WO2024140007A1 - Communication method and communication device - Google Patents

Communication method and communication device Download PDF

Info

Publication number
WO2024140007A1
WO2024140007A1 PCT/CN2023/135622 CN2023135622W WO2024140007A1 WO 2024140007 A1 WO2024140007 A1 WO 2024140007A1 CN 2023135622 W CN2023135622 W CN 2023135622W WO 2024140007 A1 WO2024140007 A1 WO 2024140007A1
Authority
WO
WIPO (PCT)
Prior art keywords
tunnel
host node
communication
iab
configuration information
Prior art date
Application number
PCT/CN2023/135622
Other languages
French (fr)
Chinese (zh)
Inventor
张柔佳
孙飞
朱元萍
史玉龙
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024140007A1 publication Critical patent/WO2024140007A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/18Performing reselection for specific purposes for allowing seamless reselection, e.g. soft reselection

Definitions

  • the IAB node consists of a mobile terminal (MT) part and a distributed unit (DU) part, which can be represented as IAB-MT and IAB-DU respectively.
  • IAB donor can also be called a host device, host node, or host base station (donor gNodeB, DgNB), etc.
  • IAB donor consists of a centralized unit (CU) and a DU, which can be represented as IAB-donor-CU and IAB-donor-DU, respectively.
  • partial migration technology is introduced in the IAB network. Furthermore, considering the mobility of the IAB node, in order to reduce the number of switching the IAB-donor-CU of the F1 connection, a solution of deploying a higher-ranking IAB-donor-CU in the network is introduced, which can maintain the F1 connection with the IAB-DU in a larger area, so that partial migration can achieve a wider range of mobility, thereby reducing the number of switching the IAB-donor-CU of the F1 connection.
  • IAB node 2 establishes an F1 connection with IAB-donor-CU. Due to the movement of IAB node 2, IAB node 2 performs partial migration.
  • the RRC connection of IAB-MT 2 is switched from IAB-donor-CU to IAB-donor-CU 2, and then from IAB-donor-CU 2 to IAB-donor-CU 3.
  • IAB-DU 2 has always maintained an F1 connection with IAB-donor-CU, but the IP between IAB-donor-CU and IAB donor 3 is unreachable.
  • the IP between IAB-donor-CU and IAB donor3 is unreachable, causing IAB node 2 to trigger full migration technology and switch the F1 connection of IAB-DU 2 to IAB-donor-CU 3, which will increase the service interruption delay and affect service stability.
  • the embodiments of the present application provide a communication method and a communication device, which can reduce service interruption delay and help improve service stability.
  • an embodiment of the present application provides a communication method, which can be executed by a first host node, or by a device matching the first host node, such as a processor, a chip, or a chip system.
  • the method may include: the first host node sends first configuration information, the first configuration information includes identification information of a third host node; the first configuration information is used to configure a first communication tunnel, the first communication tunnel is a communication tunnel between a DU of a second host node and a DU of a third host node; and receives first configuration response information, the first configuration response information includes an address assigned by the third host node.
  • the first host node reduces the service interruption delay by configuring the first communication tunnel between the DU of the second host node and the DU of the third host node, which helps to improve service stability.
  • the first configuration response information includes the address assigned by the third host node, so that the first host node can know the address assigned by the third host node to its child node, and thus will not discard the downlink data packets for these addresses.
  • the first configuration information is further used to configure a tunnel type of the first communication tunnel, where the tunnel type of the first communication tunnel includes an IP tunnel type or a general packet radio service tunnel protocol-user plane (GTP-U) tunnel type.
  • the tunnel type of the first communication tunnel includes an IP tunnel type or a general packet radio service tunnel protocol-user plane (GTP-U) tunnel type.
  • GTP-U general packet radio service tunnel protocol-user plane
  • the first configuration information is included in the first tunnel configuration information, and the first tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node.
  • Configuring multiple communication tunnels and tunnel types through the first tunnel configuration information so as to establish communication tunnels between DUs of adjacent host nodes is conducive to further improving the stability of the service.
  • the tunnel type configured by the first tunnel configuration information may include the tunnel type of the second communication tunnel so that the first host node can receive downlink data packets and/or uplink data packets. The data packet is processed accordingly.
  • the first tunnel configuration information is also used to configure the association relationship between the multiple communication tunnels.
  • the routing path is determined by configuring the association relationship between the multiple communication tunnels.
  • the first configuration response information is included in the first tunnel configuration response information, and the first tunnel configuration response information is used to configure multiple communication tunnels and tunnel types.
  • the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node.
  • Configuring multiple communication tunnels and tunnel types through the first tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business.
  • the tunnel type configured by the first tunnel configuration response information may include the tunnel type of the second communication tunnel, so that the first host node performs corresponding processing on the downlink data packet and/or the uplink data packet.
  • the first tunnel configuration response information is also used to configure the association relationship between the above-mentioned multiple communication tunnels, so that the first host node can determine the routing path based on the association relationship.
  • the method further includes: when it is detected that the target address of the downlink data packet belongs to the address assigned by the third host node, that is, when a downlink data packet sent to a child node of the third host node is detected, it is determined that the downlink data packet is transmitted through the first communication tunnel and/or the second communication tunnel to reduce the probability of the downlink data packet being discarded.
  • the first communication tunnel it is determined that the downlink data packet is transmitted through the first communication tunnel.
  • the first communication tunnel and the second communication tunnel it is determined that the downlink data packet is transmitted through the first communication tunnel and the second communication tunnel.
  • the second communication tunnel it is determined that the downlink data packet is transmitted through the second communication tunnel.
  • the method further includes: retaining an uplink data packet transmitted through the second communication tunnel to prevent the uplink data packet from being discarded; or retaining an uplink data packet whose source address belongs to an address assigned by a third host node to prevent the uplink data packet from being discarded.
  • uplink data packets refer to data packets from terminal devices
  • downlink data packets refer to data packets from core network elements or parent nodes.
  • the first host node when the first host node sends the first configuration information, it sends the first configuration information to the second host node.
  • the first host node receives the first configuration response information, it receives the first configuration response information from the second host node. In other words, the first host node configures the first communication tunnel to the third host node through the second host node.
  • the first host node when sending the first configuration information, sends the first configuration information to the core network element.
  • the first host node when receiving the first configuration response information, receives the first configuration response information from the core network element. That is, the first host node configures the first communication tunnel to the third host node through the core network element.
  • the first configuration information further includes an address of the first host node.
  • the address of the first host node refers to an IP address of a CU of the first host node.
  • the first configuration response information further includes the address of the third host node. That is, the first configuration response information may include not only the address allocated by the third host node, but also the address of the third host node.
  • the IP unreachability between the first host node and the third host node may occur in a scenario where the radio resource control (RRC) connection between the relay device and the host node is switched from the first host node to the second host node, and then from the second host node to the third host node, in which the relay device maintains an F1 connection with the first host node.
  • RRC radio resource control
  • an embodiment of the present application provides a communication method, which can be executed by a third host node, or by a device matching the third host node, such as a processor, a chip, or a chip system.
  • the method may include: the third host node receives second configuration information, the second configuration information is used to configure a first communication tunnel, the first communication tunnel is a communication tunnel between the DU of the second host node and the DU of the third host node; sends second configuration response information, the second configuration response information includes an address assigned by the third host node.
  • the third host node when the third host node receives the second configuration information, it receives the second configuration information from the second host node. Correspondingly, when the third host node sends the second configuration response information, it sends the second configuration response information to the second host node. In other words, the third host node receives the configuration information for configuring the first communication tunnel through the second host node, and feeds back the allocated address to the first host node through the second host node.
  • the second configuration information is further used to configure the tunnel type of the first communication tunnel; and/or the second configuration response information also includes the first communication tunnel type. That is, the second host node can configure the tunnel type of the first communication tunnel, and/or the third host node can configure the tunnel type of the first communication tunnel, so that the configuration of the tunnel type of the first communication tunnel is flexible.
  • the tunnel type of the first communication tunnel is a GTP-U tunnel type
  • the second configuration information also includes an address of a second host node, user datagram protocol (UDP) port information allocated by the second host node, and a tunnel endpoint identifier (TEID) for identifying the first communication tunnel.
  • UDP user datagram protocol
  • TEID tunnel endpoint identifier
  • the tunnel type of the first communication tunnel is a GTP-U tunnel type
  • the second configuration response information further includes an address of a third host node, UDP port information allocated by the third host node, and a TEID used to identify the first communication tunnel.
  • the second host node may inform the third host node of the information of the GTP-U tunnel on the second host node side (i.e., the address of the second host node, the UDP port information of the second host node, and the TEID of the GTP-U tunnel) through the second configuration information.
  • the third host node may inform the second host node of the information of the GTP-U tunnel on the third host node side (i.e., the address of the third host node, the UDP port information of the third host node, and the TEID of the GTP-U tunnel) through the second configuration response information.
  • the third host node when the third host node receives the second configuration information, it receives the second configuration information from the core network element. Correspondingly, when the third host node sends the second configuration response information, it sends the second configuration response information to the core network element. That is, the third host node receives the configuration information for configuring the first communication tunnel through the core network element, and feeds back the allocated address to the first host node through the core network element.
  • the second configuration information is also used to configure the tunnel type of the first communication tunnel. That is, the core network element can configure the tunnel type of the first communication tunnel.
  • the second configuration information is included in the second tunnel configuration information, and the second tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node.
  • Configuring multiple communication tunnels and tunnel types through the second tunnel configuration information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business.
  • the tunnel type configured by the second tunnel configuration information may include the tunnel type of the second communication tunnel.
  • the second tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
  • the second configuration response information is included in the second tunnel configuration response information, and the second tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node.
  • Configuring multiple communication tunnels and tunnel types through the second tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business.
  • the tunnel type configured by the second tunnel configuration response information may include the tunnel type of the second communication tunnel.
  • the second tunnel configuration response information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
  • the method further includes: sending third configuration information to the second host node, the third configuration information including the address assigned by the third host node; receiving third configuration response information from the second host node, the third configuration response information being used to respond to the third configuration information.
  • the premise of the method is that the third host node receives the second configuration information from the core network element and sends the second configuration response information to the core network element.
  • the third host node provides the second host node with the address assigned by the third host node so that the second host node uses these addresses as a whitelist for not discarding uplink data packets.
  • the third configuration information includes the tunnel type of the first communication tunnel. That is, the third host node can configure the tunnel type of the first communication tunnel.
  • the tunnel type of the first communication tunnel is a GTP-U tunnel type
  • the third configuration information further includes an address of a third host node, UDP port information allocated by the third host node, and a TEID used to identify the first communication tunnel.
  • the third configuration information is included in the third tunnel configuration information, and the third tunnel configuration information is used to configure multiple communication tunnels and tunnel types
  • the multiple communication tunnels include a first communication tunnel and a second communication tunnel
  • the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node
  • the tunnel type includes the tunnel type of the second communication tunnel.
  • Configuring multiple communication tunnels and tunnel types through the third tunnel configuration information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business.
  • the tunnel type configured by the third tunnel configuration information may include the tunnel type of the second communication tunnel.
  • the third tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
  • the second configuration response information further includes an address of the third host node.
  • the first configuration information is also used to configure the tunnel type of the first communication tunnel. That is, the first host node can configure the tunnel type of the first communication tunnel.
  • the second configuration response message further includes the address of the third host node. That is, the second configuration response message may include not only the address allocated by the third host node, but also the address of the third host node.
  • the third configuration response information includes the tunnel type of the first communication tunnel. That is, the second host node can configure the tunnel type of the first communication tunnel.
  • the method further includes: obtaining the address of the first host node, retaining a downlink data packet whose source address is the same as the address of the first host node to avoid the downlink data packet being discarded, and transmitting the downlink data packet to a third host node through the first communication tunnel.
  • the first tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
  • the first configuration response information is included in the first tunnel configuration response information, and the first tunnel configuration response information is used to configure multiple communication tunnels and tunnel types.
  • the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node.
  • Configuring multiple communication tunnels and tunnel types through the first tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business.
  • the tunnel type configured by the first tunnel configuration response information may include the tunnel type of the second communication tunnel, so that the first host node performs corresponding processing on the downlink data packet and/or the uplink data packet.
  • the first tunnel configuration response information is also used to configure the association relationship between the above-mentioned multiple communication tunnels, so that the first host node can determine the routing path based on the association relationship.
  • the second tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
  • the second configuration response information is included in the second tunnel configuration response information, and the second tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the second tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the service.
  • FIG2 is an example diagram of a partial migration
  • FIG2A is a schematic diagram of a process flow of IAB transmission migration management
  • Figure 3 is an example diagram of the tunnel between IAB-donor-DU 1 and IAB-donor-DU 2;
  • FIG4A is a diagram showing an example of a scenario in which the IAB node continuously performs partial migration based on IAB-donor-CU 1;
  • FIG4B is a diagram showing an example of a system architecture using an embodiment of the present application.
  • FIG5 is a flow chart of a communication method provided in an embodiment of the present application.
  • FIG6 is a flow chart of another communication method provided in an embodiment of the present application.
  • FIG7A is a schematic diagram of a communication tunnel
  • FIG8 is a schematic diagram of the structure of a communication device provided by the present application.
  • FIG. 9 is another schematic diagram of the structure of the communication device provided in the present application.
  • words such as “first” and “second” are used to distinguish between identical or similar items with substantially the same functions and effects. Those skilled in the art will understand that words such as “first” and “second” do not limit the quantity and execution order, and words such as “first” and “second” do not necessarily limit differences.
  • “And/or” describes the association relationship of associated objects, indicating that three relationships may exist. For example, A and/or B may represent: A exists alone, A and B exist at the same time, and B exists alone. The character “/" generally indicates that the previously associated objects are in an "or” relationship.
  • the fifth generation ( 5th - generation, 5G) mobile communication has put forward more stringent requirements on various network performance indicators. For example, the capacity is increased by 1000 times, the coverage requirements are wider, ultra-high reliability and low latency, etc.
  • the use of high-frequency small base stations to form a network is becoming more and more popular. The propagation characteristics of high-frequency carriers are poor, the attenuation is serious due to obstruction, and the coverage range is not wide, so a large number of small base stations need to be deployed densely.
  • an IAB node can also be called a relay node (RN) or a relay device.
  • An IAB node can provide wireless access services for UEs, and the service data of UEs is transmitted by connecting the IAB node to the IAB donor through a backhaul link.
  • IAB node consists of mobile termination (MT) and distributed unit (DU). That is, IAB node includes MT and DU.
  • IAB node faces its parent node, it can act as MT, i.e., the role of MT; when IAB node faces its child node (child node may be another relay device or UE), it can be regarded as a network device, i.e., the role of DU.
  • IAB donor can be an access network device with complete base station functions, or it can be an access network device in the form of a centralized unit (CU) and DU separated.
  • IAB donor is connected to the core network element that provides services for UE (for example, it is connected to the 5G core network (5G core, 5GC) element) and provides wireless backhaul function for IAB node.
  • IAB-donor CU may be in the form of a control plane (CP) and a user plane (UP) separated.
  • CP control plane
  • UP user plane
  • IAB-donor-CU can be composed of an IAB-donor-CU-CP and one (or more) IAB-donor-CU-UP.
  • one or more IAB nodes may be included on a transmission path between a UE and an IAB donor.
  • Each IAB node not only maintains a backhaul link to the parent node, but also maintains an access link with a child node. If the child node of an IAB node is a UE, the link between the IAB node and the UE is an access link. If the child node of an IAB node is another IAB node, the link between the IAB node and the other IAB nodes is a backhaul link. For example, see the wireless relay scenario shown in FIG1.
  • UE1 accesses IAB node 4 through an access link
  • IAB node 4 is connected to IAB node 3 through a backhaul link
  • IAB node 3 is connected to IAB node 1 through a backhaul link
  • IAB node 1 is connected to the IAB donor through a backhaul link.
  • a black bidirectional arrow represents a backhaul link
  • a gray bidirectional arrow represents an access link.
  • the partial migration technology is introduced.
  • the partial migration technology can be shown in Figure 2.
  • the MT of the boundary node (boundary IAB-node, such as IAB node 2 in Figure 2) (i.e., IAB-MT 2 in Figure 2) switches from one parent node (IAB node 1 in Figure 2) to another parent node (IAB node 3 in Figure 2), and the two parent nodes belong to different topologies controlled by IAB-donor-CUs, i.e., IAB node 1 in Figure 2 belongs to the topology controlled by IAB-donor-CU 1, and IAB node 3 belongs to the topology controlled by IAB-donor-CU 2.
  • IAB-donor-CUs i.e., IAB node 1 in Figure 2 belongs to the topology controlled by IAB-donor-CU 1
  • IAB node 3 belongs to the topology controlled by IAB-donor-CU 2.
  • partial migration The essence of partial migration is that the RRC connection between IAB-MT 2 and IAB-donor-CU is switched from IAB-donor-CU 1 to IAB-donor-CU 2, but the F1 connection between IAB-DU 2 and IAB-donor-CU is still the F1 connection between IAB-donor-CU 1. That is to say, the F1 connection of IAB-DU 2 is still terminated at IAB-donor-CU 1, and is not migrated to IAB-donor-CU 2 along with IAB-MT 2. For the IAB node, its RRC connection is switched, but the F1 connection is not switched. This process can be called partial migration.
  • IAB-donor 1 can be called an IAB donor terminated by the boundary node F1, that is, an F1-terminating IAB-donor of boundary IAB-node.
  • F1 connection of IAB-DU 2 is terminated at IAB-donor-CU 1.
  • IAB-donor 2 can be called an IAB donor terminated by non-F1 of boundary node, that is, Non-F1-terminating IAB-donor of boundary IAB-node. In other words, it is an IAB donor that has an RRC connection with the boundary node, but not an IAB donor that terminates the F1 connection.
  • the topology migration from IAB-donor-CU 1 to IAB-donor-CU 2 is introduced in the Xn interface.
  • the process can refer to the process shown in Figure 2A, which may include:
  • IAB-donor-CU 1 sends an IAB transport migration management request to IAB-donor-CU 2, namely IAB Transport Migration Management Request.
  • IAB-donor-CU 2 sends an IAB transport migration management response, namely, IAB Transport Migration Management Response, to IAB-donor-CU 1.
  • IAB-donor-CU 1 refers to the CU of the F1-terminating IAB-donor
  • IAB-donor-CU 2 refers to the CU of the Non-F1-terminating IAB-donor.
  • CUs can offload data traffic by exchanging information such as the quality of service (QoS) of data traffic and the backhaul adaptation protocol (BAP) configuration information.
  • QoS quality of service
  • BAP backhaul adaptation protocol
  • only the F1-terminating IAB-donor CU can send an IAB transport migration management request to the Non-F1-terminating IAB-donor CU.
  • the IAB node moves with the movement of the vehicle. If the above partial migration continues to be used, the F1 connection with the IAB-DU cannot be maintained all the time due to the limited coverage area of the IAB-donor-CU. Therefore, it is necessary to replace the IAB-donor-CU to which the IAB-DU is connected. This scenario in which both the IAB-MT and the IAB-DU need to be replaced to the same IAB-donor-CU is called full migration.
  • the embodiment of the present application refers to the IAB-donor-CU with a higher deployment status as IAB-donor-CU 1, which may also be referred to as the master IAB-donor-CU (master-IAB-donor-CU, m-IAB-donor-CU).
  • FIG2B a schematic diagram of a scenario in which IAB-donor-CU 1 is deployed can be referred to as shown in FIG2B .
  • IAB-donor-CU 1 has a high deployment status in the network and can be directly connected to the access and mobility management function (AMF) network element.
  • AMF access and mobility management function
  • the uplink data packet may still use the IP address assigned by the source topology (i.e., the topology controlled by IAB-donor-CU 1). If these data packets are directly routed to the heterotopology without processing, they will be filtered as discarded packets by the IP filter in the heterotopology. For example, the IP filter of IAB-donor-DU 2 will discard the data packet whose source IP address belongs to the IP address assigned by IAB-Donor-DU 1. The reason is that IAB-donor-DU 2 does not recognize the IP address assigned by the source topology.
  • a tunnel mechanism between IAB-donor-DUs namely the Inter-Donor-DU tunnel mechanism.
  • This tunnel mechanism solves the problem of heterogeneous topology packet loss by establishing a tunnel between the source IAB-donor-DU and the target IAB-donor-DU. For example, see the tunnel example diagram between IAB-donor-DU 1 and IAB-donor-DU 2 shown in FIG3 .
  • IAB-donor-DU 2 When IAB-donor-DU 2 receives an uplink data packet, it compares the source IP address of the uplink data packet with the whitelist. If the source IP address of the uplink data packets is included in the whitelist, IAB-donor-DU 2 will not filter these uplink data packets, but send these uplink data packets to IAB-donor-DU 1 through the tunnel between IAB-donor-DU 1, and IAB-donor-DU 1 will parse these uplink data packets (because the source IP address is assigned by IAB-donor-DU 1, IAB-donor-DU 1 can identify these uplink data packets), and after parsing, they can be delivered to IAB-donor-CU 1. If the source IP address of the uplink data packets is not included in the whitelist, IAB-donor-DU 2 will filter these uplink data packets and discard them.
  • the tunnel type of the above tunnel can be an IP tunnel type or a GTP-U tunnel type.
  • a GTP-U tunnel it is identified by the node's IP address, UDP port number and the tunnel's TEID.
  • the sending node uses the TEID assigned by the receiving node for point-to-point data transmission, that is, the TEID is included in the GTP-U header added to the outer layer of the data packet.
  • data is transmitted by adding an IP header to the outer layer of the data packet.
  • IP tunnels can be divided into IP in IP and IPSec.
  • IP in IP is to add an IP header to the outer layer of the data packet, and the IP header includes the source IP address and the destination IP address.
  • IPSec is to add encryption verification information on the basis of IP in IP, for example, to add an IP header to the outer layer of the data packet, and the IP header includes encryption verification information.
  • the communication tunnel involved in the embodiment of the present application refers to a tunnel between one IAB-donor-DU and another IAB-donor-DU.
  • the tunnel type of the communication tunnel can be an IP tunnel type or a GTP-U tunnel type.
  • the uplink data packet involved in the embodiment of the present application refers to the data packet from the UE, and the downlink data packet refers to the data packet from the core network element or the parent node.
  • the IAB node may continuously perform partial migration based on IAB-donor-CU 1. For example, see the scenario example diagram shown in Figure 4A.
  • the IAB node initially establishes an F1 connection with IAB-donor-CU 1, and then performs partial migration due to mobility.
  • the RRC connection between the IAB-MT and the IAB-donor-CU is switched from IAB-donor-CU 1 to IAB-donor-CU 2, and then from IAB-donor-CU 2 to IAB-donor-CU 3.
  • the IAB-DU always maintains an F1 connection with IAB-donor-CU 1.
  • IAB-donor-CU 1 Considering the situation that there may be an IP unreachable situation between IAB-donor-CU 1 and IAB-donor-CU 3, that is, data packets cannot be transmitted between IAB-donor-CU 1 and IAB-donor-CU 3 through IP routing, IAB-donor-CU 1 cannot initiate the IAB transmission migration management process to IAB-donor-CU 3 for traffic offloading.
  • IAB-donor-CU 1 cannot initiate the IAB transport migration management process to IAB-donor-CU 3 for traffic offloading, the IAB node will trigger full migration and switch the F1 connection of IAB-DU to IAB-donor-CU 3. This will extend the service interruption delay and affect service stability.
  • the embodiments of the present application provide a communication method and a communication device, which can reduce service interruption delay and help improve service stability.
  • the communication method provided in the embodiments of the present application does not perform full migration, but reduces service interruption delay during partial migration.
  • the embodiments of the present application are not only applicable to the scenario where the IAB node continuously performs partial migration based on IAB-donor-CU 1, but can also be applied to other relay systems besides the IAB system.
  • FIG4B is a diagram showing an example of a system architecture in which an embodiment of the present application is applied.
  • the system architecture shown in FIG4B includes a first host node 401 , a second host node 402 , and a third host node 403 .
  • the first host node 401 is the IAB donor corresponding to the above-mentioned IAB-donor-CU 1.
  • Data packets can be transmitted between the first host node 401 and the second host node 402 through IP routing, that is, the IP between the two is reachable.
  • Data packets cannot be transmitted between the first host node 401 and the third host node 403 through IP routing, that is, the IP between the two is unreachable.
  • the 4B may also include a greater number of host nodes, and the third host node 403 may be any host node in the system that is IP unreachable to the first host node 401.
  • the second host node 402 may be a host node in the system that is directly IP reachable or indirectly IP reachable to the first host node 401.
  • the system shown in FIG4B may further include a core network element 404.
  • the core network element 404 may be used to perform authentication, mobility management, session management, etc. on the UE.
  • the core network element 404 may include, but is not limited to, one or more of the following elements: user plane function (UPF), authentication server function (AUSF), access and mobility management function (AMF), session management function (SMF), policy control function (PCF) and unified data management (UDM).
  • UPF user plane function
  • AUSF authentication server function
  • AMF access and mobility management function
  • SMSF session management function
  • PCF policy control function
  • UDM unified data management
  • the core network element involved in the embodiment of the present application is described by taking the AMF element as an example.
  • the first host node 401 configures a first communication tunnel between the DU of the second host node 402 and the DU of the third host node 403 through the second host node 402 to reduce service interruption delay.
  • a first host node sends first configuration information to a second host node.
  • the second host node receives the first configuration information from the first host node.
  • the first configuration information is used to configure a first communication tunnel, which is a communication tunnel between the DU of the second host node and the DU of the third host node.
  • the first configuration information is used to request the establishment of a first communication tunnel between the DU of the second host node and the DU of the third host node.
  • the first configuration information may include identification information of the third host node.
  • the identification information of the third host node is used by the second host node to find the third host node so as to send the second configuration information to the third host node.
  • the identification information of the third host node may include one or more of the following: an identifier (ID) of the CU of the third host node, an ID of the third host node (i.e., a gNB ID), and an IP address of the CU of the third host node.
  • the second host node sends second configuration information to the third host node.
  • the third host node receives the second configuration information from the second host node.
  • the second configuration information may also include an XnAP ID assigned by the second host node to the IAB-MT, and an XnAP ID assigned by the third host node to the IAB-MT.
  • the XnAP ID assigned by the second host node to the IAB-MT may be an XnAP ID assigned by the CU of the second host node to the IAB-MT;
  • the XnAP ID assigned by the third host node to the IAB-MT may be an XnAP ID assigned by the CU of the third host node to the IAB-MT.
  • the tunnel type of the first communication tunnel carried by the third configuration response information comes from the third configuration information.
  • IAB-donor-DU 2 sends the reserved uplink data packet to IAB-donor-CU 1 through the IP tunnel between IAB-donor-DU 2 and IAB-donor-CU 1.
  • the IP tunnel between IAB-donor-DU 2 and IAB-donor-CU 1 can be understood as an established IP tunnel. Transmission through the IP tunnel can prevent other routing nodes that may exist in the path between IAB-donor-DU 2 and IAB-donor-CU 1 from filtering out the uplink data packet reserved by IAB-donor-DU 2.
  • IAB-donor-DU 2 sends a second downlink data packet to IAB-donor-DU 3 through the first communication tunnel.
  • the embodiments shown in FIG5 and FIG6 take the first host node, the second host node and the third host node as examples, that is, take three host nodes as examples.
  • the number of host nodes may be greater than 3.
  • data packets can be transmitted between the first host node and the second host node via IP routing, which can be extended to the first host node and the second-to-last host node.
  • the first communication tunnel between the second host node and the third host node can be extended to the first communication tunnel between the second-to-last host node and the last host node, and data packets cannot be transmitted between the first host node and the last host node via IP routing.
  • the first tunnel configuration information may also configure the association relationship between multiple communication tunnels, which is used to indicate the corresponding relationship between different communication tunnels, that is, the path for transmitting data packets. For example, when the exit of the current communication tunnel corresponds to multiple communication tunnels, which communication tunnel should be selected as the next communication tunnel.
  • the first tunnel configuration information may be expressed as follows:
  • the first configuration response information may be included in the first tunnel configuration response information, and the first tunnel configuration response information is used to configure multiple communication tunnels and tunnel types.
  • the first tunnel configuration response information is similar to the first tunnel configuration information and is not repeated here. That is to say, the second host node or AMF network element can configure multiple communication tunnels.
  • the first tunnel configuration response information may also include an association relationship between multiple communication tunnels. That is to say, the second host node or AMF network element can configure an association relationship between multiple communication tunnels.
  • the host nodes can obtain the destination IP address based on signaling interaction, and use the destination IP address to identify the next communication tunnel.
  • the host nodes can also obtain TEID and/or UDP port number based on signaling interaction, and use the destination IP address and TEID, or the target IP address and UDP port number, or the target IP address, TEID and UDP port number to identify the next communication tunnel. If the exit of the current communication tunnel corresponds to multiple communication tunnels that can reach the destination IP address, the host node can autonomously select the next communication tunnel.
  • the second host node or AMF network element can be configured with multiple communication tunnels.
  • the second configuration information is included in the second tunnel configuration information, and the second tunnel configuration information is used to configure multiple communication tunnels and tunnel types.
  • the second tunnel configuration information is similar to the first tunnel configuration information and will not be described in detail here.
  • the third configuration response information is included in the third tunnel configuration response information, and the third tunnel configuration response information is used to configure multiple communication tunnels and tunnel types.
  • the third tunnel configuration response information is similar to the first tunnel configuration information, and will not be described in detail here.
  • the third host node may be configured with multiple communication tunnels.
  • the second configuration response information is included in the second tunnel configuration response information, and the second tunnel configuration response information is used to configure multiple communication tunnels and tunnel types.
  • the second tunnel configuration response information is similar to the first tunnel configuration information and will not be described in detail here.
  • the third configuration information is included in the third tunnel configuration information, and the third tunnel configuration information is used to configure multiple communication tunnels and tunnel types.
  • the third tunnel configuration information is similar to the first tunnel configuration information and will not be described in detail here.
  • the OAM device may configure multiple communication tunnels and tunnel types.
  • the OAM device may inform the second host node and/or the third host node of the multiple communication tunnels and tunnel types configured by the OAM device.
  • a first communication tunnel is established between IAB-donor-DU 2 and IAB-donor-DU 3
  • a second communication tunnel is established between IAB-donor-DU 1 and IAB-donor-DU 2.
  • the tunnel types of the first communication tunnel and the second communication tunnel may be the same or different.
  • the uplink data packet transmission process may include:
  • IAB-donor-DU 3 When IAB-donor-DU 3 detects that the destination IP address of the uplink data packet is the IP address of IAB-donor-CU 1, it adds an IP header to the uplink data packet (the destination IP address is the IP address of IAB-donor-DU 2, and the source IP address is the IP address of IAB-donor-DU 3) to obtain the first uplink data packet. It is determined that the first uplink data packet is transmitted through the first communication tunnel. Then, IAB-donor-DU 3 transmits the first uplink data packet to IAB-donor-DU 2 through the first communication tunnel.
  • IAB-donor-DU 2 Upon receiving the first uplink data packet, IAB-donor-DU 2 deletes the IP header of the first uplink data packet to obtain the uplink data packet. IAB-donor-DU 2 may retain the uplink data packet transmitted through the first communication tunnel by default. Alternatively, IAB-donor-DU 2 may use the IP address assigned by IAB-donor-DU 3 as a whitelist, identify the uplink data packet whose source IP address belongs to the whitelist based on the whitelist, and retain the uplink data packet.
  • IAB-donor-DU 2 Based on the IP address, UDP port number and TEID of the second communication tunnel of IAB-donor-DU1, IAB-donor-DU 2 adds a GTP-U header, a UDP header and an outer IP header (the destination IP address is the IP address of IAB-donor-DU 1, and the source IP address is the IP address of IAB-donor-DU 2) to the reserved uplink data packet to obtain the second uplink data packet.
  • IAB-donor-DU 2 sends a second uplink data packet to IAB-donor-DU 1 through a second communication tunnel.
  • IAB-donor-DU 1 Upon receiving the second uplink data packet, IAB-donor-DU 1 deletes the GTP-U header, UDP header, and outer IP header of the second uplink data packet to obtain an uplink data packet. IAB-donor-DU 1 may retain the uplink data packet transmitted through the second communication tunnel by default. Alternatively, IAB-donor-DU 1 may use the IP address assigned by IAB-donor-DU 3 as a whitelist, identify the uplink data packet whose source IP address belongs to the whitelist based on the whitelist, and retain the uplink data packet.
  • IAB-donor-DU 1 adds an outer IP header to the reserved uplink data packet (the destination IP address is the IP address of IAB-donor-DU 1, and the source IP address is the IP address of IAB-donor-DU 1).
  • IAB-donor-CU 1 When IAB-donor-CU 1 detects that the destination IP address of the downlink data packet belongs to the IP address assigned by IAB-donor-DU 3, since IAB-donor-CU 1 and IAB-donor-CU 3 cannot transmit data packets through IP routing, the downlink data packet is routed to the endpoint of the second communication tunnel, i.e., IAB-donor-DU 1.
  • IAB-donor-CU 1 adds an IP header to the downlink data packet (the destination IP address is the IP address of IAB-donor-DU 1, and the source IP address is the IP address of IAB-donor-CU 1) to obtain a first downlink data packet.
  • the first downlink data packet is transmitted to IAB-donor-DU 1 through the IP tunnel between IAB-donor-DU 1 and IAB-donor-DU 1.
  • IAB-donor-DU 1 when receiving the first downlink data packet, deletes the IP header of the first downlink data packet to obtain the downlink data packet.
  • IAB-donor-DU 1 adds a GTP-U header, a UDP header, and an outer IP header (the destination IP address is the IP address of IAB-donor-DU 2, and the source IP address is the IP address of IAB-donor-DU 1) to the downlink data packet based on the IP address, UDP port number, and TEID of the second communication tunnel of IAB-donor-DU 2, and obtains the second downlink data packet.
  • the second downlink data packet is sent to IAB-donor-DU 2 through the second communication tunnel.
  • IAB-donor-DU 2 sends a second downlink data packet to IAB-donor-DU 3 through the first communication tunnel.
  • IAB-donor-DU 3 may optionally delete the IP header of the second downlink data packet to obtain the downlink data packet.
  • IAB-donor-DU 3 may use the IP address of IAB-donor-CU 1 as a whitelist, identify downlink data packets whose source IP addresses belong to the whitelist based on the whitelist, and determine to retain these downlink data packets.
  • IAB-donor-DU 3 retains the downlink data packets transmitted through the first communication tunnel by default.
  • the above describes the uplink data packet transmission process and the downlink data packet transmission process by taking the tunnel type of the first communication tunnel as the IP tunnel type and the tunnel type of the second communication tunnel as the GTP-U tunnel type as an example.
  • the tunnel type of the first communication tunnel is a GTP-U tunnel type
  • the tunnel type of the second communication tunnel is also a GTP-U tunnel type.
  • the data packet transmission process under this mode can integrate the data packet transmission process of the first communication tunnel with a tunnel type of the GTP-U tunnel type and the data packet transmission process of the second communication tunnel with a tunnel type of the GTP-U tunnel type.
  • the tunnel type of the first communication tunnel is an IP tunnel type
  • the tunnel type of the second communication tunnel is also an IP tunnel type.
  • the data packet transmission process under this mode can integrate the data packet transmission process of the first communication tunnel being an IP tunnel type and the data packet transmission process of the second communication tunnel being an IP tunnel type.
  • FIG8 shows a schematic diagram of the structure of a communication device.
  • the communication device 800 may be a host node, or a chip, a chip system, or a processor that supports the host node to implement the above method.
  • the host node may be a first host node, a second host node, or a third host node.
  • the device may be used to implement the method described in the above method embodiment, and the details may refer to the description in the above method embodiment.
  • the communication device 800 may include one or more processors 801, which may also be referred to as a processing unit or a processing module, etc., and may implement certain control functions.
  • the processor 801 may be a general-purpose processor or a dedicated processor, etc.
  • the general-purpose processor may be, for example, a central processing unit
  • the dedicated processor may be, for example, a baseband processor.
  • the baseband processor may be used to process the communication protocol and the communication data
  • the central processing unit may be used to control the communication device (such as a base station, a baseband chip, an MT, a DU or a CU, etc.), execute the software program, and process the data of the software program.
  • the processor 801 may also store instructions 803, and the instructions 803 can be executed by the processor 801, so that the communication device 800 executes the method described in the above method embodiment.
  • the processor 801 may include a transceiver unit for implementing the receiving and sending functions.
  • the transceiver unit may be a transceiver circuit or an interface.
  • the transceiver circuit, interface or interface circuit for implementing the receiving and sending functions may be separate or integrated.
  • the above-mentioned transceiver circuit or interface may be used for reading and writing instructions, or the above-mentioned transceiver circuit or interface may be used for signal transmission.
  • the communication device 800 may include one or more memories 802, on which instructions 804 may be stored, and the instructions 804 may be executed on the processor 801, so that the communication device 800 performs the method described in the above method embodiment.
  • data may also be stored in the memory 802.
  • instructions and/or data may also be stored in the processor 801.
  • the processor 801 and the memory 802 may be provided separately or integrated together. For example, the corresponding relationship described in the above method embodiment may be stored in the memory 802, or in the processor 801.
  • the communication device 800 may further include a transceiver 805 and/or an antenna 806.
  • the transceiver 805 may be referred to as a transceiver unit, a transceiver, a transceiver circuit, a transceiver device or a transceiver module, etc., and is used to implement a transceiver function.
  • the communication device 800 when the communication device 800 is a relay device, it may include various functional modules for executing the steps performed by the relay device or IAB node in the method embodiment.
  • the communication device 800 when the communication device 800 is a first host node, it may include various functional modules for executing the steps performed by the first host node in the method embodiment.
  • the communication device 800 when the communication device 800 is a second host node, it can include various functional modules for executing the method Steps performed by the second host node in the embodiment.
  • one or more units in FIG. 9 may be implemented by one or more processors, or by one or more processors and memories; or by one or more processors and transceivers; or by one or more processors, memories, and transceivers, which are not limited in the embodiments of the present application.
  • the processors, memories, and transceivers may be provided separately or integrated.
  • the systems, devices and methods described in the present application can also be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
  • Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A communication method and a communication device, capable of reducing the service interruption delay and improving the service stability in a scenario where a first donor node and a third donor node cannot transmit data by means of Internet protocol (IP) routing. The method comprises: a first donor node sending first configuration information, wherein the first configuration information comprises identification information of a third donor node, the first configuration information is used for configuring a first communication tunnel, and the first communication tunnel is a communication tunnel between a distributed unit (DU) of a second donor node and a DU of the third donor node; and receiving first configuration response information, wherein the first configuration response information comprises an address allocated by the third donor node.

Description

通信方法及通信装置Communication method and communication device
本申请要求在2022年12月29日提交中国国家知识产权局、申请号为202211728626.5的中国专利申请的优先权,发明名称为“通信方法及通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the State Intellectual Property Office of China on December 29, 2022, with application number 202211728626.5, and priority to the Chinese patent application with the invention name “Communication Method and Communication Device”, all contents of which are incorporated by reference in this application.
技术领域Technical Field
本申请涉及通信技术领域,尤其涉及一种通信方法及通信装置。The present application relates to the field of communication technology, and in particular to a communication method and a communication device.
背景技术Background technique
接入回传一体化(integrated access and backhaul,IAB)不仅可以满足大量密集部署基站的需求,还能满足灵活部署光纤的需求并节省光纤部署成本。IAB是一种中继方案,可包括IAB节点(IAB node)和IAB宿主(IAB donor),IAB donor为IAB node的宿主节点。其中,IAB node也可以称为中继设备或中继节点等,IAB node的子节点可以是另一IAB node或用户设备(user equipment,UE),IAB node的父节点可以是IAB donor或另一IAB node。IAB node由移动终端(mobile termination,MT)部分和分布式单元(distributed unit,DU)部分组成,这两部分可分别表示为IAB-MT和IAB-DU。当IAB node面向其父节点时,作为IAB-MT;当IAB node面向其子节点时,作为IAB-DU。IAB donor也可以称为宿主设备或宿主节点或宿主基站(donor gNodeB,DgNB)等。IAB donor由集中式单元(centralized unit,CU)部分和DU部分组成,这两部分可分别表示为IAB-donor-CU和IAB-donor-DU。Integrated access and backhaul (IAB) can not only meet the needs of densely deployed base stations, but also meet the needs of flexible deployment of optical fibers and save the cost of optical fiber deployment. IAB is a relay solution that can include an IAB node and an IAB donor. The IAB donor is the host node of the IAB node. Among them, the IAB node can also be called a relay device or a relay node, etc. The child node of the IAB node can be another IAB node or a user equipment (UE), and the parent node of the IAB node can be an IAB donor or another IAB node. The IAB node consists of a mobile terminal (MT) part and a distributed unit (DU) part, which can be represented as IAB-MT and IAB-DU respectively. When the IAB node faces its parent node, it acts as an IAB-MT; when the IAB node faces its child node, it acts as an IAB-DU. IAB donor can also be called a host device, host node, or host base station (donor gNodeB, DgNB), etc. IAB donor consists of a centralized unit (CU) and a DU, which can be represented as IAB-donor-CU and IAB-donor-DU, respectively.
目前,在IAB网络中,为了进一步增强网络鲁棒性,以及实现更加精细的负载均衡和拓扑管理,引入部分迁移(partial migration)技术。进一步的,考虑IAB node的移动性,为了减少切换F1连接的IAB-donor-CU的次数,引入在网络中部署更高地位的IAB-donor-CU的方案,能够在更大的区域内保持与IAB-DU之间的F1连接,使得partial migration实现更大范围的移动性,从而减少切换F1连接的IAB-donor-CU的次数。At present, in order to further enhance the robustness of the network and achieve more sophisticated load balancing and topology management, partial migration technology is introduced in the IAB network. Furthermore, considering the mobility of the IAB node, in order to reduce the number of switching the IAB-donor-CU of the F1 connection, a solution of deploying a higher-ranking IAB-donor-CU in the network is introduced, which can maintain the F1 connection with the IAB-DU in a larger area, so that partial migration can achieve a wider range of mobility, thereby reducing the number of switching the IAB-donor-CU of the F1 connection.
在部署有更高地位的IAB-donor-CU的网络拓扑中,可能存在该IAB-donor-CU与某个IAB-donor之间互联网协议(internet protocol,IP)不可达的情况。例如IAB node 2与IAB-donor-CU建立F1连接,由于IAB node 2的移动,IAB node 2进行了partial migration,IAB-MT 2的RRC连接从IAB-donor-CU切换到IAB-donor-CU 2,再从IAB-donor-CU 2切换至IAB-donor-CU 3,IAB-DU 2一直与IAB-donor-CU保持F1连接,但IAB-donor-CU与IAB donor3之间IP不可到。IAB-donor-CU与IAB donor3之间IP不可达,导致IAB node 2将触发完全迁移(full migration)技术,将IAB-DU 2的F1连接切换至IAB-donor-CU 3,进而将增加业务中断时延,影响业务稳定性。In a network topology where a higher-ranking IAB-donor-CU is deployed, there may be a situation where the Internet protocol (IP) between the IAB-donor-CU and a certain IAB-donor is unreachable. For example, IAB node 2 establishes an F1 connection with IAB-donor-CU. Due to the movement of IAB node 2, IAB node 2 performs partial migration. The RRC connection of IAB-MT 2 is switched from IAB-donor-CU to IAB-donor-CU 2, and then from IAB-donor-CU 2 to IAB-donor-CU 3. IAB-DU 2 has always maintained an F1 connection with IAB-donor-CU, but the IP between IAB-donor-CU and IAB donor 3 is unreachable. The IP between IAB-donor-CU and IAB donor3 is unreachable, causing IAB node 2 to trigger full migration technology and switch the F1 connection of IAB-DU 2 to IAB-donor-CU 3, which will increase the service interruption delay and affect service stability.
发明内容Summary of the invention
本申请实施例提供一种通信方法及通信装置,可以减少业务中断时延,有助于提高业务稳定性。The embodiments of the present application provide a communication method and a communication device, which can reduce service interruption delay and help improve service stability.
第一方面,本申请实施例提供一种通信方法,该方法可由第一宿主节点执行,或由与第一宿主节点匹配的装置执行,例如由处理器、芯片或芯片***等执行。该方法可包括:第一宿主节点发送第一配置信息,第一配置信息包括第三宿主节点的标识信息;第一配置信息用于配置第一通信隧道,第一通信隧道为第二宿主节点的DU与第三宿主节点的DU之间的通信隧道;接收第一配置响应信息,第一配置响应信息包括第三宿主节点分配的地址。In a first aspect, an embodiment of the present application provides a communication method, which can be executed by a first host node, or by a device matching the first host node, such as a processor, a chip, or a chip system. The method may include: the first host node sends first configuration information, the first configuration information includes identification information of a third host node; the first configuration information is used to configure a first communication tunnel, the first communication tunnel is a communication tunnel between a DU of a second host node and a DU of a third host node; and receives first configuration response information, the first configuration response information includes an address assigned by the third host node.
可见,第一宿主节点通过配置第二宿主节点的DU与第三宿主节点的DU之间的第一通信隧道,以减少业务中断时延,有助于提高业务稳定性。第一配置响应信息包括第三宿主节点分配的地址,以便第一宿主节点可以获知第三宿主节点为其子节点分配的地址,进而不会丢弃针对这些地址的下行链路数据包。It can be seen that the first host node reduces the service interruption delay by configuring the first communication tunnel between the DU of the second host node and the DU of the third host node, which helps to improve service stability. The first configuration response information includes the address assigned by the third host node, so that the first host node can know the address assigned by the third host node to its child node, and thus will not discard the downlink data packets for these addresses.
在一种可能的实现方式中,第一配置信息还用于配置第一通信隧道的隧道类型,第一通信隧道的隧道类型包括IP隧道类型或通用分组无线业务用户面隧道协议(general packet radio service tunnel protocol-user plane,GTP-U)隧道类型。对于不同的隧道类型,下行链路数据包和/或上行链路数据包的处理方式有所不同。In a possible implementation, the first configuration information is further used to configure a tunnel type of the first communication tunnel, where the tunnel type of the first communication tunnel includes an IP tunnel type or a general packet radio service tunnel protocol-user plane (GTP-U) tunnel type. For different tunnel types, downlink data packets and/or uplink data packets are processed differently.
在一种可能的实现方式中,第一配置信息包含于第一隧道配置信息,第一隧道配置信息用于配置多个通信隧道以及隧道类型,这多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第一隧道配置信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。可选的,第一隧道配置信息配置的隧道类型可包括第二通信隧道的隧道类型,以便第一宿主节点对下行链路数据包和/或上行链路 数据包进行相应的处理。In one possible implementation, the first configuration information is included in the first tunnel configuration information, and the first tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the first tunnel configuration information so as to establish communication tunnels between DUs of adjacent host nodes is conducive to further improving the stability of the service. Optionally, the tunnel type configured by the first tunnel configuration information may include the tunnel type of the second communication tunnel so that the first host node can receive downlink data packets and/or uplink data packets. The data packet is processed accordingly.
可选的,第一隧道配置信息还用于配置上述多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the first tunnel configuration information is also used to configure the association relationship between the multiple communication tunnels. The routing path is determined by configuring the association relationship between the multiple communication tunnels.
在一种可能的实现方式中,第一配置响应信息包含于第一隧道配置响应信息,第一隧道配置响应信息用于配置多个通信隧道以及隧道类型,这多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第一隧道配置响应信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。可选的,第一隧道配置响应信息配置的隧道类型可包括第二通信隧道的隧道类型,以便第一宿主节点对下行链路数据包和/或上行链路数据包进行相应的处理。可选的,第一隧道配置响应信息还用于配置上述多个通信隧道之间的关联关系,以便第一宿主节点基于该关联关系,可以确定路由路径。In a possible implementation, the first configuration response information is included in the first tunnel configuration response information, and the first tunnel configuration response information is used to configure multiple communication tunnels and tunnel types. The multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the first tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business. Optionally, the tunnel type configured by the first tunnel configuration response information may include the tunnel type of the second communication tunnel, so that the first host node performs corresponding processing on the downlink data packet and/or the uplink data packet. Optionally, the first tunnel configuration response information is also used to configure the association relationship between the above-mentioned multiple communication tunnels, so that the first host node can determine the routing path based on the association relationship.
在一种可能的实现方式中,上述方法还包括:在检测到下行链路数据包的目标地址属于第三宿主节点分配的地址时,即检测到向第三宿主节点的子节点发送的下行链路数据包时,确定该下行链路数据包通过第一通信隧道和/或第二通信隧道传输,以减少该下行链路数据包被丢弃的概率。在配置第一通信隧道的情况下,确定该下行链路数据包通过第一通信隧道传输。在配置第一通信隧道和第二通信隧道的情况下,确定该下行链路数据包通过第一通信隧道和第二通信隧道传输。在配置第二通信隧道的情况下,确定该下行链路数据包通过第二通信隧道传输。In a possible implementation, the method further includes: when it is detected that the target address of the downlink data packet belongs to the address assigned by the third host node, that is, when a downlink data packet sent to a child node of the third host node is detected, it is determined that the downlink data packet is transmitted through the first communication tunnel and/or the second communication tunnel to reduce the probability of the downlink data packet being discarded. In the case of configuring the first communication tunnel, it is determined that the downlink data packet is transmitted through the first communication tunnel. In the case of configuring the first communication tunnel and the second communication tunnel, it is determined that the downlink data packet is transmitted through the first communication tunnel and the second communication tunnel. In the case of configuring the second communication tunnel, it is determined that the downlink data packet is transmitted through the second communication tunnel.
在一种可能的实现方式中,上述方法还包括:保留通过第二通信隧道传输的上行链路数据包,避免该上行链路数据包被丢弃;或,保留源地址属于第三宿主节点分配的地址的上行链路数据包,以避免该上行链路数据包被丢弃。In one possible implementation, the method further includes: retaining an uplink data packet transmitted through the second communication tunnel to prevent the uplink data packet from being discarded; or retaining an uplink data packet whose source address belongs to an address assigned by a third host node to prevent the uplink data packet from being discarded.
其中,上行链路数据包指的是来自终端设备的数据包,下行链路数据包指的是来自核心网网元或父节点的数据包。Among them, uplink data packets refer to data packets from terminal devices, and downlink data packets refer to data packets from core network elements or parent nodes.
在一种可能的实现方式中,第一宿主节点在发送第一配置信息时,向第二宿主节点发送所述第一配置信息。相应的,第一宿主节点在接收第一配置响应信息时,接收来自第二宿主节点的第一配置响应信息。也就是说,第一宿主节点通过第二宿主节点向第三宿主节点配置第一通信隧道。In a possible implementation, when the first host node sends the first configuration information, it sends the first configuration information to the second host node. Correspondingly, when the first host node receives the first configuration response information, it receives the first configuration response information from the second host node. In other words, the first host node configures the first communication tunnel to the third host node through the second host node.
在另一种可能的实现方式中,第一宿主节点在发送第一配置信息时,向核心网网元发送所述第一配置信息。相应的,第一宿主节点在接收第一配置响应信息时,接收来自核心网网元的第一配置响应信息。也就是说,第一宿主节点通过核心网网元向第三宿主节点配置第一通信隧道。In another possible implementation, when sending the first configuration information, the first host node sends the first configuration information to the core network element. Correspondingly, when receiving the first configuration response information, the first host node receives the first configuration response information from the core network element. That is, the first host node configures the first communication tunnel to the third host node through the core network element.
在一种可能的实现方式中,第一配置信息还包括第一宿主节点的地址。第一宿主节点的地址指的是第一宿主节点的CU的IP地址。In a possible implementation, the first configuration information further includes an address of the first host node. The address of the first host node refers to an IP address of a CU of the first host node.
在一种可能的实现方式中,第一配置响应信息还包括第三宿主节点的地址。也就是说,第一配置响应信息不仅可以包括第三宿主节点分配的地址,还可以包括第三宿主节点的地址。In a possible implementation, the first configuration response information further includes the address of the third host node. That is, the first configuration response information may include not only the address allocated by the third host node, but also the address of the third host node.
在一种可能的实现方式中,第一宿主节点在发送第一配置信息时,在第一宿主节点与第三宿主节点之间无法通过IP路由传输数据包时,发送第一配置信息。第一宿主节点与第三宿主节点之间无法通过IP路由传输数据包,即第一宿主节点与第三宿主节点之间的IP不可达,从而通过第一配置信息配置第一通信隧道,以便第一宿主节点与第三宿主节点之间可以传输数据包。第一宿主节点与第三宿主节点之间的IP不可达,可能发生在中继设备与宿主节点之间的无线资源控制(radio resource control,RRC)连接从第一宿主节点切换至第二宿主节点,再由第二宿主节点切换至第三宿主节点的场景中,该场景中中继设备与第一宿主节点保持F1连接。In a possible implementation, when the first host node sends the first configuration information, when the first host node and the third host node cannot transmit data packets through IP routing, the first host node sends the first configuration information. The first host node and the third host node cannot transmit data packets through IP routing, that is, the IP between the first host node and the third host node is unreachable, so the first communication tunnel is configured through the first configuration information so that data packets can be transmitted between the first host node and the third host node. The IP unreachability between the first host node and the third host node may occur in a scenario where the radio resource control (RRC) connection between the relay device and the host node is switched from the first host node to the second host node, and then from the second host node to the third host node, in which the relay device maintains an F1 connection with the first host node.
第二方面,本申请实施例提供一种通信方法,该方法可由第三宿主节点执行,或由与第三宿主节点匹配的装置执行,例如由处理器、芯片或芯片***等执行。该方法可包括:第三宿主节点接收第二配置信息,第二配置信息用于配置第一通信隧道,第一通信隧道为第二宿主节点的DU与第三宿主节点的DU之间的通信隧道;发送第二配置响应信息,第二配置响应信息包括第三宿主节点分配的地址。In a second aspect, an embodiment of the present application provides a communication method, which can be executed by a third host node, or by a device matching the third host node, such as a processor, a chip, or a chip system. The method may include: the third host node receives second configuration information, the second configuration information is used to configure a first communication tunnel, the first communication tunnel is a communication tunnel between the DU of the second host node and the DU of the third host node; sends second configuration response information, the second configuration response information includes an address assigned by the third host node.
可见,第三宿主节点可基于第二配置信息,配置第一通信隧道,以减少业务中断时延,有助于提高业务稳定性。It can be seen that the third host node can configure the first communication tunnel based on the second configuration information to reduce the service interruption delay, which helps to improve service stability.
在一种可能的实现方式中,第三宿主节点接收第二配置信息时,接收来自第二宿主节点的第二配置信息。相应的,第三宿主节点发送第二配置响应信息时,向第二宿主节点发送第二配置响应信息。也就是说,第三宿主节点通过第二宿主节点接收用于配置第一通信隧道的配置信息,并通过第二宿主节点向第一宿主节点反馈分配的地址。In a possible implementation, when the third host node receives the second configuration information, it receives the second configuration information from the second host node. Correspondingly, when the third host node sends the second configuration response information, it sends the second configuration response information to the second host node. In other words, the third host node receives the configuration information for configuring the first communication tunnel through the second host node, and feeds back the allocated address to the first host node through the second host node.
可选的,第二配置信息还用于配置第一通信隧道的隧道类型;和/或,第二配置响应信息还包括第一通 信隧道的隧道类型。也就是说,第二宿主节点可以配置第一通信隧道的隧道类型,和/或,第三宿主节点可以配置第一通信隧道的隧道类型。使得第一通信隧道的隧道类型的配置具有灵活性。Optionally, the second configuration information is further used to configure the tunnel type of the first communication tunnel; and/or the second configuration response information also includes the first communication tunnel type. That is, the second host node can configure the tunnel type of the first communication tunnel, and/or the third host node can configure the tunnel type of the first communication tunnel, so that the configuration of the tunnel type of the first communication tunnel is flexible.
可选的,第一通信隧道的隧道类型为GTP-U隧道类型,第二配置信息还包括第二宿主节点的地址、第二宿主节点分配的用户数据报协议(user data protocol,UDP)端口信息和用于标识第一通信隧道的隧道端点标识(tunnel end point identifier,TEID)。Optionally, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the second configuration information also includes an address of a second host node, user datagram protocol (UDP) port information allocated by the second host node, and a tunnel endpoint identifier (TEID) for identifying the first communication tunnel.
可选的,第一通信隧道的隧道类型为GTP-U隧道类型,第二配置响应信息还包括第三宿主节点的地址、第三宿主节点分配的UDP端口信息和用于标识第一通信隧道的TEID。Optionally, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the second configuration response information further includes an address of a third host node, UDP port information allocated by the third host node, and a TEID used to identify the first communication tunnel.
也就是说,在第一通信隧道的隧道类型为GTP-U隧道类型时,第二宿主节点可通过第二配置信息告知第三宿主节点,该GTP-U隧道在第二宿主节点侧的信息(即第二宿主节点的地址、第二宿主节点的UDP端口信息以及该GTP-U隧道的TEID)。和/或,第三宿主节点可通过第二配置响应信息告知第二宿主节点,该GTP-U隧道在第三宿主节点侧的信息(即第三宿主节点的地址、第三宿主节点的UDP端口信息以及该GTP-U隧道的TEID)。That is, when the tunnel type of the first communication tunnel is a GTP-U tunnel type, the second host node may inform the third host node of the information of the GTP-U tunnel on the second host node side (i.e., the address of the second host node, the UDP port information of the second host node, and the TEID of the GTP-U tunnel) through the second configuration information. And/or, the third host node may inform the second host node of the information of the GTP-U tunnel on the third host node side (i.e., the address of the third host node, the UDP port information of the third host node, and the TEID of the GTP-U tunnel) through the second configuration response information.
在另一种可能的实现方式中,第三宿主节点接收第二配置信息时,接收来自核心网网元的第二配置信息。相应的,第三宿主节点发送第二配置响应信息时,向核心网网元发送第二配置响应信息。也就是说,第三宿主节点通过核心网网元接收用于配置第一通信隧道的配置信息,并通过核心网网元向第一宿主节点反馈分配的地址。In another possible implementation, when the third host node receives the second configuration information, it receives the second configuration information from the core network element. Correspondingly, when the third host node sends the second configuration response information, it sends the second configuration response information to the core network element. That is, the third host node receives the configuration information for configuring the first communication tunnel through the core network element, and feeds back the allocated address to the first host node through the core network element.
可选的,第二配置信息还用于配置第一通信隧道的隧道类型。也就是说,核心网网元可以配置第一通信隧道的隧道类型。Optionally, the second configuration information is also used to configure the tunnel type of the first communication tunnel. That is, the core network element can configure the tunnel type of the first communication tunnel.
在一种可能的实现方式中,第二配置信息包含于第二隧道配置信息,第二隧道配置信息用于配置多个通信隧道以及隧道类型,这多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第二隧道配置信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。可选的,第二隧道配置信息配置的隧道类型可包括第二通信隧道的隧道类型。In a possible implementation, the second configuration information is included in the second tunnel configuration information, and the second tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the second tunnel configuration information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business. Optionally, the tunnel type configured by the second tunnel configuration information may include the tunnel type of the second communication tunnel.
可选的,第二隧道配置信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the second tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第二配置响应信息包含于第二隧道配置响应信息,第二隧道配置响应信息用于配置多个通信隧道以及隧道类型,这多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第二隧道配置响应信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。可选的,第二隧道配置响应信息配置的隧道类型可包括第二通信隧道的隧道类型。In a possible implementation, the second configuration response information is included in the second tunnel configuration response information, and the second tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the second tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business. Optionally, the tunnel type configured by the second tunnel configuration response information may include the tunnel type of the second communication tunnel.
可选的,第二隧道配置响应信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the second tunnel configuration response information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,上述方法还包括:向第二宿主节点发送第三配置信息,第三配置信息包括第三宿主节点分配的地址;接收来自第二宿主节点的第三配置响应信息,第三配置响应信息用于响应第三配置信息。该方法的前提条件是第三宿主节点接收来自核心网网元的第二配置信息,向核心网网元发送第二配置响应信息。第三宿主节点向第二宿主节点提供第三宿主节点分配的地址,以便第二宿主节点将这些地址作为不丢弃上行链路数据包的白名单。In a possible implementation, the method further includes: sending third configuration information to the second host node, the third configuration information including the address assigned by the third host node; receiving third configuration response information from the second host node, the third configuration response information being used to respond to the third configuration information. The premise of the method is that the third host node receives the second configuration information from the core network element and sends the second configuration response information to the core network element. The third host node provides the second host node with the address assigned by the third host node so that the second host node uses these addresses as a whitelist for not discarding uplink data packets.
可选的,第三配置信息包括第一通信隧道的隧道类型。也就是说,第三宿主节点可以配置第一通信隧道的隧道类型。Optionally, the third configuration information includes the tunnel type of the first communication tunnel. That is, the third host node can configure the tunnel type of the first communication tunnel.
可选的,第一通信隧道的隧道类型为GTP-U隧道类型,第三配置信息还包括第三宿主节点的地址、第三宿主节点分配的UDP端口信息和用于标识第一通信隧道的TEID。Optionally, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the third configuration information further includes an address of a third host node, UDP port information allocated by the third host node, and a TEID used to identify the first communication tunnel.
在一种可能的实现方式中,第三配置信息包含于第三隧道配置信息,第三隧道配置信息用于配置多个通信隧道以及隧道类型,这多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道;隧道类型包括第二通信隧道的隧道类型。通过第三隧道配置信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。可选的,第三隧道配置信息配置的隧道类型可包括第二通信隧道的隧道类型。In a possible implementation, the third configuration information is included in the third tunnel configuration information, and the third tunnel configuration information is used to configure multiple communication tunnels and tunnel types, the multiple communication tunnels include a first communication tunnel and a second communication tunnel, the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node; the tunnel type includes the tunnel type of the second communication tunnel. Configuring multiple communication tunnels and tunnel types through the third tunnel configuration information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business. Optionally, the tunnel type configured by the third tunnel configuration information may include the tunnel type of the second communication tunnel.
可选的,第三隧道配置信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the third tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第三配置响应信息包括第一通信隧道的隧道类型。也就是说,第二宿主节 点可以配置第一通信隧道的隧道类型。In a possible implementation, the third configuration response information includes the tunnel type of the first communication tunnel. The point can configure the tunnel type of the first communication tunnel.
可选的,第一通信隧道的隧道类型为GTP-U隧道类型,第三配置响应信息还包括第二宿主节点的地址、第二宿主节点的UDP端口信息和用于标识第一通信隧道的TEID。Optionally, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the third configuration response information further includes an address of the second host node, UDP port information of the second host node, and a TEID for identifying the first communication tunnel.
在一种可能的实现方式中,第三配置响应信息包含于第三隧道配置响应信息,第三隧道配置响应信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道;隧道类型包括第二通信隧道的隧道类型。通过第三隧道配置响应信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。可选的,第三隧道配置响应信息配置的隧道类型可包括第二通信隧道的隧道类型。In a possible implementation, the third configuration response information is included in the third tunnel configuration response information, and the third tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, the multiple communication tunnels include a first communication tunnel and a second communication tunnel, the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node; the tunnel type includes the tunnel type of the second communication tunnel. Configuring multiple communication tunnels and tunnel types through the third tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business. Optionally, the tunnel type configured by the third tunnel configuration response information may include the tunnel type of the second communication tunnel.
可选的,第三隧道配置响应信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the third tunnel configuration response information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第二配置响应信息还包括第三宿主节点的地址。In a possible implementation manner, the second configuration response information further includes an address of the third host node.
在一种可能的实现方式中,第二配置信息还包括第一宿主节点的地址;上述方法还包括:In a possible implementation manner, the second configuration information further includes an address of the first host node; and the method further includes:
在检测到上行链路数据包的目的地址与第一宿主节点的地址相同时,通过第一通信隧道向第二宿主节点发送上行链路数据包。也就是说,第一宿主节点的地址的作用是,在检测到目的地址为第一宿主节点的地址的上行链路数据包时,可以通过第一通信隧道向第二宿主节点发送该上行链路数据包。即第一宿主节点的地址,用于第三宿主节点识别出需要通过第一通信隧道进行传输的上行链路数据包。When it is detected that the destination address of the uplink data packet is the same as the address of the first host node, the uplink data packet is sent to the second host node through the first communication tunnel. In other words, the address of the first host node is used to send the uplink data packet to the second host node through the first communication tunnel when the uplink data packet with the destination address of the first host node is detected. That is, the address of the first host node is used for the third host node to identify the uplink data packet that needs to be transmitted through the first communication tunnel.
在一种可能的实现方式中,上述方法还包括:保留通过第一通信隧道传输的下行链路数据包,以避免该下行链路数据包被丢弃;或,保留源地址与第一宿主节点的地址相同的下行链路数据包,以避免该下行链路数据包被丢弃。In one possible implementation, the method further includes: retaining a downlink data packet transmitted through the first communication tunnel to avoid the downlink data packet being discarded; or, retaining a downlink data packet having a source address identical to the address of the first host node to avoid the downlink data packet being discarded.
其中,上行链路数据包指的是来自终端设备的数据包,下行链路数据包指的是来自核心网网元或父节点的数据包。Among them, uplink data packets refer to data packets from terminal devices, and downlink data packets refer to data packets from core network elements or parent nodes.
第三方面,本申请实施例提供一种通信方法,该方法可由第二宿主节点执行,或由与第二宿主节点匹配的装置执行,例如由处理器、芯片或芯片***等执行。该方法可包括:第二宿主节点接收来自第一宿主节点的第一配置信息,第一配置信息包括第三宿主节点的标识信息;第一配置信息用于配置第一通信隧道,第一通信隧道为第二宿主节点的DU与第三宿主节点的DU之间的通信隧道;基于第三宿主节点的标识信息,向第三宿主节点发送第二配置信息,第二配置信息用于配置第一通信隧道;接收来自第三宿主节点的第二配置响应信息,第二配置响应信息包括第三宿主节点分配的地址;向第一宿主节点发送第一配置响应信息,第一配置响应信息包括第三宿主节点分配的地址。In a third aspect, an embodiment of the present application provides a communication method, which can be executed by a second host node, or by a device matching the second host node, such as a processor, a chip, or a chip system. The method may include: the second host node receives first configuration information from the first host node, the first configuration information includes identification information of a third host node; the first configuration information is used to configure a first communication tunnel, the first communication tunnel is a communication tunnel between a DU of the second host node and a DU of the third host node; based on the identification information of the third host node, second configuration information is sent to the third host node, the second configuration information is used to configure the first communication tunnel; second configuration response information is received from the third host node, the second configuration response information includes an address assigned by the third host node; first configuration response information is sent to the first host node, the first configuration response information includes an address assigned by the third host node.
可见,第一宿主节点通过第二宿主节点向第三宿主节点发送用于配置第一通信隧道的配置信息,第三宿主节点通过第二宿主节点向第一宿主节点发送分配的地址,从而减少业务中断时延,有助于提高业务稳定性。It can be seen that the first host node sends configuration information for configuring the first communication tunnel to the third host node through the second host node, and the third host node sends the assigned address to the first host node through the second host node, thereby reducing business interruption delay and helping to improve business stability.
在一种可能的实现方式中,第一配置信息还用于配置第一通信隧道的隧道类型。也就是说,第一宿主节点可以配置第一通信隧道的隧道类型。In a possible implementation, the first configuration information is also used to configure the tunnel type of the first communication tunnel. That is, the first host node can configure the tunnel type of the first communication tunnel.
在一种可能的实现方式中,第二配置信息还用于配置第一通信隧道的隧道类型。也就是说,第二宿主节点可以配置第一通信隧道的隧道类型。In a possible implementation, the second configuration information is also used to configure the tunnel type of the first communication tunnel. That is, the second host node can configure the tunnel type of the first communication tunnel.
在一种可能的实现方式中,第二配置响应信息还包括第一通信隧道的隧道类型。也就是说,第三宿主节点可以配置第一通信隧道的隧道类型。In a possible implementation, the second configuration response information further includes the tunnel type of the first communication tunnel. That is, the third host node can configure the tunnel type of the first communication tunnel.
可选的,第一通信隧道的隧道类型为GTP-U隧道类型,第二配置信息还包括第二宿主节点的地址、第二宿主节点分配的UDP端口信息和用于标识第一通信隧道的TEID。Optionally, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the second configuration information further includes an address of the second host node, UDP port information allocated by the second host node, and a TEID used to identify the first communication tunnel.
可选的,第一通信隧道的隧道类型为GTP-U隧道类型,第二配置响应信息还包括第三宿主节点的地址、第三宿主节点分配的UDP端口信息和用于标识第一通信隧道的TEID。Optionally, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the second configuration response information further includes an address of a third host node, UDP port information allocated by the third host node, and a TEID used to identify the first communication tunnel.
在一种可能的实现方式中,第一配置信息包含于第一隧道配置信息,第一隧道配置信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第一隧道配置信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。In a possible implementation, the first configuration information is included in the first tunnel configuration information, and the first tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the first tunnel configuration information so as to establish communication tunnels between DUs of adjacent host nodes is conducive to further improving the stability of the service.
可选的,第一隧道配置信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the first tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第一配置响应信息包含于第一隧道配置响应信息,第一隧道配置响应信息 用于配置多个通信隧道以及隧道类型,这多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第一隧道配置响应信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。可选的,第一隧道配置响应信息配置的隧道类型可包括第二通信隧道的隧道类型,以便第一宿主节点对下行链路数据包和/或上行链路数据包进行相应的处理。可选的,第一隧道配置响应信息还用于配置上述多个通信隧道之间的关联关系,以便第一宿主节点基于该关联关系,可以确定路由路径。In a possible implementation manner, the first configuration response information is included in the first tunnel configuration response information. Used to configure multiple communication tunnels and tunnel types, the multiple communication tunnels include a first communication tunnel and a second communication tunnel, the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Multiple communication tunnels and tunnel types are configured through the first tunnel configuration response information to establish communication tunnels between the DUs of adjacent host nodes, which is conducive to further improving the stability of the business. Optionally, the tunnel type configured by the first tunnel configuration response information may include the tunnel type of the second communication tunnel, so that the first host node performs corresponding processing on the downlink data packet and/or the uplink data packet. Optionally, the first tunnel configuration response information is also used to configure the association relationship between the above-mentioned multiple communication tunnels, so that the first host node can determine the routing path based on the association relationship.
在一种可能的实现方式中,第二配置信息包含于第二隧道配置信息,第二隧道配置信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第二隧道配置信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。In a possible implementation, the second configuration information is included in the second tunnel configuration information, and the second tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the second tunnel configuration information so as to establish communication tunnels between DUs of adjacent host nodes is conducive to further improving the stability of the service.
可选的,第二隧道配置信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the second tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第二配置响应信息包含于第二隧道配置响应信息,第二隧道配置响应信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第二隧道配置响应信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。In a possible implementation, the second configuration response information is included in the second tunnel configuration response information, and the second tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the second tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the service.
可选的,第二隧道配置响应信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the second tunnel configuration response information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第一配置信息还包括第一宿主节点的地址。这样,第二宿主节点在获得第一宿主节点的地址的情况下,可以保留源地址为第一宿主节点的地址的下行链路数据包,避免该下行链路数据包被丢弃,并通过第一通信隧道向第三宿主节点传输该下行链路数据包。In a possible implementation, the first configuration information also includes the address of the first host node. In this way, when the second host node obtains the address of the first host node, it can retain the downlink data packet whose source address is the address of the first host node to avoid the downlink data packet being discarded, and transmit the downlink data packet to the third host node through the first communication tunnel.
可选的,第二配置信息还包括第一宿主节点的地址。也就是说,第二宿主节点在获得第一宿主节点的地址的情况下,可以将第一宿主节点的地址告知第三宿主节点。Optionally, the second configuration information further includes the address of the first host node. That is, when the second host node obtains the address of the first host node, it can inform the third host node of the address of the first host node.
在一种可能的实现方式中,上述方法还包括:保留源地址与第一宿主节点的地址相同的下行链路数据包,避免该下行链路数据包被丢弃,并通过第一通信隧道向第三宿主节点传输该下行链路数据包。In a possible implementation, the method further includes: retaining a downlink data packet having a source address identical to the address of the first host node to prevent the downlink data packet from being discarded, and transmitting the downlink data packet to a third host node through the first communication tunnel.
在另一种可能的实现方式中,上述方法还包括:保留通过第二通信隧道传输的下行链路数据包。也就是说,对于第二通信隧道传输的下行链路数据包,第二宿主节点可以默认保留,以减少业务中断的概率。In another possible implementation, the method further includes: retaining the downlink data packet transmitted through the second communication tunnel. That is, for the downlink data packet transmitted through the second communication tunnel, the second host node may retain it by default to reduce the probability of service interruption.
在一种可能的实现方式中,上述方法还包括:保留通过第一通信隧道传输的上行链路数据包,以避免丢弃通过第一通信隧道传输的上行链路数据包;或,保留源地址属于第三宿主节点分配的地址的上行链路数据包,以避免丢弃来自第三宿主节点的子节点的上行链路数据包。In one possible implementation, the method further includes: retaining uplink data packets transmitted through the first communication tunnel to avoid discarding uplink data packets transmitted through the first communication tunnel; or, retaining uplink data packets whose source addresses belong to the addresses assigned by the third host node to avoid discarding uplink data packets from child nodes of the third host node.
在一种可能的实现方式中,第一配置响应信息还包括第三宿主节点的地址。也就是说,第一配置响应信息不仅可以包括第三宿主节点分配的地址,还可以包括第三宿主节点的地址。In a possible implementation, the first configuration response information further includes the address of the third host node. That is, the first configuration response information may include not only the address allocated by the third host node, but also the address of the third host node.
在一种可能的实现方式中,第二配置响应消息还包括第三宿主节点的地址。也就是说,第二配置响应信息不仅可以包括第三宿主节点分配的地址,还可以包括第三宿主节点的地址。In a possible implementation, the second configuration response message further includes the address of the third host node. That is, the second configuration response message may include not only the address allocated by the third host node, but also the address of the third host node.
第四方面,本申请实施例提供一种通信方法,该方法可由第二宿主节点执行,或由与第二宿主节点匹配的装置执行,例如由处理器、芯片或芯片***等执行。该方法可包括:第二宿主节点接收来自第三宿主节点的第三配置信息,第三配置信息包括第三宿主节点分配的地址;向第三宿主节点发送第三配置响应信息,第三配置响应信息用于响应第三配置信息。In a fourth aspect, an embodiment of the present application provides a communication method, which can be executed by a second host node, or by a device matching the second host node, such as a processor, a chip, or a chip system. The method may include: the second host node receives third configuration information from a third host node, the third configuration information includes an address assigned by the third host node; and sends third configuration response information to the third host node, the third configuration response information is used to respond to the third configuration information.
可见,第三宿主节点向第二宿主节点提供第三宿主节点分配的地址,以便第二宿主节点将这些地址作为不丢弃上行链路数据包的白名单。It can be seen that the third host node provides the second host node with the addresses allocated by the third host node, so that the second host node uses these addresses as a whitelist for not discarding uplink data packets.
在一种可能的实现方式中,第三配置信息包括第一通信隧道的隧道类型。也就是说,第三宿主节点可以配置第一通信隧道的隧道类型。In a possible implementation, the third configuration information includes the tunnel type of the first communication tunnel. That is, the third host node can configure the tunnel type of the first communication tunnel.
可选的,第一通信隧道的隧道类型为GTP-U隧道类型,第三配置信息还包括第三宿主节点的地址、第三宿主节点分配的UDP端口信息和用于标识第一通信隧道的TEID。Optionally, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the third configuration information further includes an address of a third host node, UDP port information allocated by the third host node, and a TEID used to identify the first communication tunnel.
在一种可能的实现方式中,第三配置信息包含于第三隧道配置信息,第三隧道配置信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道;隧道类型包括第二通信隧道的隧道类型。通过第三隧道配置信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。 In a possible implementation, the third configuration information is included in the third tunnel configuration information, and the third tunnel configuration information is used to configure multiple communication tunnels and tunnel types, the multiple communication tunnels include a first communication tunnel and a second communication tunnel, the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node; the tunnel type includes the tunnel type of the second communication tunnel. Configuring multiple communication tunnels and tunnel types through the third tunnel configuration information so as to establish communication tunnels between DUs of adjacent host nodes is conducive to further improving the stability of the service.
可选的,第三隧道配置信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the third tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第三配置响应信息包括第一通信隧道的隧道类型。也就是说,第二宿主节点可以配置第一通信隧道的隧道类型。In a possible implementation, the third configuration response information includes the tunnel type of the first communication tunnel. That is, the second host node can configure the tunnel type of the first communication tunnel.
可选的,第一通信隧道的隧道类型为GTP-U隧道类型,第三配置响应信息还包括第二宿主节点的地址、第二宿主节点的UDP端口信息和用于标识第一通信隧道的TEID。Optionally, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the third configuration response information further includes an address of the second host node, UDP port information of the second host node, and a TEID for identifying the first communication tunnel.
在一种可能的实现方式中,第三配置响应信息包含于第三隧道配置响应信息,第三隧道配置响应信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道;隧道类型包括第二通信隧道的隧道类型。通过第三隧道配置响应信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。In a possible implementation, the third configuration response information is included in the third tunnel configuration response information, and the third tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, the multiple communication tunnels include a first communication tunnel and a second communication tunnel, the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node; the tunnel type includes the tunnel type of the second communication tunnel. Configuring multiple communication tunnels and tunnel types through the third tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the service.
可选的,第三隧道配置响应信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the third tunnel configuration response information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,上述方法还包括:获取第一宿主节点的地址,并保留源地址与第一宿主节点的地址相同的下行链路数据包,以避免该下行链路数据包被丢弃,并通过第一通信隧道向第三宿主节点传输该下行链路数据包。In one possible implementation, the method further includes: obtaining the address of the first host node, retaining a downlink data packet whose source address is the same as the address of the first host node to avoid the downlink data packet being discarded, and transmitting the downlink data packet to a third host node through the first communication tunnel.
在一种可能的实现方式中,上述方法还包括:保留通过第二通信隧道传输的下行链路数据包。也就是说,对于第二通信隧道传输的下行链路数据包,第二宿主节点可以默认保留,以减少业务中断的概率。In a possible implementation, the method further includes: retaining the downlink data packet transmitted through the second communication tunnel. That is, for the downlink data packet transmitted through the second communication tunnel, the second host node may retain it by default to reduce the probability of service interruption.
在一种可能的实现方式中,上述方法还包括:保留通过第一通信隧道传输的上行链路数据包,以避免丢弃通过第一通信隧道传输的上行链路数据包;或,保留源地址属于第三宿主节点分配的地址的上行链路数据包,以避免丢弃来自第三宿主节点的子节点的上行链路数据包。In one possible implementation, the method further includes: retaining uplink data packets transmitted through the first communication tunnel to avoid discarding uplink data packets transmitted through the first communication tunnel; or, retaining uplink data packets whose source addresses belong to the addresses assigned by the third host node to avoid discarding uplink data packets from child nodes of the third host node.
第五方面,本申请实施例提供一种通信方法,该方法可由核心网网元执行,或由与核心网网元匹配的装置执行,例如由处理器、芯片或芯片***等执行。该方法可包括:核心网网元接收来自第一宿主节点的第一配置信息,第一配置信息包括第三宿主节点的标识信息;第一配置信息用于配置第一通信隧道,第一通信隧道为第二宿主节点的DU与第三宿主节点的DU之间的通信隧道;基于第三宿主节点的标识信息,向第三宿主节点发送第二配置信息,第二配置信息用于配置第一通信隧道;接收来自第三宿主节点的第二配置响应信息,第二配置响应信息包括第三宿主节点分配的地址;向第一宿主节点发送第一配置响应信息,第一配置响应信息包括第三宿主节点分配的地址。In a fifth aspect, an embodiment of the present application provides a communication method, which can be executed by a core network element, or by a device matching the core network element, such as a processor, a chip, or a chip system. The method may include: the core network element receives first configuration information from a first host node, the first configuration information includes identification information of a third host node; the first configuration information is used to configure a first communication tunnel, the first communication tunnel is a communication tunnel between a DU of a second host node and a DU of a third host node; based on the identification information of the third host node, second configuration information is sent to the third host node, the second configuration information is used to configure the first communication tunnel; second configuration response information is received from the third host node, the second configuration response information includes an address assigned by the third host node; first configuration response information is sent to the first host node, the first configuration response information includes an address assigned by the third host node.
可见,第一宿主节点通过核心网网元向第三宿主节点发送用于配置第一通信隧道的配置信息,第三宿主节点通过核心网网元向第一宿主节点发送分配的地址,从而减少业务中断时延,有助于提高业务稳定性。It can be seen that the first host node sends configuration information for configuring the first communication tunnel to the third host node through the core network network element, and the third host node sends the allocated address to the first host node through the core network network element, thereby reducing service interruption delay and helping to improve service stability.
在一种可能的实现方式中,第一配置信息还用于配置第一通信隧道的隧道类型。也就是说,第一宿主节点可以配置第一通信隧道的隧道类型。In a possible implementation, the first configuration information is also used to configure the tunnel type of the first communication tunnel. That is, the first host node can configure the tunnel type of the first communication tunnel.
在一种可能的实现方式中,第二配置信息还用于配置第一通信隧道的隧道类型。也就是说,核心网网元可以配置第一通信隧道的隧道类型。In a possible implementation, the second configuration information is further used to configure the tunnel type of the first communication tunnel. That is, the core network element can configure the tunnel type of the first communication tunnel.
在一种可能的实现方式中,第二配置响应信息还包括第一通信隧道的隧道类型。也就是说,第三宿主节点可以配置第一通信隧道的隧道类型。In a possible implementation, the second configuration response information further includes the tunnel type of the first communication tunnel. That is, the third host node can configure the tunnel type of the first communication tunnel.
在一种可能的实现方式中,第一配置信息包含于第一隧道配置信息,第一隧道配置信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第一隧道配置信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。In a possible implementation, the first configuration information is included in the first tunnel configuration information, and the first tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the first tunnel configuration information so as to establish communication tunnels between DUs of adjacent host nodes is conducive to further improving the stability of the service.
可选的,第一隧道配置信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the first tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第一配置响应信息包含于第一隧道配置响应信息,第一隧道配置响应信息用于配置多个通信隧道以及隧道类型,这多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第一隧道配置响应信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。可选的,第一隧道配置响应信息配置的隧道类型可包括第二通信隧道的隧道类型,以便第一宿主节点对下行链路数据包和/或上行链路数据包进行相应的处理。可选的,第一隧道配置响应信息还用于配置上述多个通信隧道之间的关联关系,以便第一宿主节点基于该关联关系,可以确定路由路径。 In a possible implementation, the first configuration response information is included in the first tunnel configuration response information, and the first tunnel configuration response information is used to configure multiple communication tunnels and tunnel types. The multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the first tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the business. Optionally, the tunnel type configured by the first tunnel configuration response information may include the tunnel type of the second communication tunnel, so that the first host node performs corresponding processing on the downlink data packet and/or the uplink data packet. Optionally, the first tunnel configuration response information is also used to configure the association relationship between the above-mentioned multiple communication tunnels, so that the first host node can determine the routing path based on the association relationship.
在一种可能的实现方式中,第二配置信息包含于第二隧道配置信息,第二隧道配置信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第二隧道配置信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。In a possible implementation, the second configuration information is included in the second tunnel configuration information, and the second tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the second tunnel configuration information so as to establish communication tunnels between DUs of adjacent host nodes is conducive to further improving the stability of the service.
可选的,第二隧道配置信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the second tunnel configuration information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第二配置响应信息包含于第二隧道配置响应信息,第二隧道配置响应信息用于配置多个通信隧道以及隧道类型,多个通信隧道包括第一通信隧道和第二通信隧道,第二通信隧道为第一宿主节点的DU与第二宿主节点的DU之间的通信隧道。通过第二隧道配置响应信息配置多个通信隧道以及隧道类型,以便建立相邻宿主节点的DU之间的通信隧道,有利于进一步提高业务的稳定性。In a possible implementation, the second configuration response information is included in the second tunnel configuration response information, and the second tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include a first communication tunnel and a second communication tunnel, and the second communication tunnel is a communication tunnel between the DU of the first host node and the DU of the second host node. Configuring multiple communication tunnels and tunnel types through the second tunnel configuration response information so as to establish a communication tunnel between the DUs of adjacent host nodes is conducive to further improving the stability of the service.
可选的,第二隧道配置响应信息还用于配置多个通信隧道之间的关联关系。通过配置多个通信隧道之间的关联关系,以便确定路由路径。Optionally, the second tunnel configuration response information is also used to configure associations between multiple communication tunnels, so as to determine a routing path.
在一种可能的实现方式中,第一配置信息还包括第一宿主节点的地址。In a possible implementation manner, the first configuration information further includes an address of the first host node.
可选的,第二配置信息还包括第一宿主节点的地址。也就是说,核心网网元在获得第一宿主节点的地址的情况下,可以将第一宿主节点的地址告知第三宿主节点。Optionally, the second configuration information further includes the address of the first host node. That is, when the core network element obtains the address of the first host node, it can inform the third host node of the address of the first host node.
在一种可能的实现方式中,第一配置响应信息还包括第三宿主节点的地址。也就是说,第一配置响应信息不仅可以包括第三宿主节点分配的地址,还可以包括第三宿主节点的地址。In a possible implementation, the first configuration response information further includes the address of the third host node. That is, the first configuration response information may include not only the address allocated by the third host node, but also the address of the third host node.
在一种可能的实现方式中,第二配置响应消息还包括第三宿主节点的地址。也就是说,第二配置响应信息不仅可以包括第三宿主节点分配的地址,还可以包括第三宿主节点的地址。In a possible implementation, the second configuration response message further includes the address of the third host node. That is, the second configuration response message may include not only the address allocated by the third host node, but also the address of the third host node.
第六方面,本申请提供了一种通信装置,该通信装置可以是第一宿主节点,也可以是第一宿主节点中的装置,或者是能够和第一宿主节点匹配使用的装置。其中,该通信装置还可以为芯片***。该通信装置可执行第一方面所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或模块。该单元或模块可以是软件和/或硬件。该通信装置执行的操作及有益效果可以参见上述第一方面所述的方法以及有益效果。In a sixth aspect, the present application provides a communication device, which may be a first host node, or a device in the first host node, or a device that can be used in combination with the first host node. The communication device may also be a chip system. The communication device may execute the method described in the first aspect. The functions of the communication device may be implemented by hardware, or by hardware executing corresponding software. The hardware or software includes one or more units or modules corresponding to the above functions. The unit or module may be software and/or hardware. The operations and beneficial effects performed by the communication device may refer to the method and beneficial effects described in the first aspect above.
第七方面,本申请提供了一种通信装置,该通信装置可以是第三宿主节点,也可以是第三宿主节点中的装置,或者是能够和第三宿主节点匹配使用的装置。其中,该通信装置还可以为芯片***。该通信装置可执行第二方面所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或模块。该单元或模块可以是软件和/或硬件。该通信装置执行的操作及有益效果可以参见上述第二方面所述的方法以及有益效果。In the seventh aspect, the present application provides a communication device, which may be a third host node, or a device in the third host node, or a device that can be used in combination with the third host node. The communication device may also be a chip system. The communication device may execute the method described in the second aspect. The functions of the communication device may be implemented by hardware, or by hardware executing corresponding software implementations. The hardware or software includes one or more units or modules corresponding to the above functions. The unit or module may be software and/or hardware. The operations and beneficial effects performed by the communication device may refer to the method and beneficial effects described in the second aspect above.
第八方面,本申请提供了一种通信装置,该通信装置可以是第二宿主节点,也可以是第二宿主节点中的装置,或者是能够和第二宿主节点匹配使用的装置。其中,该通信装置还可以为芯片***。该通信装置可执行第三方面或第四方面所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或模块。该单元或模块可以是软件和/或硬件。该通信装置执行的操作及有益效果可以参见上述第三方面或第四方面所述的方法以及有益效果。In an eighth aspect, the present application provides a communication device, which may be a second host node, or a device in the second host node, or a device that can be used in combination with the second host node. The communication device may also be a chip system. The communication device may execute the method described in the third aspect or the fourth aspect. The functions of the communication device may be implemented by hardware, or by hardware executing corresponding software implementations. The hardware or software includes one or more units or modules corresponding to the above functions. The unit or module may be software and/or hardware. The operations and beneficial effects performed by the communication device may refer to the methods and beneficial effects described in the third aspect or the fourth aspect above.
第九方面,本申请提供了一种通信装置,该通信装置可以是核心网网元,也可以是核心网网元中的装置,或者是能够和核心网网元匹配使用的装置。其中,该通信装置还可以为芯片***。该通信装置可执行第五方面所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或模块。该单元或模块可以是软件和/或硬件。该通信装置执行的操作及有益效果可以参见上述第五方面所述的方法以及有益效果。In the ninth aspect, the present application provides a communication device, which may be a core network element, or a device in a core network element, or a device that can be used in combination with a core network element. The communication device may also be a chip system. The communication device may execute the method described in the fifth aspect. The functions of the communication device may be implemented by hardware, or by hardware executing corresponding software. The hardware or software includes one or more units or modules corresponding to the above functions. The unit or module may be software and/or hardware. The operations and beneficial effects performed by the communication device may refer to the method and beneficial effects described in the fifth aspect above.
第十方面,本申请提供了一种通信装置,通信装置包括处理器,处理器与存储器耦合,存储器用于存储程序或指令,当程序或指令被处理器执行时,使得通信装置执行第一方面至第五方面中任一方面所述的方法。In the tenth aspect, the present application provides a communication device, which includes a processor, the processor is coupled to a memory, and the memory is used to store programs or instructions. When the program or instructions are executed by the processor, the communication device executes the method described in any one of the first to fifth aspects.
第十一方面,本申请提供了一种通信装置,通信装置包括处理器和接口电路,所述接口电路用于接收来自所述通信装置之外的其它通信装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述通信装置之外的其它通信装置,所述处理器通过逻辑电路或执行代码指令用于实现如第一方面至第五方面中任一方面所述的方法。In the eleventh aspect, the present application provides a communication device, which includes a processor and an interface circuit, wherein the interface circuit is used to receive signals from other communication devices outside the communication device and transmit them to the processor or send signals from the processor to other communication devices outside the communication device, and the processor is used to implement the method described in any one of the first to fifth aspects through logic circuits or execution code instructions.
第十二方面,本申请提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机程序或指令,当所述计算机程序或指令被通信装置执行时,实现如第一方面至第五方面中任一方面所述的方法。In the twelfth aspect, the present application provides a computer-readable storage medium, in which a computer program or instructions are stored. When the computer program or instructions are executed by a communication device, the method described in any one of the first to fifth aspects is implemented.
第十三方面,本申请提供一种包括指令的计算机程序产品,当通信装置读取并执行该指令时,使得通 信装置执行如第一方面至第五方面中任一方面中任意一项的方法。In a thirteenth aspect, the present application provides a computer program product comprising instructions, when a communication device reads and executes the instructions, the communication device The communication device executes the method as described in any one of the first to fifth aspects.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是无线中继场景的示意图;FIG1 is a schematic diagram of a wireless relay scenario;
图2是一种部分迁移的示例图;FIG2 is an example diagram of a partial migration;
图2A是一种IAB传输迁移管理的流程示意图;FIG2A is a schematic diagram of a process flow of IAB transmission migration management;
图2B是部署有IAB-donor-CU 1的场景示意图;FIG2B is a schematic diagram of a scenario in which IAB-donor-CU 1 is deployed;
图3是IAB-donor-DU 1与IAB-donor-DU 2之间的隧道示例图;Figure 3 is an example diagram of the tunnel between IAB-donor-DU 1 and IAB-donor-DU 2;
图4A是IAB node基于IAB-donor-CU 1连续执行partial migration的场景示例图;FIG4A is a diagram showing an example of a scenario in which the IAB node continuously performs partial migration based on IAB-donor-CU 1;
图4B是应用本申请实施例的一种***架构示例图;FIG4B is a diagram showing an example of a system architecture using an embodiment of the present application;
图5是本申请实施例提供的一种通信方法的流程示意图;FIG5 is a flow chart of a communication method provided in an embodiment of the present application;
图6是本申请实施例提供的另一种通信方法的流程示意图;FIG6 is a flow chart of another communication method provided in an embodiment of the present application;
图7A是一种通信隧道的示意图;FIG7A is a schematic diagram of a communication tunnel;
图7B是另一种通信隧道的示意图;FIG7B is a schematic diagram of another communication tunnel;
图8是本申请提供的通信装置的结构示意图;FIG8 is a schematic diagram of the structure of a communication device provided by the present application;
图9是本申请提供的通信装置的另一种结构示意图。FIG. 9 is another schematic diagram of the structure of the communication device provided in the present application.
具体实施方式Detailed ways
在本申请中,“第一”、“第二”等字样用于对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。In the present application, words such as "first" and "second" are used to distinguish between identical or similar items with substantially the same functions and effects. Those skilled in the art will understand that words such as "first" and "second" do not limit the quantity and execution order, and words such as "first" and "second" do not necessarily limit differences. "And/or" describes the association relationship of associated objects, indicating that three relationships may exist. For example, A and/or B may represent: A exists alone, A and B exist at the same time, and B exists alone. The character "/" generally indicates that the previously associated objects are in an "or" relationship.
应当理解,本申请中,“至少一个”指的是一个或多个;“多个”是指两个或两个以上。此外,本申请的“等于”可以与“大于”连用,也可以与“小于”连用。在“等于”与“大于”连用的情况下,采用“大于”的技术方案;在“等于”与“小于”连用的情况下,采用“小于”的技术方案。It should be understood that in this application, "at least one" means one or more; "plurality" means two or more. In addition, "equal to" in this application can be used in conjunction with "greater than" or "less than". When "equal to" is used in conjunction with "greater than", the technical solution of "greater than" is adopted; when "equal to" is used in conjunction with "less than", the technical solution of "less than" is adopted.
下面先对本申请涉及的相关名称或术语进行阐述,以便于本领域技术人员理解。The following is an explanation of the relevant names or terms involved in this application to facilitate understanding by those skilled in the art.
1,IAB网络1. IAB Network
第五代(5th-generation,5G)移动通信相比***(4th-generation,4G)移动通信,对网络各项性能指标提出了更严苛的要求。例如,容量提升1000倍,更广的覆盖需求、超高可靠低时延等。一方面,考虑到高频载波频率资源丰富,在热点区域,为满足5G超高容量需求,利用高频小站组网愈发流行。高频载波传播特性较差,受遮挡衰减严重,覆盖范围不广,故而需要大量密集部署小站,相应地,为这些大量密集部署的小站提供光纤回传的代价很高,施工难度大,因此需要经济便捷的回传方案。另一方面,从广覆盖需求的角度出发,在一些偏远地区提供网络覆盖,光纤的部署难度大,成本高,也需要设计灵活便利的接入和回传方案。IAB技术为解决上述两个问题提供了思路:其接入链路(access link)和回传链路(backhaul link)皆采用无线传输方案,减少了光纤部署。Compared with the fourth generation (4G) mobile communication, the fifth generation ( 5th - generation, 5G) mobile communication has put forward more stringent requirements on various network performance indicators. For example, the capacity is increased by 1000 times, the coverage requirements are wider, ultra-high reliability and low latency, etc. On the one hand, considering the rich high-frequency carrier frequency resources, in hot spots, in order to meet the ultra-high capacity requirements of 5G, the use of high-frequency small base stations to form a network is becoming more and more popular. The propagation characteristics of high-frequency carriers are poor, the attenuation is serious due to obstruction, and the coverage range is not wide, so a large number of small base stations need to be deployed densely. Correspondingly, the cost of providing optical fiber backhaul for these densely deployed small base stations is very high, and the construction is difficult, so an economical and convenient backhaul solution is needed. On the other hand, from the perspective of wide coverage requirements, in some remote areas, network coverage is provided, and the deployment of optical fiber is difficult and costly, and flexible and convenient access and backhaul solutions need to be designed. IAB technology provides ideas for solving the above two problems: its access link and backhaul link both use wireless transmission solutions, which reduces the deployment of optical fiber.
在IAB网络中,IAB节点(IAB node)也可以称为中继节点(relay node,RN)或中继设备等。IAB node可以为UE提供无线接入服务,UE的业务数据由IAB node通过回传链路连接到IAB donor传输。In an IAB network, an IAB node can also be called a relay node (RN) or a relay device. An IAB node can provide wireless access services for UEs, and the service data of UEs is transmitted by connecting the IAB node to the IAB donor through a backhaul link.
IAB node由移动终端(mobile termination,MT)部分和分布式单元(distributed unit,DU)部分组成。也就是说,IAB node包括MT和DU。其中,当IAB node面向其父节点时,可以作为MT,即MT的角色;当IAB node面向其子节点(子节点可能是另一个中继设备或UE)时,可以被视为网络设备,即DU的角色。IAB node consists of mobile termination (MT) and distributed unit (DU). That is, IAB node includes MT and DU. When IAB node faces its parent node, it can act as MT, i.e., the role of MT; when IAB node faces its child node (child node may be another relay device or UE), it can be regarded as a network device, i.e., the role of DU.
IAB donor可以是一个具有完整基站功能的接入网设备,还可以是集中式单元(centralized unit,CU)和DU分离形态的接入网设备。IAB donor连接到为UE提供服务的核心网网元(例如连接到5G核心网(5G core,5GC)网元),并为IAB node提供无线回传功能。其中,IAB-donor CU可能是控制面(control plane,CP)和用户面(user plane,UP)分离的形态。例如,IAB-donor-CU可由一个IAB-donor-CU-CP和一个(或多个)IAB-donor-CU-UP组成。IAB donor can be an access network device with complete base station functions, or it can be an access network device in the form of a centralized unit (CU) and DU separated. IAB donor is connected to the core network element that provides services for UE (for example, it is connected to the 5G core network (5G core, 5GC) element) and provides wireless backhaul function for IAB node. Among them, IAB-donor CU may be in the form of a control plane (CP) and a user plane (UP) separated. For example, IAB-donor-CU can be composed of an IAB-donor-CU-CP and one (or more) IAB-donor-CU-UP.
IAB node经IAB donor连接到核心网。例如,在独立组网(standalone,SA)的5G架构下,IAB node经IAB donor连接到5GC网元。在非独立组网(non-standalone,NSA)(例如,双连接(dual connectivity,DC)或多连接(multi-connectivity,MC))的5G架构下,在主路径上,IAB node可以经演进型基站(evolved  NodeB,eNB)连接到演进分组核心网(evolved packet core,EPC),也可以经IAB donor连接到5G核心网。The IAB node is connected to the core network via the IAB donor. For example, in a standalone (SA) 5G architecture, the IAB node is connected to the 5GC network element via the IAB donor. In a non-standalone (NSA) 5G architecture (e.g., dual connectivity (DC) or multi-connectivity (MC)), on the primary path, the IAB node can be connected to the core network via an evolved base station (ENB). The NodeB (eNB) is connected to the evolved packet core (EPC) and can also be connected to the 5G core network via the IAB donor.
在IAB网络中,在UE与IAB donor之间的一条传输路径上,可以包含一个或多个IAB node。每个IAB node不仅维护面向父节点的回传链路,还维护与子节点的接入链路。若IAB node的子节点是UE,该IAB node与UE之间的链路是接入链路。若IAB node的子节点是其他IAB node,该IAB node与其他IAB node之间的链路是回传链路。示例性的,可参见图1所示的无线中继场景,在路径“UE1→IAB node 4→IAB node 3→IAB node 1→IAB donor”中,UE1通过接入链路接入IAB node 4,IAB node 4通过回传链路连接IAB node 3,IAB node 3通过回传链路连接IAB node 1,IAB node 1通过回传链路连接IAB donor。图1中,黑色双向箭头表示回传链路,灰色双向箭头表示接入链路。In the IAB network, one or more IAB nodes may be included on a transmission path between a UE and an IAB donor. Each IAB node not only maintains a backhaul link to the parent node, but also maintains an access link with a child node. If the child node of an IAB node is a UE, the link between the IAB node and the UE is an access link. If the child node of an IAB node is another IAB node, the link between the IAB node and the other IAB nodes is a backhaul link. For example, see the wireless relay scenario shown in FIG1. In the path "UE1→IAB node 4→IAB node 3→IAB node 1→IAB donor", UE1 accesses IAB node 4 through an access link, IAB node 4 is connected to IAB node 3 through a backhaul link, IAB node 3 is connected to IAB node 1 through a backhaul link, and IAB node 1 is connected to the IAB donor through a backhaul link. In FIG1, a black bidirectional arrow represents a backhaul link, and a gray bidirectional arrow represents an access link.
IAB node可以分为接入IAB node和中间IAB node。接入IAB node是指UE接入的IAB node,中间IAB node是指为UE或IAB node提供回传服务的IAB node。示例性的,可参见图1,在路径“UE1→IAB node 4→IAB node 3→IAB node 1→IAB donor”中,IAB node 4是接入IAB node,IAB node 3和IAB node 1是中间IAB node。需要说明的是,一个IAB node针对接入该IAB node的UE而言,是接入IAB node;一个IAB node针对接入其他IAB node的UE而言,是中间IAB node。一个IAB node是接入IAB node还是中间IAB node,并不是固定的,视具体的应用场景而定。IAB nodes can be divided into access IAB nodes and intermediate IAB nodes. Access IAB nodes refer to IAB nodes accessed by UEs, and intermediate IAB nodes refer to IAB nodes that provide backhaul services for UEs or IAB nodes. For example, see Figure 1. In the path "UE1→IAB node 4→IAB node 3→IAB node 1→IAB donor", IAB node 4 is an access IAB node, and IAB node 3 and IAB node 1 are intermediate IAB nodes. It should be noted that an IAB node is an access IAB node for UEs accessing the IAB node; an IAB node is an intermediate IAB node for UEs accessing other IAB nodes. Whether an IAB node is an access IAB node or an intermediate IAB node is not fixed and depends on the specific application scenario.
本申请实施例中的宿主节点可以是IAB donor,IAB donor的CU和DU可采用分离架构或不采用分离架构,视具体情况而定。The host node in the embodiment of the present application may be an IAB donor, and the CU and DU of the IAB donor may adopt a separate architecture or not, depending on the specific circumstances.
2,部分迁移(partial migration)2. Partial migration
在IAB网络中,为了进一步增强网络鲁棒性,以及实现更加精细的负载均衡和拓扑管理,引入partial migration技术。示例性的,部分迁移技术可参见图2所示。In the IAB network, in order to further enhance the network robustness and achieve more sophisticated load balancing and topology management, the partial migration technology is introduced. For example, the partial migration technology can be shown in Figure 2.
部分迁移技术中,边界节点(boundary IAB-node,例如图2中的IAB node 2)的MT(即图2中的IAB-MT 2)从一个父节点(图2中的IAB node 1)切换到另一个父节点(图2中的IAB node 3),这两个父节点分属不同的IAB-donor-CU控制的拓扑,即图2中IAB node 1属于IAB-donor-CU 1控制的拓扑,IAB node 3属于IAB-donor-CU 2控制的拓扑。部分迁移的本质在于,IAB-MT 2与IAB-donor-CU之间的RRC连接从IAB-donor-CU 1切换至IAB-donor-CU 2,但是IAB-DU 2与IAB-donor-CU之间的F1连接依然为与IAB-donor-CU 1之间的F1连接。也就是说,IAB-DU 2的F1连接仍然终结在IAB-donor-CU 1,并没有随IAB-MT 2一起迁移至IAB-donor-CU 2。对于IAB node而言,其RRC连接发生切换,但是F1连接并没有发生切换,该过程可以称为partial migration。In the partial migration technology, the MT of the boundary node (boundary IAB-node, such as IAB node 2 in Figure 2) (i.e., IAB-MT 2 in Figure 2) switches from one parent node (IAB node 1 in Figure 2) to another parent node (IAB node 3 in Figure 2), and the two parent nodes belong to different topologies controlled by IAB-donor-CUs, i.e., IAB node 1 in Figure 2 belongs to the topology controlled by IAB-donor-CU 1, and IAB node 3 belongs to the topology controlled by IAB-donor-CU 2. The essence of partial migration is that the RRC connection between IAB-MT 2 and IAB-donor-CU is switched from IAB-donor-CU 1 to IAB-donor-CU 2, but the F1 connection between IAB-DU 2 and IAB-donor-CU is still the F1 connection between IAB-donor-CU 1. That is to say, the F1 connection of IAB-DU 2 is still terminated at IAB-donor-CU 1, and is not migrated to IAB-donor-CU 2 along with IAB-MT 2. For the IAB node, its RRC connection is switched, but the F1 connection is not switched. This process can be called partial migration.
图2中,IAB-donor 1可以称为边界节点F1所终结的IAB donor,即F1-terminating IAB-donor of boundary IAB-node。也就是说,IAB-DU 2的F1连接终结在IAB-donor-CU 1。图2中,IAB-donor 2可以称为边界节点非F1所终结的IAB donor,即Non-F1-terminating IAB-donor of boundary IAB-node。也就是说,与边界节点存在RRC连接的IABdonor,而非F1连接终结的IAB donor。In Figure 2, IAB-donor 1 can be called an IAB donor terminated by the boundary node F1, that is, an F1-terminating IAB-donor of boundary IAB-node. In other words, the F1 connection of IAB-DU 2 is terminated at IAB-donor-CU 1. In Figure 2, IAB-donor 2 can be called an IAB donor terminated by non-F1 of boundary node, that is, Non-F1-terminating IAB-donor of boundary IAB-node. In other words, it is an IAB donor that has an RRC connection with the boundary node, but not an IAB donor that terminates the F1 connection.
为了实现UE数据流程,从IAB-donor-CU 1控制的拓扑迁移到IAB-donor-CU 2控制的拓扑,在Xn接口引入IAB传输迁移管理(即IAB Transport Migration Management)过程。该过程可参考图2A所示的流程,该流程可包括:In order to realize the UE data flow, the topology migration from IAB-donor-CU 1 to IAB-donor-CU 2 is introduced in the Xn interface. The process can refer to the process shown in Figure 2A, which may include:
201,IAB-donor-CU 1向IAB-donor-CU 2发送IAB传输迁移管理请求,即IAB Transport Migration Management Request。201, IAB-donor-CU 1 sends an IAB transport migration management request to IAB-donor-CU 2, namely IAB Transport Migration Management Request.
202,IAB-donor-CU 2向IAB-donor-CU 1发送IAB传输迁移管理响应,即IAB Transport Migration Management Response。202. IAB-donor-CU 2 sends an IAB transport migration management response, namely, IAB Transport Migration Management Response, to IAB-donor-CU 1.
图2A中,IAB-donor-CU 1指的是F1-terminating IAB-donor的CU,IAB-donor-CU 2指的是Non-F1-terminating IAB-donor的CU。In Figure 2A, IAB-donor-CU 1 refers to the CU of the F1-terminating IAB-donor, and IAB-donor-CU 2 refers to the CU of the Non-F1-terminating IAB-donor.
基于图2A所示的流程,CU之间可以通过交互数据流量的服务质量(quality of service,QoS),以及自适应回传协议(backhaul adaptation protocol,BAP)配置信息等信息,来实现数据流量的卸载(offloading)。并且,在IAB Transport Migration Management过程中,只能F1-terminating IAB-donor的CU向Non-F1-terminating IAB-donor的CU发送IAB传输迁移管理请求。Based on the process shown in Figure 2A, CUs can offload data traffic by exchanging information such as the quality of service (QoS) of data traffic and the backhaul adaptation protocol (BAP) configuration information. In addition, during the IAB Transport Migration Management process, only the F1-terminating IAB-donor CU can send an IAB transport migration management request to the Non-F1-terminating IAB-donor CU.
进一步的,考虑IAB node的移动性,例如车载IAB node的场景,IAB node随着车辆的移动而移动。若继续沿用上述partial migration,由于IAB-donor-CU的覆盖区域有限,无法一直保持与IAB-DU之间的F1连接。进而,需要更换IAB-DU所连接的IAB-donor-CU。这种IAB-MT和IAB-DU都需要更换至同一个IAB-donor-CU的场景称为完全迁移(full migration)。 Furthermore, considering the mobility of the IAB node, such as the scenario of an in-vehicle IAB node, the IAB node moves with the movement of the vehicle. If the above partial migration continues to be used, the F1 connection with the IAB-DU cannot be maintained all the time due to the limited coverage area of the IAB-donor-CU. Therefore, it is necessary to replace the IAB-donor-CU to which the IAB-DU is connected. This scenario in which both the IAB-MT and the IAB-DU need to be replaced to the same IAB-donor-CU is called full migration.
full migration场景下,IAB-donor-CU的更换会带来更多的信令开销和***复杂度。为了解决该问题,减少F1连接的IAB-donor-CU的切换次数,引入在网络中部署更高地位的IAB-donor-CU的方案,能够在更大的区域内保持与IAB-DU之间的F1连接,使得partial migration实现更大范围的移动性,从而减少F1连接的IAB-donor-CU的切换次数。为了描述方便,本申请实施例将部署地位更高的IAB-donor-CU称为IAB-donor-CU 1,也可以称为主IAB-donor-CU(master-IAB-donor-CU,m-IAB-donor-CU)。In the full migration scenario, the replacement of IAB-donor-CU will bring more signaling overhead and system complexity. In order to solve this problem and reduce the number of switching of IAB-donor-CU connected to F1, a solution of deploying a higher-ranking IAB-donor-CU in the network is introduced, which can maintain the F1 connection with IAB-DU in a larger area, so that partial migration can achieve a wider range of mobility, thereby reducing the number of switching of IAB-donor-CU connected to F1. For the convenience of description, the embodiment of the present application refers to the IAB-donor-CU with a higher deployment status as IAB-donor-CU 1, which may also be referred to as the master IAB-donor-CU (master-IAB-donor-CU, m-IAB-donor-CU).
示例性的,部署有IAB-donor-CU 1的场景示意图可参考图2B所示。图2B中,IAB-donor-CU 1在网络中的部署地位较高,可以直接与接入和移动性管理功能(access and mobility management function,AMF)网元连接。IAB node在随着车辆的移动过程中,其与IAB-donor-CU 1之间的F1连接未改变。For example, a schematic diagram of a scenario in which IAB-donor-CU 1 is deployed can be referred to as shown in FIG2B . In FIG2B , IAB-donor-CU 1 has a high deployment status in the network and can be directly connected to the access and mobility management function (AMF) network element. As the IAB node moves with the vehicle, the F1 connection between it and IAB-donor-CU 1 remains unchanged.
3,IAB-donor-DU之间的隧道(tunneling)3. Tunneling between IAB-donor-DU
基于图2所示的示例图,当上行链路(uplink,UL)数据包需要经过边界节点路由至异拓扑(即IAB-donor-CU 2控制的拓扑)时,可能会出现上行链路数据包使用的还是源拓扑(即IAB-donor-CU 1控制的拓扑)分配的IP地址的情况,这些数据包如果不做处理直接路由至异拓扑,会被异拓扑中的IP过滤器(IP filter)过滤为丢弃的包,例如IAB-donor-DU 2的IP filter会将源IP地址属于IAB-Donor-DU 1分配的IP地址的数据包丢弃。原因在于,IAB-donor-DU 2不认识源拓扑分配的IP地址。Based on the example diagram shown in Figure 2, when the uplink (UL) data packet needs to be routed to the heterotopology (i.e., the topology controlled by IAB-donor-CU 2) through the border node, the uplink data packet may still use the IP address assigned by the source topology (i.e., the topology controlled by IAB-donor-CU 1). If these data packets are directly routed to the heterotopology without processing, they will be filtered as discarded packets by the IP filter in the heterotopology. For example, the IP filter of IAB-donor-DU 2 will discard the data packet whose source IP address belongs to the IP address assigned by IAB-Donor-DU 1. The reason is that IAB-donor-DU 2 does not recognize the IP address assigned by the source topology.
进而,引入IAB-donor-DU之间的隧道机制,即Inter-Donor-DU的隧道机制。该隧道机制通过在源IAB-donor-DU与目标IAB-donor-DU之间建立一个隧道来解决异拓扑丢包的问题。示例性的,可参见图3所示的IAB-donor-DU 1与IAB-donor-DU 2之间的隧道示例图。Furthermore, a tunnel mechanism between IAB-donor-DUs, namely the Inter-Donor-DU tunnel mechanism, is introduced. This tunnel mechanism solves the problem of heterogeneous topology packet loss by establishing a tunnel between the source IAB-donor-DU and the target IAB-donor-DU. For example, see the tunnel example diagram between IAB-donor-DU 1 and IAB-donor-DU 2 shown in FIG3 .
图3中,IAB-donor-DU 1即源IAB-donor-DU,IAB-donor-DU 2即目标IAB-donor-DU。假设IAB-donor-DU 1为F1-terminating IAB-donor的DU,IAB-donor-DU 2为Non-F1-terminating IAB-donor的DU,IAB-donor-CU 1通过IAB传输迁移管理过程向IAB-donor-CU 2发送,由IAB-donor-DU 1分配的IP前缀地址或IP地址列表。IAB-donor-CU 2在接收到IP前缀地址或IP地址列表时,将其作为白名单,并将白名单配置给IAB-donor-DU 2。IAB-donor-DU 2在接收到上行链路数据包时,将上行链路数据包的源IP地址与白名单对比。如果上行链路数据包的源IP地址包含于白名单,则IAB-donor-DU 2不会对这些上行链路数据包进行过滤,而是通过与IAB-donor-DU 1之间的隧道,将这些上行链路数据包发送至IAB-donor-DU 1,由IAB-donor-DU 1对这些上行链路数据包进行解析(因为源IP地址是IAB-donor-DU 1分配的,因此IAB-donor-DU 1能够识别这些上行链路数据包),解析之后可递交给IAB-donor-CU 1。如果上行链路数据包的源IP地址未包含在白名单中,则IAB-donor-DU 2会对这些上行链路数据包进行过滤,丢弃这些上行链路数据包。In Figure 3, IAB-donor-DU 1 is the source IAB-donor-DU, and IAB-donor-DU 2 is the target IAB-donor-DU. Assuming that IAB-donor-DU 1 is the DU of the F1-terminating IAB-donor and IAB-donor-DU 2 is the DU of the Non-F1-terminating IAB-donor, IAB-donor-CU 1 sends the IP prefix address or IP address list assigned by IAB-donor-DU 1 to IAB-donor-CU 2 through the IAB transport migration management process. When IAB-donor-CU 2 receives the IP prefix address or IP address list, it uses it as a whitelist and configures the whitelist to IAB-donor-DU 2. When IAB-donor-DU 2 receives an uplink data packet, it compares the source IP address of the uplink data packet with the whitelist. If the source IP address of the uplink data packets is included in the whitelist, IAB-donor-DU 2 will not filter these uplink data packets, but send these uplink data packets to IAB-donor-DU 1 through the tunnel between IAB-donor-DU 1, and IAB-donor-DU 1 will parse these uplink data packets (because the source IP address is assigned by IAB-donor-DU 1, IAB-donor-DU 1 can identify these uplink data packets), and after parsing, they can be delivered to IAB-donor-CU 1. If the source IP address of the uplink data packets is not included in the whitelist, IAB-donor-DU 2 will filter these uplink data packets and discard them.
上述隧道的隧道类型可以是IP隧道类型或GTP-U隧道类型。对于GTP-U隧道,通过节点的IP地址、UDP端口号和隧道的TEID来标识,发送节点使用接收节点分配的TEID来进行点到点的数据传输,即将TEID包含在数据包外层添加的GTP-U头中。对于IP隧道,通过向数据包外层添加IP头来传输数据。IP隧道又可以分为IP in IP和IPSec。IPin IP是在数据包外层再添加IP头,IP头包括源IP地址和目的IP地址。IPSec是在IP in IP的基础上,再添加加密验证信息,例如在数据包外层添加IP头,该IP头包括加密验证信息。The tunnel type of the above tunnel can be an IP tunnel type or a GTP-U tunnel type. For a GTP-U tunnel, it is identified by the node's IP address, UDP port number and the tunnel's TEID. The sending node uses the TEID assigned by the receiving node for point-to-point data transmission, that is, the TEID is included in the GTP-U header added to the outer layer of the data packet. For an IP tunnel, data is transmitted by adding an IP header to the outer layer of the data packet. IP tunnels can be divided into IP in IP and IPSec. IP in IP is to add an IP header to the outer layer of the data packet, and the IP header includes the source IP address and the destination IP address. IPSec is to add encryption verification information on the basis of IP in IP, for example, to add an IP header to the outer layer of the data packet, and the IP header includes encryption verification information.
本申请实施例涉及的通信隧道,指的是一个IAB-donor-DU与另一个IAB-donor-DU之间的隧道,通信隧道的隧道类型可以是IP隧道类型或GTP-U隧道类型。The communication tunnel involved in the embodiment of the present application refers to a tunnel between one IAB-donor-DU and another IAB-donor-DU. The tunnel type of the communication tunnel can be an IP tunnel type or a GTP-U tunnel type.
本申请实施例涉及的上行链路数据包指的是来自UE的数据包,下行链路数据包指的是来自核心网网元或父节点的数据包。The uplink data packet involved in the embodiment of the present application refers to the data packet from the UE, and the downlink data packet refers to the data packet from the core network element or the parent node.
下面对本申请应用的场景和***架构进行介绍。The following is an introduction to the application scenarios and system architecture of this application.
考虑IAB node的移动性,IAB node可能会基于IAB-donor-CU 1连续执行partial migration。示例性的,可参见图4A所示的场景示例图。IAB node最开始与IAB-donor-CU 1建立F1连接,随后由于移动性进行partial migration,IAB-MT与IAB-donor-CU之间的RRC连接从IAB-donor-CU 1切换至IAB-donor-CU 2,再从IAB-donor-CU 2切换至IAB-donor-CU 3,IAB-DU一直与IAB-donor-CU 1保持F1连接。考虑IAB-donor-CU 1与IAB-donor-CU 3之间可能存在IP不可达的情况,即IAB-donor-CU 1与IAB-donor-CU 3之间无法通过IP路由传输数据包的情况,IAB-donor-CU 1无法向IAB-donor-CU 3发起IAB传输迁移管理流程以进行流量卸载(traffic offloading)。Considering the mobility of the IAB node, the IAB node may continuously perform partial migration based on IAB-donor-CU 1. For example, see the scenario example diagram shown in Figure 4A. The IAB node initially establishes an F1 connection with IAB-donor-CU 1, and then performs partial migration due to mobility. The RRC connection between the IAB-MT and the IAB-donor-CU is switched from IAB-donor-CU 1 to IAB-donor-CU 2, and then from IAB-donor-CU 2 to IAB-donor-CU 3. The IAB-DU always maintains an F1 connection with IAB-donor-CU 1. Considering the situation that there may be an IP unreachable situation between IAB-donor-CU 1 and IAB-donor-CU 3, that is, data packets cannot be transmitted between IAB-donor-CU 1 and IAB-donor-CU 3 through IP routing, IAB-donor-CU 1 cannot initiate the IAB transmission migration management process to IAB-donor-CU 3 for traffic offloading.
其中,IAB-donor-CU 1与IAB-donor-CU 3之间IP不可达,也可以理解为IAB-donor-CU 1与IAB-donor-CU 3之间IP不可达,或IAB-donor-CU 1与IAB-donor-DU 3之间IP不可达。因为CU和DU 在部署时,实体物理距离不会太远或部署在同一设备中。IAB-donor-CU 1与IAB-donor-CU 3之间无法通过IP路由传输数据包,例如两者的实体物理距离过远,或者两者之间不存在Xn接口等。Among them, the IP between IAB-donor-CU 1 and IAB-donor-CU 3 is unreachable, which can also be understood as the IP between IAB-donor-CU 1 and IAB-donor-CU 3 is unreachable, or the IP between IAB-donor-CU 1 and IAB-donor-DU 3 is unreachable. During deployment, the physical distance between the two devices is not too far or they are deployed in the same device. Data packets cannot be transmitted between IAB-donor-CU 1 and IAB-donor-CU 3 through IP routing, for example, the physical distance between the two devices is too far, or there is no Xn interface between them.
IAB-donor-CU 1无法向IAB-donor-CU 3发起IAB传输迁移管理流程以进行流量卸载(traffic offloading),那么IAB node将触发full migration,将IAB-DU的F1连接也切换至IAB-donor-CU 3。这样将延长业务中断时延,影响业务稳定性。If IAB-donor-CU 1 cannot initiate the IAB transport migration management process to IAB-donor-CU 3 for traffic offloading, the IAB node will trigger full migration and switch the F1 connection of IAB-DU to IAB-donor-CU 3. This will extend the service interruption delay and affect service stability.
鉴于此,本申请实施例提供一种通信方法及通信装置,可以减少业务中断时延,有助于提高业务稳定性。本申请实施例提供的通信方法,不进行full migration,在partial migration过程中,减少业务中断时延。In view of this, the embodiments of the present application provide a communication method and a communication device, which can reduce service interruption delay and help improve service stability. The communication method provided in the embodiments of the present application does not perform full migration, but reduces service interruption delay during partial migration.
本申请实施例不仅适用于IAB node基于IAB-donor-CU 1连续执行partial migration的场景,还可以适用于除IAB***之外的其他中继***。The embodiments of the present application are not only applicable to the scenario where the IAB node continuously performs partial migration based on IAB-donor-CU 1, but can also be applied to other relay systems besides the IAB system.
请参见图4B,是应用本申请实施例的一种***架构示例图。图4B所示的***架构包括第一宿主节点401、第二宿主节点402和第三宿主节点403。Please refer to FIG4B , which is a diagram showing an example of a system architecture in which an embodiment of the present application is applied. The system architecture shown in FIG4B includes a first host node 401 , a second host node 402 , and a third host node 403 .
在本申请实施例中,第一宿主节点401即为上述IAB-donor-CU 1对应的IAB donor。第一宿主节点401与第二宿主节点402之间,可以通过IP路由传输数据包,即两者之间IP可达。第一宿主节点401与第三宿主节点403之间,无法通过IP路由传输数据包,即两者之间IP不可达。In the embodiment of the present application, the first host node 401 is the IAB donor corresponding to the above-mentioned IAB-donor-CU 1. Data packets can be transmitted between the first host node 401 and the second host node 402 through IP routing, that is, the IP between the two is reachable. Data packets cannot be transmitted between the first host node 401 and the third host node 403 through IP routing, that is, the IP between the two is unreachable.
可选的,图4B还可以包括更多数量的宿主节点,第三宿主节点403可以是***中任意一个与第一宿主节点401之间IP不可达的宿主节点。第二宿主节点402可以是***中与第一宿主节点401直接IP可达或间接IP可达的宿主节点。4B may also include a greater number of host nodes, and the third host node 403 may be any host node in the system that is IP unreachable to the first host node 401. The second host node 402 may be a host node in the system that is directly IP reachable or indirectly IP reachable to the first host node 401.
可选的,图4B所示的***还可包括核心网网元404。核心网网元404可用于对UE进行鉴权、移动性管理、会话管理等。核心网网元404可以包括但不限于如下网元中的一个或多个:用户面功能(user plane function,UPF)、认证服务功能(authentication server function,AUSF)、接入和移动性管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、策略控制功能(policy control function,PCF)和统一数据管理(unified data management,UDM)。本申请实施例涉及的核心网网元,以AMF网元为例进行描述。Optionally, the system shown in FIG4B may further include a core network element 404. The core network element 404 may be used to perform authentication, mobility management, session management, etc. on the UE. The core network element 404 may include, but is not limited to, one or more of the following elements: user plane function (UPF), authentication server function (AUSF), access and mobility management function (AMF), session management function (SMF), policy control function (PCF) and unified data management (UDM). The core network element involved in the embodiment of the present application is described by taking the AMF element as an example.
在一种实现方式中,第一宿主节点401通过第二宿主节点402,配置第二宿主节点402的DU与第三宿主节点403的DU之间的第一通信隧道,以减少业务中断时延。In one implementation, the first host node 401 configures a first communication tunnel between the DU of the second host node 402 and the DU of the third host node 403 through the second host node 402 to reduce service interruption delay.
在另一种实现方式中,第一宿主节点401通过核心网网元404,配置第二宿主节点402的DU与第三宿主节点403的DU之间的第一通信隧道,以减少业务中断时延。In another implementation, the first host node 401 configures a first communication tunnel between the DU of the second host node 402 and the DU of the third host node 403 through the core network element 404 to reduce service interruption delay.
下面对本申请实施例提供的通信方法进行详细阐述。本申请提供的通信方法的前置条件为:IAB node在移动过程中执行partial migration,IAB-MT与IAB-donor-CU之间的RRC连接从第一宿主节点的CU切换至第二宿主节点的CU,IAB-DU保持与第一宿主节点的CU之间的F1连接。随后,IAB-MT与IAB-donor-CU之间的RRC连接从第二宿主节点的CU切换至第三宿主节点的CU,IAB-DU保持与第一宿主节点的CU之间的F1连接。The communication method provided by the embodiment of the present application is described in detail below. The prerequisite of the communication method provided by the present application is: the IAB node performs partial migration during the movement process, the RRC connection between the IAB-MT and the IAB-donor-CU is switched from the CU of the first host node to the CU of the second host node, and the IAB-DU maintains the F1 connection with the CU of the first host node. Subsequently, the RRC connection between the IAB-MT and the IAB-donor-CU is switched from the CU of the second host node to the CU of the third host node, and the IAB-DU maintains the F1 connection with the CU of the first host node.
请参见图5,是本申请实施例提供的一种通信方法的流程示意图。图5所示的方法可以包括但不限于如下步骤:Please refer to Figure 5, which is a flow chart of a communication method provided in an embodiment of the present application. The method shown in Figure 5 may include but is not limited to the following steps:
501,第一宿主节点向第二宿主节点发送第一配置信息。相应的,第二宿主节点接收来自第一宿主节点的第一配置信息。501, a first host node sends first configuration information to a second host node. Correspondingly, the second host node receives the first configuration information from the first host node.
其中,第一配置信息用于配置第一通信隧道,第一通信隧道为第二宿主节点的DU与第三宿主节点的DU之间的通信隧道。也就是说,第一配置信息用于请求建立第二宿主节点的DU与第三宿主节点的DU之间的第一通信隧道。The first configuration information is used to configure a first communication tunnel, which is a communication tunnel between the DU of the second host node and the DU of the third host node. In other words, the first configuration information is used to request the establishment of a first communication tunnel between the DU of the second host node and the DU of the third host node.
第一配置信息可包括第三宿主节点的标识信息。第三宿主节点的标识信息用于第二宿主节点找到第三宿主节点,以便向第三宿主节点发送第二配置信息。第三宿主节点的标识信息可以包括以下一项或多项:第三宿主节点的CU的标识(identifier,ID)、第三宿主节点的ID(即gNB ID)、第三宿主节点的CU的IP地址。The first configuration information may include identification information of the third host node. The identification information of the third host node is used by the second host node to find the third host node so as to send the second configuration information to the third host node. The identification information of the third host node may include one or more of the following: an identifier (ID) of the CU of the third host node, an ID of the third host node (i.e., a gNB ID), and an IP address of the CU of the third host node.
可选的,第一配置信息还可用于配置第一通信隧道的隧道类型,第一通信隧道的隧道类型包括IP隧道类型或GTP-U隧道类型。也可以理解为,第一配置信息还包括第一通信隧道的隧道类型。在第一配置信息配置第一通信隧道的隧道类型的情况下,可指示建立相应隧道类型的第一通信隧道。第一配置信息配置第一通信隧道的隧道类型,可以理解为第一宿主节点可以配置第一通信隧道的隧道类型。Optionally, the first configuration information can also be used to configure the tunnel type of the first communication tunnel, and the tunnel type of the first communication tunnel includes an IP tunnel type or a GTP-U tunnel type. It can also be understood that the first configuration information also includes the tunnel type of the first communication tunnel. In the case where the first configuration information configures the tunnel type of the first communication tunnel, it can be indicated to establish a first communication tunnel of the corresponding tunnel type. The first configuration information configures the tunnel type of the first communication tunnel, which can be understood as the first host node can configure the tunnel type of the first communication tunnel.
在一种实现方式中,第一配置信息包括类型字段,该字段的取值用于指示IP隧道类型或GTP-U隧道 类型。例如,该字段的取值为1,指示IP隧道类型;该字段的取值为0,指示GTP-U隧道类型。在另一种实现方式中,第一配置信息包括类型位图,不同的位图指示不同的隧道类型。本申请实施例不限定如何对隧道类型进行指示。In one implementation, the first configuration information includes a type field, the value of which is used to indicate the IP tunnel type or the GTP-U tunnel type. Type. For example, the value of this field is 1, indicating the IP tunnel type; the value of this field is 0, indicating the GTP-U tunnel type. In another implementation, the first configuration information includes a type bitmap, and different bitmaps indicate different tunnel types. The embodiment of the present application does not limit how to indicate the tunnel type.
可选的,第一配置信息还可包括第一宿主节点的地址。第一宿主节点的地址可以是第一宿主节点的CU的IP地址。本申请实施例涉及的地址均指的是IP地址。第一宿主节点的CU的IP地址,一方面可用于第二宿主节点接收下行链路数据包的白名单,即第二宿主节点的DU在接收到源IP地址与第一宿主节点的CU的IP地址相同的下行链路数据包时,可保留该下行链路数据包。另一方面可用于第三宿主节点识别出需要通过第一通信隧道传输的上行链路数据包,即第三宿主节点的DU在接收到目的地址与第一宿主节点的CU的IP地址相同的上行链路数据包时,确定通过第一通信隧道向第二宿主节点的DU传输该上行链路数据包。Optionally, the first configuration information may also include an address of the first host node. The address of the first host node may be the IP address of the CU of the first host node. The addresses involved in the embodiments of the present application all refer to IP addresses. The IP address of the CU of the first host node can be used for the whitelist of the second host node receiving downlink data packets, that is, when the DU of the second host node receives a downlink data packet whose source IP address is the same as the IP address of the CU of the first host node, it can retain the downlink data packet. On the other hand, it can be used for the third host node to identify the uplink data packet that needs to be transmitted through the first communication tunnel, that is, when the DU of the third host node receives an uplink data packet whose destination address is the same as the IP address of the CU of the first host node, it determines to transmit the uplink data packet to the DU of the second host node through the first communication tunnel.
可选的,第一配置信息还可包括第一宿主节点为IAB-MT分配的Xn接口应用协议(Xn application protocol,XnAP)ID,以及第二宿主节点为IAB-MT分配的XnAP ID。其中,第一宿主节点为IAB-MT分配的XnAP ID,可以是第一宿主节点的CU为IAB-MT分配的XnAP ID;第二宿主节点为IAB-MT分配的XnAP ID,可以是第二宿主节点的CU为IAB-MT分配的XnAP ID。可选的,第一宿主节点可以通过IAB-MT的切换过程从第二宿主节点处获得第二宿主节点为IAB-MT分配的XnAP ID。从而第一配置信息可包括第一宿主节点为IAB-MT分配的XnAP ID以及第二宿主节点为IAB-MT分配的XnAP ID。Optionally, the first configuration information may also include an Xn application protocol (XnAP) ID assigned by the first host node to the IAB-MT, and an XnAP ID assigned by the second host node to the IAB-MT. The XnAP ID assigned by the first host node to the IAB-MT may be an XnAP ID assigned by the CU of the first host node to the IAB-MT; the XnAP ID assigned by the second host node to the IAB-MT may be an XnAP ID assigned by the CU of the second host node to the IAB-MT. Optionally, the first host node may obtain the XnAP ID assigned by the second host node to the IAB-MT from the second host node through the switching process of the IAB-MT. Thus, the first configuration information may include the XnAP ID assigned by the first host node to the IAB-MT, and the XnAP ID assigned by the second host node to the IAB-MT.
可选的,第一配置信息还可包括需要迁移的流量(traffic)列表信息,该列表信息用于描述哪些traffic需要迁移至第三宿主节点。该列表信息例如可包括数据流量ID或QoS等信息。Optionally, the first configuration information may further include traffic list information that needs to be migrated, where the list information is used to describe which traffic needs to be migrated to the third host node. The list information may include, for example, data traffic ID or QoS information.
在一种实现方式中,第一宿主节点在确定与第三宿主节点之间无法通过IP路由传输数据包时,向第二宿主节点发送第一配置信息。例如,第一宿主节点的CU向第二宿主节点的CU发送第一配置信息。可选的,第一配置信息可以第一宿主节点的CU向第二宿主节点的CU发送的XnAP信息中。第一配置信息可以理解为partial migration的配置信息,在本申请实施例中用于配置第一通信隧道。In one implementation, when the first host node determines that it is impossible to transmit data packets through IP routing between the first host node and the third host node, the first host node sends the first configuration information to the second host node. For example, the CU of the first host node sends the first configuration information to the CU of the second host node. Optionally, the first configuration information may be in the XnAP information sent by the CU of the first host node to the CU of the second host node. The first configuration information can be understood as the configuration information of partial migration, which is used to configure the first communication tunnel in the embodiment of the present application.
502,第二宿主节点向第三宿主节点发送第二配置信息。相应的,第三宿主节点接收来自第二宿主节点的第二配置信息。502, the second host node sends second configuration information to the third host node. Correspondingly, the third host node receives the second configuration information from the second host node.
第二宿主节点在接收到第一配置信息的情况下,基于第三宿主节点的标识信息,确定出第三宿主节点,并向第三宿主节点发送第二配置信息。例如,第二宿主节点的CU向第三宿主节点的CU发送第二配置信息。When the second host node receives the first configuration information, it determines the third host node based on the identification information of the third host node and sends the second configuration information to the third host node. For example, the CU of the second host node sends the second configuration information to the CU of the third host node.
其中,第二配置信息可用于配置第一通信隧道。The second configuration information may be used to configure the first communication tunnel.
可选的,第二配置信息还可用于配置第一通信隧道的隧道类型,第一通信隧道的隧道类型包括IP隧道类型或GTP-U隧道类型。也可以理解为,第二配置信息包括第一通信隧道的隧道类型。在第二配置信息配置第一通信隧道的隧道类型的情况下,可指示建立相应隧道类型的第一通信隧道。第二配置信息配置第一通信隧道的隧道类型,可以理解为第二宿主节点可以配置第一通信隧道的隧道类型。Optionally, the second configuration information can also be used to configure the tunnel type of the first communication tunnel, and the tunnel type of the first communication tunnel includes an IP tunnel type or a GTP-U tunnel type. It can also be understood that the second configuration information includes the tunnel type of the first communication tunnel. In the case where the second configuration information configures the tunnel type of the first communication tunnel, it can be indicated to establish a first communication tunnel of the corresponding tunnel type. The second configuration information configures the tunnel type of the first communication tunnel, which can be understood as the second host node can configure the tunnel type of the first communication tunnel.
在第一配置信息包括第一通信隧道的隧道类型的情况下,第二宿主节点可以不用再配置第一通信隧道的隧道类型,直接将第一配置信息携带的第一通信隧道的隧道类型,携带在第二配置信息中即可。若第一配置信息不包括第一通信隧道的隧道类型,那么第二宿主节点可以配置第一通信隧道的隧道类型,并将其携带在第二配置信息中。或者,第二宿主节点的DU可以从操作维护和管理(operation administration and maintenance,OAM)设备获取第一通信隧道的隧道类型。也就是说,OAM设备可以将第一通信隧道的隧道类型预配置给第二宿主节点的DU。In the case where the first configuration information includes the tunnel type of the first communication tunnel, the second host node does not need to configure the tunnel type of the first communication tunnel, and can directly carry the tunnel type of the first communication tunnel carried by the first configuration information in the second configuration information. If the first configuration information does not include the tunnel type of the first communication tunnel, the second host node can configure the tunnel type of the first communication tunnel and carry it in the second configuration information. Alternatively, the DU of the second host node can obtain the tunnel type of the first communication tunnel from the operation administration and maintenance (OAM) device. In other words, the OAM device can pre-configure the tunnel type of the first communication tunnel to the DU of the second host node.
在一种实现方式中,第二配置信息包括类型字段,该字段的取值用于指示IP隧道类型或GTP-U隧道类型。例如,该字段的取值为1,指示IP隧道类型;该字段的取值为0,指示GTP-U隧道类型。在另一种实现方式中,第二配置信息包括类型位图,不同的位图指示不同的隧道类型。本申请实施例不限定如何对隧道类型进行指示。In one implementation, the second configuration information includes a type field, and the value of the field is used to indicate the IP tunnel type or the GTP-U tunnel type. For example, the value of the field is 1, indicating the IP tunnel type; the value of the field is 0, indicating the GTP-U tunnel type. In another implementation, the second configuration information includes a type bitmap, and different bitmaps indicate different tunnel types. The embodiment of the present application does not limit how to indicate the tunnel type.
可选的,在第一通信隧道的隧道类型为GTP-U隧道类型的情况下,第二配置信息还可包括第二宿主节点的地址、第二宿主节点分配的UDP端口信息以及用于标识第一通信隧道的TEID。第二宿主节点的地址指的是第二宿主节点的DU的IP地址。第二宿主节点可以分配UDP端口信息和第一通信隧道的TEID,UDP端口信息指的是UDP端口号,第一通信隧道的TEID可用于在第二宿主节点的DU与第三宿主节点的DU之间建立第一通信隧道。Optionally, in the case where the tunnel type of the first communication tunnel is a GTP-U tunnel type, the second configuration information may also include the address of the second host node, the UDP port information assigned by the second host node, and a TEID for identifying the first communication tunnel. The address of the second host node refers to the IP address of the DU of the second host node. The second host node can allocate UDP port information and the TEID of the first communication tunnel, the UDP port information refers to the UDP port number, and the TEID of the first communication tunnel can be used to establish the first communication tunnel between the DU of the second host node and the DU of the third host node.
可选的,第二配置信息还可包括第一宿主节点的地址。第一宿主节点的地址可以是第一宿主节点的CU的IP地址。第一宿主节点的CU的IP地址的作用可参考步骤501中对其的具体描述,在此不再赘述。 Optionally, the second configuration information may further include an address of the first host node. The address of the first host node may be an IP address of the CU of the first host node. The role of the IP address of the CU of the first host node may refer to the specific description thereof in step 501, which will not be repeated here.
可选的,第二配置信息还可包括第二宿主节点为IAB-MT分配的XnAPID,以及第三宿主节点为IAB-MT分配的XnAP ID。其中,第二宿主节点为IAB-MT分配的XnAP ID,可以是第二宿主节点的CU为IAB-MT分配的XnAP ID;第三宿主节点为IAB-MT分配的XnAP ID,可以是第三宿主节点的CU为IAB-MT分配的XnAP ID。Optionally, the second configuration information may also include an XnAP ID assigned by the second host node to the IAB-MT, and an XnAP ID assigned by the third host node to the IAB-MT. The XnAP ID assigned by the second host node to the IAB-MT may be an XnAP ID assigned by the CU of the second host node to the IAB-MT; the XnAP ID assigned by the third host node to the IAB-MT may be an XnAP ID assigned by the CU of the third host node to the IAB-MT.
可选的,第二配置信息还可包括需要迁移的traffic列表信息,该列表信息用于描述哪些traffic需要迁移至第三宿主节点的CU。该列表信息例如可包括数据流量ID或QoS等信息。Optionally, the second configuration information may further include traffic list information that needs to be migrated, and the list information is used to describe which traffic needs to be migrated to the CU of the third host node. The list information may include, for example, data traffic ID or QoS information.
503,第三宿主节点向第二宿主节点发送第二配置响应信息。相应的,第二宿主节点接收来自第三宿主节点的第二配置响应信息。503, the third host node sends second configuration response information to the second host node. Correspondingly, the second host node receives the second configuration response information from the third host node.
第三宿主节点在接收到第二配置信息的情况下,可建立其DU与第二宿主节点的DU之间的第一通信隧道。When the third host node receives the second configuration information, it can establish a first communication tunnel between its DU and the DU of the second host node.
第三宿主节点可向第二宿主节点发送第二配置响应信息,第二配置响应信息用于响应第二配置信息。例如,第三宿主节点的CU向第二宿主节点的CU发送第二配置响应信息。The third host node may send second configuration response information to the second host node, where the second configuration response information is used to respond to the second configuration information. For example, the CU of the third host node sends the second configuration response information to the CU of the second host node.
其中,第二配置响应信息可包括第三宿主节点分配的地址,即第三宿主节点为其子节点分配的IP地址。第三宿主节点的子节点可以是IAB node或UE。可以理解的是,第三宿主节点为其拓扑下的节点分配IP地址。第三宿主节点分配的地址,可以是第三宿主节点的DU分配的IP地址。The second configuration response information may include an address assigned by the third host node, that is, an IP address assigned by the third host node to its child node. The child node of the third host node may be an IAB node or a UE. It is understandable that the third host node assigns an IP address to the node under its topology. The address assigned by the third host node may be an IP address assigned by the DU of the third host node.
第三宿主节点分配的地址,一方面用于第一宿主节点在接收到目的IP地址属于这些IP地址的下行链路数据包时,可以识别出该下行链路数据包需要通过第一通信隧道传输至第三宿主节点。另一方面用于第二宿主节点在接收到源IP地址属于这些IP地址的上行链路数据包时,可以保留这些上行链路数据包,而不进行数据包过滤。The addresses allocated by the third host node are used, on the one hand, for the first host node to recognize that the downlink data packets need to be transmitted to the third host node through the first communication tunnel when receiving downlink data packets whose destination IP addresses belong to these IP addresses. On the other hand, when the second host node receives uplink data packets whose source IP addresses belong to these IP addresses, it can retain these uplink data packets without performing data packet filtering.
可选的,第二配置响应信息还可包括第一通信隧道的隧道类型,第一通信隧道的隧道类型包括IP隧道类型或GTP-U隧道类型。也可以理解为,第二配置响应信息可以指示第一通信隧道的隧道类型。第二配置响应信息包括第一通信隧道的隧道类型,可以理解为第三宿主节点可以配置第一通信隧道的隧道类型。Optionally, the second configuration response information may further include a tunnel type of the first communication tunnel, and the tunnel type of the first communication tunnel may include an IP tunnel type or a GTP-U tunnel type. It may also be understood that the second configuration response information may indicate the tunnel type of the first communication tunnel. The second configuration response information includes the tunnel type of the first communication tunnel, which may be understood as the third host node may configure the tunnel type of the first communication tunnel.
在第一配置信息和/或第二配置信息包括第一通信隧道的隧道类型的情况下,第二配置响应信息可以携带或不携带第一通信隧道的隧道类型。若第一配置信息和第二配置信息均不包括第一通信隧道的隧道类型,那么第三宿主节点可以配置第一通信隧道的隧道类型,并将其携带在第二配置响应信息中。或者,第三宿主节点的DU可以从OAM设备获取第一通信隧道的隧道类型。也就是说,OAM设备可以将第一通信隧道的隧道类型预配置给第三宿主节点的DU。In the case where the first configuration information and/or the second configuration information include the tunnel type of the first communication tunnel, the second configuration response information may or may not carry the tunnel type of the first communication tunnel. If both the first configuration information and the second configuration information do not include the tunnel type of the first communication tunnel, the third host node may configure the tunnel type of the first communication tunnel and carry it in the second configuration response information. Alternatively, the DU of the third host node may obtain the tunnel type of the first communication tunnel from the OAM device. In other words, the OAM device may preconfigure the tunnel type of the first communication tunnel to the DU of the third host node.
在一种实现方式中,第二配置响应信息包括类型字段,该字段的取值用于指示IP隧道类型或GTP-U隧道类型。例如,该字段的取值为1,指示IP隧道类型;该字段的取值为0,指示GTP-U隧道类型。在另一种实现方式中,第二配置响应信息包括类型位图,不同的位图指示不同的隧道类型。本申请实施例不限定如何对隧道类型进行指示。In one implementation, the second configuration response information includes a type field, and the value of the field is used to indicate the IP tunnel type or the GTP-U tunnel type. For example, the value of the field is 1, indicating the IP tunnel type; the value of the field is 0, indicating the GTP-U tunnel type. In another implementation, the second configuration response information includes a type bitmap, and different bitmaps indicate different tunnel types. The embodiment of the present application does not limit how to indicate the tunnel type.
可选的,在第一通信隧道的隧道类型为GTP-U隧道类型的情况下,第二配置响应信息还可包括第三宿主节点的地址、第三宿主节点分配的UDP端口信息以及用于标识第一通信隧道的TEID。第三宿主节点的地址指的是第三宿主节点的DU的IP地址。第三宿主节点分配的UDP端口信息指的是第三宿主节点的DU分配的第三宿主节点侧的UDP端口号。Optionally, when the tunnel type of the first communication tunnel is a GTP-U tunnel type, the second configuration response information may also include the address of the third host node, the UDP port information allocated by the third host node, and the TEID for identifying the first communication tunnel. The address of the third host node refers to the IP address of the DU of the third host node. The UDP port information allocated by the third host node refers to the UDP port number of the third host node side allocated by the DU of the third host node.
可选的,第二配置响应信息还可包括第二宿主节点为IAB-MT分配的XnAP ID,以及第三宿主节点为IAB-MT分配的XnAP ID。其中,第二宿主节点为IAB-MT分配的XnAP ID,可以是第二宿主节点的CU为IAB-MT分配的XnAP ID;第三宿主节点为IAB-MT分配的XnAP ID,可以是第三宿主节点的CU为IAB-MT分配的XnAP ID。Optionally, the second configuration response information may also include an XnAP ID assigned by the second host node to the IAB-MT, and an XnAP ID assigned by the third host node to the IAB-MT. The XnAP ID assigned by the second host node to the IAB-MT may be an XnAP ID assigned by the CU of the second host node to the IAB-MT; the XnAP ID assigned by the third host node to the IAB-MT may be an XnAP ID assigned by the CU of the third host node to the IAB-MT.
可选的,第二配置响应信息还可包括已添加的traffic列表信息和/或未添加的traffic列表信息。其中,已添加的traffic列表信息可以理解为已迁移至第三宿主节点的traffic列表信息,未添加的traffic列表信息可以理解为未迁移至第三宿主节点的traffic列表信息。Optionally, the second configuration response information may also include added traffic list information and/or unadded traffic list information, wherein the added traffic list information may be understood as traffic list information that has been migrated to the third host node, and the unadded traffic list information may be understood as traffic list information that has not been migrated to the third host node.
504,第二宿主节点向第一宿主节点发送第一配置响应信息。相应的,第一宿主节点接收来自第二宿主节点的第一配置响应信息。504, the second host node sends first configuration response information to the first host node. Correspondingly, the first host node receives the first configuration response information from the second host node.
第二宿主节点在接收到第二配置响应信息的情况下,向第一宿主节点发送第一配置响应信息。例如,第二宿主节点的CU向第一宿主节点的CU发送第一配置响应信息。第一配置响应信息用于响应第一配置信息。When the second host node receives the second configuration response information, the second host node sends the first configuration response information to the first host node. For example, the CU of the second host node sends the first configuration response information to the CU of the first host node. The first configuration response information is used to respond to the first configuration information.
其中,第一配置响应信息可包括第三宿主节点分配的地址,具体可参考步骤503中对其的具体描述,在此不再赘述。 The first configuration response information may include the address allocated by the third host node. For details, please refer to the specific description in step 503, which will not be repeated here.
可选的,第一配置响应信息还可包括第一宿主节点为IAB-MT分配的XnAP ID,以及第二宿主节点为IAB-MT分配的XnAP ID。其中,第一宿主节点为IAB-MT分配的XnAP ID,可以是第一宿主节点的CU为IAB-MT分配的XnAP ID;第二宿主节点为IAB-MT分配的XnAP ID,可以是第二宿主节点的CU为IAB-MT分配的XnAP ID。Optionally, the first configuration response information may also include an XnAP ID assigned by the first host node to the IAB-MT, and an XnAP ID assigned by the second host node to the IAB-MT. The XnAP ID assigned by the first host node to the IAB-MT may be an XnAP ID assigned by the CU of the first host node to the IAB-MT; the XnAP ID assigned by the second host node to the IAB-MT may be an XnAP ID assigned by the CU of the second host node to the IAB-MT.
可选的,第一配置响应信息还可包括已添加的traffic列表信息和/或未添加的traffic列表信息。其中,已添加的traffic列表信息可以理解为已迁移至第三宿主节点的traffic列表信息,未添加的traffic列表信息可以理解为未迁移至第三宿主节点的traffic列表信息。Optionally, the first configuration response information may also include added traffic list information and/or unadded traffic list information, wherein the added traffic list information may be understood as traffic list information that has been migrated to the third host node, and the unadded traffic list information may be understood as traffic list information that has not been migrated to the third host node.
在图5所示的实施例中,第一宿主节点通过第二宿主节点向第三宿主节点发送用于配置第一通信隧道的配置信息,以建立第二宿主节点的DU与第三宿主节点的DU之间的第一通信隧道,从而可以减少业务中断时延,有助于提高业务稳定性。In the embodiment shown in Figure 5, the first host node sends configuration information for configuring the first communication tunnel to the third host node through the second host node to establish the first communication tunnel between the DU of the second host node and the DU of the third host node, thereby reducing service interruption delay and helping to improve service stability.
请参见图6,是本申请实施例提供的另一种通信方法的流程示意图。图6以核心网网元为AMF网元为例。图6所示的方法可以包括但不限于如下步骤:Please refer to Figure 6, which is a flow chart of another communication method provided by an embodiment of the present application. Figure 6 takes the core network element as an AMF network element as an example. The method shown in Figure 6 may include but is not limited to the following steps:
601,第一宿主节点向AMF网元发送第一配置信息。相应的,AMF网元接收来自第一宿主节点的第一配置信息。601. The first host node sends first configuration information to the AMF network element. Correspondingly, the AMF network element receives the first configuration information from the first host node.
其中,第一配置信息用于配置第一通信隧道,第一通信隧道为第二宿主节点的DU与第三宿主节点的DU之间的通信隧道。也就是说,第一配置信息用于请求建立第二宿主节点的DU与第三宿主节点的DU之间的第一通信隧道。The first configuration information is used to configure a first communication tunnel, which is a communication tunnel between the DU of the second host node and the DU of the third host node. In other words, the first configuration information is used to request the establishment of a first communication tunnel between the DU of the second host node and the DU of the third host node.
第一配置信息可包括第三宿主节点的标识信息。第三宿主节点的标识信息用于AMF网元找到第三宿主节点,以便向第三宿主节点发送第二配置信息。第三宿主节点的标识信息可以包括以下一项或多项:第三宿主节点的CU ID、第三宿主节点的ID(即gNB ID)、第三宿主节点的CU的IP地址。The first configuration information may include identification information of the third host node. The identification information of the third host node is used by the AMF network element to find the third host node so as to send the second configuration information to the third host node. The identification information of the third host node may include one or more of the following: the CU ID of the third host node, the ID of the third host node (i.e., the gNB ID), and the IP address of the CU of the third host node.
可选的,第一配置信息还可用于配置第一通信隧道的隧道类型,第一通信隧道的隧道类型包括IP隧道类型或GTP-U隧道类型。也可以理解为,第一配置信息还包括第一通信隧道的隧道类型。在第一配置信息配置第一通信隧道的隧道类型的情况下,可指示建立相应隧道类型的第一通信隧道。第一配置信息配置第一通信隧道的隧道类型,可以理解为第一宿主节点可以配置第一通信隧道的隧道类型。Optionally, the first configuration information can also be used to configure the tunnel type of the first communication tunnel, and the tunnel type of the first communication tunnel includes an IP tunnel type or a GTP-U tunnel type. It can also be understood that the first configuration information also includes the tunnel type of the first communication tunnel. In the case where the first configuration information configures the tunnel type of the first communication tunnel, it can be indicated to establish a first communication tunnel of the corresponding tunnel type. The first configuration information configures the tunnel type of the first communication tunnel, which can be understood as the first host node can configure the tunnel type of the first communication tunnel.
在一种实现方式中,第一配置信息包括类型字段,该字段的取值用于指示IP隧道类型或GTP-U隧道类型。例如,该字段的取值为1,指示IP隧道类型;该字段的取值为0,指示GTP-U隧道类型。在另一种实现方式中,第一配置信息包括类型位图,不同的位图指示不同的隧道类型。本申请实施例不限定如何对隧道类型进行指示。In one implementation, the first configuration information includes a type field, and the value of the field is used to indicate the IP tunnel type or the GTP-U tunnel type. For example, the value of the field is 1, indicating the IP tunnel type; the value of the field is 0, indicating the GTP-U tunnel type. In another implementation, the first configuration information includes a type bitmap, and different bitmaps indicate different tunnel types. The embodiment of the present application does not limit how to indicate the tunnel type.
可选的,第一配置信息还可包括第一宿主节点的地址。第一宿主节点的地址可以是第一宿主节点的CU的IP地址。第一宿主节点的CU的IP地址的作用可参考步骤501中对其的具体描述,在此不再赘述。Optionally, the first configuration information may further include an address of the first host node. The address of the first host node may be an IP address of the CU of the first host node. The role of the IP address of the CU of the first host node may refer to the specific description thereof in step 501, which will not be repeated here.
可选的,第一配置信息还可包括第一宿主节点为IAB-MT分配的NG接口应用协议(NG application protocol,NGAP)ID,以及AMF网元为IAB-MT分配的NGAP ID。其中,第一宿主节点为IAB-MT分配的NGAP ID,可以是第一宿主节点的CU为IAB-MT分配的NGAP ID。Optionally, the first configuration information may also include an NG interface application protocol (NG application protocol, NGAP) ID assigned by the first host node to the IAB-MT, and an NGAP ID assigned by the AMF network element to the IAB-MT. The NGAP ID assigned by the first host node to the IAB-MT may be an NGAP ID assigned by the CU of the first host node to the IAB-MT.
可选的,第一配置信息还可包括需要迁移的traffic列表信息,该列表信息用于描述哪些traffic需要迁移至第三宿主节点的CU。该列表信息例如可包括数据流量ID或QoS等信息。Optionally, the first configuration information may further include traffic list information that needs to be migrated, where the list information is used to describe which traffic needs to be migrated to the CU of the third host node. The list information may include, for example, data traffic ID or QoS information.
在一种实现方式中,第一宿主节点在确定与第三宿主节点之间无法通过IP路由传输数据包时,向AMF网元发送第一配置信息。例如,第一宿主节点的CU向AMF网元发送第一配置信息。In one implementation, when the first host node determines that it is impossible to transmit data packets through IP routing between the first host node and the third host node, the first host node sends the first configuration information to the AMF network element. For example, the CU of the first host node sends the first configuration information to the AMF network element.
602,AMF网元向第三宿主节点发送第二配置信息。相应的,第三宿主节点接收来自AMF网元的第二配置信息。602, the AMF network element sends the second configuration information to the third host node. Correspondingly, the third host node receives the second configuration information from the AMF network element.
AMF网元在接收到第一配置信息的情况下,基于第三宿主节点的标识信息,确定出第三宿主节点,并向第三宿主节点发送第二配置信息。例如,AMF网元向第三宿主节点的CU发送第二配置信息。When the AMF network element receives the first configuration information, it determines the third host node based on the identification information of the third host node, and sends the second configuration information to the third host node. For example, the AMF network element sends the second configuration information to the CU of the third host node.
其中,第二配置信息可用于配置第一通信隧道。The second configuration information may be used to configure the first communication tunnel.
可选的,第二配置信息还可用于配置第一通信隧道的隧道类型,第一通信隧道的隧道类型包括IP隧道类型或GTP-U隧道类型。也可以理解为,第二配置信息包括第一通信隧道的隧道类型。在第二配置信息配置第一通信隧道的隧道类型的情况下,可指示建立相应隧道类型的第一通信隧道。第二配置信息配置第一通信隧道的隧道类型,可以理解为AMF网元可以配置第一通信隧道的隧道类型。Optionally, the second configuration information can also be used to configure the tunnel type of the first communication tunnel, and the tunnel type of the first communication tunnel includes an IP tunnel type or a GTP-U tunnel type. It can also be understood that the second configuration information includes the tunnel type of the first communication tunnel. In the case where the second configuration information configures the tunnel type of the first communication tunnel, it can indicate the establishment of a first communication tunnel of the corresponding tunnel type. The second configuration information configures the tunnel type of the first communication tunnel, which can be understood as the AMF network element can configure the tunnel type of the first communication tunnel.
在第一配置信息包括第一通信隧道的隧道类型的情况下,AMF网元可以不用再配置第一通信隧道的隧道类型,直接将第一配置信息携带的第一通信隧道的隧道类型,携带在第二配置信息中即可。若第一配 置信息不包括第一通信隧道的隧道类型,那么AMF网元可以配置第一通信隧道的隧道类型,并将其携带在第二配置信息中。In the case where the first configuration information includes the tunnel type of the first communication tunnel, the AMF network element does not need to configure the tunnel type of the first communication tunnel again, and can directly carry the tunnel type of the first communication tunnel carried by the first configuration information in the second configuration information. If the configuration information does not include the tunnel type of the first communication tunnel, the AMF network element can configure the tunnel type of the first communication tunnel and carry it in the second configuration information.
在一种实现方式中,第二配置信息包括类型字段,该字段的取值用于指示IP隧道类型或GTP-U隧道类型。例如,该字段的取值为1,指示IP隧道类型;该字段的取值为0,指示GTP-U隧道类型。在另一种实现方式中,第二配置信息包括类型位图,不同的位图指示不同的隧道类型。本申请实施例不限定如何对隧道类型进行指示。In one implementation, the second configuration information includes a type field, and the value of the field is used to indicate the IP tunnel type or the GTP-U tunnel type. For example, the value of the field is 1, indicating the IP tunnel type; the value of the field is 0, indicating the GTP-U tunnel type. In another implementation, the second configuration information includes a type bitmap, and different bitmaps indicate different tunnel types. The embodiment of the present application does not limit how to indicate the tunnel type.
可选的,第二配置信息还可包括第一宿主节点的地址。第一宿主节点的地址可以是第一宿主节点的CU的IP地址。第一宿主节点的CU的IP地址的作用可参考步骤501中对其的具体描述,在此不再赘述。Optionally, the second configuration information may further include an address of the first host node. The address of the first host node may be an IP address of the CU of the first host node. The role of the IP address of the CU of the first host node may refer to the specific description thereof in step 501, which will not be repeated here.
可选的,第二配置信息还可包括AMF网元为IAB-MT分配的NGAP ID,以及第三宿主节点为IAB-MT分配的NGAP ID。其中,第三宿主节点为IAB-MT分配的NGAP ID,可以是第三宿主节点的CU为IAB-MT分配的NGAP ID。Optionally, the second configuration information may also include an NGAP ID assigned by the AMF network element to the IAB-MT, and an NGAP ID assigned by the third host node to the IAB-MT. The NGAP ID assigned by the third host node to the IAB-MT may be an NGAP ID assigned by the CU of the third host node to the IAB-MT.
可选的,第二配置信息还可包括需要迁移的traffic列表信息,该列表信息用于描述哪些traffic需要迁移至第三宿主节点的CU。该列表信息例如可包括数据流量ID或QoS等信息。Optionally, the second configuration information may further include traffic list information that needs to be migrated, and the list information is used to describe which traffic needs to be migrated to the CU of the third host node. The list information may include, for example, data traffic ID or QoS information.
603,第三宿主节点向第二宿主节点发送第三配置信息。相应的,第二宿主节点接收来自第三宿主节点的第三配置信息。603, the third host node sends third configuration information to the second host node. Correspondingly, the second host node receives the third configuration information from the third host node.
由于IAB-MT与IAB-donor-CU之间的RRC连接从第二宿主节点的CU切换至第三宿主节点的CU,那么第三宿主节点可向第二宿主节点发送第三配置信息。例如,第三宿主节点的CU向第二宿主节点的CU发送第三配置信息。Since the RRC connection between the IAB-MT and the IAB-donor-CU is switched from the CU of the second host node to the CU of the third host node, the third host node may send the third configuration information to the second host node. For example, the CU of the third host node sends the third configuration information to the CU of the second host node.
其中,第三配置信息可包括第三宿主节点分配的地址,具体可参考步骤503中对其的具体描述,在此不再赘述。The third configuration information may include an address allocated by the third host node. For details, please refer to the specific description thereof in step 503, which will not be repeated here.
可选的,第三配置信息还可包括第一通信隧道的隧道类型。第三配置信息携带的第一通信隧道的隧道类型,可以来自第二配置信息,也可以是第三宿主节点配置的,还可以是第三宿主节点的DU从OAM设备获取的。Optionally, the third configuration information may further include the tunnel type of the first communication tunnel. The tunnel type of the first communication tunnel carried by the third configuration information may come from the second configuration information, may be configured by the third host node, or may be obtained by the DU of the third host node from the OAM device.
可选的,在第一通信隧道的隧道类型为GTP-U隧道类型的情况下,第三配置信息还可包括第三宿主节点的地址、第三宿主节点分配的UDP端口信息以及用于标识第一通信隧道的TEID。Optionally, when the tunnel type of the first communication tunnel is a GTP-U tunnel type, the third configuration information may also include an address of a third host node, UDP port information allocated by the third host node, and a TEID for identifying the first communication tunnel.
604,第二宿主节点向第三宿主节点发送第三配置响应信息。相应的,第三宿主节点接收来自第二宿主节点的第三配置响应信息。604, the second host node sends third configuration response information to the third host node. Correspondingly, the third host node receives the third configuration response information from the second host node.
第二宿主节点在接收到第三配置信息的情况下,向第三宿主节点发送第三配置响应信息。例如,第二宿主节点的CU向第三宿主节点的CU发送第三配置响应信息,用于响应第三配置信息。When the second host node receives the third configuration information, it sends the third configuration response information to the third host node. For example, the CU of the second host node sends the third configuration response information to the CU of the third host node to respond to the third configuration information.
可选的,在第三配置信息不包括第一通信隧道的隧道类型的情况下,第三配置响应信息可包括第一通信隧道的隧道类型。第二宿主节点可以配置第一通信隧道的隧道类型,或第二宿主节点的DU从OAM设备获取第一通信隧道的隧道类型。Optionally, when the third configuration information does not include the tunnel type of the first communication tunnel, the third configuration response information may include the tunnel type of the first communication tunnel. The second host node may configure the tunnel type of the first communication tunnel, or the DU of the second host node obtains the tunnel type of the first communication tunnel from the OAM device.
可选的,第三配置响应信息携带的第一通信隧道的隧道类型来自第三配置信息。Optionally, the tunnel type of the first communication tunnel carried by the third configuration response information comes from the third configuration information.
可选的,在第一通信隧道的隧道类型为GTP-U隧道类型的情况下,第三配置响应信息还可包括第二宿主节点的地址、第二宿主节点分配的UDP端口信息以及用于标识第一通信隧道的TEID。Optionally, when the tunnel type of the first communication tunnel is a GTP-U tunnel type, the third configuration response information may also include the address of the second host node, the UDP port information allocated by the second host node, and a TEID for identifying the first communication tunnel.
605,第三宿主节点向AMF网元发送第二配置响应信息。相应的,AMF网元接收来自第三宿主节点的第二配置响应信息。605. The third host node sends a second configuration response message to the AMF network element. Correspondingly, the AMF network element receives the second configuration response message from the third host node.
第三宿主节点在接收到第二配置信息的情况下,可建立其DU与第二宿主节点的DU之间的第一通信隧道。在建立第一通信隧道之后,第三宿主节点可向AMF网元发送第二配置响应信息,第二配置响应信息用于响应第二配置信息。例如,第三宿主节点的CU向AMF网元发送第二配置响应信息。When the third host node receives the second configuration information, it may establish a first communication tunnel between its DU and the DU of the second host node. After establishing the first communication tunnel, the third host node may send a second configuration response message to the AMF network element, and the second configuration response message is used to respond to the second configuration information. For example, the CU of the third host node sends the second configuration response message to the AMF network element.
其中,第二配置响应信息可包括第三宿主节点分配的地址,具体可参考步骤503中对其的具体描述,在此不再赘述。The second configuration response information may include the address allocated by the third host node. For details, please refer to the specific description in step 503, which will not be repeated here.
可选的,第二配置响应信息还可包括第一通信隧道的隧道类型。也可以理解为,第二配置响应信息可以指示第一通信隧道的隧道类型。第二配置响应信息包括第一通信隧道的隧道类型,可以理解为第三宿主节点可以配置第一通信隧道的隧道类型。Optionally, the second configuration response information may further include the tunnel type of the first communication tunnel. It may also be understood that the second configuration response information may indicate the tunnel type of the first communication tunnel. The second configuration response information includes the tunnel type of the first communication tunnel, which may be understood as the third host node may configure the tunnel type of the first communication tunnel.
在第一配置信息和/或第二配置信息包括第一通信隧道的隧道类型的情况下,第二配置响应信息可以携带或不携带第一通信隧道的隧道类型。若第一配置信息和第二配置信息均不包括第一通信隧道的隧道类型,那么第三宿主节点可以配置第一通信隧道的隧道类型,并将其携带在第二配置响应信息中。或者,第三宿主节点的DU可以从OAM设备获取第一通信隧道的隧道类型。也就是说,OAM设备可以将第一通信隧道 的隧道类型预配置给第三宿主节点的DU。In the case where the first configuration information and/or the second configuration information include the tunnel type of the first communication tunnel, the second configuration response information may or may not carry the tunnel type of the first communication tunnel. If neither the first configuration information nor the second configuration information includes the tunnel type of the first communication tunnel, the third host node may configure the tunnel type of the first communication tunnel and carry it in the second configuration response information. Alternatively, the DU of the third host node may obtain the tunnel type of the first communication tunnel from the OAM device. In other words, the OAM device may The tunnel type is preconfigured to the DU of the third host node.
可选的,第二配置响应信息还可包括AMF网元为IAB-MT分配的NGAP ID,以及第三宿主节点为IAB-MT分配的NGAP ID。Optionally, the second configuration response information may also include the NGAP ID allocated by the AMF network element to the IAB-MT, and the NGAP ID allocated by the third host node to the IAB-MT.
可选的,第二配置响应信息还可包括已添加的traffic列表信息和/或未添加的traffic列表信息。Optionally, the second configuration response information may further include added traffic list information and/or unadded traffic list information.
606,AMF网元向第一宿主节点发送第一配置响应信息。相应的,第一宿主节点接收来自AMF网元的第一配置响应信息。606, the AMF network element sends a first configuration response message to the first host node. Correspondingly, the first host node receives the first configuration response message from the AMF network element.
第二宿主节点在接收到第二配置响应信息的情况下,向第一宿主节点发送第一配置响应信息。例如,第二宿主节点的CU向第一宿主节点的CU发送第一配置响应信息。第一配置响应信息用于响应第一配置信息。When the second host node receives the second configuration response information, the second host node sends the first configuration response information to the first host node. For example, the CU of the second host node sends the first configuration response information to the CU of the first host node. The first configuration response information is used to respond to the first configuration information.
其中,第一配置响应信息可包括第三宿主节点分配的地址,具体可参考步骤503中对其的具体描述,在此不再赘述。The first configuration response information may include the address allocated by the third host node. For details, please refer to the specific description in step 503, which will not be repeated here.
可选的,第一配置响应信息还可包括AMF网元为IAB-MT分配的NGAP ID,以及第一宿主节点为IAB-MT分配的NGAP ID。Optionally, the first configuration response information may also include the NGAP ID allocated by the AMF network element to the IAB-MT, and the NGAP ID allocated by the first host node to the IAB-MT.
可选的,第一配置响应信息还可包括已添加的traffic列表信息和/或未添加的traffic列表信息。Optionally, the first configuration response information may further include added traffic list information and/or unadded traffic list information.
本申请实施例不限定步骤603-步骤604,与步骤605-步骤606,执行的先后顺序。可以先执行步骤603-步骤604,再执行步骤605-步骤606;或者,先执行步骤605-步骤606,再执行步骤603-步骤604;或者,执行步骤603-步骤604的同时执行步骤605-步骤606。The embodiment of the present application does not limit the execution order of step 603-step 604 and step 605-step 606. Step 603-step 604 may be executed first, and then step 605-step 606; or, step 605-step 606 may be executed first, and then step 603-step 604; or, step 603-step 604 and step 605-step 606 may be executed simultaneously.
在图6所示的实施例中,第一宿主节点通过AMF网元向第三宿主节点发送用于配置第一通信隧道的配置信息,以建立第二宿主节点的DU与第三宿主节点的DU之间的第一通信隧道,从而可以减少业务中断时延,有助于提高业务稳定性。In the embodiment shown in Figure 6, the first host node sends configuration information for configuring the first communication tunnel to the third host node through the AMF network element to establish a first communication tunnel between the DU of the second host node and the DU of the third host node, thereby reducing service interruption delay and helping to improve service stability.
图5和图6所示的实施例中,建立第二宿主节点的DU与第三宿主节点的DU之间的第一通信隧道。示例性的,可参考图7A所示的通信隧道的示意图,在IAB-donor-DU 2与IAB-donor-DU 3之间建立第一通信隧道。In the embodiments shown in Figures 5 and 6, a first communication tunnel is established between the DU of the second host node and the DU of the third host node. For example, referring to the schematic diagram of the communication tunnel shown in Figure 7A, a first communication tunnel is established between IAB-donor-DU 2 and IAB-donor-DU 3.
基于图7A所示的示例图,若第一通信隧道的隧道类型为IP隧道类型,那么上行链路数据包传输过程可包括:Based on the example diagram shown in FIG. 7A , if the tunnel type of the first communication tunnel is an IP tunnel type, the uplink data packet transmission process may include:
1)IAB-donor-DU 3在检测到上行链路数据包的目的IP地址为IAB-donor-CU 1的IP地址时,为该上行链路数据包添加IP头(目的IP地址为IAB-donor-DU 2的IP地址,源IP地址为IAB-donor-DU 3的IP地址),得到第一上行链路数据包。并确定第一上行链路数据包通过第一通信隧道传输。进而,IAB-donor-DU 3通过第一通信隧道,向IAB-donor-DU 2传输第一上行链路数据包。1) When IAB-donor-DU 3 detects that the destination IP address of the uplink data packet is the IP address of IAB-donor-CU 1, it adds an IP header to the uplink data packet (the destination IP address is the IP address of IAB-donor-DU 2, and the source IP address is the IP address of IAB-donor-DU 3) to obtain the first uplink data packet. It is determined that the first uplink data packet is transmitted through the first communication tunnel. Then, IAB-donor-DU 3 transmits the first uplink data packet to IAB-donor-DU 2 through the first communication tunnel.
2)IAB-donor-DU 2在接收到第一上行链路数据包时,将第一上行链路数据包的IP头删除,得到上行链路数据包。IAB-donor-DU 2可以默认保留通过第一通信隧道传输的上行链路数据包。或者,IAB-donor-DU 2可以将IAB-donor-DU 3分配的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的上行链路数据包,并保留该上行链路数据包。2) Upon receiving the first uplink data packet, IAB-donor-DU 2 deletes the IP header of the first uplink data packet to obtain the uplink data packet. IAB-donor-DU 2 may retain the uplink data packet transmitted through the first communication tunnel by default. Alternatively, IAB-donor-DU 2 may use the IP address assigned by IAB-donor-DU 3 as a whitelist, identify the uplink data packet whose source IP address belongs to the whitelist based on the whitelist, and retain the uplink data packet.
可选的,IAB-donor-DU 2为保留的上行链路数据包添加IP头(目的IP地址为IAB-donor-CU 1的IP地址,源IP地址为IAB-donor-DU 2的IP地址),得到第二上行链路数据包。Optionally, IAB-donor-DU 2 adds an IP header to the reserved uplink data packet (the destination IP address is the IP address of IAB-donor-CU 1, and the source IP address is the IP address of IAB-donor-DU 2) to obtain a second uplink data packet.
可选的,IAB-donor-DU 2通过与IAB-donor-CU 1之间的IP隧道,向IAB-donor-CU 1发送保留的上行链路数据包。IAB-donor-DU 2与IAB-donor-CU 1之间的IP隧道,可以理解为已建立的IP隧道。通过该IP隧道传输,可以防止IAB-donor-DU 2与IAB-donor-CU 1之间的路径可能存在的其他路由节点过滤掉IAB-donor-DU 2保留的上行链路数据包。Optionally, IAB-donor-DU 2 sends the reserved uplink data packet to IAB-donor-CU 1 through the IP tunnel between IAB-donor-DU 2 and IAB-donor-CU 1. The IP tunnel between IAB-donor-DU 2 and IAB-donor-CU 1 can be understood as an established IP tunnel. Transmission through the IP tunnel can prevent other routing nodes that may exist in the path between IAB-donor-DU 2 and IAB-donor-CU 1 from filtering out the uplink data packet reserved by IAB-donor-DU 2.
基于图7A所示的示例图,若第一通信隧道的隧道类型为GTP-U隧道类型,那么上行链路数据包传输过程可包括:Based on the example diagram shown in FIG. 7A , if the tunnel type of the first communication tunnel is a GTP-U tunnel type, the uplink data packet transmission process may include:
1)IAB-donor-DU 3在检测到上行链路数据包的目的IP地址为IAB-donor-CU 1的IP地址时,基于IAB-donor-DU2的IP地址、UDP端口号和第一通信隧道的TEID,为该上行链路数据包添加GTP-U头、UDP头和外层IP头(目的IP地址为IAB-donor-DU 2的IP地址,源IP地址为IAB-donor-DU 3的IP地址),得到第一上行链路数据包。并确定第一上行链路数据包通过第一通信隧道传输。进而,IAB-donor-DU 3通过第一通信隧道,向IAB-donor-DU 2传输第一上行链路数据包。1) When IAB-donor-DU 3 detects that the destination IP address of the uplink data packet is the IP address of IAB-donor-CU 1, based on the IP address of IAB-donor-DU2, the UDP port number and the TEID of the first communication tunnel, it adds a GTP-U header, a UDP header and an outer IP header to the uplink data packet (the destination IP address is the IP address of IAB-donor-DU 2, and the source IP address is the IP address of IAB-donor-DU 3) to obtain the first uplink data packet. It is determined that the first uplink data packet is transmitted through the first communication tunnel. Then, IAB-donor-DU 3 transmits the first uplink data packet to IAB-donor-DU 2 through the first communication tunnel.
2)IAB-donor-DU 2在接收到第一上行链路数据包时,将第一上行链路数据包的GTP-U头、UDP头和外层IP头删除,得到上行链路数据包。IAB-donor-DU 2可以默认保留通过第一通信隧道传输的上行链路 数据包。或者,IAB-donor-DU 2可以将IAB-donor-DU 3分配的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的上行链路数据包,并保留该上行链路数据包。2) When receiving the first uplink data packet, IAB-donor-DU 2 deletes the GTP-U header, UDP header, and outer IP header of the first uplink data packet to obtain an uplink data packet. IAB-donor-DU 2 may retain the uplink data packet transmitted through the first communication tunnel by default. Alternatively, IAB-donor-DU 2 may use the IP address assigned by IAB-donor-DU 3 as a whitelist, identify the uplink data packet whose source IP address belongs to the whitelist based on the whitelist, and retain the uplink data packet.
可选的,IAB-donor-DU 2通过与IAB-donor-CU 1之间的IP隧道,向IAB-donor-CU 1发送保留的上行链路数据包。IAB-donor-DU 2与IAB-donor-CU 1之间的IP隧道,可以理解为已建立的IP隧道。通过该IP隧道传输,可以防止IAB-donor-DU 2与IAB-donor-CU 1之间的路径可能存在的其他路由节点过滤掉IAB-donor-DU 2保留的上行链路数据包。Optionally, IAB-donor-DU 2 sends the reserved uplink data packet to IAB-donor-CU 1 through the IP tunnel between IAB-donor-DU 2 and IAB-donor-CU 1. The IP tunnel between IAB-donor-DU 2 and IAB-donor-CU 1 can be understood as an established IP tunnel. Transmission through the IP tunnel can prevent other routing nodes that may exist in the path between IAB-donor-DU 2 and IAB-donor-CU 1 from filtering out the uplink data packet reserved by IAB-donor-DU 2.
基于图7A所示的示例图,若第一通信隧道的隧道类型为IP隧道类型,那么下行链路数据包传输过程可包括:Based on the example diagram shown in FIG. 7A , if the tunnel type of the first communication tunnel is an IP tunnel type, the downlink data packet transmission process may include:
1)IAB-donor-CU 1在检测到下行链路数据包的目的IP地址属于IAB-donor-DU 3分配的IP地址时,由于IAB-donor-CU 1与IAB-donor-CU 3无法通过IP路由传输数据包,那么将该下行链路数据包路由至第一通信隧道的端点,即IAB-donor-DU 2。1) When IAB-donor-CU 1 detects that the destination IP address of the downlink data packet belongs to the IP address assigned by IAB-donor-DU 3, since IAB-donor-CU 1 and IAB-donor-CU 3 cannot transmit data packets through IP routing, the downlink data packet is routed to the endpoint of the first communication tunnel, i.e., IAB-donor-DU 2.
可选的,IAB-donor-CU 1为该下行链路数据包添加IP头(目的IP地址为IAB-donor-DU 2的IP地址,源IP地址为IAB-donor-CU 1的IP地址),得到第一下行链路数据包。并通过与IAB-donor-DU 2之间的IP隧道传输第一下行链路数据包。Optionally, IAB-donor-CU 1 adds an IP header to the downlink data packet (the destination IP address is the IP address of IAB-donor-DU 2, and the source IP address is the IP address of IAB-donor-CU 1) to obtain a first downlink data packet. The first downlink data packet is transmitted through the IP tunnel between IAB-donor-DU 2 and IAB-donor-CU 1.
2)IAB-donor-DU 2在接收到第一下行链路数据包时,可选的,将第一下行链路数据包的IP头删除,得到下行链路数据包。IAB-donor-DU 2可以默认保留下行链路数据包。或者,IAB-donor-DU 2可以将IAB-donor-CU 1的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的下行链路数据包,并保留该下行链路数据包。2) When receiving the first downlink data packet, IAB-donor-DU 2 may optionally delete the IP header of the first downlink data packet to obtain the downlink data packet. IAB-donor-DU 2 may retain the downlink data packet by default. Alternatively, IAB-donor-DU 2 may use the IP address of IAB-donor-CU 1 as a whitelist, identify the downlink data packet whose source IP address belongs to the whitelist based on the whitelist, and retain the downlink data packet.
可选的,IAB-donor-DU 2为保留的下行链路数据包添加IP头(目的IP地址为IAB-donor-DU 3的IP地址,源IP地址为IAB-donor-DU 2的IP地址),得到第二下行链路数据包。Optionally, IAB-donor-DU 2 adds an IP header to the reserved downlink data packet (the destination IP address is the IP address of IAB-donor-DU 3, and the source IP address is the IP address of IAB-donor-DU 2) to obtain a second downlink data packet.
可选的,IAB-donor-DU 2通过第一通信隧道,向IAB-donor-DU 3发送第二下行链路数据包。Optionally, IAB-donor-DU 2 sends a second downlink data packet to IAB-donor-DU 3 through the first communication tunnel.
3)可选的,IAB-donor-DU 3在接收到第二下行链路数据包时,将第二下行链路数据包的IP头删除,得到下行链路数据包。IAB-donor-DU 3可以将IAB-donor-CU 1的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的下行链路数据包,并确定保留这些下行链路数据包。或者,IAB-donor-DU 3默认保留通过第一通信隧道传输的下行链路数据包。3) Optionally, when receiving the second downlink data packet, IAB-donor-DU 3 deletes the IP header of the second downlink data packet to obtain the downlink data packet. IAB-donor-DU 3 can use the IP address of IAB-donor-CU 1 as a whitelist, identify downlink data packets whose source IP addresses belong to the whitelist based on the whitelist, and determine to retain these downlink data packets. Alternatively, IAB-donor-DU 3 retains the downlink data packets transmitted through the first communication tunnel by default.
基于图7A所示的示例图,若第一通信隧道的隧道类型为GTP-U隧道类型,那么下行链路数据包传输过程可包括:Based on the example diagram shown in FIG. 7A , if the tunnel type of the first communication tunnel is a GTP-U tunnel type, the downlink data packet transmission process may include:
1)IAB-donor-CU 1在检测到下行链路数据包的目的IP地址属于IAB-donor-DU 3分配的IP地址时,由于IAB-donor-CU 1与IAB-donor-CU 3无法通过IP路由传输数据包,那么将该下行链路数据包路由至第一通信隧道的端点,即IAB-donor-DU 2。1) When IAB-donor-CU 1 detects that the destination IP address of the downlink data packet belongs to the IP address assigned by IAB-donor-DU 3, since IAB-donor-CU 1 and IAB-donor-CU 3 cannot transmit data packets through IP routing, the downlink data packet is routed to the endpoint of the first communication tunnel, i.e., IAB-donor-DU 2.
可选的,IAB-donor-CU 1为该下行链路数据包添加IP头(目的IP地址为IAB-donor-DU 2的IP地址,源IP地址为IAB-donor-CU 1的IP地址),得到第一下行链路数据包。并通过与IAB-donor-DU 2之间的IP隧道传输第一下行链路数据包。Optionally, IAB-donor-CU 1 adds an IP header to the downlink data packet (the destination IP address is the IP address of IAB-donor-DU 2, and the source IP address is the IP address of IAB-donor-CU 1) to obtain a first downlink data packet. The first downlink data packet is transmitted through the IP tunnel between IAB-donor-DU 2 and IAB-donor-CU 1.
2)可选的,IAB-donor-DU 2在接收到第一下行链路数据包时,将第一下行链路数据包的IP头删除,得到下行链路数据包。IAB-donor-DU 2可以默认保留下行链路数据包。或者,IAB-donor-DU 2可以将IAB-donor-CU 1的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的下行链路数据包,并保留该下行链路数据包。2) Optionally, when receiving the first downlink data packet, IAB-donor-DU 2 deletes the IP header of the first downlink data packet to obtain the downlink data packet. IAB-donor-DU 2 may retain the downlink data packet by default. Alternatively, IAB-donor-DU 2 may use the IP address of IAB-donor-CU 1 as a whitelist, identify the downlink data packet whose source IP address belongs to the whitelist based on the whitelist, and retain the downlink data packet.
可选的,IAB-donor-DU 2基于IAB-donor-DU 3的IP地址、UDP端口号以及第一通信隧道的TEID,为保留的下行链路数据包添加GTP-U头、UDP头和外层IP头(目的IP地址为IAB-donor-DU 3的IP地址,源IP地址为IAB-donor-DU 2的IP地址),得到第二下行链路数据包。Optionally, IAB-donor-DU 2 adds a GTP-U header, a UDP header and an outer IP header (the destination IP address is the IP address of IAB-donor-DU 3, and the source IP address is the IP address of IAB-donor-DU 2) to the reserved downlink data packet based on the IP address of IAB-donor-DU 3, the UDP port number and the TEID of the first communication tunnel to obtain a second downlink data packet.
可选的,IAB-donor-DU 2通过第一通信隧道,向IAB-donor-DU 3发送第二下行链路数据包。Optionally, IAB-donor-DU 2 sends a second downlink data packet to IAB-donor-DU 3 through the first communication tunnel.
3)可选的,IAB-donor-DU 3在接收到第二下行链路数据包时,将第二下行链路数据包的GTP-U头、UDP头和外层IP头删除,得到下行链路数据包。IAB-donor-DU 3可以将IAB-donor-CU 1的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的下行链路数据包,并确定保留这些下行链路数据包。或者,IAB-donor-DU 3默认保留通过第一通信隧道传输的下行链路数据包。3) Optionally, when receiving the second downlink data packet, IAB-donor-DU 3 deletes the GTP-U header, UDP header and outer IP header of the second downlink data packet to obtain the downlink data packet. IAB-donor-DU 3 can use the IP address of IAB-donor-CU 1 as a whitelist, identify downlink data packets whose source IP addresses belong to the whitelist based on the whitelist, and determine to retain these downlink data packets. Alternatively, IAB-donor-DU 3 retains the downlink data packets transmitted through the first communication tunnel by default.
需要说明的是,上述IAB-donor-CU 1与IAB-donor-DU2之间的传输,还可以经过IAB-donor-CU2转发。即传输路径为IAB-donor-CU 1<——>IAB-donor-CU2<——>IAB-donor-DU2。IAB-donor-CU 1与IAB-donor-CU 2之间可以通过IP隧道传输。 It should be noted that the transmission between the above IAB-donor-CU 1 and IAB-donor-DU2 can also be forwarded through IAB-donor-CU2. That is, the transmission path is IAB-donor-CU 1<——>IAB-donor-CU2<——>IAB-donor-DU2. The transmission between IAB-donor-CU 1 and IAB-donor-CU 2 can be carried out through an IP tunnel.
图5和图6所示的实施例以第一宿主节点、第二宿主节点和第三宿主节点为例,即以3个宿主节点为例,实际应用中,宿主节点的数量可以大于3个。这样,第一宿主节点与第二宿主节点之间可通过IP路由传输数据包,可扩展为第一个宿主节点与倒数第二个宿主节点之间可通过IP路由传输数据包,第二宿主节点与第三宿主节点之间的第一通信隧道即可拓展为倒数第二个宿主节点与最后一个宿主节点之间的第一通信隧道,第一个宿主节点与最后一个宿主节点之间无法通过IP路由传输数据包。The embodiments shown in FIG5 and FIG6 take the first host node, the second host node and the third host node as examples, that is, take three host nodes as examples. In actual applications, the number of host nodes may be greater than 3. In this way, data packets can be transmitted between the first host node and the second host node via IP routing, which can be extended to the first host node and the second-to-last host node. The first communication tunnel between the second host node and the third host node can be extended to the first communication tunnel between the second-to-last host node and the last host node, and data packets cannot be transmitted between the first host node and the last host node via IP routing.
作为一种可选的实施例,不仅第二宿主节点的DU与第三宿主节点的DU之间可以建立第一通信隧道,第一宿主节点的DU与第二宿主节点的DU之间也可以建立通信隧道,即第二通信隧道。也就是说,相邻两个宿主节点的DU之间可以建立通信隧道。换句话说,可以配置多个通信隧道。为了便于区分是配置第一通信隧道还是配置多个通信隧道,本申请实施例中隧道配置信息(例如第一隧道配置信息或第二隧道配置信息等)或隧道配置响应信息(例如第一隧道配置响应信息或第二隧道配置响应信息等)可携带一个指示信息,该指示信息用于指示配置第一通信隧道或配置多个通信隧道。As an optional embodiment, not only can a first communication tunnel be established between the DU of the second host node and the DU of the third host node, but a communication tunnel, i.e., a second communication tunnel, can also be established between the DU of the first host node and the DU of the second host node. In other words, a communication tunnel can be established between the DUs of two adjacent host nodes. In other words, multiple communication tunnels can be configured. In order to facilitate the distinction between configuring a first communication tunnel or configuring multiple communication tunnels, in an embodiment of the present application, tunnel configuration information (such as first tunnel configuration information or second tunnel configuration information, etc.) or tunnel configuration response information (such as first tunnel configuration response information or second tunnel configuration response information, etc.) may carry an indication information, which is used to indicate the configuration of a first communication tunnel or the configuration of multiple communication tunnels.
在一种实现方式中,第一宿主节点可以配置多个通信隧道。第一配置信息可包含于第一隧道配置信息,第一隧道配置信息用于配置多个通信隧道和隧道类型。这多个通信隧道包括第一通信隧道和第二通信隧道。可选的,第一隧道配置信息配置的隧道类型可包括第二通信隧道的隧道类型。第一隧道配置信息可以针对多个通信隧道中的每个通信隧道配置隧道类型,或针对部分通信隧道配置隧道类型,或配置一个隧道类型适用于这多个通信隧道。In one implementation, the first host node may configure multiple communication tunnels. The first configuration information may be included in the first tunnel configuration information, and the first tunnel configuration information is used to configure multiple communication tunnels and tunnel types. The multiple communication tunnels include a first communication tunnel and a second communication tunnel. Optionally, the tunnel type configured by the first tunnel configuration information may include the tunnel type of the second communication tunnel. The first tunnel configuration information may configure a tunnel type for each communication tunnel in the multiple communication tunnels, or configure a tunnel type for some communication tunnels, or configure a tunnel type applicable to the multiple communication tunnels.
第一隧道配置信息可以理解为一个隧道列表,该隧道列表包括隧道索引和隧道类型。示例性的,第一隧道配置信息可表示为如下:The first tunnel configuration information can be understood as a tunnel list, which includes a tunnel index and a tunnel type. Exemplarily, the first tunnel configuration information can be expressed as follows:
>隧道列表(tunnellist)>Tunnel list (tunnellist)
>>隧道索引(tunnel index)>>tunnel index
>>隧道类型(tunnel type)>>Tunnel type
可选的,第一隧道配置信息还可配置多个通信隧道之间的关联关系,用于指示不同通信隧道之间的对应关系,即传输数据包的路径。例如,当前通信隧道的出口对应多个通信隧道时,应该选择哪个通信隧道作为下一段通信隧道。示例性的,第一隧道配置信息可表示如下:Optionally, the first tunnel configuration information may also configure the association relationship between multiple communication tunnels, which is used to indicate the corresponding relationship between different communication tunnels, that is, the path for transmitting data packets. For example, when the exit of the current communication tunnel corresponds to multiple communication tunnels, which communication tunnel should be selected as the next communication tunnel. Exemplarily, the first tunnel configuration information may be expressed as follows:
>tunnelmappingconfiguration>tunnelmappingconfiguration
>>UL(上行对应关系)>>UL (uplink correspondence)
>>>tunnel index>>>tunnel index
>>>>tunnel type>>>>tunnel type
>>>next tunnel index>>>next tunnel index
>>>>tunnel type>>>>tunnel type
>>DL(下行对应关系)>>DL (downlink correspondence)
>>>tunnel index>>>tunnel index
>>>>tunnel type>>>>tunnel type
>>>next tunnel index>>>next tunnel index
>>>>tunnel type>>>>tunnel type
当tunnelmappingconfiguration中包括tunnel type时,不仅可以指示使用哪些通信隧道以及它们的隧道类型,还能指示经过这些通信隧道路由时的路径。When tunnel type is included in the tunnelmappingconfiguration, it indicates not only which communication tunnels to use and their tunnel types, but also the paths to be taken when routing through these communication tunnels.
可选的,第一配置响应信息可包含于第一隧道配置响应信息,第一隧道配置响应信息用于配置多个通信隧道和隧道类型。第一隧道配置响应信息与第一隧道配置信息类似,在此不再赘述。也就是说,第二宿主节点或AMF网元可以配置多个通信隧道。可选的,第一隧道配置响应信息还可包括多个通信隧道之间的关联关系。也就是说,第二宿主节点或AMF网元可以配置多个通信隧道之间的关联关系。Optionally, the first configuration response information may be included in the first tunnel configuration response information, and the first tunnel configuration response information is used to configure multiple communication tunnels and tunnel types. The first tunnel configuration response information is similar to the first tunnel configuration information and is not repeated here. That is to say, the second host node or AMF network element can configure multiple communication tunnels. Optionally, the first tunnel configuration response information may also include an association relationship between multiple communication tunnels. That is to say, the second host node or AMF network element can configure an association relationship between multiple communication tunnels.
可选的,宿主节点之间可以基于信令交互得到目的IP地址,从而采用目的IP地址来识别下一段通信隧道。可选的,宿主节点之间还可以基于信令交互得到TEID和/或UDP端口号,从而采用目的IP地址和TEID,或目标IP地址和UDP端口号,或目标IP地址、TEID和UDP端口号,来识别下一段通信隧道。若当前通信隧道的出口对应多个通信隧道可以到达目的IP地址时,宿主节点可通过实现自主选择下一段通信隧道。Optionally, the host nodes can obtain the destination IP address based on signaling interaction, and use the destination IP address to identify the next communication tunnel. Optionally, the host nodes can also obtain TEID and/or UDP port number based on signaling interaction, and use the destination IP address and TEID, or the target IP address and UDP port number, or the target IP address, TEID and UDP port number to identify the next communication tunnel. If the exit of the current communication tunnel corresponds to multiple communication tunnels that can reach the destination IP address, the host node can autonomously select the next communication tunnel.
在另一种实现方式中,第二宿主节点或AMF网元可以配置多个通信隧道。In another implementation, the second host node or AMF network element can be configured with multiple communication tunnels.
可选的,第二配置信息包含于第二隧道配置信息,第二隧道配置信息用于配置多个通信隧道以及隧道类型。第二隧道配置信息与第一隧道配置信息类似,在此不再赘述。 Optionally, the second configuration information is included in the second tunnel configuration information, and the second tunnel configuration information is used to configure multiple communication tunnels and tunnel types. The second tunnel configuration information is similar to the first tunnel configuration information and will not be described in detail here.
可选的,第三配置响应信息包含于第三隧道配置响应信息,第三隧道配置响应信息用于配置多个通信隧道以及隧道类型。第三隧道配置响应信息与第一隧道配置信息类似,在此不再赘述。Optionally, the third configuration response information is included in the third tunnel configuration response information, and the third tunnel configuration response information is used to configure multiple communication tunnels and tunnel types. The third tunnel configuration response information is similar to the first tunnel configuration information, and will not be described in detail here.
在又一种实现方式中,第三宿主节点可以配置多个通信隧道。In yet another implementation, the third host node may be configured with multiple communication tunnels.
可选的,第二配置响应信息包含于第二隧道配置响应信息,第二隧道配置响应信息用于配置多个通信隧道以及隧道类型。第二隧道配置响应信息与第一隧道配置信息类似,在此不再赘述。Optionally, the second configuration response information is included in the second tunnel configuration response information, and the second tunnel configuration response information is used to configure multiple communication tunnels and tunnel types. The second tunnel configuration response information is similar to the first tunnel configuration information and will not be described in detail here.
可选的,第三配置信息包含于第三隧道配置信息,第三隧道配置信息用于配置多个通信隧道以及隧道类型。第三隧道配置信息与第一隧道配置信息类似,在此不再赘述。Optionally, the third configuration information is included in the third tunnel configuration information, and the third tunnel configuration information is used to configure multiple communication tunnels and tunnel types. The third tunnel configuration information is similar to the first tunnel configuration information and will not be described in detail here.
在又一种实现方式中,OAM设备可以配置多个通信隧道和隧道类型。OAM设备可将其配置的多个通信隧道和隧道类型告知第二宿主节点和/或第三宿主节点。In yet another implementation, the OAM device may configure multiple communication tunnels and tunnel types. The OAM device may inform the second host node and/or the third host node of the multiple communication tunnels and tunnel types configured by the OAM device.
示例性的,可参考图7B所示的通信隧道的示意图,在IAB-donor-DU 2与IAB-donor-DU 3之间建立第一通信隧道,在IAB-donor-DU 1与IAB-donor-DU 2建立第二通信隧道。第一通信隧道与第二通信隧道的隧道类型可以相同,或不同。Exemplarily, referring to the schematic diagram of the communication tunnel shown in FIG7B , a first communication tunnel is established between IAB-donor-DU 2 and IAB-donor-DU 3, and a second communication tunnel is established between IAB-donor-DU 1 and IAB-donor-DU 2. The tunnel types of the first communication tunnel and the second communication tunnel may be the same or different.
基于图7B所示的示例图,若第一通信隧道的隧道类型为IP隧道类型,第二通信隧道的隧道类型为GTP-U隧道类型,那么上行链路数据包传输过程可包括:Based on the example diagram shown in FIG. 7B , if the tunnel type of the first communication tunnel is an IP tunnel type and the tunnel type of the second communication tunnel is a GTP-U tunnel type, then the uplink data packet transmission process may include:
1)IAB-donor-DU 3在检测到上行链路数据包的目的IP地址为IAB-donor-CU 1的IP地址时,为该上行链路数据包添加IP头(目的IP地址为IAB-donor-DU 2的IP地址,源IP地址为IAB-donor-DU 3的IP地址),得到第一上行链路数据包。并确定第一上行链路数据包通过第一通信隧道传输。进而,IAB-donor-DU 3通过第一通信隧道,向IAB-donor-DU 2传输第一上行链路数据包。1) When IAB-donor-DU 3 detects that the destination IP address of the uplink data packet is the IP address of IAB-donor-CU 1, it adds an IP header to the uplink data packet (the destination IP address is the IP address of IAB-donor-DU 2, and the source IP address is the IP address of IAB-donor-DU 3) to obtain the first uplink data packet. It is determined that the first uplink data packet is transmitted through the first communication tunnel. Then, IAB-donor-DU 3 transmits the first uplink data packet to IAB-donor-DU 2 through the first communication tunnel.
2)IAB-donor-DU 2在接收到第一上行链路数据包时,将第一上行链路数据包的IP头删除,得到上行链路数据包。IAB-donor-DU 2可以默认保留通过第一通信隧道传输的上行链路数据包。或者,IAB-donor-DU 2可以将IAB-donor-DU 3分配的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的上行链路数据包,并保留该上行链路数据包。2) Upon receiving the first uplink data packet, IAB-donor-DU 2 deletes the IP header of the first uplink data packet to obtain the uplink data packet. IAB-donor-DU 2 may retain the uplink data packet transmitted through the first communication tunnel by default. Alternatively, IAB-donor-DU 2 may use the IP address assigned by IAB-donor-DU 3 as a whitelist, identify the uplink data packet whose source IP address belongs to the whitelist based on the whitelist, and retain the uplink data packet.
3)IAB-donor-DU 2基于IAB-donor-DU1的IP地址、UDP端口号和第二通信隧道的TEID,为保留的上行链路数据包添加GTP-U头、UDP头和外层IP头(目的IP地址为IAB-donor-DU 1的IP地址,源IP地址为IAB-donor-DU 2的IP地址),得到第二上行链路数据包。3) Based on the IP address, UDP port number and TEID of the second communication tunnel of IAB-donor-DU1, IAB-donor-DU 2 adds a GTP-U header, a UDP header and an outer IP header (the destination IP address is the IP address of IAB-donor-DU 1, and the source IP address is the IP address of IAB-donor-DU 2) to the reserved uplink data packet to obtain the second uplink data packet.
可选的,IAB-donor-DU 2通过第二通信隧道,向IAB-donor-DU 1发送第二上行链路数据包。Optionally, IAB-donor-DU 2 sends a second uplink data packet to IAB-donor-DU 1 through a second communication tunnel.
4)IAB-donor-DU 1在接收到第二上行链路数据包时,将第二上行链路数据包的GTP-U头、UDP头和外层IP头删除,得到上行链路数据包。IAB-donor-DU 1可以默认保留通过第二通信隧道传输的上行链路数据包。或者,IAB-donor-DU 1可以将IAB-donor-DU 3分配的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的上行链路数据包,并保留该上行链路数据包。4) Upon receiving the second uplink data packet, IAB-donor-DU 1 deletes the GTP-U header, UDP header, and outer IP header of the second uplink data packet to obtain an uplink data packet. IAB-donor-DU 1 may retain the uplink data packet transmitted through the second communication tunnel by default. Alternatively, IAB-donor-DU 1 may use the IP address assigned by IAB-donor-DU 3 as a whitelist, identify the uplink data packet whose source IP address belongs to the whitelist based on the whitelist, and retain the uplink data packet.
可选的,IAB-donor-DU 1为保留的上行链路数据包添加外层IP头(目的IP地址为IAB-donor-CU 1的IP地址,源IP地址为IAB-donor-DU 1的IP地址)。Optionally, IAB-donor-DU 1 adds an outer IP header to the reserved uplink data packet (the destination IP address is the IP address of IAB-donor-DU 1, and the source IP address is the IP address of IAB-donor-DU 1).
基于图7B所示的示例图,若第一通信隧道的隧道类型为IP隧道类型,第二通信隧道的隧道类型为GTP-U隧道类型,那么下行链路数据包传输过程可包括:Based on the example diagram shown in FIG. 7B , if the tunnel type of the first communication tunnel is an IP tunnel type and the tunnel type of the second communication tunnel is a GTP-U tunnel type, the downlink data packet transmission process may include:
1)IAB-donor-CU 1在检测到下行链路数据包的目的IP地址属于IAB-donor-DU 3分配的IP地址时,由于IAB-donor-CU 1与IAB-donor-CU 3无法通过IP路由传输数据包,那么将该下行链路数据包路由至第二通信隧道的端点,即IAB-donor-DU 1。1) When IAB-donor-CU 1 detects that the destination IP address of the downlink data packet belongs to the IP address assigned by IAB-donor-DU 3, since IAB-donor-CU 1 and IAB-donor-CU 3 cannot transmit data packets through IP routing, the downlink data packet is routed to the endpoint of the second communication tunnel, i.e., IAB-donor-DU 1.
可选的,IAB-donor-CU 1为该下行链路数据包添加IP头(目的IP地址为IAB-donor-DU 1的IP地址,源IP地址为IAB-donor-CU 1的IP地址),得到第一下行链路数据包。并通过与IAB-donor-DU 1之间的IP隧道传输第一下行链路数据包至IAB-donor-DU 1。Optionally, IAB-donor-CU 1 adds an IP header to the downlink data packet (the destination IP address is the IP address of IAB-donor-DU 1, and the source IP address is the IP address of IAB-donor-CU 1) to obtain a first downlink data packet. The first downlink data packet is transmitted to IAB-donor-DU 1 through the IP tunnel between IAB-donor-DU 1 and IAB-donor-DU 1.
可选的,IAB-donor-DU 1在接收到第一下行链路数据包时,将第一下行链路数据包的IP头删除,得到下行链路数据包。Optionally, when receiving the first downlink data packet, IAB-donor-DU 1 deletes the IP header of the first downlink data packet to obtain the downlink data packet.
2)IAB-donor-DU 1基于IAB-donor-DU 2的IP地址、UDP端口号以及第二通信隧道的TEID,为下行链路数据包添加GTP-U头、UDP头和外层IP头(目的IP地址为IAB-donor-DU 2的IP地址,源IP地址为IAB-donor-DU 1的IP地址),得到第二下行链路数据包。并通过第二通信隧道向IAB-donor-DU 2发送第二下行链路数据包。2) IAB-donor-DU 1 adds a GTP-U header, a UDP header, and an outer IP header (the destination IP address is the IP address of IAB-donor-DU 2, and the source IP address is the IP address of IAB-donor-DU 1) to the downlink data packet based on the IP address, UDP port number, and TEID of the second communication tunnel of IAB-donor-DU 2, and obtains the second downlink data packet. The second downlink data packet is sent to IAB-donor-DU 2 through the second communication tunnel.
3)IAB-donor-DU 2在接收到第二下行链路数据包时,将第二下行链路数据包的GTP-U头、UDP头和外层IP头删除,得到下行链路数据包。IAB-donor-DU 2可以默认保留通过第二通信隧道传输的下行链路数据包。或者,IAB-donor-DU 2可以将IAB-donor-CU 1的IP地址作为白名单,基于白名单识别出源IP地 址属于该白名单的下行链路数据包,并保留该下行链路数据包。3) When receiving the second downlink data packet, IAB-donor-DU 2 deletes the GTP-U header, UDP header and outer IP header of the second downlink data packet to obtain a downlink data packet. IAB-donor-DU 2 may retain the downlink data packet transmitted through the second communication tunnel by default. Alternatively, IAB-donor-DU 2 may use the IP address of IAB-donor-CU 1 as a whitelist and identify the source IP address based on the whitelist. The downlink data packet whose address belongs to the white list is received and the downlink data packet is retained.
可选的,IAB-donor-DU 2为保留的下行链路数据包添加IP头(目的IP地址为IAB-donor-DU 3的IP地址,源IP地址为IAB-donor-DU 2的IP地址),得到第二下行链路数据包。Optionally, IAB-donor-DU 2 adds an IP header to the reserved downlink data packet (the destination IP address is the IP address of IAB-donor-DU 3, and the source IP address is the IP address of IAB-donor-DU 2) to obtain a second downlink data packet.
可选的,IAB-donor-DU 2通过第一通信隧道,向IAB-donor-DU 3发送第二下行链路数据包。Optionally, IAB-donor-DU 2 sends a second downlink data packet to IAB-donor-DU 3 through the first communication tunnel.
4)IAB-donor-DU 3在接收到第二下行链路数据包时,可选的,将第二下行链路数据包的IP头删除,得到下行链路数据包。IAB-donor-DU 3可以将IAB-donor-CU 1的IP地址作为白名单,基于白名单识别出源IP地址属于该白名单的下行链路数据包,并确定保留这些下行链路数据包。或者,IAB-donor-DU 3默认保留通过第一通信隧道传输的下行链路数据包。4) When receiving the second downlink data packet, IAB-donor-DU 3 may optionally delete the IP header of the second downlink data packet to obtain the downlink data packet. IAB-donor-DU 3 may use the IP address of IAB-donor-CU 1 as a whitelist, identify downlink data packets whose source IP addresses belong to the whitelist based on the whitelist, and determine to retain these downlink data packets. Alternatively, IAB-donor-DU 3 retains the downlink data packets transmitted through the first communication tunnel by default.
上述以第一通信隧道的隧道类型为IP隧道类型,第二通信隧道的隧道类型为GTP-U隧道类型为例,对上行链路数据包传输过程和下行链路数据包传输过程进行描述。The above describes the uplink data packet transmission process and the downlink data packet transmission process by taking the tunnel type of the first communication tunnel as the IP tunnel type and the tunnel type of the second communication tunnel as the GTP-U tunnel type as an example.
在一种实现方式中,第一通信隧道的隧道类型GTP-U隧道类型,第二通信隧道的隧道类型也为GTP-U隧道类型。该方式下的数据包传输过程可综合第一通信隧道的隧道类型为GTP-U隧道类型的数据包传输过程,以及第二通信隧道的隧道类型为GTP-U隧道类型的数据包传输过程。In one implementation, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the tunnel type of the second communication tunnel is also a GTP-U tunnel type. The data packet transmission process under this mode can integrate the data packet transmission process of the first communication tunnel with a tunnel type of the GTP-U tunnel type and the data packet transmission process of the second communication tunnel with a tunnel type of the GTP-U tunnel type.
在另一种实现方式中,第一通信隧道的隧道类型IP隧道类型,第二通信隧道的隧道类型也为IP隧道类型。该方式下的数据包传输过程可综合第一通信隧道的隧道类型为IP隧道类型的数据包传输过程,以及第二通信隧道的隧道类型为IP隧道类型的数据包传输过程。In another implementation, the tunnel type of the first communication tunnel is an IP tunnel type, and the tunnel type of the second communication tunnel is also an IP tunnel type. The data packet transmission process under this mode can integrate the data packet transmission process of the first communication tunnel being an IP tunnel type and the data packet transmission process of the second communication tunnel being an IP tunnel type.
在又一种实现方式中,第一通信隧道的隧道类型GTP-U隧道类型,第二通信隧道的隧道类型也为IP隧道类型。该方式下的数据包传输过程可综合第一通信隧道的隧道类型为GTP-U隧道类型的数据包传输过程,以及第二通信隧道的隧道类型为IP隧道类型的数据包传输过程。In another implementation, the tunnel type of the first communication tunnel is a GTP-U tunnel type, and the tunnel type of the second communication tunnel is also an IP tunnel type. The data packet transmission process under this mode can integrate the data packet transmission process of the first communication tunnel with a tunnel type of the GTP-U tunnel type and the data packet transmission process of the second communication tunnel with a tunnel type of the IP tunnel type.
相应于上述方法实施例给出的方法,本申请实施例还提供了相应的装置,包括用于执行上述实施例相应的模块。所述模块可以是软件,也可以是硬件,或者是软件和硬件结合。Corresponding to the method provided in the above method embodiment, the present application embodiment also provides a corresponding device, including a module for executing the corresponding module of the above embodiment. The module can be software, hardware, or a combination of software and hardware.
图8给出了一种通信装置的结构示意图。通信装置800可以是宿主节点,也可以是支持宿主节点实现上述方法的芯片、芯片***、或处理器等。其中,宿主节点可以是第一宿主节点,也可以是第二宿主节点,还可以是第三宿主节点。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。FIG8 shows a schematic diagram of the structure of a communication device. The communication device 800 may be a host node, or a chip, a chip system, or a processor that supports the host node to implement the above method. The host node may be a first host node, a second host node, or a third host node. The device may be used to implement the method described in the above method embodiment, and the details may refer to the description in the above method embodiment.
通信装置800可以包括一个或多个处理器801,处理器801也可以称为处理单元或处理模块等,可以实现一定的控制功能。处理器801可以是通用处理器或者专用处理器等。通用处理器例如可以是中央处理器,专用处理器例如可以是基带处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,MT、DU或CU等)进行控制,执行软件程序,处理软件程序的数据。The communication device 800 may include one or more processors 801, which may also be referred to as a processing unit or a processing module, etc., and may implement certain control functions. The processor 801 may be a general-purpose processor or a dedicated processor, etc. The general-purpose processor may be, for example, a central processing unit, and the dedicated processor may be, for example, a baseband processor. The baseband processor may be used to process the communication protocol and the communication data, and the central processing unit may be used to control the communication device (such as a base station, a baseband chip, an MT, a DU or a CU, etc.), execute the software program, and process the data of the software program.
在一种可选的设计中,处理器801也可以存有指令803,所述指令803可以被处理器801运行,使得通信装置800执行上述方法实施例中描述的方法。In an optional design, the processor 801 may also store instructions 803, and the instructions 803 can be executed by the processor 801, so that the communication device 800 executes the method described in the above method embodiment.
在另一种可选的设计中,处理器801中可以包括用于实现接收和发送功能的收发单元。例如该收发单元可以是收发电路,或者是接口。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路或接口可以用于指令的读写,或者,上述收发电路或接口可以用于信号的传输。In another optional design, the processor 801 may include a transceiver unit for implementing the receiving and sending functions. For example, the transceiver unit may be a transceiver circuit or an interface. The transceiver circuit, interface or interface circuit for implementing the receiving and sending functions may be separate or integrated. The above-mentioned transceiver circuit or interface may be used for reading and writing instructions, or the above-mentioned transceiver circuit or interface may be used for signal transmission.
可选的,通信装置800中可以包括一个或多个存储器802,其上可以存有指令804,指令804可在处理器801上被运行,使得通信装置800执行上述方法实施例中描述的方法。可选的,存储器802中还可以存储有数据。可选的,处理器801中也可以存储指令和/或数据。处理器801和存储器802可以单独设置,也可以集成在一起。例如,上述方法实施例中所描述的对应关系可以存储在存储器802中,或者存储在处理器801中。Optionally, the communication device 800 may include one or more memories 802, on which instructions 804 may be stored, and the instructions 804 may be executed on the processor 801, so that the communication device 800 performs the method described in the above method embodiment. Optionally, data may also be stored in the memory 802. Optionally, instructions and/or data may also be stored in the processor 801. The processor 801 and the memory 802 may be provided separately or integrated together. For example, the corresponding relationship described in the above method embodiment may be stored in the memory 802, or in the processor 801.
可选的,通信装置800还可以包括收发器805和/或天线806。收发器805可以称为收发单元、收发机、收发电路、收发装置或收发模块等,用于实现收发功能。Optionally, the communication device 800 may further include a transceiver 805 and/or an antenna 806. The transceiver 805 may be referred to as a transceiver unit, a transceiver, a transceiver circuit, a transceiver device or a transceiver module, etc., and is used to implement a transceiver function.
可选的,本申请实施例中,通信装置800为中继设备时,可以包含各种功能模块,用于执行方法实施例中的中继设备或IAB node执行的步骤。Optionally, in an embodiment of the present application, when the communication device 800 is a relay device, it may include various functional modules for executing the steps performed by the relay device or IAB node in the method embodiment.
可选的,本申请实施例中,通信装置800为第一宿主节点时,可以包含各种功能模块,用于执行方法实施例中的第一宿主节点执行的步骤。Optionally, in an embodiment of the present application, when the communication device 800 is a first host node, it may include various functional modules for executing the steps performed by the first host node in the method embodiment.
可选的,本申请实施例中,通信装置800为第二宿主节点时,可以包含各种功能模块,用于执行方法 实施例中的第二宿主节点执行的步骤。Optionally, in the embodiment of the present application, when the communication device 800 is a second host node, it can include various functional modules for executing the method Steps performed by the second host node in the embodiment.
可选的,本申请实施例中,通信装置800为第三宿主节点时,可以包含各种功能模块,用于执行方法实施例中的第三宿主节点执行的步骤。Optionally, in an embodiment of the present application, when the communication device 800 is a third host node, it may include various functional modules for executing the steps performed by the third host node in the method embodiment.
本申请中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)上。IC可以包括模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)等。印刷电路板(printed circuit board,PCB)上印刷电路可以实现IC。The processor and transceiver described in the present application can be implemented on an integrated circuit (IC). The IC can include an analog IC, a radio frequency integrated circuit RFIC, a mixed signal IC, an application specific integrated circuit (ASIC), etc. The IC can be implemented by printing circuits on a printed circuit board (PCB).
如图9所示,本申请又一实施例提供了一种通信装置900。该装置可以是宿主节点,也可以是宿主节点的部件(例如,集成电路,芯片等等)。该装置也可以是其他通信模块,用于实现本申请方法实施例中的方法。该通信装置900可以包括:处理单元901(或称为处理模块)。可选的,还可以包括通信单元902(或称为收发单元,接收单元和/或发送单元)。可选的,还可以包括存储单元(或称为存储模块)。As shown in FIG9 , another embodiment of the present application provides a communication device 900. The device may be a host node or a component of a host node (e.g., an integrated circuit, a chip, etc.). The device may also be other communication modules for implementing the method in the method embodiment of the present application. The communication device 900 may include: a processing unit 901 (or a processing module). Optionally, it may also include a communication unit 902 (or a transceiver unit, a receiving unit and/or a sending unit). Optionally, it may also include a storage unit (or a storage module).
在一种可能的设计中,如图9中的一个或者多个单元可能由一个或者多个处理器来实现,或者由一个或者多个处理器和存储器来实现;或者由一个或多个处理器和收发器实现;或者由一个或者多个处理器、存储器和收发器实现,本申请实施例对此不作限定。所述处理器、存储器、收发器可以单独设置,也可以集成。In a possible design, one or more units in FIG. 9 may be implemented by one or more processors, or by one or more processors and memories; or by one or more processors and transceivers; or by one or more processors, memories, and transceivers, which are not limited in the embodiments of the present application. The processors, memories, and transceivers may be provided separately or integrated.
可选的,本申请实施例中的通信装置900中各个模块可以用于执行方法实施例描述的方法。Optionally, each module in the communication device 900 in the embodiment of the present application can be used to execute the method described in the method embodiment.
可以理解的是,本申请实施例中的一些可选的特征,在某些场景下,可以不依赖于其他特征,比如其当前所基于的方案,而独立实施,解决相应的技术问题,达到相应的效果,也可以在某些场景下,依据需求与其他特征进行结合。相应的,本申请实施例中给出的装置也可以相应的实现这些特征或功能,在此不予赘述。It is understandable that some optional features in the embodiments of the present application may be implemented independently in certain scenarios without relying on other features, such as the solution on which they are currently based, to solve corresponding technical problems and achieve corresponding effects, or may be combined with other features according to needs in certain scenarios. Accordingly, the devices provided in the embodiments of the present application may also implement these features or functions accordingly, which will not be elaborated here.
本领域技术人员还可以理解到本申请实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个***的设计要求。本领域技术人员对于相应的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本申请实施例保护的范围。Those skilled in the art can also understand that the various illustrative logical blocks and steps listed in the embodiments of the present application can be implemented by electronic hardware, computer software, or a combination of the two. Whether such functions are implemented by hardware or software depends on the specific application and the design requirements of the entire system. Those skilled in the art can use various methods to implement the functions for corresponding applications, but such implementation should not be understood as exceeding the scope of protection of the embodiments of the present application.
可以理解,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其它可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。It can be understood that the processor in the embodiment of the present application can be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method embodiment can be completed by an integrated logic circuit of hardware in the processor or an instruction in the form of software. The above processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (application specific integrated circuit, ASIC), a field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct ram bus RAM,DR RAM)。应注意,本文描述的***和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in the embodiments of the present application can be a volatile memory or a non-volatile memory, or can include both volatile and non-volatile memories. Among them, the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory can be a random access memory (RAM), which is used as an external cache. By way of example and not limitation, many forms of RAM are available, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and direct ram bus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to include, but is not limited to, these and any other suitable types of memory.
可以理解,说明书通篇中提到的“实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各个实施例未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。可以理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It is understood that the "embodiment" mentioned throughout the specification means that the specific features, structures or characteristics related to the embodiment are included in at least one embodiment of the present application. Therefore, the various embodiments in the entire specification do not necessarily refer to the same embodiment. In addition, these specific features, structures or characteristics can be combined in one or more embodiments in any suitable manner. It is understood that in various embodiments of the present application, the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiment of the present application.
本申请中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本申请并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本申请中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各 表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。The correspondences shown in the tables in this application can be configured or predefined. The values of the information in each table are examples only and can be configured to other values, which are not limited in this application. When configuring the correspondence between information and each parameter, it is not necessarily required to configure all the correspondences shown in each table. For example, in the tables in this application, the correspondences shown in certain rows may not be configured. For another example, appropriate deformation adjustments can be made based on the above tables, such as splitting, merging, etc. The names of the parameters shown in the titles of the above tables may also use other names that can be understood by the communication device, and the values or representations of the parameters may also be other values or representations that can be understood by the communication device. When implementing a table, other data structures may also be used, such as an array, a queue, a container, a stack, a linear list, a pointer, a linked list, a tree, a graph, a structure, a class, a heap, a hash table, or the like.
本申请中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。The predefined in the present application may be understood as defined, predefined, stored, pre-stored, pre-negotiated, pre-configured, solidified, or pre-burned.
本领域普通技术人员可以理解,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。It will be appreciated by those skilled in the art that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
本领域普通技术人员可以理解,为描述的方便和简洁,上述描述的***、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art will appreciate that, for the sake of convenience and brevity of description, the specific working processes of the systems, devices and units described above may refer to the corresponding processes in the aforementioned method embodiments and will not be repeated here.
可以理解,本申请中描述的***、装置和方法也可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。It is understood that the systems, devices and methods described in the present application can also be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
本申请中各个实施例之间相同或相似的部分可以互相参考。在本申请中各个实施例、以及各实施例中的各个实施方式/实施方法/实现方法中,如果没有特殊说明以及逻辑冲突,不同的实施例之间、以及各实施例中的各个实施方式/实施方法/实现方法之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例、以及各实施例中的各个实施方式/实施方法/实现方法中的技术特征根据其内在的逻辑关系可以组合形成新的实施例、实施方式、实施方法、或实现方法。以上所述的本申请实施方式并不构成对本申请保护范围的限定。The same or similar parts between the various embodiments in this application can refer to each other. In the various embodiments in this application, and the various implementation methods/implementation methods/implementation methods in each embodiment, if there is no special explanation and logical conflict, the terms and/or descriptions between different embodiments and the various implementation methods/implementation methods/implementation methods in each embodiment are consistent and can be referenced to each other. The technical features in different embodiments and the various implementation methods/implementation methods/implementation methods in each embodiment can be combined to form new embodiments, implementation methods, implementation methods, or implementation methods according to their inherent logical relationships. The above-described implementation methods of this application do not constitute a limitation on the scope of protection of this application.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。 The above description is only a specific implementation mode of the present application, but the protection scope of the present application is not limited thereto. Any technician familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the present application, which should be covered by the protection scope of the present application.

Claims (29)

  1. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method comprises:
    发送第一配置信息,所述第一配置信息包括第三宿主节点的标识信息;所述第一配置信息用于配置第一通信隧道,所述第一通信隧道为第二宿主节点的分布式单元与所述第三宿主节点的分布式单元之间的通信隧道;Sending first configuration information, wherein the first configuration information includes identification information of the third host node; the first configuration information is used to configure a first communication tunnel, wherein the first communication tunnel is a communication tunnel between a distributed unit of the second host node and a distributed unit of the third host node;
    接收第一配置响应信息,所述第一配置响应信息包括所述第三宿主节点分配的地址。A first configuration response message is received, where the first configuration response message includes an address allocated by the third host node.
  2. 根据权利要求1所述的方法,其特征在于,所述第一配置信息还用于配置所述第一通信隧道的隧道类型,所述第一通信隧道的隧道类型包括互联网协议IP隧道类型或通用分组无线业务用户面隧道协议GTP-U隧道类型。The method according to claim 1 is characterized in that the first configuration information is also used to configure the tunnel type of the first communication tunnel, and the tunnel type of the first communication tunnel includes an Internet Protocol IP tunnel type or a General Packet Radio Service User Plane Tunnel Protocol GTP-U tunnel type.
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一配置信息包含于第一隧道配置信息,所述第一隧道配置信息用于配置多个通信隧道以及隧道类型,所述多个通信隧道包括所述第一通信隧道和第二通信隧道,所述第二通信隧道为所述第一宿主节点的分布式单元与所述第二宿主节点的分布式单元之间的通信隧道。The method according to claim 1 or 2 is characterized in that the first configuration information is included in the first tunnel configuration information, and the first tunnel configuration information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include the first communication tunnel and the second communication tunnel, and the second communication tunnel is a communication tunnel between the distributed unit of the first host node and the distributed unit of the second host node.
  4. 根据权利要求3所述的方法,其特征在于,所述第一隧道配置信息还用于配置所述多个通信隧道之间的关联关系。The method according to claim 3 is characterized in that the first tunnel configuration information is also used to configure the association relationship between the multiple communication tunnels.
  5. 根据权利要求1至4任一项所述的方法,其特征在于,所述第一配置响应信息包含于第一隧道配置响应信息,所述第一隧道配置响应信息用于配置多个通信隧道以及隧道类型,所述多个通信隧道包括所述第一通信隧道和第二通信隧道,所述第二通信隧道为所述第一宿主节点的分布式单元与所述第二宿主节点的分布式单元之间的通信隧道。The method according to any one of claims 1 to 4 is characterized in that the first configuration response information is included in the first tunnel configuration response information, and the first tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, and the multiple communication tunnels include the first communication tunnel and the second communication tunnel, and the second communication tunnel is a communication tunnel between the distributed unit of the first host node and the distributed unit of the second host node.
  6. 根据权利要求3至5任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 3 to 5, characterized in that the method further comprises:
    在检测到下行链路数据包的目标地址属于所述第三宿主节点分配的地址时,确定所述下行链路数据包通过所述第一通信隧道和/或所述第二通信隧道传输。When it is detected that the destination address of the downlink data packet belongs to the address allocated by the third host node, it is determined that the downlink data packet is transmitted through the first communication tunnel and/or the second communication tunnel.
  7. 根据权利要求3至5任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 3 to 5, characterized in that the method further comprises:
    保留通过所述第二通信隧道传输的上行链路数据包;retaining an uplink data packet transmitted through the second communication tunnel;
    或,保留源地址属于所述第三宿主节点分配的地址的上行链路数据包。Or, retain the uplink data packet whose source address belongs to the address allocated by the third host node.
  8. 根据权利要求1至7任一项所述的方法,其特征在于,The method according to any one of claims 1 to 7, characterized in that
    所述发送第一配置信息,包括:The sending of the first configuration information includes:
    向所述第二宿主节点发送所述第一配置信息;Sending the first configuration information to the second host node;
    所述接收第一配置响应信息,包括:The receiving first configuration response information includes:
    接收来自所述第二宿主节点的第一配置响应信息。Receive first configuration response information from the second host node.
  9. 根据权利要求1至7任一项所述的方法,其特征在于,The method according to any one of claims 1 to 7, characterized in that
    所述发送第一配置信息,包括:The sending of the first configuration information includes:
    向核心网网元发送所述第一配置信息;Sending the first configuration information to a core network element;
    所述接收第一配置响应信息,包括:The receiving first configuration response information includes:
    接收来自所述核心网网元的第一配置响应信息。Receive first configuration response information from the core network element.
  10. 根据权利要求1至9任一项所述的方法,其特征在于,所述第一配置信息还包括所述第一宿主节点的地址。The method according to any one of claims 1 to 9 is characterized in that the first configuration information also includes an address of the first host node.
  11. 根据权利要求1至10任一项所述的方法,其特征在于,所述第一配置响应信息还包括所述第三宿主节点的地址。The method according to any one of claims 1 to 10 is characterized in that the first configuration response information also includes an address of the third host node.
  12. 根据权利要求1至11任一项所述的方法,其特征在于,所述发送第一配置信息,包括:The method according to any one of claims 1 to 11, characterized in that the sending of the first configuration information comprises:
    与第三宿主节点之间无法通过IP路由传输数据包时,发送第一配置信息。When the data packet cannot be transmitted between the third host node and the third host node through IP routing, the first configuration information is sent.
  13. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method comprises:
    接收第二配置信息,所述第二配置信息用于配置第一通信隧道,所述第一通信隧道为第二宿主节点的分布式单元与所述第三宿主节点的分布式单元之间的通信隧道;receiving second configuration information, where the second configuration information is used to configure a first communication tunnel, where the first communication tunnel is a communication tunnel between a distributed unit of the second host node and a distributed unit of the third host node;
    发送第二配置响应信息,所述第二配置响应信息包括所述第三宿主节点分配的地址。Sending second configuration response information, where the second configuration response information includes the address allocated by the third host node.
  14. 根据权利要求13所述的方法,其特征在于,The method according to claim 13, characterized in that
    所述接收第二配置信息,包括:The receiving the second configuration information comprises:
    接收来自所述第二宿主节点的第二配置信息; receiving second configuration information from the second host node;
    所述发送第二配置响应信息,包括:The sending of the second configuration response information includes:
    向所述第二宿主节点发送所述第二配置响应信息。Send the second configuration response information to the second host node.
  15. 根据权利要求13或14所述的方法,其特征在于,所述第二配置信息还用于配置所述第一通信隧道的隧道类型;和/或,所述第二配置响应信息还包括所述第一通信隧道的隧道类型。The method according to claim 13 or 14 is characterized in that the second configuration information is also used to configure the tunnel type of the first communication tunnel; and/or the second configuration response information also includes the tunnel type of the first communication tunnel.
  16. 根据权利要求15所述的方法,其特征在于,所述第一通信隧道的隧道类型为GTP-U隧道,所述第二配置信息还包括所述第二宿主节点的地址、所述第二宿主节点分配的UDP端口信息和用于标识所述第一通信隧道的TEID。The method according to claim 15 is characterized in that the tunnel type of the first communication tunnel is a GTP-U tunnel, and the second configuration information also includes the address of the second host node, the UDP port information assigned by the second host node, and a TEID for identifying the first communication tunnel.
  17. 根据权利要求16所述的方法,其特征在于,所述第二配置响应信息还包括所述第三宿主节点的地址、第三宿主节点分配的UDP端口信息和用于标识所述第一通信隧道的TEID。The method according to claim 16 is characterized in that the second configuration response information also includes the address of the third host node, the UDP port information allocated by the third host node, and the TEID used to identify the first communication tunnel.
  18. 根据权利要求13所述的方法,其特征在于,The method according to claim 13, characterized in that
    所述接收第二配置信息,包括:The receiving the second configuration information comprises:
    接收来自核心网网元的第二配置信息;Receiving second configuration information from a core network element;
    所述发送第二配置响应信息,包括:The sending of the second configuration response information includes:
    向所述核心网网元发送所述第二配置响应信息。Send the second configuration response information to the core network element.
  19. 根据权利要求18所述的方法,其特征在于,所述第二配置信息还用于配置所述第一通信隧道的隧道类型。The method according to claim 18 is characterized in that the second configuration information is also used to configure the tunnel type of the first communication tunnel.
  20. 根据权利要求13至19任一项所述的方法,其特征在于,所述第二配置信息包含于第二隧道配置信息,所述第二隧道配置信息用于配置多个通信隧道以及隧道类型,所述多个通信隧道包括所述第一通信隧道和第二通信隧道,所述第二通信隧道为所述第一宿主节点的分布式单元与所述第二宿主节点的分布式单元之间的通信隧道。The method according to any one of claims 13 to 19 is characterized in that the second configuration information is included in second tunnel configuration information, and the second tunnel configuration information is used to configure multiple communication tunnels and tunnel types, the multiple communication tunnels include the first communication tunnel and the second communication tunnel, and the second communication tunnel is a communication tunnel between the distributed unit of the first host node and the distributed unit of the second host node.
  21. 根据权利要求13至19任一项所述的方法,其特征在于,所述第二配置响应信息包含于第二隧道配置响应信息,所述第二隧道配置响应信息用于配置多个通信隧道以及隧道类型,所述多个通信隧道包括所述第一通信隧道和第二通信隧道,所述第二通信隧道为所述第一宿主节点的分布式单元与所述第二宿主节点的分布式单元之间的通信隧道。The method according to any one of claims 13 to 19 is characterized in that the second configuration response information is included in the second tunnel configuration response information, and the second tunnel configuration response information is used to configure multiple communication tunnels and tunnel types, the multiple communication tunnels include the first communication tunnel and the second communication tunnel, and the second communication tunnel is a communication tunnel between the distributed unit of the first host node and the distributed unit of the second host node.
  22. 根据权利要求18至21任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 18 to 21, characterized in that the method further comprises:
    向所述第二宿主节点发送第三配置信息,所述第三配置信息包括所述第三宿主节点分配的地址;Sending third configuration information to the second host node, the third configuration information including an address allocated by the third host node;
    接收来自所述第二宿主节点的第三配置响应信息,所述第三配置响应信息用于响应所述第三配置信息。Receive third configuration response information from the second host node, where the third configuration response information is used to respond to the third configuration information.
  23. 根据权利要求13至22任一项所述的方法,其特征在于,所述第二配置信息还包括所述第一宿主节点的地址;所述方法还包括:The method according to any one of claims 13 to 22, characterized in that the second configuration information further includes an address of the first host node; the method further includes:
    在检测到上行链路数据包的目的地址与所述第一宿主节点的地址相同时,通过所述第一通信隧道向所述第二宿主节点发送所述上行链路数据包。When it is detected that the destination address of the uplink data packet is the same as the address of the first host node, the uplink data packet is sent to the second host node through the first communication tunnel.
  24. 一种IAB通信方法,其特征在于,所述方法包括:An IAB communication method, characterized in that the method comprises:
    接收来自第一宿主节点的第一配置信息,所述第一配置信息包括第三宿主节点的标识信息;所述第一配置信息用于配置第一通信隧道,所述第一通信隧道为第二宿主节点的分布式单元与所述第三宿主节点的分布式单元之间的通信隧道;Receiving first configuration information from a first host node, the first configuration information including identification information of a third host node; the first configuration information is used to configure a first communication tunnel, the first communication tunnel being a communication tunnel between a distributed unit of the second host node and a distributed unit of the third host node;
    基于所述第三宿主节点的标识信息,向所述第三宿主节点发送第二配置信息,所述第二配置信息用于配置所述第一通信隧道;Based on the identification information of the third host node, send second configuration information to the third host node, where the second configuration information is used to configure the first communication tunnel;
    接收来自所述第三宿主节点的第二配置响应信息,所述第二配置响应信息包括所述第三宿主节点分配的地址;receiving second configuration response information from the third host node, wherein the second configuration response information includes an address allocated by the third host node;
    向所述第一宿主节点发送第一配置响应信息,所述第一配置响应信息包括所述第三宿主节点分配的地址。Sending first configuration response information to the first host node, where the first configuration response information includes the address allocated by the third host node.
  25. 根据权利要求24所述的方法,其特征在于,所述第一配置信息还包括所述第一宿主节点的地址;和/或,所述第二配置信息还包括所述第一宿主节点的地址。The method according to claim 24 is characterized in that the first configuration information also includes the address of the first host node; and/or the second configuration information also includes the address of the first host node.
  26. 根据权利要求24或25所述的方法,其特征在于,所述方法还包括:The method according to claim 24 or 25, characterized in that the method further comprises:
    保留通过所述第一通信隧道传输的上行链路数据包;retaining uplink data packets transmitted through the first communication tunnel;
    或,保留源地址属于所述第三宿主节点分配的地址的上行链路数据包。Or, retain the uplink data packet whose source address belongs to the address allocated by the third host node.
  27. 一种通信装置,其特征在于,所述通信装置包括处理模块和收发模块;所述处理模块和所述收发模块,用于所述通信装置实现权利要求1-12中任一项所述的方法,或实现权利要求13-23中任一项所述的方法,或实现权利要求24-26中任一项所述的方法。 A communication device, characterized in that the communication device comprises a processing module and a transceiver module; the processing module and the transceiver module are used by the communication device to implement the method described in any one of claims 1 to 12, or to implement the method described in any one of claims 13 to 23, or to implement the method described in any one of claims 24 to 26.
  28. 一种通信装置,其特征在于,所述通信装置包括:处理器,所述处理器与存储器耦合,所述存储器用于存储程序或指令,当所述程序或指令被所述处理器执行时,使得所述通信装置执行如权利要求1-12中任一项所述的方法,或如权利要求13-23中任一项所述的方法,或如权利要求24-26中任一项所述的方法。A communication device, characterized in that the communication device comprises: a processor, the processor is coupled to a memory, the memory is used to store programs or instructions, when the program or instructions are executed by the processor, the communication device executes the method as described in any one of claims 1-12, or the method as described in any one of claims 13-23, or the method as described in any one of claims 24-26.
  29. 一种计算机可读存储介质,其上存储有计算机程序或指令,其特征在于,所述计算机程序或指令被执行时使得计算机执行如权利要求1-12中任一项所述的方法,或如权利要求13-23中任一项所述的方法,或如权利要求24-26中任一项所述的方法。 A computer-readable storage medium having a computer program or instruction stored thereon, wherein when the computer program or instruction is executed, the computer executes the method as described in any one of claims 1 to 12, or the method as described in any one of claims 13 to 23, or the method as described in any one of claims 24 to 26.
PCT/CN2023/135622 2022-12-29 2023-11-30 Communication method and communication device WO2024140007A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211728626.5 2022-12-29
CN202211728626.5A CN118283729A (en) 2022-12-29 2022-12-29 Communication method and communication device

Publications (1)

Publication Number Publication Date
WO2024140007A1 true WO2024140007A1 (en) 2024-07-04

Family

ID=91642999

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/135622 WO2024140007A1 (en) 2022-12-29 2023-11-30 Communication method and communication device

Country Status (2)

Country Link
CN (1) CN118283729A (en)
WO (1) WO2024140007A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220353748A1 (en) * 2021-04-30 2022-11-03 Samsung Electronics Co., Ltd. Nodes in wireless communication system and method performed thereby
WO2022235197A1 (en) * 2021-05-07 2022-11-10 Telefonaktiebolaget Lm Ericsson (Publ) First node, second node and methods performed thereby for handling migration of a node
WO2022245273A1 (en) * 2021-05-19 2022-11-24 Telefonaktiebolaget Lm Ericsson (Publ) Handling configurations in source integrated access backhaul (iab) donor during temporary topology adaptations

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220353748A1 (en) * 2021-04-30 2022-11-03 Samsung Electronics Co., Ltd. Nodes in wireless communication system and method performed thereby
WO2022235197A1 (en) * 2021-05-07 2022-11-10 Telefonaktiebolaget Lm Ericsson (Publ) First node, second node and methods performed thereby for handling migration of a node
WO2022245273A1 (en) * 2021-05-19 2022-11-24 Telefonaktiebolaget Lm Ericsson (Publ) Handling configurations in source integrated access backhaul (iab) donor during temporary topology adaptations

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HUAWEI: "Discussion on the Partial migration for mobile IAB", 3GPP TSG-RAN WG3 MEETING #117BIS-E, R3-225680, 28 September 2022 (2022-09-28), XP052265820 *
STEVEN XU, NOKIA, NOKIA SHANGHAI BELL: "Discussion on IAB-DU consecutive partial migration and full migration", 3GPP TSG-RAN WG3 #118, R3-226309, 4 November 2022 (2022-11-04), XP052223793 *
YUANPING ZHU, HUAWEI: "(TP for NR_mobile_IAB BL CR for TS 38.401):Partial migration for mobile IAB", 3GPP TSG-RAN WG3 MEETING #118, R3-226350, 4 November 2022 (2022-11-04), XP052223834 *

Also Published As

Publication number Publication date
CN118283729A (en) 2024-07-02

Similar Documents

Publication Publication Date Title
US11425600B2 (en) Wireless backhaul data transmission method and apparatus
EP3747236B1 (en) Method and apparatus for discarding buffered data while keeping connection in cp-up separation
EP4017115A1 (en) Routing method and device
CN113556794B (en) Communication method, device and system
JP7516578B2 (en) IAB network communication method and related device
WO2023011245A1 (en) Communication method and communication apparatus
US20230370898A1 (en) Communication method and apparatus
US20230362779A1 (en) Communication method and related device
US20240064607A1 (en) Communication method, apparatus, and system
US20230262557A1 (en) Methods and devices for enhancing integrated access backhaul networks for new radio
CN114026929B (en) F1 interface management method and device
WO2021249153A1 (en) Relay communication method and related device
CN114697999A (en) Redundant path creating method, device and system
CN115136651A (en) Switching method and communication device
WO2024140007A1 (en) Communication method and communication device
WO2022188679A1 (en) Data routing method and apparatus
CN116266936A (en) Message forwarding method and proxy equipment
CN115314956A (en) IAB node connection updating method and device
WO2023131094A1 (en) Communication method and communication apparatus
WO2023246746A1 (en) Communication method and related device
WO2024140043A1 (en) Communication method and communication apparatus
WO2023060401A1 (en) Wireless routing method and apparatus
EP4300863A1 (en) Communication method and communication device
EP4266754A1 (en) Communication method and communication apparatus
WO2023011111A1 (en) Routing method and communication apparatus