CN116471687A - Method and device for transmitting data - Google Patents
Method and device for transmitting data Download PDFInfo
- Publication number
- CN116471687A CN116471687A CN202210026343.XA CN202210026343A CN116471687A CN 116471687 A CN116471687 A CN 116471687A CN 202210026343 A CN202210026343 A CN 202210026343A CN 116471687 A CN116471687 A CN 116471687A
- Authority
- CN
- China
- Prior art keywords
- resource
- message
- network device
- transmission
- ssb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 229
- 230000005540 biological transmission Effects 0.000 claims abstract description 147
- 230000008569 process Effects 0.000 claims abstract description 77
- 230000001360 synchronised effect Effects 0.000 claims abstract description 3
- 238000011084 recovery Methods 0.000 claims description 59
- 238000004891 communication Methods 0.000 claims description 53
- 230000015654 memory Effects 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 15
- 238000012546 transfer Methods 0.000 claims description 5
- 230000011664 signaling Effects 0.000 abstract description 27
- 238000005265 energy consumption Methods 0.000 abstract description 16
- 230000006870 function Effects 0.000 description 21
- 238000012545 processing Methods 0.000 description 14
- 238000011144 upstream manufacturing Methods 0.000 description 12
- 101710093976 Plasmid-derived single-stranded DNA-binding protein Proteins 0.000 description 10
- 235000019527 sweetened beverage Nutrition 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 230000004044 response Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 230000003993 interaction Effects 0.000 description 6
- 230000001960 triggered effect Effects 0.000 description 5
- 101000824892 Homo sapiens SOSS complex subunit B1 Proteins 0.000 description 3
- 102100022320 SPRY domain-containing SOCS box protein 1 Human genes 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 101000741965 Homo sapiens Inactive tyrosine-protein kinase PRAG1 Proteins 0.000 description 2
- 102100038659 Inactive tyrosine-protein kinase PRAG1 Human genes 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 238000011867 re-evaluation Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 239000000725 suspension Substances 0.000 description 2
- 101000824890 Homo sapiens SOSS complex subunit B2 Proteins 0.000 description 1
- 102100022330 SPRY domain-containing SOCS box protein 2 Human genes 0.000 description 1
- 102100022310 SPRY domain-containing SOCS box protein 3 Human genes 0.000 description 1
- 102100022311 SPRY domain-containing SOCS box protein 4 Human genes 0.000 description 1
- 101710141933 Single-stranded DNA-binding protein 1 Proteins 0.000 description 1
- 101150069080 Spsb4 gene Proteins 0.000 description 1
- 101100366687 Streptococcus agalactiae serotype V (strain ATCC BAA-611 / 2603 V/R) ssb4 gene Proteins 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 101150012404 spsb3 gene Proteins 0.000 description 1
- 101150049705 ssb3 gene Proteins 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/002—Transmission of channel access control information
- H04W74/006—Transmission of channel access control information in the downlink, i.e. towards the terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0866—Non-scheduled access, e.g. ALOHA using a dedicated channel for access
- H04W74/0891—Non-scheduled access, e.g. ALOHA using a dedicated channel for access for synchronized access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/27—Transitions between radio resource control [RRC] states
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a method and a device for transmitting data, wherein the method for transmitting the data comprises the following steps: the method comprises the steps that a terminal device obtains a first synchronous signal, a physical broadcast channel block SSB and a second SSB, wherein the first SSB corresponds to a first resource, and the second SSB corresponds to a second resource; the terminal device receives first indication information, where the first indication information is used to indicate the first resource, and the first resource is used for first transmission. According to the technical scheme, the uplink data is transmitted by reusing the first resources allocated by the first SSB selected in the random access process, so that signaling overhead and energy consumption caused by frequently triggering the random access process can be effectively avoided.
Description
Technical Field
The present application relates to the field of communications, and more particularly, to a method and apparatus for transmitting data.
Background
The radio resource control (radio resource control, RRC) states of the terminal device (UE) include an RRC idle state, an RRC inactive state, and an RRC connected state. The RRC idle state may be simply referred to as an idle state, the RRC inactive state may be simply referred to as an inactive state or a third state, and the RRC connected state may be simply referred to as a connected state. The terminal equipment in idle state and the network equipment do not establish RRC connection, and cannot interact data or transmit signaling; the RRC connection between the terminal device in the inactive state and the network device is suspended, the terminal device suspends data processing, but the network device maintains the user context; an RRC connection is established between the terminal device in a connected state and the network device, and data and signaling can be interacted and transmitted. Before the advent of short packet transfer (small data transmission, SDT) technology, when a terminal device in an inactive state needs to transfer a packet, an RRC connection recovery procedure is first triggered. The SDT technology enables the terminal equipment to be in an inactive state for transmitting short data packets, and avoids signaling overhead and energy consumption caused by frequent triggering of an RRC connection recovery process.
SDTs can be classified into configured grant-based SDTs (CG-SDTs) and random access-based SDTs (RA-SDTs), and how to further save overhead and energy consumption based on existing SDTs is a problem to be solved today.
Disclosure of Invention
The embodiment of the application provides a method and a device for transmitting data, which avoid unnecessary signaling interaction in the SDT data transmission process, and further save signaling overhead and energy consumption.
In a first aspect, a method for transmitting data is provided, including: the method comprises the steps that a terminal device obtains a first synchronous signal, a physical broadcast channel block SSB and a second SSB, wherein the first SSB corresponds to a first resource, and the second SSB corresponds to a second resource; the terminal device receives first indication information, where the first indication information is used to indicate the first resource, and the first resource is used for first transmission.
It should be understood that the terminal device obtains the second SSB configured by the network device, and the first SSB is the SSB obtained by the terminal device triggering the random access procedure. Optionally, the first resource is a Dynamic Grant (DG) resource, the second resource is a CG-SDT resource, the first indication information is downlink control information (downlink control information, DCI), where the first SSB corresponds to the first resource, and indicates that after the terminal device obtains the first SSB, the first SSB is used to obtain the first resource, that is, the network device uses the first SSB selected in the random access process to send first configuration information to the terminal device, where the first configuration information is used to configure the first resource to the terminal device, and the terminal device may perform first transmission on the first resource; the second SSB corresponds to the second resource, and indicates the second resource obtained by the terminal device in the CG-SDT initial transmission process.
Based on the scheme, the terminal equipment obtains a first resource in the subsequent transmission of the CG-SDT process, and the terminal equipment can finish the first transmission on the first resource. That is, when the second SSB selection fails in the subsequent transmission, uplink data can be transmitted by reusing the first resources allocated by the first SSB selected in the random access process, so that signaling overhead and energy consumption caused by frequently triggering the random access process can be effectively avoided.
With reference to the first aspect, in one possible implementation manner, when the power of the first SSB is greater than a first threshold, the terminal device performs the first transmission on the first resource.
It should be understood that the terminal device first compares the power of the first SSB with a first threshold, and if the power is greater than or equal to the threshold, the terminal device transmits uplink data using the first resource. The comparison may not limit the timing of the comparison before each transmission of the upstream data, or at each CG period, or at each CG association period.
With reference to the first aspect, in one possible implementation manner, when the power of the first SSB is less than or equal to the first threshold and the power of the second SSB is greater than a second threshold, the terminal device performs the first transmission on the second resource.
It should be understood that the terminal device first compares the power of the first SSB with a first threshold, compares the power of the second SSB with a second threshold if less than or equal to the threshold, and uses the second resource to transmit uplink data when the power of the second SSB is greater than or equal to the second threshold. Wherein the first threshold is different from or the same as the second threshold. The comparison may not limit the timing of the comparison before each transmission of the upstream data, or at each CG period, or at each CG association period.
With reference to the first aspect, in one possible implementation manner, when the power of the second SSB is less than or equal to a second threshold and the power of the first SSB is greater than a first threshold, the terminal device performs the first transmission on the first resource.
It should be understood that the terminal device first compares the power of the second SSB with the second threshold, and if the power of the first SSB is less than or equal to the second threshold, then compares the power of the first SSB with the first threshold, and when the power of the first SSB is greater than or equal to the first threshold, the terminal device transmits uplink data using the first resource. The comparison may not limit the timing of the comparison before each transmission of the upstream data, or at each CG period, or at each CG association period.
With reference to the first aspect, in one possible implementation manner, the terminal device starts a timer;
the timer times an effective duration during which the terminal device performs the first transmission on the first resource.
It should be understood that after completing a random access procedure (i.e. the first SSB is acquired), the terminal device starts a timer, where the timer has a valid duration, and during the valid duration of the timer, the terminal device uses the first resource to transmit uplink data.
With reference to the first aspect, in one possible implementation manner, when the timer expires and the power of the second SSB is greater than a second threshold, the terminal device performs the first transmission on the second resource.
It should be appreciated that when the timer expires, the terminal device compares the power of the second SSB to a second threshold, and when the power of the second SSB is greater than or equal to the second threshold, the terminal device transmits uplink data using the second resource.
With reference to the first aspect, in one possible implementation manner, when the first SSB is less than or equal to the first threshold and the power of the second SSB is less than or equal to the second threshold, the terminal device sends first request information to the network device, where the first request information is used to request a third resource, and the third resource is used for the first transmission.
It should be understood that when the power of the first SSB and the power of the second SSB do not meet the preset conditions, or when the timer expires and the power of the second SSB is less than or equal to the second threshold, the terminal device triggers the next random access procedure, and the terminal device sends a first request message in the random access procedure, where the request message is used to request a third resource, and the terminal device can use the third resource to transmit uplink data.
In a second aspect, there is provided a method of transmitting data, comprising: the network equipment sends a first synchronization signal, a physical broadcast channel block (SSB) and a second SSB, wherein the first SSB corresponds to a first resource, and the second SSB corresponds to a second resource; the network device sends first indication information, the first indication information being used to indicate the first resource, the first resource being used for a first transmission.
Based on the scheme, in the subsequent transmission of the CG-SDT process, the network equipment can configure a first resource for the terminal equipment through the first indication information, and the terminal equipment can transmit uplink data on the first resource, so that the random access process is prevented from being triggered when the second resource is invalid. That is, the network device configures the terminal device with another resource (first resource) other than the second resource (CG-SDT resource), and makes it possible for the terminal device to transmit uplink data on the other resource, thereby avoiding unnecessary signaling overhead.
With reference to the second aspect, in one possible implementation manner, the network device receives first request information, where the first request information is used to request third resources, and the third resources are used for the first transmission.
In a third aspect, a method of transmitting data is provided, comprising: the terminal equipment receives first indication information, wherein the first indication information is used for indicating first resources, and the first resources are used for first transmission; the terminal device releases the second resource.
It should be understood that when uplink SDT data arrives, the terminal device finds that the power of all CG-SSBs is less than or equal to the threshold value in the CG-SDT initialization process, and the terminal device switches to the RA-SDT process. After the terminal device completes the RA-SDT initial transmission, the terminal device may transmit uplink data using the first resource configured by the first indication information.
Based on the scheme, the terminal equipment is switched to the RA-SDT process and completes the initial transmission of the RA-SDT process, and the terminal equipment can complete the subsequent transmission process by using the effective resources, so that signaling overhead and energy consumption in the scene are saved.
Optionally, the terminal device acquires a second SSB, where the second SSB corresponds to the second resource.
It should be understood that the terminal device acquires the second SSB, and when the second resource corresponding to the second SSB is invalid (i.e., the power of the second SSB does not meet the condition), the terminal device transmits the uplink data on the first resource.
With reference to the third aspect, in one possible implementation manner, the terminal device receives a first release message, where the first release message is used to indicate a fourth resource, and the fourth resource is used for the second transmission.
It should be understood that, when the terminal device transmits uplink data using the first resource, releases the CG configuration corresponding to the second SSB, and stops the SDT timer, and when the terminal device triggers the SDT process next time, the CG configuration needs to be obtained again.
It will be appreciated that the terminal device obtains the fourth resource (CG-SDT resource) by receiving the first release message sent by the network device, the first release message being further usable for terminating the SDT procedure, the fourth resource being usable for the second transmission, the second transmission being a data transmission subsequent to the first transmission
Optionally, when the power of the second SSB is greater than or equal to a second threshold, the terminal device performs the first transmission on the second resource.
It should be appreciated that the terminal device compares the power of the second SSB to the second threshold, and when greater than or equal to the second threshold, the terminal device transmits uplink data using the second resource. The comparison may not limit the timing of the comparison before each transmission of the upstream data, or at each CG period, or at each CG association period.
Optionally, when the power of the second SSB is less than or equal to a second threshold, the terminal device performs the first transmission on the first resource.
It should be understood that in the subsequent transmission, the terminal device compares the power of the first SSB with the first threshold, and when the power of the first SSB is greater than or equal to the first threshold, the terminal device uses the first resource to transmit uplink data. The comparison may not limit the timing of the comparison before each transmission of the upstream data, or at each CG period, or at each CG association period.
Optionally, the terminal device may reserve CG configuration corresponding to the second SSB while transmitting uplink data using the first resource, and when the terminal device triggers the SDT process next time, if CG-SDT resources corresponding to the CG configuration are valid, the terminal device may trigger CG-SDT initial transmission, without needing to reacquire the CG configuration, and thus, additional signaling overhead may be avoided.
In a fourth aspect, there is provided a method of transmitting data, comprising: the network device sends first indication information, the first indication information being used to indicate the first resource, the first resource being used for the first transmission.
Based on the scheme, the terminal equipment is switched to the RA-SDT process and completes the initial transmission of the RA-SDT process, the network equipment can allocate resources for the terminal equipment, and the terminal equipment uses the effective resources to complete the subsequent transmission process, so that signaling overhead and energy consumption in the scene are saved.
Optionally, the network device sends a second SSB, the second SSB corresponding to a second resource.
With reference to the fourth aspect, in one possible implementation manner, the network device sends a first release message, where the first release message is used to indicate a fourth resource, and the fourth resource is used for the second transmission.
It should be appreciated that in a subsequent transmission from the CG-SDT process to the RA-SDT process, as the terminal device releases the CG configuration, the network device reconfigures CG-SDT resources (fourth resources) for the terminal device by sending a first release message before the terminal device triggers the next SDT process.
In a fifth aspect, there is provided a method of transmitting data, comprising: the terminal equipment receives a second release message and a recovery message, wherein the second release message is used for indicating that the random access-based short data packet transmission RA-SDT process which does not execute anchor point relocation is ended, and the recovery message is used for indicating that the terminal equipment is switched to an invalid resource control RRC connection state; the terminal equipment establishes communication connection with first network equipment; the terminal device performs a third transmission, where the third transmission is used to transmit SDT data in a non-short data packet.
Based on the scheme, when non-SDT data arrives in the RA-SDT process without executing anchor relocation, the terminal equipment can simultaneously receive the second release message and the recovery message, namely, the terminal equipment can immediately switch to an RRC connection state and transmit the non-SDT data after terminating the SDT process, so that signaling cost and energy consumption caused by triggering a random access process to establish the RRC connection and sending repeated messages by the terminal equipment are avoided.
With reference to the fifth aspect, in one possible implementation manner, the terminal device decrypts the second release message according to a first key, where the first key is a key stored by the terminal device.
With reference to the fifth aspect, in one possible implementation manner, the terminal device receives a first value sent by the first network device; the terminal equipment obtains a second secret key according to the first value; the terminal device decrypts the recovery message according to the second key.
It should be understood that the first key and the second key of the terminal device decrypt the second release message and the recovery message, respectively, so as to implement the transmission of the non-SDT data.
In a sixth aspect, there is provided a method of transmitting data, comprising: the first network equipment sends a second release message and a recovery message, wherein the second release message is used for indicating that the random access-based short data packet transmission RA-SDT process which does not execute anchor point relocation is finished, and the recovery message is used for indicating that the terminal equipment is switched to an infinite resource control RRC connection state; the first network equipment establishes communication connection with the terminal equipment; the first network device performs a third transmission for transmitting non-short data packet transmission SDT data.
Optionally, the transmitting non-SDT data includes upstream non-SDT data or downstream non-SDT data.
Based on the scheme, when non-SDT data arrives in the RA-SDT process without executing anchor relocation, the first network device can simultaneously send the second release message and the recovery message, so that the terminal device can immediately switch to the RRC connection state and transmit the non-SDT data after terminating the SDT process, and signaling overhead and energy consumption caused by triggering the random access process by the terminal device to establish the RRC connection and sending the repeated message are avoided.
With reference to the sixth aspect, in one possible implementation manner, the first network device sends second indication information to the second network device, where the second indication information includes short data packet transmission data radio bearer SDT DRB level and non-SDT DRB level data forwarding transmission network layer TNL information.
With reference to the sixth aspect, in one possible implementation manner, the first network device receives first transmission information sent by the second network device, where the first transmission information includes the release message and a first value; the first network device obtains a second key according to the first value, and the second key is used for encrypting the recovery message; the first network device sends the first value to the terminal device.
With reference to the sixth aspect, in a possible implementation manner, the first network device distinguishes between the second release message and the recovery message.
Based on the scheme, before the first network equipment sends the second release message and the recovery message to the terminal equipment, the second release message and the recovery message are distinguished, so that the terminal equipment can acquire the contents of the two messages respectively.
With reference to the sixth aspect, in one possible implementation manner, the first network device distinguishes the second release message from the recovery message according to the recovery message as one of fields of the second release message.
With reference to the sixth aspect, in a possible implementation manner, the first network device distinguishes the second release message and the recovery message according to a first identifier.
Optionally, the first identity is a type identity added in a control protocol data unit (protocol data unit, PDU) of a packet data convergence layer protocol (packet data convergence protocol, PDCP) or a type identity added in a PDCP header of the message.
With reference to the sixth aspect, in a possible implementation manner, the first network device sends the second release message through a first channel; the first network device transmits the resume message over a second channel, the first channel being different from the second channel.
It should be appreciated that sending the second release message and the resume message on different logical channels may be used to distinguish between the two messages.
In a seventh aspect, there is provided a method of transmitting data, comprising: the second network equipment receives second indication information sent by the first network equipment, wherein the second indication information comprises SDT (short data packet transmission) DRB (data radio bearer) and non-SDT DRB (data forwarding transmission network layer) TNL information; the second network device establishes a first channel for transmitting short data packets for transmitting SDT and non-SDT data.
Based on the scheme, in the RA-SDT process without anchor point relocation, the second network equipment establishes a channel for transmitting SDT data and non-SDT data according to the second indication information, so that signaling overhead and energy consumption caused by repeatedly sending and retrieving the UE context request message in the subsequent process can be avoided.
With reference to the seventh aspect, in a possible implementation manner, the second network device receives a second request message; the second network device obtains a first value according to the request message, and the second request message is a message in a random access based short data packet transmission RA-SDT process which does not execute anchor point relocation.
With reference to the seventh aspect, in one possible implementation manner, the second network device encrypts a second release message according to a first key, where the second release message is used to indicate that the RA-SDT process that does not perform anchor relocation is ended, and the first key is a key of the second network device; the second network device sends a first transmission message to the first network device, the first transmission message including the second release message and a first value.
An eighth aspect, there is provided a communication device comprising means for performing the method of the first aspect or any possible implementation of the first aspect; or, a module for performing the method of the third aspect or any possible implementation of the third aspect; or comprises means for performing the method of the fifth aspect or any possible implementation of the fifth aspect.
A ninth aspect provides a communications apparatus comprising means for performing the method of the second aspect or any possible implementation of the second aspect; or, a module for performing the method of the fourth aspect or any possible implementation of the fourth aspect; or, a module for performing the method of the sixth aspect or any possible implementation of the sixth aspect; or comprises means for performing the method of the seventh aspect or any possible implementation of the seventh aspect.
In a tenth aspect, a communications apparatus is provided that includes a processor coupled to a memory for storing a computer program; the processor is configured to run the computer program such that the communication device performs any one of the possible implementations as in the first to seventh aspects or the first to seventh aspects.
With reference to the tenth aspect, in one possible implementation manner, the communication apparatus further includes one or more of the memory and a transceiver, where the transceiver is configured to receive signals and/or generate signals.
In an eleventh aspect, there is provided a computer readable storage medium comprising a computer program or instructions which, when run on a computer, cause performance of any one of the possible implementations as in the first to seventh aspects or in the first to seventh aspects.
In a twelfth aspect, there is provided a computer program product comprising a computer program or instructions which, when run on a computer,
such that the first to seventh aspects or any one of the possible implementations of the first to seventh aspects are performed.
A thirteenth aspect provides a computer program which, when run on a computer, causes the implementation of any one of the possible implementations as or in accordance with the first to seventh aspects.
A fourteenth aspect provides a communication system comprising the communication device of the eighth aspect and any possible implementation thereof and the communication device of the ninth aspect and any possible implementation thereof.
Drawings
Fig. 1 is a system architecture diagram to which embodiments of the present application are applicable.
Fig. 2 is a schematic flow chart of a 4-step random access procedure of the present application.
Fig. 3 is a schematic flow chart of a 2-step random access procedure of the present application.
Fig. 4 is a schematic flow chart of the CG-SDT process of the present application.
Fig. 5 is a schematic diagram of an association of CG configuration and SSB in the present application.
Fig. 6 is a schematic flow chart of the RA-SDT procedure of step 4 of the present application.
Fig. 7 is a schematic flow chart of the RA-SDT procedure of step 2 of the present application.
Fig. 8 is a schematic flow chart of a method for transmitting data according to an embodiment of the present application.
Fig. 9 is a schematic flow chart of another method for transmitting data according to an embodiment of the present application.
Fig. 10 is a signaling flow diagram in the case of upstream non-SDT data arrival scenario in an RA-SDT process of the present application that does not perform anchor relocation.
Fig. 11 is a schematic flow chart of another method for transmitting data according to an embodiment of the present application.
Fig. 12 is a schematic flow chart of another method for transmitting data according to an embodiment of the present application.
Fig. 13 is an exemplary block diagram of a communication device according to one embodiment of the present application.
Fig. 14 is an exemplary structural diagram of a communication device according to another embodiment of the present application.
Fig. 15 is an exemplary structural diagram of an apparatus provided in an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail with reference to the accompanying drawings. The specific method of operation in the method embodiment may also be applied to the device embodiment or the system embodiment.
The communication method provided by the application can be applied to various communication systems, for example, the communication method can be an internet of things (internet of things, ioT), a narrowband internet of things (narrow band internet of things, NB-IoT), a long term evolution (long term evolution, LTE), a fifth generation (5G) communication system, a LTE and 5G hybrid architecture, a 5G New Radio (NR) system, a new communication system appearing in 6G or future communication development, and the like. The communication system described herein may also be a machine-to-machine (machine to machine, M2M) network or other network.
Referring to fig. 1, a communication system provided in an embodiment of the present application may include a terminal device and a network device. The terminal device is located within the coverage area of one or more cells (carriers) provided by the network device, and the cells serving the terminal device may be one or more.
The network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of the new service scenario, the technical solution provided in the embodiments of the present application is applicable to similar technical problems.
In this application, the network device may be any device having a wireless transceiver function, for example, including AN Access Network (AN) device, for example, a base station (e.g., AN access point), and may refer to a device that communicates with a terminal device through one or more cells on AN air interface in the access network. The network device may include an evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in an LTE system or advanced (long term evolution-advanced, LTE-a), or may also include a next generation node B (next generation node B, gNB) in a fifth generation mobile communication technology (the 5th generation,5G) NR system (also simply referred to as an NR system) or may also include a Centralized Unit (CU) and/or a Distributed Unit (DU) in a Cloud access network (Cloud radio access network, cloud RAN) system, which embodiments of the present application are not limited. For example, the network device may be a CU in a cloudran system, or a DU, or an ensemble of a CU and a DU. The network device may also comprise a core network device comprising, for example, access and mobility management functions (access and mobility management function, AMF) or the like. In this embodiment of the present application, since the access network is mainly referred to, the network devices refer to access network devices unless otherwise specified hereinafter.
In the embodiment of the present application, the means for implementing the function of the network device may be the network device, or may be a means capable of supporting the network device to implement the function, for example, a chip system, and the apparatus may be installed in the network device. In the technical solution provided in the embodiments of the present application, the device for implementing the function of the network device is exemplified by the network device, and the technical solution provided in the embodiments of the present application is described.
In the present application, a terminal device comprises a device for providing voice and/or data connectivity to a user, in particular, a device for providing voice to a user, or a device for providing data connectivity to a user, or a device for providing voice and data connectivity to a user. For example, may include a handheld device having wireless connectivity, or a processing device connected to a wireless modem. The terminal device may communicate with the core network via a radio access network (radio access network, RAN), exchange voice or data with the RAN, or interact voice and data with the RAN. The terminal device may include a UE, a wireless terminal device, a mobile terminal device, a device-to-device (D2D) terminal device, a vehicle-to-all (vehicle to everything, V2X) terminal device, a machine-to-machine/machine-type communications, M2M/MTC) terminal device, an internet of things (internet of things, ioT) terminal device, a subscriber unit (subscriber unit), a subscriber station (subscriber station), a mobile station (mobile station), a remote station (remote station), an Access Point (AP), a remote terminal (access terminal), a user terminal (user agent), a user agent (user device), or a user equipment (user device), etc. For example, mobile telephones (or "cellular" telephones) computers with mobile terminal devices, portable, pocket, hand-held, computer-built mobile devices, and the like may be included. Such as personal communication services (personal communication service, PCS) phones, cordless phones, session initiation protocol (session initiation protocol, SIP) phones, wireless local loop (wireless local loop, WLL) stations, personal digital assistants (personal digital assistant, PDAs), and the like. But also limited devices such as devices with lower power consumption, or devices with limited memory capabilities, or devices with limited computing capabilities, etc. Examples include bar codes, radio frequency identification (radio frequency identification, RFID), sensors, global positioning systems (global positioning system, GPS), laser scanners, and other information sensing devices.
By way of example, and not limitation, in embodiments of the present application, the terminal device may also be a wearable device. The wearable device can also be called as a wearable intelligent device or an intelligent wearable device, and is a generic name for intelligently designing daily wear and developing wearable devices, such as glasses, gloves, watches, clothes, shoes, and the like, by applying wearable technology. The wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also can realize a powerful function through software support, data interaction and cloud interaction. The generalized wearable intelligent device includes full functionality, large size, and may not rely on the smart phone to implement complete or partial functionality, such as: smart watches or smart glasses, etc., and focus on only certain types of application functions, and need to be used in combination with other devices, such as smart phones, for example, various smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
In the embodiment of the application, the terminal device may further include a relay (relay). Or it is understood that all that is capable of data communication with a base station can be seen as a terminal device.
In the embodiment of the present application, the device for implementing the function of the terminal device may be the terminal device, or may be a device that is applied to the terminal device and is capable of supporting the terminal device to implement the function, for example, a component or an assembly having a communication function, or a chip system, and the device may be installed in the terminal device. In the embodiment of the application, the chip system may be formed by a chip, and may also include a chip and other discrete devices. In the technical solution provided in the embodiments of the present application, the device for implementing the function of the terminal is a terminal device, which is described in the embodiments of the present application as an example.
In the following, some terms in the embodiments of the present application are explained for easy understanding by those skilled in the art.
1) Radio resource control (radio resource control, RRC) state
The radio resource control (radio resource control, RRC) states of the terminal device include an idle state, an inactive state, and a connected state. The terminal equipment in idle state and the network equipment do not establish RRC connection, and cannot interact data or transmit signaling; the RRC connection between the terminal device in the inactive state and the network device is suspended, the terminal device suspends data processing, but the network device maintains the user context; an RRC connection is established between the terminal device in the RRC connected state and the network device, and data and signaling can be interacted and transmitted.
2) Random Access (RA)
The terminal equipment and the network equipment establish a wireless link through an RA process to realize uplink synchronization, and can perform normal data transmission operation after RA is successfully completed. RA is classified into a contention-based four-step random access (4-step content-based RA, CBRA), a non-contention-based four-step random access (4-step content-free RA, CFRA), a contention-based two-step random access (2-step CBRA), and a non-contention-based two-step random access (2-step CFRA). The flow of 4-step CBRA and 2-step CBRA is described in detail below.
As shown in fig. 2, in the 4-step CBRA, the terminal device transmits a preamble (preamble), i.e., a transmission message 1 (Msg 1), to the network device through a physical random access channel (physical random access channel, PRACH). After the network device receives the preamble, it sends a random access response (random access response, RAR) to the terminal device, that is, the network device sends a message 2 (Msg 2) to the terminal device, where the RAR may indicate the resource location of the physical uplink shared channel (physical uplink shared channel, PUSCH). The terminal equipment sends a message 3 (Msg 3) to the network equipment through the PUSCH according to the resource position of the PUSCH indicated by the Msg 2; upon receiving Msg3, the network device may send message 4 (Msg 4) to the terminal device. Alternatively, an RRC setup request (rrcsetup request) message or an RRC resume request (rrcresemerequest) message may be included in Msg 3. Optionally, one or more of the following information may be included in Msg 4: RRC setup (RRCSetup) message, RRC resume (rrcresse) message, acknowledgement (ACK)/negative acknowledgement (negative acknowledgement, NACK) of PUSCH in Msg3, and power control command, etc.
As shown in fig. 3, in the 2-step CBRA, a terminal device sends a preamble to a network device through a PRACH, and sends uplink data to the network device through a PUSCH, that is, the terminal device sends a message a (MsgA) to the network device; after receiving the message a, the network device sends a message B (MsgB) to the terminal device. Alternatively, an rrcsetup response message or an rrcresamerequest message may be included in MsgA. Optionally, one or more of the following information may be included in the MsgB: RRCSetup message, rrcrenume message, ACK/NACK for PUSCH in MsgA, power control commands, etc.
It should be appreciated that whether the terminal device employs a 4-step random access procedure or a 2-step random access procedure may be situation dependent. If only 4 steps of random access resources are configured on the selected partial Bandwidth (BWP) of the terminal equipment, the terminal equipment selects 4 steps of random access; if only 2 steps of random access resources are configured, the terminal equipment selects 2 steps of random access; if the 4-step random access resource and the 2-step random access resource are configured at the same time, the terminal equipment compares the reference signal receiving power (Reference Signal Received Power, RSRP) of the downlink loss reference signal with a threshold value given by the network equipment, selects 2-step random access when the RSRP is higher than the threshold value, and selects 4-step random access when the RSRP is lower than or equal to the threshold value.
It will be appreciated that to achieve beam alignment between the terminal device and the network device, the terminal device will make synchronization signal and physical broadcast channel block (synchronization signal and physical broadcast channel block, SSB) selections prior to the transmit preambles of the 4-step random access and 2-step random access procedures, i.e., if there are SSBs for which the synchronization reference signal received power (synchronization signal based reference signal received power, SS-RSRP) is above a network device given threshold, the terminal device selects one of these SSBs; if the SS-RSRP of all detected SSBs is below a given threshold, the terminal device arbitrarily selects one from among all detected SSBs. Then, the terminal device determines the corresponding relation between the SSB and the random access resource (including PRACH time-frequency resource and preamble) according to the parameter configured by the network device, and sends the corresponding preamble by using the PRACH time-frequency resource corresponding to the selected SSB. The network device detects the preamble and simultaneously knows the SSB selected by the terminal device, and uses the SSB to send downlink messages in the subsequent random access process.
3) Short packet transmission (small data transmission, SDT) technique
Before SDT occurs, if the terminal device in the inactive state needs to transmit a data packet, the RRC connection recovery procedure needs to be triggered to switch to the connected state. The SDT technology enables the terminal equipment to transmit the short data packet in an inactive state, and avoids signaling overhead and energy consumption caused by frequent triggering of the RRC connection recovery process.
The SDT may have various scenarios, and may specifically cover smart phone related services, such as heartbeat packets or push messages of an Application (APP); and related traffic of non-smart phones, such as periodic data (e.g., heartbeat packets) of wearable devices, periodic data sent by industrial wireless sensor networks, and so forth. In addition, the specific size of the small data in the embodiment of the present application may not be limited, for example, a data packet of 100 to 300 bytes may be regarded as the small data.
It is understood that the data transmission described in the following embodiments of the present application may refer to SDT, and the uplink data, the downlink data, and the data packet described in the embodiments of the present application may be small data.
SDT technologies can be classified into configured grant-based SDT (CG-SDT) and random access-based SDT (RA-SDT), and the two SDT technologies will be described below, respectively.
In CG-SDT, the terminal device transmits short data packets (e.g., such as uplink user data and/or non-access stratum (NAS) messages) using resources for which the network device is configured. For a better understanding of the CG-SDT process, fig. 4 shows a schematic flow chart of the CG-SDT process. The specific contents are as follows:
S401, the terminal equipment receives the release message, and correspondingly, the network equipment sends the release message.
It will be appreciated that the network device triggers the terminal device RRC connection suspension and the terminal device receives an RRC release message including a supendcon field indicating a data amount threshold, a reference signal received power (reference signal received power, RSRP) and a Configured Grant (CG) configuration. The CG configuration includes CG-SDT resources (time-frequency resources and demodulation reference signals (demodulation reference signal, DMRS)) for transmitting uplink data, parameters for judging whether the CG-SDT resources are valid, parameters for indicating an association relationship between SSB and CG configuration, and the like. And the terminal equipment is switched from the RRC connection state to the RRC inactive state after receiving the release message sent by the network equipment.
It should be understood that in the release message in step S401, the network device specifies the association relationship of the CG configuration and the SSB. The association between CG configuration and SSB may be the following cases:
(1) One CG configuration may be associated with one or more SSBs.
(2) The number of SSBs associated with different CG configurations may be different.
(3) There may be SSBs that are not associated with any CG configuration.
Fig. 5 shows a schematic diagram of an association of CG configuration with SSB. As shown in fig. 5, the network device formulates CG configuration 1 corresponding to SSB1 and SSB2, and CG configuration 2 corresponding to SSB3 and SSB4. All SSBs associated with CG configurations are hereinafter referred to as configured grant-based synchronization signals and physical broadcast channel blocks (CG-SSBs). The CG period (CG period or CG occasin) is defined as the physical uplink shared channel (physical uplink shared channel, PUSCH) resource associated with one SSB. The CG association period (CG association period) corresponding to a CG configuration is defined as the time when all SSBs associated with the CG configuration are mapped onto PUSCH resources allocated in the CG configuration at least once.
S402, the terminal equipment triggers a CG-SDT process and selects SSB1.
It should be understood that when uplink data arrives, the terminal device determines whether the following conditions are satisfied:
(1) The data amount is smaller than the data amount threshold set in the CG configuration.
(2) The RSRP of the downlink loss reference signal is higher than the RSRP threshold set in the CG configuration.
(3) The CG-SDT resources are valid, i.e. the network device sending the release message to the terminal device is the same as the serving network device when the terminal device triggers the SDT process (i.e. the network device subsequently receiving the resume request message sent by the terminal device), the SDT time synchronization timer (time alignment timer, TAT) configured in the release message has no timeout, the amount of change of the RSRP of the downlink path loss reference signal does not exceed the range set in the CG configuration, and the SS-RSRP of at least one CG-SSB (SSB associated with the CG configuration) is higher than the SS-RSRP threshold set in the CG configuration.
It will be appreciated that when the above conditions are met, the terminal device triggers the CG-SDT process and selects one of the CG-SSBs, e.g. SSB1, for which SS-RSRP is above the threshold.
S403, the terminal equipment sends a recovery request message, and correspondingly, the network equipment receives the recovery request message.
It should be understood that the terminal device transmits the resume request message using the CG-SDT resource corresponding to the selected CG-SSB (SSB 1). Optionally, the terminal device also sends user data and/or non-access stratum (NAS) messages.
S304, the terminal equipment receives the response of the recovery request message, and correspondingly, the network equipment sends the response of the recovery request message.
It should be understood that when the terminal device receives the response of the resume request message sent by the network device, the terminal device completes the initial transmission of the CG-SDT.
S405, the terminal device receives the control information, and accordingly, the network device transmits the control information.
Optionally, the network device dynamically configures an uplink transmission resource for the terminal device through downlink control information (downlink control information, DCI), where the resource is a Dynamic Grant (DG) resource.
S406, the terminal equipment and the network equipment carry out CG-SDT subsequent transmission.
It should be appreciated that after the terminal device and the network device complete the initial transmission described above, the user data and/or NAS messages may continue to be transmitted between the terminal device and the network device, which is the subsequent transmission of the CG-SDT. Wherein, the uplink transmission can use CG-SDT resource or DG resource, and the terminal equipment receives downlink data according to the DG resource.
S407, the terminal equipment receives the release message, and the network equipment sends the release message correspondingly.
It should be understood that when all subsequent transmissions are completed, i.e. the transmission is completed, the terminal device receives a release message sent by the network device, which release message can be used to terminate this SDT procedure.
RA-SDT is based on either 4-step CBRA or 2-step CBRA. After triggering the SDT procedure, the terminal device sends an RRC recovery request message and a short data packet (such as an uplink user data and/or non-access stratum (NAS) message) to the network device in Msg3 of the 4-step CBRA, or sends an RRC recovery request message and a short data packet to the network device in Msg a of the 2-step CBRA. And then, the network equipment dynamically configures uplink transmission resources for subsequent transmission for the terminal equipment through downlink control information (downlink control information, DCI), and the network equipment and the terminal equipment perform subsequent data interaction.
To more clearly express the RA-SDT process, fig. 6 shows a schematic flow chart of a 4-step RA-SDT process, in particular as follows:
s601, the terminal equipment triggers an RA-SDT process.
It should be appreciated that before the terminal device triggers the RA-SDT procedure, the network device indicates in system message 1 (system information block 1, sib1) the random access resources for RA-SDT, including PRACH time frequency resources and preambles, etc., and the terminal device listens to the search space of the physical downlink control channel (physical downlink control channel, PDCCH) in the subsequent transmission of RA-SDT. When the network device triggers RRC connection suspension, the network device sends an RRC release (RRC release) message to the terminal device, where a supendcon field is carried, which indicates the data amount threshold and the RSRP threshold. When the terminal device receives uplink data, the terminal device needs to meet the following conditions when triggering the RA-SDT process:
(1) The data amount is smaller than the data amount threshold set in the RRC release message.
(2) The RSRP of the downlink loss reference signal is higher than the RSRP threshold set in the RRC release message.
(3) The RRC release message does not carry CG configuration or CG resource invalidation.
When the above conditions are met, the terminal device triggers the RA-SDT process, and can select 4-step random access or 2-step random access.
S604, the terminal device sends a message 3, and correspondingly, the network device receives the message 3.
When the terminal selects 4-step random access, the message 3 carries an RRC recovery request (rrcresumerequest) message and uplink user data and/or NAS message.
S605, the terminal device receives the message 4, and accordingly, the network device sends the message 4.
When the terminal device receives message 4, it may indicate that the terminal device has completed the initial transmission of the RA-SDT.
S606, the terminal device receives the DCI, and accordingly, the network device transmits the DCI.
After the terminal device completes the initial transmission of the RA-SDT, the network device may dynamically configure, for the terminal device, uplink resources for subsequent transmission, i.e., DG resources above, through DCI.
S607, the terminal device and the network device perform the subsequent transmission of RA-SDT.
S508, the terminal equipment receives the RRC release message, and correspondingly, the network equipment sends the RRC release message.
It should be understood that the terminal device receives the RRC release message sent by the network device, and terminates the SDT procedure.
Further, fig. 7 shows a schematic flow chart of a 2-step RA-SDT process, in particular as follows:
unlike the 4-step RA-SDT procedure, when the terminal device satisfies the RA-SDT condition and selects 2 steps of random access according to the random access procedure, the terminal device sends an RRC resume request message and uplink user data and/or NAS message in Msg a. When the terminal device receives the Msg B message, the initial transmission of the 2-step RA-SDT procedure is completed. The other steps are similar to the 4-step RA-SDT procedure and will not be described in detail here.
4) RA-SDT that does not perform anchor relocation
The network device that sends the RRCRelease message to switch the terminal device from the connected state to the inactive state may not be the same as the network device when the terminal device initiates the SDT, and the former will be referred to as the original network device and the latter will be referred to as the new network device. After the terminal device sends the RRC recovery request message to the new network device, the new network device requests the context information of the terminal device to the original network device, and the original network device decides whether to execute anchor point relocation or not after receiving the request. If the anchor point repositioning is executed, the original network equipment sends all the context information of the terminal equipment to the new network equipment, the new network equipment establishes a path between the new network equipment and the core network, and the new network equipment becomes new anchor point network equipment; if the anchor relocation is not performed, the new network device is responsible for forwarding data between the terminal device and the original network device.
The RA-SDT process without anchor relocation comprises the following specific contents: the terminal equipment carries an inactive radio network identifier (inactive radio network temporary identifier, I-RNTI) in an RRC recovery request message of Msg 3 (4-step random access) or Msg A (2-step random access), and after receiving the RRC recovery request message, the first network equipment determines second network equipment according to the I-RNTI and sends a request for searching the UE context to the second network equipment, wherein the request comprises an identifier for verifying the identity of the terminal equipment and the identity identifier of the target base station. And the second network equipment performs user identity verification after receiving the user identity verification. If the second network device decides not to perform anchor relocation, carrying radio link control (radio link control, RLC) configuration and data radio bearer (data radio bearer, DRB) level data forwarding uplink transport network layer (transport network layer, TNL) information in a retrieve UE context response message replying to the first network device, and then the first network device sending an address indication (address indication) message to the second network device carrying DRB level data forwarding downlink TNL information, thereby establishing a data forwarding path between the first network device and the second network device. And then the first network equipment transmits the cached user data to the second network equipment, the second network equipment transmits the cached user data to the core network, and the second network equipment transmits the downlink data received from the core network to the UE through the first network equipment.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a alone, a and B together, and B alone, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a and b, a and c, b and c, or a and b and c, wherein a, b, c may be single or plural.
And, unless otherwise indicated, the terms "first," "second," and the like in the embodiments herein are used for distinguishing between multiple objects and are not used for limiting the size, content, order, timing, priority, importance, or the like of the multiple objects. For example, the first message and the second message are merely for distinguishing between different messages, and are not intended to represent the difference in content, priority, importance, etc. of the two messages.
The foregoing presents some concepts related to the embodiments of the present application, and the following presents technical features related to the embodiments of the present application.
In the subsequent transmission of the CG-SDT process, the terminal device checks whether CG-SSBs with SS-RSRP higher than the threshold exist in all CG-SSBs or not every CG period or every CG association period before each transmission of uplink data, which operation will be referred to as re-evaluation of CG-SSBs hereinafter. The CG-SSB may be understood as a CG-SSB configured by a network device for a terminal device during an initial CG-SDT transmission process. In the re-evaluation of CG-SSBs, a situation may occur in which SS-RSRP of all CG-SSBs is lower than or equal to the threshold, which is hereinafter referred to as CG-SSB selection failure, and the terminal device triggers the random access procedure to apply for uplink transmission resources. Therefore, in order to solve the problem that the subsequent transmission of CG-SDT frequently triggers the random access procedure to cause larger signaling overhead in the prior art, the embodiment of the present application provides a method for transmitting data, which can avoid frequent triggering of the random access procedure by the terminal device as much as possible, thereby saving signaling overhead and energy consumption.
Fig. 8 illustrates a method for transmitting data according to an embodiment of the present application. The method specifically comprises the following steps:
S801, the terminal equipment acquires a first SSB and a second SSB, and correspondingly, the network equipment sends the first SSB and the second SSB.
It should be appreciated that the terminal obtains a second SSB configured by the network device, the second SSB corresponding to a second resource, wherein the second resource may be a CG-SDT resource. The terminal triggers a random access procedure to obtain a first SSB. The terminal re-evaluates the second SSB, and triggers a random access procedure when the SS-RSRP of the second SSB is less than or equal to a second threshold. In particular, the terminal may re-evaluate the second SSB before transmitting the data packet, or at each CG association period, or at each CG period. It should be understood that, before the terminal device acquires the first SSB, the initial transmission of the CG-SDT process is completed, and the initial transmission of the CG-SDT process is described in fig. 4, which is not described herein.
S802, the terminal equipment receives the first indication information, and accordingly, the network equipment sends the first indication information.
Optionally, the first indication information is DCI sent by the network device using the first SSB in the first random access procedure, where the first indication information is used to indicate a first resource, and the first resource is DG resource. The terminal device may choose to use the first resource to transmit uplink data in a subsequent transmission of the CG-SDT process.
It should be understood that the first SSB corresponds to the first resource, that is, after the terminal device acquires the first SSB, the network device may send the first indication information through the first SSB, and the terminal device may transmit uplink data on the valid first resource.
It should be understood that the second SSB corresponds to a second resource, that is, a second SSB associated with CG configuration obtained by the terminal device during initial transmission of CG-SDT, and when SS-RSRP of at least one of the second SSBs is greater than or equal to a second threshold, and the second resource (CG-SDT resource) corresponding thereto is valid, the terminal device may transmit uplink data on the second resource. It should be appreciated that the first resource is used for a first transmission, which is a transmission of uplink data by the terminal device to the network device.
Specifically, the terminal device may determine that the first transmission is performed on the first resource or the second resource according to the following scheme.
Scheme 1:
when the power of the first SSB is greater than or equal to a first threshold, the terminal device and the network device perform first transmission on the first resource.
When the power of the first SSB is less than or equal to the first threshold and the power of the second SSB is greater than or equal to the second threshold, the terminal device and the network device perform a first transmission on a second resource.
It should be understood that, in scheme 1, the terminal device first compares the power of the first SSB with a first threshold, and when the first SSB is greater than or equal to the first threshold, the terminal device transmits uplink data using a first resource (DG resource); when the first SSB is smaller than or equal to the first threshold, the terminal device determines whether the power of the second SSB is larger than or equal to the second threshold, and when the power of the second SSB is larger than or equal to the second threshold, the terminal device uses a second resource (CG-SDT resource) to transmit uplink data. Alternatively the first threshold is different or the same as the second threshold. The comparison may not limit the timing of the comparison before each transmission of the upstream data, or at each CG period, or at each CG association period.
Scheme 2:
when the power of the second SSB is less than or equal to a second threshold and the power of the first SSB is greater than or equal to a first threshold, the terminal device and the network device perform a first transmission on a first resource.
It should be understood that, in scheme 2, the terminal device first compares the power of the second SSB with the second threshold, and when the second SSB is greater than or equal to the second threshold, the terminal device transmits uplink data using the second resource (CG-SDT resource); when the second SSB is smaller than or equal to the second threshold, the terminal device determines whether the power of the first SSB is larger than or equal to the second threshold, and when the power of the first SSB is larger than or equal to the first threshold, the terminal device uses the first resource (DG resource) to transmit uplink data. Optionally, the first threshold is different or the same as the second threshold. The comparison may not limit the timing of the comparison before each transmission of the upstream data, or at each CG period, or at each CG association period.
Scheme 3:
the terminal device starts a timer comprising an effective duration during which the terminal device and the network device perform a first transmission on the first resource.
When the timer expires and the power of the second SSB is greater than or equal to a second threshold, the terminal device and the network device perform a first transmission on a second resource.
It should be understood that in scheme 3, the terminal device starts a timer after completing the random access procedure, and during the effective duration of the timer, the terminal device uses the first resource (DG resource) to send subsequent uplink data. When the timer is overtime, the terminal device judges whether the power of the second SSB is larger than or equal to a second threshold value, and when the power of the second SSB is larger than or equal to the second threshold value, the terminal device transmits uplink data on a second resource (CG-SDT resource).
Optionally, when the power of the first SSB is less than or equal to the first threshold and the power of the second SSB is less than or equal to the second threshold, the terminal device and the network device enter a random access procedure, or when the timer expires and the power of the second SSB is less than or equal to the second threshold, the terminal device and the network device enter a random access procedure. Specifically, the terminal device sends a first request message to the network device, where the first request message is used to request a third resource, and the third resource is a third resource included in Msg 4 (4-step random access) or Msg B (2-step random access) of the random access procedure, and the third resource is available for the first transmission. The random access may be a 4-step random access as shown in fig. 2 or a 2-step random access as shown in fig. 3.
Based on the technical scheme in the above embodiment of the present application, when the random access process is triggered due to CG-SSB selection failure, after the random access process ends, the network device allocates DG resources to the terminal device through the SSB selected by the random access process, when the SS-RSRP of the SSB selected by the random access process meets the conditions, the terminal device and the network device transmit data on the DG resources, before the next data transmission is needed, when the terminal device determines that the SS-RSRP of the SSB selected by the previous random access still meets the conditions, the terminal device and the network device can still transmit data on the DG resources, that is, the terminal device and the network device can reuse the SSB selected by the random access process, so that the terminal device can effectively avoid frequent triggering of the random access process, thereby avoiding additional signaling overhead and energy consumption.
As can be seen from S401 above, in the CG-SDT procedure, the release message received by the terminal device includes the CG configuration. When the uplink SDT data arrives at the terminal device, the terminal device judges whether a certain condition is met. When the terminal equipment judges that the SS-RSRP of all CG-SSB is lower than the threshold value, namely CG-SDT resources are invalid, the terminal equipment cannot trigger the CG-SDT process, at the moment, the terminal equipment needs to judge whether the RA-SDT condition is met, and when the RA-SDT condition is met, the terminal equipment can be switched into the RA-SDT process. The initial transmission of the RA-SDT is completed first. The terminal device may then continue to transmit subsequent user data and/or NAS messages. In the subsequent transmission process, on one hand, network equipment can allocate DG resources to terminal equipment through DCI; on the other hand, CG resources may arrive periodically according to the CG configuration in the release message in S401. At this time, whether the terminal device selects CG resource or DG resource for subsequent transmission is a problem to be solved by the embodiments of the present application.
Fig. 9 illustrates another method for transmitting data according to an embodiment of the present application. The method specifically comprises the following steps:
s901, the terminal device receives the first indication information, and accordingly, the network device sends the first indication information.
S902, the terminal equipment releases the second resource.
Specifically, the embodiments of the present application include the following.
Scheme 1:
and the terminal equipment uses the first resource to carry out first transmission and releases the second resource.
Optionally, the terminal device receives a first release message, where the first release message is used to indicate a fourth resource, and the fourth resource is available for a second transmission, and the second transmission is a next transmission of the first transmission.
Scheme 2:
and the terminal equipment uses the first resource to carry out first transmission and reserves the configuration of the second resource.
Scheme 3:
the terminal equipment compares the power of the second SSB with a second threshold, and when the power of the second SSB is larger than or equal to the second threshold, the terminal equipment performs first transmission on the second resource. When the power of the second SSB is less than or equal to the second threshold, the terminal device performs a first transmission on the first resource.
Based on the technical scheme in the above embodiment of the application, when the terminal equipment is switched from the CG-SDT process to the RA-SDT process and the initial transmission of the RA-SDT process is completed, the problem that the terminal equipment can select effective resources for subsequent transmission according to different conditions in the subsequent transmission is solved.
In an RA-SDT procedure that does not perform anchor relocation, if non-SDT data arrives in the SDT procedure, the second network device needs to first send an RRC release message to terminate the SDT procedure, and then the terminal device triggers the random access procedure to establish an RRC connection with the first network device. Fig. 10 shows a signaling flow diagram in the scenario of upstream non-SDT data arrival in an RA-SDT process that does not perform anchor relocation.
As shown in fig. 10, taking a 4-step random access RA-SDT procedure as an example, the terminal device and the first network device initiate the SDT procedure, and then a data forwarding channel is established between the first network device, the second network device and the terminal device. The details of the above steps can be found in the above, and the details are not repeated here.
When uplink non-SDT data arrives, the terminal device sends indication information to the first network device, and the first network device forwards the indication to the second network device. The second network device receives and then sends a UE context release message to the first network device, wherein the UE context release message includes an RRC release message that is integrity protected and encrypted with a key of the second network device (first key), and the RRC release message includes a next hop chain count (next hop chaining count, NCC) for generating a new key (second key). And the first network equipment forwards the RRC release message to the terminal equipment after receiving the RRC release message and releases the UE context.
After receiving the RRC release message, the terminal equipment decrypts the RRC release message by using a key (a first key) of the second network equipment to obtain an NCC value in the RRC release message, and then the terminal equipment triggers a random access process to recover the RRC connection, wherein the RRC recovery request message sent to the first network equipment carries I-RNTI, the first network equipment acquires the identity of the second network equipment according to the I-RNTI after receiving the RRC release message, and sends a request message for searching the UE context to the first network equipment to request the UE context, wherein the message carries the I-RNTI and is used for verifying the identity of the UE and the identity of the target base station. After the second network equipment receives the information, carrying out UE identity verification, finding the security context of the UE 5G access layer according to the I-RNTI carried in the information, and calculating K by using the security context of the UE 5G access layer NG-RAN *。
Subsequently, the second network device sends a search UE context response message to the first network device, wherein K is carried NG-RAN * . The first network equipment receives the data according to K NG-RAN * A new RRC key (second key) is derived, and then the first network device generates an RRC restoration message, and after integrity protection and ciphering the RRC restoration message with the new RRC key (second key), sends it to the terminal device.
After the terminal equipment acquires the NCC value in the RRC release message, K is deduced according to the key (first key) of the second network equipment, the NCC value, the identity of the target cell and other information NG-RAN * And a new RRC key (second key) is derived accordingly. After receiving the RRC recovery message, the terminal device decrypts the RRC recovery message using the new RRC key (second key), then switches from the RRC inactive state to the RRC connected state, replies an RRC recovery complete message to the first network device, completes RRC connection recovery, and then performs data interaction with the first network device.
According to the steps, when non-SDT data arrives in the RA-SDT process without anchor relocation, the first network equipment needs to repeatedly send a UE context searching request message to the second network equipment, and the second network equipment correspondingly repeatedly performs operations such as terminal equipment identity authentication and the like after receiving the message, so that frequency spectrum resources are consumed, and processing time delay is increased. Meanwhile, the random access procedure triggered by the terminal device in order to establish the RRC connection with the first network device also introduces additional signaling overhead and energy consumption, so how to save the signaling overhead and energy consumption when the non-SDT data arrives in the RA-SDT that does not perform anchor relocation is a problem to be solved by the embodiments of the present application.
In the case of the arrival of upstream non-SDT data, fig. 11 illustrates another method for transmitting data according to the embodiment of the present application. The method specifically comprises the following steps:
s1101, the first network device sends address indication information, and correspondingly, the second network device receives the address indication information.
Optionally, the address indication information carries SDT DRB level and non-SDT DRB level data forwarding downlink TNL information.
S1102, the second network device establishes a data forwarding channel with the first network device.
And the second network equipment establishes SDT DRB and non-SDT DRB data forwarding channels according to the received address information carrying the SDT DRB and non-SDT DRB data forwarding downlink TNL information.
S1103, the second network device determines the first value, generates an RRC release message, and encrypts the RRC release message.
When the uplink non-SDT data arrives, the terminal device sends indication information, the second network device receives the indication information, calculates a first value according to information in a search UE context request message received in an RA-SDT process which does not execute anchor point relocation, generates an RRC release message, and uses the first key for integrity protection and encryption.
S1104, the first network device receives the first transmission information, and accordingly, the second network device sends the first transmission information.
Optionally, the first transmission information is a retrieve UE context transfer message.
The second network device sends the first transmission information to the first network device, optionally the message comprises an RRC release message with NCC value and carrying K NG-RAN * Is used for the UE context.
S1105, the first network device determines the second key, generates an RRC recovery message, and encrypts the RRC recovery message.
After receiving the search UE context transmission message, the first network equipment performs K-based on NG-RAN * Deriving a second key, generating an RRC recovery message, and carrying out integrity protection and encryption on the RRC recovery message by using the second key.
S1106, the first network device sends a second release message and a recovery message, and correspondingly, the terminal device receives the second release message and the recovery message.
Illustratively, the second release message is an RRC release message and the resume message is an RRC resume message.
It will be appreciated that the first network device needs to distinguish between the RRC release message and the RRC restore message when sending both messages. Specifically, one of the following methods may be employed:
(1) The RRC resume message is taken as one field of the RRC release message.
(2) A type identifier (first identifier) is added to a control protocol data unit (protocol data unit, PDU) of a packet data convergence layer protocol (packet data convergence protocol, PDCP).
(3) A type identifier (first identifier) is added to the PDCP header of the message.
(4) The RRC release message and the RRC restore message occur on different logical channels.
The first network device distinguishes the RRC release message and the RRC recovery message and then sends the messages to the terminal device, so that the terminal device can decrypt the two messages by using different keys.
S1107, the terminal equipment decrypts the second release message and the recovery message.
The terminal device decrypts the received RRC release message (second release message) and RRC recovery message (recovery message) using different keys, respectively, i.e. the terminal device decrypts the RRC release message using the first key and decrypts the RRC recovery message using the second key.
Specifically, after receiving the RRC release message and the RRC restore message, the terminal device performs the following steps:
(1) The RRC release message is decrypted using the first key, thereby obtaining an NCC value.
(2) Deriving K from NCC value and target physical cell identifier (physical cell identifier, PCI) information NG-RAN *。
(3) According to K NG-RAN * The second key is further derived.
(4) The RRC recovery message is decrypted using the second key.
(5) Radio Bearers (RBs) other than SDT are restored and PDCP entities corresponding to the radio bearers other than SDT are reconstructed.
(6) And generating an RRC recovery complete message, and performing integrity protection and encryption on the RRC recovery complete message by using a second key.
(7) The terminal device switches to the RRC connection state and sends an RRC restoration request message to the first network device.
Through the steps, the terminal equipment establishes connection with the first network equipment, and can start to send uplink non-SDT data to the first network equipment, so that the transmission of the non-SDT data between the terminal equipment and the first network equipment can be realized.
In another case, fig. 12 shows another method for transmitting data according to the embodiment of the present application when the downstream non-SDT data arrives, which is different from the upstream non-SDT data arrival scenario above in that:
and after the second network equipment receives the downlink non-SDT data, the terminal equipment does not need to send the indication information. After the second network device sends the first transmission information to the first network device, the second network device sends the downlink non-SDT data to the first network device through the non-SDT DRB forwarding channel established in the above process, the first network device caches the non-SDT data to the local, and sends the non-SDT downlink data to the terminal device after receiving the RRC recovery completion message sent by the terminal device.
Based on the technical scheme of the embodiment of the application, in the RA-SDT process without executing anchor point relocation, if non-SDT data arrives, the terminal equipment can simultaneously receive the RRC release message and the RRC recovery message, and immediately switch to the RRC connection state after terminating the SDT process, thereby transmitting the non-SDT data. The signaling overhead and energy consumption caused by triggering the random access process by the terminal equipment to establish the RRC connection and repeatedly sending the UE context searching request message are avoided, namely, the signaling interaction between less terminal equipment and network equipment is avoided, so that the signaling overhead is reduced.
Fig. 13 shows a schematic structural diagram of a communication apparatus 1300 according to an embodiment of the present application. The communication apparatus 1300 may be a terminal device or a network device, or may be an apparatus in a terminal device or a network device, or may be an apparatus that can be used in cooperation with a terminal device or a network device. In a possible implementation, the communications apparatus 1300 may include modules or units corresponding to one to perform the methods/operations/steps/actions performed by the terminal device or the network device (including the first network device and the second network device) in the foregoing method embodiments, where the units may be implemented by using hardware circuits, software, or a combination of hardware circuits and software. In one possible implementation, the communications apparatus 1300 includes: a processing unit 1310 and a transceiving unit 1320. It should be understood that the communication device shown in fig. 13 is only an example, and may include other units, or units similar in function to the respective units in fig. 13, or may not necessarily include all units in fig. 13.
It should be noted that, the processing unit in the embodiment of the present application may also be referred to as a processing module, and the transceiver unit may also be referred to as a transceiver unit (module).
Fig. 14 shows a communication apparatus 1400 provided in an embodiment of the present application, where the communication apparatus 1400 may be a terminal device described in fig. 2 or a network device described in fig. 2. The apparatus may include a processor 1410 and a transceiver 1430. The apparatus may include a process 1410 and a transceiver 1430. The transceiver may include a transmitter and/or a receiver. Optionally, the apparatus may further include a memory 1420, and the processor 1410, the transceiver 1430, and the memory 1420 communicate with each other through an internal connection path. The related functions performed by the processing unit 1310 in fig. 13 may be performed by the processor 1410, and the related functions performed by the transceiver unit 1320 may be performed by the processor 1410 controlling the transceiver 1430.
In the alternative, processor 1410 may be a CPU, microprocessor, ASIC, special purpose processor, or one or more integrated circuits that perform the techniques of the embodiments of the present application. In the alternative, a processor may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions). For example, a baseband processor, or a central processing unit. The baseband processor may be used to process communication protocols and communication data, and the central processor may be used to control a communication apparatus (e.g., a network device, a terminal device, or a chip, etc.), execute a software program, and process data of the software program.
Alternatively, the processor 1410 may include one or more processors, for example, one or more CPUs, and in the case where the processor is one CPU, the CPU may be a single core CPU or a multi-core CPU.
The transceiver 1430 is configured to transmit and receive data and/or signals, as well as to receive data and/or signals. The transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
The memory 1420 includes, but is not limited to, random access memory (random access memory, RAM), read-only memory (ROM), erasable programmable memory (erasable programmable read only memory, EPROM), compact disc read-only memory (compact disc read-only memory, CD-ROM), the memory 1420 being for storing associated instructions and data. Memory 1420 is used to store computer programs or instructions and data for the network device, either as a separate device or integrated in processor 1410.
Specifically, the processor 1410 is configured to control information transmission between the transceiver and the terminal device. Reference may be made specifically to the description of the method embodiments, and no further description is given here.
In a specific implementation, as an embodiment, the communication apparatus 1400 may further include an output device and an input device. The output device(s) communicate with the processor 1410, and information can be displayed in a variety of ways. For example, the output device may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a Cathode Ray Tube (CRT) display device, or a projector, etc. The input device(s) and processor 1410 are in communication and may receive user input in a variety of ways. For example, the input device may be a book mouse, a keyboard, a touch screen device, a sensing device, or the like.
It will be appreciated that fig. 14 shows only a simplified design of a communication device. In practical applications, the apparatus may also include necessary other elements, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminal devices capable of implementing the present application are within the scope of protection of the present application.
In one possible design, the apparatus 1400 may be a chip, such as a communication chip usable in a terminal device or a network device, for implementing the functions associated with the processor 1410 in the terminal device or the network device. The chip can be a thread programmable gate array, an application specific integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller which can realize related functions, and can also adopt a programmable controller or other integrated chips. The chip may optionally include one or more memories for storing computer programs or instructions which, when executed, cause the processor to perform the corresponding functions.
As shown in fig. 15, the embodiment of the present application further provides an apparatus 1500, which may be used to implement the functions of the terminal device and the network device (including the first network device and the second network device) in the foregoing method, where the apparatus 1500 may be a communication apparatus or a chip in the communication apparatus. The communication device includes:
at least one input-output interface 1510 and logic 1520. The input/output interface 1510 may be an input/output circuit, an input interface, an output interface, or the like. Logic 1520 may be a signal processor, chip, or other integrated circuit that may implement the methods of the present application.
Logic 1520 is configured to perform some or all of the steps of any one of the methods provided in the embodiments of the present application. For example, when the apparatus is a terminal device, the method is used to perform the steps performed by the terminal device in the various possible implementations of the method embodiments described above. When the apparatus is a network device, the method is used to perform the steps performed by the network device in the various possible implementation methods in the method embodiments described above.
The embodiment of the application also provides a device which can be a terminal device or a network device or a logic circuit. The apparatus may be configured to perform the actions performed by the terminal device or the network device in the above-described method embodiments.
The present application also proposes a computer readable storage medium storing one or more programs or instructions which, when executed on a computer, cause the computer to perform the method described in the above embodiments.
The present application also proposes a computer program comprising a program or instructions which, when executed by a computer, cause the computer to perform the respective flows of the methods of the above-described embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (32)
1. A method of transmitting data, comprising:
the method comprises the steps that a terminal device obtains a first synchronous signal, a physical broadcast channel block (SSB) and a second SSB, wherein the first SSB corresponds to a first resource, and the second SSB corresponds to a second resource;
the terminal equipment receives first indication information, wherein the first indication information is used for indicating the first resource, and the first resource is used for first transmission.
2. The method according to claim 1, wherein the method further comprises:
and when the power of the first SSB is larger than a first threshold value, the terminal equipment performs the first transmission on the first resource.
3. The method according to claim 2, wherein the method further comprises:
the terminal device performs the first transmission on the second resource when the power of the first SSB is less than or equal to the first threshold and the power of the second SSB is greater than a second threshold.
4. The method according to claim 1, wherein the method further comprises:
the terminal device performs the first transmission on the first resource when the power of the second SSB is less than or equal to a second threshold and the power of the first SSB is greater than a first threshold.
5. The method according to claim 1, wherein the method further comprises:
the terminal equipment starts a timer;
the timer counts an effective duration, and the terminal equipment performs the first transmission on the first resource within the effective duration.
6. The method of claim 5, wherein the method further comprises:
and when the timer expires and the power of the second SSB is greater than a second threshold, the terminal equipment performs the first transmission on the second resource.
7. The method according to any one of claims 1 to 6, further comprising:
when the power of the first SSB is less than or equal to the first threshold and the power of the second SSB is less than or equal to the second threshold, the method further comprises:
the terminal device sends first request information to the network device, wherein the first request information is used for requesting third resources, and the third resources are used for the first transmission.
8. A method of transmitting data, comprising:
the network equipment sends a first synchronization signal, a physical broadcast channel block (SSB) and a second SSB, wherein the first SSB corresponds to a first resource, and the second SSB corresponds to a second resource;
The network device sends first indication information, wherein the first indication information is used for indicating the first resource, and the first resource is used for first transmission.
9. The method of claim 8, wherein the method further comprises:
the network device receives first request information for requesting a third resource for the first transmission.
10. A method of transmitting data, comprising:
the method comprises the steps that terminal equipment receives first indication information, wherein the first indication information is used for indicating first resources, and the first resources are used for first transmission;
and the terminal equipment releases the second resource.
11. The method according to claim 10, wherein the method further comprises:
the terminal device receives a first release message, where the first release message is used to indicate a fourth resource, and the fourth resource is used for the second transmission.
12. A method of transmitting data, comprising:
the network device sends first indication information, wherein the first indication information is used for indicating first resources, and the first resources are used for first transmission.
13. The method according to claim 12, wherein the method further comprises:
The network device sends a first release message, the first release message being used to indicate a fourth resource, the fourth resource being used for the second transmission.
14. A method of transmitting data, comprising:
the terminal equipment receives a second release message and a recovery message, wherein the second release message is used for indicating that a random access-based short data packet transmission (RA-SDT) process which does not execute anchor point relocation is ended, and the recovery message is used for indicating that the terminal equipment is switched to a Radio Resource Control (RRC) connection state;
the terminal equipment establishes communication connection with first network equipment;
and the terminal equipment performs third transmission, wherein the third transmission is used for transmitting SDT data by transmitting non-short data packets.
15. The method of claim 14, wherein the method further comprises:
and the terminal equipment decrypts the second release message according to a first key, wherein the first key is a key stored by the terminal equipment.
16. The method according to claim 14 or 15, characterized in that the method further comprises: the terminal equipment receives a first numerical value sent by the first network equipment;
the terminal equipment obtains a second key according to the first value;
The terminal equipment decrypts the recovery message according to the second key.
17. A method of transmitting data, comprising:
the method comprises the steps that a first network device sends a second release message and a recovery message, wherein the second release message is used for indicating that a random access-based short data packet transmission RA-SDT process which does not execute anchor point relocation is finished, and the recovery message is used for indicating that a terminal device is switched to a radio resource control RRC connection state;
the first network equipment establishes communication connection with the terminal equipment;
the first network device performs a third transmission, where the third transmission is used to transmit SDT data in a non-short data packet.
18. The method of claim 17, wherein the method further comprises:
the first network device sends second indication information to the second network device, wherein the second indication information comprises SDT (short data packet transfer) DRB (data radio bearer) and non-SDT DRB (data forwarding transfer network) TNL (network layer) information.
19. The method according to claim 17 or 18, characterized in that the method further comprises:
the first network equipment receives first transmission information sent by second network equipment, wherein the first transmission information comprises the release message and a first numerical value;
The first network device obtains a second key according to the first value, and the second key is used for encrypting the recovery message;
the first network device sends the first value to the terminal device.
20. The method according to any one of claims 17 to 19, further comprising:
the first network device distinguishes between the second release message and the resume message.
21. The method of claim 20, wherein the first network device distinguishing the second release message from the resume message comprises:
the first network device distinguishes the second release message from the recovery message according to the recovery message as one of the fields of the second release message.
22. The method of claim 20, wherein the first network device distinguishing the second release message from the resume message comprises:
the first network device distinguishes the second release message from the resume message according to a first identification.
23. The method of claim 20, wherein the first network device distinguishing the second release message from the resume message comprises:
The first network device sends the second release message through a first channel;
the first network device sends the recovery message over a second channel, the first channel being different from the second channel.
24. A method of transmitting data, comprising:
the second network equipment receives second indication information sent by the first network equipment, wherein the second indication information comprises SDT (short data packet transmission) DRB (data radio bearer) and non-SDT DRB (data forwarding transmission network layer) TNL information;
the second network device establishes a first channel, and the first channel is used for transmitting short data packets to transmit SDT and non-SDT data.
25. The method of claim 24, wherein the method further comprises:
the second network device receives a second request message;
and the second network equipment obtains a first value according to the request message, wherein the second request message is a message in a random access-based short data packet transmission RA-SDT process without anchor point relocation.
26. The method according to claim 24 or 25, characterized in that the method further comprises:
the second network device encrypts a second release message according to a first key, wherein the second release message is used for indicating that an RA-SDT process which does not execute anchor relocation is finished, and the first key is a key of the second network device;
The second network device sends a first transmission message to the first network device, the first transmission message including the second release message and a first value.
27. A communication device comprising means for performing the method of any of claims 1 to 7, 10 or 11, 14 to 16.
28. A communication device comprising means for performing the method of any one of claims 8 or 9, 12 or 13, 17 to 23, 24 to 26.
29. A communication device, comprising: a processor coupled with a memory for storing a computer program for running the computer program to cause the communication device to perform the method of any one of claims 1 to 7, 10 or 11, 14 to 16 or to cause the communication device to perform the method of any one of claims 8 or 9, 12 or 13, 17 to 23, 24 to 26.
30. The communication device of claim 29, further comprising one or more of the memory and a transceiver for receiving signals and/or transmitting signals.
31. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a computer program or instructions which, when run on a computer, cause the method of any one of claims 1 to 7, 10 or 11, 14 to 16 to be performed or cause the method of any one of claims 8 or 9, 12 or 13, 17 to 23, 24 to 26 to be performed.
32. A computer program product comprising a computer program or instructions which, when run on a computer, cause the method of any one of claims 1 to 7, 10 or 11, 14 to 16 to be performed or cause the method of any one of claims 8 or 9, 12 or 13, 17 to 23, 24 to 26 to be performed.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210026343.XA CN116471687A (en) | 2022-01-11 | 2022-01-11 | Method and device for transmitting data |
PCT/CN2023/070644 WO2023134531A1 (en) | 2022-01-11 | 2023-01-05 | Method and apparatus for transmitting data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210026343.XA CN116471687A (en) | 2022-01-11 | 2022-01-11 | Method and device for transmitting data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116471687A true CN116471687A (en) | 2023-07-21 |
Family
ID=87175777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210026343.XA Pending CN116471687A (en) | 2022-01-11 | 2022-01-11 | Method and device for transmitting data |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116471687A (en) |
WO (1) | WO2023134531A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109309955B (en) * | 2017-07-28 | 2021-02-09 | 华为技术有限公司 | Transmission method of synchronous signal block, access network equipment and terminal equipment |
US11910445B2 (en) * | 2019-01-10 | 2024-02-20 | Beijing Xiaomi Mobile Software Co., Ltd. | Random access method and device |
WO2020164142A1 (en) * | 2019-02-15 | 2020-08-20 | Oppo广东移动通信有限公司 | Method and device for processing synchronization signal block information, and communication device |
ES2970579T3 (en) * | 2020-05-14 | 2024-05-29 | Koninklijke Philips Nv | Small data transmission |
-
2022
- 2022-01-11 CN CN202210026343.XA patent/CN116471687A/en active Pending
-
2023
- 2023-01-05 WO PCT/CN2023/070644 patent/WO2023134531A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2023134531A1 (en) | 2023-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111314974B (en) | Method and device for processing update of primary and secondary cells, base station and storage medium | |
EP3457761B1 (en) | Method for switching to relay node, and relevant device and system | |
EP3883281B1 (en) | Method for allocating resources and communication apparatus | |
CN110381554B (en) | Communication method, device, system and computer storage medium | |
US20230007698A1 (en) | Communication Method and Apparatus | |
CN111836220B (en) | Communication method and device | |
CN112351443A (en) | Communication method and device | |
CN110636572A (en) | Communication method and device | |
US20220264392A1 (en) | Rrc connection resume method and device | |
WO2018082054A1 (en) | Communication method and communication device | |
CN116491166A (en) | Communication configuration method and communication device | |
CN115885575A (en) | Wireless communication method and communication device | |
CN113365364A (en) | Communication method and device | |
CN113286331A (en) | Reestablishing method and communication device | |
CN115119311A (en) | Method and communication device for transmitting small data | |
US20220174684A1 (en) | Information transmission method and apparatus | |
CN116057998A (en) | Communication method, device and apparatus | |
WO2021109039A1 (en) | Communication method, apparatus and device | |
CN111132186B (en) | MAC layer resetting and data transmission method and device | |
CN116471687A (en) | Method and device for transmitting data | |
CN114731239B (en) | Conflict processing method and terminal equipment | |
EP4027666A1 (en) | Communication method and related product | |
WO2021134763A1 (en) | Method, apparatus and device for recovering transmission | |
CN115804185A (en) | Wireless communication method, terminal equipment and network equipment | |
CN117750456B (en) | Cell switching method, cell switching equipment, storage medium, chip system and product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication |