Access method and device

文档序号:1676141 发布日期:2019-12-31 浏览:22次 中文

阅读说明:本技术 接入方法和设备 (Access method and device ) 是由 金巴 吴凯 鲍炜 于 2018-06-21 设计创作,主要内容包括:本发明实施例提供一种接入方法和设备,方法包括:向第二IAB节点发送接入请求消息;接收所述第二IAB节点发送的指示消息,所述指示消息指示所述第二IAB节点允许或禁止所述第一IAB节点接入;其中,所述指示消息是由所述第二IAB节点根据预留接入资源和所述接入请求消息确定的;所述第二IAB节点为所述第一IAB节点的施主IAB节点或者父IAB节点或者子IAB节点。本发明的实施例中第二IAB节点能够根据预留接入资源和来自第一IAB节点的接入请求消息,向第一IAB节点发送指示消息,该指示消息指示第二IAB节点允许或禁止第一IAB节点接入,这样能够确保第一IAB节点尽快接入到适合的IAB节点,从而解决无线回传场景下IAB接入其它IAB的问题。(The embodiment of the invention provides an access method and equipment, wherein the method comprises the following steps: sending an access request message to a second IAB node; receiving an indication message sent by the second IAB node, wherein the indication message indicates that the second IAB node allows or prohibits the first IAB node to access; wherein the indication message is determined by the second IAB node according to reserved access resources and the access request message; the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node. In the embodiment of the invention, the second IAB node can send the indication message to the first IAB node according to the reserved access resource and the access request message from the first IAB node, and the indication message indicates the second IAB node to allow or forbid the access of the first IAB node, so that the first IAB node can be ensured to be accessed to the proper IAB node as soon as possible, and the problem that the IAB is accessed to other IABs under a wireless backhaul scene is solved.)

1. An access method applied to a first Integrated Access Backhaul (IAB) node, the method comprising:

sending an access request message to a second IAB node;

receiving an indication message sent by the second IAB node, wherein the indication message indicates that the second IAB node allows or prohibits the first IAB node to access;

wherein the indication message is determined by the second IAB node according to reserved access resources and the access request message; the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

2. The method of claim 1, further comprising:

judging whether the indication message is received or not;

if the indication message is not received, continuing to send an access request message to the second IAB node;

and if the indication message is received, carrying out corresponding processing according to the indication message.

3. The method of claim 2, wherein if the indication message is not received, the method further comprises:

acquiring the times of sending the access request message;

and when the times is larger than or equal to the preset times, stopping sending the access request message to the second IAB node.

4. The method according to any one of claims 1 to 3,

prior to the sending the access request message to the second IAB node, the method further comprises:

receiving information of reserved access resources of the first IAB node sent by the second IAB node;

the sending the access request message to the second IAB node includes:

and sending an access request message to the second IAB node according to the information of the reserved access resources of the first IAB node.

5. The method according to claim 1, wherein the indication message is a random access response message carried on a Physical Downlink Control Channel (PDCCH) or a Physical Downlink Shared Channel (PDSCH), and the random access response message includes: a reserved bit or a specific code point for indicating that access to the first IAB node is forbidden.

6. The method of claim 1,

the second IAB node is a donor IAB node or a parent IAB node or a child IAB node that the first IAB node has previously accessed, or,

the second IAB node is a donor IAB node or a parent IAB node or a child IAB node around the first IAB node.

7. The method of claim 1, wherein prior to the sending the access request message to the second IAB node, the method further comprises:

judging whether the second IAB node reserves access resources for the first IAB node or not;

and if the second IAB node reserves the access resource for the first IAB node, executing the step of sending the access request message to the second IAB node.

8. The method according to any of claims 1 to 7, wherein the reserved access resources comprise one or more of:

a random access preamble;

window configuration of the random access response message; and, the number of retransmissions of the random access channel.

9. An access method applied to a second IAB node, the method comprising:

receiving an access request message sent by a first IAB node;

according to the reserved access resource and the access request message, sending an indication message to the first IAB node, wherein the indication message indicates the second IAB node to allow or forbid the access of the first IAB node;

wherein the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

10. The method of claim 9, further comprising:

sending information of reserved access resources of the first IAB node to the first IAB node;

the receiving an access request message sent by the first IAB node includes:

and receiving an access request message sent by the second IAB node according to the information of the reserved access resource of the first IAB node.

11. The method of claim 10,

the second IAB node is a donor IAB node or a parent IAB node or a child IAB node that the first IAB node has previously accessed, or,

the second IAB node is a donor IAB node or a parent IAB node or a child IAB node around the first IAB node.

12. The method according to claim 9, wherein the indication message is a Random Access Response (RAR) message carried on a PDCCH or a PDSCH, and wherein the RAR message comprises: a reserved bit or a specific code point for indicating that access to the first IAB node is forbidden.

13. The method according to any of claims 9 to 12, wherein the reserved access resources comprise one or more of:

a random access preamble;

window configuration of the random access response message; and, the number of retransmissions of the random access channel.

14. A first IAB node, comprising:

a first sending module, configured to send an access request message to a second IAB node;

a first receiving module, configured to receive an indication message sent by the second IAB node, where the indication message indicates that the second IAB node allows or prohibits the access of the first IAB node;

wherein the indication message is determined by the second IAB node according to reserved access resources and the access request message; the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

15. The first IAB node of claim 14, wherein the first IAB node further comprises: the first processing module is used for judging whether the first receiving module receives the indication message; if the indication message is not received, indicating the first sending module to continue sending an access request message to the second IAB node; and if the indication message is received, carrying out corresponding processing according to the indication message.

16. The first IAB node of claim 15, wherein the first processing module is further configured to obtain the number of times the access request message is sent when the indication message is not received by the first receiving module; and when the number of times is greater than or equal to a preset number of times, the first sending module is instructed to stop sending the access request message to the second IAB node.

17. The first IAB node of any of claims 14 to 16, wherein the first receiving module is further configured to receive information of reserved access resources of the first IAB node sent by a second IAB node before the first sending module sends an access request message to the second IAB node;

the first sending module is further configured to: and sending an access request message to the second IAB node according to the information of the reserved access resources of the first IAB node.

18. The first IAB node of claim 14, wherein the indication message is a Random Access Response (RAR) message carried on a PDCCH or a PDSCH, and wherein the RAR message comprises: a reserved bit or a specific code point for indicating that access to the first IAB node is forbidden.

19. The first IAB node of claim 14,

the second IAB node is a donor IAB node or a parent IAB node that the first IAB node has previously accessed, or,

the second IAB node is a donor IAB node or a parent IAB node around the first IAB node.

20. The first IAB node of claim 14, wherein the first IAB node further comprises: a second processing module, configured to determine whether the second IAB node reserves access resources for the first IAB node;

and if the second IAB node reserves access resources for the first IAB node, indicating the first sending module to send an access request message to the second IAB node.

21. The first IAB node of any of claims 14 to 20, wherein the reserved access resources comprise one or more of:

a random access preamble;

window configuration of the random access response message; and, the number of retransmissions of the random access channel.

22. A second IAB node, comprising:

a second receiving module, configured to receive an access request message sent by a first IAB node;

a second sending module, configured to send an indication message to the first IAB node according to the reserved access resource and the access request message, where the indication message indicates that the second IAB node allows or prohibits the access of the first IAB node;

wherein the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

23. The second IAB node of claim 22,

the second sending module is further configured to send the information of the reserved access resource to the first IAB node;

the second receiving module is further configured to receive an access request message sent by the second IAB node according to the information of the reserved access resource.

24. The second IAB node according to claim 22, wherein the indication message is a random access response, RAR, message carried on the PDCCH or PDSCH, the random access response message comprising: a reserved bit or a specific code point for indicating that access to the first IAB node is forbidden.

25. The second IAB node of claim 22,

the second IAB node is a donor IAB node or a parent IAB node or a child IAB node that the first IAB node has previously accessed, or,

the second IAB node is a donor IAB node or a parent IAB node or a child IAB node around the first IAB node.

26. The second IAB node according to any of the claims 22 to 25, wherein the reserved access resources comprise one or more of:

a random access preamble;

window configuration of the random access response message; and, the number of retransmissions of the random access channel.

27. An IAB node, comprising: a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the access method according to any one of claims 1 to 8; or the steps of the access method according to any of claims 9 to 13.

28. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the access method according to one of claims 1 to 8; or the steps of the access method according to any of claims 9 to 13.

Technical Field

The embodiment of the invention relates to the technical field of communication, in particular to an access method and equipment.

Background

Relay (Relay) technology is to add one or more Relay nodes between a base station and User Equipment (UE), where the Relay nodes are responsible for forwarding a wireless signal one or more times, that is, the wireless signal may reach the base station or the UE through multiple hops. Taking the simpler two-hop relay as an example, one link of the base station-UE is divided into two links of the base station-relay station and the relay station-UE, so that there is an opportunity to replace one link with poor quality with two links with better quality to obtain higher link capacity and better coverage.

The use of wireless relays as backhaul is being investigated in the fifth generation communication technology (5G). Wireless relay backhaul techniques also include the adoption of wireless backhaul links above 6 GHz. A higher network frequency band results in a shorter transmission distance of the wireless backhaul node. In order to achieve better multi-transmission effectively, the distance between the wireless backhaul nodes is also shorter, and the deployment of the wireless backhaul nodes is more intensive.

Therefore, a technical solution for accessing an Integrated Access Backhaul (IAB) node to another IAB node in a wireless Backhaul scenario is needed.

Disclosure of Invention

An object of the embodiments of the present invention is to provide an access method and an access device, which solve the problem that an IAB accesses another IAB in a wireless backhaul scenario.

In a first aspect, an access method is provided, which is applied to a first IAB node, and the method includes:

sending an access request message to a second IAB node;

receiving an indication message sent by the second IAB node, wherein the indication message indicates that the second IAB node allows or prohibits the first IAB node to access;

wherein the indication message is determined by the second IAB node according to reserved access resources and the access request message; the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

In a second aspect, an access method is further provided, where the access method is applied to a second IAB node, and the method includes:

receiving an access request message sent by a first IAB node;

according to the reserved access resource and the access request message, sending an indication message to the first IAB node, wherein the indication message indicates the second IAB node to allow or forbid the access of the first IAB node;

wherein the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

In a third aspect, there is also provided a first IAB node, comprising:

a first sending module, configured to send an access request message to a second IAB node;

a first receiving module, configured to receive an indication message sent by the second IAB node, where the indication message indicates that the second IAB node allows or prohibits the access of the first IAB node;

wherein the indication message is determined by the second IAB node according to reserved access resources and the access request message; the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

In a fourth aspect, there is also provided a second IAB node, comprising:

a second receiving module, configured to receive an access request message sent by a first IAB node;

a second sending module, configured to send an indication message to the first IAB node according to the reserved access resource and the access request message, where the indication message indicates that the second IAB node allows or prohibits the access of the first IAB node;

wherein the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

In a fifth aspect, there is also provided an IAB node, comprising: a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the access method according to the first or second aspect.

In a sixth aspect, there is also provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the access method according to the first or second aspect.

In the embodiment of the present invention, a first IAB node sends an access request message to a second IAB node, and then receives an indication message sent by the second IAB node according to a reserved access resource (which may include a reserved access resource configured by the second IAB node for the first IAB node or may not include a reserved access resource configured by the second IAB node for the first IAB node) and the access request message, where the indication message indicates the second IAB node to allow or prohibit the first IAB node to access, so that the first IAB node can be ensured to access to a suitable IAB node as soon as possible, and thus the problem that the IAB accesses to other IABs in a wireless backhaul scenario is solved.

Drawings

Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:

FIG. 1 is a block diagram of a wireless communication system according to an embodiment of the present invention;

fig. 2 is a flowchart of an access method according to an embodiment of the present invention;

FIG. 3 is a second flowchart of an access method according to an embodiment of the present invention;

fig. 4 is a third flowchart of an access method according to an embodiment of the present invention;

fig. 5 is a schematic structural diagram of a first IAB node according to an embodiment of the present invention;

fig. 6 is a schematic structural diagram of a second IAB node according to an embodiment of the present invention;

fig. 7 is a second schematic structural diagram of the first IAB node according to the embodiment of the present invention;

fig. 8 is a second schematic structural diagram of a second IAB node according to the second embodiment of the present invention.

Detailed Description

The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

The terms "comprises," "comprising," or any other variation thereof, in the description and claims of this application, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Furthermore, the use of "and/or" in the specification and claims means that at least one of the connected objects, such as a and/or B, means that three cases, a alone, B alone, and both a and B, exist.

In the embodiments of the present invention, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.

In the embodiment of the present invention, the wireless communication system may be a New Radio (NR) system, a Long Term Evolution (LTE) system, or a subsequent Evolution communication system of a fifth generation communication technology (5G). Referring to fig. 1, the wireless communication system includes: UE18, IAB nodes 11-17, and Donor IAB (DIAB) node 10. One or more of the IAB nodes 11-17 are connected to the DIAB node 10 over a wireless interface. The IAB nodes 11-17 are connected through a wireless interface.

It should be noted that the IAB nodes 11-17 in fig. 1 may be an entire base station or separate DUs for a Centralized Unit (CU) and a Distributed Unit (DU). It is understood that in the case of CU and DU separation, one CU can manage a plurality of DUs. The base Station may be a Base Transceiver Station (BTS) in GSM or CDMA, a base Station (NodeB) in WCDMA, an evolved Node B (eNB or e-NodeB) in LTE, and a 5G base Station (gNB), and embodiments of the present invention are not limited thereto.

As shown in fig. 1, the IAB node 17 is not directly connected to the DIAB node 10, and the IAB node 17 may perform backhaul (backhaul) processing through the IAB node 14, the IAB node 12, the IAB node 16, or the like, where the IAB node 13, the IAB node 14, the IAB node 15, and the IAB node 16 in the figure may be Parent IAB (Parent IAB, PIAB) nodes of the IAB node 17, that is, the IAB node 17 is a child IAB node of the IAB node 13, the IAB node 14, the IAB node 15, and the IAB node 16. It is to be understood that the IAB node 17 may also be considered one or more of its PIAB nodes as one or more DIAB nodes of the IAB node 17.

When a Link Failure (Link Failure) occurs in backhaul of an IAB node and its PIAB node or DIAB node or sub-IAB node, the IAB node needs to select a new PIAB node or DIAB node or sub-IAB node as soon as possible.

Referring to fig. 2, an embodiment of the present invention provides an access method, where an execution main body of the method is a first IAB node, and the method includes the following specific steps:

step 201: sending an access request message to a second IAB node;

step 202: and receiving an indication message sent by the second IAB node, wherein the indication message indicates that the second IAB node allows or forbids the access of the first IAB node.

In the embodiment of the invention, the indication message can be determined by the second IAB node according to the reserved access resource (such as random access channel resource and the like) and the access request message;

it should be noted that the reserved access resource may include a reserved access resource configured by the second IAB node for the first IAB node, or may not include a reserved access resource configured by the second IAB node for the first IAB node.

Specifically, the reserving access resources may include: the second IAB node is configured with reserved access resources of the first IAB node. For example: when the second IAB node reserves access resources for the first IAB node, the second IAB node may notify the first IAB node of access or notify the first IAB node of prohibition of access after receiving the access request message;

specifically, the reserved access resources may not include: the second IAB node configures reserved access resources of the first IAB node, i.e. the reserved access resources of the first IAB node are not configured. For example: when the second IAB node does not reserve access resources for the first IAB node, the second IAB node may notify the first IAB node of access or may notify the first IAB node of prohibition of access after receiving the access request message.

In the embodiment of the present invention, the second IAB node may be a Donor IAB (dinor IAB, DIAB) node or a Parent IAB (Parent IAB, PIAB) node or a child IAB node of the first IAB node, so that bidirectional configuration between the two IAB nodes can be ensured.

In one embodiment of the present invention, after step 202, the method further comprises: judging whether an indication message is received or not; if the indication message is not received, continuing to send an access request message to the second IAB node; if the indication message is received, corresponding processing is carried out according to the indication message, for example: and processing the access to the second IAB node or selecting other IAB nodes to continue initiating the access. Therefore, the first IAB node can be ensured to receive the indication message for responding to the access request message, and the first IAB node can be ensured to carry out corresponding processing according to the indication message in time.

In another embodiment of the present invention, if the indication message is not received, the method may further include: acquiring the times of sending the access request message; and when the times is larger than or equal to the preset times, stopping sending the access request message to the second IAB node. For example: if the number of times of sending the access request message is 5 times currently and the predetermined number of times is 4 times currently, the sending of the access request message to the second IAB node is stopped, so that the number of the access request messages sent by the first IAB node to the second IAB node can be controlled, and the waste of resources is avoided.

In an embodiment of the present invention, before step 201, the method may further include: receiving information of reserved access resources of a first IAB node sent by a second IAB node, namely the second IAB node configures the reserved access resources for the first IAB node; based on this, in step 202, the first IAB node sends an access request message to the second IAB node according to the information of the reserved access resources of the first IAB node. The information of the reserved access resources is used for indicating the reserved access resources configured by the second IAB node for the first IAB node.

In an embodiment of the present invention, the indication message may be a Random Access Response (RAR) message carried on a Physical Downlink Control Channel (PDCCH) or a Physical Downlink Shared Channel (PDSCH), where the RAR message includes: a reserved bit (reserved bit) or a specific code point for indicating that the first IAB node is forbidden to access.

For example: a Modulation and Coding Scheme (MCS) is 4 bits (bit), and when all the bits are set to "1", it indicates that the first IAB node is prohibited from accessing, that is, "1111" indicates that the second IAB node prohibits the first IAB node from accessing, it should be noted that a specific form of a specific code point is not limited in the embodiment of the present invention.

In one embodiment of the present invention, the second IAB node may be a donor IAB node or a parent IAB node or a child IAB node that the first IAB node has previously accessed, or the second IAB node may be a donor IAB node or a parent IAB node or a child IAB node around the first IAB node, and the surrounding donor IAB node or the parent IAB node or the child IAB node may transmit the configured information of the reserved access resource to the first IAB node through the second IAB node. That is, the second IAB node may be an IAB node that was previously accessed by the first IAB node, or may be an IAB node that has not been previously accessed.

In one embodiment of the present invention, before sending the access request message to the second IAB node, the method may further comprise: judging whether a second IAB node reserves access resources for a first IAB node or not; if the second IAB node reserves the access resource for the first IAB node, executing the step of sending an access request message to the second IAB node; and if the second IAB node does not reserve the access resource for the first IAB node, the step of sending the access request message to the second IAB node is not executed. That is, when the first IAB node is not configured to reserve access resources, the first IAB node can quickly give up accessing the second IAB node and quickly access other DIAB nodes or PIAB nodes or sub-IAB nodes.

In one embodiment of the invention, reserving access resources may comprise one or more of: a random access preamble (preamble) for identifying a UE identity at the time of random access; window configuration of the random access response message; and, the number of retransmissions of the random access channel. It should be noted that, in the embodiment of the present invention, the window configuration of the random access response message and the retransmission number of the random access channel are not specifically limited.

In the embodiment of the invention, the first IAB node sends the access request message to the second IAB node, and then receives the indication message sent by the second IAB node according to the reserved access resource and the access request message, and the indication message indicates the second IAB node to allow or forbid the access of the first IAB node, so that the first IAB node can be ensured to be accessed to the proper IAB node as soon as possible, and the problem that the IAB is accessed to other IABs in a wireless backhaul scene is solved.

Referring to fig. 3, an execution subject of the method may be a second IAB node, where the second IAB node is a Donor IAB (dinor IAB, DIAB) node or a parent IAB (parentaib, PIAB) node or a child IAB node of a first IAB node, and the method includes the following specific steps:

step 301: receiving an access request message sent by a first IAB node;

step 302: and sending an indication message to the first IAB node according to the reserved access resource and the access request message configured by the second IAB node for the first IAB node, wherein the indication message indicates that the second IAB node allows or forbids the access of the first IAB node.

It should be noted that the reserved access resource may include a reserved access resource configured by the second IAB node for the first IAB node, or may not include a reserved access resource configured by the second IAB node for the first IAB node.

Specifically, the reserving access resources may include: the second IAB node is configured with reserved access resources of the first IAB node. For example: when the second IAB node reserves access resources for the first IAB node, the second IAB node may notify the first IAB node of access or notify the first IAB node of prohibition of access after receiving the access request message;

specifically, the reservation of access resources may not include: the second IAB node configures reserved access resources of the first IAB node, i.e. the reserved access resources of the first IAB node are not configured. For example: when the second IAB node does not reserve access resources for the first IAB node, the second IAB node may notify the first IAB node of access or may notify the first IAB node of prohibition of access after receiving the access request message.

In one embodiment of the present invention, before step 301 or after step 301, or performed simultaneously with step 301, the method further comprises: sending the information of the reserved access resource of the first IAB node to the first IAB node; based on this, the step 301 specifically includes: and receiving an access request message sent by the first IAB node according to the information of the reserved access resources of the first IAB node.

In an embodiment of the present invention, the indication message may be a RAR message carried on a PDCCH or a PDSCH, and the random access response message includes: reserved bits (reserved bits) or specific code points for indicating that the first IAB node is prohibited from accessing, for example: a Modulation and Coding Scheme (MCS) is 4 bits (bit), and when all the bits are set to "1", it indicates that the first IAB node is prohibited from accessing, that is, "1111" indicates that the second IAB node prohibits the first IAB node from accessing, it should be noted that a specific form of a specific code point is not limited in the embodiment of the present invention.

In one embodiment of the invention, reserving access resources may comprise one or more of: a random access preamble; window configuration of the random access response message; and, the number of retransmissions of the random access channel. It should be noted that, in the embodiment of the present invention, the window configuration of the random access response message and the retransmission number of the random access channel are not specifically limited.

In the embodiment of the invention, the second IAB node is received to send the indication message to the first IAB node according to the reserved access resource and the access request message, and the indication message indicates the second IAB node to allow or forbid the access of the first IAB node, so that the first IAB node can be ensured to be accessed to the proper IAB node as soon as possible, and the problem that the IAB is accessed to other IABs under a wireless backhaul scene is solved.

Referring to fig. 4, an embodiment of the present invention provides another access method, which includes the following specific steps:

step 401: IAB1 successfully accesses PIAB1 or DIAB1, PIAB1 or DIAB1 configures reserved access resources for IAB1, or informs surrounding PIAB2 or DIAB2 to configure reserved access resources for IAB1, for example: random Access Channel (RACH) resources.

It should be noted that IAB1 may also be understood as a first IAB node, PIAB1 may also be understood as a first parent IAB node, DIAB1 may also be understood as a first donor IAB node, PIAB2 may also be understood as a second parent IAB node, and DIAB2 may also be understood as a second donor IAB node.

Step 402: when the PIAB2 or DIAB2 receives the notice of PIAB1 or DIAB1, the PIAB2 or DIAB2 allocates reserved access resources for the IAB 1;

wherein reserving access resources comprises one or more of:

a random access preamble (preamble) for identifying the UE identity during random access;

window configuration of random access response message (MSG 2);

random Access Channel (RACH) retransmission times.

It should be noted that step 402 is an optional step.

Step 403: after the PIAB1 or DIAB1 or PIAB2 or DIAB2 configures reserved access resources for IAB1, the PIAB1 or DIAB1 or PIAB2 or DIAB2 issues information of the reserved access resources to IAB 1;

in step 403, if the IAB1 has not been connected to the PIAB2 or the DIAB2, the PIAB2 or the DIAB2 may issue the information of reserving the access resource to the IAB1 through the PIAB1 or the DIAB1 to which the IAB1 has been connected.

Step 404: when the IAB1 initiates access to the PIAB1 or DIAB1 or PIAB2 or DIAB2, corresponding processing is carried out;

example 1: if the preamble that the IAB1 initiates access is a preamble reserved by the PIAB1 or the DIAB1 or the PIAB2 or the DIAB2, the PIAB1 or the DIAB1 or the PIAB2 or the DIAB2 actions include:

(a) if the PIAB1 or DIAB1 or PIAB2 or DIAB2 can accept IAB1, PIAB1 or DIAB1 or PIAB2 or DIAB2 informs IAB1 of access;

(b) if the PIAB1 or the DIAB1 or the PIAB2 or the DIAB2 cannot accommodate the IAB1, the PIAB1 or the DIAB1 or the PIAB2 or the DIAB2 may indicate that the IAB1 is forbidden to access through a reserved bit (reserved bit) or a specific code point in the RAR PDCCH or PDSCH, it is understood that the embodiments of the present invention do not limit the specific form of the reserved bit and the specific code point.

Example 2: if the PIAB1 or DIAB1 or PIAB2 or DIAB2 does not configure reserved access resources for IAB 1:

(a) IAB1 behaviors include:

IAB1 defaults to the Cell (Cell) of PIAB1 or DIAB1 or PIAB2 or DIAB2 not being available for IAB1 access;

(b) IAB1 initiates access at PIAB1 or DIAB1 or PIAB2 or DIAB 2. When the PIAB1 or DIAB1 or PIAB2 or DIAB2 receives the preamble of IAB1, the PIAB1 or DIAB1 or PIAB2 or DIAB2 behavior may include any of:

(1) notifying the IAB1 of access; and

(2) the barring of IAB1 Access is indicated at a reserved bit or a specific code point in a Random Access Response (RAR) PDCCH/PDSCH.

It should be noted that if the PIAB1 or the DIAB1 or the PIAB2 or the DIAB2 does not return the RAR to the IAB1, the IAB1 may try to send the preamble until the number of times of sending the preamble exceeds the preset maximum transmission number.

The embodiment of the present invention further provides a first IAB node, and since the principle of solving the problem of the first IAB node is similar to the access method in the embodiment of the present invention, the implementation of the first IAB node may refer to the implementation of the method, and the repetition points are not described again.

Referring to fig. 5, the first IAB node 500 includes:

a first sending module 501, configured to send an access request message to a second IAB node;

a first receiving module 502, configured to receive an indication message sent by the second IAB node, where the indication message indicates that the second IAB node allows or prohibits the access of the first IAB node;

wherein the indication message may be determined by the second IAB node according to reserved access resources and the access request message; the second IAB node may be a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

In one embodiment of the present invention, the first IAB node may further comprise: a processing module, configured to determine whether the first receiving module 502 receives the indication message; if the indication message is not received, indicating the first sending module to continue sending an access request message to the second IAB node; and if the indication message is received, carrying out corresponding processing according to the indication message.

In another embodiment of the present invention, the processing module may be further configured to obtain, when the first receiving module does not receive the indication message, the number of times of sending the access request message; and when the number of times is greater than or equal to a preset number of times, the first sending module is instructed to stop sending the access request message to the second IAB node.

In an embodiment of the present invention, the first receiving module 502 may be further configured to receive information of reserved access resources of a first IAB node sent by a second IAB node before the first sending module sends an access request message to the second IAB node;

the first transmitting module may be further configured to: and sending an access request message to the second IAB node according to the information of the reserved access resources of the first IAB node.

In an embodiment of the present invention, the indication message is a random access response RAR message carried on a PDCCH or a PDSCH, and the random access response message includes: a reserved bit or a specific code point for indicating that access to the first IAB node is forbidden.

In one embodiment of the present invention, the second IAB node may be a donor IAB node or a parent IAB node or a child IAB node that the first IAB node has previously accessed, or,

the second IAB node may be a donor IAB node or a parent IAB node or a child IAB node around the first IAB node.

In one embodiment of the invention, the reserved access resources may comprise one or more of: a random access preamble; window configuration of the random access response message; and, the number of retransmissions of the random access channel.

The first IAB node provided in the embodiment of the present invention may execute the foregoing method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.

The embodiment of the present invention further provides a second IAB node, and since the principle of solving the problem of the second IAB node is similar to the access method in the embodiment of the present invention, the implementation of the second IAB node may refer to the implementation of the method, and the repeated points are not described again.

Referring to fig. 6, the second IAB node 600 includes:

a second receiving module 601, configured to receive an access request message sent by a first IAB node;

a second sending module 602, configured to send an indication message to the first IAB node according to the reserved access resource and the access request message, where the indication message indicates that the second IAB node allows or prohibits the access of the first IAB node;

the second IAB node may be a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

In an embodiment of the present invention, the second sending module 602 may be further configured to send, to the first IAB node, information of reserved access resources of the first IAB node;

the second receiving module 601 may be further configured to receive an access request message sent by the second IAB node according to the information of the reserved access resource of the first IAB node.

In an embodiment of the present invention, the indication message may be a random access response RAR message carried on a PDCCH or a PDSCH, and the random access response message may include: a reserved bit or a specific code point for indicating that access to the first IAB node is forbidden.

In one embodiment of the present invention, the second IAB node may be a donor IAB node or a parent IAB node or a child IAB node that the first IAB node has previously accessed, or,

the second IAB node may be a donor IAB node or a parent IAB node or a child IAB node around the first IAB node.

In one embodiment of the invention, the reserved access resources may comprise one or more of: a random access preamble; window configuration of the random access response message; and, the number of retransmissions of the random access channel.

The UE provided in the embodiment of the present invention may execute the above method embodiment, and the implementation principle and technical effect are similar, which are not described herein again.

Referring to fig. 7, an embodiment of the present invention provides a first IAB node 700, including: a processor 701, a transceiver 702, a memory 703 and a bus interface.

Among other things, the processor 701 may be responsible for managing the bus architecture and general processing. The memory 703 may store data used by the processor 701 in performing operations.

In this embodiment of the present invention, the IAB node 700 may further include: a computer program stored on the memory 703 and executable on the processor 701, the computer program when executed by the processor 701 implementing: sending an access request message to a second IAB node; receiving an indication message sent by the second IAB node, wherein the indication message indicates that the second IAB node allows or prohibits the first IAB node to access; wherein the indication message is determined by the second IAB node according to reserved access resources and the access request message, and the indication message indicates that the second IAB node allows or prohibits the first IAB node to access; the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

In fig. 7, the bus architecture may include any number of interconnected buses and bridges, with one or more processors, represented by processor 701, and various circuits, represented by memory 703, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further in connection with embodiments of the present invention. The bus interface provides an interface. The transceiver 702 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium.

The first IAB node provided in the embodiment of the present invention may execute the foregoing method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.

Referring to fig. 7, an embodiment of the present invention provides a second IAB node 800, including: a processor 801, a transceiver 802, a memory 803, and a bus interface.

Among other things, the processor 801 may be responsible for managing the bus architecture and general processing. The memory 803 may store data used by the processor 801 in performing operations.

In this embodiment of the present invention, the second IAB node 800 may further include: a computer program stored on the memory 803 and executable on the processor 801, which when executed by the processor 801, implements: receiving an access request message sent by a first IAB node; sending an indication message to the first IAB node according to the reserved access resources configured by the second IAB node for the first IAB node and the access request message, wherein the indication message indicates that the second IAB node allows or prohibits the first IAB node to access; the reserved access resource is information of reserved access resources configured for the first IAB by the second IAB; the second IAB node is a donor IAB node or a parent IAB node or a child IAB node of the first IAB node.

In FIG. 8, the bus architecture may include any number of interconnected buses and bridges, with one or more processors, represented by the processor 801, and various circuits, represented by the memory 803, linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further in connection with embodiments of the present invention. The bus interface provides an interface. The transceiver 802 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium.

The second IAB node provided in the embodiment of the present invention may execute the foregoing method embodiment, and its implementation principle and technical effect are similar, which are not described herein again.

The steps of a method or algorithm described in connection with the disclosure herein may be embodied in hardware or in software instructions executed by a processor. The software instructions may consist of corresponding software modules that may be stored in RAM, flash memory, ROM, EPROM, EEPROM, registers, hard disk, a removable hard disk, a compact disk, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in a core network interface device. Of course, the processor and the storage medium may reside as discrete components in a core network interface device.

Those skilled in the art will recognize that, in one or more of the examples described above, the functions described in this invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.

The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.

As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.

Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the embodiments of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to encompass such modifications and variations.

22页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种无线跳频网络的快速接入方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!