CN114846852B - Network access method and device, network system and communication method, and storage medium - Google Patents

Network access method and device, network system and communication method, and storage medium Download PDF

Info

Publication number
CN114846852B
CN114846852B CN201980103222.7A CN201980103222A CN114846852B CN 114846852 B CN114846852 B CN 114846852B CN 201980103222 A CN201980103222 A CN 201980103222A CN 114846852 B CN114846852 B CN 114846852B
Authority
CN
China
Prior art keywords
node
cell
iab
backhaul
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201980103222.7A
Other languages
Chinese (zh)
Other versions
CN114846852A (en
Inventor
马川
郝金平
晋英豪
谭巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN114846852A publication Critical patent/CN114846852A/en
Application granted granted Critical
Publication of CN114846852B publication Critical patent/CN114846852B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a network access method and equipment, a network system and communication method and a storage medium. In the application, a backhaul node and a management node in an IAB network are connected with each other, wherein at least one node can send search information of own cell to the other side, and the side receiving the search information broadcasts the search information; thus, when a new IAB-node accesses the IAB network, the new IAB-node may determine, after searching for a cell of a node, another node cell associated with the node cell according to a broadcast message. Therefore, when the new IAB-node joins the IAB network, the matched management node cell and the backhaul node cell can be selected for access, so that the problem that the management node and the backhaul node are not matched is avoided.

Description

Network access method and device, network system and communication method, and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a network access method and device, a network system, a communication method, and a storage medium.
Background
Access Backhaul (IAB) refers to a wireless transmission method for both an access link and a backhaul link of a base station. In the IAB network, as shown in fig. 1, an IAB node (IAB-node) and an IAB host base station (IAB-node) are provided, where the IAB-node may provide a backhaul exit for an IAB-node and a terminal (UE) to access to a core network, and the IAB-node may also provide backhaul relay services for other IAB-nodes and UEs, and the IAB-node may be referred to as backhaul nodes. Each IAB-donor independently manages its own IAB-node, but there is no coordination management between IAB-donos.
Therefore, an IAB-controller (IAB-controller) may also be added to the IAB network, which may also be referred to as an enhanced IAB network. In the IAB network, a plurality of IAB-nodes and the IAB-nodes under the same are centrally managed by a management node. When a new IAB-node is to join such an IAB network, the IAB-node needs to access one management node and one backhaul node. In order to implement management of the management node, the management node to which the new IAB-node is connected is required to be matched with the backhaul node, that is, the management node is used to manage the backhaul node. In other words, the newly connected IAB-node is managed together with the backhaul node as a node under the jurisdiction of the connected backhaul node by the management node.
However, in the existing IAB network, a new IAB-node may be arbitrarily accessed to the backhaul node and the management node, which may cause a situation that the management node is not matched with the backhaul node, and further, it is difficult for the IAB network to implement effective management and communication, which affects the communication quality.
Disclosure of Invention
The application provides a network access method and equipment, a network system, a communication method and a storage medium, which are used for avoiding the condition that a management node and a return node are not matched when a new node joins an IAB network.
In a first aspect, the present application provides a network access method. In the method, a node to be accessed can search a first cell in a target network to obtain a first node cell, and then receive a broadcast message from the first node, wherein the broadcast message carries search information of a second node cell, and the first node and the second node are connected with each other; thereby, searching the second cell according to the search information to obtain a second node cell, and accessing the first node cell and the second node cell; the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition. Thus, the node to be accessed can access the first node and the second node which are connected with each other, and the communication or management fault problem caused by mismatching of the first node and the second node is avoided.
In the embodiment of the present application, the first node and the second node are connected to each other, including the following two cases: the first node accesses a cell of the second node, or the second node accesses a cell of the first node. And the manner of communication between the first node and the second node may include one or more of wired or wireless communication.
In one possible embodiment, the search information may include, but is not limited to: the frequency band of the second node cell and the cell identification of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identity of the second node, etc.
In another possible embodiment, the search information is sent periodically by the second node to the first node. Or in another possible embodiment, the search information is sent by the second node to the first node at regular time. In addition, the second node may transmit the search information to the first node when a preset condition is satisfied. That is, the search information is actively transmitted by the second node to the first node and broadcast by the first node within the first node cell.
In another possible embodiment, the search information is sent by the second node to the first node in response to an information acquisition request sent by the first node to the second node. That is, the search information is transmitted by the second node in response to the request of the first node, which is broadcast in the first node cell after receiving the feedback of the second node.
In another possible embodiment, the broadcast message further comprises: type identification, type identification is used for identifying: the base station type of the second node and/or the cell type of the second node cell. In addition to this, the type identification may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, as in the scenario shown in fig. 9, the first node is a backhaul node and the second node is a management node.
In another possible embodiment, as in the scenario shown in fig. 10, the first node is a management node and the second node is a backhaul node.
In one embodiment of the present application, as shown in fig. 3 to 5, the target network may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, where the backhaul nodes may include: an IAB node accessed to the target network and/or an IAB host base station accessed to the target network. At this time, the network access device is an IAB node that is not accessed to the target network.
In another possible embodiment, the first access condition is that the first node cell does not belong to a barred (barred) cell, and the radio signal strength of the first node cell reaches a preset first strength threshold; the second access condition is that the second node cell does not belong to the forbidden cell, and the wireless signal strength of the second node cell reaches a preset second strength threshold. That is, the node to be accessed accesses the backhaul node cell and the associated management node cell thereof which meet the preset access condition.
Wherein, the forbidden cell refers to that the cell does not allow the user to access. In LTE and NR, an indication bit may be carried in the broadcast message of each cell, where the indication bit is used to indicate whether the cell is barred.
In a second aspect, the present application provides a communication method of a network system, where the network system includes a first node and a second node, and the first node and the second node are connected to each other. In the embodiment of the present application, the first node and the second node are connected to each other, including the following two cases: the first node accesses a cell of the second node, or the second node accesses a cell of the first node. And the manner of communication between the first node and the second node may include one or more of wired or wireless communication.
Then, in the network system, the second node transmits search information of the second node cell to the first node; the first node receives the search information and sends a broadcast message in the first node cell, the broadcast message carrying the search information. In this embodiment, the first node broadcasts the search information of the cell of the second node connected with each other in the own cell, so that the new node is facilitated to confirm the association relationship between the first node and the second node accordingly, and searches the corresponding cell of the second node, thereby realizing access, so that the first node and the second node accessed by the new node can be ensured to be matched, and the communication or management fault problem caused by the mismatching of the first node and the second node can be avoided.
In one possible embodiment, the search information may include, but is not limited to: the frequency band of the second node cell and the cell identification of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identity of the second node, etc.
In another possible embodiment, the broadcast message further comprises: type identification, type identification is used for identifying: the base station type of the second node and/or the cell type of the second node cell. In addition to this, the type identification may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, as in the scenario shown in fig. 9, the first node is a backhaul node and the second node is a management node.
In another possible embodiment, as in the scenario shown in fig. 10, the first node is a management node and the second node is a backhaul node.
In one embodiment of the present application, as shown in fig. 3 to 5, the network system may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, where the backhaul nodes may include: an IAB node of an accessed network system and/or an IAB host base station of the accessed network system. At this time, the network access device is an IAB node that is not connected to the network system.
Specifically, the structure of the IAB host base station (IAB-donor) may refer to fig. 5, including: a centralized unit CU, a distributed unit DU and a communication unit. The centralized unit is used for centrally managing the associated IAB nodes and is connected with the associated management nodes; a distributed unit, configured to connect with an associated IAB node; and the communication unit may include: a wireless communication unit and/or a wired communication unit.
The structure of the management node (IAB-controller) may also refer to fig. 5, including: a wireless communication unit; or the management node comprises a wireless communication unit and a wired communication unit.
In a third aspect, the present application provides a network access device comprising: the device comprises a searching module, a receiving module and an access module; the searching module is used for searching a first cell in the target network to obtain a first node cell; the receiving module is used for receiving a broadcast message from a first node, wherein the broadcast message carries search information of a second node cell, and the first node and the second node are connected with each other; the searching module is also used for searching the second cell according to the searching information to obtain a second node cell; the access module is used for accessing the first node cell and the second node cell; the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition. Thus, the network access device can access the first node and the second node which are connected with each other, and the communication or management fault problem caused by mismatching of the first node and the second node is avoided.
In the embodiment of the present application, the first node and the second node are connected to each other, including the following two cases: the first node accesses a cell of the second node, or the second node accesses a cell of the first node. And the manner of communication between the first node and the second node may include one or more of wired or wireless communication.
In one possible embodiment, the search information may include, but is not limited to: the frequency band of the second node cell and the cell identification of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identity of the second node, etc.
In another possible embodiment, the search information is sent periodically by the second node to the first node. Or in another possible embodiment, the search information is sent by the second node to the first node at regular time. In addition, the second node may transmit the search information to the first node when a preset condition is satisfied. That is, the search information is actively transmitted by the second node to the first node and broadcast by the first node within the first node cell.
In another possible embodiment, the search information is sent by the second node to the first node in response to an information acquisition request sent by the first node to the second node. That is, the search information is transmitted by the second node in response to the request of the first node, which is broadcast in the first node cell after receiving the feedback of the second node.
In another possible embodiment, the broadcast message further comprises: type identification, type identification is used for identifying: the base station type of the second node and/or the cell type of the second node cell. In addition to this, the type identification may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, as in the scenario shown in fig. 9, the first node is a backhaul node and the second node is a management node.
In another possible embodiment, as in the scenario shown in fig. 10, the first node is a management node and the second node is a backhaul node.
In one embodiment of the present application, as shown in fig. 3 to 5, the target network may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, where the backhaul nodes may include: an IAB node accessed to the target network and/or an IAB host base station accessed to the target network. At this time, the network access device is an IAB node that is not accessed to the target network.
In another possible embodiment, the first access condition is that the first node cell does not belong to a forbidden cell, and the wireless signal strength of the first node cell reaches a preset first strength threshold; the second access condition is that the second node cell does not belong to the forbidden cell, and the wireless signal strength of the second node cell reaches a preset second strength threshold. That is, the node to be accessed accesses the backhaul node cell and the associated management node cell thereof which meet the preset access condition. Wherein, the forbidden cell refers to that the cell does not allow the user to access. In LTE and NR, an indication bit may be carried in the broadcast message of each cell, where the indication bit is used to indicate whether the cell is barred.
In a fourth aspect, the present application provides a network access device, comprising: a memory, a processor, and a computer program; wherein the computer program is stored in a memory and configured to be executed by a processor to implement the method according to any of the first aspects above.
In a fifth aspect, the present application provides a network system comprising: the first node and the second node are mutually connected. In the embodiment of the present application, the first node and the second node are connected to each other, including the following two cases: the first node accesses a cell of the second node, or the second node accesses a cell of the first node. And the manner of communication between the first node and the second node may include one or more of wired or wireless communication.
Specifically, the second node is configured to send search information of a second node cell to the first node; a first node for receiving search information; the first node is further configured to send a broadcast message in the first node cell, where the broadcast message carries the search information. In this embodiment, the first node broadcasts the search information of the cell of the second node connected with each other in the own cell, so that the new node is facilitated to confirm the association relationship between the first node and the second node accordingly, and searches the corresponding cell of the second node, thereby realizing access, so that the first node and the second node accessed by the new node can be ensured to be matched, and the communication or management fault problem caused by the mismatching of the first node and the second node can be avoided.
In one possible embodiment, the search information may include, but is not limited to: the frequency band of the second node cell and the cell identification of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identity of the second node, etc.
In another possible embodiment, the broadcast message further comprises: type identification, type identification is used for identifying: the base station type of the second node and/or the cell type of the second node cell. In addition to this, the type identification may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, as in the scenario shown in fig. 9, the first node is a backhaul node and the second node is a management node.
In another possible embodiment, as in the scenario shown in fig. 10, the first node is a management node and the second node is a backhaul node.
In one embodiment of the present application, as shown in fig. 3 to 5, the network system may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, where the backhaul nodes may include: an IAB node of an accessed network system and/or an IAB host base station of the accessed network system. At this time, the network access device is an IAB node that is not connected to the network system.
Specifically, the structure of the IAB host base station (IAB-donor) may refer to fig. 5, including: a centralized unit CU, a distributed unit DU and a communication unit. The centralized unit is used for centrally managing the associated IAB nodes and is connected with the associated management nodes; a distributed unit, configured to connect with an associated IAB node; and the communication unit may include: a wireless communication unit and/or a wired communication unit.
The structure of the management node (IAB-controller) may also refer to fig. 5, including: a wireless communication unit; or the management node comprises a wireless communication unit and a wired communication unit.
In a sixth aspect, the present application provides a computer readable storage medium having a computer program stored therein, which when run on a computer causes the computer to perform the method according to any of the first or second aspects.
In a seventh aspect, the present application provides a computer program for performing the method of any one of the first or second aspects when the computer program is executed by a computer.
In one possible design, the program in the seventh aspect may be stored in whole or in part on a storage medium packaged with the processor, or in part or in whole on a memory not packaged with the processor.
The embodiment of the application provides a network access method and equipment, a network system and communication method and a storage medium. In the scheme, a first node and a second node in the target network are connected with each other, and the broadcast message of the first node can carry the search information of the second node cell. Then, when a new node, i.e. a node to be accessed, accesses the target network, the first cell can be searched first, and the first node cell can be searched, so that the second node cell can be searched based on the broadcast message of the first node, and further, if both the nodes meet the access condition, the node to be accessed can access the first node cell and the second node cell. The first node and the second node which are accessed by the node to be accessed are mutually connected, so that when the target network is an IAB network comprising the management node, the access of the new IAB-node to the IAB network can be ensured, and the problem that the management node is not matched with the backhaul node when the new node is accessed to the IAB network and the management and communication faults caused by the unmatched management node and the unmatched management node are solved, and the communication quality is improved.
Drawings
Fig. 1 is a schematic diagram of a network architecture of an IAB network in the prior art;
FIG. 2 is a schematic diagram of a network architecture of another IAB network according to the prior art;
fig. 3 is a schematic diagram of a network system according to an embodiment of the present application;
fig. 4 is a schematic diagram of another architecture of a network system according to an embodiment of the present application;
fig. 5 is a schematic diagram of a network element architecture of each base station in the network system according to the embodiment of the present application;
fig. 6 is a schematic information interaction diagram of a network system communication method according to an embodiment of the present application;
fig. 7 is a schematic flow chart of a network access method according to an embodiment of the present application;
fig. 8 is a schematic diagram of an associated base station and an associated cell in an embodiment of the present application;
fig. 9 is a flow chart of another network access method according to an embodiment of the present application;
fig. 10 is a flow chart of another network access method according to an embodiment of the present application;
Fig. 11 is a functional block diagram of a network access device according to an embodiment of the present application;
fig. 12 is a schematic entity structure diagram of a network access device according to an embodiment of the present application;
Fig. 13 is a schematic diagram of another architecture of a network system according to an embodiment of the present application.
Detailed Description
Hereinafter, the implementation of the present embodiment will be described in detail with reference to the accompanying drawings. Wherein, in the description of the embodiments of the present application, unless otherwise indicated, "/" means or, for example, a/B may represent a or B; "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, in the description of the embodiments of the present application, "plurality" means two or more than two.
The embodiment of the application is applied to an enhanced IAB network (i.e. the IAB network provided with the management node), and is particularly applied to a scene of accessing a new IAB-node into the enhanced IAB network. It should be understood that a new backhaul node refers to a node that has not yet accessed the IAB network. The enhanced IAB network is an IAB network provided with management nodes.
The IAB technology can replace the traditional optical fiber backhaul link, thereby avoiding a large number of optical fiber deployments, improving the flexibility of network deployment and reducing the cost of network deployment.
First, to facilitate understanding of the enhanced IAB network, the present application will be described with reference to fig. 1 and 2. Fig. 1 and fig. 2 are schematic diagrams of network architecture of an IAB network in the prior art.
As shown in fig. 1, the IAB network includes two types of nodes, which are respectively: IAB-donor (denoted as host base station in fig. 1) and IAB-node (node 1 and node 2 in fig. 1).
Wherein the IAB-node may be directly connected to the core network and provide access services for the UE and the IAB-node and provide a backhaul exit to the core network for the IAB-node. The IAB-donor accesses the core network via a logical interface, e.g. NG interface.
The IAB-node is not directly connected with the core network, but is connected to the IAB-node in a wireless backhaul manner by a single-hop or multi-hop manner, and thus, the IAB-node is transmitted to the core network back and forth. For example, IAB-node1 may be returned to IAB-donor by single-hop wireless, while IAB-node2 may be returned to IAB-donor by multi-hop wireless. And, the IAB-node may also provide backhaul relay services for other IAB-nodes. For example, IAB-node1 may provide backhaul relay services for IAB-node 2.
In addition, in the IAB network, both the IAB-node and the IAB-node are network side devices, for example, an access point AP of Wireless-Fidelity (WIFI), a base station of next-generation communication, such as a gNB or a small station, a micro station, or a TRP of 5G, and may also be a relay station, an access point, an in-vehicle device, a wearable device, or the like. In this embodiment, base stations in communication systems of different communication schemes are different. For the sake of distinction, the base station of the 4G communication system is referred to as LTE eNB, the base station of the 5G communication system is referred to as NR gNB, the base station supporting both the 4G communication system and the 5G communication system is referred to as eLTE eNB, these names are for convenience of distinction only and are not limiting.
Thus, in an IAB network, both the base stations, IAB-node and IAB-node as shown in FIG. 1, can provide access services to the UE. Thus, the UE accesses the core network through the accessed base station.
Specifically, fig. 1 further illustrates the architecture of each base station. As shown in fig. 1, the IAB-donor adopts a split architecture, including: centralized units (centralized unit, CUs) and Distributed Units (DUs). Whereas the IAB-node includes: mobile terminals (mobile termination, MT) and DUs.
The CU in the IAB-node can be connected with the DU of the under-jurisdiction IAB-node for centrally managing each IAB-node. Specifically, the CU and the DU are connected through a logical interface, such as an F1 interface. In addition, the CU is also used for accessing the core network.
The DU in each base station may be used to connect to a downstream IAB-node or UE for providing access services or backhaul relay services to the UE or downstream IAB-node. Specifically, for any base station, the DU of the base station is connected to the MT of the IAB-node, and the DU of the base station may also be connected to the UE. The connection may be a user equipment interface, such as the NR Uu interface shown in fig. 1.
The MT is used to connect to an upstream base station, i.e., an upstream IAB-node or IAB-donor. That is, the MT is typically connected to the DU of the upstream base station.
In addition, in an IAB network, the number of IAB-nodes and IAB-donors may be plural. For example, reference may be made to fig. 2, in which an IAB network shown in fig. 2 includes two IAB-nodes, respectively: IAB-donor1 and IAB-donor2. Wherein, IAB-donor1 is connected with IAB-node 1-IAB-node 3, and provides a backhaul outlet to the core network for the IAB-donor 1. IAB-donor2 is connected to IAB-node4, IAB-node5, and provides a backhaul outlet to the core network.
In an IAB network as shown in fig. 1 or fig. 2, both IAB-donor and IAB-node may provide backhaul services for other nodes, which may both be referred to as backhaul nodes.
In an IAB network, when a new IAB-node (i.e., a node with an IAB function that is not connected to the IAB network) needs to join the network, a backhaul node cell needs to be selected and connected to the network, and a backhaul link is established with the backhaul node cell, so that the backhaul node and the IAB network can be connected to the network. Wherein each backhaul node may correspond to one or more cells, which are referred to as backhaul node cells for ease of illustration.
For example, when a new IAB-node joins the IAB network shown in fig. 2, IAB-donor1, IAB-donor2, and IAB-node1 to IAB-node5 are backhaul nodes, and the new IAB-node may select one backhaul node cell to access in these backhaul nodes. For example, if a new IAB-node accesses IAB-donor1, then IAB-donor1 may provide backhaul egress directly to the core network for IAB-node1, IAB-node3, the new IAB-node. For another example, if a new IAB-node accesses IAB-node5, the new IAB-node may pass back to IAB-donor2 via multiple hops through IAB-node5, with the IAB-donor2 providing a backhaul egress for the new IAB-node to the core network. Is not exhaustive.
In an IAB network as shown in fig. 1 or fig. 2, each IAB-node can independently manage its own under jurisdiction. For example, in FIG. 2, IAB-donor1 can independently manage the under jurisdictions IAB-node1 through IAB-node3; IAB-donor2 can independently manage IAB-node4 and IAB-node5 under jurisdiction. However, the lack of coordination between IAB-donors makes it difficult to achieve collaborative management of IAB-nodes across IAB-donors.
On the basis of the foregoing IAB network, an management node (IAB-controller) may be further added to the IAB network, and in a practical scenario, such an IAB network may also be referred to as an enhanced IAB network.
In the enhanced IAB network, the IAB-controllers are used for centralized management of a plurality of IAB-donors and IAB-nodes under the jurisdiction of the IAB-donors, so that the centralized control of the IAB-controllers can realize the collaborative management of the IAB-nodes crossing the IAB-donors.
Specifically, the IAB-controller assumes a centralized management function and may also be used to assume some Control Plane (CP) functions. While the IAB-donor assumes the data plane (UP) function and the rest of the Control Plane (CP) function. In other words, the enhanced IAB network extracts a part of CP functions (such as topology and routing management functions) of each IAB-donor, and puts the extracted CP functions in an IAB-controller to perform centralized control, so that IAB-node collaborative management across IAB-donor can be realized.
In one possible embodiment, the IAB-controller may be deployed in a lower frequency band to ensure a larger coverage area of the IAB-controller.
Fig. 3 is a schematic diagram of another architecture of a network system according to an embodiment of the present application. As shown in FIG. 3, the IAB-controller is a management node for centrally managing IAB-donor 1-IAB-donor 3 and the IAB-nodes under the same, and each IAB-donor can be used for managing one or more IAB-nodes. The number of IAB-nodes administered by each IAB-donor may be the same or different.
In an enhanced IAB network, one or more IAB-controllers may be included, each of which may be used to centrally manage a plurality of IAB-nodes and their jurisdictions.
Fig. 4 is a schematic diagram of an architecture of another network system according to an embodiment of the present application. As shown in fig. 4, in the IAB network, an IAB-controller1 and an IAB-controller2 are included, wherein the IAB-controller1 is used for centrally managing IAB-donor1, IAB-donor2 and IAB-node1 to IAB-node3 under the same, and the IAB-controller2 is used for centrally managing IAB-donor3 and IAB-node4 under the same.
In the enhanced IAB network provided by the embodiments of the present application, an IAB-controller may at least communicate with a backhaul node.
Specifically, the IAB-controller may be radio broadcast capable. In other words, the IAB-controller may comprise a wireless communication unit. In this manner, the IAB-controller may communicate with the backhaul nodes via wireless communication. Wherein the wireless communication unit may include, but is not limited to, an air interface transceiver module.
In another exemplary embodiment, the IAB-controller may include a wireless communication unit and a wired communication unit. As such, the IAB-controller may communicate with the backhaul nodes via wireless and/or wired communication.
For example, in an IAB network, the access manner between an IAB-node and an IAB-controller may be: air interface access or non-air interface access. At this time, the IAB-donor may include a communication unit in addition to the DU and the CU, and the communication unit may include: a wireless communication unit and/or a wired communication unit. Illustratively, when the communication unit is a wireless communication unit, for example, the MT, the IAB-controller may access the IAB-controller by way of air interface communication; when the communication unit is a wired interface, such as a fiber optic interface, the IAB-donor may access the IAB-controller by wired means.
Fig. 5 is a schematic diagram of a network element architecture of each base station in the network system according to the embodiment of the present application. As shown in fig. 5, the IAB-node still includes a DU and an MT; the IAB-donor may include, in addition to the DU and CU, at least one of the MT and the wired interface. Thus, the IAB-node may still be accessed to the upstream IAB-node or IAB-donor via the MT. And the IAB-controller may include an air interface transceiver module, where the IAB-controller communicates with the backhaul node by wireless communication. In addition, the IAB-controller may also include a wired interface. In fig. 5, the wired interface of the IAB-controller is an optional module, and is marked with a dashed box. And the choice of at least one of the MT (mobile terminal) and the wired interface in the IAB-donor is also identified by a dashed box.
In an enhanced IAB network, IAB-donor needs to access a management node. Therefore, when a new IAB-donor accesses the IAB network, only one management node cell needs to be accessed, and a backhaul link is established, which will not be described in detail.
In an enhanced IAB network, an IAB-node needs to access a backhaul node and a management node. Taking the scenario shown in fig. 4 as an example, in this scenario, IAB-node1 accesses IAB-node2 (backhaul node) and IAB-controller1 (management node); IAB-node4 accesses IAB-donor3 (backhaul node) and IAB-controller2 (management node).
Then, when a new IAB-node needs to join the IAB network, it is also necessary to access a backhaul node and a management node. At this time, the new IAB-node may search the backhaul node cell and the management node cell, respectively, and when both meet respective access conditions, the new IAB-node may access the searched backhaul node cell and management node cell.
This is likely to be a problem in that the backhaul node of the new IAB-node access does not match the management node. Still taking the scenario of fig. 4 as an example, a new IAB-node may access IAB-donor2 and IAB-controller2, where the IAB-donor2 and the IAB-controller2 are not matched, and the IAB-donor2 is actually managed by the IAB-controller1, so that the new IAB-node may be simultaneously managed by the IAB-controller1 and the IAB-controller2, so that the management manner is disordered, and communication failure is easily caused. In other words, if the IAB-donor2 accessed by the new IAB-node is not matched with the IAB-controller2, it is difficult for the enhanced IAB network to implement effective management and communication, and the communication quality is affected.
In the embodiment of the application, in the enhanced IAB network, between the interconnected management node and the backhaul node, the management node may send the search information of the management node cell to the backhaul node, and the backhaul node broadcasts the search information in its own backhaul node cell.
Thus, when a new IAB-node accesses the IAB network, the new IAB-node may obtain the search information of the management node cell based on the broadcast message after searching the backhaul node cell, and may further search the management node cell. As such, the backhaul node of the new IAB-node access is matched to the management node.
Conversely, the backhaul node may also send the search information of the backhaul node cell to the management node, which broadcasts the search information within the management node cell. And will be described in detail later.
The following describes a communication method of the IAB network in the embodiment of the present application.
Fig. 6 is an information interaction schematic diagram of a network system communication method according to an embodiment of the present application. The method is applied to a network system comprising a first node and a second node, wherein the first node and the second node are connected with each other.
It should be understood that the target network to which the embodiments of the present application are directed may be an enhanced IAB network as described in any of the foregoing possible embodiments of fig. 3-5. That is, the IAB network includes one or more management nodes, each management node is configured to manage one or more backhaul nodes, and the backhaul nodes include: an IAB-node that has access to an IAB network and/or an IAB-donor that has access to an IAB network.
At this time, the first node and the second node may have the following designs:
In a possible embodiment, the first node may be a backhaul node (IAB-node or IAB-donor) and the second node may be an administrative node (IAB-controller).
In another possible embodiment, the first node may be an management node (IAB-controller) and the second node may be a backhaul node (IAB-node or IAB-donor).
As such, the first node and the second node are interconnected, and the first node may be managed by the second node or the first node may be managed by the second node. In other words, the first node and the second node are connected to each other, including two cases: the first node accesses a cell of the second node, or the second node accesses a cell of the first node. And will not be described in detail.
Further, in an IAB network comprising management nodes, the manner of communication between the first node and the second node may comprise one or more of wired or wireless communication. The specific designs of the first node and the second node are described later.
As shown in fig. 6, the communication method of the network system may include the steps of:
s602, the second node transmits search information of the second node cell to the first node.
The second node cell is the cell corresponding to the second node. Each node may correspond to one or more cells, and the number of the cells is particularly limited in the embodiment of the present application.
The trigger method and the execution method of this step will be described later.
S604, the first node receives the search information.
S608, the first node sends a broadcast message in the first node cell, where the broadcast message carries the search information.
In other words, the backhaul node may send search information of the backhaul node cell to the management node, which broadcasts the search information within the management node's cell. Or the management node may send the search information of the management node cell to the backhaul node, which broadcasts the search information within the backhaul node cell.
When a new IAB-node accesses the IAB network, the search information broadcasted by the first node is beneficial to the new IAB-node, and the interconnection relation between the first node and the second node is determined, so that the first node and the second node can be beneficial to accessing the management node and the backhaul node which are matched with each other. This process is described in detail later.
In the embodiment of the application, the search information of the cell is used for assisting in searching or positioning the cell. Specifically, the search information may include, but is not limited to: the frequency band in which the second node cell is located, and a cell identity of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identifier of the second node, and the like, which are not particularly limited in the embodiment of the present application.
Wherein the cell type of the second node cell is associated with the base station type of the second node. Further, for any one base station, the base station type and the cell type may be in one-to-one correspondence. The type of base station is related to the role (or effect) of the base station in the network system and the access situation.
In an exemplary embodiment, the base stations may be divided into the following 4 types: type 1 to type 4. Wherein, the type 1 base station is an management node (IAB-controller) in the IAB network, the type 2 base station is a backhaul node (IAB-node or IAB-node) which has been accessed to the IAB-controller, the type 3 base station is an IAB-node or an IAB-node which has not been accessed to the IAB-controller, and the type 4 base station is a base station which does not support the IAB function. For example, in this embodiment, the management node base station type is type 1, the backhaul node base station type is type 2, and the new IAB-node base station type is type 3.
The cell type may also be divided into 4 corresponding types based on the division of the base station type. That is, the base station to which the type 1 cell belongs is a type 1 base station, the base station to which the type 2 cell belongs is a type 2 base station, the base station to which the type 3 cell belongs is a type 3 base station, and the base station to which the type 4 cell belongs is a type 4 base station. At this time, the type 1 cell is an IAB-Controller cell, and the type 2 cell is a backhaul node cell (IAB-node cell or IAB-node cell).
It is understood that types 1-4 are merely for convenience of illustration, and in a practical scenario, the base station type and the cell type may be configured by a combination of one or more of numerals, symbols, characters, letters. At this time, the base station type and the cell type may be identified in the same manner, or may be identified in different manners. For example, type 1 of a base station or cell may be identified as 1 and type 2 may be identified as 2; for another example, base station type 1 may be identified as A1 and cell type 1 may be identified as C1; as another example, a base station or cell of type 1 may be identified as +, type 2 as + + + (identified by the number of symbols, or designated characters). The base station type and the cell type can be identified in names, attributes, information in information when information is transmitted and received, and the like, and the types of the base station type and the cell type are identified by one or more modes.
In one embodiment shown in fig. 6, the broadcast message sent by the first node may include only the search information. Or in another embodiment of fig. 6, the broadcast message sent by the first node may include, but is not limited to, search information.
At this time, other information may also be carried in the broadcast message. In an exemplary embodiment, the broadcast message may further carry a type identifier, where the type identifier is used to identify: one or more of a base station type of the first node, a cell type of the first node cell, a base station type of the second node, and a cell type of the second node cell. In other words, the broadcast message may include: one or more of a base station type or a cell type, and searching for information. The base station type and the cell type may broadcast themselves or may broadcast the second node connected to each other, and are not particularly limited.
For example, in the broadcast message of the first node, 2 bits (which may be different variations, for example) may be added to indicate the cell type of the first node. For another example, in the broadcast message of the first node, 2 bits may be added to indicate the base station type of the second node.
Specifically, 2 bits may be added in a master system information block (Master Information Block, MIB) or a system information block (System Information Block, SIB) of a broadcast message to indicate a base station type or cell base station.
In this way, in the scenario shown in fig. 6, as long as a broadcast message from a first node can be received, information of a cell of a second node interconnected with the first node can be known accordingly. Therefore, when a new node accesses the IAB network, the interconnection relation between the first node and the second node can be determined according to the broadcast message after the first node cell is searched, so that the first node and the second node which are connected with each other can be accessed when the new node accesses.
In the embodiment shown in fig. 6, the step S602 may be actively implemented by the second node, or may be performed in response to a request from the first node.
In an exemplary embodiment, the second node may periodically send the search information to the first node.
In another exemplary embodiment, the second node may also send the search information to the first node at regular intervals.
In another exemplary embodiment, the second node may also send the search information to the first node when a preset condition is satisfied. For example, when a new backhaul node is present to access a second node, the second node transmits search information of a second node cell to the first node.
In another exemplary embodiment, the second node transmits search information of the second node cell to the first node in response to receiving an information acquisition request transmitted by the first node. It is understood that the information acquisition request is used to request the second node for search information of the second node cell. In the embodiment of the application, the first node can send the information acquisition request to the second node according to actual needs, for example, when a new backhaul node accesses the first node, the first node sends the information acquisition request to the second node.
After the triggering in step S602, the sending manner of the search information may also have a plurality of possible implementation manners based on the different types of the first node and the second node.
In an exemplary scenario, the first node is a backhaul node and the second node is a management node. When the backhaul node has a wireless communication unit, the backhaul node has a wireless communication capability, and the management node may send the search information to the first node through a wireless communication manner.
At this time, the management node may transmit the search information of the management node cell to the backhaul node by broadcasting in the IAB network system. Thus, the complicated operation that the management node sends the search information to each backhaul node is saved, and the communication resources of the management node are saved.
Or the management node can also send the search information of the management node cell to the backhaul node in a unicast mode. In this case, the search information of the management node cell, which the management node transmits to the plurality of backhaul nodes individually, may be the same or different. And the management node can send the search information of all cells of the management node to the backhaul node, and can also send the search information of part of cells in the search information.
Taking the network system shown in fig. 4 as an example, the IAB-controller1 may send search information of the management node cell to the IAB-donor1 and the IAB-donor2, respectively, and the cell corresponding to the IAB-controller1 includes cells 1 to 3, and then the IAB-controller1 may send search information of the cell 1 and the cell 2 to the IAB-donor1, and the IAB-controller1 may send search information of the cell 1 to the cell 3 to the IAB-donor 2. Or the IAB-controller1 may send search information of cell 1 to cell 3 to the IAB-donor1 and the IAB-donor2, respectively.
In another scenario, the first node is a backhaul node and the second node is a management node. When both the backhaul node and the management node have wired interfaces, both can communicate through wired communication modes. At this time, the management node may send the search information of the management node cell to each backhaul node, and the search information may be the same or different, which is not described in detail.
In another scenario, the first node is a management node, and the second node is a backhaul node, and the backhaul node sends search information of a backhaul node cell to the management node. In this case, the communication of the search information may be performed by wired or wireless means based on the hardware configuration difference between the backhaul node and the management node. In such a scenario, the backhaul node typically transmits search information of its own cell by unicast.
In addition, it should be noted that, in the IAB network, the first node and the second node may communicate directly, for example, through air interface communication or through a directly connected data line; or the first node and the second node also intentionally communicate indirectly. Still referring to fig. 4, the first node may be an IAB-controller1, and the second node may be an IAB-node1, where indirect communication may be implemented between the two nodes through IAB-node 2.
Based on the communication method of the network system, the embodiment of the application also provides a network access method.
The method is particularly applied to the scene that the node to be accessed accesses the target network. For example, the node to be accessed may be an IAB-node that is not accessed to an IAB network, that is, the network access method may be applied to a scenario where a new IAB-node accesses an IAB network system. The IAB network may be an IAB network (or referred to as an enhanced IAB network) including management nodes, among others. In addition, the node to be accessed may be an IAB-donor which is not accessed to the IAB network, which is not described in detail.
Fig. 7 is a schematic flow chart of a network access method according to an embodiment of the present application. As shown in fig. 7, the method may include the steps of:
s702, the node to be accessed searches a first cell in the target network to obtain a first node cell.
The network access method will now be described by taking an IAB-node to be accessed as a new node as an example. In this case, the node to be accessed may search for the backhaul node cell first, or may search for the management node cell first, which is not particularly limited in the embodiment of the present application.
And S704, the node to be accessed receives a broadcast message from the first node, wherein the broadcast message carries the search information of the second node cell, and the first node and the second node are connected with each other.
After the access node searches the first node cell, the interconnection between the first node and the second node can be determined according to the broadcast message received by the first node cell.
As described above, the broadcast message is actually broadcast by the first node, and the search information carried in the broadcast message is from the second node, which is not described herein.
In a specific implementation, the node to be accessed can start to listen to the broadcast of the first node after searching the first node cell, so that the broadcast message can be received when the first node broadcasts to the first node cell.
And S706, the node to be accessed searches the second cell according to the search information to obtain a second node cell.
The node to be accessed can perform cell search according to the search information, that is, the frequency band and the cell identifier (or may also include other search information) where the second node cell is located, so as to obtain the second node cell.
S708, the node to be accessed accesses the first node cell and the second node cell.
At this time, the first node and the second node are connected to each other, that is, the management node and the backhaul node are matched. The method solves the problem that the management node is not matched with the backhaul node when the new node accesses the IAB network, and further solves the problems of management and communication faults caused by the mismatching of the management node and the backhaul node, and improves the communication quality.
As described above, in an IAB network, a backhaul node needs to access a cell of an IAB-controller and establish a backhaul link. For any backhaul node in an IAB network, the IAB-controller accessed by the backhaul node may be referred to as an associated IAB-controller for the backhaul node. And the cell associated with the IAB-controller may be referred to as the associated IAB-controller cell of the backhaul node (or the cell of the backhaul node).
In addition, the backhaul node that accesses the IAB-controller may also be referred to as the associated backhaul node of the IAB-controller. And the cell of the associated backhaul node of the IAB-controller is referred to as the associated backhaul node cell of the IAB-controller (or the cell of the IAB-controller).
It should be noted that, a backhaul node generally only accesses one cell of an IAB-controller, but all cells of the associated IAB-controller may be referred to as an associated IAB-controller cell of the backhaul node (or the backhaul node cell).
Conversely, all backhaul nodes that access an IAB-controller may be referred to as the associated backhaul node of that IAB-controller (or the IAB-controller cell). And all cells of these associated backhaul nodes may be referred to as the associated backhaul node cells of the IAB-controller (or the IAB-controller cells).
Fig. 8 is a schematic diagram of an associated base station and an associated cell in an embodiment of the present application. As shown in fig. 8, backhaul node a has cells { a1, a2}, backhaul node B has cells { B1, B2}, and management node C (IAB-controller C) has cells { C1, C2, C3}. At this time, both the backhaul node a and the backhaul node B access the IAB-controller C, more specifically, the backhaul node a accesses the cell C1 and the backhaul node B accesses the cell C3.
Then, for backhaul node a, IAB-controller C is the associated IAB-controller of backhaul node a, and cells C1, C2, C3 are all the associated IAB-controller cells of backhaul node a. For cell a1 (or cell a 2), cells c1, c2, c3 are all their associated IAB-controller cells.
For backhaul node B, IAB-controller C is the backhaul node B's associated IAB-controller, and cells C1, C2, C3 are all backhaul node B's associated IAB-controller cells. For cell b1 (or cell b 2), cells c1, c2, c3 are all their associated IAB-controller cells.
For IAB-controller C, both backhaul node A and backhaul node B are associated backhaul nodes of IAB-controller C. And cells a1, a2, b1, b2 are all associated backhaul node cells of the IAB-controller C. For cell c1 (or cell a2, cell a 3), cells c1, c2, c3 are all their associated IAB-controller cells.
Based on this design, in the actual implementation scenario of the embodiment shown in fig. 7, the first node cell is the associated first node cell of the second node cell; and the second node cell is also the associated second node cell of the first node cell.
In the embodiment of the application, when a new IAB-node accesses an IAB network, whether the backhaul node cell and the associated IAB-controller cell meet the access condition can be judged.
Thus, in the embodiment shown in fig. 7, the first node cell to be accessed by the access node satisfies the preset first access condition, and the second node cell satisfies the preset second access condition.
In the actual scene, the first access condition and the second access condition can be custom designed according to the actual scene. The two may be the same or different.
In an exemplary embodiment, the first access condition may be that the first node cell does not belong to a forbidden cell, and the wireless signal strength of the first node cell reaches a preset first strength threshold. And the second access condition is that the second node cell does not belong to the forbidden cell, and the wireless signal strength of the second node cell reaches a preset second strength threshold.
Where a barred (barred) cell means that the cell is set or configured (or not allowed) for users to disable access. In a practical scenario, a forbidden cell list may be maintained, which may be maintained in the node to be accessed, or may be maintained in a storage location readable by the first node, without limitation. Or in LTE and NR, an indication bit may also be carried in the broadcast message of the cell, where the indication bit is used to indicate whether the cell is barred. In this manner, the node to be accessed can determine whether the cell is a forbidden cell according to the indication bit in the broadcast message.
The radio signal strength may be characterized by one or more of a reference signal received Power (REFERENCE SIGNAL RECEIVING Power, RSRP) or a reference signal received Quality (REFERENCE SIGNAL RECEIVING Quality, RSRQ). And the first intensity threshold and the second intensity threshold may be the same or different. The wireless signal strength of the backhaul node cell and the associated IAB-controller cell reaches the corresponding strength threshold, so that the better communication quality of the cells can be ensured to a certain extent, and the communication requirement of the access node after accessing the IAB network can be met.
It will be appreciated that in a practical scenario, there may be other variations of the first access condition (or the second access condition). In another exemplary embodiment, the first access condition may be that the first node cell does not belong to a forbidden cell. In another exemplary embodiment, the first access condition may be that the noise strength of the first node cell is less than a preset third strength threshold. In another exemplary embodiment, the first access condition may be that the bandwidth of the first node cell meets a preset bandwidth threshold. Is not exhaustive. The second access condition may also be configured as described above by way of example.
In the embodiment of the present application, if the first node cell does not meet the first access condition and/or the second node cell does not meet the second access condition, step S708 is not executed any more, and the corresponding search is performed again.
In the embodiment of the application, the judgment of the node to be accessed aiming at the access condition can be realized in a plurality of different ways:
In an exemplary embodiment, after S702 is performed, the node to be accessed may determine whether the first node cell meets the first access condition; thus, when the first node cell satisfies the first access condition, S704 is performed again. Then, when the node to be accessed executes S706 and searches for the second node cell, it can be judged whether the second node cell meets the second access condition; thus, when the second node cell satisfies the second access condition, the access step of S708 is performed again.
At this time, if the first node cell does not satisfy the first access condition, S704 is not executed, and S702 is re-searched.
If the second node cell does not meet the second access condition, S708 is not performed. At this time, if the search information of the other second node cell also exists in the broadcast message, S704 is executed to re-search the other second node cell, and whether the second access condition is satisfied is determined. Or if there are no other second node cells satisfying the second access condition in the broadcast message, re-executing S702 to search for other first node cells.
Or if the second node cell does not meet the second access condition, the process may also return to S702 to search for another first node cell again.
In an exemplary embodiment, after S702 is performed, the node to be accessed may determine whether the first node cell meets the first access condition; meanwhile, S704 to S706 are performed. After that, when the node to be accessed performs S706 and searches for the second node cell, the node to be accessed determines whether the second node cell satisfies the second access condition. Then, when the first node cell satisfies the first access condition and the second node cell satisfies the second access condition, the access step of S708 is performed again.
In this embodiment, if it is determined that the first node cell does not meet the first access condition, the execution of the other parallel branch is stopped, and the process returns to S702 to search for the first node cell again. If the second node cell does not meet the second access condition, S702 may be re-executed or S704 may be re-executed, which will not be described in detail.
In another exemplary embodiment, after S706 is executed, the node to be accessed may determine whether the first node cell and the second node cell meet a preset access condition after having searched the first node cell and the second node cell. Further, when the first node cell satisfies the first access condition and the second node cell satisfies the second access condition, the access step of S708 is performed again.
In this embodiment, if the first node cell does not meet the first access condition, S702 may be re-performed. If the second node cell does not meet the second access condition, S702 may be re-executed or S704 may be re-executed, which will not be described in detail.
In performing S708 in particular, the node to be accessed may initiate a random access procedure to attempt to access the first node cell and the second node cell.
If a plurality of second node cells satisfying the second access condition are searched in S708, the node to be accessed may sequentially attempt to access the plurality of second node cells until one of the second node cells is successfully accessed.
Specifically, the random access process of the node to be accessed is as follows: the node to be accessed sends an access request message to the base station (the first node or the second node) to request access to the cell of the base station (the first node cell or the second node cell). After receiving the access request message, the base station may send a feedback message to the node to be accessed, where the feedback message is used to inform the node to be accessed of whether to allow access. Then, after receiving the feedback information from the base station, the node to be accessed indicates that the node to be accessed has successfully accessed the cell of the base station if the feedback information indicates that the access is allowed; otherwise, if the feedback message informs that the access is not allowed (or the access is refused), the access failure is indicated.
In the foregoing random access procedure, the base station may be the first node or the second node. If the node to be accessed sends an access request message to the first node, the node to be accessed requests to access the first node cell; or if the node to be accessed sends the access request message to the second node, the node to be accessed requests to access the second node cell.
Based on the foregoing process, the node to be accessed may send, in the plurality of second node cells satisfying the second access condition, an access request message to each second node in turn to request access, and receive a feedback message from the second node until the obtained feedback message indicates that access is allowed, and then the node to be accessed successfully accesses one second node cell.
The network access method in the embodiment of the present application is illustrated in the following with reference to fig. 9 and 10.
In the scenario shown in fig. 9, the first node is a backhaul node and the second node is a management node. As shown in fig. 9, the network access method applied to the node to be accessed may include the following steps:
S901, searching for a backhaul node cell.
The backhaul node cell is a type 2 cell.
S902, judging whether a backhaul node cell is searched; if yes, executing S903; if not, S901 is executed.
If found, the backhaul node cell is referred to as backhaul node cell A1, and corresponds to backhaul node a. The backhaul node a may include only the cell A1 or may include other cells in addition to the cell A1.
S903, the signal strength of the backhaul node cell A1 is measured.
For example, RSRP of the backhaul node cell A1 is measured and/or RSRQ of the backhaul node cell A1 is measured.
S904, judging whether the backhaul node cell A1 meets a first access condition; if yes, execute S905; if not, S901 is executed.
The first access condition is that the backhaul node cell does not belong to a forbidden cell, and the signal strength reaches a preset first strength threshold.
S905, acquiring a broadcast message of the backhaul node A, wherein the broadcast message carries search information of the cells B1-BN of the management node B.
Wherein the backhaul node a is interconnected with the management node B. The management node B includes N cells, namely, cells B1, B2, … …, BN, and N is an integer greater than 0.
S906, carrying out cell search according to the search information, and searching N cells of the management node B.
In other words, an associated IAB-controller cell of the backhaul node cell A is acquired.
S907, the signal intensity of the management node cells B1-BN is measured.
S908, judging whether a cell meeting a second access condition exists in the management node cells B1-BN; if yes, executing S909; if not, S901 is executed.
S909, starting a random access procedure, attempting to access the backhaul node cell A1.
S910, judging whether the backhaul node cell A1 is successfully accessed; if yes, executing S911; if not, S901 is executed.
S911, starting a random access process, and sequentially trying to access the management node cells B1-BN.
S912, judging whether one of the management node cells B1-BN is successfully accessed; if yes, execute S913; if not, S901 is executed.
For convenience of explanation, a management node cell to which the node to be accessed is successfully accessed is denoted as Bi, and i is one of 1 to N.
S913, the backhaul node cell A1 and the management node cell Bi are successfully accessed.
In the scenario shown in fig. 10, the first node is a management node and the second node is a backhaul node. As shown in fig. 10, the network access method may include the steps of:
S1001, searching a management node cell.
The management node cell is a type 1 cell.
S1002, judging whether a management node cell is searched; if yes, executing S1003; if not, S1001 is executed.
If the search is made, the management node cell is designated as cell B1, corresponding to the management node B. The management node B may include only the cell B1 or may include other cells in addition to the cell B1.
S1003, the signal strength of the management node cell B1 is measured.
For example, RSRP of the management node cell B1 is measured and/or RSRQ of the management node cell B1 is measured.
S1004, judging whether the management node cell B1 meets a second access condition; if yes, executing S1005; if not, S1001 is executed.
The second access condition is that the management node cell does not belong to the forbidden cell, and the signal strength reaches a preset second strength threshold.
S1005, a broadcast message of the management node B is acquired, wherein the broadcast message carries search information of cells A1-AM of the backhaul node A.
Wherein the backhaul node a is interconnected with the management node B. The backhaul node a includes M cells, which are cells A1, A2, … …, and AM, respectively, and M is an integer greater than 0.
S1006, cell searching is carried out according to the searching information, and M cells of the backhaul node A are searched.
In other words, an associated IAB-controller cell of the backhaul node cell A is acquired.
S1007, measuring the signal strength of the backhaul node cells A1-AM.
S1008, judging whether a cell meeting a first access condition exists in the backhaul node cells A1-AM; if yes, execution S1009; if not, S1001 is executed.
S1009, starting a random access procedure, attempting to access the management node cell B1.
S1010, judging whether the management node cell B1 is successfully accessed; if yes, executing S1011; if not, S1001 is executed.
S1011, starting a random access process, and sequentially trying to access the backhaul node cells A1-AM.
S1012, judging whether one of the backhaul node cells A1-AM is successfully accessed; if yes, go to S1013; if not, S1001 is executed.
For convenience of description, a backhaul node cell successfully accessed by the node to be accessed is denoted as Aj, and j is one of 1 to M.
S1013, the backhaul node cell Aj and the management node cell B1 are successfully accessed.
In addition, in the embodiment of the present application, the backhaul node may send the search information of the backhaul node cell to the management node, or the management node may send the search information of the management node cell to the backhaul node. The two processes have no conflict, the backhaul node and the management node can mutually send the search information of own cells to each other, and at the moment, whether the new IAB-node searches the backhaul node cell or searches the management node cell first, the IAB network can be accessed according to the mode.
Based on the foregoing design, the communication method of the network system and the network access method provided by the embodiments of the present application ensure that the first node and the second node to be accessed by the node to be accessed are connected with each other, so when the target network is an IAB network including a management node, it can also ensure that when a new IAB-node accesses the IAB network, the new IAB-node accesses the backhaul node and the IAB-controller connected with each other, thereby solving the problem that the management node and the backhaul node are not matched when the new node accesses the IAB network, and further causing management and communication failure problems, and improving the communication quality.
The embodiment of the application also provides a network access device. For example, referring to fig. 11, a network access device may include:
A searching module 112, configured to search a target network for a first cell to obtain a first node cell;
A receiving module 114, configured to receive a broadcast message from a first node, where the broadcast message carries search information of a second node cell, and the first node and the second node are connected to each other;
the searching module 112 is further configured to search the second cell according to the search information to obtain a second node cell;
an access module 116, configured to access the first node cell and the second node cell;
the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition.
In one possible embodiment, the search information may include, but is not limited to: the frequency band of the second node cell and the cell identification of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identity of the second node, etc.
In another possible embodiment, the search information is sent periodically by the second node to the first node. Or in another possible embodiment, the search information is sent by the second node to the first node at regular time. In addition, the second node may transmit the search information to the first node when a preset condition is satisfied. That is, the search information is actively transmitted by the second node to the first node and broadcast by the first node within the first node cell.
In another possible embodiment, the search information is sent by the second node to the first node in response to an information acquisition request sent by the first node to the second node. That is, the search information is transmitted by the second node in response to the request of the first node, which is broadcast in the first node cell after receiving the feedback of the second node.
In another possible embodiment, the broadcast message further comprises: type identification, type identification is used for identifying: the base station type of the second node and/or the cell type of the second node cell. In addition to this, the type identification may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, the first node is a backhaul node and the second node is a management node. The scenario shown in fig. 9 is not described in detail.
In another possible embodiment, the first node is a management node and the second node is a backhaul node. The scenario shown in fig. 10 is not described in detail.
In the embodiment of the present application, the target network may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, and each management node is configured to manage one or more backhaul nodes, where the backhaul nodes may include: an IAB node accessed to the target network and/or an IAB host base station accessed to the target network. As shown in fig. 3 to 5, a detailed description is omitted.
In the embodiment of the application, the network access equipment is an IAB node which is not accessed to the target network.
In another possible embodiment, the first access condition is that the first node cell does not belong to a forbidden cell, and the wireless signal strength of the first node cell reaches a preset first strength threshold; the second access condition is that the second node cell does not belong to the forbidden cell, and the wireless signal strength of the second node cell reaches a preset second strength threshold. That is, the node to be accessed accesses the backhaul node cell and its associated IAB-controller cell which meet the preset access condition.
The network access device of the embodiment shown in fig. 11 may be used to implement the technical solution of the above-mentioned method embodiment, and the implementation principle and technical effects may be further referred to the related description in the method embodiment, and alternatively, the network access device may be a base station with an IAB function.
It should be understood that the division of the modules of the network access device shown in fig. 11 is merely a division of a logic function, and may be fully or partially integrated into a physical entity or may be physically separated. And these modules may all be implemented in software in the form of calls by the processing element; or can be realized in hardware; it is also possible that part of the modules are implemented in the form of software called by the processing element and part of the modules are implemented in the form of hardware. For example, the search module 112 may be a processing element that is set up separately, may be implemented in a chip of a network access device, such as a terminal, or may be stored in a memory of the network access device in a program form, and the functions of the above modules may be invoked and executed by a processing element of the network access device. The implementation of the other modules is similar. In addition, all or part of the modules can be integrated together or can be independently implemented. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in a software form.
For example, the modules above may be one or more integrated circuits configured to implement the methods above, such as: one or more Application SPECIFIC INTEGRATED Circuits (ASIC), or one or more microprocessors (DIGITAL SIGNAL processor, DSP), or one or more field programmable gate arrays (Field Programmable GATE ARRAY, FPGA), etc. For another example, when a module above is implemented in the form of a processing element scheduler, the processing element may be a general purpose processor, such as a central processing unit (Central Processing Unit, CPU) or other processor that may invoke a program. For another example, the modules may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Fig. 12 also shows a physical schematic of the network access device. The network access device may be used to implement the method corresponding to the node to be accessed, and specifically refer to the description in the embodiment of the method.
As shown in fig. 12, the network access device includes:
a memory 1210;
A processor 1220; and
A computer program;
Wherein the computer program is stored in the memory 1210 and configured to be executed by the processor 1220 to implement the method performed by the network access device as in the above embodiments.
The number of the processors 1220 in the network access device may be one or more, and the processors 1220 may also be called processing units, which may implement a certain control function. The processor 1220 may be a general-purpose processor or a special-purpose processor, or the like. In an alternative design, processor 1220 may also have instructions stored thereon that are executable by processor 1220 to cause the network access device to perform the methods described in the method embodiments above.
In yet another possible design, the network access device may include circuitry that may implement the functions of transmitting or receiving or communicating in the foregoing method embodiments.
Alternatively, the number of memories 1210 in the network access device may be one or more, and the memories 1210 may have instructions or intermediate data stored thereon, where the instructions may be executed on the processor 1220 to cause the network access device to perform the method described in the above method embodiments. Optionally, other relevant data may also be stored in the memory 1210. Instructions and/or data may also optionally be stored in processor 1220. The processor 1220 and the memory 1210 may be provided separately or may be integrated.
In addition, as shown in fig. 12, a transceiver 1230 is further disposed in the network access device, where the transceiver 1230 may be referred to as a transceiver unit, a transceiver circuit, or a transceiver, etc. for performing data transmission or communication with a test device or other terminal devices, which is not described herein.
As shown in fig. 12, the memory 1210, the processor 1220 and the transceiver 1230 are connected and communicate by a bus.
If the network access device is used to implement the methods corresponding to fig. 7, 9, and 10, for example, the broadcast message from the first node may be received by transceiver 1230. And processor 1220 is configured to perform corresponding determining or controlling operations, and optionally, may store corresponding instructions in memory 1210. For a specific manner of processing of the individual components, reference may be made to the relevant description of the previous embodiments.
The embodiment of the present application further provides a network system, and by way of example, referring to fig. 13, a network system 1300 may include: a first node 1310 and a second node 1320, the first node 1310 being interconnected with the second node 1320. Specifically, the second node 1320 is configured to send search information of the second node cell to the first node 1310; a first node 1310 for receiving search information; the first node 1310 is further configured to send a broadcast message in the first node cell, where the broadcast message carries the search information.
In one possible embodiment, the search information may include, but is not limited to: the frequency band of the second node cell and the cell identification of the second node cell.
In addition, the search information may include, but is not limited to: the name of the second node cell, the cell type of the second node cell, the base station type of the second node, the base station identity of the second node, etc.
In another possible embodiment, the broadcast message further comprises: type identification, type identification is used for identifying: the base station type of the second node and/or the cell type of the second node cell. In addition to this, the type identification may also be used to identify the base station type of the first node itself and/or the cell type of the first node cell.
In another possible embodiment, the first node 1310 is a backhaul node and the second node 1320 is a management node. The scenario shown in fig. 9 is not described in detail.
In another possible embodiment, the first node 1310 is a management node and the second node 1320 is a backhaul node. The scenario shown in fig. 10 is not described in detail.
In the embodiment of the present application, the network system may be an access backhaul integrated IAB network, where the IAB network includes one or more management nodes, and each management node is configured to manage one or more backhaul nodes, where the backhaul nodes may include: an IAB node of an accessed network system and/or an IAB host base station of the accessed network system. As shown in fig. 3 to 5, a detailed description is omitted.
In the embodiment of the application, the network access equipment is an IAB node which is not accessed to the network system.
Specifically, the structure of the IAB host base station (IAB-donor) may refer to fig. 5, including: a centralized unit CU, a distributed unit DU and a communication unit. The centralized unit is used for centrally managing the associated IAB nodes and is connected with the associated management nodes; a distributed unit, configured to connect with an associated IAB node; and the communication unit may include: a wireless communication unit and/or a wired communication unit.
The structure of the management node (IAB-controller) may also refer to fig. 5, including: a wireless communication unit; or the management node comprises a wireless communication unit and a wired communication unit.
The network system shown in fig. 13 may also refer to fig. 3 and 4, and will not be described herein.
The embodiment of the present application also provides a computer-readable storage medium, in which a computer program is stored, which when run on a computer causes the computer to perform the communication method or the network access method described in the above embodiment.
Furthermore, an embodiment of the present application provides a computer program product, where the computer program product includes a computer program, which when executed on a computer, causes the computer to perform the communication method or the network access method described in the foregoing embodiment.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk Solid STATE DISK), etc.

Claims (29)

1. A network access method, comprising:
searching a first cell in a target network by a node to be accessed to obtain a first node cell;
the node to be accessed receives a broadcast message from a first node, wherein the broadcast message carries search information of a second node cell, the first node and the second node are connected with each other, and the search information is used for assisting in searching or positioning to the second node cell;
the node to be accessed searches a second cell according to the search information to obtain a second node cell;
The node to be accessed accesses the first node cell and the second node cell;
the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition;
the target network is an access backhaul integrated IAB network;
The IAB network includes one or more management nodes, each of which is configured to manage one or more backhaul nodes, where the first node is a backhaul node, and the second node is a management node, or the first node is a management node, and the second node is a backhaul node.
2. The method of claim 1, wherein the search information comprises:
the frequency band of the second node cell is located;
And the cell identification of the second node cell.
3. A method according to claim 1 or 2, wherein the search information is sent periodically by the second node to the first node.
4. The method according to claim 1 or 2, wherein the search information is transmitted to the first node by the second node in response to an information acquisition request, wherein the information acquisition request is transmitted by the first node to the second node.
5. The method according to claim 1 or 2, wherein the broadcast message further comprises: and the type identifier is used for identifying the base station type of the second node and/or the cell type of the second node cell.
6. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The backhaul node includes: an IAB node having access to the target network and/or an IAB hosting base station having access to the target network.
7. The method of claim 6, wherein the node to be accessed is an IAB node that is not accessing the target network.
8. The method according to any of claims 1-2, 6-7, wherein the first access condition is that the first node cell does not belong to a forbidden cell, and the radio signal strength of the first node cell reaches a preset first strength threshold;
the second access condition is that the second node cell does not belong to a forbidden cell, and the wireless signal strength of the second node cell reaches a preset second strength threshold.
9. A network system communication method, applied to a network system including a first node and a second node, the method comprising:
The second node sends the search information of the second node cell to the first node; the first node is connected with the second node, and the search information is used for assisting in searching or positioning to the second node cell;
The first node receives the search information;
the first node sends a broadcast message in a first node cell, wherein the broadcast message carries the search information;
the target network is an access backhaul integrated IAB network;
The IAB network includes one or more management nodes, each of which is configured to manage one or more backhaul nodes, where the first node is a backhaul node, and the second node is a management node, or the first node is a management node, and the second node is a backhaul node.
10. The method of claim 9, wherein the search information comprises:
the frequency band of the second node cell is located;
And the cell identification of the second node cell.
11. The method according to claim 9 or 10, wherein the broadcast message further comprises: and the type identifier is used for identifying the base station type of the second node and/or the cell type of the second node cell.
12. The method according to claim 9, characterized in that
The backhaul node includes: an IAB node having access to the network system and/or an IAB hosting base station having access to the network system.
13. The method of claim 12, wherein the IAB host base station comprises:
the centralized unit is used for centrally managing the under-jurisdictioned IAB nodes and is connected with the management nodes;
a distributed unit, configured to provide an access service for a downstream IAB node or a user terminal;
a communication unit; the communication unit includes: a wireless communication unit and/or a wired communication unit.
14. The method according to any of claims 9-10, 12-13, wherein the management node comprises a wireless communication unit; or the management node comprises a wireless communication unit and a wired communication unit.
15. A network access device, comprising:
The searching module is used for searching a first cell in the target network to obtain a first node cell;
The receiving module is used for receiving a broadcast message from a first node, wherein the broadcast message carries search information of a second node cell, the first node and the second node are connected with each other, and the search information is used for assisting in searching or positioning to the second node cell;
the searching module is further used for searching a second cell according to the searching information to obtain a second node cell;
An access module, configured to access the first node cell and the second node cell;
the first node cell meets a preset first access condition, and the second node cell meets a preset second access condition;
the target network is an access backhaul integrated IAB network;
The IAB network includes one or more management nodes, each of which is configured to manage one or more backhaul nodes, where the first node is a backhaul node, and the second node is a management node, or the first node is a management node, and the second node is a backhaul node.
16. The apparatus of claim 15, wherein the search information comprises:
the frequency band of the second node cell is located;
And the cell identification of the second node cell.
17. The apparatus according to claim 15 or 16, wherein the search information is periodically transmitted by the second node to the first node.
18. The apparatus according to claim 15 or 16, wherein the search information is transmitted to the first node by the second node in response to an information acquisition request transmitted by the first node to the second node.
19. The apparatus according to claim 15 or 16, wherein the broadcast message further comprises: and the type identifier is used for identifying the base station type of the second node and/or the cell type of the second node cell.
20. The apparatus of claim 15, wherein the device comprises a plurality of sensors,
The backhaul node includes: an IAB node having access to the target network and/or an IAB hosting base station having access to the target network.
21. The apparatus of claim 20, wherein the network access device is an IAB node that is not accessing the target network.
22. The apparatus according to any of claims 15-16, 20-21, wherein the first access condition is that the first node cell does not belong to a forbidden cell, and the radio signal strength of the first node cell reaches a preset first strength threshold;
the second access condition is that the second node cell does not belong to a forbidden cell, and the wireless signal strength of the second node cell reaches a preset second strength threshold.
23. A network system, comprising: a first node and a second node, the first node and the second node being interconnected;
the second node is configured to send search information of a second node cell to the first node, where the search information is used to assist in searching or locating to the second node cell;
the first node is configured to receive the search information;
the first node is further configured to send a broadcast message in a first node cell, where the broadcast message carries the search information;
the target network is an access backhaul integrated IAB network;
The IAB network includes one or more management nodes, each of which is configured to manage one or more backhaul nodes, where the first node is a backhaul node, and the second node is a management node, or the first node is a management node, and the second node is a backhaul node.
24. The system of claim 23, wherein the search information comprises:
the frequency band of the second node cell is located;
And the cell identification of the second node cell.
25. The system of claim 23 or 24, wherein the broadcast message further comprises: and the type identifier is used for identifying the base station type of the second node and/or the cell type of the second node cell.
26. The system of claim 23, wherein the system further comprises a controller configured to,
The backhaul node includes: an IAB node having access to the network system and/or an IAB hosting base station having access to the network system.
27. The system of claim 26 wherein the IAB host base station comprises:
the centralized unit is used for centrally managing the associated IAB nodes and is connected with the associated management nodes;
A distributed unit, configured to connect with an associated IAB node;
a communication unit; the communication unit includes: a wireless communication unit and/or a wired communication unit.
28. The system of any one of claims 23-24, 26-27, wherein the management node comprises a wireless communication unit; or the management node comprises a wireless communication unit and a wired communication unit.
29. A computer readable storage medium, having stored thereon a computer program, the computer program being executed by a processor to implement the method of any of claims 1-8.
CN201980103222.7A 2019-12-31 2019-12-31 Network access method and device, network system and communication method, and storage medium Active CN114846852B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/130896 WO2021134663A1 (en) 2019-12-31 2019-12-31 Network access method and device, network system and communication method, and storage medium

Publications (2)

Publication Number Publication Date
CN114846852A CN114846852A (en) 2022-08-02
CN114846852B true CN114846852B (en) 2024-06-04

Family

ID=76686237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980103222.7A Active CN114846852B (en) 2019-12-31 2019-12-31 Network access method and device, network system and communication method, and storage medium

Country Status (2)

Country Link
CN (1) CN114846852B (en)
WO (1) WO2021134663A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115604778B (en) * 2022-11-28 2023-03-10 广州世炬网络科技有限公司 Node access method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577446A (en) * 2009-10-01 2012-07-11 诺基亚公司 Method and apparatus for providing location based services using connectivity graphs based on cell broadcast information
CN110431886A (en) * 2017-03-24 2019-11-08 高通股份有限公司 Web search message about cordless communication network discovery
CN110536395A (en) * 2018-08-03 2019-12-03 中兴通讯股份有限公司 Power determination, signaling method, device, the network equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160192283A1 (en) * 2013-09-12 2016-06-30 Intellectual Discovery Co., Ltd. Method for searching wireless lan and method for transferring wireless lan search information
CN110636549B (en) * 2018-06-21 2022-04-12 华为技术有限公司 Data transmission method, network equipment and terminal equipment
CN110536406B (en) * 2018-09-27 2023-05-26 中兴通讯股份有限公司 Transmission timing method and device, base station and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577446A (en) * 2009-10-01 2012-07-11 诺基亚公司 Method and apparatus for providing location based services using connectivity graphs based on cell broadcast information
CN110431886A (en) * 2017-03-24 2019-11-08 高通股份有限公司 Web search message about cordless communication network discovery
CN110536395A (en) * 2018-08-03 2019-12-03 中兴通讯股份有限公司 Power determination, signaling method, device, the network equipment and storage medium

Also Published As

Publication number Publication date
CN114846852A (en) 2022-08-02
WO2021134663A1 (en) 2021-07-08

Similar Documents

Publication Publication Date Title
US10849052B2 (en) Systems and methods for cell (re)selection and cell barring
CN110351807B (en) Access selection method and device
WO2021027817A1 (en) Parent node selection method and apparatus, device and medium
US8467823B2 (en) Method and system for CPRI cascading in distributed radio head architectures
CN104581854B (en) A kind of wireless connection method and device
US8422884B2 (en) Method and apparatus for picocell distributed radio heads providing macrocell capabilities
US9544840B2 (en) Distributed method for client optimization
US20180206178A1 (en) System and Method for Communicating System Information
US20170353863A1 (en) Resource Management Method and Radio Access Network Node
WO2019024617A1 (en) Method for accessing core network by terminal, base station, and terminal
CN112106418A (en) Apparatus, method and computer program
US20220377641A1 (en) Cell reconfiguration method, network control node, and mobile iab node
CN102684966B (en) Equipment method of network entry, Apparatus and system
CN114846852B (en) Network access method and device, network system and communication method, and storage medium
CN105992368A (en) Resource allocation method and related equipment
CN102685824B (en) Method, device and system for switching network
US20210219149A1 (en) Wireless communication system, relay communication device and communication control method
WO2022133785A1 (en) Cell configuration method and device for mt of iab node
CN114189920B (en) Carrier isolation method, device, equipment and medium for network slice
WO2024090957A1 (en) Method and apparatus for federation management
KR20120016572A (en) Device in wireless network, device resource management apparatus, gateway and network server, and control method of the network server
WO2023231580A1 (en) Communication method and communication apparatus
CN113099494B (en) Information processing method, device, equipment and computer readable storage medium
WO2021163861A1 (en) Communication method and device
CN115696493A (en) Communication method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant