WO2020156116A1 - 上下文存储方法及装置 - Google Patents

上下文存储方法及装置 Download PDF

Info

Publication number
WO2020156116A1
WO2020156116A1 PCT/CN2020/071712 CN2020071712W WO2020156116A1 WO 2020156116 A1 WO2020156116 A1 WO 2020156116A1 CN 2020071712 W CN2020071712 W CN 2020071712W WO 2020156116 A1 WO2020156116 A1 WO 2020156116A1
Authority
WO
WIPO (PCT)
Prior art keywords
network device
terminal device
network
request message
terminal
Prior art date
Application number
PCT/CN2020/071712
Other languages
English (en)
French (fr)
Inventor
陈磊
李秉肇
晋英豪
许斌
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020156116A1 publication Critical patent/WO2020156116A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • the embodiments of the present application relate to the field of communication technology, and in particular, to a context storage method and device.
  • the 5th generation mobile communication (5G) technology is also called 5G new radio access technology (New RAT), and New RAT is abbreviated as NR.
  • the radio resource control (Radio Resource Control, RRC) state of a terminal equipment (user equipment, UE) includes a connected state, an inactive state, and an idle state.
  • RRC Radio Resource Control
  • UE user equipment
  • the base station Disconnected, but the link between the UE and the base station is released, the base station stores the UE's access stratum context, so that when there is data to be transmitted, the base station can restore the link between the base station and the UE; the UE is idle In the state, the link between the UE and the base station and the link between the base station and the core network for the UE are all released.
  • the base station when a connected UE enters an inactive state, the base station assigns an inactive-radio network temporary identifier (I-RNTI) to the UE to store the UE’s access layer context, and The link between the base station and the UE is released so that the UE enters an inactive state.
  • I-RNTI inactive-radio network temporary identifier
  • the base station in this process is also called an anchor base station.
  • the core network needs to send downlink data to the UE, the data reaches the anchor base station through the link between the core network and the base station, and the anchor base station sends the UE's radio access network notification area (RAN-based notification area, RNA). Send an RNA paging message to page the UE.
  • RAN-based notification area RNA
  • RNA can be understood as a collection of cells, and there are Xn interfaces between base stations corresponding to each cell in the same RNA.
  • the UE After the UE detects the RNA paging message, it sends an RRC resume (resume) message to the current base station, which needs to carry the I-RNTI identifier to the current base station.
  • the current base station de-anchors the base station according to the I-RNTI identifier and obtains the access layer context.
  • the context establishes a link between the UE and the current base station, so that the UE transitions from an inactive state to a connected state, and then the UE receives downlink data.
  • the UE When the UE needs to send uplink data to the core network, the UE sends an RRC resume message carrying I-RNTI to the current base station.
  • the current base station determines the anchor base station according to the I-RNTI, and obtains the connection from the anchor base station through the Xn interface between the base stations.
  • the current base station Into the layer context. After that, the current base station establishes a link between the UE and the current base station according to the access stratum context, so that the UE transitions from the inactive state to the connected state.
  • NTN non-terrestrial network
  • the beam of a satellite antenna is used to cover the ground to form a cell
  • the beam-to-cell mapping method includes a ground stationary cell mapping method.
  • the geographic location of the cell is fixed relative to the ground, and the moving satellite adjusts its beam to cover the cell.
  • the same cell will be covered by different satellites.
  • the Xn interfaces between base stations deployed on different satellites are limited, and it is possible that only adjacent base stations can have Xn interfaces.
  • the anchor base station allocates I-RNTI to the UE, stores the UE's access stratum context, and sends the RRC release message carrying the I-RNTI to the UE .
  • the UE sends an RRC resume message to the current base station, so that the current base station obtains the access stratum context from the anchor base station.
  • the anchor base station moves continuously with the satellite, it moves to a position where it may not be able to maintain the Xn interface with the current base station, so that the current base station cannot obtain the access layer context, and thus the UE cannot switch from the inactive state to the connected state.
  • the anchor base station sends a paging message to the base station in the RNA area to page the UE, thereby restoring the link between the UE and the network device. Because the anchor base station moves continuously with the satellite, the distance between the anchor base station and the base station in the RNA area is very long, and the base station in the RNA area cannot receive the paging message, and the anchor base station cannot be paged. UE, causing downlink data transmission to fail. Therefore, how to store the access layer context of the terminal device so that the network device that provides services for the terminal device to recover from the inactive state to the connected state can obtain the access layer context of the terminal device to improve the success rate of data transmission. Urgent problems to be solved.
  • the embodiments of the application provide a context storage method and device.
  • the network device that provides services for the terminal device to recover from the inactive state to the connected state can obtain the terminal device
  • the access layer context can improve the success rate of data transmission.
  • the embodiments of the present application provide a context storage method, which can be applied to a first network device or a chip in the first network device.
  • the method is applied to the first network device as an example below.
  • the method includes: the first network device sends the access layer context of the terminal device and the identification of the terminal device to the second network device, so that the second network device stores the access layer of the terminal device.
  • the context and the identification of the terminal device, the first network device is a network device that releases the terminal device from a connected state to an inactive state.
  • the third network device can Obtain the access layer context of the terminal device from the second network device, and restore the link between the terminal device and the third network device, thereby providing a data transmission success rate.
  • the third network device is the terminal device from the inactive state. Enter the network device that provides services in the connected state.
  • the above method further includes: the first network device sends access layer security information to the second network device, where the access layer security information includes the first key.
  • Adopt this kind of scheme guarantee the communication security.
  • the above method further includes: the first network device sends a second request message to the second network device to request to release the connection between the second network device and the first network device.
  • the first network device receives the second request message sent by the second network device, and releases the second network device and the second network device according to the second request message.
  • a logical interface between the first network devices for the terminal device is realized.
  • the above method further includes: the first network device sends a fourth request message to the second network device, and the fourth request message is used to request that the first network device is directed to the terminal device.
  • the logical interface is switched to a second logical interface, the first logical interface is a logical interface between the first network device and the second network device for the terminal device, and the second logical interface is a fourth network
  • the logical interface between the device and the second network device for the terminal device, and the fourth network device is the communication between the terminal device and the second network device before the terminal device changes from the inactive state to the connected state.
  • the terminal device establishes a network device with a logical interface; the first network device receives a response message sent by the second network device.
  • the above method further includes: the first network device sends a sixth request message to the core network device, where the sixth request message is used to request that the third logical interface of the terminal device be switched Is the fourth logical interface, the third logical interface is the logical interface between the first network device and the core network device for the terminal device, and the fourth logical interface is the second network device and A logical interface between the core network devices for the terminal device; the first network device receives a response message sent by the core network device.
  • the aforementioned first network device and the second network device are access network network devices.
  • the aforementioned first network device is an access network device
  • the second network device is a core network device.
  • the embodiments of the present application provide a context storage method, which can be applied to a second network device, and can also be applied to a chip in the second network device.
  • the method is applied to the second network device as an example below. Described, the method includes: the second network device receives the access layer context of the terminal device and the identification of the terminal device sent by the first network device, and the first network device releases the terminal device from the connected state to the non-connected state.
  • the network device in the activated state; the second network device stores the access layer context of the terminal device and the identifier of the terminal device.
  • the third network device can still move from the second network device. Obtain the access layer context of the terminal device, and restore the link between the terminal device and the third network device, thereby providing a data transmission success rate.
  • the third network device provides services for the terminal device to enter the connected state from the inactive state Network equipment.
  • the above method further includes: the second network device receives the access layer security information sent by the first network device, and the access layer security information includes the first key.
  • the above method further includes: the second network device receives a first request message that carries the identifier of the terminal device sent by the third network device, and the first request message is used to request the The access layer context of the terminal device, the third network device is a network device that provides services for the terminal device to recover from the inactive state to the connected state; the second network device sends the first network device to the third network device A response message, where the first response message carries the access stratum context of the terminal device and a second key, and the second key is a key generated by the second network device according to the first key.
  • the aforementioned first request message also carries a first integrity message authentication code MAC-I
  • the second network device before the second network device sends the first response message to the third network device, it further includes :
  • the second network device determines a second MAC-I; the second network device determines that the first MAC-I is the same as the second MAC-I.
  • Adopt this kind of scheme has guaranteed the communication security.
  • the above method further includes: the second network device receives a second request message sent by the first network device, and according to the second request message, releases the second network device and The logical interface between the first network device for the terminal device; or; the second network device sends a second request message to the first network device to request the release of the second network device and the A logical interface between the first network devices for the terminal device.
  • the above-mentioned method further includes: the second network device sends a third request message to the third network device to request communication between the second network device and the third network device Establish a logical interface for the terminal device; or, the second network device receives a third request message sent by the third network device, and communicates between the second network device and the third network device according to the third request message.
  • a logical interface is established between the network devices for the terminal device.
  • the above method further includes: the second network device receives a fourth request message sent by the first network device, and the fourth request message is used to request that the first network device is targeted for the terminal device.
  • a logical interface is switched to a second logical interface, the second network device sends a response message to the first network device, the second network device sends the fifth request message to the fourth network device, the fifth The request message is used to request the establishment of the second logical interface for the terminal device between the fourth network device and the second network device, and the first logical interface is the connection between the first network device and the The logical interface between the second network device for the terminal device, the second logical interface is the logical interface between the fourth network device and the second network device for the terminal device, the fourth A network device is a network device that establishes a logical interface with the second network device for the terminal device before the terminal device changes from the inactive state to the connected state; or; the second network device receives the fourth network device According to the fifth request message, the second logical interface is established between the
  • the above-mentioned method further includes: the second network device receives a sixth request message sent by the fourth network device, and the sixth request message is used to request that the second network device is directed to the terminal device.
  • the second logical interface is switched to the fifth logical interface, the second network device sends a response message to the fourth network device, the second network device sends a seventh request message to the third network device, the seventh request message For requesting the establishment of the fifth logical interface for the terminal device between the third network device and the second network device, the second logical interface being the fourth network device and the first
  • the logical interface between the two network devices for the terminal device, the third network device is a network device that provides services for the terminal device to recover from the inactive state to the connected state; or, the second network device receives According to the seventh request message sent by the third network device, a fifth logical interface is established between the third network device and the second network device for the terminal device according to the seventh request message, and the 3.
  • the network device sends a response message.
  • the above-mentioned method further includes: the second network device sends a fifth request message to the core network device, and the fifth request message is used to request that the second network device and the A fourth logical interface is established between core network devices for the terminal device, and the second network device receives a response message sent by the core network device.
  • the above method further includes: the second network device sends the access layer context of the terminal device and the identifier of the terminal device to the fifth network device, and the fifth network device is Before the terminal device changes from the inactive state to the connected state, a network device that stores the access layer context and establishes a logical interface with the second network device for the terminal device.
  • the above method further includes: the second network device sends a sixth request message to the core network device, where the sixth request message is used to request that the fourth logic for the terminal device
  • the interface is switched to the fifth logical interface
  • the second network device receives the response message sent by the core network device
  • the fourth logical interface is the communication between the second network device and the core network device for the terminal
  • the logical interface of the device, the fifth logical interface is a logical interface between a third network device and the second network device for the terminal device
  • the third network device is a logical interface for the terminal device from an inactive state Restore the network equipment that provides services in the connected state.
  • the above method includes: the second network device sends an eighth request message carrying the identifier of the terminal device to the network device in the area where the terminal device is located, so as to request the location where the terminal device is located.
  • the network equipment in the area pages the terminal equipment.
  • the first network device is an access network device
  • the second network device is a core network device.
  • the first network device is an access network network device
  • the second network device is an access network network device.
  • the embodiments of the present application provide a context storage method, which can be applied to a third network device, and can also be applied to a chip in a third network device.
  • the method is applied to a third network device as an example below. Described, the method includes: a third network device receives a ninth request message carrying an identifier of the terminal device sent by a terminal device in an inactive state, and the ninth request message is used to request the recovery of the wireless resource of the terminal device Control the RRC connection; the third network device sends a first request message carrying the identifier of the terminal device to a second network device, the second network device is a network device that stores the access layer context of the terminal device; The third network device receives a first response message sent by the second network device, where the first response message carries the access stratum context of the terminal device.
  • the access layer context of the terminal device is stored on the second network device, and the network device that provides services for the terminal device to enter the connected state from the active state, that is, after the third network device receives the RRC resume message sent by the terminal device , Obtain the access layer context of the terminal device from the second network device, and establish a link between the terminal device and the third network device, thereby improving the data transmission success rate.
  • the above-mentioned method further includes: the third network device receives a third request message sent by the second network device, and according to the third request message in the second network device and the The third network device establishes a logical interface for the terminal device; or, the third network device sends a third request message to the second network device to request communication between the second network device and the first network device.
  • Three network devices establish a logical interface for the terminal device.
  • the above method further includes: the third network device receives a seventh request message sent by the second network device, and according to the seventh request message, the third network device communicates with the A fifth logical interface is established between the second network devices for the terminal device, and the third network device is a network device that provides services for the terminal device to recover from an inactive state to a connected state; or, the third The network device sends a seventh request message to the second network device, where the seventh request message is used to request the establishment of a fifth logical interface between the third network device and the second network device for the terminal device .
  • the above method further includes: the third network device receives a seventh request message sent by the core network device, and according to the seventh request message, the third network device and the second network device A fifth logical interface is established between network devices for the terminal device, and the third network device is a network device that provides services for the terminal device to recover from the inactive state to the connected state; or, the third network device sends The core network device sends a seventh request message, where the seventh request message is used to request the establishment of a fifth logical interface between the third network device and the core network device for the terminal device.
  • the terminal device when the access layer context of the terminal device is stored in the access network network device, when the terminal device enters the connected state from the inactive state, the terminal device can be targeted between the second network device and the third network device.
  • the purpose of establishing a logical interface when the access layer context of the terminal device is stored in the access network network device, when the terminal device enters the connected state from the inactive state, the terminal device can be targeted between the second network device and the third network device.
  • the third network device is an access network device
  • the second network device is a core network device.
  • the third network device is an access network network device
  • the second network device is an access network network device.
  • the third network device and the first network device are the same or different network devices, and the first network device is a network device that releases the terminal device from a connected state to an inactive state.
  • the embodiments of the present application provide a paging method, which can be applied to core network equipment and chips in the core network equipment.
  • the method is described below by taking the core network equipment as an example.
  • the method includes: a core network device allocates a tracking area list to a terminal device, wherein the tracking area list includes a first tracking area identifier, the first tracking area identifier indicates a first cell set, and The first cell is covered by the first network device, or the first cell corresponds to the first tracking area identifier; the core network device receives the associated information sent by the first network device, and the associated information is used to indicate the first
  • the network equipment served by the first cell in a tracking area list is changed from the first network equipment to the second network equipment, or the first cell corresponding to the first tracking area identifier in the first tracking area list is changed to the first Two cells;
  • the core network device updates the tracking area list according to the association information; the core network device pages the terminal device according to the updated tracking area list.
  • the network equipment when the network equipment that provides services for the first cell changes, the network equipment sends associated information to the core network equipment, and the associated information is used to indicate the network that provides services for the first cell
  • the device is switched from the first network device to the second network device; for the ground mobile cell mapping method, when the first cell corresponding to the first tracking area identifier is changed to the second cell, the network device sends the association relationship to the core network device, indicating the first The first cell corresponding to a tracking area identifier is changed to the second cell, so that the core network updates the tracking area list according to the association relationship.
  • the terminal device needs to be paged subsequently, it determines to which paging message should be sent according to the updated tracking area list The network equipment thus realizes the purpose of paging the terminal equipment.
  • the core network device paging the terminal device according to the updated tracking area list includes: the core network device determines the paging area according to the updated tracking area list; The core network device sends a paging message to the network device corresponding to the cell in the paging area to page the terminal device. With this method, the core network device determines which network device should send the paging message to according to the updated tracking area list, so as to achieve the purpose of paging the terminal device.
  • the embodiments of the present application provide a paging method, which can be applied to a network device, and can also be applied to a chip in a network device.
  • the method is described below by taking the application to a network device as an example.
  • the method includes :
  • the first network device determines the association management, and the association relationship indicates that the network device serving the first cell in the first tracking area list is changed from the first network device to the second network device, or the first tracking area
  • the first cell corresponding to the first tracking area identifier in the list is changed to the second cell; the device on the network sends the associated information to the core network device to enable the core network device to update the tracking area according to the associated information List.
  • the network equipment when the network equipment that provides services for the first cell changes, the network equipment sends associated information to the core network equipment, and the associated information is used to indicate the network that provides services for the first cell
  • the device is switched from the first network device to the second network device; for the ground mobile cell mapping method, when the first cell corresponding to the first tracking area identifier is changed to the second cell, the network device sends the association relationship to the core network device, indicating the first The first cell corresponding to a tracking area identifier is changed to the second cell, so that the core network updates the tracking area list according to the association relationship.
  • the terminal device needs to be paged subsequently, it determines to which paging message should be sent according to the updated tracking area list The network equipment thus realizes the purpose of paging the terminal equipment.
  • an embodiment of the present application provides a context storage device.
  • the device may be a first network device or a chip in the first network device.
  • the device may include a processing unit, a sending unit, and a receiving unit.
  • the processing unit may be a processor, the sending unit may be a transmitter, and the receiving unit may be a receiver;
  • the first network device may also include a storage unit, and the storage unit may be a memory;
  • the storage unit is used to store instructions, and the processing unit executes the instructions stored in the storage unit to enable the first network device to implement the foregoing first aspect or functions in various possible implementation manners of the first aspect.
  • the processing unit may be a processor, and the transceiver unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit to make
  • the first network device implements the above-mentioned first aspect or functions in various possible implementation manners of the first aspect, and the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or may be the second A storage unit (for example, read-only memory, random access memory, etc.) located outside the chip in a network device.
  • an embodiment of the present application provides a context storage device.
  • the device may be a second network device or a chip in the second network device.
  • the device may include a processing unit, a sending unit, and a receiving unit.
  • the processing unit may be a processor
  • the sending unit may be a transmitter
  • the receiving unit may be a receiver
  • the second network device may also include a storage unit
  • the storage unit may be a memory
  • the storage unit is used to store instructions, and the processing unit executes the instructions stored in the storage unit, so that the second network device implements the foregoing second aspect or functions in various possible implementation manners of the second aspect.
  • the processing unit may be a processor, the transceiver unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit to make
  • the second network device implements the above-mentioned second aspect or the functions in various possible implementation manners of the second aspect
  • the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or may be the first 2.
  • a storage unit for example, read-only memory, random access memory, etc. located outside the chip in the network device.
  • an embodiment of the present application provides a context storage device.
  • the device may be a third network device or a chip in the third network device.
  • the device may include a processing unit, a sending unit, and a receiving unit.
  • the processing unit may be a processor
  • the sending unit may be a transmitter
  • the receiving unit may be a receiver
  • the third network device may also include a storage unit
  • the storage unit may be a memory
  • the storage unit is used for storing instructions, and the processing unit executes the instructions stored by the storage unit, so that the third network device implements the foregoing third aspect or functions in various possible implementation manners of the third aspect.
  • the processing unit may be a processor, and the transceiving unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit to make
  • the third network device implements the above-mentioned third aspect or functions in various possible implementation manners of the third aspect.
  • the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or may be the first Three storage units (for example, read-only memory, random access memory, etc.) located outside the chip in the network device.
  • an embodiment of the present application provides a paging device, which may be a core network device or a chip in the core network device.
  • the device may include a processing unit, a sending unit, and a receiving unit.
  • the processing unit may be a processor
  • the sending unit may be a transmitter
  • the receiving unit may be a receiver
  • the core network device may also include a storage unit
  • the storage unit may be a memory
  • the storage The unit is used to store instructions, and the processing unit executes the instructions stored in the storage unit to enable the core network device to implement the foregoing fourth aspect or functions in various possible implementation manners of the fourth aspect.
  • the processing unit may be a processor, and the transceiving unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes the instructions stored in the storage unit to make the
  • the core network device implements the functions of the foregoing fourth aspect or various possible implementation manners of the fourth aspect, and the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or the core network device A storage unit (for example, read-only memory, random access memory, etc.) located outside the chip.
  • an embodiment of the present application provides a paging device, which may be a network device or a chip in the network device.
  • the device may include a processing unit, a sending unit, and a receiving unit.
  • the processing unit may be a processor, the sending unit may be a transmitter, and the receiving unit may be a receiver;
  • the network device may also include a storage unit, and the storage unit may be a memory;
  • the processing unit executes the instructions stored in the storage unit to enable the network device to implement the above-mentioned fifth aspect or functions in various possible implementation manners of the fifth aspect.
  • the processing unit may be a processor, and the transceiver unit may be an input/output interface, a pin or a circuit, etc.; the processing unit executes instructions stored in the storage unit to enable the network
  • the device implements the functions of the fifth aspect or various possible implementation manners of the fifth aspect.
  • the storage unit may be a storage unit (for example, a register, a cache, etc.) in the chip, or a storage unit located in the network device.
  • a storage unit external to the chip for example, read-only memory, random access memory, etc.).
  • an embodiment of the present application provides a computer program product containing instructions that, when it runs on a first network device, enables the first network device to execute the foregoing first aspect or various possible implementations of the first aspect The method in the way.
  • the embodiments of the present application provide a computer program product containing instructions that, when it runs on a second network device, enables the second network device to execute the aforementioned second aspect or various possible aspects of the second aspect.
  • the method in the implementation mode is not limited to:
  • the embodiments of the present application provide a computer program product containing instructions, which when run on a third network device, enable the third network device to execute the foregoing third aspect or various possible implementations of the third aspect The method in the way.
  • the embodiments of the present application provide a computer program product containing instructions that, when run on a core network device, enable the core network device to execute the foregoing fourth aspect or various possible implementation manners of the fourth aspect Methods.
  • the embodiments of the present application provide a computer program product containing instructions that, when run on a network device, enable the network device to execute the method in the fifth aspect or various possible implementations of the fifth aspect. .
  • embodiments of the present application provide a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when it runs on a first network device, the first network device executes the first aspect described above. Or methods in various possible implementations of the first aspect.
  • an embodiment of the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a second network device, cause the second network device to execute the above-mentioned second aspect Or methods in various possible implementations of the second aspect.
  • an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when it runs on a third network device, the third network device executes the above-mentioned third aspect Or methods in various possible implementations of the third aspect.
  • an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, which when run on a core network device, causes the core network device to execute the fourth aspect or the first Four aspects of various possible implementation methods.
  • an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, which when run on a network device, causes the network device to execute the fifth aspect or the fifth aspect above Of the various possible implementations.
  • the first network device that is, the network device that releases the terminal device from the connected state to the inactive state, sends the access layer context of the terminal device to the second network device, and the second network device
  • the device stores the access layer context of the terminal device. Since the access layer context of the terminal device is not stored on the first network device, but on the second network device, no matter how far the first network device is moving, the third network device can still move from the second network device. Obtain the access layer context of the terminal device, and restore the link between the terminal device and the third network device, thereby providing a data transmission success rate.
  • the third network device provides services for the terminal device to enter the connected state from the inactive state Network equipment.
  • Fig. 1A is a schematic diagram of a mapping method of a ground stationary cell
  • Fig. 1B is a schematic diagram of a mapping mode of a ground mobile cell
  • FIG. 2 is a schematic diagram of a scenario applicable to a context storage method provided by an embodiment of the present application
  • FIG. 3 is a schematic diagram of RRC state switching of a terminal device to which a context storage method provided by an embodiment of the present application is applicable;
  • FIG. 4 is a flowchart of a context storage method provided by an embodiment of the present application.
  • FIG. 5 is a flowchart of another context storage method provided by an embodiment of the present application.
  • FIG. 6 is a flowchart of another context storage method provided by an embodiment of the present application.
  • FIG. 7 is a flowchart of another context storage method provided by an embodiment of the present application.
  • FIG. 8 is a flowchart of another context storage method provided by an embodiment of the present application.
  • FIG. 9 is a flowchart of a paging method provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a context storage device provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of another context storage device provided by an embodiment of the application.
  • FIG. 12 is a schematic structural diagram of another context storage device provided by an embodiment of this application.
  • FIG. 13 is a schematic structural diagram of a paging device provided by an embodiment of this application.
  • FIG. 14 is a schematic structural diagram of another paging device provided by an embodiment of this application.
  • 15 is a schematic structural diagram of another context storage device provided by an embodiment of the application.
  • FIG. 16 is a schematic structural diagram of another paging device provided by an embodiment of this application.
  • Non-terrestrial networks are introduced into 5G systems, which provide seamless coverage for UEs by deploying base stations or part of base station functions on high-altitude platforms or satellites, and high-altitude platforms or satellites are less affected by natural disasters, which can improve the reliability of 5G systems .
  • satellites adjust antennas to form different beams to cover the ground.
  • the beam and cell mapping methods include ground stationary cell mapping methods.
  • Fig. 1A is a schematic diagram of a mapping method of a ground stationary cell. Please refer to Figure 1A.
  • the thick black solid arrow in the figure shows the direction of satellite movement. In this mapping mode, the geographic location of the cell is fixed relative to the ground. The moving satellite adjusts its beam to cover the cell.
  • Time T1 Compared to time T1, gNB1 and gNB2 have moved a sufficient distance, gNB1 cannot provide coverage for cell 2 by adjusting the beam, and gNB2 cannot provide coverage for cell 4 by adjusting the beam. At this time, gNB2 can provide coverage for cell 2, and gNB3 can provide coverage for cell 4, as shown by the thick black solid line in the figure.
  • the anchor base station allocates I-RNTI to the UE, stores the UE's access stratum context, and sends the RRC release message carrying the I-RNTI to the UE .
  • the UE sends an RRC resume message to the current base station, so that the current base station obtains the access stratum context from the anchor base station.
  • the anchor base station moves to a position where it cannot maintain the Xn interface with the current base station, which makes the current base station unable to obtain the access layer context, which makes the UE unable to switch from the inactive state to the connected state, resulting in Uplink data transmission failed.
  • the anchor base station sends a paging message to the base station in the RNA area to page the UE. Because the anchor base station moves continuously with the satellite, the distance between the anchor base station and the base station in the RNA area is very long, and the base station in the RNA area cannot receive the paging message, and the anchor base station cannot be paged. UE, causing downlink data transmission to fail.
  • the beam-to-cell mapping method also includes the terrestrial mobile cell mapping method.
  • the base station does not dynamically adjust its beam direction, and the beam generated by the base station moves on the ground with the movement of the satellite/base station.
  • FIG. 1B is a schematic diagram of a mapping method of a ground mobile cell. Please refer to Figure 1B.
  • the thick black solid arrow in the figure shows the direction of satellite movement. In this mapping mode, at T1, a certain area on the earth is performed by cells 1, 2 of gNB1 and cells 3, 4 of gNB2.
  • the embodiments of the present application provide a context storage method and device, which store the access layer context of the terminal device in the core network device or other network devices other than the aforementioned anchor network device to improve the reliability of data transmission. .
  • the context storage method provided by the embodiments of this application can be used in the fourth generation (4G) mobile communication system (for example, long term evolution (LTE) system, advanced long term evolution, LTE- A)), 3rd generation partnership project (3rd generation partnership project, 3GPP) related cellular systems, fifth generation (5th generation, 5G) mobile communication systems and subsequent evolutionary communication systems.
  • 4G fourth generation
  • LTE long term evolution
  • LTE- A advanced long term evolution
  • 3rd generation partnership project 3rd generation partnership project
  • 5G fifth generation
  • 5G can also be referred to as new radio (NR).
  • the first network device, the second network device, and the third network device involved in the embodiments of the present application may be base stations, such as a macro base station, a micro base station, and a distributed unit-control unit (DU-CU), It is a device that is deployed in a wireless access network and can communicate with terminal devices wirelessly.
  • the base station can be used to convert the received air frame and Internet protocol (IP) packets to each other, and act as a router between the terminal device and the rest of the access network, where the rest of the access network can include the IP network;
  • IP Internet protocol
  • the base station can also coordinate the attribute management of the air interface.
  • the base station may be an evolved base station (evolutional Node B, eNB or e-NodeB) in LTE, or a gNB in NR.
  • the base station can also be a wireless controller in the cloud radio access network (CRAN) scenario, or it can be a relay station, access point, in-vehicle device, wearable device, or a public land mobile network that will evolve in the future (public land mobile network).
  • CRAN cloud radio access network
  • the mobile network, PLMN) network equipment, etc., are not limited in the embodiment of the present application.
  • the second network device involved in the embodiments of this application may also be a core network device.
  • the second network device may be an Access and Mobility Management Function (AMF) device, Session Management Function (SMF) equipment, Policy Control Function (PCF) equipment, Application Function (AF), Network Slice Selection Function (NSSF) equipment, authentication service function (Authentication Server Function, AUSF) equipment and unified data management (Unified Data Management, UDM) equipment, etc.
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • PCF Policy Control Function
  • AF Application Function
  • NSSF Network Slice Selection Function
  • AUSF Authentication Server Function
  • UDM Unified Data Management
  • the second network equipment may be a mobility management entity (Mobility Management Entity, MME) network element, Serving GPRS Support Node (Serving GPRS Support Node, SGSN) network element, Packet Data Network Gateway (Packet Data Network Gateway), etc.
  • MME Mobility Management Entity
  • MME Mobility Management Entity
  • SGSN
  • the terminal device involved in the embodiments of the present application may be a device that provides users with voice and/or data connectivity, a handheld device with a wireless connection function, or other processing devices connected to a wireless modem.
  • the terminal device can communicate with one or more core networks via the radio access network (RAN) network device.
  • the terminal device can be a mobile terminal device, such as a mobile phone (or “cellular” phone) and a mobile phone.
  • the computer of the terminal device for example, may be a portable, pocket-sized, handheld, built-in computer or vehicle-mounted mobile device, which exchanges language and/or data with the wireless access network.
  • the terminal device can be a personal communication service (PCS) phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant ( personal digital assistant, PDA), handheld devices with wireless communication functions, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminals in the future 5G network or future evolution of the public land mobile communication network (
  • PCS personal communication service
  • PDA personal digital assistant
  • handheld devices with wireless communication functions computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminals in the future 5G network or future evolution of the public land mobile communication network
  • PLMN public land mobile network
  • PLMN public land mobile network
  • Terminal equipment can also be called system, subscriber unit, subscriber station, mobile station, mobile station, remote station, access point, Remote terminal equipment (remote terminal), access terminal equipment (access terminal), user terminal equipment (user terminal), user agent (user agent), user equipment (user device), or user equipment (user equipment).
  • Remote terminal equipment remote terminal equipment
  • access terminal equipment access terminal
  • user terminal equipment user terminal
  • user agent user agent
  • user equipment user device
  • user equipment user equipment
  • FIG. 2 is a schematic diagram of a scenario to which a context storage method provided by an embodiment of the present application is applicable.
  • the network equipment and terminal equipment 1-terminal equipment 6 form a communication system.
  • any terminal equipment of terminal equipment 1-terminal equipment 6 can send uplink data to network equipment 1 or receive network equipment 1.
  • the terminal device 4-6 can also form a communication system.
  • the terminal device 4 or the terminal device 6 can send uplink data to the terminal device 5 or receive downlink data sent by the terminal device 5.
  • the network device 2 and the terminal device 7-9 can also form a communication system, and the terminal device 7-9 can send uplink data to the network device 2 or receive downlink data sent by the network device 2.
  • the network device 1 is connected to the core network device, and the network device 2 is connected to the core network device through a satellite observation station or the like.
  • the terminal device described in the embodiment of the present application may be any one of UE1 to UE9, and the first network device may be a network device that provides services for UE1 to UE6, or a network device that provides services for UE7 to UE9,
  • the second network device may be a core network device, or the second network device and the first network device are different access network network devices, and the third network device may be a network device that provides services for non-connected terminal devices,
  • the third network device and the first network device may be different network devices, and the third network device and the second network device may be the same access network network device.
  • Fig. 3 is a schematic diagram of RRC state switching of a terminal device to which a context storage method provided by an embodiment of the present application is applicable.
  • the RRC state of the terminal device includes a connected state (connected), an inactive state (inactive), and an idle state.
  • a link is established between the UE and the network device, and there is also a link for the UE between the network device and the core network; when the UE is in the inactive state, the link between the network device and the core network is for the UE The link is not disconnected, but the link between the UE and the network device is released, and the network device stores the access layer context of the UE so that when there is data to be transmitted, the network device can restore the connection between the network device and the UE When the UE is in an idle state, the link between the UE and the network device, and the link between the network device and the core network for the UE are released.
  • Fig. 4 is a flowchart of a context storage method provided by an embodiment of the present application. This embodiment is from the perspective of interaction between the first network device, the second network device, and the third network device, and the context storage method described in the embodiment of the present application is described in detail. This embodiment includes:
  • the first network device sends the access layer context of the terminal device and the identifier of the terminal device to the second network device.
  • the second network device receives the access layer context of the terminal device and the identifier of the terminal device sent by the first network device.
  • the first network device is a network device that releases the terminal device from a connected state to an inactive state.
  • the first network device allocates an identifier, such as I-RNTI, to the terminal device, and stores the access layer context of the terminal device with this identifier.
  • the first network device is also referred to as an anchor network device of the terminal device.
  • the first network device sends an RRC release (release) message to the terminal device in the connected state, and sends the access layer context and the access layer context of the terminal device to the second network device.
  • the identification of this terminal device After receiving the RRC release message, the terminal device enters the inactive state from the connected state.
  • the second network device may be an access network device or a core network device, which is not limited in the embodiment of the present application.
  • the identifier of the terminal device may be the inactive-radio network temporary identifier (RNTI) assigned by the first network device to the terminal device, and the international mobile subscriber identification number (IMSI) of the terminal device Wait.
  • RNTI inactive-radio network temporary identifier
  • IMSI international mobile subscriber identification number
  • the second network device stores the access stratum context of the terminal device and the identifier of the terminal device.
  • the second network device stores the received access layer context of the terminal device, the identification of the terminal device, and the corresponding relationship between the access layer context and the identification of the terminal device.
  • the first network device that is, the network device that releases the terminal device from the connected state to the inactive state, sends the access layer context of the terminal device to the second network device, and the second network device stores The access layer context of this terminal device. Since the access layer context of the terminal device is not stored on the first network device, but on the second network device, no matter how far the first network device is moving, the third network device can still move from the second network device. Obtain the access layer context of the terminal device, and restore the link between the terminal device and the third network device, thereby providing a data transmission success rate. The third network device provides services for the terminal device to enter the connected state from the inactive state Network equipment.
  • Fig. 5 is a flowchart of another context storage method provided by an embodiment of the present application.
  • the third network device that is, the network device that provides services for the terminal device to enter the connected state from the active state, obtain the access layer context of the terminal device From the perspective of, the context storage method described in the embodiment of the present application will be described in detail.
  • This embodiment includes:
  • a third network device receives a ninth request message that carries an identifier of the terminal device sent by a terminal device in an inactive state.
  • the ninth request message is used to request to restore the link between the terminal device and the network device.
  • the terminal device when the terminal device needs to send uplink data or receive downlink data, it sends an RRC resume (resume) message to the current base station, that is, the third network device.
  • the RRC resume message is also called the ninth request message, so that the terminal A link is established between the device and the third network device.
  • the third network device sends a first request message carrying the identifier of the terminal device to the second network device.
  • the second network device is a network device that stores the access layer context of the terminal device
  • the third network device sends a first request message to the second network device that stores the access layer context of the terminal device, and correspondingly, the second terminal device receives the first request message, and according to the identification of the terminal device, Determine the access layer context of the terminal device.
  • the third network device receives the first response message sent by the second network device.
  • the first response message carries the access stratum context of the terminal device.
  • the second network device sends a first response message to the third network device, and correspondingly, the third network device receives the first response message.
  • the access layer context of the terminal device is stored on the second network device, and the network device that provides services for the terminal device to enter the connected state from the active state, that is, the third network device receives the terminal device's transmission After the RRC resume message, obtain the access layer context of the terminal device from the second network device, and establish a link between the terminal device and the third network device, thereby improving the success rate of data transmission.
  • Fig. 6 is a flowchart of another context storage method provided by an embodiment of the present application.
  • the context of the access layer of the terminal device is stored in the core network device, that is, the second network device is the core network device, and the logical interface between the core network device and the first network device for the terminal device is released until When the terminal device enters the connected state from the inactive state, a logical interface for the terminal device is established between the third network device and the core network device.
  • the first network device may also be referred to as an anchor base station
  • the second network device is, for example, an AMF device
  • the third network device is also referred to as a target base station.
  • This embodiment includes:
  • the first network device sends an RRC release message to a terminal device.
  • the first network device sends an RRC release message to the terminal device in the connected state.
  • the RRC release message includes the identification of the terminal device, the network color code (NCC) or the RAN-based notification area (RNA information).
  • the identification of the terminal device may be the first network device The I-RNTI assigned to the terminal device, the IMSI of the terminal device, etc.
  • the RNA information can be one or more RNA identifiers, one RNA identifier indicates a cell set, and Xn interfaces exist between the base stations corresponding to the cells in the cell set, There may also be no Xn interface; or RNA information may also be a cell list; or RNA information may also be an indication information used to indicate that the access layer context of the terminal device is stored in the core network device, and the terminal device does not need to be wireless Access network notification area update (RAN-based notification area update, RNAU). Since RNA information indicates an area, which is referred to as the target area below, the network devices in the target area are not limited to the network devices that have Xn interfaces with each other.
  • RAN-based notification area update RAN-based notification area update
  • the embodiment of the present application is applied to a non-terrestrial network, if a ground mobile cell mapping method is adopted, since the area indicated by the RNA information is large, the terminal device does not need to perform RNAU frequently, which saves power and reduces signaling overhead.
  • the connected terminal device After receiving the RRC release message, the connected terminal device first verifies whether the integrity of the RRC release message is correct by checking the integrity message authentication code (message authentication code for integrity, MAC-I). If the verification is passed, the terminal device will store the access layer context and NCC of the terminal device, delete the access layer keys K_RRCenc, K_Upenc, and K_UPint, and retain K_RRCint. If the NCC stored in the terminal device has nothing to do with the current K_gNB, the current K_gNB is deleted, and if they are consistent, the current K_gNB is retained.
  • the integrity message authentication code messages authentication code for integrity, MAC-I
  • the first network device processes the access layer security information of the terminal device.
  • the access layer security information includes access layer keys K_RRCenc, K_Upenc, K_UPint, K_RRCint, and so on.
  • the first network device deletes the access layer keys K_RRCenc, K_Upenc, and K_UPint of the terminal device, and retains K_RRCint.
  • the first network device sends the access layer security information, the access layer context of the terminal device, the identification of the terminal device, and RNA information to the second network device.
  • the second network device stores the access layer context of the terminal device, the identification of the terminal device, RNA information, etc.
  • the NCC in step 301 above is a new NCC, that is, the NCC has nothing to do with the current key K_gNB, and belongs to an unused ⁇ NCC, NH ⁇ pair
  • the first network device will access the layer security information
  • the identification of the terminal device and the access layer context of the terminal device are sent to the second network device, and the key K_gNB is deleted.
  • NH (next hop) is the next one
  • the access layer security information includes ⁇ NCC, NH ⁇ pairs, K_RRCint, etc.
  • the NH corresponding to NCC can be used to derive K_gNB.
  • the second network device stores the access layer security information.
  • the first network device sends the access layer security information, the identification of the terminal device, and the access layer context of the terminal device to the second network device.
  • the access layer security information includes ⁇ NCC, NH ⁇ pair, K_RRCint, etc.
  • the access layer security information includes keys K_gNB, NCC, K_RRCint, etc., and K_gNB is also called the first key. Accordingly, the second network device stores the access layer security information.
  • the first network device or the second network device initiates a release operation to release a logical interface between the first network device and the second network device for the terminal device.
  • the second network device receives the second request message sent by the first network device, and releases the communication between the second network device and the first network device according to the second request message.
  • the logical interface of the terminal device For another example, the second network device sends a second request message to the first network device to request the release of the logical interface between the second network device and the first network device for the terminal device.
  • the second network device initiates an RNA paging message in the area indicated by the RNA information.
  • the second network device determines the target area based on the RNA information.
  • the target area is the area where the terminal device is located, and the second network device sends the identification of the terminal device to the network device in the target area
  • the eighth request message to request the network device in the target area to page the terminal device.
  • the identifier of the terminal device is, for example, the I-RNTI allocated to the terminal device when the first network device sends the RRC Release message to the terminal device in step 301.
  • step 305 is an optional step.
  • the terminal device sends an RRC Resume message to the third network device.
  • the inactive terminal device when the inactive terminal device needs to send uplink data, or, if the above step 305 is performed, that is, when the terminal device needs to respond to RNA paging, the inactive terminal device sends the data to the third network device.
  • the ninth request message for the identification of the terminal device that is, the RRC resume message, is used to request the restoration of the radio resource control RRC connection of the terminal device.
  • the RRC resume message also carries the first MAC-I.
  • the first MAC-I may be a short (short) MAC-I.
  • the short MAC-I is, for example, a 16-bit authentication message.
  • the terminal device may
  • the cell radio network temporary identifier (C-RNTI) of the cell radio network temporary identifier (C-RNTI) of the source cell of the device, the physical cell identifier (PCI) of the source cell, and the cell identity (ID) of the current cell are used as Input, and use other parameters including K_RRCint as the input of the complete protection algorithm to calculate short MAC-I.
  • the third network device sends the first request message carrying the identifier of the terminal device to the second network device.
  • the second network device is a network device that stores the access layer context of the terminal device.
  • the third network device sends a first request message carrying the identifier of the terminal device to the second network device.
  • the first request message may also carry the first MAC-I.
  • the second network device determines that the first MAC-I is the same as the second MAC-I.
  • the second network device determines the access layer context of the terminal device according to the identifier I-RNTI of the terminal device.
  • the second network device determines the second MAC-I according to the integrity preservation algorithm in the access layer context of the terminal device. The calculation method is the same. Then, the second network device determines whether the first MAC-I and the second MAC-I are the same. If the first MAC-I and the second MAC-I are the same, the second network device uses the cell ID and the second MAC-I of the third network device. 3. The carrier frequency of the target cell of the network device and the stored K_gNB or NH indicated by the NCC derives the second key, that is, the new K_gNB, and executes step 309. If the first MAC-I and the second MAC-I are not the same, Then the second network device does not perform processing, that is, does not return the access layer context of the terminal device to the third network device.
  • the UE will also derive a new K_gNB based on the stored information.
  • the second network device sends a first response message to the third network device, where the first response message carries the access stratum context of the terminal device.
  • the first response message also carries the second key and the NCC associated with the second key, that is, the first response message also carries the new key.
  • the second network device and the third network device establish a logical interface for the terminal device for the terminal device.
  • the second network device sends a third request message to the third network device to request the establishment of a logical interface between the second network device and the third network device for the terminal device;
  • the second network device receives a third request message sent by the third network device, and sends a response to the terminal between the second network device and the third network device according to the third request message.
  • the device establishes a logical interface.
  • the third network device sends an RRC resume message to the terminal device.
  • the third network device sends an RRC resume message to the terminal device to establish a link between the terminal device and the third network device.
  • the access layer context of the terminal device is stored in the second network device, that is, the core network device.
  • the verification of MAC-I and the derivation of the second key are completed by the core network device, and the RNA paging is performed by the core network device. Initiation, and the logical interface between the access network equipment and the core network equipment for the terminal equipment is not consistent. Since any access network equipment can communicate with the core network equipment, it is necessary for the inactive terminal equipment to enter In the connected state, the third network device, that is, the network device that provides services for the terminal device to recover from the inactive state to the connected state, can obtain the access layer context of the terminal device from the core network device, so that the third network device can communicate with the second network device.
  • the network devices in the target area indicated by the RNA information may not have Xn interfaces, so that the target area is no longer limited to network devices with Xn interfaces.
  • FIG. 7 is a flowchart of another context storage method provided by an embodiment of the present application.
  • the context of the access layer of the terminal device is stored in the core network device, that is, the second network device is the core network device, the first network device may also be called an anchor base station, and the second network device is, for example, an AMF device , The third network device is also called a target base station.
  • the logical interface between the access network device and the core network device for the terminal device is not released, but is in a state of constant switching, for example, the terminal
  • the logical interface of the device was originally established between the first network device and the second network device, and then the logical interface of the terminal device was switched to between the fourth network device and the core network device.
  • This embodiment includes:
  • the first network device sends an RRC release message to the terminal device.
  • step 301 please refer to step 301 above, which will not be repeated here.
  • the first network device processes the access layer security information of the terminal device.
  • the first network device sends the access layer security information, the access layer context of the terminal device, the identification of the terminal device, and RNA information to the second network device.
  • step 303 please refer to step 303 above, which will not be repeated here.
  • the first network device sends a fourth request message to the second network device.
  • the fourth request message requests to switch the first logical interface for the terminal device to the second logical interface, and the first logical interface is for the communication between the first network device and the second network device.
  • the logical interface of the terminal device, the second logical interface is the logical interface between the fourth network device and the second network device for the terminal device, and the fourth network device is the terminal device from non A network device that establishes a logical interface with the second network device for the terminal device before the activated state is in the connected state.
  • the second network device sends a response message to the first network device.
  • the second network device sends a fifth request message to the fourth network device.
  • the fifth request message is used to request the establishment of the second logical interface for the terminal device between the fourth network device and the second network device.
  • the above steps 404 to 406 realize the purpose of switching the first logical interface of the terminal device to the second logical interface.
  • the first network device actively initiates the logical interface switch.
  • the fourth network device may also actively initiate the logical switch.
  • the second network device receives the fifth request message sent by the fourth network device, and establishes the terminal device between the fourth network device and the second network device according to the fifth request message.
  • a second logical interface where the second network device sends a response message to the fourth network device.
  • the second network device sends the RNA information to the fourth network device.
  • the fourth network device initiates an RNA paging message in the area indicated by the RNA information.
  • RNA information indicates If a target area is reached, the fourth network device determines the target area based on the RNA information.
  • the target area is the area where the terminal device is located.
  • the fourth network device sends an eighth request message carrying the identification of the terminal device to the network device in the target area. To request the network equipment in the target area to page the terminal equipment.
  • step 407 is optional.
  • the terminal device sends an RRC Resume message to the third network device.
  • step 306 For detailed description, please refer to step 306 above, which will not be repeated here.
  • the third network device sends a first request message carrying the identifier of the terminal device to the second network device.
  • step 307 For detailed description, please refer to the above step 307, which will not be repeated here.
  • the second network device determines that the first MAC-I is the same as the second MAC-I.
  • step 308 please refer to step 308 above, which will not be repeated here.
  • the second network device sends a first response message to the third network device, where the first response message carries the access layer context of the terminal device.
  • step 309 For detailed description, please refer to the above step 309, which will not be repeated here.
  • the fourth network device sends a sixth request message to the second network device.
  • the sixth request message is used to request that the second logical interface for the terminal device be switched to the fifth logical interface, and the second logical interface is the communication between the fourth network device and the second network device.
  • the fifth logical interface is a logical interface between a third network device and the second network device for the terminal device.
  • the second network device receives the fifth request message sent by the fourth network device.
  • the second network device sends a response message to the fourth network device.
  • the second network device sends a seventh request message to the third network device.
  • the seventh request message is used to request the establishment of the fifth logical interface for the terminal device between the third network device and the second network device
  • the second logical interface is the The logical interface between the fourth network device and the second network device for the terminal device
  • the fifth logical interface is the logical interface between the third network device and the second network device for the terminal device
  • the third network device is a network device that provides services for the terminal device to recover from an inactive state to a connected state
  • the above steps 412 to 414 achieve the purpose of switching the second logical interface of the terminal device to the fifth logical interface.
  • the fourth network device actively initiates the logical interface switch.
  • the third network device may also actively initiate the logical interface switch.
  • the second network device receives the seventh request message sent by the third network device, and establishes a second network device for the terminal device between the third network device and the second network device according to the seventh request message. Five logical interfaces, sending a response message to the third network device.
  • the logical interface between the access network device and the core network device for the terminal device changes dynamically, that is, from the first network device to the core network device, Switch to the fourth network device-the core network device, continue to switch to the fourth'network device...
  • the third network device and the core network device The logical interface of the terminal device. Therefore, the fourth network device in steps 404 to 406 and the fourth network device in steps 412 to 414 may be the same or different network devices.
  • the third network device sends an RRC resume message to the terminal device.
  • step 311 For detailed description, please refer to step 311 above, which will not be repeated here.
  • the access layer context of the terminal device is stored in the second network device, that is, the core network device.
  • the MAC-I verification and the derivation of the second key are completed by the core network device, and RNA paging has the core network device. Initiated, and the logical interface between the access network device and the core network device for the terminal device is dynamically changed.
  • the inactive terminal device Since any access network device can communicate with the core network device, the inactive terminal device is required to enter the connection In the state, the third network device, that is, the network device that provides services for the terminal device to recover from the inactive state to the connected state, can obtain the access layer context of the terminal device from the core network device, and connect the fourth network device to the second network The logical interface between the devices for the terminal device is switched between the third network device and the second network device, thereby improving the data transmission success rate.
  • the network devices in the target area indicated by the RNA information may not have Xn interfaces, so that the target area is no longer limited to network devices with Xn interfaces.
  • FIG. 8 is a flowchart of another context storage method provided by an embodiment of the present application.
  • the context of the access layer of the terminal device is stored in the access network device, that is, the second network device is an access network device, and the context of the access layer of the terminal device is dynamically transferred, for example, the access layer context of the terminal device
  • the access layer context is initially sent by the first network device to the second network device and stored by the second network device.
  • the second network device sends the access layer context of the terminal device to the fifth network device, which is stored by the fifth network device.
  • the fifth network device sends the access layer context of the terminal to the fifth'network device...
  • the first network device may also be called an anchor base station
  • the second network device may be an access network device
  • the third network device may also be called a target base station, which is also an access network device.
  • the access layer context of the terminal device is stored in the access network device, and as the access network device moves, the access layer network storing the access layer context The device is constantly changing to ensure that even if the access layer network device moves, the current network device (that is, the third network device) clock maintains the Xn interface between the access layer network device storing the access layer context of the terminal device, and The access layer network device storing the access layer context of the terminal device and the core network device maintain a logical interface for the terminal device. For example, the logical interface of the terminal device was originally established between the first network device and the core network device, and then the logical interface of the terminal device was switched to between the fifth network device and the core network device...
  • This embodiment includes:
  • the first network device sends an RRC release message to a terminal device.
  • step 301 please refer to step 301 above, which will not be repeated here.
  • the first network device processes the access layer security information of the terminal device.
  • the first network device sends the access layer security information, the access layer context of the terminal device, the identification of the terminal device, and RNA information to the second network device.
  • step 303 The difference from step 303 above is that the second network device in step 303 is a core network device, and in this step, the second network device is an access network device.
  • the second network device when certain conditions are met, for example, according to the satellite movement track, the second network device will cover the cell originally served by the first network device, the first network device sends the access layer security information and the terminal device to the second network device The access layer context, terminal device identification, RNA information, and delete these stored contents.
  • the first network device sends a fourth request message to the core network device.
  • the fourth request message is used to request that the third logical interface for the terminal device be switched to the fourth logical interface, and the fifth request message is used to request that the second network device and the core network device
  • the fourth logical interface is established for the terminal device, and the third logical interface is the logical interface between the first network device and the core network device for the terminal device, and the fourth logical interface is The interface is a logical interface between the second network device and the core network device for the terminal device.
  • the core network device sends a response message to the first network device.
  • the core network device sends a fifth request message to the second network device.
  • the above steps 504 to 506 realize the purpose of switching the third logical interface of the terminal device to the fourth logical interface.
  • the first network device actively initiates the logical interface switch.
  • the second network device may also actively initiate the logical interface switch.
  • the second network device sends a fifth request message to the core network device, where the fifth request message is used to request the establishment of a fourth logical interface for the terminal device between the second network device and the core network device ,
  • the second network device receives the response message sent by the core network device.
  • the first network device sends the RNA information to the second network device.
  • the second network device sends the access stratum context of the terminal device and the identifier of the terminal device to the fifth network device.
  • the fifth network device is a network device that stores the access layer context and establishes a logical interface for the terminal device with the second network device before the terminal device changes from the inactive state to the connected state .
  • the second network device moves, when certain conditions are met, for example, the cell originally covered by the second network device is covered by the fifth network device, the second network device sends the terminal to the fifth network device
  • the access layer context of the device and the identification of the terminal device are switched to the fourth logical interface for the fourth logical interface of the terminal device; similarly, when certain conditions are met, for example, the cell originally covered by the fifth network device Covered by the fifth network device, the fifth network device sends the access layer context of the terminal device and the identification of the terminal device to the fifth network device, and the fourth logical interface of the terminal device is switched to fourth.
  • Logical interface Logical interface.
  • the access layer context of the terminal device continues to be stored in the second network device.
  • the second network device initiates an RNA paging message in the area indicated by the RNA information.
  • step 507 If the above step 507 is not performed, that is, when the terminal device does not need to respond to the RNA paging, the second network device initiates the RNA paging message in the area indicated by the RNA information.
  • step 507 that is, when the terminal device needs to respond to the RNA paging, the fifth network device initiates the RNA paging message in the area indicated by the RNA information.
  • the terminal device sends an RRC Resume message to the third network device.
  • step 306 For detailed description, please refer to step 306 above, which will not be repeated here.
  • the third network device sends a first request message carrying the identifier of the terminal device to the second network device.
  • step 307 For detailed description, please refer to the above step 307, which will not be repeated here.
  • the third network device sends the first request message carrying the identifier of the terminal device to the fifth network device.
  • the second network device determines that the first MAC-I is the same as the second MAC-I.
  • step 308 The difference from step 308 above is that in this step, the second network device is an access network device, and the second network device in step 308 is a core network device.
  • the second network device sends a first response message to the third network device, where the first response message carries the access layer context of the terminal device.
  • step 309 For detailed description, please refer to the above step 309, which will not be repeated here.
  • the second network device sends a sixth request message to the core network device.
  • the sixth request message is used to request to switch the fourth logical interface for the terminal device to the fifth logical interface.
  • the second network device receives the response message sent by the core network device.
  • the core network device sends a seventh request message to the third network device.
  • the seventh request message is used to request the establishment of a fifth logical interface for the terminal device between the third network device and the second network device, and the fourth logical interface is the second network
  • the logical interface between the device and the core network device for the terminal device, the fifth logical interface is the logical interface between the third network device and the second network device for the terminal device, and the first Third, the network device is a network device that provides services for the terminal device to recover from the inactive state to the connected state.
  • the above steps 513 to 515 realize the purpose of switching the fourth logical interface of the terminal device to the fifth logical interface.
  • the second network device initiates the logical interface switch.
  • the third network device may also initiate the logical switch actively.
  • the network device sends a seventh request message to the core network device, where the seventh request message is used to request the establishment of a fifth logical interface between the third network device and the second network device for the terminal device, so The third network device receives the response message sent by the core network device.
  • the logical interface between the access network device and the core network device for the terminal device changes dynamically, that is, from the first network Between equipment and core network equipment, between the second network equipment and the core network equipment, continue to switch between the fifth network equipment and the core network equipment, continue to switch between the fifth network equipment and the core network equipment... ..., finally, after the terminal device enters the connected state from the inactive state, a logical interface for the terminal device between the third network device and the core network device.
  • the third network device sends an RRC resume message to the terminal device.
  • step 311 For detailed description, please refer to step 311 above, which will not be repeated here.
  • the access layer context of the terminal device is stored in the second network device, that is, the access network network device, and the MAC-I verification and the derivation of the second key are stored by the access layer context of the terminal device.
  • the access network equipment is completed, and the logical interface between the access network equipment and the core network equipment for the terminal equipment changes dynamically, and when the terminal equipment in the inactive state is required to enter the connected state, the third network equipment is the terminal equipment.
  • the network device that recovers from the inactive state to the connected state and provides services can obtain the access layer context of the terminal device from the access network network device, and switch the logical interface for the terminal device between the second network device and the core network device to Between the third network device and the core network device, thereby increasing the success rate of data transmission.
  • a TA list contains multiple TA IDs, and each TA ID indicates One cell set, that is, one TA ID corresponds to multiple cell IDs (cell IDs), and network devices corresponding to different cells may be the same or different.
  • the TA list includes TA1, which corresponds to cell 1, cell 2, and cell 3.
  • the network devices corresponding to cell 1, cell 2, and cell 3 may be the same or different.
  • the geographic area indicated by a TA ID is relatively fixed.
  • the terminal device does not need to update the TA, and when the terminal device’s After the data arrives, the core network will page the terminal device in the TA list area.
  • the system broadcast of each cell will broadcast the TA label of the current cell. If the terminal equipment finds that the TA label is not in the TA list sent to itself by the core network, the terminal equipment Perform TA update.
  • the TA list-based paging mechanism is applied to non-terrestrial networks, if the ground stationary cell mapping method is used, the geographic location of the cell is fixed, and the geographic area indicated by the same TA ID is fixed.
  • the same A network device corresponds to a different cell, or in other words, different network devices that provide services for the same cell at different times, resulting in the core network device being unable to page the terminal device according to the TA list.
  • the ground mobile cell mapping method is adopted, since the network equipment is always moving, the geographic location of the cell changes. Although the mapping relationship between the network equipment and the cell is fixed, the corresponding geographic location of the cell changes at different times, which will also cause the core network The device cannot page to the terminal device.
  • the embodiment of the present application also provides a paging method to avoid that in the TA list-based paging mechanism, since the network device is always moving, the core network device cannot determine which network device it needs to go to and therefore cannot page the message. Disadvantages of paging to terminal equipment.
  • Fig. 9 is a flowchart of a paging method provided by an embodiment of the present application. This embodiment describes in detail the paging method described in the embodiment of the present application from the perspective of interaction between core network equipment and terminal equipment. This embodiment includes:
  • the core network device allocates a tracking area list to the terminal device.
  • the tracking area list includes a first tracking area identifier
  • the first tracking area identifier indicates a first cell set
  • the first cell in the first cell set is covered by a first network device, or the The first cell corresponds to the first tracking area identifier.
  • the core network device allocates a tracking area list (TA list) to the terminal device, which is recorded as a tracking area list.
  • the tracking area list contains multiple tracking area identifiers.
  • the area identifier is any one of the tracking area identifiers.
  • the tracking area corresponding to each tracking area identifier is used to indicate a cell set.
  • the first cell set is any one of the cell sets, and the first cell is the first cell set. Any cell in a cell set.
  • the geographic location of the first cell is fixed, but the network equipment that provides coverage for the first cell is different at different times.
  • the first cell is covered by the first network device.
  • the first tracking area identifier is any one of the multiple tracking area identifiers, and the first tracking area indicates the first cell set.
  • the network equipment serving the first cell is fixed, but the geographic location corresponding to the first cell changes at different times.
  • the corresponding relationship between the TA ID and the cell ID needs to be changed. For example, at time T1, the cell indicated by the first tracking area identifier includes the first cell, and at time T2, the geographic location corresponding to the first cell is covered by the second cell, then the second cell included in the first tracking area identifier.
  • the core network device receives the association information sent by the first network device.
  • the association information is used to indicate that the first cell is covered by the second network device.
  • the initial TA list includes TA1-cell1-gNB1 in the mapping relationship, and the association relationship is TA1- Cell 1-gNB2, indicating that cell 1 in TA1 is switched from gNB1 to gNB2; for ground mobile cell mapping, the associated information is used to indicate that the first cell included in the first tracking area identifier is changed to the second cell
  • the mapping relationship in the initial TA list includes TA1-cell1-gNB1, and in the association relationship, TA1-cell2-gNB2, cell 1 and cell 2 correspond to the same geographic area, but gNB1 and gNB2 are different network devices.
  • the first network device or the second network device sends to the core network device Association information; or, at least one of the cells served by the first network device changes, for example, at time T1, the first network device provides services for cells 1, 2, and 3, and at time T2, the first network device is cell 1 , 2, 4 provide services, the first network device sends associated information to the core network device.
  • the core network device updates the tracking area list according to the association information.
  • the core network device uses the associated information to update the tracking area list.
  • the tracking area list has the following relationship: TA1-cell1-gNB1; after the update, TA1-cell1-gNB2; for the ground mobile cell mapping
  • the mapping relationship in the TA list includes TA1-cell1-gNB1
  • the mapping relationship in the TA list includes TA1-cell2-gNB2.
  • the core network device pages the terminal device according to the updated tracking area list.
  • the core network device determines which network device should send the paging message to according to the updated tracking area list to achieve the purpose of paging the terminal device.
  • the arrow 604 in the figure points from the core network device to the terminal device, which merely means that the core network device paging the terminal device, but does not mean that the core network device sends paging to the terminal device.
  • the network device when the network device that provides services for the first cell changes, the network device sends associated information to the core network device, and the associated information is used to indicate the service provider for the first cell.
  • the network device is switched from the first network device to the second network device; for the ground mobile cell mapping method, when the first cell corresponding to the first tracking area identifier is changed to the second cell, the network device sends an association relationship to the core network device, indicating The first cell corresponding to the first tracking area identifier is changed to the second cell, so that the core network updates the tracking area list according to the association relationship.
  • the terminal device needs to be paged subsequently, it is determined according to the updated tracking area list that the paging message should be sent to Which network devices to page to achieve the purpose of paging terminal devices.
  • FIG. 10 is a schematic structural diagram of a context storage device provided by an embodiment of this application.
  • the context storage device involved in this embodiment may be the first network device or a chip applied to the first network device.
  • the context storage device may be used to execute the function of the first network device in the foregoing embodiment.
  • the context storage device 100 may include:
  • the sending unit 11 is configured to send the access layer context of the terminal device and the identification of the terminal device to the second network device, so as to make the second network device store the access layer context of the terminal device and the terminal device
  • An identifier of the device, the first network device is a network device that releases the terminal device from a connected state to an inactive state.
  • the sending unit 11 is further configured to send access layer security information to the second network device, where the access layer security information includes the first key.
  • the sending unit 11 is further configured to send a second request message to the second network device to request to release the communication between the second network device and the first network device.
  • Logical interface of terminal equipment
  • the apparatus 100 further includes: a receiving unit 13 and a processing unit 12, the receiving unit 13 is configured to receive a second request message sent by the second network device, and the processing unit 12 is configured to respond to the second request Message to release the logical interface between the second network device and the first network device for the terminal device.
  • the sending unit 11 is further configured to send a fourth request message to the second network device, and the fourth request message is used to request to switch the first logical interface of the terminal device.
  • the first logical interface is the logical interface between the first network device and the second network device for the terminal device
  • the second logical interface is the fourth network device and all The logical interface between the second network device and the terminal device
  • the fourth network device is between the terminal device and the second network device before the terminal device changes from the inactive state to the connected state.
  • the receiving unit 13 is configured to receive a response message sent by the second network device.
  • the sending unit 11 is further configured to send a sixth request message to the core network device, and the sixth request message is used to request to switch the third logical interface for the terminal device to the fourth Logical interface, the third logical interface is a logical interface between the first network device and the core network device for the terminal device, and the fourth logical interface is the second network device and the core A logical interface between network devices for the terminal device;
  • the receiving unit 13 is configured to receive a response message sent by the core network device.
  • the first network device and the second network device are access network network devices.
  • the first network device is an access network device
  • the second network device is a core network device
  • the context storage device provided in the embodiments of the present application can execute the actions of the first network device in the above-mentioned embodiments, and its implementation principles and technical effects are similar, and will not be repeated here.
  • FIG. 11 is a schematic structural diagram of another context storage device provided by an embodiment of the application.
  • the context storage device involved in this embodiment may be the second network device, or may be a chip applied to the second network device.
  • the context storage device may be used to execute the function of the second network device in the foregoing embodiment.
  • the context storage device 200 may include:
  • the receiving unit 21 is configured to receive the access layer context of the terminal device and the identification of the terminal device sent by a first network device, the first network device being a network device that releases the terminal device from a connected state to an inactive state ;
  • the storage unit 22 is configured to store the access stratum context of the terminal device and the identifier of the terminal device.
  • the receiving unit 21 is further configured to receive access layer security information sent by the first network device, where the access layer security information includes a first key.
  • the above-mentioned device 200 further includes: a sending unit 23;
  • the receiving unit 21 is further configured to receive a first request message carrying an identifier of the terminal device sent by a third network device, and the first request message is used to request the access stratum context of the terminal device.
  • the third network device is a network device that provides services for the terminal device to recover from an inactive state to a connected state;
  • the sending unit 23 is configured to send a first response message to the third network device, where the first response message carries the access layer context of the terminal device and a second key, and the second key is A key generated by the second network device according to the first key.
  • the first request message also carries a first integrity message authentication code MAC-I
  • the device 200 further includes a processing unit 24;
  • the processing unit 24 is configured to determine a second MAC-I, and determine the first MAC-I and the second MAC-I before the sending unit 23 sends the first response message to the third network device. I is the same.
  • the receiving unit 21 is further configured to receive a second request message sent by the first network device, and the processing unit 24 is configured to release the first request message according to the second request message.
  • the sending unit 23 is configured to send a second request message to the first network device to request the release of the logical interface between the second network device and the first network device for the terminal device.
  • the sending unit 23 is configured to send a third request message to the third network device to request communication between the second network device and the third network device for the terminal
  • the device establishes a logical interface
  • the receiving unit 21 is further configured to receive a third request message sent by the third network device, and the processing unit 24 is configured to communicate between the second network device and the third network device according to the third request message.
  • a logical interface is established between the network devices for the terminal device.
  • the receiving unit 21 is configured to receive a fourth request message sent by the first network device, and the fourth request message is used to request that the first logical interface for the terminal device be switched to The second logical interface
  • the sending unit 23 is configured to send a response message to the first network device, and send the fifth request message to the fourth network device, and the fifth request message is used to request the 4.
  • the second logical interface is established between the network device and the second network device for the terminal device, and the first logical interface is the connection between the first network device and the second network device for the The logical interface of the terminal device, the second logical interface is the logical interface between the fourth network device and the second network device for the terminal device, and the fourth network device is the terminal device from non A network device that establishes a logical interface with the second network device for the terminal device before the activated state is in the connected state;
  • the receiving unit 21 is further configured to receive a fifth request message sent by a fourth network device, and the processing unit 24 is configured to communicate between the fourth network device and the second network device according to the fifth request message.
  • the second logical interface is established between the devices for the terminal device, and the second network device sends a response message to the fourth network device.
  • the receiving unit 21 is further configured to receive a sixth request message sent by the fourth network device, and the sixth request message is used to request that the second logical interface of the terminal device Switching to the fifth logical interface
  • the sending unit 23 is configured to send a response message to the fourth network device
  • the second network device sends a seventh request message to the third network device
  • the seventh request message is used
  • the second logical interface is the fourth network device and the second network device.
  • a logical interface between network devices for the terminal device, the third network device is a network device that provides a service for the terminal device to recover from an inactive state to a connected state;
  • the receiving unit 21 is further configured to receive a seventh request message sent by the third network device, and the processing unit 24 is configured to communicate between the third network device and the second network device according to the seventh request message.
  • a fifth logical interface is established between network devices for the terminal device, and the sending unit 23 is configured to send a response message to the third network device.
  • the sending unit 23 is configured to send a fifth request message to a core network device, and the fifth request message is used to request a communication between the second network device and the core network device.
  • the terminal device establishes a fourth logical interface, and the receiving unit 21 is further configured to receive a response message sent by the core network device.
  • the sending unit 23 is configured to send the access layer context of the terminal device and the identification of the terminal device to a fifth network device, and the fifth network device is a slave device of the terminal device.
  • the fifth network device is a slave device of the terminal device.
  • the sending unit 23 is configured to send a sixth request message to the core network device, and the sixth request message is used to request to switch the fourth logical interface for the terminal device to the first Five logical interfaces
  • the receiving unit 21 is configured to receive a response message sent by the core network device
  • the fourth logical interface is the communication between the second network device and the core network device for the terminal device A logical interface
  • the fifth logical interface is a logical interface between a third network device and the second network device for the terminal device
  • the third network device is a logical interface for the terminal device to recover from an inactive state Network equipment that provides services in a connected state;
  • the sending unit 23 is configured to send an eighth request message carrying the identifier of the terminal device to the network device in the area where the terminal device is located, so as to request information in the area where the terminal device is located.
  • the network device pages the terminal device;
  • the first network device is an access network device
  • the second network device is a core network device
  • the first network device is an access network network device
  • the second network device is an access network network device
  • the context storage device provided in the embodiment of the present application can execute the actions of the second network device in the foregoing embodiment, and its implementation principles and technical effects are similar, and will not be repeated here.
  • FIG. 12 is a schematic structural diagram of another context storage device provided by an embodiment of the application.
  • the context storage device involved in this embodiment may be a third network device or a chip applied to the third network device.
  • the context storage device may be used to execute the function of the third network device in the foregoing embodiment.
  • the context storage device 300 may include:
  • the receiving unit 31 is configured to receive a ninth request message carrying an identifier of the terminal device sent by a terminal device in an inactive state, where the ninth request message is used to request to restore the radio resource control RRC connection of the terminal device;
  • the sending unit 32 is configured to send a first request message carrying an identifier of the terminal device to a second network device, where the second network device is a network device that stores the access layer context of the terminal device;
  • the receiving unit 31 is further configured to receive a first response message sent by the second network device, where the first response message carries the access layer context of the terminal device.
  • the above-mentioned apparatus 300 further includes: a processing unit 33, and the receiving unit 31 is further configured to receive a third request message sent by the second network device, and the processing unit 33 uses Establishing a logical interface for the terminal device between the second network device and the third network device according to the third request message;
  • the sending unit 32 is further configured to send a third request message to the second network device to request the establishment of a logical interface between the second network device and the third network device for the terminal device.
  • the receiving unit 31 is further configured to receive a seventh request message sent by the second network device, and the processing unit 33 is configured to perform the first request message according to the seventh request message.
  • a fifth logical interface is established between the network device and the second network device for the terminal device, and the third network device is a network device that provides services for the terminal device to recover from an inactive state to a connected state;
  • the sending unit 32 is further configured to send a seventh request message to the second network device, where the seventh request message is used to request communication between the third network device and the second network device for the
  • the terminal device establishes a fifth logical interface.
  • the receiving unit 31 is further configured to receive the seventh request message sent by the core network device, and the processing unit 33 is configured to perform the processing on the third network device according to the seventh request message.
  • the sending unit 32 is further configured to send a seventh request message to the core network device, where the seventh request message is used to request that the third network device be established between the third network device and the core network device for the terminal device.
  • the third network device is an access network device, and the second network device is a core network device.
  • the third network device is an access network network device
  • the second network device is an access network network device
  • the third network device and the first network device are the same or different network devices, and the first network device is a network device that releases the terminal device from a connected state to an inactive state.
  • the context storage device provided in the embodiment of the present application can execute the actions of the third network device in the foregoing embodiment, and its implementation principles and technical effects are similar, and will not be repeated here.
  • FIG. 13 is a schematic structural diagram of a paging device provided by an embodiment of this application.
  • the paging device involved in this embodiment may be a core network device or a chip applied to the core network device.
  • the paging device can be used to perform the functions of the core network device in the embodiment of FIG. 9 described above.
  • the paging device 400 may include:
  • the processing unit 41 is configured to allocate a tracking area list to a terminal device, where the tracking area list includes a first tracking area identifier, the first tracking area identifier indicates a first cell set, and the first cell set in the first cell set A cell is covered by a first network device, or the first cell corresponds to a first tracking area identifier;
  • the receiving unit 42 is configured to receive association information sent by a first network device, where the association information is used to indicate that the network device served by the first cell in the first tracking area list is changed from the first network device to the second network Device, or, the first cell corresponding to the first tracking area identifier in the first tracking area list is changed to the second cell;
  • the processing unit 41 is further configured to update the tracking area list according to the associated information, and page the terminal device according to the updated tracking area list.
  • the above-mentioned paging device 400 further includes: a sending unit 43,
  • the processing unit 41 is configured to determine a paging area according to the updated tracking area list
  • the sending unit 43 is configured to send a paging message to a network device corresponding to a cell in the paging area to page the terminal device.
  • the paging device provided in the embodiment of the present application can perform the actions of the core network device in the foregoing embodiment, and its implementation principles and technical effects are similar, and will not be repeated here.
  • FIG. 14 is a schematic structural diagram of another paging device provided by an embodiment of this application.
  • the paging device involved in this embodiment may be a network device or a chip applied to the network device.
  • the paging device can be used to perform the functions of the network device in the embodiment of FIG. 9 described above.
  • the paging device 500 may include:
  • the processing unit 51 is configured to allocate a tracking area list to the terminal device, wherein the tracking area list includes a first tracking area identifier, the first tracking area identifier indicates a first cell set, and the first cell set in the first cell set A cell is covered by a first network device, or the first cell corresponds to a first tracking area identifier;
  • the transceiver unit 52 is configured to receive association information sent by a first network device, where the association information is used to indicate that the network device served by the first cell in the first tracking area list is changed from the first network device to the second network
  • the terminal device is paged in the list.
  • the paging device provided in the embodiment of the present application can perform the actions of the network device in the foregoing embodiment, and its implementation principles and technical effects are similar, and will not be repeated here.
  • the processing unit can be implemented in the form of software calling through processing elements; it can also be implemented in the form of hardware.
  • the processing unit may be a separate processing element, or it may be integrated in a chip of the above-mentioned device for implementation.
  • it may also be stored in the memory of the above-mentioned device in the form of program code, and a certain processing element of the above-mentioned device Call and execute the functions of the above processing unit.
  • all or part of these units can be integrated together or implemented independently.
  • the processing element described here may be an integrated circuit with signal processing capability. In the implementation process, each step of the above method or each of the above units can be completed by hardware integrated logic circuits in the processor element or instructions in the form of software.
  • the above units may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASIC), or one or more microprocessors (digital signal processor, DSP), or, one or more field programmable gate arrays (FPGA), etc.
  • ASIC application specific integrated circuit
  • DSP digital signal processor
  • FPGA field programmable gate arrays
  • the processing element may be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call program codes.
  • CPU central processing unit
  • these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • SOC system-on-a-chip
  • FIG. 15 is a schematic structural diagram of another context storage device provided by an embodiment of this application.
  • the context storage device 600 may include: a processor 61 (such as a CPU), a memory 62, a receiver 63, and a transmitter 64; the receiver 63 and the transmitter 64 are both coupled to the processor 61, and the processor 61 Control the receiving action of the receiver 63 and the processor 61 controlling the sending action of the transmitter 64;
  • the memory 62 may include high-speed random access memory (random-access memory, RAM), or may also include non-volatile memory (non-volatile memory). memory, NVM), for example, at least one disk memory.
  • the memory 62 may store various instructions for completing various processing functions and implementing the method steps of the present application.
  • the context storage device involved in this application may further include: a communication bus 65.
  • the receiver 63 and the transmitter 64 may be integrated in the transceiver of the context storage device, or may be independent transceiver antennas on the context storage device.
  • the communication bus 65 is used to implement communication connections between components.
  • the above-mentioned memory 62 is used to store computer executable program code, and the program code includes instructions; when the processor 61 executes the instructions, the processor 61 of the context storage device executes the first network device in the above method embodiment.
  • the above-mentioned memory 62 is used to store computer executable program code, and the program code includes instructions; when the processor 61 executes the instructions, the processor 61 of the context storage device executes the processing actions of the first network device in the above method embodiment, so that the receiver 63 executes the receiving action of the second network device in the foregoing embodiment, and causes the transmitter 64 to execute the sending action of the second network device in the foregoing method embodiment.
  • the implementation principles and technical effects are similar, and will not be repeated here. or,
  • the above-mentioned memory 62 is used to store computer executable program code, and the program code includes instructions; when the processor 61 executes the instructions, the processor 61 of the context storage device executes the processing actions of the first network device in the above method embodiment, so that the receiver 63 executes the receiving action of the third network device in the foregoing embodiment, and causes the transmitter 64 to execute the sending action of the third network device in the foregoing method embodiment.
  • the implementation principles and technical effects are similar, and will not be repeated here.
  • FIG. 16 is a schematic structural diagram of another paging device provided by an embodiment of this application.
  • the paging device 700 may include: a processor 71 (such as a CPU), a memory 72, a receiver 73, and a transmitter 74; both the receiver 73 and the transmitter 74 are coupled to the processor 71, and the processor 71
  • the receiving action of the receiver 73 is controlled, and the processor 71 controls the sending action of the transmitter 74
  • the memory 72 may include high-speed random-access memory (RAM), or may also include non-volatile memory (non-volatile memory). memory, NVM), for example, at least one disk memory.
  • the memory 72 may store various instructions for completing various processing functions and implementing the method steps of the present application.
  • the paging device involved in this application may further include: a communication bus 75.
  • the receiver 73 and the transmitter 74 may be integrated in the transceiver of the paging device, or may be independent transceiver antennas on the paging device.
  • the communication bus 75 is used to implement communication connections between components.
  • the above-mentioned memory 72 is used to store computer executable program code, and the program code includes instructions; when the processor 71 executes the instructions, the processor 71 of the paging device executes the operation of the core network device in the above method embodiment.
  • the processing action enables the receiver 73 to perform the receiving action of the core network device in the foregoing embodiment, and the sender 74 to execute the sending action of the core network device in the foregoing method embodiment.
  • the implementation principles and technical effects are similar, and will not be repeated here. or,
  • the above-mentioned memory 72 is used to store computer executable program code, the program code includes instructions; when the processor 71 executes the instructions, the processor 71 of the paging device executes the processing actions of the network equipment in the above method embodiment, and the receiver 73 executes The receiving action of the network device in the foregoing embodiment causes the transmitter 74 to execute the sending action of the network device in the foregoing method embodiment.
  • the implementation principles and technical effects are similar, and will not be repeated here.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application are generated in whole or in part.
  • the computer can be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • Computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • computer instructions may be transmitted from a website, computer, server, or data center through a cable (such as Coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) to transmit to another website site, computer, server or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the term "plurality” herein refers to two or more.
  • the term “and/or” in this article is only an association relationship describing the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone B these three situations.
  • the manner described herein "at least one of" means one of the listed items or any combination thereof, for example, "at least one of A, B, and C” can mean: A alone exists, alone There are B, C alone, A and B, B and C, A and C, and A, B, and C.
  • the character “/" in this article generally means that the associated objects before and after are in an "or” relationship; in the formula, the character "/" means that the associated objects before and after are in a "division" relationship.
  • the size of the sequence numbers of the foregoing processes does not mean the order of execution.
  • the execution order of each process should be determined by its function and internal logic, and should not be implemented in this application.
  • the implementation process of the example constitutes any limitation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种上下文存储方法及装置,第一网络设备,即释放终端设备从连接态到非激活态的网络设备将终端设备的接入层上下文发送给第二网络设备,由第二网络设备存储该终端设备的接入层上下文。由于终端设备的接入层上下文不存储在第一网络设备上,而是存储在第二网络设备上,因此,不管第一网络设备运动到多远,第三网络设备都能够从第二网络设备获得终端设备的接入层上下文,并恢复终端设备与第三网络设备之间的链路,从而提供数据传输成功率,其中,第三网络设备为为终端设备从非激活态进入连接态提供服务的网络设备。

Description

上下文存储方法及装置
本申请要求于2019年01月28日提交中国专利局、申请号为2019100817119、申请名称为《上下文存储方法及装置》的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,尤其涉及一种上下文存储方法及装置。
背景技术
第五代移动通信(the 5th generation mobile communication,5G)技术也称之为5G新无线接入技术(new radio access technology,New RAT),New RAT简称为NR。NR技术中,终端设备(user equipment,UE)的无线资源控制(radio resource control,RRC)状态包括连接态、非激活状态和空闲态。UE处于连接态时,UE与基站之间建立链路,基站和核心网之间也存在针对该UE的链路;UE处于非激活态时,基站和核心网之间针对该UE的链路没有断开,但是UE与基站之间的链路被释放(release),基站存储该UE的接入层上下文,使得有数据需要传输时,基站可以恢复基站与UE之间的链路;UE处于空闲态时,UE与基站之间的链路、基站和核心网之间针对该UE的链路均被释放。
传统的蜂窝网络中,连接态的UE进入非激活态时,基站为UE分配一个非激活态无线网络临时标识(inactive-radio network temporary identifier,I-RNTI),存储UE的接入层上下文,并释放基站与UE之间的链路,使得UE进入非激活态,该过程中的基站也称之为锚点基站。当核心网需要向UE发送下行数据时,该数据经过核心网与基站之间的链路到达锚点基站,锚点基站向UE的无线接入网通知区域(RAN-based notification area,RNA)内发送RNA寻呼(paging)消息,以寻呼UE。其中,RNA可以理解为一个小区集合,同一个RNA中的各小区对应的基站之间存在Xn接口。UE检测到RNA paging消息后,向当前基站发送RRC恢复(resume)消息,需携带I-RNTI标识给当前基站,当前基站根据I-RNTI标识去锚点基站获取接入层上下文,根据接入层上下文建立UE与当前基站之间的链路,使得UE从非激活态转换为连接态,之后,UE进行下行数据的接收。当UE需要向核心网发送上行数据时,UE向当前基站发送携带I-RNTI的RRC resume消息,当前基站根据I-RNTI确定出锚点基站,并通过基站间的Xn接口从锚点基站获取接入层上下文。之后,当前基站根据接入层上下文建立UE与当前基站之间的链路,使得UE从非激活态转换为连接态。
上述UE从非激活态到连接态的转换过程中,针对上行数据,需要当前基站通过Xn接口从锚点基站获取接入层上下文,针对下行数据,需要锚点基站在RNA内寻呼UE。然而,传统的蜂窝网络并不能为UE提供覆盖,例如,大海、沙漠等地方无法部署基站的地方。 为此,引入非陆地网络(non terrestrial network,NTN),将基站或基站的部分功能部署在高空平台或卫星上以为UE提供覆盖。基于卫星部署的NTN中,利用卫星天线的波束覆盖地面形成小区,波束与小区的映射方式包括地面静止小区映射方式。该种方式下,小区的地理位置相对于地面固定,移动的卫星通过调整自己的波束覆盖小区,随着卫星的运动,不同的时刻,会出现同一个小区被不同的卫星覆盖的情况。而且,部署在不同的卫星上的基站间的Xn接口受限,有可能只有相邻的基站间才存在Xn接口。基于卫星部署的NTN中,需要连接态的UE进入非激活态时,锚点基站为该UE分配I-RNTI,存储UE的接入层上下文,并向该UE发送携带I-RNTI的RRC release消息。之后,上行数据传输过程中,UE向当前基站发送RRC resume消息,以使得当前基站从锚点基站获取接入层上下文。然而,由于锚点基站随着卫星不断的运动,运动到可能无法与当前基站保持Xn接口的位置,使得当前基站无法获取到接入层上下文,进而使得UE无法从非激活态转换为连接态,导致上行数据传输失败。下行数据传输过程中,锚点基站向RNA区域内的基站发送寻呼消息以寻呼UE,进而恢复UE与网络设备之间的链路。由于锚点基站随着卫星不断的运动,使得锚点基站与RNA区域内的基站之间的距离很远,导致RNA区域内的基站无法接收到寻呼消息,进而使得锚点基站无法寻呼到UE,造成下行数据传输失败。因此,如何存储终端设备的接入层上下文,使得为终端设备从非激活态恢复到连接态提供服务的网络设备,能够获取到终端设备的接入层上下文,以提高数据传输成功率,是为急待解决的问题。
发明内容
本申请实施例提供一种上下文存储方法及装置,通过将终端设备的接入层上下文存储在核心网设备,使得为终端设备从非激活态恢复到连接态提供服务的网络设备能够获取到终端设备的接入层上下文,从而提高数据传输的成功率。
第一方面,本申请实施例提供一种上下文存储方法,该方法可以应用于第一网络设备、也可以应用于第一网络设备中的芯片,下面以应用于第一网络设备为例对该方法进行描述,该方法包括:第一网络设备向第二网络设备发送终端设备的接入层上下文和所述终端设备的标识,用于使得所述第二网络设备存储所述终端设备的接入层上下文和所述终端设备的标识,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备。采用这种方案,由于终端设备的接入层上下文不存储在第一网络设备上,而是存储在第二网络设备上,因此,不管第一网络设备运动到多远,第三网络设备都能够从第二网络设备获得终端设备的接入层上下文,并恢复终端设备与第三网络设备之间的链路,从而提供数据传输成功率,其中,第三网络设备为为终端设备从非激活态进入连接态提供服务的网络设备。
一种可行的设计中,上述的方法还包括:所述第一网络设备向所述第二网络设备发送接入层安全信息,所述接入层安全信息包括第一密钥。采用这种方案,保证通信安全性。
一种可行的设计中,上述的方法还包括:所述第一网络设备向所述第二网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口;或者,所述第一网络设备接收所述第二网络设备发送的第二请求消息,并根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间 针对所述终端设备的逻辑接口。采用这种方案,实现释放针对终端设备的逻辑接口的目的。
一种可行的设计中,上述的方法还包括:所述第一网络设备向所述第二网络设备发送第四请求消息,所述第四请求消息用于请求将针对所述终端设备的第一逻辑接口切换为第二逻辑接口,所述第一逻辑接口为所述第一网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第二逻辑接口为第四网络设备与所述第二网设备之间针对所述终端设备的逻辑接口,所述第四网络设备为所述终端设备从非激活态到连接态之前,与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备;所述第一网络设备接收所述第二网络设备发送的响应消息。采用这种方案,实现终端设备的接入层上下文存储在核心网设备上时,建立当前网络设备与核心网设备之间针对终端设备的逻辑接口的目的。
一种可行的设计中,上述的方法还包括:所述第一网络设备向核心网设备发送第六请求消息,所述第六请求消息用于请求将针对所述终端设备的第三逻辑接口切换为第四逻辑接口,所述第三逻辑接口为所述第一网络设备与所述核心网设备之间针对所述终端设备的逻辑接口,所述第四逻辑接口为所述第二网络设备与所述核心网设备之间针对所述终端设备的逻辑接口;所述第一网络设备接收所述核心网设备发送的响应消息。采用这种方案,实现动态切换接入网网络设备与核心网设备之间针对终端设备的逻辑接口的目的。
一种可行的设计中,上述的所述第一网络设备和所述第二网络设备为接入网网络设备。采用这种方案,实现在接入网网络设备上动态存储终端设备的接入层上下文的目的。
一种可行的设计中,上述的所述第一网络设备为接入网网络设备,所述第二网络设备为核心网设备。采用这种方案,实现将终端设备的接入层上下文存储在核心网设备的目的。
第二方面,本申请实施例提供一种上下文存储方法,该方法可以应用于第二网络设备、也可以应用于第二网络设备中的芯片,下面以应用于第二网络设备为例对该方法进行描述,该方法包括:第二网络设备接收第一网络设备发送的终端设备的接入层上下文和所述终端设备的标识,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备;所述第二网络设备存储所述终端设备的接入层上下文和所述终端设备的标识。由于终端设备的接入层上下文不存储在第一网络设备上,而是存储在第二网络设备上,因此,不管第一网络设备运动到多远,第三网络设备都能够从第二网络设备获得终端设备的接入层上下文,并恢复终端设备与第三网络设备之间的链路,从而提供数据传输成功率,其中,第三网络设备为为终端设备从非激活态进入连接态提供服务的网络设备。
一种可行的设计中,上述的方法还包括:所述第二网络设备接收所述第一网络设备发送的接入层安全信息,所述接入层安全信息包括第一密钥。采用这种方案,保障了通信的安全性。
一种可行的设计中,上述的方法还包括:所述第二网络设备接收第三网络设备发送的携带所述终端设备的标识的第一请求消息,所述第一请求消息用于请求所述终端 设备的接入层上下文,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;所述第二网络设备向所述第三网络设备发送第一响应消息,所述第一响应消息携带所述终端设备的接入层上下文和第二密钥,所述第二密钥是所述第二网络设备根据所述第一密钥生成的密钥。采用这种方案,实现第三网络设备获取终端设备的接入层上下文的目的。
一种可行的设计中,上述的所述第一请求消息还携带第一完整性消息认证码MAC-I,所述第二网络设备向所述第三网络设备发送第一响应消息之前,还包括:所述第二网络设备确定第二MAC-I;所述第二网络设备确定所述第一MAC-I与所述第二MAC-I相同。采用这种方案,保障了通信安全性。
一种可行的设计中,上述的方法还包括:所述第二网络设备接收所述第一网络设备发送的第二请求消息,并根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口;或者;所述第二网络设备向所述第一网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。采用这种方案,实现释放第二网络设备与第一网络设备之间针对终端设备的逻辑接口的目的。
一种可行的设计中,上述的方法还包括:所述第二网络设备向所述第三网络设备发送第三请求消息,以请求在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口;或者,所述第二网络设备接收所述第三网络设备发送的第三请求消息,根据所述第三请求消息在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口。采用这种方案,实现终端设备的接入层上下文存储在核心网设备上时,建立当前网络设备与核心网设备之间针对终端设备的逻辑接口的目的。
一种可行的设计中,上述的方法还包括:所述第二网络设备接收所述第一网络设备发送的第四请求消息,所述第四请求消息用于请求将针对所述终端设备的第一逻辑接口切换为第二逻辑接口,所述第二网络设备向所述第一网络设备发送响应消息,所述第二网络设备向第四网络设备发送所述第五请求消息,所述第五请求消息用于请求在所述第四网络设备与所述第二网设备之间针对所述终端设备建立所述第二逻辑接口,所述第一逻辑接口为所述第一网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第二逻辑接口为所述第四网络设备与所述第二网设备之间针对所述终端设备的逻辑接口,所述第四网络设备为所述终端设备从非激活态到连接态之前,与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备;或者;所述第二网络设备接收第四网络设备发送的第五请求消息,根据所述第五请求消息,在所述第四网络设备与所述第二网设备之间针对所述终端设备建立所述第二逻辑接口,所述第二网络设备向所述第四网络设备发送响应消息。采用这种方案,实现动态切换接入网网络设备与核心网设备之间针对终端设备的逻辑接口的目的。
一种可行的设计中,上述的方法还包括:所述第二网络设备接收所述第四网络设备发送的第六请求消息,所述第六请求消息用于请求将针对所述终端设备的第二逻辑接口切换为第五逻辑接口,所述第二网络设备向所述第四网络设备发送响应消息,所述第二网络设备向第三网络设备发送第七请求消息,所述第七请求消息用于请求在所述第三网络设备和所述第二网络设备之间建立针对所述终端设备建立所述第五逻辑接 口,所述第二逻辑接口为所述第四网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;或者,所述第二网络设备接收所述第三网络设备发送的第七请求消息,根据所述第七请求消息在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,向所述第三网络设备发送响应消息。采用这种方案,实现动态切换接入网网络设备与核心网设备之间针对终端设备的逻辑接口以及动态切换存储终端设备的接入层上下文的网络设备的目的。
一种可行的设计中,上述的所述方法还包括:所述第二网络设备向核心网设备发送第五请求消息,所述第五请求消息用于请求在所述第二网络设备和所述核心网设备之间针对所述终端设备建立第四逻辑接口,所述第二网络设备接收所述核心网设备发送的响应消息。采用这种方案,实现动态切换针对终端设备的逻辑接口的目的。
一种可行的设计中,上述的方法还包括:所述第二网络设备向第五网络设备发送所述终端设备的接入层上下文和所述终端设备的标识,所述第五网络设备为所述终端设备从非激活态到连接态之前,存储所述接入层上下文且与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备。采用这种方案,实现动态切换存储终端设备的接入层上下文的接入网网络设备的目的。
一种可行的设计中,上述的方法还包括:所述第二网络设备向所述核心网设备发送第六请求消息,所述第六请求消息用于请求将针对所述终端设备的第四逻辑接口切换为第五逻辑接口,所述第二网络设备接收所述核心网设备发送的响应消息,所述第四逻辑接口为所述第二网络设备与所述核心网设备之间针对所述终端设备的逻辑接口,所述第五逻辑接口为第三网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备。采用这种方案,实现终端设备从非激活态到连接态时,恢复接入网网络设备与核心网设备之间针对终端设备的逻辑接口的目的。
一种可行的设计中,上述的方法包括:所述第二网络设备向所述终端设备所在区域的网络设备发送携带所述终端设备的标识的第八请求消息,以请求所述终端设备所在的区域内的网络设备寻呼所述终端设备。采用这种方案,实现寻呼终端设备的目的,以保证数据传输。
一种可行的设计中,所述第一网络设备为接入网网络设备,所述第二网络设备为核心网设备。采用这种方案,实现将终端设备的接入层上下文存储着核心网设备的目的。
一种可行的设计中,所述第一网络设备为接入网网络设备,所述第二网络设备为接入网网络设备。采用这种方案,实现将终端设备的接入层上下文存储在接入网网络设备的目的。
第三方面,本申请实施例提供一种上下文存储方法,该方法可以应用于第三网络设备、也可以应用于第三网络设备中的芯片,下面以应用于第三网络设备为例对该方法进行描述,该方法包括:第三网络设备接收非激活态的终端设备发送的携带所述终端设备的标识的第九请求消息,所述第九请求消息用于请求恢复所述终端设备的无线资源控制RRC连接;所述第三网络设备向第二网络设备发送携带所述终端设备的标 识的第一请求消息,所述第二网络设备是存储所述终端设备的接入层上下文的网络设备;所述第三网络设备接收所述第二网络设备发送的第一响应消息,所述第一响应消息携带所述终端设备的接入层上下文。采用该种方案,终端设备的接入层上下文存储在第二网络设备上,为终端设备从激活态进入连接态提供服务的网络设备,即第三网络设备接收到终端设备发送的RRC resume消息后,从第二网络设备获取终端设备的接入层上下文,并建立终端设备与第三网络设备之间的链路,从而提高数据传输成功率。
一种可行的设计中,上述的方法还包括:所述第三网络设备接收所述第二网络设备发送的第三请求消息,并根据所述第三请求消息在所述第二网络设备和所述第三网络设备之间针对所述终端设备建立逻辑接口;或者,所述第三网络设备向所述第二网络设备发送第三请求消息,以请求在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口。采用这种方案,实现第三网络设备获取到终端设备的接入层上下文的目的。
一种可行的设计中,上述的方法还包括:所述第三网络设备接收所述第二网络设备发送的第七请求消息,根据所述第七请求消息,在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;或者,所述第三网络设备向所述第二网络设备发送第七请求消息,所述第七请求消息用于请求在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口。采用这种方案,当终端设备从非激活态进入连接态时,实现在第二网络设备和第三网络设备之间针对终端设备建立逻辑接口的目的。
一种可行的设计中,上述的方法还包括:所述第三网络设备接收核心网设备发送的第七请求消息,根据所述第七请求消息,在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;或者,所述第三网络设备向核心网设备发送第七请求消息,所述第七请求消息用于请求在所述第三网络设备与所述核心网设备之间针对所述终端设备建立第五逻辑接口。采用这种方案,实现终端设备的接入层上下文存储在接入网网络设备时,当终端设备从非激活态进入连接态时,实现在第二网络设备和第三网络设备之间针对终端设备建立逻辑接口的目的。
一种可行的设计中,所述第三网络设备为接入网网络设备,所述第二网络设备为核心网设备。采用这种方案,实现将终端设备的接入层上下文存储着核心网设备的目的。
一种可行的设计中,所述第三网络设备为接入网网络设备,所述第二网络设备为接入网网络设备。采用这种方案,实现将终端设备的接入层上下文存储在接入网网络设备的目的。
一种可行的设计中,所述第三网络设备与第一网络设备为相同或不同的网络设备,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备。
第四方面,本申请实施例提供一种寻呼方法,该方法可以应用于核心网设备、也可以应用于核心网设备中的芯片,下面以应用于核心网设备为例对该方法进行描述, 该方法包括:核心网设备为终端设备分配跟踪区列表,其中,所述跟踪区列表包含第一跟踪区标识,所述第一跟踪区标识指示第一小区集合,所述第一小区集合中的第一小区由第一网络设备提供覆盖,或者,所述第一小区对应第一跟踪区标识;所述核心网设备接收第一网络设备发送的关联信息,所述关联信息用于指示所述第一跟踪区列表中的第一小区提供服务的网络设备由第一网络设备变更为第二网络设备,或者,所述第一跟踪区列表中的第一跟踪区标识对应的第一小区变更为第二小区;所述核心网设备根据所述关联信息更新所述跟踪区列表;所述核心网设备根据更新后的跟踪区列表寻呼所述终端设备。采用这种方法,对于地面静止小区映射方式,当为第一小区提供服务的网络设备发生变化时,网络设备向核心网设备发送关联信息,该关联信息用于指示为第一小区提供服务的网络设备由第一网络设备切换为第二网络设备;对于地面移动小区映射方式,当第一跟踪区标识对应的第一小区变更为第二小区时,网络设备向核心网设备发送关联关系,指示第一跟踪区标识对应的第一小区变更为第二小区,使得核心网根据关联关系更新跟踪区列表,后续需要寻呼终端设备时,根据更新后的跟踪区列表确定出应该发送寻呼消息到哪些网络设备从而寻实现寻呼终端设备的目的。
一种可行的实现方式中,所述核心网设备根据更新后的跟踪区列表寻呼所述终端设备,包括:所述核心网设备根据所述更新后的跟踪区列表,确定寻呼区域;所述核心网设备向所述寻呼区域内小区对应的网络设备发送寻呼消息以寻呼所述终端设备。采用这种方法,核心网设备根据更新后的跟踪区列表确定出应该发送寻呼消息到哪些网络设备从而寻实现寻呼终端设备的目的。
第五方面,本申请实施例提供一种寻呼方法,该方法可以应用于网络设备、也可以应用于网络设备中的芯片,下面以应用于网络设备为例对该方法进行描述,该方法包括:第一网络设备确定关联管理,所述关联关系指示为第一跟踪区列表中的第一小区提供服务的网络设备由第一网络设备变更为第二网络设备,或者,所述第一跟踪区列表中的第一跟踪区标识对应的第一小区变更为第二小区;所述网络上设备向核心网设备发送关联信息,用于使得所述核心网设备根据所述关联信息更新所述跟踪区列表。采用这种方法,对于地面静止小区映射方式,当为第一小区提供服务的网络设备发生变化时,网络设备向核心网设备发送关联信息,该关联信息用于指示为第一小区提供服务的网络设备由第一网络设备切换为第二网络设备;对于地面移动小区映射方式,当第一跟踪区标识对应的第一小区变更为第二小区时,网络设备向核心网设备发送关联关系,指示第一跟踪区标识对应的第一小区变更为第二小区,使得核心网根据关联关系更新跟踪区列表,后续需要寻呼终端设备时,根据更新后的跟踪区列表确定出应该发送寻呼消息到哪些网络设备从而寻实现寻呼终端设备的目的。
第六方面,本申请实施例提供一种上下文存储装置,该装置可以是第一网络设备,也可以是第一网络设备内的芯片。该装置可以包括处理单元、发送单元和接收单元。当该装置是第一网络设备时,该处理单元可以是处理器,发送单元可以是发送器,接收单元可以是接收器;该第一网络设备还可以包括存储单元,该存储单元可以是存储器;该存储单元用于存储指令,该处理单元执行该存储单元所存储的指令,以使该第一网络设备实现上述第一方面或第一方面的各种可能的实现方式中的功能。当该装置是第一网络设备内的芯片 时,该处理单元可以是处理器,该收发单元可以是输入/输出接口、管脚或电路等;该处理单元执行存储单元所存储的指令,以使该第一网络设备实现上述第一方面或第一方面的各种可能的实现方式中的功能,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该第一网络设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第七方面,本申请实施例提供一种上下文存储装置,该装置可以是第二网络设备,也可以是第二网络设备内的芯片。该装置可以包括处理单元、发送单元和接收单元。当该装置是第二网络设备时,该处理单元可以是处理器,发送单元可以是发送器,接收单元可以是接收器;该第二网络设备还可以包括存储单元,该存储单元可以是存储器;该存储单元用于存储指令,该处理单元执行该存储单元所存储的指令,以使该第二网络设备实现上述第二方面或第二方面的各种可能的实现方式中的功能。当该装置是第二网络设备内的芯片时,该处理单元可以是处理器,该收发单元可以是输入/输出接口、管脚或电路等;该处理单元执行存储单元所存储的指令,以使该第二网络设备实现上述第二方面或第二方面的各种可能的实现方式中的功能,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该第二网络设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第八方面,本申请实施例提供一种上下文存储装置,该装置可以是第三网络设备,也可以是第三网络设备内的芯片。该装置可以包括处理单元、发送单元和接收单元。当该装置是第三网络设备时,该处理单元可以是处理器,发送单元可以是发送器,接收单元可以是接收器;该第三网络设备还可以包括存储单元,该存储单元可以是存储器;该存储单元用于存储指令,该处理单元执行该存储单元所存储的指令,以使该第三网络设备实现上述第三方面或第三方面的各种可能的实现方式中的功能。当该装置是第三网络设备内的芯片时,该处理单元可以是处理器,该收发单元可以是输入/输出接口、管脚或电路等;该处理单元执行存储单元所存储的指令,以使该第三网络设备实现上述第三方面或第三方面的各种可能的实现方式中的功能,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该第三网络设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第九方面,本申请实施例提供一种寻呼装置,该装置可以是核心网设备,也可以是核心网设备内的芯片。该装置可以包括处理单元、发送单元和接收单元。当该装置是核心网设备时,该处理单元可以是处理器,发送单元可以是发送器,接收单元可以是接收器;该核心网设备还可以包括存储单元,该存储单元可以是存储器;该存储单元用于存储指令,该处理单元执行该存储单元所存储的指令,以使该核心网设备实现上述第四方面或第四方面的各种可能的实现方式中的功能。当该装置是核心网设备内的芯片时,该处理单元可以是处理器,该收发单元可以是输入/输出接口、管脚或电路等;该处理单元执行存储单元所存储的指令,以使该核心网设备实现上述第四方面或第四方面的各种可能的实现方式中的功能,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该核心网设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十方面,本申请实施例提供一种寻呼装置,该装置可以是网络设备,也可以是网络设备内的芯片。该装置可以包括处理单元、发送单元和接收单元。当该装置是网络设备时, 该处理单元可以是处理器,发送单元可以是发送器,接收单元可以是接收器;该网络设备还可以包括存储单元,该存储单元可以是存储器;该存储单元用于存储指令,该处理单元执行该存储单元所存储的指令,以使该网络设备实现上述第五方面或第五方面的各种可能的实现方式中的功能。当该装置是网络设备内的芯片时,该处理单元可以是处理器,该收发单元可以是输入/输出接口、管脚或电路等;该处理单元执行存储单元所存储的指令,以使该网络设备实现上述第五方面或第五方面的各种可能的实现方式中的功能,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该网络设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
第十一方面,本申请实施例提供一种包含指令的计算机程序产品,当其在第一网络设备上运行时,使得第一网络设备执行上述第一方面或第一方面的各种可能的实现方式中的方法。
第十二方面,本申请实施例提供一种包含指令的计算机程序产品,当其在第二网络设备上运行时,使得第二网络设备机执行上述第二方面或第二方面的各种可能的实现方式中的方法。
第十三方面,本申请实施例提供一种包含指令的计算机程序产品,当其在第三网络设备上运行时,使得第三网络设备执行上述第三方面或第三方面的各种可能的实现方式中的方法。
第十四方面,本申请实施例提供一种包含指令的计算机程序产品,当其在核心网设备上运行时,使得核心网设备执行上述第四方面或第四方面的各种可能的实现方式中的方法。
第十五方面,本申请实施例提供一种包含指令的计算机程序产品,当其在网络设备上运行时,使得网络设备执行上述第五方面或第五方面的各种可能的实现方式中的方法。
第十六方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在第一网络设备上运行时,使得第一网络设备执行上述第一方面或第一方面的各种可能的实现方式中的方法。
第十七方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在第二网络设备上运行时,使得第二网络设备执行上述第二方面或第二方面的各种可能的实现方式中的方法。
第十八方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在第三网络设备上运行时,使得第三网络设备执行上述第三方面或第三方面的各种可能的实现方式中的方法。
第十九方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在核心网设备上运行时,使得核心网设备执行上述第四方面或第四方面的各种可能的实现方式中的方法。
第二十方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在网络设备上运行时,使得网络设备执行上述第五方面或第五方面的各种可能的实现方式中的方法。
本申请实施例提供的上下文存储方法及装置,第一网络设备,即释放终端设备从连接态到非激活态的网络设备将终端设备的接入层上下文发送给第二网络设备,由第二网络设备存储该终端设备的接入层上下文。由于终端设备的接入层上下文不存储在 第一网络设备上,而是存储在第二网络设备上,因此,不管第一网络设备运动到多远,第三网络设备都能够从第二网络设备获得终端设备的接入层上下文,并恢复终端设备与第三网络设备之间的链路,从而提供数据传输成功率,其中,第三网络设备为为终端设备从非激活态进入连接态提供服务的网络设备。
附图说明
图1A为地面静止小区的映射方式示意图;
图1B是地面移动小区的映射方式的示意图;
图2是本申请实施例提供的一种上下文存储方法所适用的场景示意图;
图3是本申请实施例提供的一种上下文存储方法适用的终端设备的RRC状态切换示意图;
图4是本申请实施例提供的一种上下文存储方法的流程图;
图5是本申请实施例提供的另一种上下文存储方法的流程图;
图6是本申请实施例提供的又一种上下文存储方法的流程图;
图7是本申请实施例提供的又一种上下文存储方法的流程图;
图8是本申请实施例提供的又一种上下文存储方法的流程图;
图9是本申请实施例提供的一种寻呼方法的流程图;
图10为本申请实施例提供的一种上下文存储装置的结构示意图;
图11为本申请实施例提供的另一种上下文存储装置的结构示意图;
图12为本申请实施例提供的又一种上下文存储装置的结构示意图;
图13为本申请实施例提供的一种寻呼装置的结构示意图;
图14为本申请实施例提供的另一种寻呼装置的结构示意图;
图15为本申请实施例提供的又一种上下文存储装置的结构示意图;
图16为本申请实施例提供的又一种寻呼装置的结构示意图。
具体实施方式
非陆地网络被引入5G***中,它通过将基站或者部分基站功能部署在高空平台或者卫星上为UE提供无缝覆盖,并且高空平台或者卫星受自然灾害影响较小,能提升5G***的可靠性。基于卫星部署的NTN中,卫星通过调整天线形成不同波束覆盖地面,波束与小区的映射方式包括地面静止小区映射方式。图1A为地面静止小区的映射方式示意图。请参照图1A,图中粗黑实线箭头所示为卫星移动的方向,该种映射方式下,小区的地理位置相对于地面固定,移动的卫星通过调整自己的波束覆盖小区,随着卫星的运动,不同的时刻,会出现同一个小区被不同的卫星覆盖的情况。例如,T1时刻,小区1和小区2被gNB1的波束覆盖,小区3和小区4由gNB2的波束覆盖,如图中细实线所示;T2时刻,虽然gNB1和gNB2都向左移动,但是依然可以调整自己的波束,保证小区1、2、3、4的覆盖,如图中细虚线所示。T3时刻:相比T1时刻,gNB1和gNB2已经移动了足够的距离,gNB1无法通过调整波束再为小区2提供覆盖,gNB2无法通过调整波束为小区4提供覆盖。此时,gNB2可以为小区2提供覆盖,而gNB3可以为小区4提供覆盖,如图中粗黑实线所示。
基于卫星部署的NTN中,需要连接态的UE进入非激活态时,锚点基站为该UE分配I-RNTI,存储UE的接入层上下文,并向该UE发送携带I-RNTI的RRC release消息。之后,上行数据传输过程中,UE向当前基站发送RRC resume消息,以使得当前基站从锚点基站获取接入层上下文。然而,由于锚点基站随着卫星不断的运动,运动到无法与当前基站保持Xn接口的位置,使得当前基站无法获取到接入层上下文,进而使得UE无法从非激活态转换为连接态,导致上行数据传输失败。下行数据传输过程中,锚点基站向RNA区域内的基站发送寻呼消息以寻呼UE。由于锚点基站随着卫星不断的运动,使得锚点基站与RNA区域内的基站之间的距离很远,导致RNA区域内的基站无法接收到寻呼消息,进而使得锚点基站无法寻呼到UE,造成下行数据传输失败。
另外,非地面网络中,波束与小区的映射方式还包括地面移动小区映射方式。该种方式下,基站并不动态调整它的波束方向,基站生成的波束随着卫星/基站的移动在在地面上移动。示例性的,请参照图1B,图1B是地面移动小区的映射方式的示意图。请参照图1B,图中粗黑实线箭头所示为卫星移动的方向,该种映射方式下,T1时刻,地球上的某一块区域由gNB1的小区1、2和gNB2的小区3、4进行覆盖,如图中虚线所示,而在T3时刻,这块区域由gNB1的小区2、gNB2的小区3、4以及gNB3的小区5进行覆盖,如图中实线所示。上述地面移动小区映射方式中,由于小区一直在移动,导致终端设备频繁的进行无线接入网通知区域更新(RAN-based notification area update,RNAU),浪费终端设备的电量和网络的信令开销。
有鉴于此,本申请实施例提供一种上下文存储方法及装置,通过将终端设备的接入层上下文存储在核心网设备或除上述锚点网络设备的其他网络设备中,以提高数据传输可靠性。
本申请实施例提供的上下文存储方法可用于***(4th generation,4G)移动通信***(例如,长期演进(long term evolution,LTE)***、先进的长期演进***(advanced long term evolution,LTE-A))、第三代合作伙伴计划(3rd generation partnership project,3GPP)相关的蜂窝***、第五代(5th generation,5G)移动通信***以及后续演进的通信***。其中,5G还可以被称为新无线(new radio,NR)。
本申请实施例中涉及的第一网络设备、第二网络设备和第三网络设备,可以是基站,如宏基站、微基站、分散单元-控制单元(distribute unit-control unit,DU-CU),是一种部署在无线接入网中能够和终端设备进行无线通信的设备。基站可用于将收到的空中帧与互联网协议(internet protocol,IP)分组进行相互转换,作为终端设备与接入网的其余部分之间的路由器,其中接入网的其余部分可包括IP网络;基站还可协调对空中接口的属性管理。例如,基站可以是LTE中的演进型基站(evolutional Node B,eNB或e-NodeB,),也可以是NR中的gNB等。基站还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器,或者可以为中继站、接入点、车载设备、可穿戴设备或者未来演进的公共陆地移动网络(public land mobile network,PLMN)网络中的网络设备等,本申请实施例并不限定。
本申请实施例中涉及的第二网络设备,也可以是核心网设备,例如,在5G通信***中第二网络设备可以是接入与移动性管理功能(Access and Mobility Management Function,AMF)设备、会话管理功能(Session Management Function,SMF)设备、策略控制功能 (Policy Control Function,PCF)设备、应用功能(Application Function,AF)、网络切片选择功能(Network Slice Selection Function,NSSF)设备、认证服务功能(Authentication Server Function、AUSF)设备和统一数据管理(Unified Data Management,UDM)设备等;又如,在4G通信***中,第二网络设备可以是移动管理实体(Mobility Management Entity,MME)网元、服务GPRS支持节点(Serving GPRS Support Node,SGSN)网元、分组数据网关(Packet Data Network Gateway)等。在其他通信***中核心网设备为类似于AMF设备或MME的设备。
本申请实施例中涉及的终端设备,可以是向用户提供语音和/或数据连通性的设备,具有无线连接功能的手持式设备、或连接到无线调制解调器的其他处理设备。终端设备可以经无线接入网(radio access network,RAN)网络设备与一个或多个核心网进行通信,终端设备可以是移动终端设备,如移动电话(或称为“蜂窝”电话)和具有移动终端设备的计算机,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据。例如,终端设备可以是个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。终端设备也可以称为***、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点(access point)、远程终端设备(remote terminal)、接入终端设备(access terminal)、用户终端设备(user terminal)、用户代理(user agent)、用户设备(user device)、或用户装备(user equipment)。
图2是本申请实施例提供的一种上下文存储方法所适用的场景示意图。请参照图2,网络设备和终端设备1~终端设备6组成一个通信***,该通信***中,终端设备1~终端设备6中的任意终端设备可以向网络设备1发送上行数据或接收网络设备1发送的下行数据。此外,终端设备4~终端设备6也可以组成一个通信***,该通信***中,终端设备4或终端设备6可以向终端设备5发送上行数据,或者接收终端设备5发送的下行数据。网络设备2和终端设备7~终端设备9也可以组成一个通信***,终端设备7~终端设备9可以向网络设备2发送上行数据或者接收网络设备2发送的下行数据。网络设备1与核心网设备连接,网络设备2通过卫星观测站等与核心网设备连接。
本申请实施例所述的终端设备可以是UE1~UE9中的任意一个终端设备,第一网络设备可以是为UE1~UE6提供服务的网络设备,也可以是为UE7~UE9提供服务的网络设备,第二网络设备可以为核心网设备,或者,第二网络设备与第一网络设备为不同的接入网网络设备,第三网络设备可以是为为非连接态的终端设备提供服务的网络设备,该第三网络设备和第一网络设备可以为不同的网络设备,该第三网络设备和第二网络设备可以为相同的接入网网络设备。
图3是本申请实施例提供的一种上下文存储方法适用的终端设备的RRC状态切换示 意图。如图3所示,终端设备的RRC状态包括连接态(connected)、非激活状(inactive)态和空闲(idle)态。UE处于连接态时,UE与网络设备之间建立链路,网络设备和核心网之间也存在针对该UE的链路;UE处于非激活态时,网络设备和核心网之间针对该UE的链路没有断开,但是UE与网络设备之间的链路被释放(release),网络设备存储该UE的接入层上下文,使得有数据需要传输时,网络设备可以恢复网络设备与UE之间的链路;UE处于空闲态时,UE与网络设备之间的链路、网络设备和核心网之间针对该UE的链路均被释放。
下面,基于上述图2和图3的讲解,对本申请实施例所述的上下文存储方法进行详细说明。示例性的,可参见图4。
图4是本申请实施例提供的一种上下文存储方法的流程图。本实施例是第一网络设备、第二网络设备和第三网络设备交互的角度,对本申请实施例所述的上下文存储方法进行详细说明。本实施例包括:
101、第一网络设备向第二网络设备发送终端设备的接入层上下文和所述终端设备的标识。
相应的,第二网络设备接收第一网络设备发送的终端设备的接入层上下文和所述终端设备的标识。
其中,第一网络设备为释放所述终端设备从连接态到非激活态的网络设备。该第一网络设备为终端设备分配标识,如I-RNTI,并以此标识存储终端设备的接入层上下文,该第一网络设备也称之为终端设备的锚点网络设备。
本步骤中,为了使得终端设备从连接态进入非激活态,第一网络设备向连接态的终端设备发送RRC释放(release)消息,并向第二网络设备发送该终端设备的接入层上下文和该终端设备的标识。终端设备接收到RRC release消息后,从连接态进入非激活态。其中,第二网络设备可以是接入网网络设备,也可以是核心网设备,本申请实施例并不限制。终端设备的标识可以是第一网络设备为终端设备分配的非激活态无线网络临时标识(inactive-radio network temporary identifier,RNTI)、终端设备的国际移动用户识别码(international mobile subscriber identification number,IMSI)等。
102、第二网络设备存储所述终端设备的接入层上下文和所述终端设备的标识。
本步骤中,第二网络设备存储接收到的终端设备的接入层上下文、终端设备的标识以及终端设备的接入层上下文和标识的对应关系。
本申请实施例提供的上下文存储方法,第一网络设备,即释放终端设备从连接态到非激活态的网络设备将终端设备的接入层上下文发送给第二网络设备,由第二网络设备存储该终端设备的接入层上下文。由于终端设备的接入层上下文不存储在第一网络设备上,而是存储在第二网络设备上,因此,不管第一网络设备运动到多远,第三网络设备都能够从第二网络设备获得终端设备的接入层上下文,并恢复终端设备与第三网络设备之间的链路,从而提供数据传输成功率,其中,第三网络设备为为终端设备从非激活态进入连接态提供服务的网络设备。
图5是本申请实施例提供的另一种上下文存储方法的流程图。本实施例是从终端设备的接入层上下文存储在第二网络设备之后,第三网络设备,即为终端设备从激活 态进入连接态提供服务的网络设备如何获取到终端设备的接入层上下文的角度,对本申请实施例所述的上下文存储方法进行详细说明。本实施例包括:
201、第三网络设备接收非激活态的终端设备发送的携带所述终端设备的标识的第九请求消息。
其中,所述第九请求消息用于请求恢复所述终端设备与网络设备之间的链路。
本步骤中,当终端设备需要发送上行数据或接收下行数据时,向当前基站,即第三网络设备发送RRC恢复(resume)消息,该RRC resume消息也称之为第九请求消息,以在终端设备与第三网络设备之间建立链路。
202、所述第三网络设备向第二网络设备发送携带所述终端设备的标识的第一请求消息。
其中,所述第二网络设备是存储所述终端设备的接入层上下文的网络设备;
本步骤中,第三网络设备向存储有终端设备的接入层上下文的第二网络设备发送第一请求消息,相应的,第二终端设备接收该第一请求消息,并根据终端设备的标识,确定出该终端设备的接入层上下文。
203、所述第三网络设备接收所述第二网络设备发送的第一响应消息。
其中,所述第一响应消息携带所述终端设备的接入层上下文。
本步骤中,第二网络设备向第三网络设备发送第一响应消息,相应的,第三网络设备接收该第一响应消息。
本申请实施例提供的上下文存储方法,终端设备的接入层上下文存储在第二网络设备上,为终端设备从激活态进入连接态提供服务的网络设备,即第三网络设备接收到终端设备发送的RRC resume消息后,从第二网络设备获取终端设备的接入层上下文,并建立终端设备与第三网络设备之间的链路,从而提高数据传输成功率。
下面,对本申请实施例所述的上下文存储方法进行详细说明。示例性的,可参见图6~图8。
图6是本申请实施例提供的又一种上下文存储方法的流程图。本实施例中,终端设备的接入层的上下文存储在核心网设备,即第二网络设备为核心网设备,而且,核心网设备与第一网络设备之前针对终端设备的逻辑接口被释放,直到终端设备从非激活态进入连接态时,在第三网络设备和核心网设备之间建立针对终端设备的逻辑接口。本实施中,第一网络设备也可称之为锚点基站、第二网络设备例如为AMF设备,第三网络设备也称之为目标(target)基站,本实施例包括:
301、第一网络设备向终端设备发送RRC release消息。
本步骤中,第一网络设备向连接态的终端设备发送RRC release消息。该RRC release消息中包括终端设备的标识、网络色码(network color code,NCC)或无线接入网通知区域(RAN-based notification area,RNA信息。其中,终端设备的标识可以是第一网络设备为该终端设备分配的I-RNTI、终端设备的IMSI等。RNA信息可以是一个或多个RNA标识,一个RNA标识指示一个小区集合,该小区集合中的小区对应的基站之间存在Xn接口,也可以不存在Xn接口;或者,RNA信息也可以是一个小区列表;或者,RNA信息也可以是一个指示信息,用于指示终端设备的接入层上下文存储在核心网设备,终端设备无需做无线接入网通知区域更新(RAN-based  notification area update,RNAU)。由于RNA信息指示一个区域,下面称之为目标区域,该目标区域内的网络设备不局限于相互存在Xn接口的网络设备,因此,本申请实施例应用于非陆地网络中时,若采用地面移动小区的映射方式,则由于RNA信息指示的区域较大,终端设备无需频繁进行RNAU,节约电量的同时减少信令开销。
连接态的终端设备接收到该RRC release消息后,首先通过检验完整性消息认证码(message authentication code for integrity,MAC-I)来验证RRC release消息的完整性是否正确。若通过验证,则终端设备将存储该终端设备的接入层上下文和NCC,删除接入层密钥K_RRCenc、K_Upenc、K_UPint,保留K_RRCint。如果终端设备存储的NCC和当前的K_gNB无关,则删除当前的K_gNB,如果一致,则保留当前的K_gNB。
302、第一网络设备对终端设备的接入层安全信息进行处理。
本申请实施例中,接入层安全信息包括接入层密钥K_RRCenc、K_Upenc、K_UPint、K_RRCint等。本步骤中,第一网络设备删除终端设备的接入层密钥K_RRCenc、K_Upenc、K_UPint,保留K_RRCint。
303、第一网络设备向第二网络设备发送接入层安全信息、终端设备的接入层上下文、终端设备的标识、RNA信息。
相应的,第二网络设备存储终端设备的接入层上下文、终端设备的标识、RNA信息等。
若上述步骤301中的NCC是一个新的NCC,即该NCC和当前的密钥K_gNB没有关系,属于一个没有使用过的{NCC,NH}对,则第一网络设备将接入层安全信息、终端设备的标识、终端设备的接入层上下文发送给第二网络设备,并且删除密钥K_gNB。其中,NH(next hop)为下一条,接入层安全信息包括{NCC,NH}对、K_RRCint等。其中,NCC对应的NH可用于推导K_gNB。相应的,第二网络设备存储该接入层安全信息。
若上述步骤301中的NCC是一个和当前的密钥K_gNB关联,则第一网络设备将接入层安全信息、终端设备的标识、终端设备的接入层上下文发送给第二网络设备。其中,接入层安全信息包括{NCC,NH}对、K_RRCint等。其中,接入层安全信息包括密钥K_gNB、NCC、K_RRCint等,K_gNB也称之为第一密钥。应的,第二网络设备存储该接入层安全信息。
304、第一网络设备或第二网络设备发起释放(release)操作,释放第一网络设备和第二网络设备之间针对终端设备的逻辑接口。
例如,所述第二网络设备接收所述第一网络设备发送的第二请求消息,并根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。再如,第二网络设备向所述第一网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。
305、第二网络设备在RNA信息指示的区域内发起RNA寻呼消息。
本步骤中,需要终端设备接收下行数据时,第二网络设备根据RNA信息确定目标区域,该目标区域是终端设备所在的区域,第二网络设备向目标区域内的网络设备发送携带终端设备的标识的第八请求消息,以请求目标区域内的网络设备寻呼终端设 备。其中,终端设备的标识例如为上述步骤301中第一网络设备向终端设备发送RRC Release消息时,为该终端设备分配的I-RNTI。
需要说明的是,上述步骤305为可选步骤。
306、终端设备向第三网络设备发送RRC Resume消息。
本步骤中,当非激活态的终端设备需要发送上行数据时,或者,若执行了上述步骤305,即终端设备需要响应RNA寻呼时,非激活态的终端设备向第三网络设备发送携带该终端设备的标识的第九请求消息,即RRC resume消息,该第九请求消息用于请求恢复所述终端设备的无线资源控制RRC连接。该RRC resume消息还携带第一MAC-I,该第一MAC-I可以为一个短(short)MAC-I,short MAC-I例如是一个16比特的认证消息,终端设备可根据在第一网络设备的源小区工作时的小区无线网络临时标识(cell radio network temporary identifier,C-RNTI)、源小区的物理小区标识(physical cell identifier,PCI)以及当前小区的小区身份标识(identity,ID)作为输入,并将包括K_RRCint在内的其他参数作为完保算法的输入,计算出short MAC-I。
307、第三网络设备向第二网络设备发送携带终端设备的标识的第一请求消息。
本申请实施例中,第二网络设备是存储终端设备的接入层上下文的网络设备。本步骤中,第三网络设备向第二网络设备发送携带终端设备的标识的第一请求消息。可选的,该第一请求消息还可携带第一MAC-I。
308、第二网络设备确定所述第一MAC-I与所述第二MAC-I相同。
本步骤中,第二网络设备根据终端设备的标识I-RNTI,确定出终端设备的接入层上下文。
可选的,若第一请求消息还携带第一MAC-I,则第二网络设备还根据终端设备的接入层上下文中的完保算法,确定出第二MAC-I,与步骤306中的计算方法相同。然后,第二网络设备判断第一MAC-I和第二MAC-I是否相同,若第一MAC-I和第二MAC-I相同,则第二网络设备利用第三网络设备的小区ID、第三网络设备的目标小区的载频以及存储的K_gNB或NCC指示的NH推导出第二密钥,即新的K_gNB,并执行步骤309,若第一MAC-I和第二MAC-I不相同,则第二网络设备不做处理,即不向第三网络设备返回终端设备的接入层上下文。
与此同时,此外,UE也将根据所存信息推导出新的K_gNB。
309、第二网络设备向第三网络设备发送第一响应消息,该第一响应消息携带终端设备的接入层上下文。
可选的,若步骤308中,第二网络设备推导出第二密钥,则该第一响应消息还携带第二密钥以及该第二密钥相关的NCC,即第一响应消息还携带新的K_gNB以及和该新的K_gNB相关的NCC。
310、第二网络设备与第三网络设备为终端设备建立针对该终端设备的逻辑接口。
例如,所述第二网络设备向所述第三网络设备发送第三请求消息,以请求在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口;
再如,所述第二网络设备接收所述第三网络设备发送的第三请求消息,根据所述 第三请求消息在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口。
311、第三网络设备向终端设备发送RRC resume消息。
本步骤中,第三网络设备向终端设备发送RRC resume消息,以建立该终端设备与第三网络设备之间的链路。
本实施例中,将终端设备的接入层上下文存储在第二网络设备,即核心网设备,MAC-I的验证和第二密钥的推导由核心网设备完成,RNA寻呼由核心网设备发起,而且,接入网网络设备与核心网设备之间针对终端设备的逻辑接口并不一致存在,由于任意接入网网络设备均可以与核心网设备通信,因此,需要非激活态的终端设备进入连接态时,第三网络设备,即为终端设备从非激活态恢复到连接态提供服务的网络设备可以从核心网设备获取到终端设备的接入层上下文,以在第三网络设备与第二网络设备之间建立针对终端设备的逻辑接口,从而提高数据传输成功率。同时,RNA信息指示的目标区域内的网络设备之间可以不具有Xn接口,使得目标区域不再局限于具有Xn接口的网络设备。
图7是本申请实施例提供的又一种上下文存储方法的流程图。本实施例中,终端设备的接入层的上下文存储在核心网设备,即第二网络设备为核心网设备,第一网络设备也可称之为锚点基站、第二网络设备例如为AMF设备,第三网络设备也称之为目标(target)基站。本实施例与上述图6实施例的区别在于,本实施例中,接入网网络设备与核心网设备之间针对终端设备的逻辑接口并没有被释放,而是处于不断切换状态,例如,终端设备的逻辑接口原本建立在第一网络设备与第二网络设备之间,之后,终端设备的逻辑接口切换到第四网络设备与核心网设备之间。本实施例包括:
401、第一网络设备向终端设备发送RRC release消息。
详细描述可参见上述步骤301,此处不再赘述。
402、第一网络设备对终端设备的接入层安全信息进行处理。
详细描述可参见上述步骤302,此处不再赘述。
403、第一网络设备向第二网络设备发送接入层安全信息、终端设备的接入层上下文、终端设备的标识、RNA信息。
详细描述可参见上述步骤303,此处不再赘述。
404、第一网络设备向第二网络设备发送第四请求消息。
其中,第四请求消息请求将针对所述终端设备的第一逻辑接口切换为第二逻辑接口,所述第一逻辑接口为所述第一网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第二逻辑接口为所述第四网络设备与所述第二网设备之间针对所述终端设备的逻辑接口,所述第四网络设备为所述终端设备从非激活态到连接态之前,与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备。
405、第二网络设备向第一网络设备发送响应消息。
406、第二网络设备向第四网络设备发送第五请求消息。
所述第五请求消息用于请求在所述第四网络设备与所述第二网设备之间针对所述终端设备建立所述第二逻辑接口。
上述步骤404~406,实现将终端设备的第一逻辑接口切换为第二逻辑接口的目 的。
上述步骤404~406中,是第一网络设备主动发起逻辑接口切换,然而,本申请实施例并不限制,在其他可行的实现方式中,也可是第四网络设备主动发起逻辑切换,此时,所述第二网络设备接收第四网络设备发送的第五请求消息,根据所述第五请求消息,在所述第四网络设备与所述第二网设备之间针对所述终端设备建立所述第二逻辑接口,所述第二网络设备向所述第四网络设备发送响应消息。
可选的,逻辑接口切换完毕后,第二网络设备将RNA信息发送给第四网络设备。
407、第四网络设备在RNA信息指示的区域内发起RNA寻呼消息。
本步骤中,需要终端设备接收下行数据时,或者,若步骤401中RRC release消息携带了RNA信息,且步骤406中第二网络设备将该RNA信息发送给至第四网络设备,该RNA信息指示了一个目标区域,则第四网络设备根据RNA信息确定目标区域,该目标区域是终端设备所在的区域,第四网络设备向目标区域内的网络设备发送携带终端设备的标识的第八请求消息,以请求目标区域内的网络设备寻呼终端设备。
需要说明的是,上述步骤407为可选步骤。
408、终端设备向第三网络设备发送RRC Resume消息。
详细描述可参见上述步骤306,此处不再赘述。
409、第三网络设备向第二网络设备发送携带终端设备的标识的第一请求消息。
详细描述可参见上述步骤307,此处不再赘述。
410、第二网络设备确定所述第一MAC-I与所述第二MAC-I相同。
详细描述可参见上述步骤308,此处不再赘述。
411、第二网络设备向第三网络设备发送第一响应消息,该第一响应消息携带终端设备的接入层上下文。
详细描述可参见上述步骤309,此处不再赘述。
412、第四网络设备向第二网络设备发送第六请求消息。
所述第六请求消息用于请求将针对所述终端设备的第二逻辑接口切换为第五逻辑接口,所述第二逻辑接口为所述第四网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第五逻辑接口为第三网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口。
相应的,第二网络设备接收所述第四网络设备发送的第五请求消息。
413、第二网络设备向所述第四网络设备发送响应消息。
414、第二网络设备向第三网络设备发送第七请求消息,
其中,所述第七请求消息用于请求在所述第三网络设备和所述第二网络设备之间建立针对所述终端设备建立所述第五逻辑接口,所述第二逻辑接口为所述第四网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第五逻辑接口为第三网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备
上述步骤412~414,实现将终端设备的第二逻辑接口切换为第五逻辑接口的目 的。
上述步骤412~414中,是第四网络设备主动发起逻辑接口切换,然而,本申请实施例并不限制,在其他可行的实现方式中,也可是第三网络设备主动发起逻辑切换,此时,所述第二网络设备接收所述第三网络设备发送的第七请求消息,根据所述第七请求消息在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,向所述第三网络设备发送响应消息。
需要说明的是,终端设备从非激活态进入连接态之前,接入网网络设备与核心网设备之间针对终端设备的逻辑接口发生动态变化,即从第一网络设备—核心网设备之间、切换为第四网络设备-核心网设备之间、继续切换为第四′网络设备之间……,最终,终端设备从非激活态进入连接态后,第三网络设备与核心网设备之间针对终端设备的逻辑接口。因此,上述步骤404~406中的第四网络设备与步骤412~414中的第四网络设备,可以是相同或不同的网络设备。
415、第三网络设备向终端设备发送RRC resume消息。
详细描述可参见上述步骤311,此处不再赘述。
本实施例中,将终端设备的接入层上下文存储在第二网络设备,即核心网设备,MAC-I的验证和第二密钥的推导由核心网设备完成,RNA寻呼有核心网设备发起,而且,接入网网络设备与核心网设备之间针对终端设备的逻辑接口动态变化,由于任意接入网网络设备均可以与核心网设备通信,因此,需要非激活态的终端设备进入连接态时,第三网络设备,即为终端设备从非激活态恢复到连接态提供服务的网络设备可以从核心网设备获取到终端设备的接入层上下文,并将第四网络设备与第二网络设备之间针对终端设备的逻辑接口切换到第三网络设备与第二网络设备之间,从而提高数据传输成功率。同时,RNA信息指示的目标区域内的网络设备之间可以不具有Xn接口,使得目标区域不再局限于具有Xn接口的网络设备。
图8是本申请实施例提供的又一种上下文存储方法的流程图。本实施例中,终端设备的接入层的上下文存储在接入网网络设备,即第二网络设备为接入网网络设备,而且终端设备的接入层上下文动态转移,例如,终端设备的接入层上下文最初由第一网络设备发送给第二网络设备,由第二网络设备存储,然后,第二网络设备将终端设备的接入层上下文发送给第五网络设备,由第五网络设备存储,第五网络设备将终端的接入层上下文发送给第五′网络设备……。本实施例中,第一网络设备也可称之为锚点基站、第二网络设备为接入网网络设备,第三网络设备也称之为目标(target)基站,也是接入网网络设备。相较于现有技术,本实施例中,终端设备的接入层上下文存储在接入网网络设备,而且,随着接入网网络设备的移动,该存储接入层上下文的接入层网络设备不断的变化,从而保证即使接入层网络设备发生移动,但是当前网络设备(即第三网络设备)时钟与存储终端设备的接入层上下文的接入层网络设备之间保持Xn接口,且存储终端设备的接入层上下文的接入层网络设备与核心网设备之间保持针对终端设备的逻辑接口。例如,终端设备的逻辑接口原本建立在第一网络设备与核心网设备之间,之后,终端设备的逻辑接口切换到第五网络设备与核心网设备之间……。本实施例包括:
501、第一网络设备向终端设备发送RRC release消息。
详细描述可参见上述步骤301,此处不再赘述。
502、第一网络设备对终端设备的接入层安全信息进行处理。
详细描述可参见上述步骤302,此处不再赘述。
503、第一网络设备向第二网络设备发送接入层安全信息、终端设备的接入层上下文、终端设备的标识、RNA信息。
与上述步骤303的不同之处在于,上述步骤303中第二网络设备为核心网设备,本步骤中,第二网络设备为接入网网络设备。
本步骤中,当满足一定条件,例如,按照卫星移动轨迹,第二网络设备将覆盖第一网络设备原来服务的小区时,第一网络设备向第二网络设备发送接入层安全信息、终端设备的接入层上下文、终端设备的标识、RNA信息,并删除自己存储的该些内容。
504、第一网络设备向核心网设备发送第四请求消息。
所述第四请求消息用于请求将针对所述终端设备的第三逻辑接口切换为第四逻辑接口,所述第五请求消息用于请求在所述第二网络设备与所述核心网网设备之间针对所述终端设备建立所述第四逻辑接口,所述第三逻辑接口为所述第一网络设备与所述核心网设备之间针对所述终端设备的逻辑接口,所述第四逻辑接口为所述第二网络设备与所述核心网设备之间针对所述终端设备的逻辑接口。
505、核心网设备向第一网络设备发送响应消息。
506、核心网络设备向第二网络设备发送第五请求消息。
上述步骤504~506,实现将终端设备的第三逻辑接口切换为第四逻辑接口的目的。
上述步骤504~506中,是第一网络设备主动发起逻辑接口切换,然而,本申请实施例并不限制,在其他可行的实现方式中,也可是第二网络设备主动发起逻辑切换,此时,所述第二网络设备向核心网设备发送第五请求消息,所述第五请求消息用于请求在所述第二网络设备和所述核心网设备之间针对所述终端设备建立第四逻辑接口,所述第二网络设备接收所述核心网设备发送的响应消息。
可选的,逻辑接口切换完毕后,第一网络设备将RNA信息发送给第二网络设备。
507、第二网络设备向第五网络设备发送所述终端设备的接入层上下文和所述终端设备的标识。
其中,所述第五网络设备为所述终端设备从非激活态到连接态之前,存储所述接入层上下文且与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备。
需要说明的是,随着第二网络设备的移动,当满足一定条件时,例如,原本由第二网络设备覆盖的小区被第五网络设备覆盖,则第二网络设备向第五网络设备发送终端设备的接入层上下文和所述终端设备的标识,针对终端设备的第四逻辑接口切换为第四′逻辑接口;同理,当满足一定条件时,例如,原本由第五网络设备覆盖的小区被第五′网络设备覆盖,则第五网络设备向′第五网络设备发送终端设备的接入层上下文和所述终端设备的标识,针对终端设备的第四′逻辑接口切换为第四′′逻辑接口。
需要说明的是,若第二网络设备的移动距离并没有满足预设条件,则终端设备的接入层上下文继续存储在第二网络设备。
508、第二网络设备在RNA信息指示的区域内发起RNA寻呼消息。
若未执行上述步骤507,即终端设备不需要响应RNA寻呼时,由第二网络设备在RNA信息指示的区域内发起RNA寻呼消息。
若执行了上述步骤507,即终端设备需要响应RNA寻呼时,由第五网络设备在RNA信息指示的区域内发起RNA寻呼消息。
509、终端设备向第三网络设备发送RRC Resume消息。
详细描述可参见上述步骤306,此处不再赘述。
510、第三网络设备向第二网络设备发送携带终端设备的标识的第一请求消息。
详细描述可参见上述步骤307,此处不再赘述。
需要说明的是,若执行了上述步骤507,则第三网络设备向第五网络设备发送携带终端设备的标识的第一请求消息。
511、第二网络设备确定所述第一MAC-I与所述第二MAC-I相同。
与上述步骤308的不同之处在于,本步骤中,第二网络设备为接入网网络设备,步骤308中的第二网络设备为核心网设备。
512、第二网络设备向第三网络设备发送第一响应消息,该第一响应消息携带终端设备的接入层上下文。
详细描述可参见上述步骤309,此处不再赘述。
513、第二网络设备向核心网设备发送第六请求消息。
所述第六请求消息用于请求将针对所述终端设备的第四逻辑接口切换为第五逻辑接口。
514、第二网络设备接收核心网设备发送的响应消息。
515、核心网设备向第三网络设备发送第七请求消息,
其中,所述第七请求消息用于请求在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,所述第四逻辑接口为所述第二网络设备与所述核心网设备之间针对所述终端设备的逻辑接口,所述第五逻辑接口为第三网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备。
上述步骤513~515,实现将终端设备的第四逻辑接口切换为第五逻辑接口的目的。
上述步骤513~515中,是第二网络设备发起逻辑接口切换,然而,本申请实施例并不限制,在其他可行的实现方式中,也可是第三网络设备主动发起逻辑切换,此时,第三网络设备向核心网设备发送第七请求消息,所述第七请求消息用于请求在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,所述第三网络设备接收所述核心网设备发送的响应消息。
需要说明的是,若执行了上述步骤207,则终端设备从非激活态进入连接态之前,接入网网络设备与核心网设备之间针对终端设备的逻辑接口发生动态变化,即从第一网络设备—核心网设备之间、切换为第二网络设备-核心网设备之间、继续切换 为第五网络设备-核心网设备之间、继续切换为第五′网络设备与核心网设备之间……,最终,终端设备从非激活态进入连接态后,第三网络设备与核心网设备之间针对终端设备的逻辑接口。
516、第三网络设备向终端设备发送RRC resume消息。
详细描述可参见上述步骤311,此处不再赘述。
本实施例中,将终端设备的接入层上下文存储在第二网络设备,即接入网网络设备,MAC-I的验证和第二密钥的推导由存储终端设备的接入层上下文的接入网网络设备完成,,而且,接入网网络设备与核心网设备之间针对终端设备的逻辑接口动态变化,需要非激活态的终端设备进入连接态时,第三网络设备,即为终端设备从非激活态恢复到连接态提供服务的网络设备可以从接入网网络设备获取到终端设备的接入层上下文,并将第二网络设备与核心网设备之间针对终端设备的逻辑接口切换到第三网络设备与核心网设备之间,从而提高数据传输成功率。
另外,在传统蜂窝网络中,为了确定终端设备在任何时候是可到达的,引入了基于跟踪区列表(tracking list,TA)的寻呼机制,一个TA列表包含多个TA ID,每个TA ID指示一个小区集合,即一个TA ID对应多个小区ID(cell ID),不同小区对应的网络设备可以相同或不同。例如,TA列表包含TA1,TA1对应小区1、小区2和小区3,小区1、小区2和小区3对应的网络设备可以相同或不同。而且,一个TA ID指示的地理区域是相对固定的。终端设备在进行注册或者TA更新的时候,核心网会发给终端设备一个TA列表,如果终端设备在此TA列表区域内进行移动时,终端设备不需要做TA的更新,且当此终端设备的数据到达后,核心网会在此TA列表区域内寻呼此终端设备。为了方便终端设备判断自己是否还处于TA列表内,在每个小区的***广播中,会广播当前小区的TA标号,如果终端设备发现此TA标号不在核心网发给自己的TA列表中,终端设备就进行TA更新。该基于TA list的寻呼机制应用于非陆地网络时,若采用地面静止小区映射方式,小区的地理位置固定,同一个TA ID指示的地理区域固定,但是由于网络设备一直在移动,不同时刻,同一个网络设备对应的小区不同,或者说,不同时刻,为同一个小区提供服务的网络设备不同,导致核心网设备无法根据TA list寻呼到终端设备。若采用地面移动小区映射方式,由于网络设备一直在移动,小区的地理位置变化,虽然网络设备和小区的映射关系是固定的,但是不同时刻,小区对应的地理位置变化了,同样会导致核心网设备无法寻呼到终端设备。
有鉴于此,本申请实施例还提供一种寻呼方法,以避免基于TA list的寻呼机制中,由于网络设备一直移动,核心网设备无法确定出需要向哪网络设备进而无法寻呼消息从而无法寻呼到终端设备的弊端。
图9是本申请实施例提供的一种寻呼方法的流程图。本实施例是以核心网设备、终端设备交互的角度,对本申请实施例所述的寻呼方法进行详细说明。本实施例包括:
601、核心网设备为终端设备分配跟踪区列表。
其中,所述跟踪区列表包含第一跟踪区标识,所述第一跟踪区标识指示第一小区 集合,所述第一小区集合中的第一小区由第一网络设备提供覆盖,或者,所述第一小区对应第一跟踪区标识。
本步骤中,终端设备向核心网设备注册时,核心网设备为该终端设备分配一个跟踪区列表(TA list),记为跟踪区列表,该跟踪区列表包含多个跟踪区标识,第一跟踪区标识是该些跟踪区标识中的任意一个,每个跟踪区标识对应的跟踪区用于指示一个小区集合,第一小区集合是该些小区集合中的任意一个小区集合,第一小区是第一小区集合中的任意一个小区。
对于地面静止小区映射方式,第一小区的地理位置是固定的,但是不同时刻,为该第一小区提供覆盖的网络设备不同。假设核心网设备一开始为终端设备分配的TA list中,第一小区由第一网络设备提供覆盖。第一跟踪区标识是多个跟踪区标识中的任意一个跟踪,该第一跟踪区指示第一小区集合。
对于地面移动小区映射方式,为第一小区提供服务的网络设备是固定的,但是不同时刻,该第一小区对应的地理位置是变化的。为了保证TA ID指示的地理区域固定,需要改动TA ID与小区ID的对应关系。例如,T1时刻,第一跟踪区标识指示的小区包含第一小区,T2时刻,该第一小区对应的地理位置被第二小区覆盖,则第一跟踪区标识包含的第二小区。
602、核心网设备接收第一网络设备发送的关联信息。
其中,对于地面静止小区映射方式,该关联信息用于指示第一小区由第二网络设备提供覆盖,例如,初始的TA list中映射关系包含TA1-小区1-gNB1,则关联关系中,TA1-小区1-gNB2,说明TA1中的小区1由gNB1提供覆盖切换为由gNB2提供覆盖;对于地面移动小区映射方式,该关联信息用于指示第一跟踪区标识包含的第一小区变更为第二小区例如,初始的TA list中映射关系包含TA1-小区1-gNB1,则关联关系中,TA1-小区2-gNB2,小区1和小区2对应的地理区域相同,但是gNB1和gNB2为不同的网络设备。
本申请实施例中,对于地面静止小区映射方式,若为第一小区提供服务的网络设备由第一网络设备变更为第二网络设备,则第一网络设备或第二网络设备向核心网设备发送关联信息;或者,第一网络设备提供服务的小区中的至少一个小区发生变化,例如,T1时刻,第一网络设备为小区1、2、3提供服务,T2时刻,第一网络设备为小区1、2、4提供服务,则第一网络设备向核心网设备发送关联信息。
603、核心网设备根据所述关联信息更新所述跟踪区列表。
本步骤中,核心网设备接收到关联信息后,利用该关联信息更新跟踪区列表。继续沿用上述步骤602中的例子,对于地面静止小区映射方式,更新之前,跟踪区列表中,存在如下关系:TA1-小区1-gNB1;更新后,TA1-小区1-gNB2;对于地面移动小区映射方式,更新之前,TA list中映射关系包含TA1-小区1-gNB1,更新之后,TA list中映射关系包含TA1-小区2-gNB2。
604、核心网设备根据更新后的跟踪区列表寻呼终端设备。
当终端设备的数据到达核心网时时,核心网设备根据更新后的跟踪区列表,确定出应该发送寻呼消息到哪些网络设备从而实现寻呼终端设备的目的。
需要说明的是,图中604箭头从核心网设备指向终端设备,仅仅是表示核心网设 备寻呼终端设备,并不表示核心网设备向终端设备发送寻呼等。
本申请实施例中,对于地面静止小区映射方式,当为第一小区提供服务的网络设备发生变化时,网络设备向核心网设备发送关联信息,该关联信息用于指示为第一小区提供服务的网络设备由第一网络设备切换为第二网络设备;对于地面移动小区映射方式,当第一跟踪区标识对应的第一小区变更为第二小区时,网络设备向核心网设备发送关联关系,指示第一跟踪区标识对应的第一小区变更为第二小区,使得核心网根据关联关系更新跟踪区列表,后续需要寻呼终端设备时,根据更新后的跟踪区列表确定出应该发送寻呼消息到哪些网络设备从而寻实现寻呼终端设备的目的。
图10为本申请实施例提供的一种上下文存储装置的结构示意图。本实施例所涉及的上下文存储装置可以为第一网络设备,也可以为应用于第一网络设备的芯片。该上下文存储装置可以用于执行上述实施例中第一网络设备的功能。如图10所示,该上下文存储装置100可以包括:
发送单元11,用于向第二网络设备发送终端设备的接入层上下文和所述终端设备的标识,用于使得所述第二网络设备存储所述终端设备的接入层上下文和所述终端设备的标识,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备。
一种可行的设计中,所述发送单元11,还用于向所述第二网络设备发送接入层安全信息,所述接入层安全信息包括第一密钥。
一种可行的设计中,所述发送单元11,还用于向所述第二网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口;
或者,
所述装置100还包括:接收单元13和处理单元12,所述接收单元13用于接收所述第二网络设备发送的第二请求消息,所述处理单元12,用于根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。
一种可行的设计中,所述发送单元11,还用于向所述第二网络设备发送第四请求消息,所述第四请求消息用于请求将针对所述终端设备的第一逻辑接口切换为第二逻辑接口,所述第一逻辑接口为所述第一网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第二逻辑接口为第四网络设备与所述第二网设备之间针对所述终端设备的逻辑接口,所述第四网络设备为所述终端设备从非激活态到连接态之前,与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备;
所述接收单元13,用于接收所述第二网络设备发送的响应消息。
一种可行的设计中,所述发送单元11,还用于向核心网设备发送第六请求消息,所述第六请求消息用于请求将针对所述终端设备的第三逻辑接口切换为第四逻辑接口,所述第三逻辑接口为所述第一网络设备与所述核心网设备之间针对所述终端设备的逻辑接口,所述第四逻辑接口为所述第二网络设备与所述核心网设备之间针对所述终端设备的逻辑接口;
所述接收单元13,用于接收所述核心网设备发送的响应消息。
一种可行的设计中,所述第一网络设备和所述第二网络设备为接入网网络设备。
一种可行的设计中,所述第一网络设备为接入网网络设备,所述第二网络设备为核心网设备。
本申请实施例提供的上下文存储装置,可以执行上述实施例中第一网络设备的动作,其实现原理和技术效果类似,在此不再赘述。
图11为本申请实施例提供的另一种上下文存储装置的结构示意图。本实施例所涉及的上下文存储装置可以为第二网络设备,也可以为应用于第二网络设备的芯片。该上下文存储装置可以用于执行上述实施例中第二网络设备的功能。如图11所示,该上下文存储装置200可以包括:
接收单元21,用于接收第一网络设备发送的终端设备的接入层上下文和所述终端设备的标识,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备;
存储单元22,用于存储所述终端设备的接入层上下文和所述终端设备的标识。
一种可行的设计中,所述接收单元21,还用于接收所述第一网络设备发送的接入层安全信息,所述接入层安全信息包括第一密钥。
一种可行的设计中,上述的装置200还包括:发送单元23;
所述接收单元21,还用于接收第三网络设备发送的携带所述终端设备的标识的第一请求消息,所述第一请求消息用于请求所述终端设备的接入层上下文,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;
所述发送单元23,用于向所述第三网络设备发送第一响应消息,所述第一响应消息携带所述终端设备的接入层上下文和第二密钥,所述第二密钥是所述第二网络设备根据所述第一密钥生成的密钥。
一种可行的设计中,所述第一请求消息还携带第一完整性消息认证码MAC-I,所述装置200还包括:处理单元24;
所述处理单元24,用于在所述发送单元23向所述第三网络设备发送第一响应消息之前,确定第二MAC-I,确定所述第一MAC-I与所述第二MAC-I相同。
一种可行的设计中,所述接收单元21,还用于接收所述第一网络设备发送的第二请求消息,所述处理单元24,用于根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口;
或者,
所述发送单元23,用于向所述第一网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。
一种可行的设计中,所述发送单元23,用于向所述第三网络设备发送第三请求消息,以请求在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口;
或者,
所述接收单元21,还用于接收所述第三网络设备发送的第三请求消息,所述处理单元24,用于根据所述第三请求消息在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口。
一种可行的设计中,所述接收单元21用于接收所述第一网络设备发送的第四请求消息,所述第四请求消息用于请求将针对所述终端设备的第一逻辑接口切换为第二逻辑接口,所述发送单元23,用于向所述第一网络设备发送响应消息,向第四网络设备发送所述第五请求消息,所述第五请求消息用于请求在所述第四网络设备与所述第二网设备之间针对所述终端设备建立所述第二逻辑接口,所述第一逻辑接口为所述第一网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第二逻辑接口为所述第四网络设备与所述第二网设备之间针对所述终端设备的逻辑接口,所述第四网络设备为所述终端设备从非激活态到连接态之前,与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备;
或者,
所述接收单元21,还用于接收第四网络设备发送的第五请求消息,所述处理单元24,用于根据所述第五请求消息,在所述第四网络设备与所述第二网设备之间针对所述终端设备建立所述第二逻辑接口,所述第二网络设备向所述第四网络设备发送响应消息。
一种可行的设计中,所述接收单元21,还用于接收所述第四网络设备发送的第六请求消息,所述第六请求消息用于请求将针对所述终端设备的第二逻辑接口切换为第五逻辑接口,所述发送单元23,用于向所述第四网络设备发送响应消息,所述第二网络设备向第三网络设备发送第七请求消息,所述第七请求消息用于请求在所述第三网络设备和所述第二网络设备之间建立针对所述终端设备建立所述第五逻辑接口,所述第二逻辑接口为所述第四网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;
或者,
所述接收单元21,还用于接收所述第三网络设备发送的第七请求消息,所处处理单元24,用于根据所述第七请求消息在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,所述发送单元23,用于向所述第三网络设备发送响应消息。
一种可行的设计中,所述发送单元23,用于向核心网设备发送第五请求消息,所述第五请求消息用于请求在所述第二网络设备和所述核心网设备之间针对所述终端设备建立第四逻辑接口,所述接收单元21,还用于接收所述核心网设备发送的响应消息。
一种可行的设计中,所述发送单元23,用于向第五网络设备发送所述终端设备的接入层上下文和所述终端设备的标识,所述第五网络设备为所述终端设备从非激活态到连接态之前,存储所述接入层上下文且与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备。
一种可行的设计中,所述发送单元23,用于向所述核心网设备发送第六请求消息,所述第六请求消息用于请求将针对所述终端设备的第四逻辑接口切换为第五逻辑接口,所述接收单元21,用于接收所述核心网设备发送的响应消息,所述第四逻辑接口为所述第二网络设备与所述核心网设备之间针对所述终端设备的逻辑接口,所述 第五逻辑接口为第三网络设备与所述第二网络设备之间针对所述终端设备的逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;
一种可行的设计中,所述发送单元23,用于向所述终端设备所在区域的网络设备发送携带所述终端设备的标识的第八请求消息,以请求所述终端设备所在的区域内的网络设备寻呼所述终端设备;
一种可行的设计中,所述第一网络设备为接入网网络设备,所述第二网络设备为核心网设备。
一种可行的设计中,所述第一网络设备为接入网网络设备,所述第二网络设备为接入网网络设备。
本申请实施例提供的上下文存储装置,可以执行上述实施例中第二网络设备的动作,其实现原理和技术效果类似,在此不再赘述。
图12为本申请实施例提供的又一种上下文存储装置的结构示意图。本实施例所涉及的上下文存储装置可以为第三网络设备,也可以为应用于第三网络设备的芯片。该上下文存储装置可以用于执行上述实施例中第三网络设备的功能。如图12所示,该上下文存储装置300可以包括:
接收单元31,用于接收非激活态的终端设备发送的携带所述终端设备的标识的第九请求消息,所述第九请求消息用于请求恢复所述终端设备的无线资源控制RRC连接;
发送单元32,用于向第二网络设备发送携带所述终端设备的标识的第一请求消息,所述第二网络设备是存储所述终端设备的接入层上下文的网络设备;
所述接收单元31,还用于接收所述第二网络设备发送的第一响应消息,所述第一响应消息携带所述终端设备的接入层上下文。
一种可行的设计中,上述的所述装置300还包括:处理单元33,所述接收单元31,还用于接收所述第二网络设备发送的第三请求消息,所述处理单元33,用于根据所述第三请求消息在所述第二网络设备和所述第三网络设备之间针对所述终端设备建立逻辑接口;
或者,
所述发送单元32,还用于向所述第二网络设备发送第三请求消息,以请求在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口。
一种可行的设计中,所述接收单元31,还用于接收所述第二网络设备发送的第七请求消息,所述处理单元33,用于根据所述第七请求消息,在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;
或者,
所述发送单元32,还用于向所述第二网络设备发送第七请求消息,所述第七请求消息用于请求在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口。
一种可行的设计中,所述接收单元31,还用于接收核心网设备发送的第七请求 消息,所述处理单元33,用于根据所述第七请求消息,在所述第三网络设备与所述第二网络设备之间针对所述终端设备建立第五逻辑接口,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;
或者,
所述发送单元32,还用于向核心网设备发送第七请求消息,所述第七请求消息用于请求在所述第三网络设备与所述核心网设备之间针对所述终端设备建立第五逻辑接口。
一种可行的设计中,所述第三网络设备为接入网网络设备,所述第二网络设备为核心网设备。
一种可行的设计中,所述第三网络设备为接入网网络设备,所述第二网络设备为接入网网络设备。
一种可行的设计中,所述第三网络设备与第一网络设备为相同或不同的网络设备,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备。
本申请实施例提供的上下文存储装置,可以执行上述实施例中第三网络设备的动作,其实现原理和技术效果类似,在此不再赘述。
图13为本申请实施例提供的一种寻呼装置的结构示意图。本实施例所涉及的寻呼装置可以为核心网设备,也可以为应用于核心网设备的芯片。该寻呼装置可以用于执行上述图9实施例中核心网设备的功能。如图13所示,该寻呼装置400可以包括:
处理单元41,用于为终端设备分配跟踪区列表,其中,所述跟踪区列表包含第一跟踪区标识,所述第一跟踪区标识指示第一小区集合,所述第一小区集合中的第一小区由第一网络设备提供覆盖,或者,所述第一小区对应第一跟踪区标识;
接收单元42,用于接收第一网络设备发送的关联信息,所述关联信息用于指示所述第一跟踪区列表中的第一小区提供服务的网络设备由第一网络设备变更为第二网络设备,或者,所述第一跟踪区列表中的第一跟踪区标识对应的第一小区变更为第二小区;
所述处理单元41,还用于根据所述关联信息更新所述跟踪区列表,根据更新后的跟踪区列表寻呼所述终端设备。
一种可行的实现方式中,上述的寻呼装置400还包括:发送单元43,
所述处理单元41,用于根据所述更新后的跟踪区列表,确定寻呼区域;
所述发送单元43,用于向所述寻呼区域内小区对应的网络设备发送寻呼消息以寻呼所述终端设备。
本申请实施例提供的寻呼装置,可以执行上述实施例中核心网设备的动作,其实现原理和技术效果类似,在此不再赘述。
图14为本申请实施例提供的另一种寻呼装置的结构示意图。本实施例所涉及的寻呼装置可以为网络设备,也可以为应用于网络设备的芯片。该寻呼装置可以用于执行上述图9实施例中网络设备的功能。如图14所示,该寻呼装置500可以包括:
处理单元51,用于为终端设备分配跟踪区列表,其中,所述跟踪区列表包含第一跟踪区标识,所述第一跟踪区标识指示第一小区集合,所述第一小区集合中的第一小区由第一网络设备提供覆盖,或者,所述第一小区对应第一跟踪区标识;
收发单元52,用于接收第一网络设备发送的关联信息,所述关联信息用于指示所述第一跟踪区列表中的第一小区提供服务的网络设备由第一网络设备变更为第二网络设备,或者,所述第一跟踪区列表中的第一跟踪区标识对应的第一小区变更为第二小区,还用于根据所述关联信息更新所述跟踪区列表,根据更新后的跟踪区列表寻呼所述终端设备。
本申请实施例提供的寻呼装置,可以执行上述实施例中网络设备的动作,其实现原理和技术效果类似,在此不再赘述。
需要说明的是,应理解以上接收单元实际实现时可以为接收器、发送单元实际实现时可以为发送器。而处理单元可以以软件通过处理元件调用的形式实现;也可以以硬件的形式实现。例如,处理单元可以为单独设立的处理元件,也可以集成在上述装置的某一个芯片中实现,此外,也可以以程序代码的形式存储于上述装置的存储器中,由上述装置的某一个处理元件调用并执行以上处理单元的功能。此外这些单元全部或部分可以集成在一起,也可以独立实现。这里所述的处理元件可以是一种集成电路,具有信号的处理能力。在实现过程中,上述方法的各步骤或以上各个单元可以通过处理器元件中的硬件的集成逻辑电路或者软件形式的指令完成。
例如,以上这些单元可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个专用集成电路(application specific integrated circuit,ASIC),或,一个或多个微处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA)等。再如,当以上某个单元通过处理元件调度程序代码的形式实现时,该处理元件可以是通用处理器,例如中央处理器(central processing unit,CPU)或其它可以调用程序代码的处理器。再如,这些单元可以集成在一起,以片上***(system-on-a-chip,SOC)的形式实现。
图15为本申请实施例提供的又一种上下文存储装置的结构示意图。如图15所示,该上下文存储装置600可以包括:处理器61(例如CPU)、存储器62、接收器63、发送器64;接收器63和发送器64均耦合至处理器61,处理器61控制接收器63的接收动作、处理器61控制发送器64的发送动作;存储器62可能包含高速随机存取存储器(random-access memory,RAM),也可能还包括非易失性存储器(non-volatile memory,NVM),例如至少一个磁盘存储器,存储器62中可以存储各种指令,以用于完成各种处理功能以及实现本申请的方法步骤。可选的,本申请涉及的上下文存储装置还可以包括:通信总线65。接收器63和发送器64可以集成在上下文存储装置的收发信机中,也可以为上下文存储装置上独立的收发天线。通信总线65用于实现元件之间的通信连接。
在本申请实施例中,上述存储器62用于存储计算机可执行程序代码,程序代码包括指令;当处理器61执行指令时,使上下文存储装置的处理器61执行上述方法实施例中第一网络设备的处理动作,使接收器63执行上述实施例中第一网络设备的接收动作,使发送器64执行上述方法实施例中第一网络设备的发送动作,其实现原理和技术效果类似,在此不再赘述。或者,
上述存储器62用于存储计算机可执行程序代码,程序代码包括指令;当处理器61执行指令时,使上下文存储装置的处理器61执行上述方法实施例中第一网络设备的处理动作,使接收器63执行上述实施例中第二网络设备的接收动作,使发送器64执行上述方法 实施例中第二网络设备的发送动作,其实现原理和技术效果类似,在此不再赘述。或者,
上述存储器62用于存储计算机可执行程序代码,程序代码包括指令;当处理器61执行指令时,使上下文存储装置的处理器61执行上述方法实施例中第一网络设备的处理动作,使接收器63执行上述实施例中第三网络设备的接收动作,使发送器64执行上述方法实施例中第三网络设备的发送动作,其实现原理和技术效果类似,在此不再赘述。
图16为本申请实施例提供的又一种寻呼装置的结构示意图。如图16所示,该寻呼装置700可以包括:处理器71(例如CPU)、存储器72、接收器73、发送器74;接收器73和发送器74均耦合至处理器71,处理器71控制接收器73的接收动作、处理器71控制发送器74的发送动作;存储器72可能包含高速随机存取存储器(random-access memory,RAM),也可能还包括非易失性存储器(non-volatile memory,NVM),例如至少一个磁盘存储器,存储器72中可以存储各种指令,以用于完成各种处理功能以及实现本申请的方法步骤。可选的,本申请涉及的寻呼装置还可以包括:通信总线75。接收器73和发送器74可以集成在寻呼装置的收发信机中,也可以为寻呼装置上独立的收发天线。通信总线75用于实现元件之间的通信连接。
在本申请实施例中,上述存储器72用于存储计算机可执行程序代码,程序代码包括指令;当处理器71执行指令时,使寻呼装置的处理器71执行上述方法实施例中核心网设备的处理动作,使接收器73执行上述实施例中核心网设备的接收动作,使发送器74执行上述方法实施例中核心网设备的发送动作,其实现原理和技术效果类似,在此不再赘述。或者,
上述存储器72用于存储计算机可执行程序代码,程序代码包括指令;当处理器71执行指令时,使寻呼装置的处理器71执行上述方法实施例中网络设备的处理动作,使接收器73执行上述实施例中网络设备的接收动作,使发送器74执行上述方法实施例中网络设备的发送动作,其实现原理和技术效果类似,在此不再赘述。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
本文中的术语“多个”是指两个或两个以上。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。此外,本文中描述方式“……中的至少一个”表示所列出的各项之一或其任意组合,例如,“A、B和C中的至少一个”,可以表示:单独存 在A,单独存在B,单独存在C,同时存在A和B,同时存在B和C,同时存在A和C,同时存在A、B和C这六种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系;在公式中,字符“/”,表示前后关联对象是一种“相除”的关系。
可以理解的是,在本申请的实施例中涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的实施例的范围。
可以理解的是,在本申请的实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请的实施例的实施过程构成任何限定。

Claims (34)

  1. 一种上下文存储方法,其特征在于,包括:
    第一网络设备向第二网络设备发送终端设备的接入层上下文和所述终端设备的标识,用于使得所述第二网络设备存储所述终端设备的接入层上下文和所述终端设备的标识,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备向所述第二网络设备发送接入层安全信息,所述接入层安全信息包括第一密钥。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述第一网络设备向所述第二网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口;
    或者,
    所述第一网络设备接收所述第二网络设备发送的第二请求消息,并根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。
  4. 根据权利要求1或2所述的方法,其特征在于,所述第一网络设备和所述第二网络设备为接入网网络设备。
  5. 根据权利要求1~3任一项所述的方法,其特征在于,所述第一网络设备为接入网网络设备,所述第二网络设备为核心网设备。
  6. 一种上下文存储方法,其特征在于,包括:
    第二网络设备接收第一网络设备发送的终端设备的接入层上下文和所述终端设备的标识,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备;
    所述第二网络设备存储所述终端设备的接入层上下文和所述终端设备的标识。
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备接收所述第一网络设备发送的接入层安全信息,所述接入层安全信息包括第一密钥。
  8. 根据权利要求7所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备接收第三网络设备发送的携带所述终端设备的标识的第一请求消息,所述第一请求消息用于请求所述终端设备的接入层上下文,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;
    所述第二网络设备向所述第三网络设备发送第一响应消息,所述第一响应消息携带所述终端设备的接入层上下文和第二密钥,所述第二密钥是所述第二网络设备根据所述第一密钥生成的密钥。
  9. 根据权利要求8所述的方法,其特征在于,所述第一请求消息还携带第一完整性消息认证码MAC-I,所述第二网络设备向所述第三网络设备发送第一响应消息之前,还包括:
    所述第二网络设备确定第二MAC-I;
    所述第二网络设备确定所述第一MAC-I与所述第二MAC-I相同。
  10. 根据权利要求6~9任一项所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备接收所述第一网络设备发送的第二请求消息,并根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口;
    或者;
    所述第二网络设备向所述第一网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。
  11. 根据权利要求6~10任一项所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备向第三网络设备发送第三请求消息,以请求在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口;
    或者,
    所述第二网络设备接收所述第三网络设备发送的第三请求消息,根据所述第三请求消息在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口。
  12. 根据权利要求6~9任一项所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备向核心网设备发送第五请求消息,所述第五请求消息用于请求在所述第二网络设备和所述核心网设备之间针对所述终端设备建立第四逻辑接口,所述第二网络设备接收所述核心网设备发送的响应消息。
  13. 根据权利要求12所述的方法,其特征在于,所述方法还包括:
    所述第二网络设备向第五网络设备发送所述终端设备的接入层上下文和所述终端设备的标识,所述第五网络设备为所述终端设备从非激活态到连接态之前,存储所述接入层上下文且与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备。
  14. 根据权利要求6~13任一项所述的方法,其特征在于,所述方法包括:
    所述第二网络设备向所述终端设备所在区域的网络设备发送携带所述终端设备的标识的第八请求消息,以请求所述终端设备所在的区域内的网络设备寻呼所述终端设备。
  15. 根据权利要求6~11、14任一项所述的方法,其特征在于,所述第一网络设备为接入网网络设备,所述第二网络设备为核心网设备。
  16. 根据权利要求6~9、12~14任一项所述的方法,其特征在于,所述第一网络设备为接入网网络设备,所述第二网络设备为接入网网络设备。
  17. 一种上下文存储装置,其特征在于,所述装置设置在第一网络设备上,所述装置包括:
    发送单元,用于向第二网络设备发送终端设备的接入层上下文和所述终端设备的标识,用于使得所述第二网络设备存储所述终端设备的接入层上下文和所述终端设备的标识,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备。
  18. 根据权利要求17所述的装置,其特征在于,
    所述发送单元,还用于向所述第二网络设备发送接入层安全信息,所述接入层安全信息包括第一密钥。
  19. 根据权利要求17或18所述的装置,其特征在于,
    所述发送单元,还用于向所述第二网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口;
    或者,
    所述装置还包括:接收单元和处理单元,所述接收单元用于接收所述第二网络设备发送的第二请求消息,所述处理单元,用于根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。
  20. 根据权利要求17或18所述的装置,其特征在于,所述第一网络设备和所述第二网络设备为接入网网络设备。
  21. 根据权利要求17~19任一项所述的装置,其特征在于,所述第一网络设备为接入网网络设备,所述第二网络设备为核心网设备。
  22. 一种上下文存储装置,其特征在于,所述装置设置在第二网络设备上,所述装置包括:
    接收单元,用于接收第一网络设备发送的终端设备的接入层上下文和所述终端设备的标识,所述第一网络设备为释放所述终端设备从连接态到非激活态的网络设备;
    存储单元,用于存储所述终端设备的接入层上下文和所述终端设备的标识。
  23. 根据权利要求22所述的装置,其特征在于,
    所述接收单元,还用于接收所述第一网络设备发送的接入层安全信息,所述接入层安全信息包括第一密钥。
  24. 根据权利要求23所述的装置,其特征在于,所述装置还包括:发送单元;
    所述接收单元,还用于接收第三网络设备发送的携带所述终端设备的标识的第一请求消息,所述第一请求消息用于请求所述终端设备的接入层上下文,所述第三网络设备为为所述终端设备从非激活态恢复到连接态提供服务的网络设备;
    所述发送单元,用于向所述第三网络设备发送第一响应消息,所述第一响应消息携带所述终端设备的接入层上下文和第二密钥,所述第二密钥是所述第二网络设备根据所述第一密钥生成的密钥。
  25. 根据权利要求24所述的装置,其特征在于,所述第一请求消息还携带第一完整性消息认证码MAC-I,所述装置还包括:处理单元;
    所述处理单元,用于在所述发送单元向所述第三网络设备发送第一响应消息之前,确定第二MAC-I,确定所述第一MAC-I与所述第二MAC-I相同。
  26. 根据权利要求22~25任一项所述的装置,其特征在于,
    所述装置还包括处理单元,所述接收单元,还用于接收所述第一网络设备发送的第二请求消息,所述处理单元,用于根据所述第二请求消息,释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口;
    或者,
    所述装置还包括发送单元,用于向所述第一网络设备发送第二请求消息,以请求释放所述第二网络设备与所述第一网络设备之间针对所述终端设备的逻辑接口。
  27. 根据权利要求22~26任一项所述的装置,其特征在于,
    所述装置还包括发送单元,用于向第三网络设备发送第三请求消息,以请求在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口;
    或者,
    所述装置还包括处理单元,所述接收单元,还用于接收所述第三网络设备发送的第三请求消息,所述处理单元,用于根据所述第三请求消息在所述第二网络设备与所述第三网络设备之间针对所述终端设备建立逻辑接口。
  28. 根据权利要求22~25任一项所述的装置,其特征在于,
    所述装置还包括:发送单元,用于向核心网设备发送第五请求消息,所述第五请求消息用于请求在所述第二网络设备和所述核心网设备之间针对所述终端设备建立第四逻辑接口,所述接收单元,还用于接收所述核心网设备发送的响应消息。
  29. 根据权利要求28所述的装置,其特征在于,
    所述装置还包括:发送单元,用于向第五网络设备发送所述终端设备的接入层上下文和所述终端设备的标识,所述第五网络设备为所述终端设备从非激活态到连接态之前,存储所述接入层上下文且与所述第二网络设备之间针对所述终端设备建立逻辑接口的网络设备。
  30. 根据权利要求22~29所述的装置,其特征在于,所述装置还包括:
    发送单元,用于向所述终端设备所在区域的网络设备发送携带所述终端设备的标识的第八请求消息,以请求所述终端设备所在的区域内的网络设备寻呼所述终端设备;
  31. 根据权利要求22~27、30所述的装置,其特征在于,所述第一网络设备为接入网网络设备,所述第二网络设备为核心网设备。
  32. 根据权利要求22~25、28~30任一项所述的装置,其特征在于,所述第一网络设备为接入网网络设备,所述第二网络设备为接入网网络设备。
  33. 一种计算机可读存储介质,其特征在于,用于存储计算机程序或指令,当所述计算机程序或指令在网络设备上运行时,使得所述网络设备执行如权利要求1~5任一项所述的方法,或者,如权利要求6~16任一项所述的方法。
  34. 一种计算机程序产品,其特征在于,当所述计算机程序产品在网络设备上运行时,使得所述网络设备执行如权利要求1~5任一项所述的方法,或者,如权利要求6~16任一项所述的方法。
PCT/CN2020/071712 2019-01-28 2020-01-13 上下文存储方法及装置 WO2020156116A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910081711.9A CN111491338B (zh) 2019-01-28 2019-01-28 上下文存储方法及装置
CN201910081711.9 2019-01-28

Publications (1)

Publication Number Publication Date
WO2020156116A1 true WO2020156116A1 (zh) 2020-08-06

Family

ID=71794273

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/071712 WO2020156116A1 (zh) 2019-01-28 2020-01-13 上下文存储方法及装置

Country Status (2)

Country Link
CN (1) CN111491338B (zh)
WO (1) WO2020156116A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449593A (zh) * 2020-10-30 2022-05-06 华为技术有限公司 一种小区切换方法及通信装置
WO2023108662A1 (zh) * 2021-12-17 2023-06-22 Oppo广东移动通信有限公司 数据发送方法、装置、设备及存储介质
WO2023160657A1 (zh) * 2022-02-28 2023-08-31 华为技术有限公司 一种通信方法及装置
WO2024026640A1 (en) * 2022-08-01 2024-02-08 Nokia Shanghai Bell Co., Ltd. Apparatus, method, and computer program

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114126090B (zh) * 2020-08-26 2024-01-12 大唐移动通信设备有限公司 上行数据处理方法、装置、网络设备、终端设备及介质
CN114126091B (zh) * 2020-08-26 2024-05-31 大唐移动通信设备有限公司 上行数据处理方法、装置、网络设备、终端设备及介质
CN114696884A (zh) * 2020-12-30 2022-07-01 海能达通信股份有限公司 卫星的覆盖区域的划分方法、切换方法及相关设备
CN115250487A (zh) * 2021-04-28 2022-10-28 华为技术有限公司 一种优化移动性能的方法及通信装置
CN113438646B (zh) * 2021-06-30 2022-08-23 展讯通信(上海)有限公司 业务建立方法、装置、终端及网络侧设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101998560A (zh) * 2009-08-18 2011-03-30 中兴通讯股份有限公司 支持在网络部署Femto基站后的非受控切换方法
CN108260171A (zh) * 2016-12-29 2018-07-06 维沃移动通信有限公司 一种业务请求处理方法和相关设备
CN108271226A (zh) * 2017-01-04 2018-07-10 电信科学技术研究院 一种跨rat的终端状态确定方法及网络设备
US10187910B2 (en) * 2016-05-12 2019-01-22 Lg Electronics Inc. Method and apparatus for resuming RRC connection in wireless communication system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973416B (zh) * 2011-10-03 2020-02-14 华为技术有限公司 无线资源控制连接重建方法及基站
KR20180125441A (ko) * 2016-03-29 2018-11-23 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 무선 통신 방법 및 장치
CN108713337A (zh) * 2016-09-30 2018-10-26 Lg 电子株式会社 Ue上下文管理的方法和支持该方法的设备
CN108616950B (zh) * 2016-12-28 2019-12-20 电信科学技术研究院 无线接入网络间的移动性管理方法、核心网设备及基站
CN108347751B (zh) * 2017-01-25 2021-08-03 华为技术有限公司 通信方法和通信装置
CN108471631B (zh) * 2017-02-23 2020-05-12 北京佰才邦技术有限公司 一种切换准备方法、相关基站及ue
KR102222830B1 (ko) * 2017-03-21 2021-03-04 삼성전자 주식회사 이동통신에서 연결 모드의 비연속 수신 모드를 지원하는 방법 및 장치
CN108632922B (zh) * 2017-03-23 2022-07-19 中兴通讯股份有限公司 一种移动性管理方法及装置
GB2560756B (en) * 2017-03-24 2021-08-11 Tcl Communication Ltd Data transmission in RRC inactive state
CN108924814A (zh) * 2018-06-06 2018-11-30 武汉虹信通信技术有限责任公司 一种基于移动管理实体池的容灾方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101998560A (zh) * 2009-08-18 2011-03-30 中兴通讯股份有限公司 支持在网络部署Femto基站后的非受控切换方法
US10187910B2 (en) * 2016-05-12 2019-01-22 Lg Electronics Inc. Method and apparatus for resuming RRC connection in wireless communication system
CN108260171A (zh) * 2016-12-29 2018-07-06 维沃移动通信有限公司 一种业务请求处理方法和相关设备
CN108271226A (zh) * 2017-01-04 2018-07-10 电信科学技术研究院 一种跨rat的终端状态确定方法及网络设备

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449593A (zh) * 2020-10-30 2022-05-06 华为技术有限公司 一种小区切换方法及通信装置
WO2023108662A1 (zh) * 2021-12-17 2023-06-22 Oppo广东移动通信有限公司 数据发送方法、装置、设备及存储介质
WO2023160657A1 (zh) * 2022-02-28 2023-08-31 华为技术有限公司 一种通信方法及装置
WO2024026640A1 (en) * 2022-08-01 2024-02-08 Nokia Shanghai Bell Co., Ltd. Apparatus, method, and computer program

Also Published As

Publication number Publication date
CN111491338B (zh) 2022-04-22
CN111491338A (zh) 2020-08-04

Similar Documents

Publication Publication Date Title
WO2020156116A1 (zh) 上下文存储方法及装置
US11503523B2 (en) Network handover method, apparatus and system, and handover determination method and apparatus
WO2018228192A1 (zh) ***smf的方法及amf实体
CN111586771B (zh) 网络节点选择方法及装置
US11864103B2 (en) Network slicing method and device, and storage medium
WO2019096328A1 (zh) 一种位置信息的上报方法和装置
WO2020063679A1 (zh) 通信方法及装置
WO2018126961A1 (zh) 通信的方法、接入网设备和终端
WO2021000331A1 (zh) 一种数据传输方法及装置、通信设备
US20230337317A1 (en) Method for small data transmission
WO2018010583A1 (zh) 网络***
TWI792616B (zh) 從側鏈路中繼失敗中恢復的裝置和方法
WO2021056563A1 (zh) 通信方法和通信装置
WO2018214762A1 (zh) 一种获取寻呼参数的方法及装置
WO2019034058A1 (zh) 消息发送、信息获取方法、装置、终端及接入及移动性管理实体
US10999813B2 (en) Method for user equipment's registration update
WO2021249477A1 (zh) 切换多播业务的方法及设备
WO2017166291A1 (zh) 一种通信方法、终端、基站和移动性管理设备
CN110830994B (zh) 会话迁移的方法、装置和存储介质
WO2019095379A1 (zh) 一种业务激活及去激活的方法、装置、计算机存储介质
GB2511540A (en) Wireless communication system and method
WO2023197320A1 (zh) 上行定位参考信号的配置方法、装置、设备及存储介质
WO2023197322A1 (zh) 上行定位参考信号的配置方法、装置、设备及存储介质
WO2022021248A1 (zh) 一种通信方法及通信装置
WO2024026640A1 (en) Apparatus, method, and computer program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20748075

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20748075

Country of ref document: EP

Kind code of ref document: A1