[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113727343B - Method and apparatus for wireless communication - Google Patents

Method and apparatus for wireless communication Download PDF

Info

Publication number
CN113727343B
CN113727343B CN202010446477.8A CN202010446477A CN113727343B CN 113727343 B CN113727343 B CN 113727343B CN 202010446477 A CN202010446477 A CN 202010446477A CN 113727343 B CN113727343 B CN 113727343B
Authority
CN
China
Prior art keywords
logical channel
signaling
channel identity
identity
mac
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010446477.8A
Other languages
Chinese (zh)
Other versions
CN113727343A (en
Inventor
张晓博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Langbo Communication Technology Co Ltd
Original Assignee
Shanghai Langbo Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Langbo Communication Technology Co Ltd filed Critical Shanghai Langbo Communication Technology Co Ltd
Priority to CN202310258167.7A priority Critical patent/CN116347441A/en
Priority to CN202010446477.8A priority patent/CN113727343B/en
Priority to PCT/CN2021/095032 priority patent/WO2021238779A1/en
Publication of CN113727343A publication Critical patent/CN113727343A/en
Priority to US17/992,854 priority patent/US20230083122A1/en
Application granted granted Critical
Publication of CN113727343B publication Critical patent/CN113727343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/22Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method and apparatus for wireless communication includes a first transmitter transmitting first signaling indicating a second candidate logical channel identity; a first receiver that receives a second MAC PDU; wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet. By reasonably determining the identity of the logic channel, the method and the device improve reliability and reduce time delay.

Description

Method and apparatus for wireless communication
Technical Field
The present application relates to a transmission method and apparatus in a wireless communication system, and more particularly, to a transmission method and apparatus for improving system efficiency, optimizing resource utilization, reducing service interruption, improving service continuity, and enhancing reliability in wireless communication.
Background
Future wireless communication systems have more and more diversified application scenes, and different application scenes have different performance requirements on the system. To meet the different performance requirements of various application scenarios, a New air interface technology (NR) is decided to be researched in the 3GPP (3 rd Generation Partner Project, third Generation partnership project) RAN (Radio Access Network ) #72 times of the whole meeting, and standardized Work is started on NR by the 3GPP RAN #75 times of the whole meeting through the WI (Work Item) of NR.
In communication, both LTE (Long Term Evolution ) and 5G NR can be involved in reliable accurate reception of information, optimized energy efficiency ratio, determination of information validity, flexible resource allocation, scalable system structure, efficient non-access layer information processing, lower service interruption and disconnection rate, support for low power consumption, which is significant for normal communication between a base station and a user equipment, reasonable scheduling of resources, balancing of system load, so that it can be said as high throughput, meeting communication requirements of various services, improving spectrum utilization, improving a base stone of service quality, whether embbe (ehanced Mobile BroadBand, enhanced mobile broadband), URLLC (Ultra Reliable Low Latency Communication, ultra-high reliability low latency communication) or eMTC (enhanced Machine Type Communication ) are indispensable. Meanwhile, in the internet of things in the field of IIoT (Industrial Internet of Things), in V2X (vehicle to X) communication (Device to Device) in the field of industry, in communication of unlicensed spectrum, in user communication quality monitoring, in network planning optimization, in NTN (Non Territerial Network, non-terrestrial network communication), in TN (Territerial Network, terrestrial network communication), in a dual-connection (Dual connectivity) system, in radio resource management and codebook selection of multiple antennas, in signaling design, neighbor management, service management, and beamforming, there is a wide demand, and the transmission modes of information are classified into broadcasting and unicast, and both transmission modes are indispensable for 5G systems, because they are very helpful to meet the above demands.
With the increasing of the scene and complexity of the system, the system has higher requirements on reducing the interruption rate, reducing the time delay, enhancing the reliability, enhancing the stability of the system, and the flexibility of the service, and saving the power, and meanwhile, the compatibility among different versions of different systems needs to be considered in the system design.
Disclosure of Invention
In various communication scenarios, the establishment of control and link, parameter configuration and resource allocation may be involved in the communication scenario between UEs, and because of the lack of a central control node such as a serving cell, communication between UEs, especially communication between UEs involving relay nodes, may cause a distributed control problem, and if the configuration is incorrect, different links may cause mismatch, thereby disabling end-to-end communication. Among the specific problems involved in many configurations include: how to configure the relay node so that the relay node can properly identify different links, especially those from different source nodes and destination nodes; how to configure the relay node, how to identify which data packets are to be forwarded and which are not to be forwarded; how all nodes are configured so that links between the nodes can be quickly established; how to configure the logic channels of different links, so that the data can be effectively identified and forwarded; how the last hop logical channel can be effectively configured so that the identity of this logical channel can be used for security algorithms; how to provide enough information for the configuration initiating node to configure and how to organically relate different links so that the links can be conveniently established; and how to configure logical channels so that they can meet versatile functional requirements; but also how to simplify the design of the receiving UE.
In view of the above problems, the present application provides a solution.
It should be noted that, in the case of no conflict, the embodiments in any node of the present application and the features in the embodiments may be applied to any other node. The embodiments of the present application and features in the embodiments may be combined with each other arbitrarily without conflict.
The application discloses a method in a first node used for wireless communication, comprising:
transmitting a first signaling indicating a second candidate logical channel identity;
receiving a second MAC PDU;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As one embodiment, the problems to be solved by the present application include: when communication is performed between UEs, for example, by a sidelink technology, particularly, a relay node exists between UEs and is also a UE, the communication process becomes very complex, particularly, when a layer 2 relay architecture is used, the salient appearance is that the relay node needs to distinguish which data are own data and which data are required to be relayed and forwarded, and how to relate incoming and outgoing links to one relay node; on the other hand, when the node initiated by the configuration needs to configure the far-end link, for example, when the far-end logical channel is configured, the far-end logical channel may be already occupied, and a conflict may occur during the configuration, so that the communication is interrupted; and more distributed coordination is required if there are multiple forwarding links for a destination node, especially if these logical channels are also used for the security algorithm at the same time. By sending the first signaling, the target node feeds back the identity of the second candidate logic channel and determines the second logic channel by utilizing the second candidate logic channel, thereby avoiding possible conflict.
As one example, the benefits of the above method include: the first node transmits the first signaling to indicate the identity of the second candidate logical channel, so that the control difficulty in the communication from distributed UE to UE can be solved, and the communication link can be established with lower complexity; in the sidelink communication discussed in 3GPP, the link is generally configured by the transmitting node, which may cause that the original node cannot know the information of all links, especially the far-end link, such as available logical channels, in the relay scenario, and the logical channels may also be parameters of the security algorithm for the data sent by the transmitting node; the method proposed by the present application can solve the above problems. On the other hand, the method and the device are beneficial for the relay node to properly process the data of different links.
As one embodiment, the features of the present application include: MAC is Medium Access Control (medium access control).
As one embodiment, the features of the present application include: the PDU is Protocol Data Unit (protocol data unit).
Specifically, according to one aspect of the present invention, the second candidate logical channel identity is identical to at least 5 least significant bits of the second logical channel identity.
In particular, according to one aspect of the invention, the second candidate logical channel identity is used to determine the first logical channel identity.
In particular, according to one aspect of the invention, the second logical channel identity is used to determine the first logical channel identity.
In particular, according to one aspect of the invention, the first logical channel identity is used to determine a second logical channel identity.
Specifically, according to one aspect of the present invention, the first signaling indicates a first candidate logical channel identity, which is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
Specifically, according to one aspect of the present invention, there is provided: receiving a second signaling;
wherein the second signaling is RRC signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
Specifically, according to one aspect of the present invention, there is provided: transmitting a third signaling;
wherein the third signaling is sent in response to the second signaling not contradicting the current configuration; the third signaling indicates that configuration of the second signaling is completed; the first signaling includes a first set of candidate logical channel identities; the first set of candidate logical channel identities includes at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling contradicts a current configuration.
Specifically, according to one aspect of the present application, the first node is a user equipment.
Specifically, according to one aspect of the present application, the first node is an internet of things terminal.
Specifically, according to one aspect of the present application, the first node is a relay.
Specifically, according to one aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the present application, the first node is an aircraft.
The application discloses a method in a second node for wireless communication, comprising:
receiving a target MAC PDU;
the target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, a second MAC PDU is sent; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
Specifically, according to one aspect of the present invention, there is provided: and when the target MAC sub-header comprises the second logic channel identity, discarding sending the second MAC PDU.
Specifically, according to one aspect of the present invention, there is provided: receiving a target signaling;
Wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
Specifically, according to one aspect of the present invention, there is provided: and sending a first feedback signaling as a response that the target signaling does not contradict the current configuration.
Wherein the first feedback signaling indicates that configuration of the target signaling is completed.
Specifically, according to one aspect of the present invention, there is provided: receiving a first signaling, the first signaling indicating a second candidate logical channel identity; the second candidate logical channel identity is used to determine the second logical channel.
Specifically, according to one aspect of the present invention, there is provided: sending a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
Specifically, according to one aspect of the present invention, there is provided: receiving a third signaling;
wherein the third signaling is sent in response to the second signaling not contradicting the current configuration; the third signaling indicates that configuration of the second signaling is completed; the first signaling includes a first set of candidate logical channel identities; the first set of candidate logical channel identities includes at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling contradicts a current configuration.
Specifically, according to one aspect of the present invention, the second candidate logical channel identity is identical to at least 5 least significant bits of the second logical channel identity.
In particular, according to one aspect of the invention, the second candidate logical channel identity is used to determine the first logical channel identity.
In particular, according to one aspect of the invention, the second logical channel identity is used to determine the first logical channel identity.
In particular, according to one aspect of the invention, the first logical channel identity is used to determine a second logical channel identity.
Specifically, according to one aspect of the present invention, the first signaling indicates a first candidate logical channel identity, which is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
Specifically, according to one aspect of the present application, the first node is a user equipment.
Specifically, according to one aspect of the present application, the first node is an internet of things terminal.
Specifically, according to one aspect of the present application, the first node is a relay.
Specifically, according to one aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the present application, the first node is an aircraft.
The application discloses a method in a third node for wireless communication, comprising:
receiving a first signaling, the first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
transmitting a first MAC PDU;
the first MAC PDU comprises a first MAC sub-PDU, wherein the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity.
Specifically, according to one aspect of the present invention, there is provided: sending a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
Specifically, according to one aspect of the present invention, there is provided: sending a target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
Specifically, according to one aspect of the present invention, the second candidate logical channel identity is identical to at least 5 least significant bits of the second logical channel identity.
In particular, according to one aspect of the invention, the second candidate logical channel identity is used to determine the first logical channel identity.
In particular, according to one aspect of the invention, the second logical channel identity is used to determine the first logical channel identity.
In particular, according to one aspect of the invention, the first logical channel identity is used to determine a second logical channel identity.
Specifically, according to one aspect of the present invention, the first signaling indicates a first candidate logical channel identity, which is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
Specifically, according to one aspect of the present application, the first node is a user equipment.
Specifically, according to one aspect of the present application, the first node is an internet of things terminal.
Specifically, according to one aspect of the present application, the first node is a relay.
Specifically, according to one aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the present application, the first node is an aircraft.
The application discloses a first node for wireless communication, comprising:
a first transmitter that transmits a first signaling indicating a second candidate logical channel identity;
a first receiver that receives a second MAC PDU;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
The application discloses a second node for wireless communication, comprising:
a second receiver which receives the target MAC PDU;
the target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, the second transmitter transmits a second MAC PDU; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
The application discloses a third node for wireless communication, comprising:
a third receiver that receives a first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
a third transmitter transmitting the first MAC PDU;
the first MAC PDU comprises a first MAC sub-PDU, wherein the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity.
As an example, compared to the conventional solution, the present application has the following advantages:
the method determines the identity of the second logical channel by transmitting the identity of the second candidate logical channel by the first node, which can greatly simplify signaling overhead when communication between the nodes, especially relay, especially when multiple links reaching the first node exist simultaneously, and avoid the simple link configuration of the initiating node, such as a third node, in the traditional method, including the configuration of the second logical channel, for example; this is advantageous to reduce the complexity of the first node as a receiving node when all logical channels to the first node are the same; because the first node only needs to process the same logic channel at this time; the problem of configuration conflict caused by different available logic channels of different links due to insufficient coordination among a plurality of paths is avoided; meanwhile, the simplification of the signaling flow is facilitated; more importantly, when the security algorithm of the true multiple sent data of the sending end needs to use the identity of the logic channel, the logic channel of the unified receiving end can avoid the ambiguity in the processing of the receiving end and the sending end.
As an example, compared to the conventional solution, the present application has the following advantages:
when the second node is used as a relay node, one of the problems to be solved includes how to distinguish the data to be forwarded from the data to be forwarded; one approach is to distinguish between different logical channel identities; however, if the logical channel identity is used in the security algorithm of the data, it will pose a new challenge to ensure that the sender and the receiver have the same understanding, for example, the logical channel identity used by the encryption algorithm of the sender needs to be consistent with the logical channel identity used by the receiver in decryption, otherwise, the detection by the security algorithm cannot be performed; meanwhile, for the foregoing reasons, it means that the identities of the logical channels from the transmitting end to the relay and from the relay to the receiving end may need to be different, i.e. it is difficult to achieve consistency; this is a dilemma; according to the method, only 5 least significant bits of the logic channel identity are used as parameters of a security algorithm, and other bits of the logic channel identity are used for distinguishing the data transmitted to the relay node or the data needing to be relayed and forwarded, so that the advantages of using different logic channel identities and guaranteeing the input of a unified security algorithm are achieved, the transmitting end and the receiving end can be prevented from being affected in transmitting and receiving, even the receiving end does not need to be assigned with the logic channel identity required to be used for decryption by special signaling, and the receiving end can detect the security through the logic channel identity corresponding to the received data by default, so that the method provided by the application well solves the dilemma.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings in which:
fig. 1 shows a flow chart of transmitting first signaling and receiving a second MAC PDU according to one embodiment of the present application;
FIG. 2 shows a schematic diagram of a network architecture according to one embodiment of the present application;
fig. 3 shows a schematic diagram of an embodiment of a radio protocol architecture of a user plane and a control plane according to one embodiment of the present application;
FIG. 4 shows a schematic diagram of a first node, a second node, and a third node according to one embodiment of the present application;
FIG. 5 illustrates a flow chart of transmissions according to one embodiment of the present application;
FIG. 6 illustrates a flow chart of transmissions according to one embodiment of the present application;
FIG. 7 illustrates a flow chart of transmissions according to one embodiment of the present application;
fig. 8 shows a schematic diagram of a MAC PDU according to an embodiment of the present application;
FIG. 9 shows a schematic diagram of node A communicating with node C according to one embodiment of the present application;
FIG. 10 illustrates a schematic diagram of a second candidate logical channel identity being used to determine a second logical channel identity according to one embodiment of the present application;
FIG. 11 illustrates a schematic diagram of a processing device for use in a first node according to one embodiment of the present application;
FIG. 12 illustrates a schematic diagram of a processing device for use in a second node according to one embodiment of the present application;
fig. 13 illustrates a schematic diagram of a processing device for use in a third node according to one embodiment of the present application.
Detailed Description
The technical solution of the present application will be further described in detail with reference to the accompanying drawings, and it should be noted that, without conflict, the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other.
Example 1
Embodiment 1 illustrates a flow chart of transmitting first signaling and receiving a second MAC PDU according to one embodiment of the present application, as shown in fig. 1. In fig. 1, each block represents a step, and it is emphasized that the order of the blocks in the drawing does not represent temporal relationships between the represented steps.
In embodiment 1, a first node in the present application sends first signaling in step 101; receiving a second MAC PDU in step 102;
wherein the first signaling indicates a second candidate logical channel identity; the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the first node is a UE (User Equipment).
As an embodiment, the first signaling comprises higher layer signaling.
As an embodiment, the first signaling comprises RRC (Radio Resource Control ) signaling.
As an embodiment, the first signaling comprises PC5-S signaling.
As an embodiment, the first signaling comprises application layer signaling.
As an embodiment, the first signaling comprises ProSe signaling.
As an embodiment, the first signaling is sent over a Uu interface.
As an embodiment, the first signaling is sent over a PC5 interface.
As an embodiment, the first signaling is transmitted over a SCCH (Sidelink Control Channel) channel.
As an embodiment, the first signaling is transmitted over a STCH (Sidelink Traffic Channel) channel.
As an embodiment, the first signaling is transmitted over a PSCCH (Physical sidelink control channel) channel.
As an embodiment, the first signaling is transmitted over a PSSCH (Physical sidelink shared channel) channel.
As an embodiment, the first signaling is transmitted over a PSBCH (Physical sidelink broadcast channel) channel.
As an embodiment, the first signaling is transmitted over a SL-SCH channel.
As an embodiment, the first signaling is transmitted over a sidelink.
As an embodiment, the first signaling is used to configure a DRB.
As an embodiment, the first signaling is used to configure RBs.
As an embodiment, the first signaling includes rrcrecon configuration sip link.
As an embodiment, the first signaling includes a field (field) in rrcrecon configuration sidelink.
As an embodiment, the first signaling comprises rrcrecon configuration.
As one embodiment, the first signaling includes SIB12.
As an embodiment, the first signaling comprises SL-LogicalChannelConfigPC5.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig-r16.
As an embodiment, the first signaling comprises SL-LogicalChannelConfig-r17.
As an embodiment, the first signaling comprises a partial domain in SL-LogicalChannelConfig.
As an embodiment, the first signaling comprises sl-RLC-Config.
As an embodiment, the first signaling comprises sl-RLC-Config-r16.
As an embodiment, the first signaling comprises sl-RLC-Config-r17.
As an embodiment, the first signaling comprises a partial field in sl-RLC-Config.
As an embodiment, the first signaling comprises an sl-LogicalChannelGroup.
As an embodiment, the first signaling includes RRCConnectionReconfigurationSidelink.
As an embodiment, the first signaling includes RRCConnectionReconfiguration.
As an embodiment, the first signaling includes DIRECT LINK ESTABLISHMENT REQUEST.
As an embodiment, the first signaling includes DIRECT LINK ESTABLISHMENT ACCEPT.
As an embodiment, the first signaling includes DIRECT LINK MODIFICATION REQUEST.
As an embodiment, the first signaling includes DIRECT LINK MODIFICATION ACCEPT.
As an embodiment, the first signaling includes a DIRECT LINK KEEPALIVE REQUEST.
As an embodiment, the first signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the first signaling comprises discover_request.
As an embodiment, the first signaling includes discover_response.
As an embodiment, the first signaling includes match_report.
As an embodiment, the first signaling includes a match_report_ack.
As an embodiment, the first signaling comprises a PROXIMITY_REQUEST.
As an embodiment, the first signaling comprises a process_request_response.
As one embodiment, the first signaling includes PROXIMITY_ALERT.
As an embodiment, the first signaling comprises a process_request_valid.
As an embodiment, the first signaling comprises a process_request_valid_response.
As an embodiment, the first signaling comprises discover_update_request.
As an embodiment, the first signaling includes discover_update_response.
As one embodiment, the first signaling includes an announcengcing ALERT REQUEST.
As an embodiment, the first signaling includes an announcengcing_alert_response.
As an embodiment, the first signaling includes Direct Security Mode Command.
As an embodiment, the first signaling includes Direct Security Mode Complete.
As an embodiment, the first logical channel identity is indicated by an LCID (Logical Channel IDentifier, logical channel identity) field comprised by the first MAC subheader.
As an embodiment, the second logical channel identity is indicated by an LCID field comprised by the second MAC subheader.
As an embodiment, the second candidate logical channel identity is indicated by LCID.
As an embodiment, the second candidate logical channel identity is indicated by the 5 least significant bits of the LCID field.
As an example, the second candidate logical channel identity comprises only 5 bits.
As an embodiment, the first data packet is a MAC CE (Control Element).
As an embodiment, the first data packet is a MAC SDU (Service Data Unit ).
As an embodiment, the first packet is an RLC (Radio Link Layer) PDU.
As an embodiment, only the 5 least significant bits (least significant bits, LSB) of the first logical channel identity and the second logical channel identity are used as 5-bit input for the security algorithm of the first data packet.
As an embodiment, only the second logical channel identity is used for a security algorithm for the first data packet, out of the first logical channel identity and the second logical channel identity.
As an embodiment, the security algorithm of the first data packet includes a security algorithm of a PDCP (Packet Data Convergence Protocol ) entity.
As an embodiment, the security algorithm of the first data packet includes an encryption algorithm.
As an embodiment, the security algorithm of the first data packet includes an integrity protection algorithm.
As one embodiment, 5 bits in the second logical channel identity are input to BEARER [0] to BEARER [5] of the security algorithm.
As one embodiment, the 5 least significant bits in the second logical channel identity are input to BEARER [0] to BEARER [5] of the security algorithm.
As one example, the security algorithm for the first data packet includes 128-NEA1 and 128-NIA1.
As one example, the security algorithm for the first data packet includes 128-NEA2 and 128-NIA2.
As one example, the security algorithm for the first data packet includes 128-NEA3 and 128-NIA3.
As one example, the security algorithm for the first data packet includes 128-EEA1 and 128-EIA1.
As one example, the security algorithm for the first data packet includes 128-EEA2 and 128-EIA2.
As one example, the security algorithm for the first data packet includes 128-EEA3 and 128-EIA3.
As an embodiment, the security algorithm of the first data packet includes SNOW.
As an embodiment, the security algorithm of the first data packet comprises AES.
As an embodiment, the security algorithm of the first data packet includes ZUC.
As an embodiment, the second logical channel identity is a field in the second MAC subheader.
As an embodiment, the first logical channel identity is a field in the first MAC subheader.
As an embodiment, the first node forwards the first data packet.
As an embodiment, the first logical channel identity is at least one bit different from the second logical channel identity.
As an embodiment, the first signaling explicitly indicates the second candidate logical channel identity.
As an embodiment, the second candidate logical channel identity is a domain in the first signaling.
As an embodiment, the first signaling carries the 5 least significant bits of the second candidate logical channel identity.
As an embodiment, the first signaling comprises the second candidate logical channel identity.
As one embodiment, the first signaling indicates a first set of candidate logical channel identities, the first set of candidate logical channel identities including the second candidate logical channel identity.
As an embodiment, the first MAC PDU is transmitted over a sidelink.
As an embodiment, the second MAC PDU is transmitted over a sidelink.
As an embodiment, the first MAC PDU is transmitted over a PC5 interface.
As an embodiment, the second MAC PDU is transmitted over a PC5 interface.
As an embodiment, the first MAC PDU is transmitted over a Uu interface.
As an embodiment, the second MAC PDU is transmitted over a Uu interface.
As an embodiment, the first MAC PDU is transmitted through a PSSCH channel.
As an embodiment, the second MAC PDU is transmitted through a PSSCH channel.
As an embodiment, the first MAC PDU is transmitted through a DTCH channel.
As an embodiment, the second MAC PDU is transmitted through a DTCH channel.
Example 2
Embodiment 2 illustrates a schematic diagram of a network architecture according to one embodiment of the present application, as shown in fig. 2. Fig. 2 illustrates V2X communication architecture under 5G NR (new radio, new air interface), LTE (Long-Term Evolution) and LTE-a (Long-Term Evolution Advanced, enhanced Long-Term Evolution) system architecture. The 5G NR or LTE network architecture may be referred to as 5GS (5 GSystem)/EPS (Evolved Packet System ) some other suitable terminology.
The V2X communication architecture of embodiment 2 includes UE (User Equipment) 201, UE241, ng-RAN (next generation radio access network) 202,5GC (5G Core Network)/EPC (Evolved Packet Core, evolved packet core) 210, hss (Home Subscriber Server )/UDM (Unified Data Management, unified data management) 220, proSe function 250, and ProSe application server 230. The V2X communication architecture may be interconnected with other access networks, but these entities/interfaces are not shown for simplicity. As shown, the V2X communication architecture provides packet-switched services, however, those skilled in the art will readily appreciate that the various concepts presented throughout this application may be extended to networks providing circuit-switched services or other cellular networks. The NG-RAN includes NR node bs (gnbs) 203 and other gnbs 204. The gNB203 provides user and control plane protocol termination towards the UE 201. The gNB203 may be connected to other gnbs 204 via an Xn interface (e.g., backhaul). The gNB203 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a Basic Service Set (BSS), an Extended Service Set (ESS), a TRP (transmit receive node), or some other suitable terminology. The gNB203 provides the UE201 with an access point to the 5GC/EPC210. Examples of UE201 include a cellular telephone, a smart phone, a Session Initiation Protocol (SIP) phone, a laptop, a Personal Digital Assistant (PDA), a satellite radio, a non-terrestrial base station communication, a satellite mobile communication, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, an drone, an aircraft, a narrowband internet of things device, a machine-type communication device, a land-based vehicle, an automobile, a wearable device, or any other similar functional device. Those of skill in the art may also refer to the UE201 as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communication device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. gNB203 is connected to 5GC/EPC210 through an S1/NG interface. The 5GC/EPC210 includes MME (Mobility Management Entity )/AMF (Authentication Management Field, authentication management domain)/SMF (Session Management Function ) 211, other MME/AMF/SMF214, S-GW (Service Gateway)/UPF (userplaneflection) 212, and P-GW (Packet Date Network Gateway, packet data network Gateway)/UPF 213. The MME/AMF/SMF211 is a control node that handles signaling between the UE201 and the 5GC/EPC210. In general, the MME/AMF/SMF211 provides bearer and connection management. All user IP (Internet Protocal, internet protocol) packets are transported through the S-GW/UPF212, which S-GW/UPF212 itself is connected to the P-GW/UPF213. The P-GW provides UE IP address assignment as well as other functions. The P-GW/UPF213 is connected to the internet service 230. Internet services 230 include operator-corresponding internet protocol services, which may include, in particular, the internet, intranets, IMS (IP Multimedia Subsystem ) and packet-switched streaming services. The ProSe function 250 is a logic function for network related behavior required for a ProSe (Proximity-based Service); including DPF (Direct Provisioning Function, direct provision function), direct discovery name management function (Direct Discovery Name Management Function), EPC level discovery ProSe function (EPC-level Discovery ProSe Function), and the like. The ProSe application server 230 has the functions of storing EPC ProSe user identities, mapping between application layer user identities and EPC ProSe user identities, allocating ProSe-restricted code suffix pools, etc.
As an embodiment, the UE201 and the UE241 are connected through a PC5 Reference Point (Reference Point).
As an embodiment, the ProSe function 250 is connected to the UE201 and the UE241 through PC3 reference points, respectively.
As an embodiment, the ProSe function 250 is connected to the ProSe application server 230 via a PC2 reference point.
As an embodiment, the ProSe application server 230 is connected to the ProSe application of the UE201 and the ProSe application of the UE241 via PC1 reference points, respectively.
As an embodiment, the second node, the first node, and the third node in the present application are NR node B, UE and UE241, respectively.
As an embodiment, the first node and the second node in the present application are UE201 and UE241, respectively.
As an embodiment, the first node and the third node in the present application are UE201 and UE241, respectively.
As an embodiment, the second node and the third node in the present application are UE201 and UE241, respectively.
As an embodiment, the radio link between the UE201 and the UE241 corresponds to a Sidelink (SL) in the present application.
As an embodiment, the radio link from the UE201 to the NR node B is an uplink.
As an embodiment, the radio link from the NR node B to the UE201 is a downlink.
As an embodiment, the UE201 supports relay transmission.
As an embodiment, the UE241 supports relay transmission.
As an embodiment, the gNB203 is a macro cell (marcocelluar) base station.
As one example, the gNB203 is a Micro Cell (Micro Cell) base station.
As an embodiment, the gNB203 is a PicoCell (PicoCell) base station.
As an embodiment, the gNB203 is a flying platform device.
As one embodiment, the gNB203 is a satellite device.
Example 3
Embodiment 3 shows a schematic diagram of an embodiment of a radio protocol architecture according to one user plane and control plane of the present application, as shown in fig. 3. Fig. 3 is a schematic diagram illustrating an embodiment of a radio protocol architecture for a user plane 350 and a control plane 300, fig. 3 shows the radio protocol architecture for the control plane 300 for a first node (UE, satellite or aerial in gNB or NTN) and a second node (gNB, satellite or aerial in UE or NTN), or between two UEs, in three layers: layer 1, layer 2 and layer 3. Layer 1 (L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions. The L1 layer will be referred to herein as PHY301. Layer 2 (L2 layer) 305 is above PHY301 and is responsible for the links between the first node and the second node and the two UEs through PHY301. The L2 layer 305 includes a MAC (Medium Access Control ) sublayer 302, an RLC (Radio Link Control, radio link layer control protocol) sublayer 303, and a PDCP (Packet Data Convergence Protocol ) sublayer 304, which terminate at the second node. The PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels. The PDCP sublayer 304 also provides security by ciphering the data packets and handover support for the first node between second nodes. The RLC sublayer 303 provides segmentation and reassembly of upper layer data packets, retransmission of lost data packets, and reordering of data packets to compensate for out of order reception due to HARQ. The MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating the various radio resources (e.g., resource blocks) in one cell among the first nodes. The MAC sublayer 302 is also responsible for HARQ operations. The RRC (Radio Resource Control ) sublayer 306 in layer 3 (L3 layer) in the control plane 300 is responsible for obtaining radio resources (i.e., radio bearers) and configuring the lower layers using RRC signaling between the second node and the first node. The PC5-S (PC 5Signaling Protocol ) sublayer 307 is responsible for the processing of the signaling protocol of the PC5 interface. The radio protocol architecture of the user plane 350 includes layer 1 (L1 layer) and layer 2 (L2 layer), the radio protocol architecture for the first node and the second node in the user plane 350 is substantially the same for the physical layer 351, PDCP sublayer 354 in the L2 layer 355, RLC sublayer 353 in the L2 layer 355 and MAC sublayer 352 in the L2 layer 355 as the corresponding layers and sublayers in the control plane 300, but the PDCP sublayer 354 also provides header compression for upper layer packets to reduce radio transmission overhead. Also included in the L2 layer 355 in the user plane 350 is an SDAP (Service Data Adaptation Protocol ) sublayer 356, the SDAP sublayer 356 being responsible for mapping between QoS flows and data radio bearers (DRBs, data Radio Bearer) to support diversity of traffic. Although not shown, the first node may have several upper layers above the L2 layer 355. Further included are a network layer (e.g., IP layer) terminating at the P-GW on the network side and an application layer terminating at the other end of the connection (e.g., remote UE, server, etc.).
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the first node in the present application.
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the second node in the present application.
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the third node in the present application.
As an embodiment, the first signaling in the present application is generated in the RRC306 or PC5-S307.
As an embodiment, the second signaling in the present application is generated in the RRC306 or PC5-S307.
As an embodiment, the third signaling in the present application is generated in the RRC306 or PC5-S307.
As an embodiment, the first target signaling in the present application is generated in the RRC306 or PC5-S307.
As an embodiment, the first feedback signaling in the present application is generated in the RRC306 or PC5-S307.
As an embodiment, the first MAC PDU in the present application is generated in the MAC302 or the MAC352.
As an embodiment, the second MAC PDU in the present application is generated in the MAC302 or the MAC352.
As an embodiment, the target MAC PDU in the present application is generated in the MAC302 or the MAC352.
Example 4
Embodiment 4 shows a schematic diagram of a first communication device and a second communication device according to the present application, as shown in fig. 4. Fig. 4 is a block diagram of a first communication device 450 and a second communication device 410 communicating with each other in an access network.
The first communication device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmit processor 468, a receive processor 456, a multi-antenna transmit processor 457, a multi-antenna receive processor 458, a transmitter/receiver 454, and an antenna 452.
The second communication device 410 includes a controller/processor 475, a memory 476, a receive processor 470, a transmit processor 416, a multi-antenna receive processor 472, a multi-antenna transmit processor 471, a transmitter/receiver 418, and an antenna 420.
In the transmission from the second communication device 410 to the first communication device 450, upper layer data packets from the core network are provided to a controller/processor 475 at the second communication device 410. The controller/processor 475 implements the functionality of the L2 layer. In the transmission from the second communication device 410 to the first communication device 450, a controller/processor 475 provides header compression, encryption, packet segmentation and reordering, multiplexing between logical and transport channels, and radio resource allocation to the first communication device 450 based on various priority metrics. The controller/processor 475 is also responsible for retransmission of lost packets and signaling to the first communication device 450. The transmit processor 416 and the multi-antenna transmit processor 471 implement various signal processing functions for the L1 layer (i.e., physical layer). Transmit processor 416 performs coding and interleaving to facilitate Forward Error Correction (FEC) at the second communication device 410, as well as mapping of signal clusters based on various modulation schemes, e.g., binary Phase Shift Keying (BPSK), quadrature Phase Shift Keying (QPSK), M-phase shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM). The multi-antenna transmit processor 471 digitally space-precodes the coded and modulated symbols, including codebook-based precoding and non-codebook-based precoding, and beamforming processing, to generate one or more spatial streams. A transmit processor 416 then maps each spatial stream to a subcarrier, multiplexes with reference signals (e.g., pilots) in the time and/or frequency domain, and then uses an Inverse Fast Fourier Transform (IFFT) to generate a physical channel carrying the time domain multicarrier symbol stream. The multi-antenna transmit processor 471 then performs transmit analog precoding/beamforming operations on the time domain multi-carrier symbol stream. Each transmitter 418 converts the baseband multicarrier symbol stream provided by the multiple antenna transmit processor 471 to a radio frequency stream and then provides it to a different antenna 420.
In a transmission from the second communication device 410 to the first communication device 450, each receiver 454 receives a signal at the first communication device 450 through its respective antenna 452. Each receiver 454 recovers information modulated onto a radio frequency carrier and converts the radio frequency stream into a baseband multicarrier symbol stream that is provided to a receive processor 456. The receive processor 456 and the multi-antenna receive processor 458 implement various signal processing functions for the L1 layer. A multi-antenna receive processor 458 performs receive analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454. The receive processor 456 converts the baseband multicarrier symbol stream after receiving the analog precoding/beamforming operation from the time domain to the frequency domain using a Fast Fourier Transform (FFT). In the frequency domain, the physical layer data signal and the reference signal are demultiplexed by the receive processor 456, wherein the reference signal is to be used for channel estimation, and the data signal is subjected to multi-antenna detection in the multi-antenna receive processor 458 to recover any spatial stream destined for the first communication device 450. The symbols on each spatial stream are demodulated and recovered in a receive processor 456 and soft decisions are generated. The receive processor 456 then decodes and deinterleaves the soft decisions to recover the upper layer data and control signals that were transmitted by the second communication device 410 on the physical channel. The upper layer data and control signals are then provided to the controller/processor 459. The controller/processor 459 implements the functions of the L2 layer. The controller/processor 459 may be associated with a memory 460 that stores program codes and data. Memory 460 may be referred to as a computer-readable medium. In the transmission from the second communication device 410 to the second communication device 450, the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression, control signal processing to recover upper layer data packets from the core network. The upper layer packets are then provided to all protocol layers above the L2 layer. Various control signals may also be provided to L3 for L3 processing.
In the transmission from the first communication device 450 to the second communication device 410, a data source 467 is used at the first communication device 450 to provide upper layer data packets to a controller/processor 459. Data source 467 represents all protocol layers above the L2 layer. Similar to the transmit functions at the second communication device 410 described in the transmission from the second communication device 410 to the first communication device 450, the controller/processor 459 implements header compression, encryption, packet segmentation and reordering, and multiplexing between logical and transport channels based on radio resource allocations, implementing L2 layer functions for the user and control planes. The controller/processor 459 is also responsible for retransmission of lost packets and signaling to the second communication device 410. The transmit processor 468 performs modulation mapping, channel coding, and digital multi-antenna spatial precoding, including codebook-based precoding and non-codebook-based precoding, and beamforming, with the multi-antenna transmit processor 457 performing digital multi-antenna spatial precoding, after which the transmit processor 468 modulates the resulting spatial stream into a multi-carrier/single-carrier symbol stream, which is analog precoded/beamformed in the multi-antenna transmit processor 457 before being provided to the different antennas 452 via the transmitter 454. Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmit processor 457 into a radio frequency symbol stream and provides it to an antenna 452.
In the transmission from the first communication device 450 to the second communication device 410, the function at the second communication device 410 is similar to the receiving function at the first communication device 450 described in the transmission from the second communication device 410 to the first communication device 450. Each receiver 418 receives radio frequency signals through its corresponding antenna 420, converts the received radio frequency signals to baseband signals, and provides the baseband signals to a multi-antenna receive processor 472 and a receive processor 470. The receive processor 470 and the multi-antenna receive processor 472 collectively implement the functions of the L1 layer. The controller/processor 475 implements L2 layer functions. The controller/processor 475 may be associated with a memory 476 that stores program codes and data. Memory 476 may be referred to as a computer-readable medium. In the transmission from the first communication device 450 to the second communication device 410, a controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression, control signal processing to recover upper layer data packets from the UE 450. Upper layer packets from the controller/processor 475 may be provided to the core network.
As an embodiment, the first communication device 450 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus of the first communication device 450 to at least: transmitting a first signaling indicating a second candidate logical channel identity; receiving a second MAC PDU; wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the first communication device 450 includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: transmitting a first signaling indicating a second candidate logical channel identity; receiving a second MAC PDU; wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: receiving a target MAC PDU; the target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, a second MAC PDU is sent; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: receiving a target MAC PDU; the target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, a second MAC PDU is sent; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: receiving a first signaling, the first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity; transmitting a first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, wherein the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: receiving a first signaling, the first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity; transmitting a first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, wherein the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity.
As an embodiment, the first communication device 450 corresponds to a first node in the present application.
As an embodiment, the second communication device 410 corresponds to a second node in the present application.
As an embodiment, the second communication device 410 corresponds to a third node in the present application.
As an embodiment, the first communication device 450 is a UE.
As an embodiment, the first communication device 450 is an in-vehicle terminal.
As an embodiment, the second communication device 410 is a UE.
As an example, the first communication device 4100 is an in-vehicle terminal.
As an example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used for receiving the second MAC PDU in the present application.
As an example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used for receiving said second signaling in the present application.
As an example, a transmitter 456 (including an antenna 460), a transmit processor 455 and a controller/processor 490 are used to transmit the first signaling in this application.
As an example, a transmitter 456 (including an antenna 460), a transmit processor 455 and a controller/processor 490 are used to send the third signaling in this application.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used to transmit the second MAC PDU in this application.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used to send the first feedback signaling in this application.
As one example, receiver 416 (including antenna 420), receive processor 412 and controller/processor 440 are used to receive the target MAC PDU in this application.
As one example, receiver 416 (including antenna 420), receive processor 412 and controller/processor 440 are used to receive the target signaling in this application.
As an embodiment, a receiver 416 (including an antenna 420), a receive processor 412 and a controller/processor 440 are used to receive the first signaling in the present application.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used to transmit the first MAC PDU in this application.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used to send the second signaling in this application.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used to send the target signaling in this application.
As an embodiment, the receiver 416 (including the antenna 420), the receiving processor 412 and the controller/processor 440 are used for receiving the first feedback signaling in the present application.
As an embodiment, a receiver 416 (including an antenna 420), a receive processor 412 and a controller/processor 440 are used to receive the third signaling in the present application.
Example 5
Embodiment 5 illustrates a wireless signal transmission flow diagram according to one embodiment of the present application, as shown in fig. 5. In fig. 5, U01 corresponds to a first node of the present application, U02 corresponds to a second node of the present application, and U03 corresponds to a third node of the present application, which specifically illustrates that the order in this example is not limited to the order of signal transmission and implementation in this application, where the steps in F51 are optional.
For the followingFirst node U01Transmitting a first signaling in step S5101; receiving a second signaling in step S5102; transmitting a third signaling in step S5103; a second MAC PDU is received in step S5104.
For the followingSecond node U02Receiving target signaling in step S5201; transmitting a first feedback signaling in step S5202; receiving a first MAC PDU in step S5203; the second MAC PDU is transmitted in step S5204.
For the followingThird node U03Receiving the first signaling in step S5301; transmitting the target signaling in step S5302; receiving the first feedback signaling in step S5303; transmitting the second signaling in step S5304; receiving the third signaling in step S5305; and S5306, transmitting the first MAC PDU.
In embodiment 5, the first signaling indicates a second candidate logical channel identity; the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the communication interface between the first node U01 and the second node U02 is a PC5.
As an embodiment, the communication interface between the first node U01 and the third node U03 is a PC5.
As an embodiment, the communication interface between the third node U03 and the second node U02 is a PC5.
As an embodiment, the communication interface between the first node U01 and the second node U02 is Uu.
As an embodiment, the communication interface between the first node U01 and the third node U03 is Uu.
As an embodiment, the communication interface between the third node U03 and the second node U02 is Uu.
As an embodiment, the second node U02 is a relay node between the first node U01 and the third node U03.
As an embodiment, the second candidate logical channel identity is identical to at least 5 least significant bits of the second logical channel identity.
As an embodiment, the second candidate logical channel identity comprises at least 5 bits.
As an embodiment, the second candidate logical channel identity comprises 5 least significant bits and a mask, the mask indicating that the bits other than the 5 least significant bits may be any bits.
As an embodiment, the second candidate logical channel identity comprises 6 bits.
As an embodiment, the second candidate logical channel identity comprises Q bits, wherein Q is a positive integer greater than 6.
As an embodiment, the second logical channel identity comprises 5 bits.
As an embodiment, the second logical channel identity comprises 6 bits.
As an embodiment, the second logical channel identity comprises P bits, wherein P is greater than 6.
As an embodiment, the first logical channel identity comprises 5 bits.
As an embodiment, the first logical channel identity comprises 6 bits.
As an embodiment, the first logical channel identity comprises P bits, wherein P is greater than 6.
As an embodiment, the 5 least significant bits of the second logical channel identity are set to the value of the 5 least significant bits of the second candidate logical channel identity.
As an embodiment, the second candidate logical channel identity is used to determine the first logical channel identity.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second candidate logical channel.
As an embodiment, the second candidate logical channel identity is set to the first logical channel identity.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second candidate logical channel, and the value of the bits other than the 5 least significant bits of the first logical channel identity is set to the exclusive or of the value of the corresponding bits other than the 5 least significant bits of the second candidate logical channel with 1.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second candidate logical channel, and the value of the bits other than the 5 least significant bits of the first logical channel identity is set to the 0/1 inverse of the value of the corresponding bits other than the 5 least significant bits of the second candidate logical channel.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second candidate logical channel, and the value of the most significant bit of the 6 least significant bits of the first logical channel identity is set to the exclusive or of the most significant bit of the 6 least significant bits of the second candidate logical channel with 1.
As an embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second candidate logical channel, and the value of the most significant bit of the 6 least significant bits of the first logical channel identity is set to the 0/1 inverse value of the most significant bit of the 6 least significant bits of the second candidate logical channel.
As an embodiment, the second candidate logical channel identity is used to determine a second logical channel identity, which is used to determine the first logical channel identity.
As a sub-embodiment of this embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel identity, and the values of the other bits than the 5 least significant bits of the first logical channel identity are 0/1 inverse of the value of the corresponding bits other than the 5 least significant bits of the second logical channel identity.
As a sub-embodiment of this embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel identity, and the values of the other bits than the 5 least significant bits of the first logical channel identity are exclusive or of the value of the corresponding bit other than the 5 least significant bits of the second logical channel identity with 1.
As a sub-embodiment of this embodiment, the value of the 5 least significant bits of the first logical channel identity is set to the value of the 5 least significant bits of the second logical channel identity, and the value of the most significant bit of the 6 least significant bits of the first logical channel identity is an exclusive or of the value of the most significant bit of the 6 least significant bits of the second logical channel identity with 1.
As an embodiment, the first logical channel identity is used to determine the second logical channel identity.
As one embodiment, the first logical channel identity is different from the second logical channel identity, and the 5 least significant bits of the first logical channel identity and the second logical channel identity are the same.
As one embodiment, the first signaling indicates a first candidate logical channel identity, which is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
As an embodiment, the first candidate logical channel identity occurs in pairs with the second candidate logical channel identity.
As one embodiment, the first candidate logical channel identity is at least one bit different from the second candidate logical channel identity, and the first candidate logical channel identity is the same as the 5 least significant bits of the second candidate logical channel identity.
As an embodiment, the first signaling explicitly indicates one of the first candidate logical channel identity and the second candidate logical channel identity, and implicitly derives the other.
As one embodiment, the second subsequent candidate logical channel identity is determined to be the first logical channel identity when the first candidate logical channel identity is determined to be the second logical channel identity.
As one embodiment, the second subsequent candidate logical channel identity is determined to be the second logical channel identity when the first candidate logical channel identity is determined to be the first logical channel identity.
As an embodiment, the first node U01 receives the second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
As an embodiment, the second signaling comprises higher layer signaling.
As an embodiment, the second signaling comprises RRC (Radio Resource Control ) signaling.
As an embodiment, the second signaling comprises PC5-S signaling.
As an embodiment, the second signaling comprises application layer signaling.
As an embodiment, the second signaling comprises ProSe signaling.
As an embodiment, the second signaling is sent over the Uu interface.
As an embodiment, the second signaling is sent over a PC5 interface.
As an embodiment, the second signaling is transmitted over a SCCH (Sidelink Control Channel) channel.
As an embodiment, the second signaling is transmitted over a STCH (Sidelink Traffic Channel) channel.
As an embodiment, the second signaling is transmitted over a PSCCH (Physical sidelink control channel) channel.
As an embodiment, the second signaling is transmitted over a PSSCH (Physical sidelink shared channel) channel.
As an embodiment, the second signaling is transmitted over a PSBCH (Physical sidelink broadcast channel) channel.
As an embodiment, the second signaling is transmitted over a SL-SCH channel.
As an embodiment, the second signaling is transmitted over a sidelink.
As an embodiment, the second signaling is used to configure the DRB.
As an embodiment, the second signaling is used to configure RBs.
As an embodiment, the second signaling includes rrcrecon configuration sip link.
As an embodiment, the second signaling includes a field (field) in rrcrecon configuration sidelink.
As an embodiment, the second signaling comprises rrcrecon configuration.
As one embodiment, the second signaling includes SIB12.
As an embodiment, the second signaling comprises SL-LogicalChannelConfigPC5.
As an embodiment, the second signaling comprises SL-LogicalChannelConfig.
As an embodiment, the second signaling comprises SL-LogicalChannelConfig-r16.
As an embodiment, the second signaling comprises SL-LogicalChannelConfig-r17.
As an embodiment, the second signaling comprises a partial domain in SL-LogicalChannelConfig.
As an embodiment, the second signaling comprises sl-RLC-Config.
As an embodiment, the second signaling comprises sl-RLC-Config-r16.
As an embodiment, the second signaling comprises sl-RLC-Config-r17.
As an embodiment, the second signaling comprises a partial field in sl-RLC-Config.
As an embodiment, the second signaling comprises sl-LogicalChannelGroup.
As an embodiment, the second signaling includes RRCConnectionReconfigurationSidelink.
As an embodiment, the second signaling includes RRCConnectionReconfiguration.
As an embodiment, the second signaling includes DIRECT LINK ESTABLISHMENT REQUEST.
As an embodiment, the second signaling includes DIRECT LINK ESTABLISHMENT ACCEPT.
As an embodiment, the second signaling includes DIRECT LINK MODIFICATION REQUEST.
As an embodiment, the second signaling includes DIRECT LINK MODIFICATION ACCEPT.
As an embodiment, the second signaling includes a DIRECT LINK KEEPALIVE REQUEST.
As an embodiment, the second signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the second signaling comprises discover_request.
As an embodiment, the second signaling includes discover_response.
As an embodiment, the second signaling includes match_report.
As an embodiment, the second signaling includes match_report_ack.
As an embodiment, the second signaling comprises a PROXIMITY_REQUEST.
As an embodiment, the second signaling comprises a process_request_response.
As one embodiment, the second signaling includes PROXIMITY_ALERT.
As an embodiment, the second signaling comprises a process_request_valid.
As an embodiment, the second signaling comprises process_request_valid_response.
As an embodiment, the second signaling comprises discover_update_request.
As an embodiment, the second signaling includes discover_update_response.
As one embodiment, the second signaling includes an announcengcing ALERT REQUEST.
As an embodiment, the second signaling includes ANNOUNCING_ALERT_RESPONSE.
As an embodiment, the second signaling includes Direct Security Mode Command.
As an embodiment, the second signaling includes Direct Security Mode Complete.
As an embodiment, the second signaling explicitly indicates the second logical channel identity.
As an embodiment, the second signaling carries the second logical channel identity.
As one embodiment, the second signaling indicates that the second candidate logical channel identity is determined to be the second logical channel identity.
As one embodiment, the first signaling includes a first set of candidate logical channel identities, and the second signaling indicates which candidate logical channel identity of the first set of candidate logical channel identities is determined to be the second logical channel identity.
As an embodiment, the first logical channel identity and the second logical channel identity are both associated with the first identity.
As an embodiment, the first identity comprises an RB identity.
As an embodiment, the first identity comprises a DRB identity.
As an embodiment, the first identity comprises a link identity.
As an embodiment, the first identity comprises a sidelink identity.
As an embodiment, the first identity comprises a session identity.
As an embodiment, the first identity comprises an identity of the first node U01.
As an embodiment, the first identity comprises an RNTI (Radio Network Tempory Identity, radio network temporary identity) of the first node U01.
As an embodiment, the first identity is a link layer identity.
As an embodiment, the first identity is a layer 2 identity.
As an embodiment, the first identity comprises an IP address of the first node U01.
As an embodiment, the first identity comprises an IP address of the third node U01.
As an embodiment, the first identity comprises an RNTI of the first node U01.
As an embodiment, the first identity includes a Layer 2ID of the first node U01.
As an embodiment, the first identity comprises an L2 ID of the first node U01.
As an embodiment, the first identity comprises a Layer 2ID of the third node U03.
As an embodiment, the first identity comprises an L2 ID of the third node U03.
As an embodiment, the first identity comprises slrb-PC5-ConfigIndex.
As an embodiment, the first identity comprises a partial domain indicated by SLRB-Config.
As an embodiment, the first logical channel identity and the first identity occur in the same message.
As an embodiment, the second logical channel identity is present in the same message as the first identity.
As an embodiment, the first logical channel identity is for the first identity.
As an embodiment, the second logical channel identity is for the first identity.
As an embodiment, the first identity is used to identify a link between the third node U03 to the first node U01 as determined by the first logical channel identity and the second logical channel identity.
As an embodiment, the second signaling indicates all bits of the first identity.
As an embodiment, the second signaling indicates 8 bits of the first identity.
As an embodiment, the second signaling indicates 16 bits of the first identity.
As an embodiment, the second signaling indicates 12 bits of the first identity.
As an embodiment, the first node U01 sends a third signaling;
wherein the third signaling is sent in response to the second signaling not contradicting the current configuration; the third signaling indicates that configuration of the second signaling is completed; the first signaling includes a first set of candidate logical channel identities; the first set of candidate logical channel identities includes at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling contradicts a current configuration.
As one embodiment, the second signaling is determined not to contradict the current configuration when the second logical channel identity included in the second signaling is the same as the second candidate logical channel identity.
As one embodiment, the second signaling is determined not to contradict the current configuration when the second logical channel identity included in the second signaling is the same as the 5 least significant bits of the second candidate logical channel identity.
As one embodiment, the second signaling is determined not to contradict the current configuration when the second logical channel identity comprised by the second signaling belongs to the first set of candidate logical channel identities.
As an embodiment, the second signaling includes the first logical channel identity, and the second signaling is determined not to contradict the current configuration when both the first logical channel identity and the second logical channel identity included in the second signaling belong to the first candidate logical channel identity set.
As an embodiment, the second candidate logical channel identity belongs to the first candidate logical channel identity set, and the second signaling is determined not to contradict the current configuration when the second logical channel identity included in the second signaling is the same as the second candidate logical channel identity.
As an embodiment, the second signaling includes the first logical channel identity.
As one embodiment, the first set of candidate logical channel identities includes the first candidate logical channel identity and the second candidate logical channel identity, and the second signaling is determined not to contradict the current configuration when the second logical channel identity is the same as the second candidate logical channel identity and the first logical channel identity is the same as the first candidate logical channel identity.
As one embodiment, the first set of candidate logical channel identities includes the first candidate logical channel identity and the second candidate logical channel identity, and the second signaling is determined not to contradict the current configuration when the second logical channel identity is the same as the first candidate logical channel identity and the first logical channel identity is the same as the second candidate logical channel identity.
As an embodiment, the third signaling comprises higher layer signaling.
As an embodiment, the third signaling includes RRC (Radio Resource Control ) signaling.
As an embodiment, the third signaling comprises PC5-S signaling.
As an embodiment, the third signaling comprises application layer signaling.
As an embodiment, the third signaling comprises ProSe signaling.
As an embodiment, the third signaling is sent over the Uu interface.
As an embodiment, the third signaling is sent over the PC5 interface.
As an embodiment, the third signaling is transmitted over a SCCH (Sidelink Control Channel) channel.
As an embodiment, the third signaling is transmitted over a STCH (Sidelink Traffic Channel) channel.
As an embodiment, the third signaling is transmitted over a PSCCH (Physical sidelink control channel) channel.
As an embodiment, the third signaling is transmitted over a PSSCH (Physical sidelink shared channel) channel.
As an embodiment, the third signaling is transmitted over a PSBCH (Physical sidelink broadcast channel) channel.
As an embodiment, the third signaling is transmitted over a SL-SCH channel.
As an embodiment, the third signaling is transmitted over a sidelink.
As an embodiment, the third signaling is used to configure the DRB.
As an embodiment, the third signaling is used to configure RBs.
As an embodiment, the third signaling includes rrcrecon configuration sip link.
As an embodiment, the third signaling includes a field (field) in rrcrecon configuration sidelink.
As an embodiment, the third signaling comprises rrcrecon configuration.
As an embodiment, the third signaling comprises SIB12.
As an embodiment, the third signaling comprises SL-LogicalChannelConfigPC5.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig-r16.
As an embodiment, the third signaling comprises SL-LogicalChannelConfig-r17.
As an embodiment, the third signaling comprises a partial domain in SL-LogicalChannelConfig.
As an embodiment, the third signaling comprises sl-RLC-Config.
As an embodiment, the third signaling comprises sl-RLC-Config-r16.
As an embodiment, the third signaling comprises sl-RLC-Config-r17.
As an embodiment, the third signaling comprises a partial field in sl-RLC-Config.
As an embodiment, the third signaling comprises sl-LogicalChannelGroup.
As an embodiment, the third signaling includes RRCConnectionReconfigurationSidelink.
As an embodiment, the third signaling includes RRCConnectionReconfiguration.
As an embodiment, the third signaling includes DIRECT LINK ESTABLISHMENT REQUEST.
As an embodiment, the third signaling includes DIRECT LINK ESTABLISHMENT ACCEPT.
As an embodiment, the third signaling includes DIRECT LINK MODIFICATION REQUEST.
As an embodiment, the third signaling includes DIRECT LINK MODIFICATION ACCEPT.
As an embodiment, the third signaling includes a DIRECT LINK KEEPALIVE REQUEST.
As an embodiment, the third signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the third signaling comprises discover_request.
As an embodiment, the third signaling includes discover_response.
As an embodiment, the third signaling includes match_report.
As an embodiment, the third signaling includes match_report_ack.
As an embodiment, the third signaling comprises a PROXIMITY_REQUEST.
As an embodiment, the third signaling comprises a process_request_response.
As an embodiment, the third signaling includes PROXIMITY_ALERT.
As an embodiment, the third signaling includes a process_request_valid.
As an embodiment, the third signaling comprises process_request_valid_response.
As an embodiment, the third signaling comprises discover_update_request.
As an embodiment, the third signaling includes discover_update_response.
As one embodiment, the third signaling includes an announcengcing ALERT REQUEST.
As an embodiment, the third signaling includes ANNOUNCING_ALERT_RESPONSE.
As an embodiment, the third signaling includes Direct Security Mode Command.
As an embodiment, the third signaling includes Direct Security Mode Complete.
As an embodiment, the third signaling explicitly indicates the second logical channel identity.
As an embodiment, the third signaling carries the second logical channel identity.
As an embodiment, the third signaling indicates that the receiver of the second signaling is configured according to the configuration indicated by the second signaling.
As an embodiment, the target signaling is higher layer signaling.
As an embodiment, the target signaling comprises RRC signaling.
As an embodiment, the target signaling comprises PC5-S signaling.
As an embodiment, the first feedback signaling is higher layer signaling.
As an embodiment, the first feedback signaling comprises RRC signaling.
As an embodiment, the first feedback signaling comprises PC5-S signaling.
As an embodiment, the target signaling is considered not to contradict the current configuration when the 5 least significant bits of the second logical channel identity of the first logical channel identity field are the same.
As an embodiment, the target signaling is considered not to contradict the current configuration when the second logical channel identity is unoccupied.
As an embodiment, the target signaling is considered not to contradict the current configuration when the second logical channel identity is available.
As an embodiment, the first feedback signaling indicates that the receiver of the target signaling is configured according to the configuration indicated by the target signaling.
As an embodiment, the target signaling comprises higher layer signaling.
As an embodiment, the target signaling includes RRC (Radio Resource Control ) signaling.
As an embodiment, the target signaling comprises PC5-S signaling.
As an embodiment, the target signaling comprises application layer signaling.
As an embodiment, the target signaling comprises ProSe signaling.
As an embodiment, the target signaling is sent over the Uu interface.
As an embodiment, the target signaling is sent over a PC5 interface.
As an embodiment, the target signaling is transmitted over a SCCH (Sidelink Control Channel) channel.
As an embodiment, the target signaling is transmitted over a STCH (Sidelink Traffic Channel) channel.
As an embodiment, the target signaling is transmitted over a PSCCH (Physical sidelink control channel) channel.
As an embodiment, the target signaling is transmitted over a PSSCH (Physical sidelink shared channel) channel.
As an embodiment, the target signaling is transmitted over a PSBCH (Physical sidelink broadcast channel) channel.
As one embodiment, the target signaling is transmitted over a SL-SCH channel.
As an embodiment, the target signaling is transmitted over a sidelink.
As an embodiment, the target signaling is used to configure DRBs.
As one embodiment, the target signaling is used to configure RBs.
As an embodiment, the target signaling includes rrcrecon configuration sip.
As an embodiment, the target signaling includes a partial field (field) in rrcrecon configuration sidelink.
As an embodiment, the target signaling includes rrcrecon configuration.
As one embodiment, the target signaling includes SIB12.
As an embodiment, the target signaling comprises SL-LogicalChannelConfigPC5.
As an embodiment, the target signaling comprises SL-LogicalChannelConfig.
As an embodiment, the target signaling comprises SL-LogicalChannelConfig-r16.
As an embodiment, the target signaling comprises SL-LogicalChannelConfig-r17.
As an embodiment, the target signaling comprises a partial domain in SL-LogicalChannelConfig.
As an embodiment, the target signaling comprises sl-RLC-Config.
As an embodiment, the target signaling comprises sl-RLC-Config-r16.
As an embodiment, the target signaling comprises sl-RLC-Config-r17.
As an embodiment, the target signaling comprises a partial field in sl-RLC-Config.
As an embodiment, the target signaling comprises sl-LogicalChannelGroup.
As an embodiment, the target signaling includes RRCConnectionReconfigurationSidelink.
As an embodiment, the target signaling includes RRCConnectionReconfiguration.
As an embodiment, the target signaling includes DIRECT LINK ESTABLISHMENT REQUEST.
As an embodiment, the target signaling includes DIRECT LINK ESTABLISHMENT ACCEPT.
As an embodiment, the target signaling includes DIRECT LINK MODIFICATION REQUEST.
As an embodiment, the target signaling includes DIRECT LINK MODIFICATION ACCEPT.
As an embodiment, the target signaling includes DIRECT LINK KEEPALIVE REQUEST.
As an embodiment, the target signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the target signaling comprises discover_request.
As an embodiment, the target signaling includes discover_response.
As an embodiment, the target signaling includes match_report.
As an embodiment, the target signaling includes a match_report_ack.
As an embodiment, the target signaling comprises a PROXIMITY_REQUEST.
As an embodiment, the target signaling includes a PROXIMITY_REQUEST_RESPONSE.
As an embodiment, the target signaling includes precision_alert.
As an embodiment, the target signaling includes a process_request_valid.
As an embodiment, the target signaling comprises process_request_valid_response.
As an embodiment, the target signaling comprises discover_update_request.
As an embodiment, the target signaling includes discover_update_response.
As one embodiment, the target signaling includes an announcengcing_alert_request.
As an embodiment, the target signaling includes ANNOUNCING_ALERT_RESPONSE.
As an embodiment, the target signaling includes Direct Security Mode Command.
As an embodiment, the target signaling includes Direct Security Mode Complete.
As an embodiment, the target signaling explicitly indicates the second logical channel identity.
As an embodiment, the target signaling carries the second logical channel identity.
As an embodiment, the first feedback signaling comprises higher layer signaling.
As an embodiment, the first feedback signaling includes RRC (Radio Resource Control ) signaling.
As an embodiment, the first feedback signaling comprises PC5-S signaling.
As an embodiment, the first feedback signaling comprises application layer signaling.
As an embodiment, the first feedback signaling comprises ProSe signaling.
As an embodiment, the first feedback signaling is sent over the Uu interface.
As an embodiment, the first feedback signaling is sent over a PC5 interface.
As an embodiment, the first feedback signaling is transmitted through a SCCH (Sidelink Control Channel) channel.
As an embodiment, the first feedback signaling is transmitted through a STCH (Sidelink Traffic Channel) channel.
As an embodiment, the first feedback signaling is transmitted through a PSCCH (Physical sidelink control channel) channel.
As an embodiment, the first feedback signaling is transmitted through a PSSCH (Physical sidelink shared channel) channel.
As an embodiment, the first feedback signaling is transmitted through a PSBCH (Physical sidelink broadcast channel) channel.
As an embodiment, the first feedback signaling is transmitted over a SL-SCH channel.
As an embodiment, the first feedback signaling is transmitted over a sidelink.
As an embodiment, the first feedback signaling is used to configure a DRB.
As an embodiment, the first feedback signaling is used to configure RBs.
As an embodiment, the first feedback signaling includes rrcrecon configuration sip link.
As an embodiment, the first feedback signaling includes a partial field (field) in rrcrecon configuration sidelink.
As an embodiment, the first feedback signaling includes rrcrecon configuration.
As an embodiment, the first feedback signaling comprises SIB12.
As an embodiment, the first feedback signaling comprises SL-LogicalChannelConfigPC5.
As an embodiment, the first feedback signaling comprises SL-LogicalChannelConfig.
As an embodiment, the first feedback signaling comprises SL-LogicalChannelConfig-r16.
As an embodiment, the first feedback signaling comprises SL-LogicalChannelConfig-r17.
As an embodiment, the first feedback signaling comprises a partial field in SL-LogicalChannelConfig.
As an embodiment, the first feedback signaling includes sl-RLC-Config.
As an embodiment, the first feedback signaling includes sl-RLC-Config-r16.
As an embodiment, the first feedback signaling includes sl-RLC-Config-r17.
As an embodiment, the first feedback signaling includes a partial field in sl-RLC-Config.
As an embodiment, the first feedback signaling includes sl-LogicalChannelGroup.
As an embodiment, the first feedback signaling includes RRCConnectionReconfigurationSidelink.
As an embodiment, the first feedback signaling includes RRCConnectionReconfiguration.
As an embodiment, the first feedback signaling includes DIRECT LINK ESTABLISHMENT REQUEST.
As an embodiment, the first feedback signaling includes DIRECT LINK ESTABLISHMENT ACCEPT.
As an embodiment, the first feedback signaling includes DIRECT LINK MODIFICATION REQUEST.
As an embodiment, the first feedback signaling includes DIRECT LINK MODIFICATION ACCEPT.
As an embodiment, the first feedback signaling includes a DIRECT LINK KEEPALIVE REQUEST.
As an embodiment, the first feedback signaling includes DIRECT LINK KEEPALIVE RESPONSE.
As an embodiment, the first feedback signaling comprises discover_request.
As an embodiment, the first feedback signaling includes discover_response.
As an embodiment, the first feedback signaling includes match_report.
As an embodiment, the first feedback signaling includes match_report_ack.
As an embodiment, the first feedback signaling comprises a PROXIMITY_REQUEST.
As an embodiment, the first feedback signaling comprises a process_request_response.
As an embodiment, the first feedback signaling includes PROXIMITY_ALERT.
As an embodiment, the first feedback signaling comprises a process_request_valid.
As an embodiment, the first feedback signaling comprises process_request_valid_response.
As an embodiment, the first feedback signaling comprises discover_update_request.
As an embodiment, the first feedback signaling includes discover_update_response.
As an embodiment, the first feedback signaling includes an announcengcing_alert_request.
As an embodiment, the first feedback signaling includes ANNOUNCING_ALERT_RESPONSE.
As an embodiment, the first feedback signaling includes Direct Security Mode Command.
As an embodiment, the first feedback signaling includes Direct Security Mode Complete.
As an embodiment, the first feedback signaling explicitly indicates the second logical channel identity.
As an embodiment, the first feedback signaling carries the second logical channel identity.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the second MAC PDU includes at least a portion of the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the first data packet included in the second MAC PDU is from the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the source identity included in the second MAC PDU is derived from the destination identity included in the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: the second MAC PDU is used for forwarding bits included in the first MAC PDU.
As an embodiment, the sentence "the second MAC PDU is generated from the first MAC PDU" includes the following meanings: at least a part of the MAC SDUs carried by the second MAC PDU comes from the MAC SDUs carried by the first MAC PDU.
Example 6
Embodiment 6 illustrates a wireless signal transmission flow diagram according to one embodiment of the present application, as shown in fig. 6. In fig. 6, U11 corresponds to a first node of the present application, U12 corresponds to a second node of the present application, and U13 corresponds to a third node of the present application, and it is specifically illustrated that the order in this example is not limited to the order of signal transmission and the order of implementation in the present application, where steps within F61 and F62 are optional.
For the followingFirst node U11Transmitting a first signaling in step S6101; receiving a second signaling in step S6102; transmitting a third signaling in step S6103; a second MAC PDU is received in step S6104.
For the followingSecond node U12Receiving a first signaling in step S6201; transmitting a second signaling in step S6202; receiving a third signaling in step S6203; receiving target signaling in step S6204; transmitting a first feedback signaling in step S6205; receiving a first MAC PDU in step S6206; the second MAC PDU is transmitted in step S6207.
For the followingThird node U13Receiving the first signaling in step S6301; transmitting the target signaling in step S6302; receiving the first feedback signaling in step S6303; the first MAC PDU is transmitted in S6304.
In embodiment 6, the first signaling indicates a second candidate logical channel identity; the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
Example 6 is based on example 5, and reference is made to example 5 for parts of example 6 which are not described in detail.
As an embodiment, the second node U12 is a relay node for the third node U13 to communicate to the first node U11.
As an embodiment, the receiver of the first signaling is the second node U12.
As an embodiment, the receiver of the first signaling comprises the second node U12 and the third node U13.
As an embodiment, the first signaling is sent by unicast.
As an embodiment, the first signaling is sent by a non-unicast manner.
As an embodiment, the first signaling is sent by broadcasting.
As an embodiment, the first signaling is sent by multicast.
As an embodiment, the first signaling includes a second candidate logical channel identity, where the second candidate logical channel identity is a logical channel identity that is available in all wireless links occupied by and carrying the first data packet, and the MAC PDU carrying the first data packet carries the first node U11 identity.
As an embodiment, the first signaling includes a first candidate set of logical channel identities, where the logical channel identities in the first candidate set of logical channel identities are logical channel identities that are available in all wireless links occupied by the first data packet and carrying the first data packet, and the MAC PDU carrying the first data packet carries the identity of the first node U11.
As an embodiment, the first signaling includes a first set of candidate logical channel identities, a candidate logical channel identity in the first set of candidate logical channel identities being an available logical channel identity.
As an embodiment, the first signaling includes a first set of candidate logical channel identities, and at least two candidate logical channel identities exist in the first set of logical channel identities, and the 5 least significant bits of the candidate logical channel identities are the same.
As an embodiment, the target signaling is considered not to contradict the current configuration when the second logical channel identity indicated by the target signaling is an available logical channel identity.
As an embodiment, the target signaling is considered not to contradict the current configuration when the second logical channel identity indicated by the target signaling is the same as the second candidate logical channel identity.
As an embodiment, the target signaling is considered not to contradict the current configuration when the second logical channel identity indicated by the target signaling belongs to the first set of candidate logical channel identities.
As an embodiment, the target signaling is considered not to contradict the current configuration when the second logical channel identity indicated by the target signaling is identical to the 5 least significant bits of the second candidate logical channel identity.
As an embodiment, the target signaling only carries a logical channel identity other than the second logical channel identity.
As an embodiment, the first signaling is PC5-S signaling, and the target signaling and the second signaling are RRC signaling.
As an embodiment, the second node U12 generates the fourth signaling according to the first signaling, and the target identity of the fourth signaling determines the third node U13; the fourth signaling indicates the second candidate logical channel identity.
As an embodiment, the second node U12 generates the fourth signaling according to the first signaling, and the target identity of the fourth signaling is used to determine the third node U13; the fourth signaling indicates the second candidate logical channel identity.
As one embodiment, the fourth signaling indicates the first set of candidate logical channel identities.
As an embodiment, the first MAC PDU carries at least part of a first identity, which is used to determine the first node U11.
As an embodiment, the first MAC PDU carries only at least part of a second identity, which is used to determine the second node U12, and at least part of a third identity, which is used to determine the third node U13.
As an embodiment, the first MAC PDU carries at least a part of a first identity and at least a part of a second identity, the second identity being used for determining the second node U12, the first identity being used for determining the third node U11.
As an embodiment, the first MAC PDU carries at least a part of a second identity, which is used to determine the second node U12, and at least a part of a third identity, which is used to determine the third node U13.
As an embodiment, the second node U12 forwards the target signaling to the first node U11, the target signaling indicating that the second logical channel identity is used for the security algorithm of the first data packet within the second MAC PDU.
As an embodiment, the second node U12 indicates to the third node that the second logical channel identity is used for communication between the second node U12 to the first node U11.
As an embodiment, the second node U12 indicates to the third node that the second logical channel identity is used for a security algorithm of data between the third node U13 to the first node U11.
As an embodiment, the above method has the advantage that the link between the third node U13 and the second node U12 can be relatively independent from the link configuration between the second node U12 and the second node U11, and still ensure that the first node U11 correctly detects the data originating from the third node U13 by means of a security algorithm.
Example 7
Embodiment 7 illustrates a wireless signal transmission flow diagram according to one embodiment of the present application, as shown in fig. 7. In fig. 7, U22 corresponds to the second node of the present application, and U23 corresponds to the third node of the present application, which specifically illustrates that the order in this example is not limited to the order of signal transmission and implementation in the present application, where the steps within F71 are optional.
For the followingSecond node U22Receiving a target MAC PDU in step S7201; judging whether the target MAC PDU subheader comprises a first logic channel identity in step S7202; transmitting a second MAC PDU in step S7203; the transmission of the second MAC PDU is abandoned in step S7204.
For the followingThird node U23The target MAC PDU is transmitted in step S7301.
The target MAC PDU comprises a target MAC sub-PDU, the target MAC sub-PDU comprises a target MAC sub-header and a target data packet, and when the target MAC sub-header comprises a first logic channel identity, the second transmitter transmits a second MAC PDU; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
As an embodiment, the second node U22 generates the second MAC PDU from the target MAC PDU when the target MAC PDU carries the first logical channel identity and not the second logical channel identity.
As a sub-embodiment of this embodiment, the second MAC PDU comprises at least a portion of the target MAC PDU.
As a sub-embodiment of this embodiment, the second MAC PDU includes a destination packet from the destination packet carried by the destination MAC PDU.
As a sub-embodiment of this embodiment, the second MAC PDU includes the second logical channel identity, which is determined by the first logical channel identity.
As a sub-embodiment of this embodiment, the source identity carried by the destination MAC PDU is the identity of the third node U23.
As a sub-embodiment of this embodiment, the target identity carried by the target MAC PDU is an identity other than the third node U23.
As one embodiment, the target MAC PDU is the first MAC PDU when the target MAC PDU carries the first logical channel identity and not the second logical channel identity.
As an embodiment, the target identity carried by the target MAC PDU is the identity of the second node U22.
As an embodiment, the source identity carried by the destination MAC PDU is the identity of the third node U23.
As an embodiment, the second node U22 discards transmitting the second MAC PDU when the target MAC sub-header includes the second logical channel identity.
As a sub-embodiment of this embodiment, the target MAC sub-header does not include the first logical channel identity.
As a sub-embodiment of this embodiment, the target MAC sub-header includes the second logical channel identity.
As a sub-embodiment of this embodiment, the sentence that the "second node U22 gives up sending the second MAC PDU" includes the following meanings: the second point U22 forwards the target MAC PDU to its own higher layer processing.
As a sub-embodiment of this embodiment, the sentence that the "second node U22 gives up sending the second MAC PDU" includes the following meanings: the second point U22 forwards the target MAC PDU to its own PDCP layer for processing.
As a sub-embodiment of this embodiment, the sentence that the "second node U22 gives up sending the second MAC PDU" includes the following meanings: the second point U22 attempts to decrypt the target MAC PDU.
As a sub-embodiment of this embodiment, the sentence that the "second node U22 gives up sending the second MAC PDU" includes the following meanings: the target MAC PDU is processed by the application layer of the second node U22.
As a sub-embodiment of this embodiment, the sentence that the "second node U22 gives up sending the second MAC PDU" includes the following meanings: the second MAC PDU is generated from data other than the target MAC PDU.
As a sub-embodiment of this embodiment, the sentence that the "second node U22 gives up sending the second MAC PDU" includes the following meanings: the target data carried in the target MAC PDU is not forwarded by the second node U22.
As one embodiment, the target MAC PDU is discarded when the target MAC PDU includes only logical channel identities other than the first logical channel identity and the second logical channel identity.
Example 8
Embodiment 8 illustrates a schematic diagram of a MAC PDU according to one embodiment of the present invention, as shown in fig. 8.
In embodiment 8, one MAC PDU includes one MAC Header (Header) and at least one MAC sub-PDU (sub-PDU); the MAC header includes a source identity, a destination identity, and other bits.
As an embodiment, the MAC PDU is transmitted on a SL-SCH (SideLink Shared CHannel, secondary link shared channel).
As an embodiment, the number of bits comprised by the MAC header is fixed.
As an embodiment, the number of bits included in the MAC header is 32.
As one embodiment, the MAC header is a SL-SCH MAC subheader (subheader).
As an embodiment, the other bits include 5 fields, V, R, R, R, R, and the number of bits included is 4, 1, respectively.
As an embodiment, the source identity and the destination identity comprise 16 bits and 8 bits, respectively.
As an embodiment, the source identity in the MAC header and the destination identity in the MAC header are an SRC domain and a DST domain, respectively.
As an embodiment, each MAC sub-PDU includes one MAC sub-header and one MAC SDU, and the MAC sub-header in each MAC sub-PDU includes an LCID field (Logical Channel IDentifier, logical channel identity) indicating a channel identity of a logical channel corresponding to the respective MAC SDU.
As an embodiment, the LCID field comprises 5 bits.
As an embodiment, the LCID field comprises 6 bits.
As an embodiment, the MAC PDU in fig. 8 is the first MAC PDU in the present application.
As a sub-embodiment of the above embodiment, the first MAC PDU includes at least a first MAC sub-PDU.
As an embodiment, the MAC PDU in fig. 8 is the second MAC PDU in the present application.
As a sub-embodiment of the above embodiment, the second MAC PDU includes at least a second MAC sub-PDU.
As an embodiment, the MAC PDU in fig. 8 is the target MAC PDU in the present application.
As a sub-embodiment of the above embodiment, the destination MAC PDU includes at least a destination MAC sub-PDU.
As an embodiment, the MAC PDU in fig. 8 is the third MAC PDU in embodiment 9 of the present application.
As a sub-embodiment of the above embodiment, the third MAC PDU includes at least a third MAC sub-PDU.
As an embodiment, the MAC PDU in fig. 8 is the fourth MAC PDU in embodiment 9 of the present application.
As a sub-embodiment of the above embodiment, the fourth MAC PDU includes at least a fourth MAC sub-PDU.
Example 9
Embodiment 9 illustrates a schematic diagram of node a in communication with node C according to one embodiment of the invention, as shown in fig. 9.
In embodiment 9, node a corresponds to a third node of the present application; the node C corresponds to a first node of the application; the node B corresponds to a second node of the application; node D corresponds to the second node of the present application.
As an embodiment, the interface between the node a and the node B is a PC5 interface.
As an embodiment, the interface between the node a and the node D is a PC5 interface.
As an embodiment, the interface between the node B and the node C is a PC5 interface.
As an embodiment, the interface between the node D and the node C is a PC5 interface.
As an embodiment, the node B and the node D are relay nodes for node a to node C communication.
As an embodiment, the node a sends a first MAC PDU to the node D; the first MAC PDU comprises a first MAC sub-PDU, and the first MAC sub-PDU comprises a first MAC sub-header and a first data packet; the node D sending a second MAC PDU to the node C, the first MAC PDU being used to generate the second MAC PDU; the second MAC PDU includes a second MAC sub-PDU including a second MAC sub-header and a first data packet.
As an embodiment, the first data packet included in the second MAC PDU is from the first MAC PDU.
As an embodiment, the first data packet included in the second MAC PDU is directly copied to the first data packet carried in the first MAC PDU.
As an embodiment, the first data packet included in the second MAC PDU is from the first data packet carried in the first MAC PDU, and the first data packet included in the second MAC PDU is not decrypted by the node D.
As an embodiment, the source identity included in the second MAC PDU is the same as the destination identity included in the first MAC PDU.
As an embodiment, the second MAC PDU is used to forward data carried by the first MAC PDU.
As an embodiment, the node a sends a third MAC PDU to the node B; the third MAC PDU comprises a third MAC sub-PDU, and the third MAC sub-PDU comprises a third MAC sub-header and a first data packet; the node B transmitting a fourth MAC PDU to the node C, the third MAC PDU being used to generate the fourth MAC PDU; the fourth MAC PDU includes a fourth MAC sub-PDU including a fourth MAC sub-header and a first data packet.
As an embodiment, the first data packet included in the fourth MAC PDU is from the third MAC PDU.
As an embodiment, the first data packet included in the fourth MAC PDU is directly copied to the first data packet carried in the third MAC PDU.
As an embodiment, the first data packet included in the fourth MAC PDU is from the first data packet carried in the third MAC PDU, and the first data packet included in the fourth MAC PDU is not decrypted by the node B.
As an embodiment, the source identity included in the fourth MAC PDU is the same as the destination identity included in the third MAC PDU.
As an embodiment, the fourth MAC PDU is used to forward the data carried by the third MAC PDU.
As an embodiment, the node C sends a first signaling indicating the second candidate logical channel identity.
As one embodiment, the first set is a set of unoccupied logical channel identities of the node D to the node C; the second set is a set of unoccupied logical channel identities of the node B to the node C; an intersection of the first set and the second set includes the second candidate logical channel identity.
As one embodiment, the first signaling includes a first set of candidate logical channel identities; the first candidate logic channel identity set comprises at least one candidate logic channel identity, and the second candidate logic channel identity belongs to the first candidate logic channel identity set; an intersection of the first set and the second set includes the first set of candidate logical channel identities.
As an embodiment, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identities comprised by the first set are unoccupied.
As an embodiment, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identities comprised by the first set are not occupied by any communication with said node C as destination node.
As an embodiment, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identities comprised by the first set are not occupied by any MAC PDU destined for said node C.
As an embodiment, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the 5 least significant bits of the logical channel identity included in the first set are different from the 5 least significant bits of the logical channel identity included in any MAC PDU having said node C as the destination node.
As an embodiment, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identities comprised by the first set are not occupied by any communication with the identity of the node C as the destination identity.
As an embodiment, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the logical channel identities comprised by the first set are not occupied by any MAC PDU with the identity of said node C as the destination identity.
As an embodiment, the sentence "the first set is a set of unoccupied logical channel identities of the node D to the node C" includes the following meanings: the 5 least significant bits of the logical channel identity comprised by the first set are different from the 5 least significant bits of the logical channel identity comprised by any MAC PDU whose destination identity is the identity of said node C.
As an embodiment, the first set of candidate logical channel identities comprises a first candidate logical channel identity, which is different from the 5 least significant bits of the second candidate logical channel identity.
As an embodiment, the node C receives a second signaling indicating the second logical channel identity.
As an embodiment, the second MAC PDU and the fourth MAC PDU carry the same logical channel identity.
As an embodiment, the logical channel identities included in the second MAC PDU and the fourth MAC PDU are configured to be the same.
As a sub-embodiment of this embodiment, the node a configures logical channel identities included in the second MAC PDU and the fourth MAC PDU.
As a sub-embodiment of this embodiment, the node B configures a logical channel identity included in the fourth MAC PDU; the node D configures a logical channel identity included in the second MAC PDU.
As an embodiment, the receiver of the first signaling is the node a.
As an embodiment, the receivers of the first signaling are the node B and the node D.
As an embodiment, the receivers of the first signaling are the node B and the node D and the node a.
As an embodiment, the second logical channel identity is used to determine the logical channel identities that the second MAC PDU and the fourth MAC PDU should include.
As an embodiment, the first set of candidate logical channel identities is used to determine logical channel identities that the second MAC PDU and the fourth MAC PDU should include.
Example 10
Embodiment 10 illustrates a schematic diagram in which a second candidate logical channel identity is used to determine a second logical channel identity, as shown in fig. 10, according to one embodiment of the present application.
As one embodiment, the second candidate logical channel identity is determined as the second logical channel identity.
As an embodiment, the value of the 5 least significant bits of the second candidate logical channel identity is determined as the value of the 5 least significant bits of the second logical channel identity.
As one embodiment, the second candidate logical channel identity is determined as the first logical channel identity, which is used to determine the second logical channel identity.
As a sub-embodiment of this embodiment, the value of the 5 least significant bits of the first logical channel identity is determined as the value of the 5 least significant bits of the second logical channel identity.
As a sub-embodiment of this embodiment, the values of bits other than the 5 least significant bits of the first logical channel identity are inverted and determined as the values of the corresponding bits in the second logical channel identity; the first logical channel identity has the same number of bits as the second logical channel identity.
As a sub-embodiment of this embodiment, the value of the most significant bit of the 6 least significant bits of the first logical channel identity is exclusive-ored with 1 and the resulting value is determined as the value of the most significant bit of the 6 least significant bits of the second logical channel identity.
As a sub-embodiment of this embodiment, the value obtained by the bit random setting other than the 5 least significant bits of the first logical channel identity is determined as the value of the corresponding bit in the second logical channel identity by 0/1 inversion; the first logical channel identity has the same number of bits as the second logical channel identity.
As an embodiment, the first logical channel identity and the second logical channel identity both have K1 bits, and the value of the 5 least significant bits in the K1 bits is equal to the value of the 5 least significant bits in the second candidate logical channel identity; at least an L-th bit exists from a 1 st bit to a K1 st-5 th bit of the first logical channel identity, wherein 1< = L < = K1-5, and the L-th bit of the first logical channel identity is different from the L-th bit of the second logical channel identity.
As a sub-embodiment of this embodiment, the exclusive or of the L-th bit of the first logical channel identity and the L-th bit of the second logical channel identity is 1.
As a sub-embodiment of this embodiment, bits 1 to K1-5 of the first logical channel identity are randomly generated; randomly generating bits except the L-th bit of the second logic channel identity; and the L-th bit of the second logical channel is obtained by exclusive or of the value of the L-th bit of the first logical channel identity and 1.
Example 11
Embodiment 11 illustrates a block diagram of a processing apparatus for use in a first node according to one embodiment of the present application; as shown in fig. 11. In fig. 11, the processing means 1100 in the first node comprises a first receiver 1101 and a first transmitter 1102. In the case of the embodiment of the present invention in which the sample is a solid,
a first transmitter 1102 that transmits first signaling indicating a second candidate logical channel identity;
a first receiver 1101 that receives the second MAC PDU;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet.
As an embodiment, the second candidate logical channel identity is identical to at least 5 least significant bits of the second logical channel identity.
As an embodiment, the second candidate logical channel identity is used to determine the first logical channel identity.
As one embodiment, the first signaling indicates a first candidate logical channel identity, which is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
As an embodiment, the first receiver 1101 receives second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
As an embodiment, the first transmitter 1102 sends third signaling;
wherein the third signaling is sent in response to the second signaling not contradicting the current configuration; the third signaling indicates that configuration of the second signaling is completed; the first signaling includes a first set of candidate logical channel identities; the first set of candidate logical channel identities includes at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling contradicts a current configuration.
As an embodiment, the first node is a User Equipment (UE).
As an embodiment, the first node is a terminal supporting a large delay difference.
As an embodiment, the first node is a terminal supporting NTN.
As an embodiment, the first node is an aircraft.
As an embodiment, the first node is an in-vehicle terminal.
As an embodiment, the first node is a relay.
As an embodiment, the first node is a ship.
As an embodiment, the first node is an internet of things terminal.
As an embodiment, the first node is a terminal of an industrial internet of things.
As an embodiment, the first node is a device supporting low latency and high reliability transmissions.
As an example, the first receiver 1101 includes at least one of the antenna 452, the receiver 454, the receive processor 456, the multi-antenna receive processor 458, the controller/processor 459, the memory 460, or the data source 467 in example 4.
As an example, the first transmitter 1102 may include at least one of the antenna 452, the transmitter 454, the transmit processor 468, the multi-antenna transmit processor 457, the controller/processor 459, the memory 460, or the data source 467 of example 4.
Example 12
Embodiment 12 illustrates a block diagram of a processing apparatus for use in a second node according to one embodiment of the present application; as shown in fig. 12. In fig. 12, the processing means 1200 in the first node comprises a second receiver 1202 and a second transmitter 1201. In the case of the embodiment of the present invention in which the sample is a sample,
a second receiver 1202 that receives a target MAC PDU;
wherein, the target MAC PDU includes a target MAC sub-PDU, the target MAC sub-PDU includes a target MAC sub-header and a target data packet, and when the target MAC sub-header includes a first logical channel identity, the second transmitter 1201 transmits a second MAC PDU; the target MAC PDU is used to generate the second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a target data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the target data packet.
As an embodiment, the second transmitter 1201 discards transmitting the second MAC PDU when the target MAC sub-header includes the second logical channel identity.
As an embodiment, the second receiver 1202 receives target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
As an embodiment, the second transmitter 1201 sends the first feedback signaling as a response that the target signaling does not contradict the current configuration.
Wherein the first feedback signaling indicates that configuration of the target signaling is completed.
As an embodiment, the second node is a User Equipment (UE).
As an embodiment, the second node is a terminal supporting a large delay difference.
As an embodiment, the second node is a terminal supporting NTN.
As an embodiment, the second node is an aircraft.
As an embodiment, the second node is an in-vehicle terminal.
As an embodiment, the second node is a relay.
As an embodiment, the second node is a ship.
As an embodiment, the second node is an internet of things terminal.
As an embodiment, the second node is a terminal of an industrial internet of things.
As an embodiment, the second node is a device supporting low latency and high reliability transmissions.
As an example, the second transmitter 1201 includes at least one of the antenna 420, the transmitter 418, the transmission processor 416, the multi-antenna transmission processor 471, the controller/processor 475, and the memory 476 in example 4.
As an example, the second receiver 1202 includes at least one of the antenna 420, the receiver 418, the receive processor 470, the multi-antenna receive processor 472, the controller/processor 475, and the memory 476 of example 4.
Example 13
Embodiment 13 illustrates a block diagram of a processing apparatus for use in a third node according to one embodiment of the present application; as shown in fig. 13. In fig. 13, the processing means 1300 in the first node comprises a third receiver 1302 and a third transmitter 1301. In the case of the embodiment of the present invention in which the sample is a solid,
a third receiver 1302 that receives first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
a third transmitter 1301 transmitting a first MAC PDU;
the first MAC PDU comprises a first MAC sub-PDU, wherein the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity.
As an embodiment, the third transmitter 1301 sends a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
As an embodiment, the third transmitter 1301 sends the target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
Wherein the first feedback signaling indicates that configuration of the target signaling is completed.
As an embodiment, the third node is a User Equipment (UE).
As an embodiment, the third node is a terminal supporting a large delay difference.
As an embodiment, the third node is a terminal supporting NTN.
As an embodiment, the third node is an aircraft.
As an embodiment, the third node is an in-vehicle terminal.
As an embodiment, the third node is a relay.
As an embodiment, the third node is a ship.
As an embodiment, the third node is an internet of things terminal.
As an embodiment, the third node is a terminal of an industrial internet of things.
As an embodiment, the third node is a device supporting low latency and high reliability transmissions.
As an example, the third transmitter 1301 includes at least one of the antenna 420, the transmitter 418, the transmission processor 416, the multi-antenna transmission processor 471, the controller/processor 475, and the memory 476 in example 4.
As an example, the third receiver 1302 includes at least one of the antenna 420, the receiver 418, the receive processor 470, the multi-antenna receive processor 472, the controller/processor 475, and the memory 476 of example 4.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described methods may be implemented by a program that instructs associated hardware, and the program may be stored on a computer readable storage medium, such as a read-only memory, a hard disk or an optical disk. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module unit in the above embodiment may be implemented in a hardware form or may be implemented in a software functional module form, and the application is not limited to any specific combination of software and hardware. User equipment, terminals, and UEs in the present application include, but are not limited to, unmanned aerial vehicles, communication modules on unmanned aerial vehicles, remote control airplanes, aircraft, mini-planes, cell phones, tablet computers, notebooks, vehicle-mounted communication devices, wireless sensors, network cards, internet of things terminals, RFID terminals, NB-IoT terminals, MTC (Machine Type Communication ) terminals, eMTC (enhanced MTC) terminals, data cards, network cards, vehicle-mounted communication devices, low cost cell phones, low cost tablet computers, satellite communication devices, ship communication devices, NTN user devices, and other wireless communication devices. The base station or system device in the present application includes, but is not limited to, a macro cell base station, a micro cell base station, a home base station, a relay base station, a gNB (NR node B) NR node B, a TRP (Transmitter Receiver Point, transmitting/receiving node), an NTN base station, a satellite device, a flight platform device, and other wireless communication devices.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the present application. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of the present application are intended to be included within the scope of the present application.

Claims (19)

1. A first node for wireless communication, comprising:
a first transmitter to transmit a first signaling on a sidelink, the first signaling indicating a second candidate logical channel identity;
a first receiver that receives a second MAC PDU on a sidelink;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the sender of the second MAC PDU generates the second MAC PDU from the first MAC PDU.
2. The first node of claim 1, wherein:
the second candidate logical channel identity is the same as at least 5 least significant bits of the second logical channel identity.
3. The first node according to claim 1 or 2, characterized in that:
the second candidate logical channel identity is used to determine the first logical channel identity.
4. The first node according to claim 1 or 2, characterized in that:
the first signaling indicates a first candidate logical channel identity that is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
5. The first node of claim 2, comprising:
the first receiver receives a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
6. The first node of claim 5, comprising:
the first transmitter transmits a third signaling;
wherein the third signaling is sent in response to the second signaling not contradicting the current configuration; the third signaling indicates that configuration of the second signaling is completed; the first signaling includes a first set of candidate logical channel identities; the first set of candidate logical channel identities includes at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling contradicts a current configuration.
7. A third node for wireless communication, comprising:
a third receiver that receives first signaling on a sidelink, the first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
a third transmitter transmitting the first MAC PDU on the sidelink;
the first MAC PDU comprises a first MAC sub-PDU, wherein the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity; the receiver of the first MAC PDU generates the second MAC PDU from the first MAC PDU.
8. The third node of claim 7, comprising:
the third transmitter transmits a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
9. A third node according to claim 7 or 8, comprising:
the third transmitter transmits a target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
10. A method in a first node for wireless communication, comprising:
transmitting a first signaling on a sidelink, the first signaling indicating a second candidate logical channel identity;
receiving a second MAC PDU on the sidelink;
wherein the second candidate logical channel identity is used to determine a second logical channel identity; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the second MAC PDU is generated by the first MAC PDU; the first MAC PDU comprises a first MAC sub-PDU, the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the first logical channel identity is different from the second logical channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the sender of the second MAC PDU generates the second MAC PDU from the first MAC PDU.
11. The method in the first node of claim 10, wherein the second candidate logical channel identity is the same as at least 5 least significant bits of the second logical channel identity.
12. The method in a first node according to claim 10 or 11, wherein the first signaling indicates a first candidate logical channel identity, which is identical to the 5 least significant bits of the second candidate logical channel identity, when one of the first candidate logical channel identity and the second candidate logical channel identity is determined as the second logical channel identity, the other is determined as the first logical channel identity.
13. A method in a first node according to claim 10 or 11, comprising: receiving a second signaling;
wherein the second signaling is RRC signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
14. A method in a first node according to claim 10 or 11, comprising: transmitting a third signaling;
wherein the third signaling is sent in response to the second signaling not contradicting the current configuration; the third signaling indicates that configuration of the second signaling is completed; the first signaling includes a first set of candidate logical channel identities; the first set of candidate logical channel identities includes at least one candidate logical channel identity, the second candidate logical channel identity belongs to the first set of candidate logical channel identities, and the first set of candidate logical channel identities and the second logical channel identity are used to determine whether the second signaling contradicts a current configuration.
15. A method in a third node for wireless communication, comprising:
receiving first signaling on a sidelink, the first signaling indicating a second candidate logical channel identity; determining a second logical channel identity according to the second candidate logical channel identity;
transmitting a first MAC PDU on a sidelink;
the first MAC PDU comprises a first MAC sub-PDU, wherein the first MAC sub-PDU comprises a first MAC sub-header and a first data packet, and the first MAC sub-header comprises a first logic channel identity; the second logical channel identity is used for a security algorithm of the first data packet; the first MAC PDU is used to generate a second MAC PDU; the second MAC PDU comprises a second MAC sub-PDU, the second MAC sub-PDU comprises a second MAC sub-header and a first data packet, and the second MAC sub-header comprises a second logic channel identity; the first logical channel identity is different from the second logical channel identity; the receiver of the first MAC PDU generates the second MAC PDU from the first MAC PDU.
16. A method in a third node according to claim 15, comprising: sending a second signaling;
wherein the second signaling is higher layer signaling, the second signaling indicating the second logical channel identity, the second signaling indicating at least a first portion of the first identity.
17. A method in a third node according to claim 15 or 16, comprising: sending a target signaling;
wherein the target signaling is higher layer signaling, the target signaling indicating at least one of the first logical channel identity and the second logical channel identity.
18. The method in a third node according to claim 15 or 16, wherein the second candidate logical channel identity is identical to at least 5 least significant bits of the second logical channel identity.
19. Method in a third node according to claim 15 or 16, characterized in that,
the first signaling indicates a first candidate logical channel identity that is the same as the 5 least significant bits of the second candidate logical channel identity, and when one of the first candidate logical channel identity and the second candidate logical channel identity is determined to be the second logical channel identity, the other is determined to be the first logical channel identity.
CN202010446477.8A 2020-05-25 2020-05-25 Method and apparatus for wireless communication Active CN113727343B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN202310258167.7A CN116347441A (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication
CN202010446477.8A CN113727343B (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication
PCT/CN2021/095032 WO2021238779A1 (en) 2020-05-25 2021-05-21 Method and device for wireless communication
US17/992,854 US20230083122A1 (en) 2020-05-25 2022-11-22 Method and device for wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010446477.8A CN113727343B (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310258167.7A Division CN116347441A (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication

Publications (2)

Publication Number Publication Date
CN113727343A CN113727343A (en) 2021-11-30
CN113727343B true CN113727343B (en) 2023-04-25

Family

ID=78671491

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310258167.7A Pending CN116347441A (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication
CN202010446477.8A Active CN113727343B (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202310258167.7A Pending CN116347441A (en) 2020-05-25 2020-05-25 Method and apparatus for wireless communication

Country Status (1)

Country Link
CN (2) CN116347441A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116938405A (en) * 2022-04-01 2023-10-24 上海朗帛通信技术有限公司 Method and apparatus for wireless communication

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016122533A1 (en) * 2015-01-29 2016-08-04 Nokia Soluton And Networks Oy Handling of proximity services device to device related identities at radio access network level
CN110312226A (en) * 2018-03-20 2019-10-08 华为技术有限公司 Transmit the method and communication device of data

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3378186B1 (en) * 2015-11-16 2021-02-24 LG Electronics Inc. Method for transmitting or receiving a mac pdu in a wireless communication system and a device therefor
US20190297529A1 (en) * 2018-03-23 2019-09-26 Qualcomm Incorporated Extension of logical channel number in cellular radio access technologies

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016122533A1 (en) * 2015-01-29 2016-08-04 Nokia Soluton And Networks Oy Handling of proximity services device to device related identities at radio access network level
CN110312226A (en) * 2018-03-20 2019-10-08 华为技术有限公司 Transmit the method and communication device of data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
OPPO.R2-2002649 "Discussion on PDCP open issues".《3GPP tsg_ran\wg2_rl2》.2020, *

Also Published As

Publication number Publication date
CN116347441A (en) 2023-06-27
CN113727343A (en) 2021-11-30

Similar Documents

Publication Publication Date Title
CN114007196B (en) Method and apparatus for wireless communication
CN113395716B (en) Method and arrangement in a communication node used for wireless communication
CN115225239B (en) Method and apparatus for wireless communication
CN113727343B (en) Method and apparatus for wireless communication
CN114979966B (en) Method and apparatus in a communication node for wireless communication
CN113766501B (en) Method and apparatus for wireless communication
CN114666416B (en) Method and apparatus for wireless communication
WO2022111404A1 (en) Method used for wireless communication, and device
CN115278929A (en) Method and equipment used for wireless communication
CN115134056B (en) Method and apparatus for wireless communication
CN113853030A (en) Method and equipment used for wireless communication
CN118199825A (en) Method and apparatus for wireless communication
CN114640723B (en) Method and apparatus for wireless communication
CN115396980B (en) Method and apparatus for wireless communication
CN116017442B (en) Method and apparatus for wireless communication
CN113825115B (en) Method and device for relay transmission
CN114158040B (en) Method and apparatus for wireless communication
CN117835226A (en) Method and apparatus for wireless communication
CN117835319A (en) Method and apparatus in a communication node for wireless communication
CN116264708A (en) Method and apparatus for wireless communication
CN116828545A (en) Method and apparatus for wireless communication
CN116938405A (en) Method and apparatus for wireless communication
CN116566457A (en) Method and apparatus for wireless communication
CN113873464A (en) Method and equipment used for wireless communication
CN117750311A (en) Method and apparatus for wireless communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant