CN114846852A - Network access method and device, network system and communication method, storage medium - Google Patents

Network access method and device, network system and communication method, storage medium Download PDF

Info

Publication number
CN114846852A
CN114846852A CN201980103222.7A CN201980103222A CN114846852A CN 114846852 A CN114846852 A CN 114846852A CN 201980103222 A CN201980103222 A CN 201980103222A CN 114846852 A CN114846852 A CN 114846852A
Authority
CN
China
Prior art keywords
node
cell
iab
backhaul
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201980103222.7A
Other languages
Chinese (zh)
Other versions
CN114846852B (en
Inventor
马川
郝金平
晋英豪
谭巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN114846852A publication Critical patent/CN114846852A/en
Application granted granted Critical
Publication of CN114846852B publication Critical patent/CN114846852B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a network access method and equipment, a network system and a communication method and a storage medium. In the application, a backhaul node and a management node in an IAB network are connected with each other, wherein at least one node can send search information of its own cell to the other side, and the side receiving the search information broadcasts the search information; in this way, when a new IAB-node accesses the IAB network, the new IAB-node may determine another node cell associated with a cell of a node according to the broadcast message after searching the cell of the node. Therefore, when a new IAB-node joins the IAB network, the matched management node cell and the backhaul node cell can be selected for access, so that the problem that the management node is not matched with the backhaul node is avoided.

Description

Network access method and device, network system and communication method, storage medium Technical Field
The present application relates to the field of communications technologies, and in particular, to a network access method and device, a network system and a communication method, and a storage medium.
Background
Integrated Access and Backhaul (IAB) refers to that both an access link and a backhaul link of a base station are transmitted in a wireless manner. In the IAB network, as shown in fig. 1, an IAB node (IAB-node) and an IAB donor base station (IAB-node) are provided, where the IAB-node may provide a backhaul egress accessing to a core network for the IAB-node and a terminal (User Equipment, UE), and the IAB-node may also provide a backhaul relay service for other IAB-nodes and UEs, and the IAB-node may be referred to as backhaul nodes. Each IAB-donor independently administrates the IAB-node under the control of the IAB-donor, but the IAB-donors lack coordination management.
Therefore, an administrative node (IAB-controller) may also be added to the IAB network, which may also be referred to as an enhanced IAB network. In the IAB network, a management node performs centralized management on a plurality of IAB-nodes and the IAB-nodes under the control of the management node. When a new IAB-node is to join the IAB network, the IAB-node needs to access a management node and a backhaul node. In order to implement management of the management node, it is required that the management node to which the new IAB-node is accessed is matched with the backhaul node, that is, the management node is used for managing the backhaul node. In other words, the newly connected IAB-node is managed by the management node together with the backhaul node as a subordinate node of the accessed backhaul node.
However, in the existing IAB network, a new IAB-node may be arbitrarily accessed to the backhaul node and the management node, which may cause the situation that the management node is not matched with the backhaul node, and further, the IAB network may be difficult to implement effective management and communication, which affects communication quality.
Disclosure of Invention
The application provides a network access method and equipment, a network system and communication method and a storage medium, which are used for avoiding the situation that a management node is not matched with a backhaul node when a new node joins an IAB network.
In a first aspect, the present application provides a network access method. In the method, a node to be accessed can search a first cell in a target network to obtain a first node cell, and then receives a broadcast message from the first node, wherein the broadcast message carries search information of a second node cell, and the first node and the second node are connected with each other; therefore, the second cell is searched according to the search information to obtain a second node cell, and the second node cell is further accessed to the first node cell and the second node cell; the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition. Therefore, the node to be accessed can be accessed to the first node and the second node which are connected with each other, and the problem of communication or management failure caused by mismatching of the first node and the second node is avoided.
In the embodiment of the present application, the first node and the second node are connected to each other, which includes the following two cases: the first node accesses the cell of the second node, or the second node accesses the cell of the first node. And the communication means between the first node and the second node may comprise one or more of wired communication or wireless communication.
In one possible embodiment, the search information may include, but is not limited to: and the frequency band of the second node cell and the cell identifier of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identifier of the second node, and the like.
In another possible embodiment, the search information is periodically sent by the second node to the first node. Alternatively, in another possible embodiment, the search information is sent by the second node to the first node periodically. In addition, the second node may also send search information to the first node when a preset condition is satisfied. That is, the search information is actively transmitted by the second node to the first node and is broadcast by the first node within the first node cell.
In another possible embodiment, the search information is sent by the second node to the first node in response to an information acquisition request, wherein the information acquisition request is sent by the first node to the second node. That is, the search information is sent by the second node in response to a request by the first node, which is broadcast within the first node cell after receiving feedback from the second node.
In another possible embodiment, the broadcast message further comprises: the type identification is used for identifying: a base station type of the second node and/or a cell type of the second node cell. In addition, the type identifier may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, as shown in the scenario of fig. 9, the first node is a backhaul node and the second node is a management node.
In another possible embodiment, as shown in the scenario of fig. 10, the first node is a management node and the second node is a backhaul node.
In an embodiment of the present application, as shown in fig. 3 to fig. 5, the target network may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, and the backhaul nodes may include: an IAB node accessed to the target network and/or an IAB host base station accessed to the target network. At this time, the network access equipment is an IAB node which does not access the target network.
In another possible embodiment, the first access condition is that the first node cell does not belong to a barred (barred) cell, and the radio signal strength of the first node cell reaches a preset first strength threshold; the second access condition is that the second node cell does not belong to the forbidden cell, and the wireless signal intensity of the second node cell reaches a preset second intensity threshold value. That is, the node to be accessed is accessed to the backhaul node cell and the associated management node cell satisfying the preset access condition.
The forbidden cell means that the cell does not allow the user to access. In LTE and NR, a broadcast message of each cell may carry an indication bit, where the indication bit is used to indicate whether the cell is forbidden.
In a second aspect, the present application provides a communication method of a network system, where the network system includes a first node and a second node, and the first node and the second node are connected to each other. In the embodiment of the present application, the first node and the second node are connected to each other, which includes the following two cases: the first node accesses the cell of the second node, or the second node accesses the cell of the first node. And the communication means between the first node and the second node may comprise one or more of wired communication or wireless communication.
Then, in the network system, the second node sends the search information of the second node cell to the first node; and the first node receives the search information and sends a broadcast message in the first node cell, wherein the broadcast message carries the search information. In this embodiment, the first node broadcasts search information of cells of the second nodes connected with each other in its own cell, which is beneficial for the new node to confirm the association relationship between the first node and the second node and search the corresponding second node cell, thereby realizing access.
In one possible embodiment, the search information may include, but is not limited to: and the frequency band of the second node cell and the cell identifier of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identifier of the second node, and the like.
In another possible embodiment, the broadcast message further comprises: the type identification is used for identifying: a base station type of the second node and/or a cell type of the second node cell. In addition, the type identifier may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, as shown in the scenario of fig. 9, the first node is a backhaul node and the second node is a management node.
In another possible embodiment, as shown in the scenario of fig. 10, the first node is a management node and the second node is a backhaul node.
In an embodiment of the present application, as shown in fig. 3 to fig. 5, the network system may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, and the backhaul nodes may include: the IAB node of the accessed network system and/or the IAB host base station of the accessed network system. At this time, the network access device is an IAB node which does not access the network system.
Specifically, the structure of the IAB host base station (IAB-donor) can be referred to fig. 5, which includes: a centralized unit CU, a distributed unit DU and a communication unit. The centralized unit is used for managing the associated IAB nodes in a centralized manner and is connected with the associated management nodes; a distributed unit for connecting the associated IAB nodes; and the communication unit may include: a wireless communication unit and/or a wired communication unit.
The structure of the management node (IAB-controller) can also refer to fig. 5, including: a wireless communication unit; alternatively, the management node includes a wireless communication unit and a wired communication unit.
In a third aspect, the present application provides a network access device, including: the system comprises a searching module, a receiving module and an access module; the searching module is used for searching a first cell in a target network to obtain a first node cell; a receiving module, configured to receive a broadcast message from a first node, where the broadcast message carries search information of a second node cell, and the first node and the second node are connected to each other; the searching module is further used for searching the second cell according to the searching information to obtain a second node cell; the access module is used for accessing the first node cell and the second node cell; the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition. Therefore, the network access equipment can be accessed to the first node and the second node which are connected with each other, and the problem of communication or management failure caused by mismatching of the first node and the second node is avoided.
In the embodiment of the present application, the first node and the second node are connected to each other, which includes the following two cases: the first node accesses the cell of the second node, or the second node accesses the cell of the first node. And the communication means between the first node and the second node may comprise one or more of wired communication or wireless communication.
In one possible embodiment, the search information may include, but is not limited to: and the frequency band of the second node cell and the cell identifier of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identifier of the second node, and the like.
In another possible embodiment, the search information is periodically sent by the second node to the first node. Alternatively, in another possible embodiment, the search information is sent by the second node to the first node periodically. In addition, the second node may also send search information to the first node when a preset condition is satisfied. That is, the search information is actively transmitted by the second node to the first node and is broadcast by the first node within the first node cell.
In another possible embodiment, the search information is sent by the second node to the first node in response to an information acquisition request sent by the first node to the second node. That is, the search information is sent by the second node in response to a request by the first node, which is broadcast within the first node cell after receiving feedback from the second node.
In another possible embodiment, the broadcast message further comprises: the type identification is used for identifying: a base station type of the second node and/or a cell type of the second node cell. In addition, the type identifier may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, as shown in the scenario of fig. 9, the first node is a backhaul node and the second node is a management node.
In another possible embodiment, as shown in the scenario of fig. 10, the first node is a management node and the second node is a backhaul node.
In an embodiment of the present application, as shown in fig. 3 to fig. 5, the target network may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, and the backhaul nodes may include: an IAB node accessed to the target network and/or an IAB host base station accessed to the target network. At this time, the network access equipment is an IAB node which does not access the target network.
In another possible embodiment, the first access condition is that the first node cell does not belong to a forbidden cell, and the wireless signal strength of the first node cell reaches a preset first strength threshold; the second access condition is that the second node cell does not belong to the forbidden cell, and the wireless signal intensity of the second node cell reaches a preset second intensity threshold value. That is, the node to be accessed is accessed to the backhaul node cell and the associated management node cell satisfying the preset access condition. The forbidden cell means that the cell does not allow the user to access. In LTE and NR, a broadcast message of each cell may carry an indication bit, where the indication bit is used to indicate whether the cell is forbidden.
In a fourth aspect, the present application provides a network access device, including: a memory, a processor, and a computer program; wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method according to any of the above first aspects.
In a fifth aspect, the present application provides a network system, including: the system comprises a first node and a second node, wherein the first node and the second node are connected with each other. In the embodiment of the present application, the first node and the second node are connected to each other, which includes the following two cases: the first node accesses the cell of the second node, or the second node accesses the cell of the first node. And the communication means between the first node and the second node may comprise one or more of wired communication or wireless communication.
Specifically, the second node is configured to send search information of a second node cell to the first node; a first node for receiving search information; the first node is further configured to send a broadcast message in the first node cell, where the broadcast message carries the search information. In this embodiment, the first node broadcasts search information of cells of the second nodes connected with each other in its own cell, which is beneficial for the new node to confirm the association relationship between the first node and the second node and search the corresponding second node cell, thereby realizing access.
In one possible embodiment, the search information may include, but is not limited to: and the frequency band of the second node cell and the cell identifier of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identifier of the second node, and the like.
In another possible embodiment, the broadcast message further comprises: the type identification is used for identifying: a base station type of the second node and/or a cell type of the second node cell. In addition, the type identifier may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, as shown in the scenario of fig. 9, the first node is a backhaul node and the second node is a management node.
In another possible embodiment, as shown in the scenario of fig. 10, the first node is a management node and the second node is a backhaul node.
In an embodiment of the present application, as shown in fig. 3 to fig. 5, the network system may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, and the backhaul nodes may include: the IAB node of the accessed network system and/or the IAB host base station of the accessed network system. At this time, the network access device is an IAB node which does not access the network system.
Specifically, the structure of the IAB host base station (IAB-donor) can be referred to fig. 5, which includes: a centralized unit CU, a distributed unit DU and a communication unit. The centralized unit is used for managing the associated IAB nodes in a centralized manner and is connected with the associated management nodes; a distributed unit for connecting the associated IAB nodes; and the communication unit may include: a wireless communication unit and/or a wired communication unit.
The structure of the management node (IAB-controller) can also refer to fig. 5, including: a wireless communication unit; alternatively, the management node includes a wireless communication unit and a wired communication unit.
In a sixth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which, when run on a computer, causes the computer to perform the method of any of the first or second aspects.
In a seventh aspect, the present application provides a computer program for performing the method of any one of the first or second aspects when the computer program is executed by a computer.
In a possible design, the program in the seventh aspect may be stored in whole or in part on a storage medium packaged with the processor, or in part or in whole on a memory not packaged with the processor.
The embodiment of the application provides a network access method and equipment, a network system, a communication method and a storage medium. In the scheme, a first node and a second node in a target network are connected with each other, and a broadcast message of the first node can carry search information of a cell of the second node. Then, when a new node, that is, a node to be accessed, accesses the target network, the first cell may be searched first, and the first node cell may be searched, so that the second node cell may be searched based on the broadcast message of the first node, and further, if both of the first and second nodes satisfy the access condition, the node to be accessed may access the first node cell and the second node cell. Therefore, when the target network is the IAB network comprising the management node, a new IAB-node can be accessed to the IAB network, and the new IAB-node is accessed to the backhaul node and the management node which are connected with each other, so that the problem that the management node is not matched with the backhaul node when the new node is accessed to the IAB network and the problems of management and communication faults caused by the mismatching of the management node and the backhaul node are solved, and the communication quality is improved.
Drawings
Fig. 1 is a schematic network architecture of an IAB network in the prior art;
fig. 2 is a schematic diagram of a network architecture of another IAB network in the prior art;
fig. 3 is a schematic architecture diagram of a network system according to an embodiment of the present application;
fig. 4 is a schematic architecture diagram of another network system according to an embodiment of the present application;
fig. 5 is a schematic diagram of a network element architecture of each base station in a network system according to an embodiment of the present application;
fig. 6 is a schematic information interaction diagram of a network system communication method according to an embodiment of the present application;
fig. 7 is a flowchart illustrating a network access method according to an embodiment of the present application;
fig. 8 is a schematic diagram of an associated base station and an associated cell in an embodiment of the present application;
fig. 9 is a flowchart illustrating another network access method according to an embodiment of the present application;
fig. 10 is a flowchart illustrating another network access method according to an embodiment of the present application;
fig. 11 is a functional block diagram of a network access device according to an embodiment of the present application;
fig. 12 is a schematic entity structure diagram of a network access device according to an embodiment of the present application;
fig. 13 is a schematic architecture diagram of another network system according to an embodiment of the present application.
Detailed Description
Hereinafter, embodiments of the present embodiment will be described in detail with reference to the accompanying drawings. In the description of the embodiments herein, "/" means "or" unless otherwise specified, for example, a/B may mean a or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, in the description of the embodiments of the present application, "a plurality" means two or more than two.
The embodiment of the application is applied to an enhanced IAB network (namely, an IAB network provided with a management node), and is particularly applied to a scene that a new IAB-node is accessed to the enhanced IAB network. It should be understood that a new backhaul node refers to a node that has not yet accessed the IAB network. The enhanced IAB network is provided with a management node.
The IAB technology can replace the conventional optical fiber backhaul link, thereby avoiding a large amount of optical fiber deployment, and thus improving the flexibility of network deployment and reducing the network deployment cost.
First, in order to facilitate understanding of the enhanced IAB network, the present application first describes an existing IAB network with reference to fig. 1 and 2. Fig. 1 and fig. 2 are schematic network architectures of IAB networks in the prior art.
As shown in fig. 1, the IAB network includes two nodes, respectively: IAB-donor (denoted as a donor base station in fig. 1) and IAB-node (node 1 and node2 in fig. 1).
The IAB-node can be directly connected to the core network, and provides access service for the UE and the IAB-node, and provides a backhaul egress to the core network for the IAB-node. The IAB-donor accesses the core network through a logical interface, for example, an NG interface.
The IAB-node is not directly connected with the core network, but is wirelessly returned and connected to the IAB-node in a single-hop or multi-hop mode, and then is transmitted to the core network back and forth through the IAB-node. For example, IAB-node1 may be wirelessly transmitted back to IAB-node via a single hop, while IAB-node2 may be wirelessly transmitted back to IAB-node via multiple hops. And the IAB-node can also provide backhaul relay service for other IAB-nodes. For example, IAB-node1 may provide backhaul relay service for IAB-node 2.
In addition, in the IAB network, the IAB-donor and the IAB-node are both network side devices, for example, an access point AP of Wireless Fidelity (WIFI), a base station of next generation communication, such as a gNB or a small station of 5G, a micro station, a TRP, and may also be a relay station, an access point, a vehicle-mounted device, a wearable device, and the like. In this embodiment, the base stations in the communication systems of different communication systems are different. For the sake of distinction, a base station of the 4G communication system is referred to as an LTE eNB, a base station of the 5G communication system is referred to as an NR gNB, and a base station supporting both the 4G communication system and the 5G communication system is referred to as an LTE eNB, and these names are for convenience of distinction only and are not intended to be limiting.
Therefore, in the IAB network, these base stations, such as the IAB-donor and the IAB-node shown in fig. 1, can provide access service for the UE. Thus, the UE accesses the core network through the accessed base station.
Specifically, fig. 1 further shows an architecture manner of each base station. As shown in fig. 1, the IAB-donor adopts a split architecture, including: a Centralized Unit (CU) and a Distributed Unit (DU). And IAB-node comprises: mobile Terminal (MT) and DU.
The CU in the IAB-node can be connected with DU of the subordinate IAB-node and is used for centralized management of all the IAB-nodes. Specifically, the CU and the DU are connected by a logical interface, such as an F1 interface. The CUs are also used for accessing the core network.
And the DU in each base station may be used to connect to a downstream IAB-node or UE, and is used to provide access service or backhaul relay service for the UE or the downstream IAB-node. Specifically, for any base station, the DU of the base station is connected to the MT of the IAB-node, and the DU of the base station can also be connected to the UE. The connection means may be a user equipment interface, such as the NR Uu interface shown in fig. 1.
The MT is used to connect to an upstream base station, i.e., an upstream IAB-node or IAB-donor. That is, the MT is generally connected to a DU of an upstream base station.
In addition, in the IAB network, the number of the IAB-node and the IAB-donor can be multiple. For example, referring to fig. 2, in the IAB network shown in fig. 2, two IAB-donors are included, which are: IAB-donor1 and IAB-donor 2. The IAB-donor1 is connected with IAB-node 1-IAB-node 3 and provides a return outlet of the core network. IAB-donor2 is connected to IAB-node4, IAB-node5, providing a backhaul egress to the core network.
In an IAB network as shown in fig. 1 or fig. 2, both the IAB-donor and the IAB-node may provide backhaul services to other nodes, and both may be referred to as backhaul nodes.
In the IAB network, when a new IAB-node (i.e., a node with an IAB function that is not accessed to the IAB network) needs to join the network, a backhaul node cell needs to be selected and accessed, and a backhaul link is established with the backhaul node cell, so that the backhaul node and the IAB network can be accessed. Where each backhaul node may correspond to one or more cells, referred to as backhaul node cells for ease of description.
For example, when a new IAB-node joins the IAB network shown in fig. 2, all of IAB-node1, IAB-node2, and IAB-node1 to IAB-node5 are backhaul nodes, and the new IAB-node may select one backhaul node cell from the backhaul nodes for access. For example, if a new IAB-node is connected to IAB-node1, then IAB-node1 may directly provide a backhaul egress to the core network for IAB-node1, IAB-node3, and the new IAB-node. For another example, if a new IAB-node accesses IAB-node5, then the new IAB-node can be passed back through IAB-node5 via multiple hops to IAB-node2, which IAB-node2 provides the new IAB-node with a backhaul egress to the core network. And is not exhaustive.
In the IAB network shown in fig. 1 or fig. 2, each IAB-node can independently manage its own subordinate IAB-node. For example, in FIG. 2, IAB-donor1 can independently manage IAB-node 1-IAB-node 3 under jurisdiction; IAB-donor2 can independently manage IAB-node4 and IAB-node5 under jurisdiction. However, the IAB-donor lacks coordination, and the IAB-node coordination management of the cross-IAB-donor is difficult to realize.
On the basis of the aforementioned IAB network, an administrative node (IAB-controller) may be added to the IAB network, and in an actual scenario, such an IAB network may also be referred to as an enhanced IAB network.
In the enhanced IAB network, the IAB-controller performs centralized management on a plurality of IAB-donors and IAB-nodes under the control of the IAB-donors, so that the IAB-nodes of the cross-IAB-donors can be cooperatively managed through the centralized control of the IAB-controller.
Specifically, the IAB-controller assumes a centralized management function and may also be used to assume some Control Plane (CP) functions. While the IAB-donor assumes the data plane (UP) function and the rest of the Control Plane (CP) function. In other words, the enhanced IAB network extracts a part of CP functions (e.g., topology and routing management functions) of each IAB-node, and places the extracted CP functions in the IAB-controller for centralized control, so as to implement IAB-node cooperative management across the IAB-nodes.
In one possible embodiment, the IAB-controller may be deployed in a lower frequency band to ensure a larger coverage area of the IAB-controller.
Fig. 3 is a schematic structural diagram of another network system according to an embodiment of the present application. As shown in fig. 3, the IAB-controller is a management node, and is configured to perform centralized management on the IAB-nodes 1-3 and the subordinate IAB-nodes thereof, where each IAB-node may be configured to manage one or more IAB-nodes. The number of IAB-nodes governed by each IAB-donor may be the same or different.
In an enhanced IAB network, one or more IAB-controllers may be included, each IAB-controller may be configured to centrally manage a plurality of IAB-donors and their subordinate IAB-nodes.
Fig. 4 is a schematic structural diagram of another network system according to an embodiment of the present application. As shown in fig. 4, the IAB network includes IAB-controller1 and IAB-controller2, where IAB-controller1 is used to centrally manage IAB-node1, IAB-node2 and IAB-node 1-IAB-node 3 under jurisdiction, and IAB-controller2 is used to centrally manage IAB-node3 and IAB-node4 under jurisdiction.
In the enhanced IAB network provided by the embodiments of the present application, the IAB-controller may communicate with at least a backhaul node.
Specifically, the IAB-controller may be capable of wireless broadcast. In other words, the IAB-controller may comprise a wireless communication unit. Thus, the IAB-controller may communicate with the backhaul nodes via wireless communication. The wireless communication unit may include, but is not limited to, an air interface transceiver module.
In another exemplary embodiment, the IAB-controller may include a wireless communication unit and a wired communication unit. In this manner, the IAB-controller may communicate with the backhaul nodes via wireless and/or wired communications.
For example, in an IAB network, the access method between the IAB-donor and the IAB-controller may be: air interface access or non-air interface access. At this time, the IAB-donor may include a communication unit in addition to the DU and the CU, and the communication unit may include: a wireless communication unit and/or a wired communication unit. For example, when the communication unit is a wireless communication unit, for example, the MT, the IAB-donor may access the IAB-controller by way of air interface communication; when the communication unit is a wired interface, such as an optical fiber interface, the IAB-donor may access the IAB-controller in a wired manner.
Fig. 5 is a schematic diagram of a network element architecture of each base station in a network system according to an embodiment of the present application. As shown in fig. 5, the IAB-node still includes DU and MT; the IAB-donor may comprise DU and CU, and may comprise at least one of MT and wired interface in addition thereto. Thus, the IAB-node can still access the upstream IAB-node or IAB-donor through MT. And the IAB-controller may include an air interface transceiver module, and communicate with the backhaul node by wireless communication. In addition, the IAB-controller may also include a wired interface. In fig. 5, the wired interface of the IAB-controller is an optional module, which is indicated by a dashed box. The option of selecting at least one of the MT (mobile terminal) and the wired interface in the IAB-donor is also identified by the dashed box.
In an enhanced IAB network, an IAB-donor needs to access a management node. Therefore, when a new IAB-donor accesses the IAB network, only one management node cell needs to be accessed and a backhaul link is established, which is not described in detail.
In an enhanced IAB network, an IAB-node needs to access one backhaul node and one management node. Taking the scenario shown in fig. 4 as an example, in this scenario, IAB-node1 accesses IAB-node2 (backhaul node) and IAB-controller1 (management node); IAB-node4 accesses IAB-node3 (backhaul node) and IAB-controller2 (management node).
Then, when a new IAB-node needs to join the IAB network, a backhaul node and a management node need to be accessed. At this time, the new IAB-node may search the backhaul node cell and the management node cell, respectively, and when both satisfy respective access conditions, the new IAB-node may access the searched backhaul node cell and the searched management node cell.
This is likely to have the problem that the backhaul node of the new IAB-node access does not match the management node. Still taking the scenario of fig. 4 as an example, a new IAB-node may access IAB-donor2 and IAB-controller2, at this time, the IAB-donor2 and the IAB-controller2 do not match, and IAB-donor2 is actually managed by IAB-controller1, so that the new IAB-node may be managed by IAB-controller1 and IAB-controller2 at the same time, and the management manner is confused, which may easily cause communication failure. In other words, if there is no match between the IAB-donor2 and the IAB-controller2 accessed by the new IAB-node, it will be difficult for the enhanced IAB network to implement effective management and communication, and the communication quality will be affected.
In the embodiment of the application, in the enhanced IAB network, between the management node and the backhaul node connected with each other, the management node may send search information of a management node cell to the backhaul node, and the backhaul node broadcasts the search information in its own backhaul node cell.
Therefore, when a new IAB-node accesses the IAB network, the new IAB-node can obtain the search information of the management node cell based on the broadcast message after searching the backhaul node cell, and further can search the management node cell. Thus, the backhaul node and the management node of the new IAB-node access are matched.
Conversely, the backhaul node may also send the management node search information of the backhaul node cell, which is broadcast by the management node within the management node cell. Details will be described later.
Hereinafter, a communication method of the IAB network in the embodiment of the present application will be described.
Fig. 6 is a schematic information interaction diagram illustrating a network system communication method according to an embodiment of the present application. The method is applied to a network system comprising a first node and a second node, wherein the first node and the second node are connected with each other.
It should be understood that the target network targeted by the embodiment of the present application may be the enhanced IAB network described in any one of the foregoing possible embodiments in fig. 3 to fig. 5. That is, the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, and the backhaul nodes include: an IAB-node accessed to the IAB network and/or an IAB-donor accessed to the IAB network.
In this case, the first node and the second node may be designed as follows:
in a possible embodiment, the first node may be an IAB-node (IAB-node or IAB-node) and the second node may be an administrative node (IAB-controller).
In another possible embodiment, the first node may be an administrative node (IAB-controller) and the second node may be a backhaul node (IAB-node or IAB-node).
In this way, the first node and the second node are connected with each other, and the first node can be managed by the second node or the first node is managed by the second node. In other words, the first node and the second node are connected to each other, including the following two cases: the first node accesses the cell of the second node, or the second node accesses the cell of the first node. And will not be described in detail.
Furthermore, in an IAB network comprising a management node, the means of communication between the first node and the second node may comprise one or more of wired communication or wireless communication. The following description is made with reference to specific designs of the first node and the second node.
As shown in fig. 6, the communication method of the network system may include the steps of:
s602, the second node sends the search information of the second node cell to the first node.
The second node cell is the cell corresponding to the second node. Each node may correspond to one or more cells, and the number of the cells is particularly limited in the embodiments of the present application.
The triggering and executing modes of this step will be described later.
S604, the first node receives the search information.
S608, the first node sends a broadcast message in the first node cell, wherein the broadcast message carries the search information.
In other words, the backhaul node may send search information for the backhaul node cell to the management node, which broadcasts the search information within the cell of the management node. Alternatively, the management node may send search information for the management node cell to the backhaul node, which broadcasts the search information within the cell of the backhaul node.
When a new IAB-node is accessed to the IAB network, the search information broadcast by the first node is beneficial to the new IAB-node, the interconnection relationship between the first node and the second node is determined, and the access to the management node and the backhaul node which are matched with each other is facilitated. The process is described in detail later.
In the embodiment of the present application, the search information of the cell is used to assist in searching or locating the cell. Specifically, the search information may include, but is not limited to: the frequency band of the second node cell, and the cell identifier of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identifier of the second node, and the like, which are not particularly limited in this embodiment of the present application.
Wherein the cell type of the second node cell is associated with the base station type of the second node. Further, for any base station, the base station type and the cell type may be in a one-to-one correspondence. The type of the base station is related to the role (or role) of the base station in the network system and the access situation.
In an exemplary embodiment, the base stations can be divided into the following 4 types: type 1 to type 4. The type 1 base station is an administrative node (IAB-controller) in an IAB network, the type 2 base station is a backhaul node (IAB-node or IAB-node) which has been accessed to the IAB-controller, the type 3 base station is an IAB-node or IAB-node which has not been accessed to the IAB-controller, and the type 4 base station is a base station which does not support an IAB function. For example, in this embodiment, the base station type of the management node is type 1, the base station type of the backhaul node is type 2, and the base station type of the new IAB-node is type 3.
Based on the base station type division, the cell types may also be divided into 4 corresponding types. That is, the base station to which the type 1 cell belongs is a type 1 base station, the base station to which the type 2 cell belongs is a type 2 base station, the base station to which the type 3 cell belongs is a type 3 base station, and the base station to which the type 4 cell belongs is a type 4 base station. At this time, the type 1 cell is an IAB-Controller cell, and the type 2 cell is a backhaul node cell (IAB-node cell or IAB-node cell).
It is understood that type 1 to type 4 are only for convenience of description, and in an actual scenario, the base station type and the cell type may be formed by a combination of one or more of numbers, symbols, characters, and letters. At this time, the base station type and the cell type may be identified in the same manner, or may be identified in different manners. For example, type 1 of a base station or cell may be identified as 1, type 2 may be identified as 2; for another example, base station type 1 may be identified as a1, cell type 1 may be identified as C1; also for example, type 1 of the base station or cell may be identified as + and type 2 as ++ (identified by the number of symbols, or designated characters). The base station type and the cell type may be identified in a name, an attribute, information transmission and reception, and the like, and the type thereof may be identified by one or more of these methods, which is also not limited in this embodiment of the present application.
In one embodiment, shown in fig. 6, only the search information may be included in the broadcast message sent by the first node. Alternatively, in another embodiment of fig. 6, the broadcast message sent by the first node may include, but is not limited to, search information.
At this time, other information may also be carried in the broadcast message. In an exemplary embodiment, the broadcast message may further carry a type identifier, where the type identifier is used to identify: one or more of a base station type of the first node, a cell type of the first node cell, a base station type of the second node, and a cell type of the second node cell. In other words, the broadcast message may include: one or more of a base station type or a cell type, and search information. The base station type and the cell type may broadcast themselves or broadcast the second node connected to each other, and there is no particular limitation thereto.
For example, in the broadcast message of the first node, 2 bits (for example, there may be different changes) may be added to indicate the cell type of the first node. For another example, in the broadcast message of the first node, 2 bits may be added to indicate the base station type of the second node.
Specifically, 2 bits may be added to a main System Information Block (MIB) or a System Information Block (SIB) of the broadcast message to indicate the base station type or the cell base station.
As described above, in the scenario shown in fig. 6, as long as the broadcast message from the first node can be received, the information of the cell of the second node interconnected with the first node can be known. Therefore, when a new node accesses the IAB network, the interconnection relationship between the first node and the second node can be determined according to the broadcast message after the first node cell is searched, and thus, the interconnected first node and the interconnected second node can be accessed when the access is carried out.
In the embodiment shown in fig. 6, the step S602 may be actively implemented by the second node, or may be performed in response to a request of the first node.
In an exemplary embodiment, the second node may periodically send the search information to the first node.
In another exemplary embodiment, the second node may also send the search information to the first node at regular time.
In another exemplary embodiment, the second node may also send the search information to the first node when a preset condition is met. For example, when there is a new backhaul node to access the second node, the second node transmits search information of the second node cell to the first node.
In another exemplary embodiment, in response to receiving an information acquisition request sent by a first node, a second node sends search information of a cell of the second node to the first node. It is to be understood that the information acquisition request is for requesting search information of a cell of the second node from the second node. In this embodiment of the application, the first node may send the information acquisition request to the second node according to actual needs, for example, when a new backhaul node accesses the first node, the first node sends the information acquisition request to the second node.
After the step S602 is triggered, based on the different types of the first node and the second node, there may be a plurality of possible implementation manners for sending the search information.
In an exemplary scenario, the first node is a backhaul node and the second node is a management node. When the backhaul node is provided with the wireless communication unit and the backhaul node is provided with the wireless communication capability, the management node can send the search information to the first node through a wireless communication mode.
At this time, the management node may transmit the search information of the management node cell to the backhaul node by broadcasting in the IAB network system. Therefore, the complex operation that the management node sends the search information to each backhaul node is saved, and the communication resource of the management node is saved.
Alternatively, the management node may send the search information of the management node cell to the backhaul node in a unicast manner. In this case, the search information of the management node cell transmitted by the management node to the plurality of backhaul nodes may be the same or different. And the management node may send search information of all its cells to the backhaul node, or may send search information of some of the cells.
Taking the network system shown in fig. 4 as an example, IAB-controller1 may send search information of a management node cell to IAB-node1 and IAB-node2, respectively, and the cells corresponding to IAB-controller1 include cell 1 to cell 3, then IAB-controller1 may send search information of cell 1 and cell 2 to IAB-node1, and IAB-controller1 may send search information of cell 1 to cell 3 to IAB-node 2. Alternatively, the IAB-controller1 may send the search information of cell 1 to cell 3 to IAB-donor1 and IAB-donor2, respectively.
In another scenario, the first node is a backhaul node and the second node is a management node. When the backhaul node and the management node are both provided with wired interfaces, the backhaul node and the management node can communicate in a wired communication mode. At this time, the management node may send search information of the management node cell to each backhaul node, respectively, and the search information may be the same or different and is not described in detail.
In another scenario, if the first node is a management node and the second node is a backhaul node, the backhaul node sends search information of a backhaul node cell to the management node. In this case, the search information may be communicated in a wired or wireless manner even if the backhaul node and the management node have different hardware configurations. In this scenario, the backhaul node typically sends the search information of its own cell by means of unicast.
In addition, it should be noted that, in the IAB network, the first node and the second node may communicate directly, for example, communicate over an air interface or communicate through a directly connected data line; alternatively, the first node and the second node also intentionally communicate indirectly. Still taking the example shown in fig. 4, the first node may be IAB-controller1, and the second node may be IAB-node1, which may communicate indirectly with each other through IAB-node 2.
Based on the communication method of the network system, the embodiment of the application also provides a network access method.
The method is particularly applied to a scene that the node to be accessed is accessed to the target network. For example, the node to be accessed may be an IAB-node that does not access the IAB network, that is, the network access method may be applied to a scenario where the new IAB-node accesses the IAB network system. The IAB network may be an IAB network including a management node (or referred to as an enhanced IAB network). In addition, the node to be accessed may also be an IAB-donor that does not access the IAB network, which is not described in detail.
Fig. 7 shows a flowchart of a network access method provided in an embodiment of the present application. As shown in fig. 7, the method may include the steps of:
s702, the node to be accessed searches a first cell in the target network to obtain a first node cell.
The network access method will now be described by taking the node to be accessed as a new IAB-node as an example. At this time, the node to be accessed may search for the backhaul node cell first, or may search for the management node cell first, which is not particularly limited in the embodiment of the present application.
S704, the node to be accessed receives a broadcast message from the first node, wherein the broadcast message carries search information of a second node cell, and the first node and the second node are connected with each other.
After the access node searches the first node cell, the mutual connection between the first node and the second node can be determined according to the broadcast message received by the first node cell.
As described above, the broadcast message is actually broadcast by the first node, and the search information carried in the broadcast message is from the second node, which is not described any further.
In the specific implementation of this step, the node to be accessed may start to listen to the broadcast of the first node after searching the first node cell, so that the first node may listen to the broadcast message when broadcasting to the first node cell.
S706, the node to be accessed searches the second cell according to the search information to obtain the second node cell.
The node to be accessed may perform cell search according to the search information, that is, the frequency band and the cell identifier (or may further include other search information) where the second node cell is located, to obtain the second node cell.
S708, the node to be accessed is accessed into the first node cell and the second node cell.
At this time, the first node and the second node are connected to each other, that is, the management node and the backhaul node are matched. The problem that the management node is not matched with the backhaul node when a new node is accessed into the IAB network is solved, and the problems of management and communication faults caused by the mismatching are solved, so that the communication quality is improved.
As mentioned above, in the IAB network, the backhaul node needs to access a cell of an IAB-controller and establish a backhaul link. For any backhaul node in the IAB network, the IAB-controller to which the backhaul node is connected may be referred to as an associated IAB-controller of the backhaul node. The cell associated with the IAB-controller may be referred to as an associated IAB-controller cell of the backhaul node (or the cell of the backhaul node).
The backhaul node to which the IAB-controller is accessed may also be referred to as an associated backhaul node of the IAB-controller. And the cell of the associated backhaul node of the IAB-controller is referred to as the associated backhaul node cell of the IAB-controller (or the cell of the IAB-controller).
It should be noted that, one backhaul node generally only accesses one cell of one IAB-controller, but all cells of the associated IAB-controller may be referred to as associated IAB-controller cells of the backhaul node (or the backhaul node cell).
Conversely, all backhaul nodes accessing the IAB-controller may be referred to as associated backhaul nodes of the IAB-controller (or the IAB-controller cell). All cells of these associated backhaul nodes may be referred to as the associated backhaul node cells of the IAB-controller (or the IAB-controller cells).
Exemplarily, fig. 8 shows a schematic diagram of an associated base station and an associated cell in an embodiment of the present application. As shown in fig. 8, backhaul node a has cell { a1, a2}, backhaul node B has cell { B1, B2}, and management node C (IAB-controller C) has cell { C1, C2, C3 }. At this time, both backhaul node a and backhaul node B access IAB-controller C, and more specifically, backhaul node a accesses cell C1 and backhaul node B accesses cell C3.
Then, for backhaul node a, IAB-controller C is the associated IAB-controller of backhaul node a, and cells C1, C2, and C3 are all the associated IAB-controller cells of backhaul node a. For cell a1 (or cell a2), cells c1, c2, and c3 are all their associated IAB-controller cells.
For backhaul node B, IAB-controller C is the associated IAB-controller of backhaul node B, and cells C1, C2, and C3 are all associated IAB-controller cells of backhaul node B. For cell b1 (or cell b2), cells c1, c2, and c3 are all their associated IAB-controller cells.
For IAB-controller C, backhaul node a and backhaul node B are both associated backhaul nodes for IAB-controller C. And cells a1, a2, b1, b2 are all IAB-controller C associated backhaul node cells. For cell c1 (or cell a2, cell a3), cells c1, c2, c3 are all their associated IAB-controller cells.
Based on such design, in an actual implementation scenario of the embodiment shown in fig. 7, the first node cell is an associated first node cell of the second node cell; and the second node cell is also the associated second node cell of the first node cell.
In this embodiment of the present application, when the new IAB-node accesses the IAB network, it may also be determined whether the backhaul node cell and its associated IAB-controller cell satisfy the access condition.
Thus, in the embodiment shown in fig. 7, the first node cell to be accessed by the access node satisfies the first preset access condition, and the second node cell satisfies the second preset access condition.
In an actual scene, the first access condition and the second access condition may be custom designed according to the actual scene. The two may be the same or different.
In an exemplary embodiment, the first access condition may be that the first node cell does not belong to a forbidden cell, and the radio signal strength of the first node cell reaches a preset first strength threshold. And the second access condition is that the second node cell does not belong to the forbidden cell, and the wireless signal intensity of the second node cell reaches a preset second intensity threshold value.
A barred cell refers to a cell that is set or configured (or not allowed) to be barred by a user. In an actual scenario, a forbidden cell list may be maintained, and the forbidden cell list may be maintained in the node to be accessed, or may be maintained in a storage location readable by the first node, which is not limited to this. Or, in LTE and NR, an indication bit may also be carried in a broadcast message of a cell, where the indication bit is used to indicate whether the cell is barred. In this way, the node to be accessed can determine whether the cell is a forbidden cell according to the indication bit in the broadcast message.
Wherein the wireless Signal strength may be characterized by one or more of a Reference Signal Receiving Power (RSRP) or a Reference Signal Receiving Quality (RSRQ). And the first intensity threshold and the second intensity threshold may be the same or different. The wireless signal strength of the backhaul node cell and the associated IAB-controller cell reaches the corresponding strength threshold, which can ensure that the communication quality of these cells is good to a certain extent, and meet the communication requirement after the node to be accessed accesses the IAB network.
It is to be understood that in practical scenarios, the first access condition (or the second access condition) may have other variations. In another exemplary embodiment, the first access condition may be that the first node cell does not belong to a barred cell. In another exemplary embodiment, the first access condition may be that the noise strength of the first node cell is less than a preset third strength threshold. In another exemplary embodiment, the first access condition may be that the bandwidth of the first node cell satisfies a preset bandwidth threshold. And is not exhaustive. The second access condition may also be configured in the manner of the foregoing example.
In this embodiment of the application, if the first node cell does not satisfy the first access condition, and/or the second node cell does not satisfy the second access condition, step S708 is not executed again, and the corresponding search is performed again.
In the embodiment of the present application, the node to be accessed may have a plurality of different implementation manners for determining the access condition:
in an exemplary embodiment, after the node to be accessed executes S702, it may determine whether the first node cell satisfies the first access condition; thus, when the first node cell satisfies the first access condition, S704 is performed again. Then, when the node to be accessed executes S706 and searches a second node cell, whether the second node cell meets a second access condition can be judged; thus, when the second node cell satisfies the second access condition, the access step of S708 is performed again.
At this time, if the first node cell does not satisfy the first access condition, S704 is not executed for the time being, and S702 is searched again.
If the second node cell does not satisfy the second access condition, S708 is not performed. At this time, if the search information of the other second node cell still exists in the broadcast message, S704 is executed to re-search the other second node cell and determine whether the second access condition is satisfied. Or, if there are no other second node cells satisfying the second access condition in the broadcast message, re-executing S702 to search for other first node cells.
Alternatively, if the second node cell does not satisfy the second access condition, the process may also return to S702 to search for another first node cell again.
In an exemplary embodiment, after the node to be accessed executes S702, it may determine whether the first node cell satisfies the first access condition; meanwhile, S704 to S706 are executed. Then, when the node to be accessed executes S706 and searches for the second node cell, the node to be accessed determines whether the second node cell meets the second access condition. Then, when the first node cell satisfies the first access condition and the second node cell satisfies the second access condition, the access step of S708 is executed again.
In this embodiment, if it is determined that the first node cell does not satisfy the first access condition, the execution of another parallel branch is stopped, and the process returns to S702 to search the first node cell again. If the second node cell does not satisfy the second access condition, S702 or S704 may be re-executed, which is not described herein.
In another exemplary embodiment, after the node to be accessed executes S706, after the first node cell and the second node cell have been searched, it may be determined whether the first node cell and the second node cell satisfy the preset access condition. Further, when the first node cell satisfies the first access condition and the second node cell satisfies the second access condition, the accessing step of S708 is executed again.
In this embodiment, if the first node cell does not satisfy the first access condition, S702 may be re-executed. If the second node cell does not satisfy the second access condition, S702 or S704 may be re-executed, which is not described herein.
In specific execution of S708, the node to be accessed may start a random access procedure to attempt to access the first node cell and the second node cell.
In step S708, if a plurality of second node cells satisfying the second access condition are searched, the node to be accessed may sequentially attempt to access the plurality of second node cells until one of the second node cells is successfully accessed.
Specifically, the random access process of the node to be accessed is as follows: the node to be accessed sends an access request message to a base station (a first node or a second node) to request to access a cell (a first node cell or a second node cell) of the base station. After receiving the access request message, the base station may send a feedback message to the node to be accessed, where the feedback message is used to inform the node to be accessed whether to allow access. Then, after receiving the feedback message from the base station, if the feedback message informs that the access is allowed, the node to be accessed indicates that the node to be accessed has successfully accessed the cell of the base station; otherwise, if the feedback message informs that the access is not allowed (or denied), the access failure is indicated.
In the foregoing random access procedure, the base station may be the first node or the second node. If the node to be accessed sends an access request message to the first node, the node to be accessed requests to access the first node cell; or, if the node to be accessed sends the access request message to the second node, the node to be accessed requests to access the second node cell.
Based on the foregoing processing, the node to be accessed may sequentially send an access request message to each second node in the plurality of second node cells satisfying the second access condition to request access, and receive a feedback message from the second node, until the obtained feedback message informs that access is allowed, the node to be accessed successfully accesses one second node cell.
Hereinafter, a network access method in the embodiment of the present application will be described with reference to fig. 9 and 10.
In the scenario shown in fig. 9, the first node is a backhaul node and the second node is a management node. As shown in fig. 9, the network access method applied to the node to be accessed may include the following steps:
and S901, searching a backhaul node cell.
The backhaul node cell is a type 2 cell.
S902, judging whether a return node cell is searched; if yes, go to S903; if not, S901 is executed.
If so, the backhaul node cell is designated as backhaul node cell a1, corresponding to backhaul node a. Backhaul node a may include cell a1 alone or may include other cells in addition to cell a 1.
S903, measures the signal strength of the backhaul node cell a 1.
For example, RSRP of backhaul node cell a1 is measured, and/or RSRQ of backhaul node cell a1 is measured.
S904, determining whether the backhaul node cell a1 satisfies a first access condition; if yes, executing S905; if not, go to S901.
The first access condition is that the backhaul node cell does not belong to a forbidden cell, and the signal strength reaches a preset first strength threshold.
S905, acquiring a broadcast message of the backhaul node A, wherein the broadcast message carries search information of cells B1-BN of the management node B.
Wherein the backhaul node a and the management node B are connected to each other. The management node B includes N cells, namely, cell B1, B2, … …, and BN, where N is an integer greater than 0.
S906, cell search is carried out according to the search information, and N cells of the management node B are searched.
In other words, an associated IAB-controller cell of backhaul node cell a is acquired.
S907, measuring the signal strength of the management node cells B1-BN.
S908, judging whether a cell meeting a second access condition exists in the management node cells B1-BN; if yes, go to S909; if not, go to S901.
S909, a random access procedure is initiated to attempt to access the backhaul node cell a 1.
S910, judging whether the access to the backhaul node cell A1 is successful; if yes, executing S911; if not, go to S901.
S911, starting a random access process, and sequentially trying to access the management node cells B1-BN.
S912, judging whether the access to one of the management node cells B1-BN succeeds or not; if yes, go to S913; if not, go to S901.
For convenience of description, a management node cell to be successfully accessed by an access node is denoted as Bi, and i is one of 1 to N.
And S913, successfully accessing the backhaul node cell A1 and the management node cell Bi.
In the scenario shown in fig. 10, the first node is a management node and the second node is a backhaul node. As shown in fig. 10, the network access method may include the steps of:
and S1001, searching the management node cell.
The management node cell is the type 1 cell.
S1002, judging whether a management node cell is searched; if yes, executing S1003; if not, S1001 is executed.
If so, the management node cell is designated as cell B1, corresponding to the management node B. The management node B may include only the cell B1, or may include other cells in addition to the cell B1.
S1003, measures the signal strength of the management node cell B1.
For example, RSRP of the managing node cell B1 is measured, and/or RSRQ of the managing node cell B1 is measured.
S1004, determining whether the management node cell B1 satisfies a second access condition; if yes, go to S1005; if not, S1001 is executed.
And the second access condition is that the management node cell does not belong to the forbidden cell, and the signal strength reaches a preset second strength threshold.
S1005, acquiring the broadcast message of the management node B, wherein the broadcast message carries the search information of the cells A1-AM of the backhaul node A.
Wherein the backhaul node a and the management node B are connected to each other. The backhaul node a includes M cells, which are cells a1, a2, … …, and AM, where M is an integer greater than 0.
And S1006, performing cell search according to the search information, and searching M cells of the backhaul node A.
In other words, an associated IAB-controller cell of backhaul node cell a is acquired.
S1007, measures the signal strengths of backhaul node cells a1 to AM.
S1008, judging whether a cell meeting a first access condition exists in the backhaul node cells A1-AM; if yes, go to S1009; if not, S1001 is executed.
S1009 starts a random access procedure, and attempts to access the management node cell B1.
S1010, judging whether the management node cell B1 is accessed successfully; if yes, go to S1011; if not, S1001 is executed.
S1011, a random access procedure is started, and access to the backhaul node cells a1 to AM is sequentially attempted.
S1012, judging whether the access to one of the return node cells A1-AM is successful; if yes, executing S1013; if not, S1001 is executed.
For convenience of description, a backhaul node cell to which an access node successfully accesses is denoted as Aj, where j is one of 1 to M.
S1013, the backhaul node cell Aj and the management node cell B1 are successfully accessed.
In addition, in the embodiment of the present application, the backhaul node may send the search information of the backhaul node cell to the management node, or the management node may send the search information of the management node cell to the backhaul node. The two processes have no conflict, the backhaul node and the management node can mutually send the search information of the cell to each other, and no matter whether the new IAB-node searches the backhaul node cell first or the management node cell first, the IAB network can be accessed in the mode.
Based on the foregoing design, the communication method of the network system and the network access method provided in the embodiments of the present application ensure that the first node and the second node to be accessed by the node to be accessed are connected to each other, so that when the target network is an IAB network including a management node, it can also ensure that a new IAB-node is accessed to the IAB network, and the new IAB-node is accessed to the interconnected backhaul node and IAB-controller, thereby solving the problem that the management node is not matched with the backhaul node when the new node is accessed to the IAB network, and further solving the problem of management and communication failure, and improving communication quality.
The embodiment of the application also provides network access equipment. Illustratively, referring to fig. 11, the network access device may include:
a searching module 112, configured to search a first cell in a target network to obtain a first node cell;
a receiving module 114, configured to receive a broadcast message from a first node, where the broadcast message carries search information of a cell of a second node, and the first node is connected to the second node;
the searching module 112 is further configured to search the second cell according to the search information to obtain a second node cell;
an access module 116, configured to access a first node cell and a second node cell;
the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition.
In one possible embodiment, the search information may include, but is not limited to: and the frequency band of the second node cell and the cell identifier of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identifier of the second node, and the like.
In another possible embodiment, the search information is periodically sent by the second node to the first node. Alternatively, in another possible embodiment, the search information is sent by the second node to the first node periodically. In addition, the second node may also send search information to the first node when a preset condition is satisfied. That is, the search information is actively transmitted by the second node to the first node and is broadcast by the first node within the first node cell.
In another possible embodiment, the search information is sent by the second node to the first node in response to an information acquisition request, where the information acquisition request is sent by the first node to the second node. That is, the search information is sent by the second node in response to a request by the first node, which is broadcast within the first node cell after receiving feedback from the second node.
In another possible embodiment, the broadcast message further comprises: the type identification is used for identifying: a base station type of the second node and/or a cell type of the second node cell. In addition, the type identifier may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, the first node is a backhaul node and the second node is a management node. The scene shown in fig. 9 is not described in detail.
In another possible embodiment, the first node is a management node and the second node is a backhaul node. The scene shown in fig. 10 is not described in detail.
In this embodiment, the target network may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, and each management node is configured to manage one or more backhaul nodes, where the backhaul nodes may include: an IAB node accessed to the target network and/or an IAB host base station accessed to the target network. As shown in fig. 3-5, the description is omitted.
In the embodiment of the application, the network access equipment is an IAB node which does not access a target network.
In another possible embodiment, the first access condition is that the first node cell does not belong to a forbidden cell, and the wireless signal strength of the first node cell reaches a preset first strength threshold; the second access condition is that the second node cell does not belong to the forbidden cell, and the wireless signal intensity of the second node cell reaches a preset second intensity threshold value. That is, the node to be accessed accesses the backhaul node cell and its associated IAB-controller cell satisfying the preset access condition.
The network access device in the embodiment shown in fig. 11 may be used to implement the technical solution in the above method embodiment, and the implementation principle and technical effect of the technical solution may further refer to the relevant description in the method embodiment, and optionally, the network access device may be a base station with an IAB function.
It should be understood that the division of the modules of the network access device shown in fig. 11 is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling by the processing element in software, and part of the modules can be realized in the form of hardware. For example, the search module 112 may be a separately established processing element, or may be implemented by being integrated in a chip of a network access device, such as a terminal, or may be stored in a memory of the network access device in the form of a program, and the function of each module is called and executed by a processing element of the network access device. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), etc. As another example, when one of the above modules is implemented in the form of a Processing element scheduler, the Processing element may be a general purpose processor, such as a Central Processing Unit (CPU) or other processor capable of invoking programs. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
Fig. 12 also shows a physical structure diagram of the network access device. The network access device may be configured to implement the method corresponding to the node to be accessed, which is specifically referred to the description in the foregoing method embodiment.
As shown in fig. 12, the network access device includes:
a memory 1210;
a processor 1220; and
a computer program;
wherein the computer program is stored in the memory 1210 and configured to be executed by the processor 1220 to implement the method performed by the network access device as in the above embodiments.
The number of the processors 1220 in the network access device may be one or more, and the processors 1220 may also be referred to as processing units, which may implement a certain control function. The processor 1220 may be a general purpose processor or a special purpose processor, etc. In an alternative design, the processor 1220 may also store instructions, which may be executed by the processor 1220 to cause the network access device to perform the method described in the above method embodiment.
In yet another possible design, the network access device may include circuitry that may implement the functionality of transmitting or receiving or communicating in the foregoing method embodiments.
Optionally, the number of the memory 1210 in the network access device may be one or more, and the memory 1210 stores instructions or intermediate data, and the instructions may be executed on the processor 1220, so that the network access device performs the method described in the above method embodiment. Optionally, other related data may also be stored in the memory 1210. Optionally, instructions and/or data may also be stored in processor 1220. The processor 1220 and the memory 1210 may be provided separately or integrated together.
In addition, as shown in fig. 12, a transceiver 1230 is further disposed in the network access device, where the transceiver 1230 may be referred to as a transceiver unit, a transceiver circuit, or a transceiver, and the like, and is used for data transmission or communication with the test device or other terminal devices, which is not described herein again.
As shown in fig. 12, the memory 1210, the processor 1220, and the transceiver 1230 are connected by a bus and communicate.
If the network access device is configured to implement methods corresponding to those of fig. 7, 9, 10, for example, a broadcast message from the first node may be received by the transceiver 1230. And the processor 1220 is used for performing corresponding determination or control operations, and optionally, may store corresponding instructions in the memory 1210. The specific processing manner of each component can be referred to the related description of the previous embodiment.
An embodiment of the present application further provides a network system, which may refer to fig. 13, for example, and the network system 1300 may include: a first node 1310 and a second node 1320, the first node 1310 and the second node 1320 being interconnected. Specifically, the second node 1320 is configured to send search information of a cell of the second node to the first node 1310; a first node 1310 for receiving search information; the first node 1310 is further configured to send a broadcast message in the first node cell, where the broadcast message carries the search information.
In one possible embodiment, the search information may include, but is not limited to: and the frequency band of the second node cell and the cell identifier of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identifier of the second node, and the like.
In another possible embodiment, the broadcast message further comprises: the type identification is used for identifying: a base station type of the second node and/or a cell type of the second node cell. In addition, the type identifier may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, the first node 1310 is a backhaul node and the second node 1320 is a management node. The scene shown in fig. 9 is not described in detail.
In another possible embodiment, the first node 1310 is a management node and the second node 1320 is a backhaul node. The scene shown in fig. 10 is not described in detail.
In this embodiment, the network system may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, and each management node is configured to manage one or more backhaul nodes, where a backhaul node may include: the IAB node of the accessed network system and/or the IAB host base station of the accessed network system. As shown in fig. 3 to 5, further description is omitted.
In this embodiment, the network access device is an IAB node that does not access the network system.
Specifically, the structure of the IAB host base station (IAB-donor) can be referred to fig. 5, which includes: a centralized unit CU, a distributed unit DU and a communication unit. The centralized unit is used for managing the associated IAB nodes in a centralized manner and is connected with the associated management nodes; a distributed unit for connecting the associated IAB nodes; and the communication unit may include: a wireless communication unit and/or a wired communication unit.
The structure of the management node (IAB-controller) can also refer to fig. 5, including: a wireless communication unit; alternatively, the management node includes a wireless communication unit and a wired communication unit.
The network system shown in fig. 13 can also refer to fig. 3 and 4, which are not described herein.
An embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program runs on a computer, the computer is caused to execute the communication method or the network access method described in the above embodiment.
Furthermore, the present application also provides a computer program product, which includes a computer program that, when running on a computer, causes the computer to execute the communication method or the network access method described in the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedures or functions described in accordance with the present application are generated, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk), among others.

Claims (37)

  1. A network access method, comprising:
    searching a first cell in a target network by a node to be accessed to obtain a first node cell;
    the node to be accessed receives a broadcast message from a first node, wherein the broadcast message carries search information of a second node cell, and the first node and the second node are connected with each other;
    the node to be accessed searches a second cell according to the search information to obtain a second node cell;
    the node to be accessed is accessed into the first node cell and the second node cell;
    the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition.
  2. The method of claim 1, wherein the searching for information comprises:
    a frequency band in which the second node cell is located;
    a cell identity of the second node cell.
  3. The method according to claim 1 or2, characterized in that the search information is sent periodically by the second node to the first node.
  4. The method according to claim 1 or2, wherein the search information is sent by the second node to the first node in response to an information acquisition request sent by the first node to the second node.
  5. The method of any of claims 1-4, wherein the broadcasting the message further comprises: a type identifier, configured to identify a base station type of the second node and/or a cell type of the second node cell.
  6. The method according to any of claims 1-5, wherein the first node is a backhaul node and the second node is a management node.
  7. The method according to any of claims 1-5, wherein the first node is a management node and the second node is a backhaul node.
  8. The method according to claim 6 or 7, wherein the target network is an access backhaul integrated IAB network;
    the IAB network comprises one or more of the management nodes, each for managing one or more of the backhaul nodes;
    the backhaul node includes: an IAB node having access to the target network and/or an IAB donor base station having access to the target network.
  9. The method of claim 8, wherein the node to be accessed is an IAB node that has not accessed the target network.
  10. The method according to any of claims 1-9, wherein the first access condition is that the first node cell does not belong to a barred (barred) cell, and the radio signal strength of the first node cell reaches a preset first strength threshold;
    the second access condition is that the second node cell does not belong to a forbidden cell, and the wireless signal strength of the second node cell reaches a preset second strength threshold.
  11. A network system communication method, applied to a network system including a first node and a second node, the method comprising:
    the second node sends search information of a second node cell to the first node; the first node and the second node are connected with each other;
    the first node receives the search information;
    and the first node sends a broadcast message in a first node cell, wherein the broadcast message carries the search information.
  12. The method of claim 11, wherein the searching information comprises:
    a frequency band in which the second node cell is located;
    a cell identity of the second node cell.
  13. The method of claim 11 or 12, wherein the broadcasting message further comprises: a type identifier, configured to identify a base station type of the second node and/or a cell type of the second node cell.
  14. The method according to any of claims 11-13, wherein the first node is a backhaul node and the second node is a management node.
  15. The method according to any of claims 11-13, wherein the first node is a management node and the second node is a backhaul node.
  16. The method according to claim 14 or 15, wherein the network system is an access backhaul integrated IAB network;
    the IAB network comprises one or more of the management nodes, each for managing one or more of the backhaul nodes;
    the backhaul node includes: an IAB node having access to the network system and/or an IAB donor base station having access to the network system.
  17. The method of claim 16, wherein the IAB donor base station comprises:
    the centralized unit is used for centralized management of managed IAB nodes and is connected with the management node;
    the distributed unit is used for providing access service for a downstream IAB node or a user terminal;
    a communication unit; the communication unit includes: a wireless communication unit and/or a wired communication unit.
  18. The method of any of claims 14-17, wherein the management node comprises a wireless communication unit; alternatively, the management node includes a wireless communication unit and a wired communication unit.
  19. A network access device, comprising:
    the searching module is used for searching a first cell in a target network to obtain a first node cell;
    a receiving module, configured to receive a broadcast message from a first node, where the broadcast message carries search information of a second node cell, and the first node and the second node are connected to each other;
    the searching module is further configured to search a second cell according to the search information to obtain a second node cell;
    an access module, configured to access the first node cell and the second node cell;
    the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition.
  20. The apparatus of claim 19, wherein the search information comprises:
    a frequency band in which the second node cell is located;
    a cell identity of the second node cell.
  21. The apparatus according to claim 19 or 20, wherein the search information is sent by the second node to the first node periodically.
  22. The apparatus according to claim 19 or 20, wherein the search information is sent by the second node to the first node in response to an information acquisition request sent by the first node to the second node.
  23. The apparatus of any of claims 19-22, wherein the broadcast message further comprises: a type identifier, configured to identify a base station type of the second node and/or a cell type of the second node cell.
  24. The apparatus according to any of claims 19-23, wherein the first node is a backhaul node and the second node is a management node.
  25. The apparatus of any of claims 19-23, wherein the first node is a management node and the second node is a backhaul node.
  26. The apparatus according to claim 24 or 25, wherein the target network is an access backhaul integrated IAB network;
    the IAB network comprises one or more of the management nodes, each for managing one or more of the backhaul nodes;
    the backhaul node comprises: an IAB node having access to the target network and/or an IAB donor base station having access to the target network.
  27. The apparatus of claim 26, wherein the network access device is an IAB node that does not access the target network.
  28. The apparatus according to any of claims 19-27, wherein the first access condition is that the first node cell does not belong to a barred cell, and the radio signal strength of the first node cell reaches a preset first strength threshold;
    the second access condition is that the second node cell does not belong to a forbidden cell, and the wireless signal strength of the second node cell reaches a preset second strength threshold.
  29. A network system, comprising: a first node and a second node, the first node and the second node being interconnected;
    the second node is used for sending the search information of a second node cell to the first node;
    the first node is used for receiving the search information;
    the first node is further configured to send a broadcast message in a first node cell, where the broadcast message carries the search information.
  30. The system of claim 29, wherein the search information comprises:
    a frequency band in which the second node cell is located;
    a cell identity of the second node cell.
  31. The system of claim 29 or 30, wherein the broadcast message further comprises: a type identifier, configured to identify a base station type of the second node and/or a cell type of the second node cell.
  32. The system according to any of claims 29-31, wherein said first node is a backhaul node and said second node is a management node.
  33. The system according to any of claims 29-31, wherein said first node is a management node and said second node is a backhaul node.
  34. The system according to claim 32 or 33, wherein the network system is an access backhaul integrated IAB network system;
    the IAB network system comprises one or more management nodes, each management node is used for managing one or more backhaul nodes;
    the backhaul node includes: an IAB node having access to the network system and/or an IAB donor base station having access to the network system.
  35. The system of claim 34, wherein the IAB donor base station comprises:
    the centralized unit is used for managing the associated IAB nodes in a centralized way and is connected with the associated management nodes;
    a distributed unit for connecting the associated IAB nodes;
    a communication unit; the communication unit includes: a wireless communication unit and/or a wired communication unit.
  36. The system according to any of claims 32-35, wherein said management node comprises a wireless communication unit; alternatively, the management node includes a wireless communication unit and a wired communication unit.
  37. A computer-readable storage medium, having stored thereon a computer program for execution by a processor to perform the method of any one of claims 1-10.
CN201980103222.7A 2019-12-31 2019-12-31 Network access method and device, network system and communication method, and storage medium Active CN114846852B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/130896 WO2021134663A1 (en) 2019-12-31 2019-12-31 Network access method and device, network system and communication method, and storage medium

Publications (2)

Publication Number Publication Date
CN114846852A true CN114846852A (en) 2022-08-02
CN114846852B CN114846852B (en) 2024-06-04

Family

ID=76686237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980103222.7A Active CN114846852B (en) 2019-12-31 2019-12-31 Network access method and device, network system and communication method, and storage medium

Country Status (2)

Country Link
CN (1) CN114846852B (en)
WO (1) WO2021134663A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115604778A (en) * 2022-11-28 2023-01-13 广州世炬网络科技有限公司(Cn) Node access method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577446A (en) * 2009-10-01 2012-07-11 诺基亚公司 Method and apparatus for providing location based services using connectivity graphs based on cell broadcast information
US20160192283A1 (en) * 2013-09-12 2016-06-30 Intellectual Discovery Co., Ltd. Method for searching wireless lan and method for transferring wireless lan search information
CN110431886A (en) * 2017-03-24 2019-11-08 高通股份有限公司 Web search message about cordless communication network discovery
CN110536395A (en) * 2018-08-03 2019-12-03 中兴通讯股份有限公司 Power determination, signaling method, device, the network equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636549B (en) * 2018-06-21 2022-04-12 华为技术有限公司 Data transmission method, network equipment and terminal equipment
CN110536406B (en) * 2018-09-27 2023-05-26 中兴通讯股份有限公司 Transmission timing method and device, base station and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577446A (en) * 2009-10-01 2012-07-11 诺基亚公司 Method and apparatus for providing location based services using connectivity graphs based on cell broadcast information
US20160192283A1 (en) * 2013-09-12 2016-06-30 Intellectual Discovery Co., Ltd. Method for searching wireless lan and method for transferring wireless lan search information
CN110431886A (en) * 2017-03-24 2019-11-08 高通股份有限公司 Web search message about cordless communication network discovery
CN110536395A (en) * 2018-08-03 2019-12-03 中兴通讯股份有限公司 Power determination, signaling method, device, the network equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115604778A (en) * 2022-11-28 2023-01-13 广州世炬网络科技有限公司(Cn) Node access method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN114846852B (en) 2024-06-04
WO2021134663A1 (en) 2021-07-08

Similar Documents

Publication Publication Date Title
CN110351807B (en) Access selection method and device
CN113498121B (en) Communication method and device
US11071055B1 (en) Network slice selection in cellular system
WO2019024617A1 (en) Method for accessing core network by terminal, base station, and terminal
TWI736239B (en) Muting pattern signaling in iab inter-node measurement
CN111565398B (en) Communication method, device, system and storage medium
CN113873538A (en) Model data transmission method and communication device
US20220377641A1 (en) Cell reconfiguration method, network control node, and mobile iab node
CN115152277A (en) Method and communication device for providing network slice
CN114846852B (en) Network access method and device, network system and communication method, and storage medium
CN115348623A (en) Cell selection method and communication device
WO2016201860A1 (en) Data transmission method and apparatus
CN112333811B (en) Method and device for configuring sending power of synchronization signal/physical broadcast channel block
CN114071602A (en) Node switching configuration method and device
CN114423050B (en) AMF selection method and device
WO2022133785A1 (en) Cell configuration method and device for mt of iab node
WO2023115941A1 (en) Slice access control method and device
CN114189920B (en) Carrier isolation method, device, equipment and medium for network slice
WO2024090957A1 (en) Method and apparatus for federation management
WO2023197318A1 (en) Signal receiving method and apparatus, and device and storage medium
WO2024044979A1 (en) Systems and methods for support of multiple access paths
CN117222033A (en) Communication method and communication device
CN116420423A (en) Communication method, device and system
CN117768967A (en) SCTP link establishment method, source base station and device
JP2023179218A (en) Communication device, control method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant