CN114731544A - Data transmission method, device and system based on network slice - Google Patents

Data transmission method, device and system based on network slice Download PDF

Info

Publication number
CN114731544A
CN114731544A CN201980102429.2A CN201980102429A CN114731544A CN 114731544 A CN114731544 A CN 114731544A CN 201980102429 A CN201980102429 A CN 201980102429A CN 114731544 A CN114731544 A CN 114731544A
Authority
CN
China
Prior art keywords
message
access
access device
terminal device
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201980102429.2A
Other languages
Chinese (zh)
Inventor
罗海燕
黄曲芳
戴明增
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN114731544A publication Critical patent/CN114731544A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a data transmission method, a device and a system based on network slices, which comprises the following steps: the first access device providing service for the terminal device receives a first message, wherein the first message is used for indicating the terminal device to move to a device other than the first access device, and the first access device stops sending the data packet in the first network slice to the terminal device when receiving the first message. The loss of the data packet can be avoided, and the requirements of the data service on time delay and reliability are guaranteed.

Description

Data transmission method, device and system based on network slice Technical Field
The present application relates to the field of communications, and in particular, to a method, an apparatus, and a system for data transmission based on network slicing.
Background
Fifth generation (5)thgeneration, 5G) communication system has rich and diverse application scenarios, and different application scenarios have different network requirements, so a network slicing (network slicing) technology is introduced into the 5G network. The network slicing means that the network logically divides and encapsulates end-to-end network resources (network functions, physical hardware, interface pipeline resources and the like) according to the self characteristics and requirements of a bearing service so as to meet the requirements of different services on quality of service (QoS) of network performances such as network bandwidth, time delay, reliability and the like, and other slicing services are not influenced when the self network fails and is recovered. The access device broadcasts the configuration information of the network slice through the broadcast message, and the terminal device can communicate with the network side according to the configuration information of the network slice broadcast by the access device. The communication mechanism based on the network slice enables the terminal equipment to communicate with the network side at any time and any place without changing the state. However, when the terminal device moves, a data packet loss may occur due to the fact that the network side cannot sense the movement of the terminal device in advance, and thus, the requirements of time delay and reliability of the service are affected.
Disclosure of Invention
The application provides a data transmission method, a data transmission device and a communication system based on network slices, which can avoid the loss of data packets and ensure the requirements of data services on time delay and reliability.
In a first aspect, a data transmission method based on network slice is provided, where the method may be performed by an access device or a module (e.g., a chip) configured in the access device, and the method is described as being performed by the access device as an example.
The method comprises the following steps: the first access equipment receives a first message, wherein the first message is used for indicating the terminal equipment to move to equipment except the first access equipment; and the first access equipment stops sending the data packets in the first network slice to the terminal equipment when receiving the first message.
According to the scheme, the access device stops sending the data packet in the network slice to the terminal device after receiving the first message, so that the data packet can be prevented from being lost, the requirements of data service on time delay and reliability are met, and the utilization rate of air interface resources is improved.
It should be noted that, in this application, moving a terminal device to an access device may be understood as moving the terminal device into a coverage area of the access device, or moving the terminal device into a cell of the access device, or moving the terminal device to the access device so that the access device can provide a service for the terminal device, but the application is not limited thereto.
With reference to the first aspect, in certain implementations of the first aspect, the first message is from the terminal device.
By way of example and not limitation, the protocol specifies a measurement event for triggering the terminal device to send a first message to the first access device.
Optionally, the measurement event is that the terminal device measures that a value of a parameter a of a reference signal of an access device other than the first access device is higher than a preset threshold value.
According to the scheme, the terminal equipment determines to send an instruction to the access equipment providing the network slice service after moving to other equipment, so that the terminal equipment and the access equipment achieve consensus on the fact that the terminal equipment cannot receive the data of the network slice due to leaving the access equipment, the access equipment stops sending the data of the network slice to the terminal equipment, data packet loss can be avoided, and requirements of data service on time delay and reliability are met.
With reference to the first aspect, in certain implementations of the first aspect, the first message is from an access and mobility management function, AMF, network element, and the first message includes an identity of the terminal device.
According to the scheme, the AMF network element informs the access equipment providing service for the terminal equipment that the terminal equipment leaves the access equipment, so that the access equipment stops sending the network slice data to the terminal equipment, the loss of a data packet can be avoided, the requirements of data service on time delay and reliability are met, and the resource utilization rate is improved.
With reference to the first aspect, in some implementations of the first aspect, the first message includes an identifier of the second access device or an identifier of a second cell, where the second cell is a cell of the second access device that provides a service for the terminal device.
According to the scheme, the access equipment providing the slicing service for the terminal equipment can determine the access equipment to which the terminal equipment moves.
With reference to the first aspect, in some implementations of the first aspect, the first access device sends the second message to the AMF network element.
Optionally, the second message includes one or more of the following information:
the identifier of the second access device, the identifier of the second cell, the identifier of the terminal device, the identifier of the first network slice, and the sequence number of the last data packet belonging to the terminal device in the first network slice received by the first access device, where the second cell is a cell in the second access device that provides service for the terminal device.
According to the scheme, the access equipment stops sending the data of the network slice to the terminal equipment and then provides information to the AMF network element, so that the AMF network element can acquire the information of the access equipment to which the terminal equipment moves or the transmission condition of the data packet in the network slice.
Optionally, the data packet of the terminal device in the first network slice sent by the first access device to the second access device further includes an index value corresponding to the identifier of the terminal device, or the first access device sends a notification message to the second access device, where the notification message includes the identifier of the terminal device and the index value corresponding to the second identifier of the terminal device. And the index value corresponding to the second identifier is used for the first access equipment and the second access equipment to transmit other data packets of the terminal equipment. The expenditure can be saved, and the resource utilization rate can be improved.
With reference to the first aspect, in certain implementations of the first aspect, the first message is from a second access device, and the first message includes an identification of the terminal device.
According to the scheme, the access equipment to which the terminal equipment moves informs the access equipment providing service for the previous terminal equipment that the terminal equipment has moved to the access equipment so that the access equipment providing service for the previous terminal equipment stops sending the network sliced data packet to the terminal equipment, the data packet loss can be avoided, and the requirements of data service on time delay and reliability are guaranteed.
With reference to the first aspect, in some implementations of the first aspect, the identifier of the terminal device is one of the following identifiers:
an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
With reference to the first aspect, in certain implementations of the first aspect, the method further includes: and the first access equipment sends the data packet in the first network slice of the terminal equipment to the second access equipment through a data forwarding tunnel.
With reference to the first aspect, in certain implementations of the first aspect, the data forwarding tunnel is a data forwarding tunnel dedicated to the first network slice.
According to the scheme, the data packet of the network slice is forwarded through the special data forwarding tunnel of the network slice, so that the access device receiving the data packet can determine the network slice to which the data packet belongs through the tunnel identifier.
With reference to the first aspect, in some implementations of the first aspect, when the first access device sends the data packet of the terminal device to the second access device, a user plane tunnel header of the data packet includes an identifier of the first network slice.
According to the scheme, when the data packet of the terminal device in the network slice is forwarded through the universal data forwarding tunnel between the access devices, the header of the user plane tunnel comprises the identifier of the network slice, so that the access device receiving the data packet can determine the network slice to which the data packet belongs.
In a second aspect, a data transmission method based on network slice is provided, where the method may be executed by an access device or a module (e.g., a chip) configured in the access device, and the method is executed by the access device as an example.
The method comprises the following steps: the second access equipment sends a third message, wherein the third message is used for indicating the terminal equipment to move to the second access equipment, and the third message comprises the identifier of the terminal equipment; and the second access equipment receives the downlink data packet of the terminal equipment in the first network slice sent by the first access equipment.
With reference to the second aspect, in some implementations of the second aspect, the second access device receives an uplink data packet sent by the terminal device, where the uplink data packet includes an identifier of the terminal device; and the second access equipment determines that the terminal equipment moves to the second access equipment according to the identifier of the terminal equipment.
With reference to the second aspect, in some implementations of the second aspect, the sending, by the second access device, the third message includes:
and the second access equipment sends a third message to the access equipment which establishes the X2 or Xn interface with the second access equipment, wherein the first access equipment is included in the access equipment which establishes the X2 or Xn interface with the second access equipment.
According to the scheme, the access equipment informs the access equipment establishing an X2 or Xn interface with the access equipment that the terminal equipment moves to the access equipment, so that the access equipment providing network slice service for the terminal equipment at the previous time can determine that the terminal equipment leaves so as to stop sending network slice data packets to the terminal equipment, the data packet loss can be avoided, the requirements of data service on time delay and reliability are met, and the resource utilization rate is improved.
With reference to the second aspect, in some implementations of the second aspect, the sending, by the second access device, the third message includes: and the second access equipment sends a third message to an access and mobility management function (AMF) network element.
According to the scheme of the application, the access equipment informs the AMF network element that the terminal equipment moves to the access equipment so that the AMF network element can forward the message.
With reference to the second aspect, in some implementations of the second aspect, the second access device receives the first data packet sent by the first access device through a data forwarding tunnel.
With reference to the second aspect, in certain implementations of the second aspect, the data forwarding tunnel is a data forwarding tunnel dedicated to the first network slice.
According to the scheme, the data packet of the network slice is forwarded through the special data forwarding tunnel of the network slice, so that the access device receiving the data packet can determine the network slice to which the data packet belongs through the tunnel identifier.
With reference to the second aspect, in some implementations of the second aspect, the identification of the first network slice is included in the user plane tunnel header of the first data packet received by the second access device.
According to the scheme, when the data packet of the terminal equipment in the network slice is forwarded through the universal data forwarding tunnel between the access equipment, the header of the user plane tunnel comprises the identifier of the network slice so that the access equipment receiving the data packet can determine the network slice to which the data packet belongs.
With reference to the second aspect, in some implementations of the second aspect, the identifier of the terminal device is one of the following identifiers:
an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
In a third aspect, a data transmission method based on network slice is provided, where the method may be executed by an AMF network element or a module (e.g., a chip) configured in the AMF network element, and the method is described as an example where the method is executed by the AMF network element.
The method comprises the following steps: receiving a third message sent by second access equipment by an access and mobility management function (AMF) network element, wherein the third message is used for informing the AMF network element that terminal equipment moves to the second access equipment, and the third message comprises an identifier of the terminal equipment; the AMF network element sends a first message to a first access device, where the first message is used to notify the first access device that the terminal device moves to a second access device, and the first message includes an identifier of the terminal device and an identifier of the second access device or a second cell, where the second cell is a cell in the second access device that provides service for the terminal device.
According to the scheme, after the AMF network element determines that the terminal equipment moves to the second access equipment through the received message, the access equipment which provides service for the terminal equipment at the previous time is informed, so that the access equipment which provides service for the terminal equipment at the previous time stops sending the network sliced data packet to the terminal equipment, the data packet can be prevented from being lost, and the resource utilization rate is improved.
With reference to the third aspect, in some implementations of the third aspect, the AMF network element receives a second message sent by the first access device, where the second message includes one or more of the following information: the identifier of the second access device, the identifier of the second cell, the identifier of the terminal device, the identifier of the first network slice, and the sequence number of the last data packet belonging to the terminal device in the first network slice received by the first access device, where the second cell is a cell in the second access device that provides service for the terminal device.
According to the scheme, the access equipment provides information for the AMF network element, so that the AMF network element can acquire the information of the access equipment to which the terminal equipment moves or the transmission condition of the data packet in the network slice.
With reference to the third aspect, in some implementations of the third aspect, the identifier of the terminal device is one of the following identifiers: an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
In a fourth aspect, a data transmission method based on network slice is provided, where the method is executed by a terminal device or a module (e.g. a chip) configured in the terminal device, and the method is executed by the terminal device as an example.
The method comprises the following steps: the terminal equipment receives a data packet of a first network slice sent by first access equipment; the terminal device sends a first instruction to a first access device, where the first instruction is used to instruct the terminal device to move to an access device other than the first access device, so that the first access device stops sending the data packet of the first network slice to the terminal device.
With reference to the fourth aspect, in some implementations of the fourth aspect, the first indication includes an identity of the second access device or an identity of the second cell, where the first indication is specifically used to indicate that the terminal device is to move to the second access device.
In a fifth aspect, a data transmission apparatus based on network slice is provided, where the apparatus may be configured in an access device or is an access device itself, and includes: a receiving and sending unit, wherein the first access device receives a first message, and the first message is used for indicating the terminal device to move to a device except the first access device; and the processing unit is used for stopping sending the data packets in the first network slice to the terminal equipment when the transceiving unit receives the first message.
With reference to the fifth aspect, in some implementations of the fifth aspect, the first message is from the terminal device.
With reference to the fifth aspect, in some implementations of the fifth aspect, the first message includes an identifier of the second access device or an identifier of a second cell, where the second cell is a cell of the second access device that provides a service for the terminal device.
With reference to the fifth aspect, in certain implementations of the fifth aspect, the first message is from an access and mobility management function, AMF, network element, and the first message includes an identification of the terminal device.
With reference to the fifth aspect, in certain implementations of the fifth aspect, the method includes:
the transceiver unit is further configured to send a second message to the AMF network element, where the second message includes one or more of the following information:
an identifier of the second access device, an identifier of the second cell, an identifier of the terminal device, an identifier of the first network slice, and a sequence number of a last data packet belonging to the terminal device in the first network slice received by the first access device
The second cell is a cell of the second access device for providing service for the terminal device.
With reference to the fifth aspect, in some implementations of the fifth aspect, the first message is from the second access device, and the first message includes an identification of the terminal device.
With reference to the fifth aspect, in some implementations of the fifth aspect, the identifier of the terminal device is one of the following identifiers:
an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
In a sixth aspect, a data transmission apparatus based on network slice is provided, where the apparatus may be configured in an access device or is an access device itself, and includes: a transceiving unit, configured to send a third message, where the third message is used to instruct a terminal device to move to a second access device, and the third message includes an identifier of the terminal device; the transceiver unit is further configured to receive a downlink data packet of the terminal device in the first network slice sent by the first access device.
With reference to the sixth aspect, in certain implementations of the sixth aspect, the method includes:
the transceiver unit is further configured to receive an uplink data packet sent by the terminal device, where the uplink data packet includes an identifier of the terminal device, and the apparatus further includes:
and the processing unit is used for determining that the terminal equipment moves to the second access equipment according to the identifier of the terminal equipment.
With reference to the sixth aspect, in some implementations of the sixth aspect, the third message is a message that the transceiver unit sends to an access device that establishes an X2 or Xn interface with the second access device, where the first access device is included in the access device that establishes an X2 or Xn interface with the second access device.
With reference to the sixth aspect, in certain implementations of the sixth aspect, the third message is a message sent by the transceiver unit to an access and mobility management function, AMF, network element.
With reference to the sixth aspect, in some implementations of the sixth aspect, the identifier of the terminal device is one of the following identifiers:
an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
A seventh aspect provides a data transmission apparatus based on network slice, where the apparatus may be configured in an AMF network element or is an AMF network element itself, and the apparatus includes: a transceiver unit, configured to receive a third message sent by a second access device, where the third message is used to notify an access and mobility management function AMF network element that a terminal device moves to the second access device, and the third message includes an identifier of the terminal device; the transceiver unit is further configured to send a first message to the first access device, where the first message is used to notify the first access device that the terminal device moves to the second access device, and the first message includes an identifier of the terminal device and the second access device.
With reference to the seventh aspect, in some implementations of the seventh aspect, the method includes:
the transceiver unit is further configured to receive a second message sent by the first access device, where the second message includes one or more of the following information:
an identity of the second access device, an identity of a second cell, an identity of the terminal device, an identity of the first network slice, a sequence number of a data packet in the last first network slice received by the terminal device, a sequence number of a data packet in the first network slice to be received by the terminal device,
the second cell is a cell of the second access device that provides service for the terminal device.
With reference to the seventh aspect, in some implementations of the seventh aspect, the identifier of the terminal device is one of the following identifiers:
an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
In an eighth aspect, a data transmission apparatus based on network slice is provided, where the apparatus may be configured in a terminal device or is a terminal device itself, and includes: the receiving and sending unit is used for receiving a data packet of a first network slice sent by first access equipment; the transceiver unit is further configured to send a first indication to a first access device, where the first indication is used to indicate that a terminal device is to move to an access device other than the first access device, so that the first access device stops sending data packets of the first network slice to the terminal device.
With reference to the eighth aspect, in some implementations of the eighth aspect, the first indication includes an identity of the second access device or an identity of the second cell, where the first indication is specifically used to indicate that the terminal device is to move to the second access device.
In a ninth aspect, a communication system for data transmission based on network slices is provided, which includes:
the terminal equipment receives a data packet of a first network slice sent by the first access equipment; the first access device is used for receiving a first message, wherein the first message is used for indicating the terminal device to move to a device except the first access device; the first access device is further configured to stop sending the data packet of the first network slice to the terminal device when receiving the first message.
With reference to the ninth aspect, in some implementations of the ninth aspect, the terminal device is further configured to send the first message to the first access device.
With reference to the ninth aspect, in some implementations of the ninth aspect, the first message includes an identifier of the second access device or an identifier of a second cell, where the second cell is a cell of the second access device that provides a service for the terminal device.
With reference to the ninth aspect, in some implementations of the ninth aspect, the communication system further includes: and the mobility management function AMF network element is used for sending the first message to the first access device, wherein the first message comprises the identifier of the terminal device.
With reference to the ninth aspect, in some implementations of the ninth aspect, the first access device is further configured to send a second message to the AMF network element, where the second message includes an identifier of a second access device or an identifier of a second cell, where the second cell is a cell of the second access device that provides a service for the terminal device, and the system further includes:
and the AMF network element receives the second message sent by the first access equipment.
With reference to the ninth aspect, in some implementations of the ninth aspect, the second message further includes one or more of the following information:
the identifier of the terminal device, the identifier of the first network slice, the sequence number of the last data packet in the first network slice received by the terminal device, and the sequence number of the data packet in the first network slice to be received by the terminal device.
With reference to the ninth aspect, in some implementation manners of the ninth aspect, the terminal device is further configured to send an uplink data packet to the second access device, where the uplink data packet includes an identifier of the terminal device; and, the system further comprises:
the second access device is configured to receive the uplink data packet sent by the terminal device, and determine that the terminal device moves to the second access device according to the uplink data packet.
With reference to the ninth aspect, in some implementations of the ninth aspect, the second access device is further configured to send the first message to an access device that establishes an X2 or Xn interface with the second access device, where the first message includes an identification of the terminal device.
With reference to the ninth aspect, in some implementations of the ninth aspect, the second access device is further configured to send a third message to the AMF network element, where the third message is used to instruct a terminal device to move to the second access device, where the third message includes an identifier of the terminal device;
and the AMF network element receives the third message sent by the second access equipment, and sends the first message to the first access equipment after receiving the third message, wherein the first message comprises the identifier of the terminal equipment.
With reference to the ninth aspect, in some implementations of the ninth aspect, the identifier of the terminal device is one of the following identifiers:
an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
In a tenth aspect, a communications apparatus is provided that includes a processor. The processor is coupled to the memory and is operable to execute the instructions in the memory to implement the method of the first aspect and any one of the possible implementations of the first aspect or the method of the second aspect and one of the possible implementations of the second aspect. Optionally, the communication device further comprises a memory. Optionally, the communication device further comprises a communication interface, the processor being coupled to the communication interface.
In one implementation, the communication device is an access device. When the communication device is an access device, the communication interface may be a transceiver, or an input/output interface.
In another implementation, the communication device is a chip configured in the access device. When the communication device is a chip configured in the access device, the communication interface may be an input/output interface.
Alternatively, the transceiver may be a transmit-receive circuit. Alternatively, the input/output interface may be an input/output circuit.
In an eleventh aspect, a communications apparatus is provided that includes a processor. The processor is coupled to the memory and is configured to execute instructions in the memory to implement the method of any one of the above-mentioned possible implementations of the third aspect and the third aspect or the method of one of the possible implementations of the second aspect and the second aspect. Optionally, the communication device further comprises a memory. Optionally, the communication device further comprises a communication interface, the processor being coupled to the communication interface.
In one implementation, the communication device is an AMF network element. When the communication device is an AMF network element, the communication interface may be a transceiver, or an input/output interface.
In another implementation, the communication device is a chip configured in the AMF network element. When the communication device is a chip configured in the AMF network element, the communication interface may be an input/output interface.
Alternatively, the transceiver may be a transmit-receive circuit. Alternatively, the input/output interface may be an input/output circuit.
In a twelfth aspect, a communications apparatus is provided that includes a processor. The processor is coupled to the memory and is operable to execute the instructions in the memory to implement the method of any one of the possible implementations of the fourth aspect and the fourth aspect. Optionally, the communication device further comprises a memory. Optionally, the communication device further comprises a communication interface, the processor being coupled to the communication interface.
In one implementation, the communication device is a terminal device. When the communication device is a terminal device, the communication interface may be a transceiver, or an input/output interface.
In another implementation, the communication device is a chip configured in the terminal equipment. When the communication device is a chip configured in a terminal device, the communication interface may be an input/output interface.
Alternatively, the transceiver may be a transmit-receive circuit. Alternatively, the input/output interface may be an input/output circuit.
In a thirteenth aspect, a processor is provided, including: input circuit, output circuit and processing circuit. The processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor performs the method of any one of the possible implementations of the first to fourth aspects and the first to fourth aspects.
In a specific implementation process, the processor may be one or more chips, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, various logic circuits, and the like. The input signal received by the input circuit may be received and input by, for example and without limitation, a receiver, the signal output by the output circuit may be output to and transmitted by a transmitter, for example and without limitation, and the input circuit and the output circuit may be the same circuit that functions as the input circuit and the output circuit, respectively, at different times. The embodiment of the present application does not limit the specific implementation manner of the processor and various circuits.
In a fourteenth aspect, a processing apparatus is provided that includes a processor and a memory. The processor is configured to read instructions stored in the memory, and may receive a signal via the receiver and transmit a signal via the transmitter to perform the method of any one of the possible implementations of the first to fourth aspects and the first to fourth aspects.
Optionally, the number of the processors is one or more, and the number of the memories is one or more.
Alternatively, the memory may be integral to the processor or provided separately from the processor.
In a specific implementation process, the memory may be a non-transient memory, such as a Read Only Memory (ROM), which may be integrated on the same chip as the processor, or may be separately disposed on different chips.
It will be appreciated that the associated data interaction process, for example, sending the indication information, may be a process of outputting the indication information from the processor, and receiving the capability information may be a process of receiving the input capability information from the processor. In particular, data output by the processor may be output to a transmitter and input data received by the processor may be from a receiver. The transmitter and receiver may be collectively referred to as a transceiver, among others.
The processing means in the above fourteenth aspect may be one or more chips. The processor in the processing device may be implemented by hardware or may be implemented by software. When implemented in hardware, the processor may be a logic circuit, an integrated circuit, or the like; when implemented in software, the processor may be a general-purpose processor implemented by reading software code stored in a memory, which may be integrated with the processor, located external to the processor, or stand-alone.
In a fifteenth aspect, a computer program product is provided, the computer program product comprising: a computer program (which may also be referred to as code, or instructions), which when executed, causes a computer to perform the method of any one of the possible implementations of the first to fourth aspects and the first to fourth aspects described above.
In a sixteenth aspect, a computer-readable medium is provided, which stores a computer program (which may also be referred to as code or instructions) that, when executed on a computer, causes the computer to perform the method of any one of the possible implementations of the first to fourth aspects and the first to fourth aspects.
Drawings
Fig. 1 is a network architecture suitable for use with embodiments of the present application.
Fig. 2 is an exemplary flowchart illustrating a network slice-based data transmission method provided by an embodiment of the present application.
Fig. 3 is another exemplary flowchart illustrating a network slice-based data transmission method provided in an embodiment of the present application.
Fig. 4 is a schematic block diagram of an example of a device for wireless communication applied to the embodiment of the present application.
Fig. 5 is a schematic configuration diagram of an example of a terminal device applied to the embodiment of the present application.
Fig. 6 is a schematic configuration diagram of an example of an access device applied to the embodiment of the present application.
Fig. 7 is a schematic structural diagram of an AMF network element suitable for use in the embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a network architecture suitable for use with embodiments of the present application. As shown in fig. 1, each part involved in the network architecture is described below.
1. User Equipment (UE) 110: a user device can also be called a terminal device, access terminal, subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or user equipment. The terminal device in the embodiment of the present application may be a mobile phone (mobile phone), a tablet (pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in self driving (self driving), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation security (transportation security), a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart home), a cellular phone, a cordless phone, a session initiation protocol (session initiation protocol, SIP) phone, a wireless local loop (wireless local area, PDA) station, a personal digital assistant (wldigital assistant), a handheld wireless communication device with a wireless transceiving function, and a handheld personal communication device with a wireless communication function, A computing device or other processing device connected to a wireless modem, an in-vehicle device, a wearable device, a terminal device in a 5G network or a terminal device in a Public Land Mobile Network (PLMN) for future evolution, etc.
Wherein, wearable equipment also can be called as wearing formula smart machine, is the general term of using wearing formula technique to carry out intelligent design, developing the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device has full functions and large size, and can realize complete or partial functions without depending on a smart phone, for example: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
In addition, the terminal device may also be a terminal device in an internet of things (IoT) system. The IoT is an important component of future information technology development, and is mainly technically characterized in that articles are connected with a network through a communication technology, so that an intelligent network with man-machine interconnection and object interconnection is realized.
It should be understood that the present application is not limited to the particular form of the terminal device.
2. (radio access network, (R) AN) 120: the access network device may also be referred to as AN access device, (R) the AN is capable of managing radio resources, providing access services for the user equipment, and completing forwarding of user equipment data between the user equipment and the core network, and (R) the AN may also be understood as a base station in a conventional network.
The access network device in the embodiment of the present application may be any communication device with a wireless transceiving function for communicating with the user equipment. The access network devices include, but are not limited to: evolved Node B (eNB), Radio Network Controller (RNC), Node B (NB), Base Station Controller (BSC), Base Transceiver Station (BTS), home base station (home enodeb, HeNB, or home Node B, HNB), baseBand unit (BBU), Access Point (AP), wireless relay Node, wireless backhaul Node, Transmission Point (TP), or Transmission and Reception Point (TRP) in a wireless fidelity (WIFI) system, and the like, and may also be 5G, such as NR, a gbb in a system, or a transmission point (TRP or TP), one or a group of base stations in a 5G system may include multiple antennas, or may also constitute a network panel, such as a network panel, or a baseBand Node (NB), or a Distributed Unit (DU), etc.
In some deployments, the gNB may include Centralized Units (CUs) and DUs. The gNB may also include an Active Antenna Unit (AAU). The CU implements part of the function of the gNB and the DU implements part of the function of the gNB. For example, the CU is responsible for processing non-real-time protocols and services, and implementing functions of a Radio Resource Control (RRC) layer and a Packet Data Convergence Protocol (PDCP) layer. The DU is responsible for processing a physical layer protocol and a real-time service, and implements functions of a Radio Link Control (RLC) layer, a Medium Access Control (MAC) layer, and a Physical (PHY) layer. The AAU implements part of the physical layer processing functions, radio frequency processing and active antenna related functions. The information of the RRC layer is generated by the CU, and is finally converted into PHY layer information through PHY layer encapsulation of the DU, or converted from information of the PHY layer. Thus, under this architecture, higher layer signaling, such as RRC layer signaling, may also be considered to be sent by the DU, or by the DU + AAU. It is to be understood that the access network device may be a device comprising one or more of a CU node, a DU node, an AAU node. In addition, the CU may be divided into access network devices in an access network (RAN), or may be divided into access network devices in a Core Network (CN), which is not limited in this application.
3. The user plane network element 130: for packet routing and forwarding, quality of service (QoS) handling of user plane data, etc.
In the 5G communication system, the user plane network element may be a User Plane Function (UPF) network element. In a future communication system, the user plane network element may still be a UPF network element, or may also have another name, which is not limited in this application.
4. Data network element 140: for providing a network for transmitting data.
In the 5G communication system, the data network element may be a Data Network (DN) element. In future communication systems, the data network element may still be a DN element, or may also have another name, which is not limited in this application.
5. The access management network element 150: the present invention is mainly used for mobility management, access management, and the like, and may be used for implementing functions other than session management in a Mobility Management Entity (MME) function, for example, functions such as lawful interception and access authorization/authentication.
In the 5G communication system, the access management network element may be an access and mobility management function (AMF). In future communication systems, the access management network element may still be an AMF, or may also have another name, which is not limited in this application.
6. Session management network element 160: the method is mainly used for session management, Internet Protocol (IP) address allocation and management of the user equipment, selection of a termination point capable of managing a user plane function, a policy control and charging function interface, downlink data notification and the like.
In the 5G communication system, the session management network element may be a Session Management Function (SMF) network element. In future communication systems, the session management network element may still be an SMF network element, or may also have another name, which is not limited in this application.
7. Policy control network element 170: the unified policy framework is used for guiding network behavior, providing policy rule information for control plane function network elements (such as AMF, SMF network elements and the like), and the like.
In the 4G communication system, the policy control network element may be a Policy and Charging Rules Function (PCRF) network element. In a 5G communication system, the policy control network element may be a Policy Control Function (PCF) network element. In future communication systems, the policy control network element may still be a PCF network element, or may also have another name, which is not limited in this application.
In the 5G communication system, the application network element may be a Network Slice Selection Function (NSSF) network element. In future communication systems, the application network element may still be an NSSF network element, or may also have another name, which is not limited in this application.
It should also be understood that fig. 1 is only an example and should not be taken as limiting the scope of the present application. The data transmission method based on network slices provided by the embodiment of the present application may also relate to a network element not shown in fig. 1.
Further, the AMF network element may be abbreviated as AMF, the SMF network element may be abbreviated as SMF, and the UPF network element may be abbreviated as UPF. That is, AMFs described later in this application may be replaced with access management network elements, UDMs may be replaced with data management network elements, SMFs may be replaced with session management network elements, and UPFs may be replaced with user plane network elements.
In the network architecture shown in fig. 1, the user equipment is connected to the AMF through an N1 interface, the RAN is connected to the AMF through an N2 interface, and the RAN is connected to the UPF through an N3 interface. The UPFs are connected through an N9 interface, and are interconnected through an N6 interface DN. The SMF controls the UPF via the N4 interface. The AMF interfaces with the SMF through an N11 interface. .
It should be understood that the network architecture applied to the embodiment of the present application is only an example, and the network architecture applied to the embodiment of the present application is not limited thereto, and any network architecture capable of implementing the functions of the network elements described above is applicable to the embodiment of the present application.
For example, in some network architectures, network function network element entities such as AMF, SMF network element, PCF network element, and the like are all called Network Function (NF) network elements; or, in other network architectures, a set of network elements such as AMF, SMF network element, PCF network element, etc. may all be referred to as a control plane functional network element.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: global system for mobile communications (GSM) systems, Code Division Multiple Access (CDMA) systems, Wideband Code Division Multiple Access (WCDMA) systems, General Packet Radio Service (GPRS), long term evolution (long term evolution, LTE) systems, LTE frequency division duplex (frequency division duplex, FDD) systems, LTE Time Division Duplex (TDD), universal mobile telecommunications system (universal mobile telecommunications system, UMTS), Worldwide Interoperability for Microwave Access (WiMAX) communication systems, future fifth generation (5G) or new radio Vehicle (NR) systems, wherein the GSM systems, CDMA systems, WCDMA systems, GPRS systems, WCDMA systems, GPRS systems, LTE systems, wlan systems, future generation (5G) or new NR systems (362-34V 52, 3652, V-V systems, w 2, w systems, w 2, w systems, w 2, w systems, w 2, w systems, V2V), Vehicle to infrastructure (V2I), Vehicle to pedestrian (V2P), etc., Long Term Evolution (Long Term Evolution-Vehicle) for Vehicle-to-Vehicle communication, LTE-V) for Vehicle networking, Machine Type Communication (MTC), Internet of Things (Internet of Things, IoT), Long Term Evolution (Long Term Evolution-Machine) for Machine-to-Machine communication, LTE-M, Machine to Machine (Machine to Machine, M2M), etc.
The system of the embodiment of the application comprises at least one terminal device, at least two access network devices and at least one AMF network element.
In addition, in order to facilitate understanding of the embodiments of the present application, the following description is made.
First, the first, second and various numerical numbers and letter numbers in the embodiments shown below are merely for convenience of description and are not intended to limit the scope of the embodiments of the present application. For example, different preset correspondences are distinguished.
Second, in the embodiments shown below, "preset" may include signaling by the network device or predefined, e.g., protocol definition. The "predefined" may be implemented by saving a corresponding code, table, or other means that can be used to indicate the relevant information in advance in the device (for example, including the user equipment and the network device), and the present application is not limited to the specific implementation manner.
Third, the "protocol" referred to in the embodiments of the present application may refer to a standard protocol in the communication field, and may include, for example, an LTE protocol, an NR protocol, and a related protocol applied in a future communication system, which is not limited in the present application.
The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
In the present application, a source access device, which is a terminal device that transmits a packet of a network slice #1 (i.e., an example of a first network slice), for example, the access device #1 (i.e., an example of a first access device) stops receiving or transmitting the packet of the terminal device in the network slice #1 when the access device #1 (i.e., an example of a first message) receives a message #1 (i.e., an example of a first message), where the message #1 is used to instruct the terminal device to move to a device other than the access device # 1. The access device #1 and the terminal device agree that the terminal device cannot receive the packet of the network slice #1 transmitted from the access device #1 or cannot transmit the packet of the network slice #1 to the access device #1 because the terminal device leaves the access device # 1. When receiving the message #1, the access device #1 stops sending or receiving the data packet of the terminal device in the network slice #1, so that the transmission efficiency of air interface resources can be improved, and the situation that the time delay and reliability requirements of the service cannot be met due to the loss of the data packet is avoided. In this application, the identifier of the network slice includes, but is not limited to, a single network slice selection assistance information (S-NSSAI), or a slice subnet instance identifier (NSSI), or an enterprise tenant identifier such as a slice identifier (SD), or a slice/service type (SST), or other identifiers corresponding to the slice.
Fig. 2 illustrates an exemplary flowchart of a method for wireless communication provided by an embodiment of the present application.
S210, the terminal device communicates with the access device #1 based on the network slice # 1.
In one embodiment, the access device #1 broadcasts configuration information of the network slice #1, for example, configuration information of a Data Radio Bearer (DRB) dedicated to the network slice #1, and the terminal device performs related configuration of the network slice #1 after receiving the configuration information. And transmits an uplink packet to the access device based on the configuration information of the network slice # 1. After receiving the uplink data packet, the access device #1 determines the network slice #1 according to one or more of a logical channel identifier, a DRB identifier, or an uplink resource for transmitting the uplink data packet included in the data packet. Then, the access device #1 sends the uplink data packet to a User Plane Function (UPF) network element through a user plane tunnel dedicated to the network slice #1 established by the access device #1 and the UPF network element, so that the UPF identifies which network slice the uplink data packet belongs to according to the user plane tunnel. Or the uplink data packet is sent to the UPF network element through a public user plane tunnel established by the access device #1 and the user plane function UPF network element, and a user plane tunnel header, such as a user GPRS tunneling protocol user (GTP-U) header, contains an identifier of the network slice #1, so that the UPF identifies which network slice the uplink data packet belongs to according to the user plane tunnel. In addition, the access device #1 obtains an air interface identifier (e.g., a cell radio network temporary identifier (C-RNTI)) of the terminal device on the RAN side through reporting by the terminal device or allocating by the access device #1, or an inactive state (I-RNTI) allocated when the UE enters an RRC inactive state (RRC inactive state), and the access device #1 may subsequently identify the terminal device according to an uplink resource allocated to the terminal device and a mapping relationship between the uplink resource and the air interface identifier (hereinafter referred to as a first identifier of the terminal device) of the terminal device on the RAN side, where the access device #1 records an identifier (an IP address or a MAC address, or other terminal device identifiers that can be identified by a network element of the core network) of the terminal device carried in an uplink data packet sent by the terminal device, subsequently referred to as the second identifier of the terminal device), obtaining a mapping relationship between the first identifier and the second identifier of the terminal device. The UPF network element maps the second identifier of the terminal device with the identifier of the access device #1, and when a downlink data packet of the terminal device arrives in the network slice #1, the UPF network element sends the downlink data packet to the access device #1 through the dedicated tunnel of the network slice #1 according to the mapping relationship between the second identifier of the terminal device and the access device #1 (or sends the downlink data packet to the access device #1 through the public user plane tunnel and includes the identifier of the network slice #1 in the user plane tunnel header), and the access device #1 sends the downlink data packet to the terminal device according to the mapping relationship between the second identifier of the terminal device and the first identifier of the terminal device. The communication between the terminal device and the network device based on the network slice #1 is realized through the above mode.
S220, the terminal device sends a message a to the access device #1, instructing the terminal device to move to a device other than the access device # 1.
S230, the access device #1 stops sending the data packet in the network slice #1 to the terminal device after receiving the message a sent by the terminal device.
In the embodiment of fig. 2, the message #1 is a message a, and the access device #1 determines that the terminal device will leave the access device #1 according to the message a sent by the terminal device, that is, determines that the terminal device will move to a device other than the access device # 1.
For example, when the terminal device determines through measurement that the quality of service of the cell #2 of the access device #2 is good and decides to communicate through the cell #2, the terminal device transmits a message a to the access device #1 to notify the access device #1 that the terminal device will move to an access device other than the access device # 1.
It should be noted that, in this application, moving a terminal device to an access device may be understood as moving the terminal device into a coverage area of the access device, or moving the terminal device into a cell of the access device, or moving the terminal device to the access device so that the access device can provide a service for the terminal device, but the application is not limited thereto.
By way of example and not limitation, the protocol specifies a measurement event that triggers the terminal device to send message a to access device # 1.
Optionally, the measurement event is that the terminal device measures that a value of a parameter a of a reference signal of an access device other than the access device #1 is higher than a preset threshold value. The reference signal may be a cell-specific reference signal (CRS), a channel state information reference signal (CSI-RS), but the present application is not limited thereto, and the parameter a may be one or more of a Reference Signal Reception Quality (RSRQ), a Reference Signal Reception Power (RSRP), a Received Signal Strength (RSSI), or a signal to interference plus noise ratio (SINR).
When the access device #1 receives the message a transmitted from the terminal device, if it is determined that the terminal device leaves the access device #1, that is, if it is determined that the terminal device will move to a device other than the access device #1, the access device #1 stops transmitting or receiving the data packet of the terminal device of the network slice # 1. Where message a may be contained in a MAC layer subheader or RLC layer header or PHY layer header.
Optionally, the access device #1 deletes the context (UE context) of the terminal device, e.g., deletes the C-RNTI assigned to the terminal device.
In this scenario, message a may include, but is not limited to, the following indications:
in mode 1, the message a is a sequence a, which is used to instruct the terminal device to move to a device other than the access device # 1.
For example, the system preset or protocol provides that when the terminal device decides to move to a device other than access device #1, it sends sequence a to access device #1, and access device #1 receives the sequence a, determines that the terminal device will leave access device #1, that is, determines that the terminal device will move to a device other than access device #1, and then access device #1 stops sending or receiving packets for the terminal device in network slice # 1.
Mode 2, the message a includes a 1-bit reserved field, and when the 1-bit reserved field is set to a predetermined value, the terminal device notifies the access device #1 that the terminal device will leave the access device #1, that is, the terminal device will move to a device other than the access device # 1.
For example, if the 1-bit reserved field is set to "1", it indicates that the terminal device will leave the access device #1, and when the terminal device decides to move to a device other than the access device #1, the 1-bit reserved field set to "1" is transmitted to the access device #1, and when the access device #1 receives the 1-bit reserved field set to "1", it determines that the terminal device will leave the access device #1, and stops transmitting or receiving the packet of the terminal device in the network slice # 1.
In the method 3, the message a includes an identifier of the access device #2 or an identifier of the cell #2, where the message a is specifically used to indicate that the terminal device will move to the access device or the cell, and the cell #2 is a cell serving the terminal device in the access device # 2.
The access device #1 determines the target access device to which the terminal device specifically moves, i.e. the access device #2, according to the identifier included in the message a.
By way of example and not limitation, the identity of cell #2 is a global identity (CGI) or a Physical Cell Identity (PCI).
In this scheme, after receiving the message a sent by the terminal device, the access device #1 may include the following two possible embodiments:
may be one
S240, the access device #1 transmits the data packet of the terminal device in the network slice #1 to the access device # 2.
In one embodiment, the possible mode 3 may be implemented in combination with the message a, that is, the access device #1 determines that the terminal device will move to the access device #2 after receiving the message a, so that the access device #1 sends the access device #2 a data packet to be received by the terminal device in the network slice #1, where the data packet includes a downlink data packet belonging to the network slice #1 that the access device #1 has not yet arrived at and is sent to the terminal device, and may also include a downlink data packet belonging to the network slice #1 that the access device #1 has not received an acknowledgement and is sent to the terminal device.
Access device #1 may transmit the data packet of the terminal device through the Xn interface or the X2 interface with access device # 2.
By way of example and not limitation, access device #1 transmits a packet for the terminal device in network slice #1 to access device #2 through a data forwarding tunnel between access device #1 and access device # 2.
Optionally, the data forwarding tunnel is a data forwarding tunnel dedicated to network slice #1 between access device #1 and access device # 2.
For example, a data forwarding tunnel a dedicated to network slice #1 is established between access device #1 and access device #2, a mapping relationship is established between a tunnel identifier of the tunnel a and an identifier of the network slice #1, when the access device #1 transmits a packet of the terminal device through the tunnel a, the access device #2 determines that the data is a packet of the network slice #1 according to the tunnel a for transferring the packet, and the access device #2 can transmit or receive the packet of the terminal device according to the configuration information of the network slice # 1. The tunnel identifier may be a Tunnel Endpoint Identifier (TEID), but the present application is not limited thereto. In addition, after receiving the data packet, the access device #2 may determine the first identifier of the terminal device according to the second identifier of the terminal device carried in the data packet and the mapping relationship between the first identifier and the second identifier of the terminal device. And finally, sending the data packet to the terminal equipment through an air interface according to the first identifier of the terminal equipment.
Optionally, when the access device #1 sends the data packet of the terminal device to the access device #2, the user plane tunnel header of the data packet includes an identifier of the network slice # 1.
The access device #1 informs the access device #2 of the data packet being the data packet of the network slice #1 through the identifier of the network slice #1 included in the tunnel header, the access device #2 determines the data packet being the data packet of the network slice #1 according to the identifier of the network slice #1 in the tunnel header, and thereafter, the access device #2 may transmit or receive the data packet of the terminal device according to the configuration information of the network slice # 1.
For example, the access device #1 transmits a packet of the terminal device to the access device #2 by establishing a common data transfer tunnel B with the access device #2, where the data transfer tunnel B is used for transferring the packet between the access device #1 and the access device #2, and since the tunnel B is a common data transfer tunnel, the access device #2 cannot yet determine a network slice to which the packet belongs from the tunnel B, and after the access device #2 reads an identifier of the network slice carried in a tunnel header, the access device #2 can determine that the packet is a packet of the network slice # 1.
By way of example and not limitation, the second identifier of the terminal device is included in the data packet of the terminal device in the network slice #1 sent by the access device #1 to the access device # 2.
The access device #2 determines the first identifier of the corresponding terminal device according to the second identifier of the terminal device, thereby determining that the data packet in the network slice #1 is the data packet of the terminal device.
By way of example and not limitation, the second identifier of the terminal device is one of an Internet Protocol (IP) address and/or a Media Access Control (MAC) address, a Globally Unique Temporary Identifier (GUTI), a Temporary Mobile Subscriber Identifier (TMSI), an International Mobile Subscriber Identity (IMSI), and a subscriber permanent identifier (SUPI).
Optionally, the data packet of the terminal device in the network slice #1 sent by the access device #1 to the access device #2 further includes an index corresponding to the second identifier of the terminal device.
For example, when the access device #1 sends the first data packet of the terminal device in the network slice #1 to the access device #2, the data packet includes the second identifier of the terminal device and the index value corresponding to the second identifier of the terminal device, so as to notify the access device #2 of the index value corresponding to the second identifier of the terminal device or the terminal device. Or the access device #1 sends a notification message to the access device #2, where the notification message includes the second identifier of the terminal device and an index value corresponding to the second identifier of the terminal device. When the access device #1 sends the other data packet of the terminal device in the network slice #1 to the access device #2 later, the index value corresponding to the second identifier of the terminal device is included, and the second identifier of the terminal device (for example, any one of an IP header, a MAC header, or an ethernet packet header) is not included, so that overhead can be saved and resource utilization rate can be improved.
May be two
S240, the access device #1 sends a message B to an access and mobility management function (AMF) network element, where the message B is used to notify the AMF network element that the terminal device moves to a device other than the access device # 1.
One possible scenario is that only the second identity of the terminal device (or other identities of the terminal device, so that the AMF determines the second identity of the terminal device) is contained in message B; another possible scenario is that the message B includes, in addition to the second identifier of the terminal device, an identifier of an access device #2 or an identifier of a cell #2, where the cell #2 is a cell of the access device #2 that provides a service for the terminal device; another possible scenario is that the message B contains, in addition to the 2 identifiers described above, an identifier of network slice #1, and a Sequence Number (SN) of the data packet a. The data packet a is the last data packet belonging to the terminal device in the network slice #1 received by the access device # 1. For example, the access device #1 and the UPF pass the data packets of the network slice #1 through the N3 interface, and each data packet includes an N3SN number, and the N3SN number is the SN number of the data packet belonging to the terminal device in the network slice #1 at the N3 interface. The message B sent by the access device #1 to the AMF includes the N3SN number of the packet a, that is, the SN number of the last packet belonging to the terminal device in the network slice #1 received by the access device #1 on the N3 interface, for example, N3SN of the packet a is 100. Then N3SN of the packet belonging to the end device in network slice #1 that the UPF has not yet communicated to access device #1 is 101 (i.e., the next packet of packet a). So that the UPF knows the identifier of network slice #1, the number N3SN of the packet a and the identifier of the terminal device in S270, it can determine from which packet the packet of the terminal device is to be delivered to the access device # 2. For example, if N3SN of packet a is 100, the UPF determines to transfer the packet of the terminal device to access device #2 starting from the packet of N3SN is 101. It should be noted that, after the N3SN of the packet a is 100 and the N3SN of the next packet of the packet a is 101, both are the packet SN numbers of the N3 interface between the access device #1 and the UPF, and the UPF determines the packet belonging to the terminal device in the network slice #1 to be sent according to the N3SN number of the packet a, the packet SN number of the N3 interface between the UPF and the access device #2, such as 0 or 180, is used when sending the packet through the N3 interface between the UPF and the access device # 2.
And S250, after receiving the message B, the AMF network element determines the SMF network element according to the message B and the identifier of the access equipment # 1.
S260, the AMF network element notifies the SMF network element of the second identifier of the terminal device (or other identifiers of the terminal device, so that the UPF determines the second identifier of the terminal device), the identifier of the access device #2, or the identifier of the cell # 2. Optionally, the AMF network element notifies the SMF network element of the network slice identifier and the SN number of the data packet a.
The identifier of the access device (e.g., access device #1 and/or access device #2) may be a global gbb identifier (global gbb ID) or an IP address or a MAC address of the access device, but is not limited thereto.
S270, the SMF network element receives the second identifier of the terminal device from the SMF network element, and notifies the UPF network element of the second identifier of the terminal device (or another identifier of the terminal device, so that the UPF determines the second identifier of the terminal device), the identifier of the access device #2, or the identifier of the cell # 2.
Optionally, the SMF network element informs the UPF network element of the identity of network slice #1, and the sequence SN number of packet a.
The message B is specifically used to notify the AMF device that the terminal device moves to the access device # 2. In S250, the AMF network element determines, according to the identifier of the network slice #1 and the access device #1, a UPF network element (i.e., a UPF network element that sends the data packet in the network slice #1 to the access device # 1), and determines an SMF network element corresponding to the UPF network element, and after receiving the message B, the AMF network element determines that the terminal device moves from the access device #1 to the access device # 2. In S260, S270, the SMF network element notifies the UPF network element that the terminal device moves to the access device #2, so that the UPF network element switches from the access device #1 to the access device #2 to send the network slice #1 data packet to the terminal device.
In the present application, one or more network slices #1 may be included between the access device #1 and the terminal device.
For example, when only one network slice #1 is included between the access device #1 and the terminal device, the message B may be represented as follows:
message B
Second identification of the terminal device (e.g. IP/MAC address)
> > identification of Access device #2, or alternatively, identification of cell #2
< identification of network slice #1 (optional)
< SN number of packet (optional)
Here, ">" represents a certain level of information in the message B, "> > >" is ">" the next level of information, for example, ">" is the first level of information of the message B, the message B informs the terminal device of the mobile other network device through the second identifier of the terminal device, and further indicates the identifier of the access device to which the terminal device moves through the next level of information, and optionally, the identifier of the network slice of the data packet of the terminal device, and the SN number of the data packet.
As another example, when one or more network slices #1 are included between access device #1 and the terminal device, message B may include, but is not limited to, the following information elements:
message B
Second identification of the terminal device (e.g. IP/MAC address)
> > identification of Access device #2, or alternatively, identification of cell #2
< network slice List >
> > identification of network slice (optional)
> > SN number of packet (optional)
Here, "> > > > > > >", that is, the identifier (optional) of the network slice, and the identifier (optional) of the network slice are all next level information of a network slice list, that is, next level information of the second identifier of the terminal device includes the identifier of the access device #2 or the identifier information of the cell #2 to which the terminal device moves, and network slice list information, where the next level of the network slice list specifically lists the identifier of the network slice including the data packet of the terminal device, and the SN number of the data packet.
By way of example and not limitation, the SN number of the packet in the message B is the SN number of the packet a, and the packet a is the last packet belonging to the terminal device in the network slice #1 received by the access device # 1.
After receiving the message a, the access device #1 determines that the terminal device leaves the access device #1, and then the access device #1 sends a message B to the AMF network element, so as to notify the UPF network element that the terminal device has left the access device #1 through the AMF network element and the SMF network element, or notify the UPF network that the terminal device has connected to the access device # 2. In addition, the AMF determines the sequence number of the last packet belonging to the terminal device in the network slice #1 according to the message B, so as to inform the UPF network element which packet of the network slice #1 to start transmitting. The method can avoid the loss of the data packet of the terminal equipment in the moving process, and meets the requirements of time delay and reliability of the service.
For example, when only one network slice #1 is included between the access device #1 and the terminal device, the message B may include, but is not limited to, the following form:
message B
' second identification of the terminal device (e.g. IP/MAC address)
Identification of network slice #1 (optional)
< SN number of packet (optional)
As another example, when one or more network slices are included between access device #1 and the terminal device, message B may include, but is not limited to, the following information elements:
message B
Second identification of the terminal device (e.g. IP/MAC address)
< network slice List >
> > identification of network slice (optional)
> > SN number of packet (optional)
When the message B includes both the identifier of the access device #2 or the identifier of the cell #2 and the SN number of the data packet a, the message B is in the following form:
for example, when only one network slice #1 is included between the access device #1 and the terminal device, the message B may be represented as follows:
message B
Second identification of the terminal device (e.g. IP/MAC address)
> > identification of Access device #1, or alternatively, identification of cell #2
< identification of network slice #1 (optional)
< SN number of packet (optional)
As another example, when one or more network slices are included between access device #1 and the terminal device, message B may include, but is not limited to, the following information elements:
message B
Second identification of the terminal device (e.g. IP/MAC address)
> > identification of Access device #1, or alternatively, identification of cell #2
< network slice List >
> > identification of network slice (optional)
> > SN number of packet (optional)
By way of example and not limitation, the above two possible implementations, namely one or two, may be implemented separately or in combination. That is, the message a includes the identifier of the access device #2 or the identifier of the cell #2, the access device #1 determines, according to the message a, that the terminal device will move to the access device #2, the access device #1 determines whether an X2 or Xn interface is established with the access device #2, and in the case that an X2 interface or Xn interface is established between the access device #1 and the access device #2, the access device #1 executes S240 in the first possibility, that is, transmits a data packet to the access device #2 through an X2 interface or an Xn interface, and the access device #1 executes S240 in the second possibility, that is, transmits a message B to the AMF network element, and notifies the AMF network element that the terminal device moves to the access device #2, so that the AMF network element notifies the UPF network element to transmit the data packet belonging to the terminal device in the network slice #1 to the terminal device through the access device # 2; in case no X2 or Xn interface is established between access device #1 and access device #2, access device #1 performs S240, possibly two, i.e. sends message B to the AMF network element.
Fig. 3 illustrates another exemplary flowchart of a method of wireless communication provided by an embodiment of the present application.
It should be noted that, in the embodiment of fig. 3, the same or similar contents to those in the embodiment of fig. 2 may refer to the description and the description of fig. 2, and are not repeated herein for brevity. The following describes the portions of the embodiment of fig. 3 that differ from the embodiment of fig. 2.
S310, the terminal device and the access device #1 communicate based on the network slice # 1.
S320, the terminal device sends an uplink data packet B to the access device #2, where the data packet B includes the second identifier of the terminal device. Access device #2 receives uplink packet B.
The terminal device moves to a cell #2 of the access device #2 from the access device #1 and then sends a data packet B to the access device #2, wherein the data packet B comprises a second identifier of the terminal device, and the access device #2 determines that the terminal device moves to the access device #2 according to the received second identifier of the terminal device in the data packet B. After the access device #2 determines that the terminal device moves to the access device #2, the scheme includes the following two possible implementation manners:
may be one
S330, the access device #2 sends a message C (i.e., an example of the third message) to the access device that has established the X2 or Xn interface with the access device #2, where the message C may be used to indicate that the terminal device has come to the access device #2, and the message C may include the second identifier of the terminal device. Optionally, the terminal device further sends the identifier of access device #1 or the identifier of cell #1 to access device #2, where cell #1 is the cell serving the terminal device under access device # 1. At this time, the access device #2 may determine the access device #1 directly according to the identity of the cell #1 or the identity of the access device #1, thereby transmitting the message C to the access device #1 through the X2 or the Xn interface.
S340, after the access device #1 receives the message C sent by the access device #2, confirms that the packet of the network slice #1 belonging to the terminal device is stored.
The access device #2 determines that the terminal device moves to the access device #2, then sends a message C including a terminal device identifier to the access device with which the X2 or Xn interface is established, notifies the access device with which the interface connection is established to move to the access device #2 through the message C, and the access device that receives the message C, for example, the access device #1, confirms whether a packet belonging to the network slice #1 of the terminal device is stored according to the second identifier information of the terminal device.
After the access device #1 identifies that the packet belonging to the network slice #1 of the terminal device is stored, the packet of the terminal device in the network slice #1 is transmitted to the access device #2 through the data transfer tunnel. For a specific implementation process of forwarding the data packet from the access device #1 to the access device #2, reference may be made to the description of forwarding the data packet from the access device #1 to the access device #2 in fig. 2, and for brevity, no further description is given here.
May be two
S330, the access device #2 sends a message D (i.e. another instance of the third message) to the AMF network element, where the message D includes the second identity of the terminal device (or other identity of the terminal device, so that the AMF determines the second identity of the terminal device). The AMF network element receives message D from access device # 2.
S340, the AMF network element sends a message E to the access device #1, where the message E includes the second identifier of the terminal device.
After determining that the terminal device moves to the access device #2, the access device #2 notifies the AMF network element of the movement of the terminal device to the access device #2 through the message D, and the AMF network element sends a message E to the access device #1 after receiving the message D to notify the access device #1 that the terminal device moves to a device other than the access device # 1.
The sending of the message E from the AMF network element to the access equipment #1 includes the following two forms:
the first form: and the AMF network element sends a message E to the access equipment which establishes an NG interface with the AMF network element.
And the AMF network element sends a message E to the access equipment establishing the NG interface with the AMF network element after receiving the message D, so that the access equipment establishing the NG interface with the AMF network element confirms whether the data packet of the network slice #1 of the terminal equipment is stored or not after receiving the message.
The second form: and the UPF network element informs the AMF network element of the mapping relation between the terminal equipment and the access equipment #1 through the SMF network element, and the AMF network element sends a message E to the access equipment #1 according to the identification of the terminal equipment and the mapping relation between the terminal equipment and the access equipment # 1.
It is assumed that when the UPF reports the identifier of the access device where the terminal device is currently located to the AMF, for example, the second identifier of the terminal device and the identifier of the corresponding access device are notified to the AMF. The UPF network element informs the AMF network element of the mapping relationship between the terminal device and the access device #1 through the SMF network element, so that the AMF network element may determine the access device #1 according to the identifier of the terminal device and the mapping relationship in the message D, and then send a message E to the access device #1 to inform the access device #1 that the terminal device moves to an access device other than the access device # 1.
By way of example and not limitation, the access device #1 sends a message B to the AMF network element after receiving the message E, where the message B is used to indicate the SN number of the data packet a in the network slice # 1.
After receiving the message B, the AMF network element notifies the UPF network element of the SN number of the data packet a of the terminal device in the network slice #1 through the SMF network element, so that the UPF network element determines to send the first data packet to be received by the terminal device in the network slice #1 to the access device # 2.
By way of example and not limitation, the message E also includes an identification of access device #2 or an identification of cell # 2.
By way of example and not limitation, the access device #1, upon receiving the message E, confirms that the packet belonging to the network slice #1 of the terminal device is stored, and transmits the packet of the terminal device in the network slice #1 to the access device #2 through the data transfer tunnel.
The access device #1 instructs the AMF network element to transmit a message B indicating the SN number of the data packet a in the network slice # 1. After receiving the message B, the AMF network element notifies the UPF network element of the data packet to be received by the terminal device in the network slice #1 through the SMF network element, so that the UPF network element determines to send the first data packet of the terminal device in the network slice #1 to the access device # 2.
In one embodiment, the two possible embodiments described above in the embodiment of fig. 3, i.e. possible one and possible two, may also be implemented in combination with each other.
For example, the access device #2 performs S330 of possible one, that is, after transmitting the message C to the access device having the X2 or Xn interface established with the access device #2, and the access device having the X2 or Xn interface established with the access device #2 receives the message C, performs S340 of possible one, that is, confirming whether the packet of the terminal device is saved, and transmits the feedback to the access device # 2. If receiving the data packet which stores the terminal device and is fed back by the access device #1 with the access device #2, executing S350 to complete the forwarding of the data packet; in the case that the access device having established the X2 or Xn interface with the access device #2 feeds back the data packet that does not store the terminal device, the access device #2 performs S330 in the second possibility, that is, sends the message D to the AMF network element, and implements forwarding of the data packet through S340, S350 in the second possibility.
For another example, the terminal device may further send the identifier of the access device #1 to the access device #2, the access device #2 determines whether an X2 or Xn interface is established with the access device #1 according to the identifier of the access device #1, and when determining that an X2 or Xn interface is established with the access device #1, the access device #2 performs S330 in the first possible case, that is, sends the message C to the access device #1, and receives the data packet sent by the access device #1 through S350 to complete the forwarding of the data packet; when determining that the X2 or Xn interface is not established with the access device #1, the access device #2 performs S330 in possibility two, i.e. sends the message D to the AMF network element, and implements forwarding of the data packet through S340, S350 in possibility two.
In another embodiment, the second possible embodiment in fig. 3 is implemented in combination with the embodiment in fig. 2.
That is, the terminal device performs S210 in fig. 2 to transmit the message a to the access device #1 before leaving the access device #1, and the access device #1 performs S230 to stop transmitting or receiving the packet of the network slice #1 after receiving the message a. After the terminal device moves to the access device #2, steps S310 and S320 in fig. 3 and steps S330 and S340 in the second possibility are completed, and after the access device #1 receives the message E, the access device # 240 sends the message B to the AMF network element and completes the subsequent steps, or after the access device #1 receives the message E under the condition that the message E includes the identifier of the access device #2 or the identifier of the cell #2, the access device #2 determines whether to execute the step S240 in the first possibility in fig. 2 to send the data packet of the terminal device in the network slice #1 to the access device #2 or execute the step S240 in the second possibility in fig. 2 to send the message B to the AMF network element according to whether the X2 or the Xn interface is established with the access device # 2.
The method provided by the embodiment of the present application is described in detail above with reference to fig. 2 and 3. Hereinafter, the apparatus provided in the embodiment of the present application will be described in detail with reference to fig. 4 to 7.
Fig. 4 is a schematic block diagram of a communication device provided in an embodiment of the present application. As shown in fig. 4, the communication device 1500 may include a processing unit 1510 and a transceiving unit 1520.
In one possible design, the communication apparatus 1500 may correspond to the access device #1 in the above method embodiment, and may be the access device #1, or a chip configured in the access device #1, for example.
It should be understood that the communication apparatus 1500 may correspond to the access device #1 in the methods 200, 300 according to the embodiments of the present application, and the communication apparatus 1500 may include a unit for performing the method performed by the access device #1 in the methods 200, 300 in fig. 2, 3. Also, the units in the communication apparatus 1500 and the other operations and/or functions described above are respectively for implementing the corresponding flows of the methods 200, 300 in fig. 2.
When the communication apparatus 1500 is configured to perform the method 200 in fig. 2, the transceiving unit 1520 may be configured to perform S220 and S240 in the method 200, and the processing unit 1510 may be configured to perform S210 and S230 in the method 200. When the communication device 1500 is configured to perform the method 300 in fig. 2, the transceiving unit 1520 is configured to perform S330, S340, and S350 in the method 300, and the processing unit 1510 is configured to perform S340 in the method 300. It should be understood that the specific processes of the units for executing the corresponding steps are already described in detail in the above method embodiments, and therefore, for brevity, detailed descriptions thereof are omitted.
It should also be understood that when the communication apparatus 1500 is the access device #1, the transceiving unit 1520 in the communication apparatus 1500 may correspond to the transceiver 3100 in the access device 3000 shown in fig. 6, and the processing unit 1510 in the communication apparatus 1500 may correspond to the processor 3202 in the access device 3000 shown in fig. 6.
It should also be understood that when the communication apparatus 1500 is the access device #1, the transceiving unit 1520 in the communication apparatus 1500 may be implemented by a communication interface (such as a transceiver or an input/output interface), for example, may correspond to the transceiver 3100 in the access device 3000 shown in fig. 6, the processing unit 1510 in the communication apparatus 1500 may be implemented by at least one processor, for example, may correspond to the processor 3202 in the access device 3000 shown in fig. 6, and the processing unit 1510 in the communication apparatus 1500 may also be implemented by at least one logic circuit.
Optionally, the communication apparatus 1500 may further include a processing unit 1510, and the processing unit 1510 may be configured to process instructions or data to implement the corresponding operations.
Optionally, the communication device 1500 may further include a storage unit, which may be used to store instructions or data, and the processing unit may call the instructions or data stored in the storage unit to implement the corresponding operations.
It should be understood that the specific processes of the units for executing the corresponding steps are already described in detail in the above method embodiments, and therefore, for brevity, detailed descriptions thereof are omitted.
In another possible design, the communication apparatus 1500 may correspond to the access device #2 in the above method embodiment, and may be, for example, the access device #2 or a chip configured in the access device # 2.
It should be understood that the communication apparatus 1500 may correspond to the access device #2 in the methods 200, 300 according to the embodiments of the present application, and the communication apparatus 1500 may include means for performing the methods performed by the access device #2 in the methods 200, 300 in fig. 2, 3. Also, the units in the communication apparatus 1500 and the other operations and/or functions described above are respectively for implementing the corresponding flows of the methods 200, 300 in fig. 2.
Wherein, when the communication device 1500 is configured to perform the method 200 in fig. 2, the transceiving unit 1520 is configured to perform S240 in the method 200. When the communication apparatus 1500 is used to execute the method 300 in fig. 2, the transceiving unit 1520 can be used to execute S330 and S350 in the method 300. It should be understood that, the specific processes of the units for executing the corresponding steps are already described in detail in the above method embodiments, and are not described herein again for brevity.
It is also understood that when the communication apparatus 1500 is the access device #2, the transceiving unit 1520 in the communication apparatus 1500 may correspond to the transceiver 3100 in the access device 3000 shown in fig. 6, and the processing unit 1510 in the communication apparatus 1500 may correspond to the processor 3202 in the access device 3000 shown in fig. 6.
It should also be understood that when the communication apparatus 1500 is the access device #2, the transceiving unit 1520 in the communication apparatus 1500 may be implemented by a communication interface (such as a transceiver or an input/output interface), for example, may correspond to the transceiver 3100 in the access device 3000 shown in fig. 6, the processing unit 1510 in the communication apparatus 1500 may be implemented by at least one processor, for example, may correspond to the processor 3202 in the access device 3000 shown in fig. 6, and the processing unit 1510 in the communication apparatus 1500 may also be implemented by at least one logic circuit.
Optionally, the communication apparatus 1500 may further include a processing unit 1510, and the processing unit 1510 may be configured to process instructions or data to implement the corresponding operations.
Optionally, the communication apparatus 1500 may further include a storage unit, which may be configured to store instructions or data, and the processing unit may call the instructions or data stored in the storage unit to implement corresponding operations.
It should be understood that the specific processes of the units for executing the corresponding steps are already described in detail in the above method embodiments, and therefore, for brevity, detailed descriptions thereof are omitted.
In another possible design, the communication apparatus 1500 may correspond to the AMF network element in the foregoing method embodiment, and may be, for example, the AMF network element or a chip configured in the AMF network element.
It should be understood that the communication apparatus 1500 may correspond to the AMF network element in the methods 200, 300 according to the embodiments of the present application, and the communication apparatus 1500 may include units for performing the methods performed by the AMF network element in the methods 200, 300 in fig. 2, 3. Also, the units and other operations and/or functions in the communication apparatus 1500 are respectively for realizing the corresponding flows of the methods 200, 300 in fig. 2, fig. 3.
When the communication apparatus 1500 is configured to perform the method 200 of fig. 2, the transceiver 1520 is configured to perform S240 and S260 of the method 200, and the processing unit 1510 is configured to perform S250 of the method 200. When the communication apparatus 1500 is configured to perform the method 300 of fig. 3, the transceiver 1520 is configured to perform S330 and S340 of the method 300. It should be understood that, the specific processes of the units for executing the corresponding steps are already described in detail in the above method embodiments, and are not described herein again for brevity.
It should also be understood that, when the communication apparatus 1500 is an AMF network element, the transceiver unit in the communication apparatus 1500 may correspond to the transceiver 4010 in the AMF network element 4000 shown in fig. 7, and the processing unit 1510 in the communication apparatus 1500 may correspond to the processor 4020 in the AMF network element 3000 shown in fig. 6.
Optionally, the communication apparatus 1500 may further include a processing unit 1510, and the processing unit 1510 may be configured to process instructions or data to implement the corresponding operations.
Optionally, the communication device 1500 may further include a storage unit, which may be used to store instructions or data, and the processing unit may call the instructions or data stored in the storage unit to implement the corresponding operations.
It should be understood that the specific processes of the units for executing the corresponding steps are already described in detail in the above method embodiments, and for brevity, detailed descriptions thereof are omitted here.
It should also be understood that when the communication device 1500 is an AMF network element, the transceiving unit 1520 in the communication device 1500 may be implemented by a communication interface (such as a transceiver or an input/output interface), for example, may correspond to the transceiver 4010 in the AMF network element 4000 shown in fig. 7, the processing unit 1510 in the communication device 1500 may be implemented by at least one processor, for example, may correspond to the processor 4020 in the AMF network element 4000 shown in fig. 7, and the processing unit 1510 in the communication device 1500 may be implemented by at least one logic circuit.
In another possible design, the communication apparatus 1500 may correspond to the terminal device in the above method embodiment, and may be the terminal device or a chip configured in the terminal device, for example.
It should be understood that the communication apparatus 1500 may correspond to the terminal device in the methods 200, 300 according to the embodiments of the present application, and the communication apparatus 1500 may include a unit for performing the methods performed by the terminal device in the methods 200, 300 in fig. 2, 3. Also, the units in the communication apparatus 1500 and the other operations and/or functions described above are respectively for implementing the corresponding flows of the methods 200, 300 in fig. 2.
When the communication device 1500 is configured to perform the method 200 in fig. 2, the transceiver 1520 is configured to perform S220 in the method 200, and the processing unit 1510 is configured to perform S210 in the method 200. When the communication device 1500 is configured to perform the method 300 of fig. 2, the transceiving unit 1520 may be configured to perform S320 of the method 300, and the processing unit 1510 may be configured to perform S310 of the method 300. It should be understood that the specific processes of the units for executing the corresponding steps are already described in detail in the above method embodiments, and therefore, for brevity, detailed descriptions thereof are omitted.
It is further understood that when the communications apparatus 1500 is a terminal device, the transceiver 1520 in the communications apparatus 1500 may correspond to the transceiver 2020 in the terminal device 2000 illustrated in fig. 5, and the processing unit 2010 in the communications apparatus 1500 may correspond to the processor 2010 in the terminal device 2000 illustrated in fig. 5.
It is to be further understood that when the communication apparatus 1500 is a terminal device, the transceiving unit 1520 in the communication apparatus 1500 can be implemented by a communication interface (e.g., a transceiver or an input/output interface), for example, corresponding to the transceiver 2020 in the terminal device 2000 shown in fig. 5, the processing unit 1510 in the communication apparatus 1500 can be implemented by at least one processor, for example, corresponding to the processor 2010 in the terminal device 2000 shown in fig. 5, and the processing unit 1510 in the communication apparatus 1500 can also be implemented by at least one logic circuit.
Optionally, the communication apparatus 1500 may further include a processing unit 1510, and the processing unit 1510 may be configured to process instructions or data to implement the corresponding operations.
Optionally, the communication device 1500 may further include a storage unit, which may be used to store instructions or data, and the processing unit may call the instructions or data stored in the storage unit to implement the corresponding operations.
It should be understood that the specific processes of the units for executing the corresponding steps are already described in detail in the above method embodiments, and therefore, for brevity, detailed descriptions thereof are omitted.
Fig. 5 is a schematic structural diagram of a terminal device 2000 according to an embodiment of the present application. The terminal device 2000 can be applied to the system shown in fig. 1, and performs the functions of the terminal device in the above method embodiment. As shown, the terminal device 2000 includes a processor 2010 and a transceiver 2020. Optionally, the terminal device 2000 further comprises a memory 2030. Wherein the processor 2010, the transceiver 2020, and the memory 2030 are interconnected via the interconnection path for communicating control and/or data signals, the memory 2030 is used for storing a computer program, and the processor 2010 is used for retrieving and executing the computer program from the memory 2030 to control the transceiver 2020 to transmit and receive signals. Optionally, the terminal device 2000 may further include an antenna 2040, configured to transmit uplink data or uplink control signaling output by the transceiver 2020 by using a wireless signal.
The processor 2010 and the memory 2030 may be combined into a processing device, and the processor 2010 is configured to execute the program codes stored in the memory 2030 to achieve the above functions. In particular, the memory 2030 may be integrated with the processor 2010 or may be separate from the processor 2010. The processor 2010 may correspond to the processing unit in fig. 4.
The transceiver 2020 may correspond to the transceiver unit in fig. 4. The transceiver 2020 may include a receiver (or receiver, receiving circuit) and a transmitter (or transmitter, transmitting circuit). Wherein the receiver is used for receiving signals, and the transmitter is used for transmitting signals.
It should be understood that the terminal device 2000 shown in fig. 5 can implement various processes related to the terminal device in the method embodiments shown in fig. 2 and 3. The operations and/or functions of the modules in the terminal device 2000 are respectively to implement the corresponding flows in the above-described method embodiments. Reference may be made specifically to the description of the above method embodiments, and a detailed description is appropriately omitted herein to avoid redundancy.
The processor 2010 may be configured to perform the actions described in the preceding method embodiments that are implemented within the terminal device, and the transceiver 2020 may be configured to perform the actions described in the preceding method embodiments that the terminal device transmits to or receives from the network device. Please refer to the description of the previous embodiment of the method, which is not repeated herein.
Optionally, the terminal device 2000 may further include a power supply 2050 for supplying power to various devices or circuits in the terminal device.
In addition, in order to further improve the functions of the terminal device, the terminal device 2000 may further include one or more of an input unit 2060, a display unit 2070, an audio circuit 2080, a camera 2090, a sensor 2100, and the like, and the audio circuit may further include a speaker 2082, a microphone 2084, and the like.
Fig. 6 is a schematic structural diagram of an access device provided in an embodiment of the present application, for example, a schematic structural diagram of an access device.
It should be understood that the access device 3000 shown in fig. 6 can implement various processes related to the access device in the method embodiments shown in fig. 2 and 3. The operations and/or functions of the modules in the access device 3000 are respectively for implementing the corresponding flows in the above method embodiments. Reference may be made specifically to the description of the above method embodiments, and a detailed description is appropriately omitted herein to avoid redundancy.
It should be understood that the access device 3000 shown in fig. 6 is only one possible architecture of an access device, and should not constitute any limitation to the present application. The method provided by the application can be applied to access equipment with other architectures. E.g. access devices containing CU, DU and AAU etc. The present application is not limited to the specific architecture of the access device.
Fig. 7 is a schematic structural diagram of an AMF network element 4000 according to an embodiment of the present application. The AMF network element 4000 may be applied to the network architecture shown in fig. 1, and performs the functions of the AMF network element in the foregoing method embodiment. As shown, the AMF network element 4000 includes a processor 4020 and a transceiver 4010. Optionally, the AMF network element 4000 further comprises a memory 4030. The processor 4020, the transceiver 4010 and the memory 4030 may communicate with each other via the internal connection path to transmit control and/or data signals, the memory 4030 is used to store a computer program, and the processor 4020 is used to call and run the computer program from the memory 4030 to control the transceiver 4010 to transmit and receive signals. Optionally.
The processor 4020 and the memory 4030 may be combined into a processing device, and the processor 4020 may be configured to execute the program codes stored in the memory 4030 to implement the functions described above. In particular implementations, the memory 4030 can also be integrated with the processor 4020 or separate from the processor 4020. The processor 4020 may correspond to the processing unit in fig. 4.
The transceiver 4010 may correspond to a transceiving unit in fig. 4. The transceiver 4010 may include a receiver (or receiver, receiving circuit) and a transmitter (or transmitter, transmitting circuit). Wherein the receiver is used for receiving signals, and the transmitter is used for transmitting signals.
It should be understood that the AMF network element 4000 shown in fig. 7 can implement the processes related to the AMF network element in the method embodiments shown in fig. 2 and 3. The operation and/or function of each module in the AMF network element 4000 are respectively to implement the corresponding flow in the above-described method embodiment. Reference may be made specifically to the description of the above method embodiments, and a detailed description is appropriately omitted herein to avoid redundancy.
The processor 4020 may be configured to perform the actions internally implemented by the AMF network element described in the foregoing method embodiment, and the transceiver 4010 may be configured to perform the actions transmitted to or received from the network device by the AMF network element described in the foregoing method embodiment. Please refer to the description of the previous embodiment of the method, which is not repeated herein.
The embodiment of the application also provides a processing device, which comprises a processor and an interface; the processor is configured to perform the method of any of the above method embodiments.
It is to be understood that the processing means described above may be one or more chips. For example, the processing device may be a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a system on chip (SoC), a Central Processing Unit (CPU), a Network Processor (NP), a digital signal processing circuit (DSP), a Microcontroller (MCU), a Programmable Logic Device (PLD), or other integrated chips.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor. To avoid repetition, it is not described in detail here.
It should be noted that the processor in the embodiments of the present application may be an integrated circuit chip having signal processing capability. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor described above may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and combines hardware thereof to complete the steps of the method.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM, enhanced SDRAM, SLDRAM, Synchronous Link DRAM (SLDRAM), and direct rambus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
According to the method provided by the embodiment of the present application, the present application further provides a computer program product, which includes: computer program code which, when run on a computer, causes the computer to perform the method in the embodiment shown in fig. 2, 3.
According to the method provided by the embodiment of the present application, the present application also provides a computer readable medium, which stores program codes, and when the program codes are executed on a computer, the computer is caused to execute the method in the embodiment shown in fig. 2 and fig. 3.
According to the method provided by the embodiment of the present application, the present application further provides a system, which includes the foregoing one or more terminal devices and one or more network devices.
The network device in the foregoing device embodiments completely corresponds to the terminal device and the network device or the terminal device in the method embodiments, and the corresponding module or unit executes the corresponding steps, for example, the communication unit (transceiver) executes the steps of receiving or transmitting in the method embodiments, and other steps besides transmitting and receiving may be executed by the processing unit (processor). The functions of the specific elements may be referred to in the respective method embodiments. The number of the processors may be one or more.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a Digital Video Disk (DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
The network device in the foregoing device embodiments completely corresponds to the terminal device and the network device or the terminal device in the method embodiments, and the corresponding module or unit executes the corresponding steps, for example, the communication unit (transceiver) executes the steps of receiving or transmitting in the method embodiments, and other steps besides transmitting and receiving may be executed by the processing unit (processor). The functions of the specific elements may be referred to in the respective method embodiments. The number of the processors may be one or more.
As used in this specification, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between 2 or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from two components interacting with one another over a local system, distributed system, and/or network, such as the internet with other systems by way of the signal).
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
In the above embodiments, the functions of the functional units may be fully or partially implemented by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions (programs). The procedures or functions described in accordance with the embodiments of the present application are generated in whole or in part when the computer program instructions (programs) are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (44)

  1. A data transmission method based on network slices is characterized by comprising the following steps:
    the first access equipment receives a first message, wherein the first message is used for indicating the terminal equipment to move to equipment except the first access equipment;
    and the first access equipment stops sending the data packet in the first network slice to the terminal equipment when receiving the first message.
  2. The method of claim 1, wherein the first message is from the terminal device.
  3. The method according to claim 1, characterized in that said first message is from an access and mobility management function, AMF, network element, said first message comprising an identification of said terminal device.
  4. The method of claim 2 or 3, wherein the first message comprises an identifier of a second access device or an identifier of a second cell, and wherein the second cell is a cell of the second access device that serves the terminal device.
  5. The method according to any of claims 1 to 4, wherein the first access device sends a second message to an AMF network element, the second message comprising one or more of the following information:
    an identity of a second access device, an identity of a second cell, an identity of the terminal device, an identity of the first network slice, a sequence number of a last data packet belonging to the terminal device in the first network slice received by the first access device,
    the second cell is a cell which provides service for the terminal device in the second access device.
  6. The method of claim 1, wherein the first message is from a second access device, and wherein the first message comprises an identification of the terminal device.
  7. The method according to claim 5 or 6, characterized in that the identity of the terminal device is one of the following identities:
    an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
  8. A data transmission method based on network slices is characterized by comprising the following steps:
    the second access equipment sends a third message, wherein the third message is used for indicating the terminal equipment to move to the second access equipment, and the third message comprises the identifier of the terminal equipment;
    and the second access equipment receives the downlink data packet of the terminal equipment in the first network slice sent by the first access equipment.
  9. The method of claim 8, further comprising:
    the second access equipment receives an uplink data packet sent by the terminal equipment, wherein the uplink data packet comprises an identifier of the terminal equipment;
    and the second access equipment determines that the terminal equipment moves to the second access equipment according to the identifier of the terminal equipment.
  10. The method of claim 8 or 9, wherein the second access device sends the third message, comprising:
    the second access device sends the third message to an access device which establishes an X2 or Xn interface with the second access device, wherein the first access device is included in the access device which establishes an X2 or Xn interface with the second access device.
  11. The method of claim 8 or 9, wherein the second access device sends a third message comprising:
    and the second access equipment sends the third message to an access and mobility management function (AMF) network element.
  12. The method according to any of claims 8 to 11, wherein the identity of the terminal device is one of the following identities:
    an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
  13. A data transmission method based on network slices is characterized by comprising the following steps:
    receiving a third message sent by a second access device by an access and mobility management function (AMF) network element, wherein the third message is used for notifying the AMF network element that a terminal device moves to the second access device, and the third message comprises an identifier of the terminal device;
    the AMF network element sends a first message to a first access device, where the first message is used to notify the first access device that the terminal device moves to a second access device, and the first message includes an identifier of the terminal device and an identifier of the second access device or a second cell, where the second cell is a cell in the second access device that provides service for the terminal device.
  14. The method of claim 13, further comprising:
    the AMF network element receives a second message sent by the first access device, where the second message includes one or more of the following information:
    an identity of the second access device, an identity of a second cell, an identity of the terminal device, an identity of the first network slice, a sequence number of a last data packet belonging to the terminal device in the first network slice received by the first access device,
    the second cell is a cell which provides service for the terminal device in the second access device.
  15. The method according to claim 13 or 14, wherein the identity of the terminal device is one of the following identities:
    an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
  16. A data transmission apparatus based on network slices, comprising:
    the first access equipment receives a first message, wherein the first message is used for indicating the terminal equipment to move to equipment except the first access equipment;
    and the processing unit is used for stopping sending the data packet in the first network slice to the terminal equipment when the transceiving unit receives the first message.
  17. The apparatus of claim 16, wherein the first message is from the terminal device.
  18. The apparatus of claim 16, wherein the first message is from an access and mobility management function (AMF) network element, and wherein the first message comprises an identification of the terminal device.
  19. The apparatus of claim 17 or 18, wherein the first message comprises an identifier of a second access device or an identifier of a second cell, and wherein the second cell is a cell of the second access device that serves the terminal device.
  20. The apparatus of any one of claims 16 to 19, comprising:
    the transceiver unit is further configured to send a second message to the AMF network element, where the second message includes one or more of the following information:
    an identity of a second access device, an identity of a second cell, an identity of the terminal device, an identity of the first network slice, a sequence number of a last data packet belonging to the terminal device in the first network slice received by the first access device,
    the second cell is a cell which provides service for the terminal device in the second access device.
  21. The apparatus of claim 16, wherein the first message is from a second access device, and wherein the first message comprises an identification of the terminal device.
  22. The apparatus according to claim 20 or 21, wherein the identity of the terminal device is one of the following identities:
    an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
  23. A data transmission apparatus based on network slices, comprising:
    the receiving and sending unit is configured to send a third message, where the third message is used to instruct the terminal device to move to a second access device, and the third message includes an identifier of the terminal device;
    the transceiver unit is further configured to receive a downlink data packet of the terminal device in the first network slice sent by the first access device.
  24. The apparatus of claim 23, comprising:
    the transceiver unit is further configured to receive an uplink data packet sent by the terminal device, where the uplink data packet includes an identifier of the terminal device, and the apparatus further includes:
    and the processing unit is used for determining that the terminal equipment moves to the second access equipment according to the identifier of the terminal equipment.
  25. The apparatus of claim 23 or 24, wherein the third message is a message sent by the transceiver unit to an access device that establishes an X2 or Xn interface with the second access device, and wherein the first access device is included in the access device that establishes an X2 or Xn interface with the second access device.
  26. The apparatus according to claim 23 or 24, wherein the third message is a message sent by the transceiver unit to an access and mobility management function, AMF, network element.
  27. The apparatus according to any of claims 23 to 26, wherein the identity of the terminal device is one of the following identities:
    an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
  28. A data transmission apparatus based on network slices, comprising:
    a receiving and sending unit, configured to receive a third message sent by a second access device, where the third message is used to notify an access and mobility management function (AMF) network element that a terminal device moves to the second access device, and the third message includes an identifier of the terminal device;
    the transceiver unit is further configured to send a first message to a first access device, where the first message is used to notify the first access device that the terminal device moves to the second access device, and the first message includes an identifier of the terminal device and an identifier of the second access device or a second cell, where the second cell is a cell in the second access device that provides a service for the terminal device.
  29. The apparatus of claim 28, comprising:
    the transceiver unit is further configured to receive a second message sent by the first access device, where the second message includes one or more of the following information:
    an identity of the second access device, an identity of a second cell, an identity of the terminal device, an identity of the first network slice, a sequence number of a last data packet belonging to the terminal device in the first network slice received by the first access device,
    the second cell is a cell which provides service for the terminal device in the second access device.
  30. The apparatus according to claim 28 or 29, wherein the identity of the terminal device is one of the following identities:
    an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
  31. A communication system for data transmission based on network slicing, comprising:
    the terminal equipment receives a data packet of a first network slice sent by the first access equipment;
    the first access device receives a first message, wherein the first message is used for indicating the terminal device to move to a device other than the first access device;
    and the first access equipment stops sending the data packet of the first network slice to the terminal equipment when receiving the first message.
  32. The system of claim 31, comprising:
    and the terminal equipment sends the first message to the first access equipment.
  33. The system of claim 31 or 32, wherein the first message comprises an identifier of a second access device or an identifier of a second cell, and wherein the second cell is a cell of the second access device that serves the terminal device.
  34. The system of any one of claims 31 to 33, further comprising:
    and the mobility management function AMF network element sends the first message to the first access device, wherein the first message comprises the identifier of the terminal device.
  35. The system of any one of claims 31 to 34, comprising:
    the first access device sends a second message to an AMF network element, where the second message includes an identifier of a second access device or an identifier of a second cell, where the second cell is a cell of the second access device that provides service for the terminal device, and the system further includes:
    and the AMF network element receives the second message sent by the first access equipment.
  36. The system of claim 35, wherein the second message further comprises one or more of the following information:
    the identifier of the terminal device, the identifier of the first network slice, and the sequence number of the last data packet belonging to the terminal device in the first network slice received by the first access device.
  37. The system of claim 31, comprising:
    the terminal equipment sends an uplink data packet to the second access equipment, wherein the uplink data packet comprises the identifier of the terminal equipment; and, the system further comprises:
    and the second access device is configured to receive the uplink data packet sent by the terminal device, and determine that the terminal device moves to the second access device according to the uplink data packet.
  38. The system of claim 37, comprising:
    the second access equipment sends the first message to the access equipment which establishes an X2 or Xn interface with the second access equipment, and the first message comprises the identification of the terminal equipment.
  39. The system of claim 37, comprising:
    the second access device sends a third message to the AMF network element, where the third message is used to indicate that a terminal device moves to the second access device, and the third message includes an identifier of the terminal device;
    and the AMF network element receives the third message sent by the second access device, and sends the first message to the first access device after receiving the third message, where the first message includes an identifier of the terminal device.
  40. The system according to any of claims 31 to 39, wherein the identity of the terminal device is one of the following:
    an internet protocol IP address, a media access control, MAC, address, a globally unique temporary identity GUTI or temporary mobile subscriber identity, TMSI, an international mobile subscriber identity, IMSI, a subscriber permanent identity, SUPI, a cell radio network temporary identity, C-RNTI.
  41. A computer-readable storage medium comprising a computer program which, when run on a computer, causes the computer to perform the method of any one of claims 1 to 15.
  42. A chip comprising at least one processor and an interface;
    the at least one processor, configured to invoke and run a computer program to cause the chip to perform the method according to any one of claims 1 to 15.
  43. A computer program product, the computer program product comprising: computer program, which, when executed, causes a computer to perform the method of any of claims 1 to 15.
  44. A communications apparatus comprising at least one processor coupled to a memory and configured to execute instructions in the memory to implement the method of any of claims 1-15.
CN201980102429.2A 2019-11-28 2019-11-28 Data transmission method, device and system based on network slice Pending CN114731544A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/121725 WO2021102841A1 (en) 2019-11-28 2019-11-28 Data transmission method and apparatus based on network slicing, and system

Publications (1)

Publication Number Publication Date
CN114731544A true CN114731544A (en) 2022-07-08

Family

ID=76128728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980102429.2A Pending CN114731544A (en) 2019-11-28 2019-11-28 Data transmission method, device and system based on network slice

Country Status (2)

Country Link
CN (1) CN114731544A (en)
WO (1) WO2021102841A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139851A (en) * 2011-12-02 2013-06-05 华为技术有限公司 Control method and access equipment of resource release
WO2016033716A1 (en) * 2014-09-01 2016-03-10 华为技术有限公司 Communication method, mobile network device, terminal, application server and system
CN110475299A (en) * 2018-05-10 2019-11-19 维沃移动通信有限公司 A kind of method and device of switching cell

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10506489B2 (en) * 2015-09-18 2019-12-10 Huawei Technologies Co., Ltd. System and methods for network slice reselection
US11765635B2 (en) * 2016-08-10 2023-09-19 Nec Corporation Radio access network node, radio terminal, core network node, and method therefor
CN114040455A (en) * 2016-08-10 2022-02-11 日本电气株式会社 Wireless access network node, wireless terminal and method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139851A (en) * 2011-12-02 2013-06-05 华为技术有限公司 Control method and access equipment of resource release
WO2016033716A1 (en) * 2014-09-01 2016-03-10 华为技术有限公司 Communication method, mobile network device, terminal, application server and system
CN110475299A (en) * 2018-05-10 2019-11-19 维沃移动通信有限公司 A kind of method and device of switching cell

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NOKIA等: "Baseline CR for June version of RAN2 TS 38.300 (RAN3 part) covering agreements of RAN3#100", 3GPP TSG-RAN WG2 MEETING #102 R2-1809215 *

Also Published As

Publication number Publication date
WO2021102841A1 (en) 2021-06-03

Similar Documents

Publication Publication Date Title
JP7040617B2 (en) Signaling instruction and reception method, device and communication system
US11399361B2 (en) V2X sidelink communication
WO2020200135A1 (en) Resource configuration method and communication device
US11838815B2 (en) Cell handover method, terminal device, and network device
WO2021203884A1 (en) Relay communication method and related device
CN115669070A (en) Condition-based auxiliary node or main and auxiliary cell changing method and equipment
JP7254721B2 (en) Information determination method, terminal equipment and network equipment
EP4033799A1 (en) Relay transmission method, relay terminal and remote terminal
KR20180127963A (en) Relay transmission method and apparatus
CN111510906A (en) Capability interaction method and related equipment
WO2021000688A1 (en) Method and apparatus for transmitting and receiving capability information
CN110447257B (en) Communication method, auxiliary network node and terminal
WO2021027907A1 (en) Communication method and communication apparatus
WO2021226967A1 (en) Handover method and device
WO2021027660A1 (en) Radio communication method and communication apparatus
WO2021027942A1 (en) Method and apparatus for capability information transfer
CN113455100B (en) Method and apparatus for relay communication
CN111757545B (en) Communication method and communication device
CN116057998A (en) Communication method, device and apparatus
CN114424650A (en) Method and device for acquiring sidelink resources
WO2022133692A1 (en) Method for state switching, terminal device, and network device
CN114731544A (en) Data transmission method, device and system based on network slice
WO2020155126A1 (en) Wireless communication method, terminal device, and network device
CN112770366B (en) Communication method and communication device
US20240040450A1 (en) Information transmission method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination