WO2022160288A1 - 一种无线通信的方法和装置 - Google Patents
一种无线通信的方法和装置 Download PDFInfo
- Publication number
- WO2022160288A1 WO2022160288A1 PCT/CN2021/074496 CN2021074496W WO2022160288A1 WO 2022160288 A1 WO2022160288 A1 WO 2022160288A1 CN 2021074496 W CN2021074496 W CN 2021074496W WO 2022160288 A1 WO2022160288 A1 WO 2022160288A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- node
- receiver
- exciter
- iab
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 164
- 238000004891 communication Methods 0.000 title claims abstract description 73
- 238000013475 authorization Methods 0.000 claims description 67
- 238000004590 computer program Methods 0.000 claims description 66
- 230000006870 function Effects 0.000 claims description 40
- 238000012545 processing Methods 0.000 description 43
- 230000027455 binding Effects 0.000 description 21
- 238000009739 binding Methods 0.000 description 21
- 238000007726 management method Methods 0.000 description 15
- 230000005540 biological transmission Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 238000013507 mapping Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 230000003068 static effect Effects 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013523 data management Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 239000013256 coordination polymer Substances 0.000 description 2
- 230000001939 inductive effect Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 239000012190 activator Substances 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005284 excitation Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/70—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
- H04B5/77—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/242—Connectivity information management, e.g. connectivity discovery or connectivity update aging of topology database entries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/04—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/12—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/22—Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
- H04W84/047—Public Land Mobile systems, e.g. cellular systems using dedicated repeater stations
Definitions
- the present application relates to the field of communication, and more particularly, to a method and apparatus for wireless communication.
- Radio frequency identification is a non-contact automatic identification technology, often called inductive electronic chip or proximity card, inductive card, non-contact card, electronic label, electronic barcode, etc.
- RFID automatically identifies target objects and obtains relevant data through radio frequency signals, and the identification work does not require manual intervention.
- RFID technology has waterproof, anti-magnetic, high temperature resistance, long service life, large reading distance, and labels that barcodes do not have.
- the data can be encrypted, the storage data capacity is larger, and the stored information can be changed freely. Its application will bring revolutionary changes to industries such as retail and logistics.
- the RFID reader can be separated into a receiver and an exciter, that is, the receiving antenna and the transmitting antenna are separated, so as to reduce the self-interference of the original RFID reader and improve the reception of the receiver. sensitivity.
- the present application provides a method and apparatus for wireless communication, which can improve the flexibility of determining the topology between an exciter and a receiver.
- the present application provides a method for wireless communication, which can be performed by a centralized node or a chip in the centralized node.
- the method includes: a centralized node determining a first topology between a receiver and an exciter according to first information, the receiver and the exciter being used for radio frequency identification, the first information including state information of the receiver and/or state information of the exciter; the centralized node sends second information to the receiver, the second information being used to indicate the first topology.
- the centralized node sends second information to the receiver, the second information is used to indicate the first topology, including: when the receiver is deployed on the second distributed node, the centralized node The information is sent to the second distributed node, and the second distributed node indicates the second information to the receiver through the internal interface, or, when the receiver is deployed on the centralized node, the centralized node directly transmits the second information through the internal interface. indicated to the receiver.
- the centralized node determining the first topology between the receiver and the exciter according to the first information can have two meanings:
- Meaning 1 The centralized node determines the first topology between the exciter and the preconfigured receiver according to the first information.
- the centralized node determines the first topology between the receiver and the exciter according to the first information, including: the centralized node determines the exciter, the receiver, and the network configuration between the receiver and the exciter according to the first information, or layout.
- the centralized node determines the first topology between the receiver and the exciter according to the first information, which can be understood as the centralized node determines the first topology between the exciter and the pre-configured receiver according to the first information, and also It can be understood that the centralized node selects the receiver and the exciter according to the first information and determines the topological relationship between the receiver and the exciter. That is, when the centralized node determines the first topology, a better first topology can be obtained only by determining the topological connection relationship between the receiver and the exciter, or it can select both the appropriate receiver and the exciter when determining the first topology. The exciter, and determine the topological connection relationship between the receiver and the exciter to obtain a better first topology.
- the second information is used to indicate the first topology, including: the second information is used to indicate binding information of the exciter and the receiver, or the second information includes an identifier of the exciter.
- the centralized node can send the binding information of the exciter and the receiver, or the mapping relationship between the exciter identification and the receiver identification, to the receiver, or only send the exciter identification to the receiver,
- the receiver is bound by default to the indicated exciter.
- the second information includes topology connection information between the exciter and the receiver.
- the centralized node determines the topological relationship between the receiver and the exciter, and controls the communication link between the receiver and the exciter according to the topological relationship.
- the centralized node can determine or adjust the topology between the receiver and the exciter according to which the receiver and the exciter communicate according to the state information of the receiver and/or the state information of the exciter, i.e. the receiver and the exciter
- the binding relationship between them is not static configuration, the centralized node can flexibly adjust which receivers are bound to which exciters, and how the receivers and exciters communicate.
- the method further includes: the centralized node sends third information to the exciter, where the third information is used to indicate the receiver's identification information.
- the centralized node determines the exciter, the receiver, and the network configuration or arrangement between the receiver and the exciter according to the first information, the centralized node sends the identification information of the receiver to the exciter, or the centralized node will receive The identification information and location information of the exciter are sent to the exciter. Therefore, according to the implementation manner of the present application, the centralized node can flexibly select an appropriate receiver to establish a topological relationship between the receiver and the exciter.
- the method further includes: the centralized node sends indication information to the receiver, where the indication information is used to instruct the receiver to establish a connection with the exciter, the The indication information includes identification information of the exciter.
- the exciter is deployed on a first distributed node.
- the receiver is deployed on the centralized node.
- the receiver is deployed on a second distributed node.
- the method is applied to an integrated IAB system for access and backhaul, the centralized node is the host node in the IAB system, and the first distributed node is the first IAB node in the IAB system, and the second distributed node is the second IAB node in the IAB system.
- the exciter and the receiver are deployed on the nodes of the IAB system, and the centralized node, that is, the host node, can flexibly adjust the topology between the exciter and the receiver by controlling the IAB node.
- the receiver is deployed on a second distributed node, and the method further includes: the centralized node receiving fourth information from the receiver, The fourth information is used to instruct the centralized node to select the first access and mobility management function AMF network element; the centralized node determines the first AMF network element according to the fourth information, and the first AMF network element is selected according to the fourth information.
- An AMF network element supports the receiver authorization; the centralized node sends fifth information to the first AMF network element, where the fifth information is used to instruct the first AMF network element to perform the receiver authorization ; the centralized node receives sixth information from the first AMF network element, where the sixth information includes information of the receiver.
- the exciter is deployed on a first distributed node, and the method further includes: the centralized node receiving seventh information from the exciter, the The seventh information is used to instruct the centralized node to select the second AMF network element; the centralized node determines the second AMF network element according to the seventh information, and the second AMF network element supports the exciter authorization; the centralized node sends eighth information to the second AMF network element, where the eighth information is used to instruct the second AMF network element to perform the exciter authorization; The AMF network element receives ninth information, where the ninth information includes the information of the exciter.
- the host node selects an appropriate AMF network element to authorize the exciter and the receiver according to the subscription information of the exciter and the receiver, and the IAB node obtains the permission to enable/use the exciter or receiver capability, thereby
- the IAB system can have the capability of radio frequency identification.
- the method further includes: the centralized node sending broadcast information, where the broadcast information is used to indicate the first distributed node and/or the second distributed node Distributed nodes select parent nodes.
- the centralized node sends broadcast information to instruct the first distributed node and/or the second distributed node to select an appropriate parent node, thereby reducing the complexity of determining the first topology by the centralized node.
- the first information includes at least one of the following information: load information of the receiver, information on the number of maximum exciters supported by the receiver, or location information of the actuator.
- the first information further includes information of a second topology, and the first topology is obtained by adjusting the first topology between the receiver and the exciter.
- the second topology is obtained.
- the information of the second topology is at least one of the following information: the number of interval nodes between the receiver and the exciter, the link load between the receiver and the exciter, Link quality between the receiver and the exciter or redundant paths between the receiver and the exciter.
- the present application provides a method for wireless communication, which can be performed by an exciter or a chip in the exciter.
- the method includes: the exciter receives third information from the centralized node, the third information is used to indicate the identification information of the receiver, the receiver is determined by the centralized node according to the first information, the receiver and the exciter is used for radio frequency identification, and the first information includes state information of the receiver and/or state information of the exciter.
- the exciter is deployed on the first distributed node.
- the receiver is deployed on the centralized node.
- the receiver is deployed on a second distributed node.
- the method is applied to an IAB system
- the centralized node is a host node in the IAB system
- the first distributed node is the IAB The first IAB node in the system
- the second distributed node is the second IAB node in the IAB system.
- the method further includes: the exciter sending seventh information to the centralized node, where the seventh information is used to indicate the centralized node A second AMF network element is selected that supports the exciter authorization.
- the exciter receives broadcast information from the centralized node, the broadcast information being used to instruct the exciter to select a parent node.
- the first information includes at least one of the following information: load information of the receiver, information on the number of maximum exciters supported by the receiver, or location information of the actuator.
- the first information further includes information of a second topology
- the first topology is obtained by adjusting the first topology between the receiver and the exciter.
- the second topology is obtained.
- the information of the second topology is at least one of the following information: the number of interval nodes between the receiver and the exciter, the link load between the receiver and the exciter, Link quality between the receiver and the exciter or redundant paths between the receiver and the exciter.
- the centralized node determines the topological relationship between the receiver and the exciter, and the centralized node can determine or adjust the relationship between the receiver and the exciter according to the state information of the receiver and/or the state information of the exciter.
- topology the receiver and the exciter communicate according to this topology, that is, the binding relationship between the receiver and the exciter is not statically configured, the centralized node can flexibly adjust which receivers are bound to which exciters, and the receivers How to communicate with the exciter.
- the present application provides a method for wireless communication, which can be performed by a receiver or a chip in the receiver.
- the method includes: a receiver receiving second information from a centralized node, the second information being used to indicate a first topology, the first topology being determined by the centralized node according to the first information, the receiver and the The exciter is used for radio frequency identification, and the first information includes state information of the receiver and/or state information of the exciter.
- the exciter is deployed on the first distributed node.
- the receiver is deployed on the centralized node.
- the receiver is deployed on the second distributed node.
- the method is applied to an IAB system, and the centralized node is a host node in the IAB system.
- the method further includes: the method is applied to an IAB system, the centralized node is a host node in the IAB system, and the first distributed The distributed node is the first IAB node in the IAB system, and the second distributed node is the second IAB node in the IAB system.
- the first information includes at least one of the following information: load information of the receiver, information on the number of maximum exciters supported by the receiver, or location information of the actuator.
- the first information further includes information of a second topology, where the first topology is obtained by adjusting the first topology between the receiver and the exciter. The second topology is obtained.
- the information of the second topology is at least one of the following information: the number of interval nodes between the receiver and the exciter, the link load between the receiver and the exciter, Link quality between the receiver and the exciter or redundant paths between the receiver and the exciter.
- the centralized node determines the topological relationship between the receiver and the exciter, and the centralized node can determine or adjust the relationship between the receiver and the exciter according to the state information of the receiver and/or the state information of the exciter.
- topology the receiver and the exciter communicate according to this topology, that is, the binding relationship between the receiver and the exciter is not statically configured, the centralized node can flexibly adjust which receivers are bound to which exciters, and the receivers How to communicate with the exciter.
- the present application provides an apparatus for wireless communication, the apparatus having the function of implementing the method in the first aspect and any possible implementation manners thereof.
- the functions can be implemented by hardware, or can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more units corresponding to the above functions.
- the present application provides an apparatus for wireless communication, the apparatus having a function of implementing the method in the second aspect and any possible implementation manners thereof.
- the functions can be implemented by hardware, or can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more units corresponding to the above functions.
- the present application provides an apparatus for wireless communication, and the apparatus has the function of implementing the method in the third aspect and any possible implementation manners thereof.
- the functions can be implemented by hardware, or can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more units corresponding to the above functions.
- the present application provides a network device including a processor and a memory.
- the memory is used to store the computer program
- the processor is used to call and execute the computer program stored in the memory, so that the network device executes the method in the first aspect or any possible implementation manner of the first aspect.
- the present application provides a network device including a processor and a memory.
- the memory is used to store the computer program
- the processor is used to call and execute the computer program stored in the memory, so that the network device executes the method in the second aspect or any possible implementation manner of the second aspect.
- the present application provides a network device including a processor and a memory.
- the memory is used to store the computer program
- the processor is used to call and execute the computer program stored in the memory, so that the network device executes the method in the third aspect or any possible implementation manner of the third aspect.
- the present application provides a chip including a processor.
- the processor is configured to read and execute the computer program stored in the memory to execute the method of the first aspect or any possible implementation manner of the first aspect.
- the chip further includes a memory, the memory and the processor are connected to the memory through a circuit or a wire, and the memory is used for storing computer programs.
- the chip further includes a communication interface.
- the present application provides a chip including a processor.
- the processor is configured to read and execute the computer program stored in the memory to perform the method of the second aspect or any possible implementation of the second aspect.
- the chip further includes a memory, the memory and the processor are connected to the memory through a circuit or a wire, and the memory is used for storing computer programs.
- the chip further includes a communication interface.
- the present application provides a chip including a processor.
- the processor is configured to read and execute the computer program stored in the memory to perform the method of the third aspect or any possible implementation of the third aspect.
- the chip further includes a memory, the memory and the processor are connected to the memory through a circuit or a wire, and the memory is used for storing computer programs.
- the chip further includes a communication interface.
- the present application also provides a computer program product, the computer program product includes computer program code, when the computer program code is run on a computer, the computer is made to execute the above-mentioned first aspect or any one possibility thereof. method in the implementation.
- the present application further provides a computer program product, the computer program product includes computer program code, when the computer program code is run on a computer, the computer is made to execute the above-mentioned second aspect or any one possibility thereof. method in the implementation.
- the present application further provides a computer program product, the computer program product includes computer program code, when the computer program code is run on a computer, the computer is made to execute the third aspect or any one of the possibilities. method in the implementation.
- the present application further provides a computer storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are executed on the computer, the computer can execute the first aspect or any possible implementation manner thereof. method in .
- the present application further provides a computer storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are executed on the computer, the computer can execute the second aspect or any possible implementation manner thereof. method in .
- the present application further provides a computer storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are executed on the computer, the computer can execute the third aspect or any possible implementation manner thereof. method in .
- the centralized node can flexibly determine the exciter, the receiver, and the topology relationship between the exciter and the receiver, that is, the selection and topology of the exciter and the receiver can be based on the state information of the exciter, the receiving The state information of the exciter or the topology information before adjustment is used for determination, which improves the flexibility of determining the topology of the exciter and the receiver in the radio frequency identification.
- FIG. 1 is an architectural diagram of an IAB system applicable to an embodiment of the present application.
- FIG. 2 is a schematic diagram of the composition of an IAB node.
- Figure 3 is an example of an IAB system.
- FIG. 4 is an example of a user plane protocol stack architecture of a multi-hop IAB network.
- FIG. 5 is an example of a control plane protocol stack architecture of a multi-hop IAB network.
- FIG. 6 is a schematic diagram of a separate RFID.
- Figure 7 is a schematic diagram of topology adjustment of the receiver and the exciter.
- Figure 8 is an example of a schematic flow chart for determining the topology between the receiver and the exciter.
- Figure 9 is another example of a schematic flow chart for determining the topology between the receiver and the exciter.
- FIG. 10 is a schematic flow chart of an example of an exciter authorization.
- FIG. 11 is a schematic flowchart of an example of receiver authorization.
- LTE long term evolution
- FDD frequency division duplex
- TDD time division duplex
- UMTS universal mobile telecommunication system
- 5th generation, 5G future sixth generation
- 6th generation 6G
- new radio new radio
- the terminal device may be a device that provides voice/data connectivity to the user, such as a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
- some examples of terminals are: mobile phone, tablet computer, notebook computer, PDA, mobile internet device (MID), wearable device, virtual reality (VR) device, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote surgery, wireless terminals in smart grids, wireless terminals in transportation safety, wireless terminals in smart cities , wireless terminals in smart homes, cellular phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (wireless local loop, WLL) stations, personal digital assistants (personal digital assistant, PDA), Handheld devices, computing devices or other processing devices connected to wireless modems with wireless communication capabilities, in-vehicle devices, wearable devices, terminal devices in 5G networks or terminals in public land mobile networks (PLMN) equipment, etc., which are not limited in this embodiment of
- An access network device is a device in the RAN, or in other words, a RAN node that accesses a terminal device to a wireless network.
- an access network device it can be enumerated: gNB, transmission reception point (TRP), evolved Node B (evolved Node B, eNB), radio network controller (radio network controller) , RNC), Node B (Node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB ), base band unit (BBU), or wireless fidelity (wireless fidelity, Wifi) access point (access point, AP), etc.
- an access network device may include a centralized unit (CU) node, or a distributed unit (DU) node, or a RAN device including a CU node and a DU node, or a control plane CU node (CU-CP node) and user plane CU node (CU-UP node) and RAN equipment of DU node.
- CU centralized unit
- DU distributed unit
- RAN device including a CU node and a DU node, or a control plane CU node (CU-CP node) and user plane CU node (CU-UP node) and RAN equipment of DU node.
- CU-CP node control plane CU node
- CU-UP node user plane CU node
- Wireless backhaul nodes are used to provide wireless backhaul services.
- the wireless backhaul service refers to data and/or signaling services provided through a wireless backhaul link.
- the IAB node is a specific name of a relay node, which does not constitute a limitation on the solution of the present application. It can be one of the above-mentioned base stations or terminal devices with a forwarding function, or can be an independent device form.
- the IAB node can provide wireless access services for terminals, and connect to a donor base station (donor gNB) through a wireless backhaul link to transmit user service data.
- donor base station donor gNB
- the IAB node may also be equipment such as customer premises equipment (customer premises equipment, CPE), residential gateway (residential gateway, RG).
- CPE customer premises equipment
- residential gateway residential gateway
- RG residential gateway
- the method provided by the embodiment of the present application may also be applied to a scenario of home access (home access).
- FIG. 1 is an architectural diagram of an IAB system applicable to the technical solution of the present application.
- an IAB system includes at least one base station 100, one or more terminal devices 101 served by the base station 100, one or more relay nodes (ie, IAB nodes) 110, and the IAB node 110 One or more terminal devices 111 served.
- the IAB node 110 is connected to the base station 100 via a wireless backhaul link 113 .
- base station 100 is referred to as a donor base station.
- the donor base station is also referred to in this application as a donor node or a donor node or an IAB donor (IAB donor).
- the IAB system may also include one or more intermediate IAB nodes. For example, IAB node 120 and IAB node 130.
- the donor base station can be an access network element with a complete base station function, or it can be a form in which a centralized unit (CU) and a distributed unit (DU) are separated. It is composed of a distributed unit and a distributed unit of the host base station.
- the centralized unit of the host node is also referred to as an IAB donor CU (also referred to as a donor CU, or directly referred to as a CU).
- the distributed unit of the host node is also called IAB donor DU (or called donor DU).
- the donor CU may also be a form in which the control plane (CP) and the user plane (UP) (hereinafter referred to as CU-UP) are separated.
- CP control plane
- UP user plane
- a CU may consist of one CU-CP and one or more CU-UPs.
- Link A path between two adjacent nodes in a path.
- Access link a link between a terminal device and a base station, or between a terminal device and an IAB node, or between a terminal device and a donor node, or between a terminal device and a donor DU.
- the access link includes a wireless link used by an IAB node to communicate with its parent node when it acts as a common terminal device.
- an IAB node acts as a common terminal device, it does not provide backhaul services for any child nodes.
- Access links include uplink access links and downlink access links.
- the access link of the terminal device is a wireless link, so the access link may also be referred to as a wireless access link.
- Backhaul link The link between the IAB node and the parent node when it acts as a wireless backhaul node.
- the IAB node acts as a wireless backhaul node, it provides wireless backhaul services for child nodes.
- Backhaul links include uplink backhaul links and downlink backhaul links.
- the backhaul link between the IAB node and the parent node is a wireless link, so the backhaul link may also be referred to as a wireless backhaul link.
- Each IAB node regards the adjacent nodes that provide it with wireless access service and/or wireless backhaul service as a parent node. Accordingly, each IAB node can be regarded as a child node of its parent node.
- child nodes may also be referred to as subordinate nodes, and parent nodes may also be referred to as superior nodes.
- the node's previous hop node refers to the last node in the path including the node that receives the data packet before the node. It can be understood that the previous hop node of the node may include the previous hop node of the node in the uplink transmission and the previous hop node of the node in the downlink transmission.
- Next-hop node of a node refers to the first node in the path containing the node that receives the data packet after the node. It can be understood that the next hop node of the node may include the next hop node of the node in the uplink transmission and the next hop node of the node in the downlink transmission.
- Ingress link of a node refers to the link between the node and the previous hop node of the node, which can also be called the previous hop link of the node. It can be understood that the ingress link of the node may include the ingress link of the node in uplink transmission and the ingress link of the node in downlink transmission.
- the egress link of a node refers to the link between the node and the next-hop node of the node, which may also be called the next-hop link of the node. It can be understood that the egress link of the node may include the egress link of the node in uplink transmission and the egress link of the node in downlink transmission.
- Access IAB node refers to an IAB node accessed by a terminal, or an IAB node that provides access services for terminal equipment.
- Intermediate IAB node refers to an IAB node that provides wireless backhaul services for other IAB nodes (eg, access IAB nodes or other intermediate IAB nodes).
- Routing Used to select the next hop node for the packet.
- An IAB node may have a mobile terminal (MT) part and a DU part.
- An IAB node communicates with its parent node using the MT part, and an IAB node communicates with its child node (the child node may be a terminal or another IAB node) using the DU part.
- An IAB node can establish a backhaul connection with at least one parent node of the IAB node through the MT part.
- the DU part of an IAB node can provide access services for the terminal or the MT part of other IAB nodes. An example is described below with reference to FIG. 2 .
- FIG. 2 is a schematic diagram of the composition of an IAB node.
- the UE is connected to the host node through IAB Node 2 and IAB Node 1.
- the IAB node 1 and the IAB node 2 both include a DU part and an MT part.
- the DU part of the IAB node 2 provides access services for the UE.
- the DU part of the IAB node 1 provides access services for the MT part of the IAB node 2.
- the DU part of the host node provides access services for the MT part of the IAB node 1 .
- the protocol stack of the IAB network includes a user plane protocol stack and a control plane protocol stack.
- the protocol stacks on the user plane and the control plane of the access IAB node are different, and reference may be made to the IAB node 1 shown in FIG. 4 and FIG. 5 respectively.
- FIG. 3 is an example of an IAB system.
- the IAB system is mainly composed of a host node and an IAB node.
- the IAB nodes are cascaded by a directed acyclic graph, and during the cascade, each IAB node can be non-connected.
- Access stratum non access stratum, NAS
- OAM operation administration and maintenance
- PDU protocol data unit
- the host node and the IAB node are examples of a centralized node and a distributed node, respectively, and the present application can be applied to a system composed of other centralized nodes and distributed nodes.
- FIG. 4 is an example of a user plane protocol stack architecture of a multi-hop IAB network.
- BAP backhaul adaptation protocol
- packet data convergence protocol packet data convergence protocol
- PDCP packet data convergence protocol
- GTP-U general packet radio service tunneling protocol user plane
- user datagram protocol user datagram protocol, UDP
- network interconnection protocol IP
- L2 layer layer 2
- L1 layer layer 1
- radio link control radio link control
- RLC medium access control
- MAC medium access control
- SCTP wireless Resource control
- the L2 layer is the link layer.
- the L2 layer may be a data link layer in an open systems interconnection (open systems interconnection, OSI) reference model.
- the L1 layer may be the physical layer.
- the L1 layer may be the physical layer in the OSI reference model.
- each protocol layer is configured with a corresponding protocol layer entity, such as a PDCP entity, an RLC entity, and a MAC entity.
- a protocol layer entity such as a PDCP entity, an RLC entity, and a MAC entity.
- the access backhaul node such as the IAB node shown in FIG. 5 through the RLC layer, the MAC layer and the PHY layer in sequence
- PHY layer the access backhaul node
- the protocol stack of the communication link between it and the parent node is the same as the protocol stack of the wireless access link between the UE and the access IAB node, and the protocol stack between it and the host CU is the same.
- the protocol stack is the same as that between the UE and the host CU.
- FIG. 4 also shows the user plane protocol stack of the F1 interface between the host CU and the access IAB node (such as the IAB node 2 in FIG. 4 ).
- the access IAB node such as the IAB node 2 in FIG. 4 .
- each radio bearer of a UE has a one-to-one correspondence with a GTP tunnel.
- FIG. 5 is an example of a control plane protocol stack architecture of a multi-hop IAB network.
- the description of each protocol layer in Figure 4 is also applicable in Figure 5, but there are some differences.
- the F1 interface between the access IAB node and the host CU in FIG. 5 adopts the F1 control plane (F1-C) protocol stack.
- FIG. 4 and FIG. 5 respectively show an example of an end-to-end user plane and control plane protocol stack architecture for transmitting data services of a UE in an IAB network.
- the protocol stack architecture may also have other possibilities. For example, if a protocol layer for security protection is introduced into the F1 interface between IAB 2 and the host CU, the protocol stack architecture will change.
- the IAB donor can retain the protocol stack of the donor DU and the donor CU to the external node interface, and the protocol layer on the internal interface between the donor DU and the donor CU is not necessary.
- the protocol stack of the IAB node may not distinguish the DU part and the MT part from the outside, and only uniformly display the protocol stack of the interface to the external node.
- the Donor-DU is the proxy node of the F1 interface between the Donor-CU and the IAB node
- the Donor-DU is oriented to users who access the IAB node.
- the protocol stack architecture above the IP layer, it can include the UDP layer and the GTP-U layer respectively equivalent to the UDP layer and the GTP-U layer in the protocol stack architecture of the DU part of the access IAB node.
- the SCTP layer and the F1AP layer in the protocol stack architecture are respectively equivalent to the SCTP layer and the F1AP layer, and may also include an IPsec layer or a DTLS layer equivalent to the DU part of the access IAB node.
- the F1 interface refers to the logical interface between the DU part of the IAB node and the host node (or donor-CU or donor-DU).
- the F1 interface can also be called the F1* interface, which supports the user plane and the control plane.
- the protocol layer of the F1 interface refers to the communication protocol layer on the F1 interface.
- the user plane protocol layer of the F1 interface may include one or more of an IP layer, a UDP layer, and a GTP-U layer.
- the user plane protocol layer of the F1 interface further includes a PDCP layer and/or an IP security (IP Security, IPsec) layer.
- IP Security IP Security, IPsec
- control plane protocol layer of the F1 interface may include one or more of an IP layer, an F1AP layer, and an SCTP layer.
- control plane protocol layer of the F1 interface further includes one or more of the PDCP layer, the IPsec layer, and the datagram transport layer security (DTLS for short) layer.
- IAB node can also support interfaces such as Uu, E1, NG, and X2, which are not described here for brevity.
- FIG. 6 is an example of a separate wireless radio frequency (universal subscriber identity module, RFID).
- the RFID separation architecture can divide the reader into a receiver and an exciter.
- the receiving link of the original reader is included in the receiver, and the sending link of the original reader is included in the exciter.
- the receiver sends a downlink command to the RFID tag, it needs to be sent to the exciter first, and the exciter forwards the RFID tag.
- the RFID tag sends uplink data, it can be directly sent to the receiver.
- the downlink signaling sent by the receiver needs to be forwarded to the RFID tag through the exciter. Therefore, in a large-scale deployment, there can be multiple exciters, that is, the receiver can be bound to multiple exciters, manage these exciters, and select the exciters to forward downlink management commands.
- an exciter may also be referred to as an exciter node or a Helper node.
- the IAB node where the exciter is deployed in the IAB system can be considered as the upper-layer functional module of the IAB node, which can call the communication interface of DU or MT for communication.
- a receiver may also be referred to as a receiving node or a Receiver node.
- the receiver can be deployed on the IAB node or the host node of the IAB system.
- the receiver can also be regarded as the upper-level functional module of the IAB node or the host node, and can call the communication interface of the DU or MT for communication.
- the access management network element may be an access and mobility management function (AMF) network element.
- AMF access and mobility management function
- the access management network element may still be an AMF network element, or may have other names, which are not limited in this application.
- the AMF network element may be responsible for the relevant authorization of IAB nodes, exciters and receivers.
- the authentication server may be an authentication server function (authentication server function, AUSF) network element.
- the authentication server function network element may still be the AUSF network element, or may have other names, which are not limited in this application.
- the data management network element may be a unified data management (UDM) network element, or a unified database function (unified data repository, UDR) network element.
- UDM unified data management
- UDR unified data repository
- the RFID-H network element can be a newly deployed network element in the core network dedicated to being responsible for RFID, and is responsible for RFID-related authentication, authorization, inventory or tag reading.
- Functions such as writing agent can be deployed together with the existing core network element, or can be used as a functional module of the existing core network element responsible for RFID-related functions, which is not limited in this application.
- the present application can be applied to any system composed of centralized nodes and distributed nodes.
- the following takes the IAB system as an example, and does not make any limitation to the present application.
- Figure 7 is an example of the deployment of receivers and exciters under the IAB system.
- the receiver is deployed on the host node
- the exciter A is deployed on the IAB node 4
- the exciter B is deployed on the IAB node 5 .
- the exciter A is connected to the receiver through IAB node 1
- the exciter B is connected to the receiver through IAB node 2, that is, both the exciter A and the exciter B need to go through an additional 1-hop IAB node to connect to the receiver, so undoubtedly Additional latency overhead will be added.
- Fig. 7(b) is a new topology obtained by adjusting Fig. 7(a). Referring to Fig.
- both the IAB node 4 and the IAB node 5 are directly connected to the host node, that is, the exciter A and the exciter B All can communicate directly with the receiver, and the topology of FIG. 7(b) obviously has a smaller delay than that of FIG. 7(a).
- Fig. 7(d) is a new topology obtained by adjusting Fig. 7(c).
- the IAB node 5 where the exciter B is located is directly connected to the IAB node 1, that is, a better routing topology is obtained.
- FIG. 8 shows a schematic flow of the communication method 800 of the present application when the receiver is deployed on the host node.
- the receiver is deployed on an IAB node (an example of a second distributed node), and the receiver is deployed on a host node (an example of a centralized node).
- the host node receives the information of the exciter (an example of the ninth information) from the AMF network element.
- the information of the exciter may be the information of the IAB node where the exciter is deployed.
- the AMF network element sends the exciter information to the host node. It can be sent to the host node when the AMF network element authorizes the exciter, or it can send the IAB node information and the exciter information to the host when the AMF network element performs the IAB node authorization.
- the node that is, in the IAB scenario, after the IAB function authorization is passed, the AMF network element can send the IAB authorization indication to the host node through the N2 message, and the AMF network element can also carry the exciter information in the N2 message to the host node.
- the host node determines topology #1 (an example of the first topology) between the receiver and the exciter according to the information #1 (an example of the first information).
- the information #1 may include the status information of the receiver and/or the status information of the exciter.
- the state information of the receiver may be at least one of the following information: load information of the receiver, and information of the number of maximum exciters supported by the receiver.
- the state information of the exciter may be the position information of the exciter.
- the information #1 may include the information of the topology #2.
- the information for topology #2 can be the number of spaced nodes between the receiver and the exciter, the link load between the receiver and the exciter, the link quality between the receiver and the exciter, or the receiver and the exciter redundant paths between.
- the host node determines topology #1 based on the average number of spaced nodes between receivers and exciters, or the number of spaced nodes between some exciters and receivers to determine topology #1.
- the host node determines topology #1 according to the average link load between the receiver and the exciter, or the maximum link load, or the load between partial links.
- the host node determines topology #1 according to the link quality of each link, or the worst link quality among all links, where the link quality can be the average link quality, or the worst link in the history instantaneously
- the quality of the link can also be measured by characteristics such as packet loss rate, delay, and jitter.
- the host node may take all the factors that have an impact on the topology as the information #1, which is not limited in the present application.
- the host node determines the topology #1 between the receiver and the exciter according to the information #1, which can be understood as the host node determines the topology #1 between the exciter and the pre-configured receiver according to the information #1, It can also be understood that the host node selects the receiver and the exciter according to the information #1 and determines the topological relationship between the receiver and the exciter. That is, when the host node determines topology #1, it can obtain a better topology #1 only by determining the topological connection relationship between the receiver and the exciter, or it can select the appropriate receiver and exciter when determining the topology #1. and determine the topological connection relationship between the receiver and the exciter to obtain a better topology #1.
- the host node When the host node determines the topology #1 and also determines the receiver and/or the exciter, the host node can also bind the receiver and the exciter, and the receiver node in the host node can bind the exciter in the form of Build a mapping relationship between receiver IDs and exciter IDs. It should be noted that when the receiver is deployed on the host node, the host node ID can be used instead of the receiver ID.
- the IAB node identification can also be used to replace the exciter identification, wherein the IAB node identification can be a mobile terminal (mobile termination, MT) identification (such as cell radio network temporary identification (cell radio network temporary identity, C-RNTI), 5G temporary mobile subscriber identity (5G-serving-temporary mobile subscriber identity, 5G-S-TMSI)) or DU identity (such as ratio network layer/transport network layer identity, RNL/TNL ID)).
- MT mobile terminal
- MT mobile termination
- MT mobile termination
- C-RNTI cell radio network temporary identity
- 5G-serving-temporary mobile subscriber identity 5G-serving-temporary mobile subscriber identity
- DU identity such as ratio network layer/transport network layer identity, RNL/TNL ID
- the communication between the host node and the receiver can be carried out through the internal interface.
- the binding information can be And the exciter information is sent to the receiver through the internal interface, for example, it can be sent to the receiver through the F1-C/F1-U/RRC message.
- the host node sends information #2 (an example of the second information) to the receiver, where the information #2 is used to indicate topology #1.
- the information #2 includes the binding information of the exciter and the receiver, or includes the identification information of the exciter.
- the binding information may be identified in various ways, for example, by including the identification of the receiver and the identification of the exciter in a cell, or a message, or a data structure to represent the cell, or the message, Or the receiver and exciter bindings in that data structure. That is, the host node can send the binding information of the exciter and the receiver, or the mapping relationship between the exciter identification and the receiver identification, to the receiver, or only send the exciter identification to the receiver, and receive the The activator is bound to the indicated exciter by default.
- the information #2 includes topological connection information between the exciter and the receiver.
- the topological connection information may include identification information of an exciter and information of a path to the exciter.
- the path information is the path the receiver needs to travel when sending data to the exciter.
- the path information may be represented by identification information of the path, or identification information of nodes on the path.
- the topological connection information may include the above-mentioned binding information and the identifier of the exciter; that is, the topological connection information may also be used to represent the mapping relationship between the exciter and the receiver.
- the topology connection information between the receiver #1 and the exciter #1 it can be learned that the receiver #1 and the exciter #1 are bound.
- the binding information of the receiver #1 and the exciter #1 included in the information #2, or the identification information of the exciter #1 can be understood as the exciter.
- the mapping relationship between the receiver and the exciter is determined according to the binding information or the identification information of the exciter, rather than the identification information of the exciter. Determined according to the above topology connection information.
- the above topological connection information may be topological connection information between IAB nodes.
- the topology connection information can be used to indicate topology #1 and other topology relationships among the IAB nodes.
- the information #2 optionally further includes the association relationship between the IAB node and the receiver or exciter deployed on the IAB node. That is, the above topological connection information can be represented by the IAB node where the exciter is located.
- the IAB node can be represented in various ways, for example, it is represented by the identification information of the IAB node introduced above, for example, it is represented by an IP address or a MAC address.
- the specific content of the above topological connection information can be used to determine the position of the exciter. That is, the above-mentioned topological connection information can be understood as the position information of the exciter.
- the above information #2 may be carried in one message and sent to the receiver, or the information in the information #2 may be carried in different messages and sent to the receiver respectively.
- the receiver when the receiver can determine the position information of the exciter according to the identification information of the exciter, the receiver does not need to additionally acquire the position information of the exciter.
- the receiver can actively establish a connection with the exciter according to the information #2.
- the receiver may adjust topology information on the receiver according to the information #2.
- topology #1 can be in the form of direct connection between the receiver and the exciter, or the form in which the exciter is connected to the receiver through an intermediate node, that is, the binding of the exciter and the receiver can be understood as receiving
- a mapping relationship is formed between the exciter and the exciter responsible for management, and it is not understood that the receiver is directly connected to the exciter.
- the receiver when the receiver is deployed on the host node, the receiver can indicate the information #2 to the receiver through the internal interface, that is, the present application includes that the receiver is integrated into the internal function module of the host node, and the host node passes the information #2 to the receiver.
- the internal interface indicates the case of message #2 to the receiver.
- the host node sends the identification information of the receiver to the exciter (an example of the third information).
- the identification information of the above-mentioned receiver is information that enables the exciter to identify or identify the receiver.
- the host node when the relevant information of the receiver is not pre-configured on the exciter, that is, the exciter does not know the relevant information of the receiver, the host node sends the identification information of the receiver to the exciter after determining the receiver and topology #1. Optionally, the host node also sends the location information of the receiver to the exciter.
- the identification information of the receiver may be used to indicate that the exciter is bound to the receiver.
- the location information can enable the exciter to communicate with the correct receiver later.
- the location information can be represented in various ways, for example, the location information is represented by the IAB node where the receiver is located, and the location information is represented by, for example, the path information to the receiver or the information of the next hop node.
- the IAB node can be represented in various ways, for example, it is represented by the identification information of the IAB node introduced above, for example, it is represented by an IP address or a MAC address.
- the exciter when the exciter can determine the position information of the receiver according to the identification information of the receiver, the exciter does not need to additionally acquire the position information of the receiver.
- the exciter may actively establish a connection with the receiver according to the identification information or location information of the receiver.
- the host node can also flexibly select an appropriate receiver to establish a topology relationship between the receiver and the exciter.
- the host node can build the RLC link between the IAB nodes from top to bottom, and configure the link routing information of the BAP layer, for example, based on the routing table, so that the uplink and downlink data of the IAB node can be correct.
- the subsequent IAB-Node-DU can be connected with the F1 of the host-CU.
- Subsequent communication between the receiver and the exciter can interact through the F1-C/F1-U/RRC protocol, or communicate based on SCTP/tunnel user plane (general packet radio service tunnel protocol user plane, GTPU), or directly Communication is based on IP/transmission control protocol (TCP)/UDP.
- SCTP/tunnel user plane general packet radio service tunnel protocol user plane, GTPU
- TCP IP/transmission control protocol
- the host node can determine whether to receive an exciter according to the load information of the receiver, the maximum number of exciters supported by the receiver, or the location information of exciter A and exciter B.
- the exciter is bound to the exciter A and the exciter B and forms the topology form of Fig. 7(b), or, when the receiver, the exciter A and the exciter B are already in the topology form of Fig. 7(a), the host The node can also adjust the topology into the topology form of (b) of FIG. 7 according to the related information of the topology.
- the host node determines the topology form of Fig.
- the host node sends the binding information of the receiver and the receiver A and the receiver B to the receiver through the internal interface.
- the host node sends the identification information of the receiver to the exciter A and the exciter B.
- the receiver and the exciter A and the exciter B can subsequently communicate according to this topology.
- the exciter is deployed on the IAB node, and the receiver is deployed on the host node.
- the host node can centrally manage the receiver and the receiver, and can be based on the state information of the receiver and/or the state information of the exciter.
- the receiver and the exciter communicate according to the topology, that is, the binding relationship between the receiver and the exciter is not static configuration, the host node can flexibly adjust which receivers which exciters are bound to, and how the receiver and exciter communicate.
- FIG. 9 shows a schematic flow of the method 900 of the present application when the receiver is deployed on the IAB node.
- the exciter is deployed on IAB node #1 (an example of a first distributed node) and the receiver is deployed on IAB node #2 (an example of a second distributed node).
- the host node receives the exciter information (an example of the ninth information) from the AMF network element.
- the process of the AMF network element sending the exciter information to the host node is consistent with the content described in S810 in the method 800, and will not be repeated here.
- the host node receives receiver information (an example of the sixth information) from the AMF network element.
- the information of the receiver may be the information of the IAB node #2 where the receiver is deployed.
- the AMF network element sends the receiver information to the host node. It can be sent to the host node when the AMF network element authorizes the receiver, or it can send the information of the IAB node #2 and the stimulator when the AMF network element authorizes the IAB node #2.
- the information is sent to the host node together, that is, in the IAB scenario, after the IAB function authorization is passed, the AMF network element sends the IAB authorization instruction to the host node through the N2 message, and the AMF network element can also carry the receiver information in the N2 message to the host node. .
- the host node determines topology #A (another example of the first topology) between the exciter and the receiver according to the information #A (another example of the first information).
- the process in which the host node determines the topology #A between the exciter and the receiver according to the information #A is similar to the process in which the host node determines the topology #1 between the exciter and the receiver according to the information #1 in the method 800. No longer.
- both the exciter and the receiver are deployed on the IAB node.
- the expression may be to construct the identification of the receiver and the exciter.
- the mapping relationship between the IAB nodes can also be used to replace the identity of the exciter with the identity of the IAB node #1, and the identity of the IAB node #2 to replace the identity of the receiver, wherein the identity of the IAB node can be the MT identity (such as C-RNTI, 5G- S-TMSI) or DU identification (eg RNL/TNL ID).
- the host node sends information #B (another example of the second information) to the receiver, where the information #B is used to indicate topology #A.
- information #B another example of the second information
- the information #B used to indicate topology #A is similar to the description of information #2 used to indicate topology #1 in method 800, and details are not described herein again.
- the host node sends the identification information of the receiver to the exciter (another example of the third information).
- the host node may send the identification information of the receiver, or the identification information and location information of the receiver to the exciter.
- the description about the identification information and the location information is similar to the above description, and details are not repeated here.
- the host node can also send the information of the exciter to the receiver, and then the receiver can actively establish a connection with the exciter.
- the information #B sent to the receiver and the identification information of the receiver sent to the exciter can be sent through F1-C, F1-U or RRC message. .
- the IAB node will send information to the host node by default. Therefore, the host node can update the BAP routes of the exciter, receiver and intermediate related nodes to ensure that the receiver and exciter can communicate with each other. normal communication. Subsequent communications between the exciter and receiver can be addressed through the BAP layer, based on IP addresses.
- the exciter and the receiver are deployed on the IAB node, and the host node can centrally manage the exciter and the receiver, and can determine or adjust the receiver according to the state information of the receiver and/or the state information of the exciter
- Both the method 800 and the method 900 are to deploy the exciter and the receiver in the nodes of the IAB system, wherein, the IAB node needs to request the AMF network element to obtain authorization, so the IAB node deploying the exciter can also request the AMF network element to obtain the authorization of the exciter.
- FIG. 10 presents an example of a schematic flow of a method 1000 for an exciter authorization process.
- the method 1000 may include: S1010 to S1060, wherein S1010 is an optional operation.
- the operations of method 800 and method 900 may be performed after operations S1010 to S1060 are performed in this embodiment of the present application.
- the method 1000 can be applied to scenarios where the exciter is deployed at the IAB node.
- the host node sends broadcast information, where the broadcast information is used to instruct the exciter to select the parent node.
- the exciter receives broadcast information.
- the IAB node where the exciter is deployed is cascaded, it can refer to the information broadcast by the host node.
- the IAB node deploying the exciter selects the parent node (DU selection), it can preferentially select the one indicated by the broadcast information. parent node.
- the broadcast information includes the information that the host node has the receiver capability.
- the exciter selects the host node with the receiver capability as the parent node. At this time, the optimization can be done.
- the binding topology of local receivers and exciters reduces the complexity of the operations of determining topological relationships in methods 800 and 900 .
- the exciter sends information #a (an example of the seventh information) to the host node, the information #a includes the authorization capability information of the exciter, and the information #a is used to instruct the host node to select the AMF network element #a (the second AMF network element #a). an example of a network element).
- the IAB node deploying the exciter carries information #a in the RRC establishment completion message, and the information #a may also include the authorization capability information of the IAB node, and the authorization capability information of the IAB node is used for host node selection
- the AMF network element that supports IAB authorization the authorization capability information of the exciter is used by the host node to select the AMF network element that supports the authorization of the exciter. That is, after receiving the information #a from the exciter, the host node can select an AMF network element that supports both IAB authorization and exciter authorization.
- the host node can perform IAB configuration on the IAB node where the exciter is deployed, and the configuration operation process can be similar to the existing technology, the difference is that it can be in the RRC message (for example, RRC setup request or UL RRC transfer) Carry the identifier of the exciter, where the identifier of the exciter can also be replaced by the existing RAN ID, and the specific process will not be repeated here.
- RRC message for example, RRC setup request or UL RRC transfer
- the host node selects the AMF network element #a according to the information #a, and the AMF network element #a supports the exciter authorization and can be used for subsequent execution of the IAB authorization and exciter authorization procedures.
- the host node sends information #b (an example of the eighth information) to the AMF network element #a, which is used to instruct the AMF network element #a to perform authorization.
- information #b an example of the eighth information
- the information #b includes the authorization capability information of the IAB node and the authorization capability information of the exciter.
- the host node may carry both the authorization capability information of the IAB node and the authorization capability of the exciter in the N2 message.
- the information is sent to the AMF network element #b for the AMF network element to perform the corresponding authorization process.
- the information #a and the information #b may be the same or different, for example, the information #b may be generated based on the information #a.
- the AMF network element #a determines whether to authorize the IAB node according to the information #b and the IAB subscription information.
- the AMF network element #a When the AMF network element #a receives the information #b, it decides whether to authorize the IAB function according to the IAB node subscription information and/or the local policy acquired from the UDM network element or the UDR network element. This operation may be similar to that in the prior art, and details are not repeated here.
- AMF network element #a determines whether to authorize the exciter according to information #b.
- the ways in which AMF network element #a determines whether to authorize include but are not limited to the following ways:
- the AMF network element #a When the AMF network element #a receives the information #b, it decides whether or not to authorize the exciter function according to the exciter subscription information obtained from the UDM network element or the UDR network element.
- RFID-H refers to the newly deployed functional network element in the core network, which is specially responsible for RFID-related functions, such as authentication, authorization, inventory/label read/write agent and other functions.
- AMF network element #a sends the exciter information (an example of the ninth information) to the host node.
- the authorization of the exciter can be executed synchronously, so that the IAB node can obtain the permission to enable/use the exciter capability.
- the receiver is deployed on the IAB node, wherein the IAB node needs to request the AMF network element to obtain authorization, so the IAB node deploying the receiver can also request the AMF network element to obtain the receiver authorization.
- FIG. 11 shows an example schematic flow of the method 1100 of the receiver authorization process.
- the method 1100 may include: S1110 to S1160, wherein S1110 is an optional operation.
- the operations of the method 900 may be performed after the embodiments of the present application are executed.
- receiver authorization process of the method 1100 is similar to the exciter authorization process of the method 1000. Therefore, for the sake of brevity, only the receiver authorization process is briefly described below.
- the host node sends broadcast information to the receiver, where the broadcast information is used to instruct the receiver to select the parent node.
- the receiver sends information # ⁇ (an example of the fourth information) to the host node, the information # ⁇ includes the authorization capability information of the receiver, and the information # ⁇ is used to instruct the host node to select the AMF network element # ⁇ (the first AMF network element # ⁇ ). an example of a network element).
- the host node selects an AMF network element # ⁇ according to the information # ⁇ , and the AMF network element # ⁇ supports receiver authorization and can be used for subsequent execution of the IAB authorization and receiver authorization procedures.
- the host node sends information # ⁇ (an example of the fifth information) to the AMF network element # ⁇ , which is used to instruct the AMF network element # ⁇ to perform authorization.
- information # ⁇ an example of the fifth information
- the AMF network element # ⁇ determines whether to authorize the IAB node according to the information # ⁇ and the IAB subscription information.
- AMF network element # ⁇ determines whether to authorize the receiver according to information # ⁇ .
- AMF network element # ⁇ sends receiver information (an example of the sixth information) to the host node.
- receiver information an example of the sixth information
- the methods of determining whether AMF network element # ⁇ is authorized include but are not limited to the following methods:
- the AMF network element # ⁇ When the AMF network element # ⁇ receives the information # ⁇ , it decides whether or not to authorize the receiver function according to the receiver subscription information obtained from the UDM network element or the UDR network element.
- the AMF network element # ⁇ When the AMF network element # ⁇ receives the information # ⁇ , it can obtain the relevant storage information from the dedicated network element RFID-H, and determine whether to authorize the exciter function.
- the authorization of the receiver can be performed synchronously, so that the IAB node can obtain the permission to enable/use the receiver capability.
- the wireless communication method according to the embodiment of the present application has been described in detail above, and the wireless communication device provided by the embodiment of the present application is described below.
- FIG. 12 is a schematic structural diagram of an apparatus 500 for wireless communication provided by the present application.
- the apparatus 500 includes a transceiver unit 510 and a processing unit 520 .
- the processing unit 520 is configured to determine a first topology between a receiver and an exciter according to first information, the receiver and the exciter are used for radio frequency identification, and the first information includes state information of the receiver and /or state information of the exciter;
- the transceiver unit 510 is configured to send second information to the receiver, where the second information is used to indicate the first topology.
- the transceiver unit 510 is further configured to send third information to the exciter, where the third information is used to indicate identification information of the receiver.
- the transceiver unit 510 is further configured to receive fourth information from the receiver, where the fourth information includes authorization information of the receiver, and the fourth information is used to instruct the centralized node to select the first access and mobility management function AMF network element; the processing unit 520 is further configured to determine the first AMF network element according to the fourth information, and the first AMF network element supports the receiver authorization; the transceiver unit 510 is further is used to send fifth information to the first AMF network element, where the fifth information is used to instruct the first AMF network element to perform the receiver authorization; The element receives sixth information, the sixth information including the receiver's information.
- the transceiver unit 510 is further configured to receive seventh information from the exciter, where the seventh information includes authorization information of the exciter, and the seventh information is used to instruct the centralized node to select the second AMF network.
- the processing unit 520 is further configured to determine the second AMF network element according to the seventh information, and the second AMF network element supports the exciter authorization;
- the transceiver unit 510 is further configured to send the second AMF network element to the second AMF network element.
- element sends eighth information the eighth information is used to instruct the second AMF network element to perform the exciter authorization;
- the transceiver unit 510 is further configured to receive ninth information from the AMF network element, the ninth information Include the exciter information.
- the transceiver unit 510 is further configured to send broadcast information, where the broadcast information is used to instruct the first distributed node and/or the second distributed node to select a parent node.
- the apparatus 500 may be a chip or an integrated circuit.
- the transceiver unit 510 may be a communication interface, for example, an input/output interface, an input interface circuit, an output interface circuit, and the like.
- the processing unit 520 may be a processor.
- the apparatus 500 may completely correspond to the centralized node in the method embodiment of the present application.
- Each unit included in the apparatus 500 is respectively configured to implement corresponding operations and/or processing performed by the centralized node in each method embodiment.
- the transceiver unit 510 may be a transceiver, and the transceiver includes a transmitter and a receiver, and has the functions of receiving and transmitting at the same time.
- the processing unit 520 may be a processor.
- FIG. 13 is a schematic structural diagram of an apparatus 600 for wireless communication provided by the present application.
- the apparatus 600 includes a transceiver unit 610 and a processing unit 620 .
- a transceiver unit 610 configured to receive third information from a centralized node, where the third information is used to indicate identification information of a receiver, the receiver is determined by the centralized node according to the first information, the receiver and The exciter is used for radio frequency identification, and the first information includes state information of the receiver and/or state information of the exciter.
- the transceiver unit 610 is further configured to send seventh information to the centralized node, where the seventh information includes authorization information of the exciter, and the seventh information is used to instruct the centralized node to select the first Two AMF network elements, the second AMF network element supports the exciter authorization.
- the transceiver unit 610 is further configured to receive broadcast information from the centralized node, where the broadcast information is used to instruct the exciter to select a parent node.
- apparatus 600 may be a chip or an integrated circuit.
- the transceiver unit 610 may be a communication interface, such as an input/output interface, an input interface circuit, an output interface circuit, and the like.
- the processing unit 620 may be a processor.
- the apparatus 600 may completely correspond to the first distributed node in the method embodiment of the present application.
- Each unit included in the apparatus 600 is respectively configured to implement corresponding operations and/or processing performed by the first distributed node in each method embodiment.
- the transceiver unit 610 may be a transceiver, and the transceiver includes a transmitter and a receiver.
- the processing unit 620 may be a processor.
- FIG. 14 is a schematic structural diagram of an apparatus 700 for wireless communication provided by the present application.
- the apparatus 700 includes a transceiver unit 710 and a processing unit 720 .
- the transceiver unit 720 is configured to receive second information from the centralized node, where the second information is used to indicate a first topology, the first topology is determined by the centralized node according to the first information, the receiver and the The exciter is used for radio frequency identification, and the first information includes state information of the receiver and/or state information of the exciter.
- the transceiver unit 720 is further configured to send fourth information to the centralized node, where the fourth information includes authorization information of the receiver, and the fourth information is used to instruct the centralized node to select the first AMF network element , the first AMF network element supports the receiver authorization.
- the transceiver unit 720 is further configured to receive broadcast information from the centralized node, where the broadcast information is used to instruct the receiver to select a parent node.
- apparatus 700 may be a chip or an integrated circuit.
- the processing unit 710 may be a processor.
- the transceiver unit 720 may be a communication interface, such as an input/output interface, an input interface circuit, an output interface circuit, and the like.
- the apparatus 700 may completely correspond to the second distributed node in the method embodiment of the present application.
- Each unit included in the apparatus 700 is respectively configured to implement corresponding operations and/or processing performed by the second distributed node in each method embodiment.
- the processing unit 710 may be a processor.
- the transceiver unit 720 may be a transceiver, and the transceiver includes a transmitter and a receiver.
- the chip described in the above device embodiments may be a field-programmable gate array (FPGA), an application specific integrated circuit (ASIC), a system on chip (SoC), a central A processor (central processor unit, CPU), a network processor (Network Processor, NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller unit, MCU, programmable controller ( programmable logic device, PLD) or other integrated chips.
- FPGA field-programmable gate array
- ASIC application specific integrated circuit
- SoC system on chip
- CPU central processor unit, CPU
- NP Network Processor
- NP digital signal processing circuit
- DSP digital signal processor
- microcontroller microcontroller unit, MCU, programmable controller ( programmable logic device, PLD) or other integrated chips.
- the present application also provides a network device 1000 , which will be described below with reference to FIG. 15 .
- FIG. 15 is a schematic structural diagram of a network device 1000 provided by the present application.
- the network device 1000 includes an antenna 1101 , a radio frequency device 1102 , and a baseband device 1103 .
- the antenna 1101 is connected to the radio frequency device 1102 .
- the radio frequency device 1102 receives the signal sent by the previous hop network node through the antenna 1101, and sends the received signal to the baseband device 1103 for processing.
- the baseband device 1103 processes the signal to be sent to the next-hop network node, and sends the signal to the radio frequency device 1102 , and the radio frequency device 1102 sends the signal through the antenna 1101 .
- the baseband device 1103 may include one or more processing units 11031 .
- the baseband device 1103 may further include a storage unit 11032 and a communication interface 11033 .
- the storage unit 11032 is used to store computer programs and data.
- the communication interface 11033 is used to exchange information with the radio frequency device 1102 .
- the communication interface 11033 may be an input-output interface or an input-output circuit.
- the structure of the apparatus 500 may be the network device 1000 shown in FIG. 13 .
- the transceiver unit 510 may be implemented by the radio frequency device 1102
- the processing unit 520 may be implemented by the baseband device 1103 .
- the baseband device 1103 is configured to determine a first topology between a receiver and an exciter according to first information, where the receiver and the exciter are used for radio frequency identification, and the first information includes the state of the receiver information and/or state information of the actuator.
- the radio frequency device 1102 is configured to send second information to the receiver through the antenna 1101, where the second information is used to indicate the first topology.
- the structure of the apparatus 600 may also be the network device 1000 shown in FIG. 13 .
- the transceiver unit 610 may be implemented by the radio frequency device 1102
- the processing unit 620 may be implemented by the baseband device 1103.
- the radio frequency device 1102 is configured to receive the second information from the host CU through the antenna 1101 , and send the second information to the baseband device 1103 through the communication interface 11033 .
- the structure of the apparatus 700 may also be the network device 1000 shown in FIG. 13 .
- the transceiver unit 610 may be implemented by the radio frequency device 1102
- the processing unit 620 may be implemented by the baseband device 1103 .
- the radio frequency device 1102 is configured to receive the third information from the host CU through the antenna 1101 , and send the third information to the baseband device 1103 through the communication interface 11033 .
- the present application also provides a communication system, including one or more of the centralized node as described in the method embodiment, the first distributed node and the second distributed node.
- the present application provides a computer-readable storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are executed on the computer, the computer is made to perform the corresponding operations performed by the centralized node in any method embodiment and/or or processing.
- the present application provides a computer-readable storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are executed on the computer, the computer enables the computer to perform the corresponding operations performed by the first distributed node in any method embodiment and/or processing.
- the present application provides a computer-readable storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are executed on the computer, the computer is made to perform the corresponding operations performed by the second distributed node in any method embodiment. and/or processing.
- the present application further provides a computer program product, the computer program product includes computer program code, when the computer program code is run on the computer, the computer program code enables the computer to perform the corresponding operations performed by the centralized node in any method embodiment of the present application and/or deal with.
- the present application further provides a computer program product, the computer program product includes computer program code, when the computer program code runs on the computer, the computer program code enables the computer to perform the corresponding operations performed by the first distributed node in any method embodiment of the present application and / or processing.
- the present application further provides a computer program product, the computer program product includes computer program code, and when the computer program code runs on the computer, causes the computer to perform the corresponding operations performed by the second distributed node in any method embodiment of the present application and / or processing.
- the present application also provides a chip including a processor.
- the processor is configured to invoke and run the computer program stored in the memory to perform the corresponding operation and/or processing performed by the centralized node in any method embodiment of the present application.
- the chip further includes a memory, and the memory is connected to the processor.
- the processor is used to read and execute the computer program in the memory.
- the chip further includes a communication interface, and the processor is connected to the communication interface.
- the communication interface is used for receiving signals and/or data to be processed, and the processor obtains the signals and/or data to be processed from the communication interface and processes them.
- the present application also provides a chip including a processor.
- the processor is configured to invoke and run the computer program stored in the memory to perform corresponding operations and/or processing performed by the first distributed node in any method embodiment of the present application.
- the chip further includes a memory, and the memory is connected to the processor.
- the processor is used to read and execute the computer program in the memory.
- the chip further includes a communication interface, and the processor is connected to the communication interface.
- the communication interface is used for receiving signals and/or data to be processed, and the processor obtains the signals and/or data to be processed from the communication interface and processes them.
- the present application also provides a chip including a processor.
- the processor is configured to invoke and run the computer program stored in the memory to perform corresponding operations and/or processing performed by the second distributed node in any method embodiment of the present application.
- the chip further includes a memory, and the memory is connected to the processor.
- the processor is used to read and execute the computer program in the memory.
- the chip further includes a communication interface, and the processor is connected to the communication interface.
- the communication interface is used to receive signals and/or data to be processed, and the processor acquires the signals and/or data to be processed from the communication interface and processes them.
- the above-mentioned communication interface may be an input/output interface, and may specifically include an input interface and an output interface.
- the communication interface may be an input/output circuit, and may specifically include an input interface circuit and an output interface circuit.
- the memory and the memory involved in the above embodiments may be physically independent units, or the memory may also be integrated with the processor.
- the network device when the network device is a centralized node, the network device may implement the operations and/or processing performed by the centralized node in the above method embodiments by using a processing unit to invoke a program.
- the processing unit 11031 calls the program stored in the storage unit 11032 to perform the operations and/or processing performed by the centralized nodes in the above method embodiments.
- the storage unit 11032 may be a storage element on the same chip as the processing unit 11031, that is, an on-chip storage unit, or a storage element that is on a different chip from the processing unit 11031, that is, an off-chip storage unit.
- the network device when the network device is the first distributed node, the network device implements the operations and/or processing performed by the first distributed node in the above method embodiments, which may be implemented in the form of a processing unit calling a program .
- the network device when the network device is the second distributed node, the network device implements the operations and/or processing performed by the second distributed node in the above method embodiments, which may be implemented in the form of a processing unit calling a program .
- the processor may be a central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more of them for controlling the technology of the present application. Program execution of integrated circuits, etc.
- the processor may be a digital signal processor device, a microprocessor device, an analog-to-digital converter, a digital-to-analog converter, or the like.
- the processor can distribute the control and signal processing functions of the terminal equipment or the network equipment among these devices according to their respective functions.
- the processor may have the functionality to operate one or more software programs, which may be stored in the memory.
- the functions of the processor may be implemented by hardware, or may be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the memory may be read-only memory (ROM), other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types of storage devices that can store information and instructions
- the dynamic storage device can also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), compact disc read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact discs, laser discs, compact discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media, or other magnetic storage devices, or may also be capable of carrying or storing desired program code in the form of instructions or data structures and capable of Any other medium accessed by a computer, etc.
- the disclosed system, apparatus and method may be implemented in other manners.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or may be Integration into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
- the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
- the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (41)
- 一种无线通信的方法,其特征在于,所述方法包括:集中式节点根据第一信息确定接收器与激励器之间的第一拓扑,所述接收器和所述激励器用于射频识别,所述第一信息包括所述接收器的状态信息和/或所述激励器的状态信息;所述集中式节点向所述接收器发送第二信息,所述第二信息用于指示所述第一拓扑。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述集中式节点向所述激励器发送第三信息,所述第三信息用于指示所述接收器的标识信息。
- 根据权利要求1或2所述的方法,其特征在于,所述激励器部署在第一分布式节点上。
- 根据权利要求1至3中任一项所述的方法,其特征在于,所述接收器部署在所述集中式节点上。
- 根据权利要求1至3中任一项所述的方法,其特征在于,所述接收器部署在第二分布式节点上。
- 根据权利要求1至5中任一项所述的方法,其特征在于,所述方法运用于接入回传一体化IAB系统,所述集中式节点为所述IAB系统中的宿主节点,所述第一分布式节点为所述IAB系统中的第一IAB节点,所述第二分布式节点为所述IAB系统中的第二IAB节点。
- 根据权利要求6所述的方法,其特征在于,所述接收器部署在第二分布式节点上,所述方法还包括:所述集中式节点从所述接收器接收第四信息,所述第四信息用于指示所述集中式节点选择第一接入与移动性管理功能AMF网元;所述集中式节点根据所述第四信息确定所述第一AMF网元,所述第一AMF网元支持所述接收器授权;所述集中式节点向所述第一AMF网元发送第五信息,所述第五信息用于指示所述第一AMF网元进行所述接收器授权;所述集中式节点从所述第一AMF网元接收第六信息,所述第六信息包括所述接收器的信息。
- 根据权利要求6或7所述的方法,其特征在于,所述激励器部署在第一分布式节点上,所述方法还包括:所述集中式节点从激励器接收第七信息,所述第七信息用于指示所述集中式节点选择第二AMF网元;所述集中式节点根据所述第七信息确定所述第二AMF网元,所述第二AMF网元支持所述激励器授权;所述集中式节点向所述第二AMF网元发送第八信息,所述第八信息用于指示所述第二AMF网元进行所述激励器授权;所述集中式节点从所述AMF网元接收第九信息,所述第九信息包括所述激励器的信息。
- 根据权利要求1至8中任一项所述的方法,其特征在于,所述方法还包括:所述集中式节点发送广播信息,所述广播信息用于指示所述第一分布式节点和/或第二分布式节点选择父节点。
- 根据权利要求1至9中任一项所述的方法,其特征在于,所述第一信息包括以下信息中的至少一项:所述接收器的负载信息、所述接收器支持最大激励器的数量信息或所述激励器的位置信息。
- 根据权利要求1至10中任一项所述的方法,其特征在于,所述第一信息还包括第二拓扑的信息,所述第一拓扑为通过调整所述接收器和所述激励器之间的第二拓扑获得。
- 一种无线通信的方法,其特征在于,所述方法包括:激励器从集中式节点接收第三信息,所述第三信息用于指示接收器的标识信息,所述接收器由所述集中式节点根据第一信息确定,所述接收器和所述激励器用于射频识别,所述第一信息包括所述接收器的状态信息和/或所述激励器的状态信息。
- 根据权利要求12所述的方法,其特征在于,所述激励器部署在第一分布式节点上。
- 根据权利要求12或13所述的方法,其特征在于,所述接收器部署在所述集中式节点上。
- 根据权利要求12或13所述的方法,其特征在于,所述接收器部署在第二分布式节点上。
- 根据权利要求12至15中任一项所述的方法,其特征在于,所述方法运用于IAB系统,所述集中式节点为所述IAB系统中的宿主节点,第一分布式节点为所述IAB系统中的第一IAB节点,第二分布式节点为所述IAB系统中的第二IAB节点。
- 根据权利要求16所述的方法,其特征在于,所述激励器部署在第一分布式节点上,所述方法还包括:所述激励器向所述集中式节点发送第七信息,所述第七信息用于指示所述集中式节点选择第二AMF网元,所述第二AMF网元支持所述激励器授权。
- 根据权利要求12至17中任一项所述的方法,其特征在于,所述方法还包括:所述激励器从所述集中式节点接收广播信息,所述广播信息用于指示所述激励器选择父节点。
- 根据权利要求12至18中任一项所述的方法,其特征在于,所述第一信息包括以下信息中的至少一项:所述接收器的负载信息、所述接收器支持最大激励器的数量信息或所述激励器的位置信息。
- 根据权利要求12至19中任一项所述的方法,其特征在于,所述第一信息还包括第二拓扑的信息,所述第一拓扑为通过调整所述接收器和所述激励器之间的第二拓扑获得。
- 一种无线通信的方法,其特征在于,所述方法包括:接收器从集中式节点接收第二信息,所述第二信息用于指示第一拓扑,所述第一拓扑 由所述集中式节点根据第一信息确定,所述接收器和所述激励器用于射频识别,所述第一信息包括所述接收器的状态信息和/或所述激励器的状态信息。
- 根据权利要求21所述的方法,其特征在于,所述激励器部署在第一分布式节点上。
- 根据权利要求21或22所述的方法,其特征在于,所述接收器部署在所述集中式节点上。
- 根据权利要求21或22所述的方法,其特征在于,所述接收器部署在第二分布式节点上。
- 根据权利要求21至24中任一项所述的方法,其特征在于,所述方法运用于IAB系统,所述集中式节点为所述IAB系统中的宿主节点,所述第一分布式节点为所述IAB系统中的第一IAB节点,所述第二分布式节点为所述IAB系统中的第二IAB节点。
- 根据权利要求25所述的方法,其特征在于,所述接收器部署在第二分布式节点上,所述方法还包括:所述接收器向所述集中式节点发送第四信息,所述第四信息用于指示所述集中式节点选择第一AMF网元,所述第一AMF网元支持所述接收器授权。
- 根据权利要求24或25所述的方法,其特征在于,所述方法还包括:所述接收器从所述集中式节点接收广播信息,所述广播信息用于指示所述接收器选择父节点。
- 根据权利要求21至27中任一项所述的方法,其特征在于,所述第一信息包括以下信息中的至少一项:所述接收器的负载信息、所述接收器支持最大激励器的数量信息或所述激励器的位置信息。
- 根据权利要求21至28中任一项所述的方法,其特征在于,所述第一信息还包括第二拓扑的信息,所述第一拓扑为通过调整所述接收器和所述激励器之间的第二拓扑获得。
- 一种通信装置,其特征在于,包括处理器,所述处理器与存储器耦合,所述存储器用于存储计算机程序或指令,所述处理器用于执行所述计算机程序或指令,使得权利要求1至11中任一所述的方法。
- 一种通信装置,其特征在于,包括处理器,所述处理器与存储器耦合,所述存储器用于存储计算机程序或指令,所述处理器用于执行所述计算机程序或指令,使得权利要求12至20中任一所述的方法。
- 一种通信装置,其特征在于,包括处理器,所述处理器与存储器耦合,所述存储器用于存储计算机程序或指令,所述处理器用于执行所述计算机程序或指令,使得权利要求21至29中任一所述的方法。
- 一种计算机可读存储介质,其特征在于,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至11中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求12至20中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求21至29中任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求1至11中任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求12至20中任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求21至29中任一项所述的方法。
- 一种芯片系统,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片系统的通信设备执行如权利要求1至11中任意一项所述的方法。
- 一种芯片系统,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片系统的通信设备执行如权利要求12至20中任意一项所述的方法。
- 一种芯片系统,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片系统的通信设备执行如权利要求21至29中任意一项所述的方法。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21921890.6A EP4277140A4 (en) | 2021-01-29 | 2021-01-29 | METHOD AND DEVICE FOR WIRELESS COMMUNICATION |
PCT/CN2021/074496 WO2022160288A1 (zh) | 2021-01-29 | 2021-01-29 | 一种无线通信的方法和装置 |
BR112023015180A BR112023015180A2 (pt) | 2021-01-29 | 2021-01-29 | Métodos e aparelhos de comunicação sem fio, meios de armazenamento legíveis por computador e sistemas de chip |
KR1020237029249A KR20230134594A (ko) | 2021-01-29 | 2021-01-29 | 무선 통신 방법 및 장치 |
CN202180092097.1A CN116803012A (zh) | 2021-01-29 | 2021-01-29 | 一种无线通信的方法和装置 |
US18/361,552 US20230379005A1 (en) | 2021-01-29 | 2023-07-28 | Wireless communication method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/074496 WO2022160288A1 (zh) | 2021-01-29 | 2021-01-29 | 一种无线通信的方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/361,552 Continuation US20230379005A1 (en) | 2021-01-29 | 2023-07-28 | Wireless communication method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022160288A1 true WO2022160288A1 (zh) | 2022-08-04 |
Family
ID=82652903
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/074496 WO2022160288A1 (zh) | 2021-01-29 | 2021-01-29 | 一种无线通信的方法和装置 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20230379005A1 (zh) |
EP (1) | EP4277140A4 (zh) |
KR (1) | KR20230134594A (zh) |
CN (1) | CN116803012A (zh) |
BR (1) | BR112023015180A2 (zh) |
WO (1) | WO2022160288A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102799838A (zh) * | 2011-05-22 | 2012-11-28 | 成都阿艾夫通信有限公司 | Rfid电子标签随机跳频方法 |
CN102968603A (zh) * | 2006-12-28 | 2013-03-13 | 香港理工大学 | 优化射频识别部署的方法和射频识别部署优化器 |
CN109815759A (zh) * | 2019-01-24 | 2019-05-28 | 电子科技大学 | 一种基于超高频rfid的远距离通信组网系统及组网方法 |
US20190311163A1 (en) * | 2007-03-23 | 2019-10-10 | Mojix, Inc. | RFID Systems Using Distributed Exciter Network |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU1655301A (en) * | 1999-11-05 | 2001-05-14 | Zeus Wireless, Inc. | Store and forward communications method for data transfer between spread spectrum, frequency hopping data telemetry transceivers |
US10855814B2 (en) * | 2017-10-20 | 2020-12-01 | Comcast Cable Communications, Llc | Non-access stratum capability information |
-
2021
- 2021-01-29 WO PCT/CN2021/074496 patent/WO2022160288A1/zh active Application Filing
- 2021-01-29 BR BR112023015180A patent/BR112023015180A2/pt unknown
- 2021-01-29 EP EP21921890.6A patent/EP4277140A4/en active Pending
- 2021-01-29 KR KR1020237029249A patent/KR20230134594A/ko active Pending
- 2021-01-29 CN CN202180092097.1A patent/CN116803012A/zh active Pending
-
2023
- 2023-07-28 US US18/361,552 patent/US20230379005A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102968603A (zh) * | 2006-12-28 | 2013-03-13 | 香港理工大学 | 优化射频识别部署的方法和射频识别部署优化器 |
US20190311163A1 (en) * | 2007-03-23 | 2019-10-10 | Mojix, Inc. | RFID Systems Using Distributed Exciter Network |
CN102799838A (zh) * | 2011-05-22 | 2012-11-28 | 成都阿艾夫通信有限公司 | Rfid电子标签随机跳频方法 |
CN109815759A (zh) * | 2019-01-24 | 2019-05-28 | 电子科技大学 | 一种基于超高频rfid的远距离通信组网系统及组网方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4277140A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP4277140A1 (en) | 2023-11-15 |
EP4277140A4 (en) | 2024-03-20 |
BR112023015180A2 (pt) | 2023-10-03 |
CN116803012A (zh) | 2023-09-22 |
US20230379005A1 (en) | 2023-11-23 |
KR20230134594A (ko) | 2023-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102405610B (zh) | 在无线通信系统中使用中继节点的方法 | |
JP7516578B2 (ja) | Iabネットワーク通信方法及び関連デバイス | |
WO2021147107A1 (zh) | 一种通信方法及装置 | |
JP7557664B2 (ja) | Iabノード構成方法及び通信装置 | |
JP2021523638A (ja) | 情報伝送方法および装置 | |
KR102416256B1 (ko) | 무선 백홀 통신 처리 방법 및 관련 디바이스 | |
EP3301966B1 (en) | Radio access network device, data processing method and ip packet processing method | |
CN114071510B (zh) | 一种通信方法及装置 | |
WO2020192654A1 (zh) | 配置无线链路控制rlc承载的方法和装置 | |
WO2023011245A1 (zh) | 通信方法和通信装置 | |
EP4213514A1 (en) | Data transmission method and apparatus | |
JP7643542B2 (ja) | Iabノードのマイグレーション方法及び装置 | |
WO2023020046A1 (zh) | 一种通信方法及通信装置 | |
CN119605315A (zh) | 用于控制用户设备的方法和装置 | |
US20230262827A1 (en) | Communication method applied to integrated access and backhaul iab system and related device | |
US20220183090A1 (en) | Backhaul channel management for iab networks | |
WO2022160288A1 (zh) | 一种无线通信的方法和装置 | |
US20220182910A1 (en) | Data Processing Method, Apparatus, And System | |
CN106454754A (zh) | 数据传输方法及宽带集群系统 | |
JP7088121B2 (ja) | 通信システム、通信装置、及び端末装置 | |
WO2022151298A1 (zh) | 群组迁移方法、装置和系统 | |
WO2022056708A1 (zh) | 通信设备、数据传输的方法和装置 | |
CN114390622A (zh) | 一种信息传输方法、装置及通信设备 | |
WO2019232683A1 (zh) | 小区建立的方法和装置 | |
US20240080262A1 (en) | Communication method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21921890 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202180092097.1 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202317052022 Country of ref document: IN |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112023015180 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2021921890 Country of ref document: EP Effective date: 20230812 |
|
ENP | Entry into the national phase |
Ref document number: 20237029249 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020237029249 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112023015180 Country of ref document: BR Kind code of ref document: A2 Effective date: 20230727 |