any possible implementation of the second aspect, any possible implementation of the third aspect or any possible implementation of the fifth aspect.
  • an embodiment of the present application provides a computer-readable storage medium having instructions stored thereon, which, when executed, causes the computer to execute the method in the above-mentioned first aspect, fourth aspect, any possible implementation of the first aspect, or any possible implementation of the fourth aspect.
  • an embodiment of the present application provides a computer-readable storage medium having instructions stored thereon, which, when executed, causes the computer to execute the method in the above-mentioned second aspect, third aspect, fifth aspect, any possible implementation of the second aspect, any possible implementation of the third aspect, or any possible implementation of the fifth aspect.
  • an embodiment of the present application provides a computer program product, which includes a computer program code.
  • the computer program code runs on a computer, it enables the computer to execute the method in the above-mentioned first aspect, the fourth aspect, any possible implementation of the first aspect, or any possible implementation of the fourth aspect.
  • an embodiment of the present application provides a computer program product, which includes a computer program code.
  • the computer program code runs on a computer, the computer executes the method of the second aspect, the third aspect, the fifth aspect, any possible implementation of the second aspect, any possible implementation of the third aspect, or any possible implementation of the fifth aspect.
  • an embodiment of the present application provides a chip, comprising: a processor, the processor is coupled to a memory, the memory is used to store instructions, when the instructions are executed by the processor, the chip implements the method in the above-mentioned first aspect, second aspect, third aspect, any possible implementation of the first aspect, any possible implementation of the second aspect, or any possible implementation of the third aspect.
  • an embodiment of the present application provides a communication system, comprising: the apparatus of the sixth aspect and the apparatus of the seventh aspect.
  • an embodiment of the present application provides a communication system, including: the device of the eighth aspect and the device of the ninth aspect.
  • FIG1 is a schematic diagram of a network architecture applicable to an embodiment of the present application.
  • FIG2 is a schematic diagram of another network architecture provided in an embodiment of the present application.
  • FIG3 is a schematic diagram of a switching method provided in an embodiment of the present application.
  • FIG4 is a schematic diagram of a relay communication method provided in an embodiment of the present application.
  • FIG5 is a schematic diagram of a relay communication method provided in an embodiment of the present application.
  • FIG6 is a schematic diagram of a relay communication method provided in an embodiment of the present application.
  • FIG7 is a schematic diagram of a relay communication method provided in an embodiment of the present application.
  • FIG8 is a schematic diagram of a relay communication method provided in an embodiment of the present application.
  • FIG9 is a schematic diagram of a relay communication method provided in an embodiment of the present application.
  • FIG10 is a schematic diagram of the structure of a terminal provided in an embodiment of the present application.
  • FIG11 is a schematic diagram of a device provided in an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another device provided in an embodiment of the present application.
  • Direct path It can also be called a direct link.
  • the communication between the first terminal (such as Remote UE) and the RAN node through the direct path can be understood as the communication between the remote UE and the RAN node through the air interface (such as Uu interface), or as the establishment of a radio resource control (RRC) connection between the remote UE and the RAN node.
  • RRC radio resource control
  • Indirect path It can also be called an indirect link.
  • the communication between the Remote UE and the RAN node through the indirect path can be understood as the remote UE communicating with the RAN node through the first terminal (such as the relay UE).
  • Multi-path also known as multi-link, means that the remote UE and the RAN node communicate via multi-path, which means that there is a direct path and at least one indirect path between the remote UE and the RAN node.
  • Remote UE is generally a terminal that supports access to RAN nodes through relay services.
  • the corresponding uplink data can be sent to the RAN node through relay UE or direct path, or part of the uplink data can be sent to the RAN node through relay UE, and part of the data can be transmitted to the RAN node through the Uu interface between remote UE and RAN node.
  • Relay UE is generally a terminal that supports providing relay services, helping RAN nodes forward downlink data to remote UE, and helping remote UE send uplink data to RAN nodes.
  • FIG1 is a schematic diagram showing a possible, non-limiting system.
  • a communication system 1000 includes a RAN 100 and a core network (CN) 200.
  • the RAN 100 includes at least two network nodes (such as 110a and 110b in FIG1 ) and a first terminal 120a (hereinafter, the first terminal is introduced as a remote UE as an example), and a second terminal 120b (hereinafter, the second terminal is introduced as a relay UE as an example).
  • the RAN 100 may also include other network nodes, such as wireless relay equipment and/or wireless backhaul equipment (not shown in FIG1 ).
  • the network node is introduced as an access network node as an example.
  • 110a is taken as a source RAN node (an example of a first access network node)
  • 110b is taken as a target RAN node (an example of a second access network node)
  • the first terminal 120a is taken as a remote UE
  • the second terminal 120b is taken as a relay UE.
  • the communication interface e.g., Uu port
  • the remote UE can communicate with the relay UE through the communication interface (e.g., PC5 port). It is easy to understand that the above communication interface is only an example, and the embodiments of the present application are not limited thereto.
  • the interface between the remote UE and the relay UE is not limited to the PC5 port, but can also be other communication interfaces for connecting two terminals, such as a wireless fidelity (WiFi) port, a wired interface, or a non-standardized interface.
  • the RAN node is connected to the core network 200 by wireless or wired means.
  • the core network device in the core network 200 and the RAN node in the RAN 100 can be different physical devices, or they can be the same physical device that integrates the core network logical functions and the wireless access network logical functions.
  • the remote UE may also communicate with the source RAN node via 120c.
  • the remote UE can also communicate with the source RAN node through a direct path, as shown by the dotted line in Figure 1, that is, in the embodiment of the present application, the remote UE and the source RAN node can communicate through a non-direct path or multi-path.
  • the target RAN node in Figure 1 can be the target access network device of the remote UE.
  • RAN 100 may be a cellular system related to the 3rd Generation Partnership Project (3GPP), such as a 4G or 5G mobile communication system, or a future-oriented evolution system (such as a 6G mobile communication system).
  • 3GPP 3rd Generation Partnership Project
  • RAN 100 may also be an open access network (open RAN, O-RAN or ORAN), a cloud radio access network (cloud radio access network, CRAN), or a wireless fidelity (WiFi) system.
  • RAN 100 may also be a communication system that integrates two or more of the above systems.
  • RAN nodes which may also be sometimes referred to as network equipment, access network equipment, RAN entities, network nodes or access nodes, etc., constitute part of the communication system to help terminals achieve wireless access.
  • the multiple RAN nodes in the communication system 1000 may be nodes of the same type or nodes of different types.
  • RAN nodes 110 and terminals are sometimes referred to as communication devices.
  • network elements 110a and 110b in FIG1 may be understood as communication devices with base station functions
  • network elements 120a-120c may be understood as communication devices with terminal functions.
  • a RAN node may be a base station, an evolved NodeB (eNodeB), an access point (AP), a transmission reception point (TRP), a next generation NodeB (gNB), a next generation base station in a 6th generation (6G) mobile communication system, a base station in a future mobile communication system, or an access node in a WiFi system.
  • a RAN node may be a macro base station, a micro base station or an indoor station, a relay node or a donor node, or a wireless controller in a CRAN scenario.
  • a RAN node may also be a server, a wearable device, a vehicle or an onboard device.
  • an access network device in a vehicle to everything (V2X) technology may be a road side unit (RSU).
  • RSU road side unit
  • the RAN node can be a central unit (CU), a distributed unit (DU), a CU-control plane (CP), a CU-user plane (UP), or a radio unit (RU).
  • the CU and DU can be set separately, or can also be included in the same network element, such as a baseband unit (BBU).
  • BBU baseband unit
  • the RU can be included in a radio frequency device or a radio frequency unit, such as a remote radio unit (RRU), an active antenna unit (AAU) or a remote radio head (RRH).
  • CU or CU-CP and CU-UP
  • DU or RU may also have different names, but those skilled in the art can understand their meanings.
  • CU may also be called O-CU (open CU)
  • DU may also be called O-DU
  • CU-CP may also be called O-CU-CP
  • CU-UP may also be called O-CU-UP
  • RU may also be called O-RU.
  • CU, CU-CP, CU-UP, DU and RU are described as examples in this application.
  • Any unit of CU (or CU-CP, CU-UP), DU and RU in this application may be implemented by a software module, a hardware module, or a combination of a software module and a hardware module.
  • Terminals can also be called terminal devices, user equipment (UE), mobile stations, mobile terminals, etc. Terminals can be widely used in various scenarios, such as device-to-device (D2D), vehicle-to-everything (V2X) communication, Machine-type communication (MTC), Internet of Things (IOT), virtual reality, augmented reality, industrial control, autonomous driving, telemedicine, smart grid, smart furniture, smart office, smart wear, smart transportation, smart city, etc.
  • the terminal can be a mobile phone, a tablet computer, a computer with wireless transceiver function, a wearable device, a vehicle, a drone, a helicopter, an airplane, a ship, a robot, a robotic arm, a smart home device, etc.
  • the embodiments of the present application do not limit the device form of the terminal.
  • the communication device for implementing the function of the RAN node or terminal may be a RAN node or terminal, or may be a device capable of supporting the RAN node or terminal to implement the function, such as a chip or a processor, etc.
  • the device may be installed in the RAN node or terminal.
  • the technical solution provided in the embodiments of the present application is described by taking the device for implementing the function of the RAN node or terminal as an example, that is, a RAN node or a terminal.
  • FIG. 2 shows another communication network architecture in the communication system provided by the present application.
  • the control plane (CP) and user plane (UP) of the CU can be separated and implemented by different entities, namely the control plane CU entity (CU-CP entity) and the user plane CU entity (CU-UP entity).
  • the signaling generated by the CU can be sent to the UE through the DU, or the signaling generated by the UE can be sent to the CU through the DU.
  • the DU can directly encapsulate the signaling through the protocol layer and transparently transmit it to the UE or CU without parsing it.
  • the CU is divided into a network device on the RAN side.
  • the CU can also be divided into a network device on the CN side. This application does not limit this.
  • the mobility management of the connected UE is controlled by the RAN node, that is, the RAN node instructs the UE to which cell to handover and how to handover by sending a handover message. For example, as shown in FIG3 , after receiving the handover message, the UE accesses the target cell according to the content contained in the handover message.
  • Step 1 The source RAN node sends an RRC reconfiguration message to the connected UE, which contains parameters such as measurement object, report configuration, and measurement identifier.
  • Step 2 After the UE measures a series of cells according to the RRC reconfiguration message, it generates a report to report various events to the currently connected source RAN node, such as the signal strength of the current serving cell is lower than the threshold and the target cell signal is higher than the threshold.
  • Step 3 After receiving the report from the UE, the source RAN node will decide whether the UE should switch. If the UE needs to switch, the source RAN node will send a handover request message to the target RAN node.
  • Step 4 The target RAN node decides whether to allow the UE to access based on its own number of connections and other conditions. If allowed, it sends a handover confirmation message to the source RAN node.
  • Step 5 After receiving the handover confirmation message from the target RAN node, the source RAN node sends an RRC reconfiguration message (also called a handover command) to the UE.
  • RRC reconfiguration message also called a handover command
  • Step 6 The UE initiates random access to the target RAN node according to the handover command.
  • the UE will disconnect from the source RAN node, and there will be a brief interruption in the UE's data transmission and reception before successfully accessing the target RAN node.
  • Step 7 The UE sends an RRC reconfiguration completion message to the target RAN node.
  • Step 8 The target RAN node sends a context release message to the source RAN node, so that the source RAN node releases the context of the UE.
  • the remote UE when the remote UE communicates with the source RAN node via a non-direct path, if a direct path between the remote UE and the target RAN node is to be added, the remote UE needs to first switch to the target RAN node. During this process, the remote UE releases the original non-direct path, and then the target RAN node adds the non-direct path between the remote UE and the source RAN node. The entire process has a large delay and signaling overhead.
  • the remote UE (an example of the first terminal) communicates with the source RAN node (an example of the first access network node) through a non-direct path (an example of the first path)
  • a non-direct path an example of the first path
  • how to add a direct path (an example of the second path) between the remote UE and the target RAN node or how to switch the direct path (an example of the third path) between the remote UE and the source RAN node to the target RAN node and retain the non-direct path between the remote UE and the source RAN node to reduce latency and signaling overhead is an urgent problem to be solved.
  • Fig. 4 is a relay communication method 400 provided in an embodiment of the present application, which is used to reduce delay and signaling overhead.
  • the method 400 may include the following steps.
  • a first terminal receives a first message from a first access network node. Accordingly, the first access network node sends the first message to the first terminal.
  • the network node can be a centralized unit (central unit, CU), a distributed unit (distributed unit, DU), a CU-control plane (control plane, CP), a CU-user plane (user plane, UP), or a radio unit (radio unit, RU), etc.
  • the first terminal may receive the first message from the first access network node by the CU or the O-CU sending the first message to the first terminal through one or more network elements (for example, DU and/or RU).
  • network elements for example, DU and/or RU
  • the first path is a non-direct path, which can also be referred to as the communication between the first terminal and the first access network node through a non-direct path.
  • the first terminal communicates with the first access network node through the second terminal on the first path.
  • the first path and the second path it can also be referred to as the communication between the first terminal and the first access network node through multiple paths.
  • the first terminal can communicate with the first access network node through a non-direct path or multi-path.
  • S401 can be understood as that when the first terminal communicates with the first access network node through a non-direct path or multi-path, if a direct path between the first terminal and the second access network node is to be added, or the direct path between the first terminal and the first access network node is switched to the second access network node, the first terminal can perform a path update operation according to the first message sent by the first access network node.
  • the first message includes first indication information and/or first configuration information
  • the first indication information is used to indicate that the first path is retained
  • the first configuration information includes the configuration of the first path.
  • the configuration of the first path may also be referred to as information or parameters used to configure the first path.
  • the first message includes information for indicating a first cell, where the first cell is a cell corresponding to the second access network node.
  • the first cell is a target cell for the first terminal, and may also be referred to as a target access cell.
  • the information of the first cell may be identification information of the first cell.
  • the first message may be understood as a message instructing the first terminal to perform a path update.
  • the first message may be carried in messages such as a radio resource control (RRC) message, a media access control (MAC) control element (CE) or a downlink control information (DCI).
  • RRC radio resource control
  • MAC media access control
  • CE media access control element
  • DCI downlink control information
  • the first message is an RRC reconfiguration message.
  • the path update includes adding a third path, or switching the second path to the third path, which can also be called switching, switching to the first cell or switching to the target cell.
  • the path update can be called establishing a multipath across access network nodes, or establishing a multipath, which is not limited in the present application.
  • the second path is a direct path between the first terminal and the first access network node
  • the third path is a direct path between the first terminal and the second access network node. It is easy to understand that retention can be called keeping or not disconnecting.
  • the first indication information may be a display indicating that the first non-direct path (an example of the first path) is retained.
  • the first indication information is indicated by a bit. Exemplarily, when the bit value is 1, it indicates that the first non-direct path is retained.
  • the present application does not limit other ways to implement the indication.
  • the first indication information may be an implicit indication to retain the first path.
  • the identifier of the relay UE an example of the second terminal in the first path.
  • the relay UE identifier enables the remote UE to determine that the relay UE is still selected as the relay device, that is, the first path is retained.
  • the first indication information indicates the configuration information corresponding to the first path.
  • the first indication information may also be the first configuration information, that is, in a possible implementation, the first configuration information indicates the configuration of the first path and also implicitly indicates that the first path is retained.
  • the first configuration information includes first key indication information, the first key indication information is used to indicate a second key, and the second key is a key for the first terminal to communicate with the first access network node after receiving the first message.
  • the first key indication information includes indication information for indicating that the second key is the same as the first key; wherein the first key is a key for the first terminal to communicate with the first access network node before receiving the first message. That is, the first key indication information indicates that the key remains unchanged.
  • the first key indication information indicates that the key changes.
  • the first configuration information also includes one or more of identification information of the second terminal, service cell information of the second terminal, configuration of one or more protocol layers, and information indicating a path corresponding to the first configuration.
  • the one or more protocol layers corresponding to the first terminal include a physical layer, a MAC layer, an RLC layer, a packet data convergence protocol (PDCP) layer, and an SRAP layer.
  • PDCP packet data convergence protocol
  • the first terminal determines to retain the first path according to the first indication information and/or the first configuration information.
  • retaining the first path further includes determining a configuration corresponding to the first path according to the first configuration information.
  • the method also includes: Optional step S402: The first terminal performs path update.
  • the first terminal performing path updating includes reserving the first path.
  • the first terminal performing path updating further includes establishing a third path, or switching to the first cell.
  • the first terminal performing path updating further includes disconnecting the second path.
  • the content of the path update performed by the first terminal may refer to the relevant introduction of S506, which will not be described in detail in this embodiment of the application.
  • the first access network node instructs the first terminal to retain the non-directly connected path between the first terminal and the first access network node, thereby reducing delay and signaling overhead.
  • Figures 5 to 8 respectively provide detailed examples of communication methods. It is easy to understand that the steps or contents of Figures 4 to 8 can refer to each other, be combined or separated.
  • FIG5 shows a flow chart of a communication method 500 provided in an embodiment of the present application.
  • the method 500 includes:
  • Optional step S501 a first terminal sends a first measurement result to a first access network node, and correspondingly, the first access network node receives the first measurement result from the first terminal.
  • the first terminal may communicate with the first access network node via an indirect path or multiple paths.
  • the introduction of the indirect path or multiple paths communication between the first terminal and the first access network node in S401 which will not be described in detail.
  • the first measurement result includes: the communication quality between the first terminal and the second terminal.
  • the first terminal communicates with the first access network node through the second terminal on a non-direct path, and there may be one or more second terminals.
  • the communication quality between the first terminal and the second terminal may be included in a manner that includes a second terminal identifier and a corresponding signal quality.
  • the first measurement result also includes the signal quality of the first cell.
  • the signal quality is a reference signal power, a reference signal quality, or other information that can be used to indicate the signal quality.
  • the first terminal determines to send the first measurement result to the first access network node, and the first condition includes one or more of the following: the signal quality of the first cell is higher than a first threshold, the communication quality between the first terminal and the second terminal is higher than a second threshold, or configuration information for periodically reporting the first measurement result is received.
  • Optional step S502 Determine whether to perform a path update. It is easy to understand that in the embodiment of the present application, there are many possible ways to determine whether to perform a path update, such as determining whether to perform a path update based on the first measurement result. Optionally, determining whether to perform a path update also includes Determine whether to keep the first path. For content related to path update, please refer to the introduction of path update in S402, which will not be repeated here.
  • the first access network node determines whether to perform a path update.
  • the method further includes: the first access network node determines to perform a path update according to the first measurement result.
  • the first access network node determines to perform a path update.
  • the multiple thresholds in the embodiments of the present application for example, the first threshold, the second threshold, and the specific threshold may also be referred to as preset thresholds or threshold values
  • the specific threshold may be predefined by the protocol, determined by the access network node or determined by the terminal, and the multiple thresholds introduced in the embodiments of the present application may be the same or different.
  • the first access network node determines whether to perform a path update further comprising: the first access network node determines whether to retain the first path.
  • the first access network node determines to retain the first path based on the communication quality between the first terminal and the second terminal. It is easy to understand that when there are multiple second terminals, the first access network node can determine to retain one or more of the multiple first paths.
  • the first access network node can also have other ways to determine whether to retain the first path, which is not limited in the embodiments of the present application.
  • the first access network node determines to perform a path update, wherein the path update includes retaining the first path, it can also be referred to as the first access network node determining to establish a multi-path across access network nodes.
  • the method further includes determining the first entity, or determining the establishment mode of the first entity corresponding to the first session. It is easy to understand that there are multiple possible ways to determine the establishment mode of the first entity corresponding to the first session in the embodiment of the present application.
  • the first session may include a data protocol unit (PDU) session, and the first session may include one or more.
  • the first entity may be a service data adaptation protocol (SDAP) entity.
  • SDAP service data adaptation protocol
  • the first entity is an entity corresponding to the PDU session.
  • the function of the first entity includes a mapping between a QoS flow and a radio bearer.
  • the establishment mode of the first entity may include the location where the first entity is established, for example, on which access network node the first entity is established.
  • the establishment mode of the first entity may include establishing on a first access network node and/or a second access network node. It is easy to understand that when the first entity is established on the first access network node and the second access network node, the first session may also be referred to as a separated first session.
  • the access network node where the first entity is located will establish a second entity corresponding to the first entity, for example, the second entity is a packet data convergence protocol (PDCP) entity.
  • PDCP packet data convergence protocol
  • the PDCP bearer located at the first access network node may be referred to as a bearer terminated at the first access network node
  • the PDCP bearer located at the second access network node may be referred to as a bearer terminated at the second access network node.
  • the method also includes determining a first mapping relationship and/or a bearer type.
  • the first mapping relationship includes a mapping relationship between a quality of service (QoS) flow and a bearer.
  • QoS quality of service
  • the first mapping relationship is a first mapping relationship corresponding to a first access network node and/or a second access network node.
  • the bearer type may include one or more of a master cell group (MCG) bearer, a first type bearer secondary path bearer, or a split bearer.
  • the first type bearer may be a wireless bearer only on a non-directly connected path of a secondary access network node.
  • the secondary access network node may be a first access network node in a cross-node multi-path communication.
  • the bearer type may be a bearer type corresponding to the first access network node and/or the second access network node.
  • the first access network node determines the first entity.
  • the method further includes the first access network node determining the first entity.
  • the method further includes the first access network node determining the first mapping relationship and/or bearer type.
  • Optional step S503 Send a request message.
  • the first access network node sends a request message.
  • the request message may also be called a path update request message or a handover request message.
  • the first access network node sends a request message to the second access network node, and correspondingly, the second access network node receives the request message from the first access network node.
  • the request message includes information of the first cell.
  • the indication information of the first cell is identification information of the first cell.
  • the request message also includes one or more of the following information: first bearer information used by the second access network node, the first bearer information including data radio bearer identification information, information for requesting to retain the first path; or, information for indicating the addition of a third path.
  • the first bearer information may be a list of DRB identifiers (identities, IDs) that can be used by the second access network node.
  • the information used to indicate the addition of a third path may also be referred to as information for indicating the establishment of a cross-node path. It is easy to understand that the first bearer information used by the second access network node may refer to the first bearer that the second access network node can use, or may be referred to as the first bearer information used by the second access network node after receiving the request message.
  • the request message further includes a second measurement result, wherein the second measurement result includes the communication quality between the first terminal and the second terminal.
  • the second measurement result includes the communication quality between the first terminal and the second terminal.
  • the request message also includes one or more of the following information: source configuration information or source QoS information.
  • the source configuration information is used to configure the parameters of the first path before the first message.
  • the source configuration information is recorded as configuration #1 (config#1) below.
  • the source QoS information is included in the PDU session resources to be setup list (PDU session resources to be setup list).
  • the method further includes the first access network node sending the first information.
  • the first access network node sends the first information after determining the first entity.
  • the first access network node sends the first information to the second access network node, and correspondingly, the second access network node receives the first information from the first access network node.
  • the first information includes one or more of the following information: information used to request resources of the second access network node corresponding to the second bearer; information used to indicate the third bearer transmitted on the second access network node; or information used to indicate the resources of the first access network node allocated for the fourth bearer.
  • the information used to request the resources of the second access network node corresponding to the second bearer can also be called information used to request to add the resources of the second access network node for the second bearer, and the second bearer is a bearer terminated at the first access network node.
  • the second bearer is a DRB.
  • the information used to request the resources of the second access network node corresponding to the second bearer includes one or more of the following information: DRB ID, DRB QoS, uplink (UL) PDCP tunnel information (tunnel information, TNL info) of the associated first access network node, QoS flow ID of the QoS flow mapped to the DRB, and QoS parameters.
  • the information for indicating the third bearer transmitted at the second access network node may also be referred to as information for indicating which bearers are transmitted at the second access network node.
  • the third bearer is a DRB.
  • the information for indicating the third bearer transmitted at the second access network node includes one or more of the following information: a DRB ID, a DRB QoS, and a QoS flow ID of a QoS flow mapped to the DRB.
  • the fourth bearer is a bearer terminated at the second access network node.
  • the fourth bearer is a DRB.
  • the information used to indicate the first access network node resources allocated for the fourth bearer includes one or more of the following information: DRB ID, associated first access network node downlink (DL) tunnel information (e.g., secondaryPath TNL info), and QoS flow ID of the QoS flow mapped to the DRB.
  • the first access network node DL tunnel information may indicate that the first interface (e.g., Xn port) of the DRB transmits the first access network node GTP-U tunnel endpoint on the secondary Path resource of its lower layer (e.g., RLC layer and layers below it), and the tunnel information is used for the delivery of downlink PDU.
  • the first interface may be a network interface between the first access network node and the second access network node.
  • GTP-U may be used to provide one or more tunnels for each packet data protocol (PDP) context for transmitting user data.
  • PDP packet data protocol
  • the embodiment of the present application does not limit the timing and content of sending the first information, and the message carrying the first information.
  • send the first information for example:
  • the first information includes information for requesting resources of the second access network node corresponding to the second bearer.
  • the first information when the first network node determines that the second entity is established at the second network node, includes information for indicating the third bearer transmitted at the second access network node.
  • the first information also includes information for indicating the first access network node resources allocated for the fourth bearer.
  • the first information when the first network node determines that the second entity is established on the first network node and the second network node, the first information includes information for indicating a third bearer transmitted on the second access network node.
  • the first information also includes information for indicating the first access network node resources allocated for the fourth bearer.
  • the first information also includes information for requesting resources of the second access network node corresponding to the second bearer.
  • the first information may be carried in a request message, that is, the request message includes the first information.
  • the first information may also be sent via other messages, which is not limited in the embodiments of the present application.
  • the second access network node determines air interface resources and/or transmission network resources. For example, when the second access network node receives information for requesting resources of the second access network node corresponding to the second bearer and/or information for indicating the first access network node resources allocated for the fourth bearer, the second access network node determines the air interface resources and/or transmission network resources.
  • the second access network node saves source QoS information, for example, the source QoS information is QoS information in the PDU session resources to be setup list.
  • the method also includes sending second configuration information.
  • the first access network node sends the second configuration information to the second access network node, and correspondingly, the second access network node receives the second configuration information from the first access network node.
  • the second configuration information can be referred to as information determined by the first access network node for the first terminal and used after the first message to configure the first path.
  • the second configuration information may be carried in a request message, that is, the request message includes the second configuration information.
  • the second configuration information may also be sent via other messages, which is not limited in the embodiments of the present application.
  • the second configuration information includes second key indication information, where the second key indication information is used to indicate a second key.
  • the second key is a key used by the first terminal to communicate with the first access network node after receiving the first message.
  • config#1 includes a first parameter, and the first parameter is used to configure the bearer to use a master key or a secondary key.
  • the first parameter is keyToUse as an example.
  • the value of keyToUse in config#1 is master key, indicating the first key of the first access network node, which can also be called the original key (for the convenience of description below, the original key is recorded as KgNB#1).
  • the master key indicates the third key, which is the key for the first terminal to communicate with the second access network node (for the convenience of description below, the original third key is recorded as KgNB#2). Therefore, the keyToUse parameter on the first path needs to be reconfigured.
  • the key between the first access network node and the first terminal remains unchanged.
  • the second key indication information is used to indicate that the key remains unchanged, and the value of the keyToUse parameter is not restricted.
  • the value of the keyToUse parameter in config#2 can be a master key or a secondary key, and the second key indication information is used to indicate the original key KgNB#1. That is, the second key indication information is used to indicate that the key between the first access network node and the first terminal remains unchanged, and can also be referred to as the second key indication information including indication information for indicating that the second key is the same as the first key; wherein the first key is the key used by the first terminal to communicate with the first access network node before receiving the first message, and can also be referred to as the original key.
  • Method 2 Use a predefined method. For example, in the scenario where indirect path or single-site multi-path switches to cross-site multi-path, no matter what the keyToUse parameter value is, it indicates the original key KgNB#1.
  • the key between the first access network node and the first terminal is updated, that is, the first key is updated to the second key (hereinafter, for the convenience of description, the second key is recorded as s-Ksn).
  • the second key indication information is used to indicate the second key.
  • the second key indication information can be keyToUse in config#2, and the value of keyToUse is secondary key. That is, the second key indication information includes information for indicating the second key, that is, the second key indication information may indicate a key change, that is, updating the first key to the second key.
  • Optional step S504 Send a request response message.
  • the second access network node sends a first request response message.
  • the second access network node sends a first request response message to the first access network node, and correspondingly, the first access network node receives the first request response message from the second access network node.
  • the first request response message includes first configuration information.
  • the first configuration information is used to configure the first path after sending the first message. It can be understood that the first configuration information is allocated or determined by the second access network node.
  • the first configuration information is determined according to the second configuration information. It can be understood that the first configuration information is determined with reference to the second configuration information.
  • the first configuration information includes first key indication information, and the first key indication information is used to indicate the second key.
  • the first key indication information includes indication information used to indicate that the second key is the same as the first key.
  • the first request response message also includes one or more of the following information: information used to indicate a first key derivation parameter, or information used to indicate to the first terminal to retain the first path; wherein the first key derivation parameter is used to derive the second key, for example, the first key derivation parameter is used by the first terminal to derive the second key.
  • the first request response message further includes one or more of the following information: information used to indicate the second key to the first access network node, or information used to indicate to the first access network node to retain the first path.
  • the information used to indicate the second key to the first access network node may be the second key.
  • the indication of retaining the first path in the embodiment of the present application may refer to retaining part or all of the first paths in the at least two first paths.
  • the indication of retaining part or all of the first paths may be indicated by indicating the identifier of the second terminal.
  • the first access network node may instruct to retain part or all of the at least two first paths.
  • the information instructing to retain the first path may further include identifiers of one or more second terminals.
  • the first request response message also includes information for establishing a third path, for example, the information for establishing the third path includes one or more of the following information: the message carries an MCG configuration, including a bearer configuration, a random access configuration, or parameters for determining a key between the first terminal and the second access network node.
  • the information for establishing the third path includes one or more of the following information: the message carries an MCG configuration, including a bearer configuration, a random access configuration, or parameters for determining a key between the first terminal and the second access network node.
  • the first configuration information includes one or more of the identification information of the second terminal, the configuration of one or more protocol layers corresponding to the first terminal, and the information indicating the first path corresponding to the first configuration.
  • the configuration of the one or more protocol layers corresponding to the first terminal includes: the configuration associated with the PDCP layer (e.g., radiobearerconfig), the configuration associated with the SRAP layer (e.g., sl-L2RemoteUE-Config), the configuration associated with the RLC, MAC layer, and the physical layer (e.g., sl-ConfigDedicatedNR).
  • the information indicating the first path corresponding to the first configuration can be understood as indicating one or more first paths corresponding to the first configuration information, that is, indicating which first path or paths the first configuration information corresponds to, and the information indicating the first path corresponding to the first configuration is secondaryPathConfig as an example for introduction.
  • the first request response message may include multiple information, and the embodiment of the present application does not limit the carrying method of multiple information.
  • the first request response message includes a first container, the first container includes a complete RRC message, and the RRC message includes the first configuration information.
  • the first request response message container includes a first field, which may be a field of secondaryPathConfig, and the first field is used to configure the first path.
  • the first field includes a complete RRC message.
  • the request message sent by the first access network node may include a second container, the second container includes a complete RRC message, the RRC message carries the second configuration information, and the second access network node puts the RRC message carried by the second container into the first field as the first container.
  • the first field includes identification information of the second terminal.
  • the second access network node determines the configuration of one or more protocol layers corresponding to the first terminal.
  • the configuration of one or more protocol layers corresponding to the first terminal is determined according to the second configuration information.
  • the first configuration information includes radiobearerconfig, sl-L2RemoteUE-Config, sl-ConfigDedicatedNR and secondaryPathConfig.
  • the first field includes identification information of the second terminal and sl-ConfigDedicatedNR.
  • the second access network node determines the configuration corresponding to secondaryPathConfig and sl-L2RemoteUE-Config according to the second configuration information.
  • the first configuration information includes radiobearerconfig and sl-ConfigDedicatedNR.
  • the first field includes identification information of the second terminal, sl-L2RemoteUE-Config and sl-ConfigDedicatedNR.
  • the second access network node determines the configuration corresponding to secondaryPathConfig according to the second configuration information.
  • the first configuration information includes radiobearerconfig and sl-secondaryPathConfig.
  • the first configuration also includes indication information, and the indication information is used to instruct the first terminal to update sl-ConfigDedicatedNR and sl-L2RemoteUE-Config in the source configuration information according to sl-ConfigDedicatedNR and sl-L2RemoteUE-Config in secondaryPathConfig.
  • the first request response message when the request message includes information for requesting resources of the second access network node corresponding to the second bearer, the first request response message also includes identification information of the second bearer and downlink tunnel information corresponding to the second bearer (for example, second access network node DL MCG TNL info).
  • the downlink tunnel information corresponding to the second bearer includes a GTP-U tunnel endpoint of the second access network node indicating the Xn transmission of the DRB on its lower layer (RLC layer and below) MCG resources.
  • the tunnel information is used for the delivery of downlink PDUs.
  • the first request response message when the request message includes information indicating the first access network node resources allocated for the fourth bearer, the first request response message also includes identification information of the fourth bearer and uplink tunnel information corresponding to the fourth bearer (e.g., second access network node UL PDCP TNL info).
  • the uplink tunnel information corresponding to the fourth bearer includes a second access network node GTP-U tunnel endpoint indicating the Xn transmission of the DRB on its PDCP layer. The tunnel information is used for the delivery of the uplink PDU.
  • Step S505 Send the first message.
  • the first access network node sends a first message.
  • the first access network node sends a first message to the first terminal, and correspondingly, the first terminal receives the first message from the first access network node.
  • the first message is carried in the first request response message.
  • the first message is an RRC message carried in the first container.
  • the first access network node determines the second key.
  • the second key is the same as the first key.
  • the second key received from the first request response message is used as a key with the first terminal after sending the first message.
  • Optional step S506 the first terminal performs path update.
  • the first terminal performing path updating includes reserving the first path.
  • the first terminal determines to retain the first path according to the first indication information.
  • the first terminal determines to retain the first path according to the first configuration information.
  • the first terminal performing path updating includes updating configuration information between the first terminal and the first access network node.
  • the first terminal updates the corresponding PDCP, SRAP and PC5RLC channel configurations according to the first configuration information.
  • the first terminal updates sl-ConfigDedicatedNR and sl-L2RemoteUE-Config according to the first configuration information.
  • the first terminal performing path updating includes determining a key between the first terminal and the first access network node.
  • the key between the first terminal and the first access network node remains unchanged.
  • the first terminal determines that the key for communication with the first access network node is the first key, that is, the original key KgNB#1, based on the first key indication information, the first key indication information indicates that the second key is the same as the first key.
  • the first terminal determines that the current scenario is from non-direct connection or single-node multipath to establishing cross-node multipath, and determines that the key for communication with the first access network node is the first key.
  • a key between the first terminal and the first access network node is updated.
  • the first terminal derives a second key according to a first key derivation parameter.
  • the first terminal determines that a key for communication with the first access network node is the second key, that is, a new key s-Ksn, according to a secondary key indicated by the keyToUse parameter.
  • the first terminal performing path updating includes: sending a reconfiguration completion message.
  • the first terminal sends a reconfiguration completion message to the second access network node, and correspondingly, the second access network node receives the reconfiguration completion message from the first terminal, where the reconfiguration completion message is used to indicate that the configuration is completed.
  • the method also includes: sending a setup completion message.
  • the second access network node sends a setup completion message to the first network node, and correspondingly, the first access network node receives a setup completion message from the second network node, where the setup completion message is used to indicate that the multi-path establishment across nodes is complete.
  • the first terminal retains the first path when switching to the first cell, avoiding the high delay and high signaling overhead caused by disconnecting the first path when the first terminal updates the path and then re-establishing the first path, thereby improving communication performance.
  • FIG6 shows a flow chart of a communication method 600 provided in an embodiment of the present application.
  • the method 600 includes: Optional step S601: The first terminal sends a first measurement result to the first access network node, and accordingly, the second access network node receives the first measurement result from the first terminal.
  • S601 can refer to the relevant description of the first measurement result in method S501, and will not be repeated here.
  • the first terminal may communicate with the first access network node via an indirect path or multiple paths.
  • the introduction of the indirect path or multiple paths communication between the first terminal and the first access network node in S401 which will not be described in detail.
  • Optional step S602 Determine whether to perform path update. It is easy to understand that there are many possible ways to determine whether to perform path update in the embodiment of the present application, for example, determine whether to perform path update according to the first measurement result. For content related to path update, please refer to the introduction of path update in S402, which will not be repeated here.
  • determining whether to perform a path update includes: the first access network node determining whether to switch to the first cell.
  • the method further includes: the first access network node determines whether to switch to the first cell according to the first measurement result.
  • the first access network node determines to switch to the first cell.
  • the specific threshold in the embodiment of the present application may also be referred to as a specific threshold or a threshold value, and the specific threshold may be predefined by the protocol, determined by the access network node or determined by the terminal, and the multiple thresholds introduced in the embodiment of the present application may be the same or different.
  • Optional step S603 Send a request message.
  • the first access network node sends a request message.
  • the first access network node sends a request message to the second access network node, and correspondingly, the second access network node receives the request message from the first access network node.
  • the request message includes one or more of the following information: the second measurement result, the first bearer used by the second access network node
  • the first bearer information includes data radio bearer identification information or information for requesting to retain the first path.
  • the second measurement result, the first bearer information, and the information for requesting to retain the first path can refer to the relevant description in S503.
  • the request message also includes one or more of the following information: source configuration information or source QoS information.
  • the source configuration information is used to configure the parameters of the first path before the first message.
  • the source configuration information is recorded as configuration #1 (config#1) below.
  • the source QoS information is included in the PDU session resources to be setup list (PDU session resources to be setup list).
  • Optional step S604 The second access network node determines whether to perform a path update, where whether to perform a path update includes whether to allow the first terminal to access the first cell.
  • whether to perform a path update also includes determining whether to retain the first path.
  • the second access network node determines to retain the first path.
  • the method further comprises determining a first entity.
  • the second access network node determines the first entity.
  • the method further includes determining a first mapping relationship and/or a bearer type.
  • the second access network node determines the first mapping relationship and/or bearer type.
  • the method for determining the first entity and/or the method for determining the first mapping relationship and/or the bearer type can refer to the relevant description of S502.
  • the difference is that in S502, the first access network node is used as an example for determination, while in S604, the second access network node is used for determination.
  • Optional step S605 Send a request response message.
  • the second access network node sends a request response message.
  • the second access network node sends a first request response message to the first access network node, and correspondingly, the first access network node receives the first request response message from the second access network node.
  • the first request response message includes first configuration information.
  • the first configuration information is used to configure the first path after sending the first message. It can be understood that the first configuration information is allocated or determined by the second access network node.
  • the first configuration information is determined according to the source configuration.
  • the first configuration information includes first key indication information, and the first key indication information is used to indicate the second key.
  • the first key indication information includes indication information used to indicate that the second key is the same as the first key.
  • the first request response message also includes one or more of the following information: information used to indicate a first key derivation parameter, or information used to indicate to the first terminal to retain the first path; wherein the first key derivation parameter is used to derive the second key, for example, the first key derivation parameter is used by the first terminal to derive the second key.
  • the first request response message further includes one or more of the following information: information used to indicate the second key to the first access network node, or information used to indicate to the first access network node to retain the first path.
  • the information used to indicate the second key to the first access network node may be the second key.
  • the first request response message also includes information for establishing a third path, for example, the information for establishing the third path includes one or more of the following information: the message carries an MCG configuration, including a bearer configuration, a random access configuration, or parameters for determining a key between the first terminal and the second access network node.
  • the information for establishing the third path includes one or more of the following information: the message carries an MCG configuration, including a bearer configuration, a random access configuration, or parameters for determining a key between the first terminal and the second access network node.
  • the method also includes the second network node sending second information to the first network node, the second information including one or more of the following information: information indicating a fifth bearer transmitted at the first access network node, resource information of the second access network node allocated for the second bearer; or resource information of the first access network node requesting a fourth bearer.
  • the fifth bearer is a DRB.
  • it is used to indicate the fifth bearer information packet transmitted at the first access network node Includes one or more of the following information: DRB ID, DRB QoS, and QoS flow ID of the QoS flow mapped to the DRB.
  • the second bearer is a bearer terminated at the first access network node, and the second bearer may be a DRB.
  • the resource information of the second access network node allocated for the second bearer includes one or more of the following information: DRB ID, corresponding second access network node uplink PDCP tunnel information (e.g., UL PDCP TNL info), and QoS flow ID of the QoS flow mapped to the DRB.
  • the fourth bearer is a bearer terminated at the second access network node.
  • the fourth bearer is a DRB.
  • the resource information of the first access network node for requesting the fourth bearer includes one or more of the following information: DRB ID, DRB QoS, corresponding second access network node uplink PDCP tunnel information (e.g., UL PDCP TNL info), and QoS flow ID of the QoS flow mapped to the DRB, and QoS parameters.
  • the embodiment of the present application does not limit the timing and content of sending the second information, and the message carrying the second information.
  • send the second information for example:
  • the second information when the second network node determines that the second entity is established at the first network node, the second information includes fifth bearer information indicating transmission at the first access network node and resource information of the second access network node indicating allocation of the second bearer.
  • the second information includes resource information of the first access network node used to request the fourth bearer.
  • the second information when the second network node determines that the second entity is established between the first network node and the second network node, the second information includes fifth bearer information indicating transmission at the first access network node, resource information of the second access network node indicating allocation of the second bearer, and resource information of the first access network node for requesting a fourth bearer.
  • the second information may be carried in the request message, that is, the request message includes the second information.
  • the second information may also be sent via other messages, which is not limited in the embodiments of the present application.
  • the method when the second information includes resource information of the first access network node for requesting the fourth bearer, the method also includes the second access network node receiving downlink secondary path tunnel information (e.g., DL secondaryPath TNL info) from the first access network node.
  • downlink secondary path tunnel information e.g., DL secondaryPath TNL info
  • the method when the second information includes resource information indicating a second access network node allocated for the second bearer, the method also includes the second access network node receiving first access network node uplink PDCP tunnel information (e.g., UL PDCP TNL info) from the first access network node.
  • first access network node uplink PDCP tunnel information e.g., UL PDCP TNL info
  • Optional step S606 Send a first message.
  • the first access network node sends a first message.
  • the first access network node sends a first message to the first terminal, and correspondingly, the first terminal receives the first message from the first access network node.
  • the first message is carried in the first request response message.
  • the first message is an RRC message carried in the first container.
  • the first access network node determines the second key.
  • the second key is the same as the first key.
  • the second key received from the first request response message is used as a key with the first terminal after sending the first message.
  • Optional step S607 the first terminal performs path update.
  • the first access network node and the second access network node can complete the configuration of the cross-node multi-path during the path update process, and the first terminal can retain the non-direct path between the source base station, thereby simplifying the process and saving signaling overhead.
  • the second access network node decides to establish a cross-node multi-path, making the access network node decision more flexible.
  • the second access network node may refuse to retain the first path, or may refuse to establish a cross-node Point multipath, for example, refusing to retain the first path includes accepting switching to the first cell and refusing to retain the first path.
  • FIG7 a flow chart of a communication method 700 provided in an embodiment of the present application is provided. The method 700 includes:
  • Optional step S701 a first terminal sends a first measurement result to a first access network node, and correspondingly, a second access network node receives the first measurement result from the first terminal.
  • Optional step S702 Determine whether to perform path update.
  • Optional step S703 Send a request message.
  • S701-S703 can refer to the relevant description of S601-S603 and will not be repeated here.
  • Optional step S704 The second access network node determines whether to perform a path update, where whether to perform a path update includes whether to allow the first terminal to access the first cell.
  • whether to perform a path update also includes determining whether to retain the first path.
  • the second access network node determines that the first terminal is allowed to access the first cell, which may also be referred to as the second access network node determining that switching to the first cell is allowed.
  • the second access network node determines not to retain the first path, or does not establish an inter-node multipath. For example, when the signal quality between the first terminal and the second terminal is lower than a specific threshold, the second access network node determines to retain the first path.
  • Optional step S705 Send a request response message.
  • the second access network node sends a request response message.
  • the second access network node sends a second request response message to the first access network node, and correspondingly, the first access network node receives the second request response message from the second access network node.
  • the second request response message includes indication information for indicating rejection of retaining the first path.
  • the indication information for indicating rejection of retaining the first path may include reason information for indicating rejection of retaining the first path.
  • the second request response message also includes information for establishing a third path, for example, the information for establishing the third path includes one or more of the following information: the message carries an MCG configuration, including a bearer configuration, a random access configuration, or parameters for determining a key between the first terminal and the second access network node.
  • the one or more types of information included in the second request response message may refer to the relevant description of the corresponding information in the first request response message in S504, and will not be described in detail.
  • Optional step S706 Send a first message.
  • the first access network node sends a first message.
  • the first access network node sends a first message to the first terminal, and correspondingly, the first terminal receives the first message from the first access network node.
  • the first message is a message carried in the second request response message.
  • Optional step S707 the first terminal performs path update.
  • the first terminal establishes the third path and disconnects from the first access network node according to the first message.
  • the second access network node can refuse to retain the first path, or can refuse to establish a cross-node multi-path, for example, accept switching to the first cell and refuse to retain the first path.
  • the second access network node decides to establish a cross-node multi-path, making the access network node decision more flexible.
  • FIG8 shows a flow chart of a communication method 800 provided in an embodiment of the present application.
  • the method 800 includes:
  • Optional step S801 The first terminal sends a first measurement result to the first access network node, and correspondingly, the second access network node receives the first measurement result from the first terminal.
  • S801 can refer to the relevant description of the first measurement result in method S501, and will not be repeated here.
  • the first terminal may communicate with the first access network node via an indirect path or multiple paths.
  • the introduction of the indirect path or multiple paths communication between the first terminal and the first access network node in S401 which will not be described in detail.
  • Optional step S802 Determine whether to perform path update. It is easy to understand that there are many possible ways to determine whether to perform path update in the embodiment of the present application, for example, determine whether to perform path update according to the first measurement result. For content related to path update, please refer to the introduction of path update in S402, which will not be repeated here.
  • determining whether to perform a path update includes: the first access network node determining whether to switch to the first cell.
  • steps S801-S802 reference may be made to the relevant description of steps S601-S602.
  • Optional step S803 Send a request message.
  • the first access network node sends a request message.
  • the first access network node sends a request message to the second access network node, and correspondingly, the second access network node receives the request message from the first access network node.
  • the request message includes one or more of the following information: a second measurement result, first bearer information used by the second access network node, the first bearer information including data radio bearer identification information, information for requesting to retain the first path, or auxiliary information.
  • the second measurement result, the first bearer information, and the information for requesting to retain the first path can refer to the relevant description in S503.
  • the auxiliary information includes information used by the second access network node to determine the first configuration information.
  • the auxiliary information includes the configuration information expected by the first access network node, and the expected configuration information may include a QoS flow ID, indicating which QoS flows are expected to be transmitted at the first access network node, and indication information, which is used to indicate whether the second access network node is expected to add first access network node resources for the bearer terminating at the second access network node.
  • the indication information includes auxiliary path tunnel information.
  • the request message also includes one or more of the following information: source configuration information or source QoS information.
  • the source configuration information is used to configure the parameters of the first path before the first message.
  • the source configuration information is recorded as configuration #1 (config#1) below.
  • the source QoS information is included in the PDU session resources to be setup list (PDU session resources to be setup list).
  • Optional step S804 The second access network node determines whether to perform a path update, where whether to perform a path update includes whether to allow the first terminal to access the first cell. Optionally, whether to perform a path update also includes determining whether to retain the first path.
  • the second access network node determines to retain the first path.
  • the method further comprises determining a first entity.
  • the second access network node determines the first entity.
  • the method further includes determining a first mapping relationship and/or a bearer type.
  • the second access network node determines the first mapping relationship and/or bearer type.
  • the method for determining the first entity and/or the method for determining the first mapping relationship and/or the bearer type can refer to the relevant description of S502.
  • the difference is that in S502, the first access network node is used as an example for determination, while in S804, the second access network node is used for determination.
  • the second access network node may generate a configuration based on the auxiliary information.
  • the auxiliary information may also be ignored, which is not limited in the embodiments of the present application.
  • Optional step S805 Send a second message.
  • the second access network node sends the second message.
  • the second access network node sends a second message to the first access network node, and correspondingly, the first access network node receives the second message from the second access network node.
  • the second message is used to request to add an indirect path, and the second message includes identification information of the second terminal.
  • the second message also includes one or more of the following information: information used to indicate the second key to the first access network node, or seventh bearer information used by the first access network node, the seventh bearer information including bearer identification information.
  • the seventh bearer information used by the first access network node may be seventh bearer information that the first access network node can use after receiving the second message.
  • the seventh bearer information includes a DRB ID list.
  • the method also includes the second network node sending third information to the first network node, and the third information includes one or more of the following information: information for requesting resource information of the first access network node of the fourth bearer; information corresponding to the first QoS transmitted at the first access network node; or information corresponding to the second QoS transmitted at the second access network node.
  • the fourth bearer is a bearer terminated at the second access network node.
  • the information corresponding to the first QoS may include a QoS flow ID, and optionally, the information corresponding to the first QoS also includes QoS parameters.
  • the information corresponding to the second QoS may include a QoS flow ID, and optionally, the information corresponding to the second QoS also includes QoS parameters.
  • the embodiment of the present application does not limit the timing and content of sending the third information, and the message carrying the third information.
  • the third information There are many possible ways to send the third information, for example:
  • the third information includes information corresponding to the first QoS transmitted in the first access network node.
  • the third information includes information for requesting resource information of the first access network node of the fourth bearer.
  • the third information includes information for requesting resource information of the first access network node for the fourth bearer and information corresponding to the second QoS transmitted at the second access network node.
  • the third information may be carried in the second message, that is, the second message includes the third information.
  • the third information may also be sent through other messages, which is not limited in the embodiment of the present application.
  • Optional step S806 receiving a third message.
  • the first access network node receives the third message.
  • the first access network node sends a third message to the second access network node, and correspondingly, the second access network node receives the third message from the first access network node.
  • the third message includes the second configuration information.
  • the second configuration information includes second key indication information, and the second key indication information is used to indicate the second key.
  • the method further includes the second access network node receiving resource information of the first access network node allocated for the fourth bearer from the first access network node, the resource information including the DRB ID, the corresponding first access network node downlink secondary path tunnel information (e.g., DL secondaryPath TNL info), and the QoS flow ID of the QoS flow mapped to the DRB.
  • the second access network node receiving the resource information of the first access network node allocated for the fourth bearer may be received through a third message, that is, the resource information of the first access network node allocated for the fourth bearer may be carried in the third message.
  • the method further includes the second access network node receiving resource information of the first access network node allocated for the fourth bearer and/or resource information of the second access network node allocated for the second bearer from the first access network node.
  • the resource information of the second access network node allocated for the second bearer includes DRB ID, DRB QoS, corresponding uplink PDCP tunnel information of the first access network node (e.g., UL PDCP TNL info), and QoS flow ID of the QoS flow mapped to the DRB, and QoS parameters.
  • the second access network node receiving the resource information of the first access network node allocated for the fourth bearer and/or the resource information of the second access network node allocated for the second bearer can be received through a third message, that is, the resource information of the first access network node allocated for the fourth bearer and/or the resource information of the second access network node allocated for the second bearer can be carried in the third message.
  • the method further includes the second access network node receiving second access network node downlink main cell group tunnel information (eg, DL MCG TNL info) from the first access network node.
  • second access network node downlink main cell group tunnel information eg, DL MCG TNL info
  • Optional step S807 Send a request response message.
  • the second access network node sends a request response message.
  • the second access network node sends a first request response message to the first access network node, and correspondingly, the first access network node receives the first request response message from the second access network node.
  • the first request response message includes first configuration information.
  • the first configuration information is used to configure the first path after sending the first message. It can be understood that the first configuration information is allocated or determined by the second access network node.
  • the first configuration information is determined according to the second configuration information.
  • the first request response message also includes information for establishing a third path, for example, the information for establishing the third path includes one or more of the following information: the message carries an MCG configuration, including a bearer configuration, a random access configuration, or parameters for determining a key between the first terminal and the second access network node.
  • the information for establishing the third path includes one or more of the following information: the message carries an MCG configuration, including a bearer configuration, a random access configuration, or parameters for determining a key between the first terminal and the second access network node.
  • the first configuration information includes identification information of the second terminal, configurations of one or more protocol layers corresponding to the first terminal, and one or more information indicating a first path corresponding to the first configuration.
  • the configurations of the one or more protocol layers corresponding to the first terminal include: configurations associated with the PDCP layer (e.g., radiobearerconfig), configurations associated with the SRAP layer (e.g., sl-L2RemoteUE-Config), and configurations associated with the RLC, MAC, and physical layers (e.g., sl-ConfigDedicatedNR).
  • the first request response message may include multiple information, and the embodiment of the present application does not limit the carrying method of multiple information.
  • the first request response message includes a first container, the first container includes a complete RRC message, and the RRC message includes the first configuration information.
  • Step S808 Send the first message.
  • the first access network node sends a first message.
  • the first access network node sends a first message to the first terminal, and correspondingly, the first terminal receives the first message from the first access network node.
  • the first message is carried in the first request response message.
  • the first message is an RRC message carried in the first container.
  • step S809 the first terminal performs path update.
  • the first terminal performing path updating includes reserving the first path.
  • steps S808-S809 may refer to the relevant descriptions of steps S505-S506.
  • the first terminal when the first terminal establishes a cross-node multi-path from a non-direct path or multi-path, the first terminal can retain the non-direct path between the first terminal and the source base station, thereby simplifying the process and saving signaling overhead.
  • the second access network node decides to establish a cross-node multi-path, making the access network node decision more flexible.
  • the first terminal may cache the uplink/downlink data packet encrypted by the first key. If the transmission continues, the first terminal or the first access network node will use the second key to decrypt it, resulting in an error packet problem; if the data packet is directly discarded, since there may be other third terminals connected to the first access network node through the second terminal, discarding the data packet will cause the uplink data of the third terminal to be lost.
  • the embodiment of the present application provides a relay communication method 900, including:
  • Optional step S901 There is a first path between the first terminal and the first access network node, the first path is a non-direct path, the key between the first terminal and the first access network node is a fourth key, and the identifier used by the first terminal on the first path includes a first local identifier.
  • the first terminal communicates with the first access network node through the second terminal on the first path.
  • the local identifier is local ID.
  • S902 The first terminal receives a fourth message.
  • the first terminal receives a fourth message from the first access network node, the fourth message includes the second local identifier of the first terminal and the fifth key derivation parameter, the fifth key derivation parameter is used to derive the fifth key, and the second local identifier is different from the first local identifier.
  • the fifth key is the key between the first terminal and the first access network node. It can be understood that the key between the first terminal and the first access network node is updated from the fourth key to the fifth key.
  • the fourth key is referred to as the old key and the fifth key is referred to as the new key.
  • Optional step S903 The second terminal receives a fifth message from the first access network node, where the fifth message includes the second local identifier of the first terminal.
  • the first terminal and/or the first access network node determines the key corresponding to the data packet according to the local identifier included in the data packet.
  • Optional step S904 The first terminal sends a data packet to the first access network node.
  • the first terminal sends the data packet to the first access network node via the second terminal. That is, the second terminal can forward the data packet to the first access network node for the first terminal, and optionally, the second terminal can forward the data packet after processing it.
  • the data packet includes a first data packet and/or a second data packet.
  • the first terminal sends a first data packet to the first access network node, the first data packet includes a first local identifier and first data, and the first data is encrypted using a fourth key.
  • sending the first data packet may be sent by the first terminal to the first access network node before the first terminal receives the fourth message. That is, the first data packet may include data encrypted with an old key and cached in the second terminal after being sent by the first terminal.
  • the time when the second terminal forwards the first data packet to the first access network node may be after the first terminal receives the fourth message.
  • the first terminal sends a second data packet to the first access network node, where the second data packet includes a second local identifier and second data, and the second data is encrypted using a fifth key.
  • the embodiments of the present application do not limit the time or order of sending or receiving data packets.
  • the first access network node receives the data packet from the first terminal.
  • the first access network node receives the data packet from the first terminal through the second terminal. It can be understood that the second terminal processes the data packet from the first terminal and then forwards it to the first access network node.
  • the first access network node receives a first processed data packet, the first processed data packet including a first local identifier and first data. It can be understood that the first processed data packet is a data packet obtained after processing the first data packet, and optionally, the first processed data packet may also be the same as the first data packet.
  • the first access network node receives a second processed data packet, the second processed data packet including a second local identifier and second data.
  • the second processed data packet is a data packet obtained after processing the second data packet, and optionally, the second processed data packet may also be the same as the second data packet.
  • the first access network node determines, based on the first local identifier included in the first processed data packet, that the first data is encrypted using the fifth key.
  • the first access network node determines, based on the second local identifier included in the second processed data packet, that the second data packet is encrypted using the fifth key.
  • the first access network node determines whether the data packet is encrypted with the new key or the old key according to the local identifier, which can also be called Determines how data packets are encrypted.
  • the first access network node determines the encryption method of the data packet
  • the first access network node has multiple possible methods to process the data packet.
  • the first access network node determines that the first data is encrypted using the fourth key, and/or the second data is encrypted using the fifth key
  • the first access network node decrypts the first data using the fourth key, and/or decrypts the second data using the fifth key.
  • the first access network node discards the first data, and/or decrypts the second data using the fifth key. In this manner, the first access network node can flexibly process the received data.
  • step S905 The first access network node sends a data packet to the first terminal.
  • the first access network node sends the data packet through the second terminal.
  • the data packet includes the third data packet and/or the fourth data packet.
  • the first access network node sends a third data packet to the first terminal, the third data packet includes the first local identifier and third data, and the third data is encrypted using a fourth key. It is easy to understand that sending the third data packet may be sent to the first terminal before sending the fourth message to the first terminal. That is, the third data packet may include data encrypted with an old key and cached in the second terminal after being sent by the first access network node. The time when the second terminal forwards the third data packet to the first terminal may be after the first access network node sends the fourth message to the first terminal.
  • the first access network node uses the fourth key and/or the fifth key to decrypt when receiving data from the first terminal.
  • the fifth key is used when sending data to the first terminal.
  • the first terminal uses the fourth key and/or the fifth key to decrypt when receiving data from the first terminal.
  • the fifth key is used when sending data to the first access network node.
  • the second terminal may cache uplink/downlink data packets encrypted with the fourth key, so that the first access network node can correctly decrypt the data packets and avoid the problem of wrong packets.
  • the first access network node sends a fourth data packet to the first terminal, the fourth data packet includes a second local identifier and fourth data, and the fourth data packet is encrypted using the fifth key.
  • the first terminal receives the data packet from the first access network node.
  • the first terminal receives the data packet from the first terminal through the second terminal. It can be understood that the second terminal processes the data packet from the first access network node and then forwards it to the first terminal.
  • the first terminal receives a third processed data packet, which includes the first local identifier and the third data.
  • the third processed data packet is a data packet obtained after processing the third data packet, and optionally, the third processed data packet may also be the same as the third data packet.
  • the first terminal receives a fourth processed data packet, and the fourth processed data packet includes the first local identifier and the fourth data.
  • the fourth processed data packet is a data packet obtained after processing the fourth data packet, and optionally, the fourth processed data packet can also be the same as the fourth data packet. It is easy to understand that the processed data packet can be processed by the second terminal.
  • the first terminal determines, based on the first local identifier included in the third processed data packet, that the third data is encrypted using the fourth key.
  • the first terminal determines, based on the second local identifier included in the fourth processed data packet, that the fourth data is encrypted using the fifth key.
  • the first terminal determines the encryption method of the data packet
  • the first terminal has multiple possible methods to process the data packet.
  • the first terminal determines that the third data is encrypted using the fourth key, and/or the fourth data is encrypted using the fifth key
  • the first terminal decrypts the third data using the fourth key, and/or decrypts the fourth data using the fifth key.
  • the first terminal discards the third data, and/or decrypts the fourth data using the fifth key. In this manner, the first terminal can flexibly process the received data.
  • the first access network node may allocate the first local identifier to other terminals; otherwise, the first local identifier cannot be allocated to other terminals.
  • the first terminal and/or the first access network node can determine whether the data packet is encrypted with a new key or an original key through the local identifier carried by the data packet, thereby avoiding the problem of error packets caused by key confusion.
  • the first terminal can continue to transmit data encrypted with the original key, thus avoiding packet loss.
  • the present application embodiment also provides a corresponding device, including a module for executing the corresponding module of the above embodiment.
  • the module can be software, hardware, or a combination of software and hardware.
  • FIG10 provides a schematic diagram of the structure of a terminal.
  • the terminal can be applied to the scenario shown in FIG1.
  • the terminal or a component in the terminal can execute the aforementioned methods shown in FIG4 to FIG9 and various possible implementations.
  • FIG10 only shows the main components of the terminal.
  • the terminal 1000 includes a processor, a memory, a control circuit, an antenna, and an input-output device.
  • the processor is mainly used to process communication protocols and communication data, as well as to control the entire terminal, execute software programs, and process data of software programs.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for conversion between baseband signals and radio frequency signals and processing of radio frequency signals.
  • the antenna is mainly used to transmit and receive radio frequency signals in the form of electromagnetic waves.
  • Input-output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users.
  • the processor can read the software program in the storage unit, parse and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the RF circuit.
  • the RF circuit processes the baseband signal to obtain the RF signal and sends the RF signal outward in the form of electromagnetic waves through the antenna.
  • the RF circuit receives the RF signal through the antenna, and the RF signal is further converted into a baseband signal, and the baseband signal is output to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG10 shows only one memory and processor. In an actual terminal, there may be multiple processors and memories.
  • the memory may also be referred to as a storage medium or a storage device, etc., which is not limited in the embodiments of the present application.
  • the processor may include a baseband processor and a central processor, the baseband processor is mainly used to process the communication protocol and communication data, and the central processor is mainly used to control the entire terminal device, execute the software program, and process the data of the software program.
  • the processor in Figure 10 integrates the functions of the baseband processor and the central processor.
  • the baseband processor and the central processor may also be independent processors, interconnected by technologies such as buses.
  • the terminal may include multiple baseband processors to adapt to different network formats, the terminal may include multiple central processors to enhance its processing capabilities, and the various components of the terminal may be connected through various buses.
  • the baseband processor may also be described as a baseband processing circuit or a baseband processing chip.
  • the central processor may also be described as a central processing circuit or a central processing chip.
  • the function of processing the communication protocol and communication data may be built into the processor, or may be stored in the storage unit in the form of a software program, and the processor executes the software program to implement the baseband processing function.
  • the antenna and control circuit with transceiver functions can be regarded as the transceiver unit 1011 of the terminal 1000, and the processor with processing function can be regarded as the processing unit 1012 of the terminal 1000.
  • the terminal 1000 includes the transceiver unit 1011 and the processing unit 1012.
  • the transceiver unit can also be referred to as a transceiver, a transceiver, a transceiver device, etc.
  • the device used to implement the receiving function in the transceiver unit 1011 can be regarded as a receiving unit, and the device used to implement the sending function in the transceiver unit 1011 can be regarded as a sending unit, that is, the transceiver unit 1011 includes a receiving unit and a sending unit.
  • the receiving unit can also be referred to as a receiver, a receiver, a receiving circuit, etc.
  • the sending unit can be referred to as a transmitter, a transmitter or a transmitting circuit, etc.
  • the above-mentioned receiving unit and the sending unit can be an integrated unit or multiple independent units.
  • the above-mentioned receiving unit and the sending unit can be located in one geographical location or dispersed in multiple geographical locations.
  • the device may be a terminal or a component of a terminal (for example, For example, integrated circuits, chips, etc.).
  • the device may be a network device (an example of a network node), or a component of a network device (for example, an integrated circuit, a chip, etc.), or a logic module or software that can implement all or part of the functions of the network device.
  • the device may also be other communication modules.
  • the device 1100 may implement the functions of the network device in the method shown in FIG. 2, FIG. 4, FIG. 6, or FIG. 7, or the device 1100 may implement the functions of the first terminal or the second terminal in the method shown in FIG. 2, FIG. 4, FIG. 6, or FIG. 7.
  • the device 1100 may include: an interface module 1101 (or an interface unit) and a processing module 1102 (or a processing unit), and may also include a storage module 1103 (or a storage unit).
  • one or more modules in FIG. 11 may be implemented by one or more processors, or by one or more processors and memories; or by one or more processors and transceivers; or by one or more processors, memories, and transceivers, which are not limited in the embodiments of the present application.
  • the processors, memories, and transceivers may be provided separately or integrated.
  • the device has the function of implementing the terminal described in the embodiment of the present application.
  • the device includes a module or unit or means corresponding to the steps involved in the terminal described in the embodiment of the present application.
  • the function or unit or means can be implemented by software, or by hardware, or by hardware executing the corresponding software implementation, or by a combination of software and hardware.
  • the device has the function of implementing the wireless access network device described in the embodiment of the present application.
  • the device includes a module or unit or means corresponding to the steps involved in the wireless access network device described in the embodiment of the present application.
  • the function or unit or means can be implemented by software, or by hardware, or by hardware executing the corresponding software implementation, or by a combination of software and hardware.
  • the device 1100 includes: a processing module 1102 and an interface module 1101.
  • the device 1100 may be, for example, a terminal, or a component of a terminal (such as a processor, a chip, or a chip system), or a logic module or software that can implement all or part of the terminal functions.
  • the apparatus 1100 includes an interface module 1101 and a processing module 1102.
  • the interface module 1101 is used to receive a first message from a first network node, and the processing module 1102 is used to communicate with the first network node through a second terminal on a first path; the first message includes first indication information and/or first configuration information of the first path, and the first indication information is used to indicate that the first path is retained; the first message includes information for indicating a first cell of the second network node; the processing module 1102 is also used to establish a third path and retain the first path, and the third path is a direct connection path between the first terminal and the second network node
  • the apparatus 1100 includes: a processing module 1102 and an interface module 1101.
  • the apparatus 1100 may be a network node, or a component of a network node (e.g., an integrated circuit, a chip, etc.), or a logic module or software that can implement all or part of the network device functions.
  • the apparatus 1100 includes an interface module 1101 and a processing module 1102.
  • the interface module 1101 is used to send a first message
  • the processing module 1102 is used to communicate with the first terminal through the second terminal on the first path
  • the first message includes first indication information and/or first configuration information, the first indication information is used to indicate that the first path is retained, and the first configuration information includes information for configuring the first path
  • the first message includes information for indicating a first cell of the second network node
  • the processing module 1102 is also used to communicate with the first terminal on the first path.
  • the apparatus 1100 includes an interface module 1101 and a processing module 1102.
  • the interface module 1101 is used to receive a request message, the request message is used to request to establish a third path, the third path is a direct path between the first terminal and the second network node, the first terminal communicates with the first network node through the second terminal on the first path; the interface module 1101 is also used to send a request response message, the request response message includes a first request response message and/or a second request response message, wherein the first request response message includes first configuration information, the first configuration information includes information for configuring the first path; the second request response message includes information for indicating that the first path is rejected. path information.
  • the apparatus 1100 may further include a storage module 1103 for storing data or instructions (also referred to as codes or programs), and the other modules may interact or couple with the storage module to implement corresponding methods or functions.
  • the processing module 1102 may read the data or instructions in the storage module 1103 so that the apparatus 1100 implements the method in the above embodiment.
  • the module in the above-mentioned device can be one or more integrated circuits configured to implement the above method, such as: one or more application specific integrated circuits (ASIC), or one or more microprocessors (digital singnal processors, DSP), or one or more field programmable gate arrays (field programmable gate arrays, FPGA), or a combination of at least two of these integrated circuit forms.
  • ASIC application specific integrated circuits
  • DSP digital singnal processors
  • FPGA field programmable gate arrays
  • FPGA field programmable gate arrays
  • the module in the device can be implemented in the form of a processing element scheduler
  • the processing element can be a general-purpose processor, such as a central processing unit (CPU) or other processor that can call a program.
  • CPU central processing unit
  • these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • the device includes: a processor 1210 and an interface 1230, and the processor 1210 is coupled to the interface 1230.
  • the interface 1230 is used to communicate with other modules or devices.
  • the interface 1230 can be a transceiver or an input-output interface.
  • the interface 1230 can be, for example, an interface circuit.
  • the device also includes a memory 1220 for storing instructions executed by the processor 1210 or storing input data required for the processor 1210 to run instructions or storing data generated after the processor 1210 runs instructions.
  • the above method and various possible implementations can be implemented by the processor 1210 calling a program or instruction stored in the memory 1220.
  • the memory 1220 can be inside the device or outside the device, which is not limited in this application.
  • the functions/implementation processes of the interface module 1101 and the processing module 1102 in FIG11 may be implemented by the processor 1210 in the device shown in FIG12.
  • the functions/implementation processes of the processing module 1102 in FIG11 may be implemented by the processor 1210 in the device shown in FIG12
  • the functions/implementation processes of the interface module 1101 in FIG11 may be implemented by the interface 1230 in the device shown in FIG12.
  • the functions/implementation processes of the interface module 1101 may be implemented by the processor calling program instructions in the memory to drive the interface 1230.
  • the chip of the terminal implements the functions of the terminal in the above method embodiment.
  • the chip receives information from other modules in the terminal (such as a radio frequency module or an antenna), and the information comes from other terminals or wireless access network devices; or the chip sends information to other modules in the terminal (such as a radio frequency module or an antenna), and the information is sent by the terminal to other terminals or wireless access network devices.
  • the chip When the above device is a chip applied to a network device (e.g., a wireless access network device), the chip implements the functions of the wireless access network device in the above method embodiment.
  • the chip receives information from other modules (e.g., a radio frequency module or an antenna) in the wireless access network device, and the information comes from other wireless access network devices or terminals; or the chip sends information to other modules (e.g., a radio frequency module or an antenna) in the wireless access network device, and the information is sent by the wireless access network device to other wireless access network devices or terminals.
  • modules e.g., a radio frequency module or an antenna
  • At least one refers to any combination of these items, including any combination of single items (individuals) or plural items (individuals).
  • at least one item (individuals, kinds) of a, b, or c can represent: a, b, c, ab, ac, bc, or abc, where a, b, c can be single or multiple.
  • “Multiple” refers to two or more, and other quantifiers are similar.
  • sending information can be understood as one device sending information to another device, or it can also be understood as a logic module inside a device sending information to another logic module.
  • a network node sending information can be understood as a network node sending information to another device (such as a terminal), or it can be understood as logic module 1 in a network node sending information to logic module 2 in a network node.
  • receiving information can be understood as a device receiving information from another device, or it can also be understood as a logic module inside a device receiving information from another logic module.
  • a network node receiving information can be understood as a network node receiving information from another device (such as a terminal), or it can be understood as logic module 1 in a network node receiving information from logic module 2 in the network node.
  • sending information to... (for example, a terminal)" or the related illustrations in the accompanying drawings can be understood as the destination end of the information is the terminal. It can include sending information to the terminal directly or indirectly.
  • "Receiving information from... (for example, a terminal)” or “receiving information from... (for example, a terminal)” or “receiving information sent by (for example, a terminal)", or the related illustrations in the accompanying drawings can be understood as the source end of the information is the terminal, which can include directly or indirectly receiving information from the terminal.
  • the information may be processed as necessary between the source end and the destination end of the information transmission, such as format changes, etc., but the destination end can understand the valid information from the source end. Similar expressions in this application can be understood similarly and will not be repeated here.
  • the size of the sequence number of each process does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiment of the present application.
  • it can be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software When software is used for implementation, it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the process or function described in the embodiment of the present application is generated in whole or in part.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions can be transmitted from a website site, a computer, a server or a data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that a computer can access or a data storage device such as a server or a data center that includes one or more available media integrated.
  • the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
  • a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
  • an optical medium e.g., a DVD
  • a semiconductor medium e.g., a solid state disk (SSD)
  • the steps of the method described in the embodiments of the present application can be directly embedded in hardware, a software unit executed by a processor, or a combination of the two.
  • the software unit can be stored in a random access memory (RAM), flash memory, read-only memory (ROM), register, hard disk, removable disk or any other form of storage medium in the art.
  • the storage medium can be connected to the processor so that the processor can read information from the storage medium and can write information to the storage medium.
  • the storage medium can also be integrated into the processor.
  • the processor and the storage medium can be arranged in an ASIC.
  • the present application also provides a computer-readable storage medium on which a computer program is stored.
  • a computer program is stored on which a computer program is stored.
  • the present application also provides a computer program product, which implements the functions of any of the above method embodiments when executed by a computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Les modes de réalisation de la présente demande concernent un procédé, un appareil et un système de communication de relais. Le procédé est appliqué à un premier terminal et consiste à : recevoir un premier message de al part d'un premier nœud de réseau, et un premier terminal établissant une communication avec le premier nœud de réseau sur un premier trajet au moyen d'un deuxième terminal, le premier message contenant des premières informations d'indication et/ou des premières informations de configuration du premier trajet, les premières informations d'indication étant utilisées pour indiquer la réservation du premier trajet, et le premier message contenant des informations utilisées pour indiquer une première cellule d'un deuxième nœud de réseau; et établir un troisième trajet puis réserver le premier trajet, le troisième trajet étant un trajet direct entre le premier terminal et le deuxième nœud de réseau. Au moyen du procédé, le temps nécessaire et le surdébit de signalisation pour la mise à jour de trajet d'un premier terminal sont réduits.
PCT/CN2024/096679 2023-06-12 2024-05-31 Procédé, appareil et système de communication de relais Pending WO2024255615A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202310695761.2 2023-06-12
CN202310695761.2A CN119136336A (zh) 2023-06-12 2023-06-12 一种中继通信方法、装置及系统

Publications (1)

Publication Number Publication Date
WO2024255615A1 true WO2024255615A1 (fr) 2024-12-19

Family

ID=93755968

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2024/096679 Pending WO2024255615A1 (fr) 2023-06-12 2024-05-31 Procédé, appareil et système de communication de relais

Country Status (2)

Country Link
CN (1) CN119136336A (fr)
WO (1) WO2024255615A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116112991A (zh) * 2021-11-10 2023-05-12 中国移动通信有限公司研究院 一种处理方法、装置和计算机可读存储介质
US20230180076A1 (en) * 2020-04-20 2023-06-08 Qualcomm Incorporated Mobility handling between uu path and pc5 relay path
CN116980928A (zh) * 2022-04-21 2023-10-31 华为技术有限公司 一种通信方法及设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230180076A1 (en) * 2020-04-20 2023-06-08 Qualcomm Incorporated Mobility handling between uu path and pc5 relay path
CN116112991A (zh) * 2021-11-10 2023-05-12 中国移动通信有限公司研究院 一种处理方法、装置和计算机可读存储介质
CN116980928A (zh) * 2022-04-21 2023-10-31 华为技术有限公司 一种通信方法及设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
INTEL CORPORATION: "Discussion on Multi-path Relaying", 3GPP DRAFT; R2-2209585, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Electronic meeting; 20221010 - 20221019, 30 September 2022 (2022-09-30), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052262914 *
XIAOMI: "Discussion on multipath", 3GPP DRAFT; R2-2209881, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Electronic; 20220510 - 20220519, 30 September 2022 (2022-09-30), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052263206 *

Also Published As

Publication number Publication date
CN119136336A (zh) 2024-12-13

Similar Documents

Publication Publication Date Title
US11546811B2 (en) Method for establishing a fronthaul interface, method for performing access for a UE, method and apparatus for performing a handover for a UE, data forwarding method, user equipment and base station
US20200022203A1 (en) Mobile communication system, control apparatus, base station, and user terminal supporting dual connectivity
EP3764732A1 (fr) Procédé, appareil et système de transmission de messages
CN109246747B (zh) 前向接口的建立方法、ue接入方法、ue切换方法及装置
CN115669058B (zh) 一种节点的切换方法以及相关设备
JP6920550B2 (ja) 通信方法および装置ならびに無線アクセス・ネットワーク
CN113746585A (zh) 授时方法和通信装置
CN114731723A (zh) 一种通信方法及装置
CN120419236A (zh) 用于在无线通信系统中连接基于qos流的终端的方法和装置
CN113873582A (zh) 一种移动边缘计算处理方法以及相关设备
WO2021026706A1 (fr) Procédé et appareil de gestion d'interface f1
EP4210431A1 (fr) Procédé et appareil de communication
EP3852481B1 (fr) Procédé de commutation de mode et procédé et appareil de distribution de flux de données
CN116349293A (zh) Iab节点的移植方法及装置
TW201836382A (zh) 通信方法、輔網絡節點和終端
WO2021159238A1 (fr) Procédé de transmission de données, appareil de communication et système de communication
US20220182910A1 (en) Data Processing Method, Apparatus, And System
WO2024255615A1 (fr) Procédé, appareil et système de communication de relais
CN117769056A (zh) 一种通信方法及装置
CN117336730A (zh) 一种通信方法及装置
WO2020213407A1 (fr) Système de communication, dispositif de communication et équipement terminal
US20250106922A1 (en) Inter-du multi-trp operation
US20260032752A1 (en) Communication method and communication apparatus
WO2023246746A1 (fr) Procédé de communication et dispositif associé
WO2025039829A1 (fr) Procédé de communication, appareil et système de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24822567

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE