WO2019024032A1 - 数据传输方法、相关设备及通信系统 - Google Patents
数据传输方法、相关设备及通信系统 Download PDFInfo
- Publication number
- WO2019024032A1 WO2019024032A1 PCT/CN2017/095770 CN2017095770W WO2019024032A1 WO 2019024032 A1 WO2019024032 A1 WO 2019024032A1 CN 2017095770 W CN2017095770 W CN 2017095770W WO 2019024032 A1 WO2019024032 A1 WO 2019024032A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data packet
- access network
- network device
- terminal device
- type
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 91
- 230000005540 biological transmission Effects 0.000 title claims abstract description 46
- 238000004891 communication Methods 0.000 title claims abstract description 21
- 238000012790 confirmation Methods 0.000 claims description 11
- 239000003550 marker Substances 0.000 description 173
- 230000006870 function Effects 0.000 description 42
- 238000010586 diagram Methods 0.000 description 25
- 238000013461 design Methods 0.000 description 19
- 230000008569 process Effects 0.000 description 6
- 230000009286 beneficial effect Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 5
- 238000010295 mobile communication Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000011218 segmentation Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000037361 pathway Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/27—Transitions between radio resource control [RRC] states
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/08—Reselecting an access point
Definitions
- the embodiments of the present invention relate to the field of communications technologies, and in particular, to a data transmission method, a related device, and a communication system.
- the requirement on the handover (Handover, HO) delay is 0 ms, that is, the terminal device is in the source access network device and the target access network device during the handover process. There is no transmission time interruption when switching between.
- the terminal device needs to be connected to the source access network device and the target access network device at the same time.
- This function can be implemented by Dual Connection (DC), that is, the terminal device is connected to two access network devices at the same time.
- the bearer with the secondary cell group refers to the radio bearer transmitted only by the primary next-generation Node B (MgNB) and the secondary next-generation Node B (SgNB).
- MgNB primary next-generation Node B
- SgNB secondary next-generation Node B
- the same radio bearer can be transmitted through two access network devices.
- the downlink data carried by the forked network is processed by the Packet Data Convergence Protocol (PDCP) entity of the primary access network device, and part of the PDCP protocol data unit (Protocol Data) Unit, PDU) to the terminal through the Radio Link Control (RLC) entity, the Media Access Control (MAC) entity, and the Physical Layer (PHY) entity of the primary access network device
- RLC Radio Link Control
- MAC Media Access Control
- PHY Physical Layer
- Step 1 Add the target access network device (Target gNB) as the source access network device (Source) gNB) secondary access network equipment.
- Step 2 The primary access network device (ie, the source access network device) and the secondary access network device (ie, the target access network device) perform role exchange (ie, the switching function, and the target access network device acts as the primary access network device).
- the source access network device acts as a secondary access network device.
- Step 3 Remove the secondary access network device (that is, the source access network device).
- the data packet is encrypted by the primary access network device, that is, the PDCP of the source access network device, and is branched and carried by the source access network device.
- the target access network device transmits.
- the PDCP, the RLC, and the MAC of the source access network device and the RLC of the target access network device and the MAC have data packets encrypted by the source access network device.
- the PDCP of the target access network device starts to encrypt the data, and transmits the source access network device and the target access network device through the forked bearer.
- the terminal device does not know to receive the radio resource control (RRC) reconfiguration. After the message, the conversion between the primary access network device and the secondary access network device takes place.
- RRC radio resource control
- the PDCP of the terminal device receives the data packet submitted by the RLC as out of order, and some data packets encrypted by the target access network device may take precedence over the data packet encrypted by the source access network device before the role transition reaches the RLC, thereby causing the terminal device to fail. Know which packets are encrypted by the source access network device and which are the key of the target access network device, so the data packet cannot be decrypted correctly.
- the embodiment of the present invention provides a data transmission method, a related device, and a communication system, which can ensure that a role is exchanged between a source access network device and a target access network device (that is, the source access network device is transformed by the primary access network device). After the secondary access network device is changed from the secondary access network device to the primary access network device, the terminal device can decrypt the data packet with the correct key.
- an embodiment of the present invention provides a data transmission method, where the method is applied to an access network device side.
- the method includes: the access network device sends first indication information to the terminal device, where the first indication information is used to indicate the last data packet in the first type of data packet or the first data packet in the second type of data packet, The first type of data packet is encrypted with a first encryption key, and the second type of data data is encrypted with a second encryption key.
- the access network device sends the first indication information to the terminal device, and the terminal device can ensure that after the source access network device and the target access network device perform role exchange, the terminal device can be based on the first indication information. Identifies whether the received packet is a first type of packet or a second type of packet, so that the packet can be decrypted with the correct key.
- the first indication information includes at least one of the following information: a sequence number corresponding to a last data packet in the first type of data packet, and a first data packet in the second type data packet.
- the corresponding sequence number, the difference between the sequence number and the offset value corresponding to the last data packet in the first type of data packet, and the difference between the sequence number and the offset value corresponding to the first data packet in the second type of data packet is included in the first indication information.
- the above serial number includes a serial number or a count value.
- the access network device after the access network device sends the first indication information to the terminal device, the access network device sends the acknowledgement message of the first indication information sent by the terminal device to the terminal device, The second type of data packet.
- the terminal device can ensure that the second type of data packet is not received before the first indication information is received. Therefore, the terminal device can continue to adopt the first encryption key before receiving the first indication information. The key correctly decrypts the received packet.
- the access network device sends the first indication information to the terminal device, where the access network device sends the first type of data packet to the terminal device after transmitting the first type of data packet to the terminal device.
- First indication information is
- the access network device is a first access network device
- the first type of data packet is obtained by encrypting, by the first access network device, the first encryption key, the second type of data.
- the packet is obtained by encrypting the second access network device with the second encryption key.
- the first access network device After receiving the acknowledgment message of the first indication information sent by the terminal device, the first access network device sends the second indication information to the second access network device, where the second indication The information is used to indicate that the second access network device sends the second type of data packet.
- the first indication information is carried in the data protocol data unit or the control protocol data unit, or the access network device sends the first indication information to the terminal device, including: the access network device passes the data.
- the protocol data unit or the control protocol data unit transmits the first indication information to the terminal device.
- the data protocol data unit includes third indication information, where the third indication information is used to indicate that the first indication information is carried in the data protocol data unit, and the serial number of the data protocol data unit is the first The serial number indicated by the indication information.
- an embodiment of the present invention provides another data transmission method, which is applied to a terminal device side.
- the method includes: receiving, by the terminal device, first indication information sent by the access network device, where the first indication information is used to indicate the last data packet in the first type of data packet or the first data packet in the second type of data packet.
- the first type of data packet is encrypted with a first encryption key
- the second type of data data is encrypted with a second encryption key.
- the terminal device determines, according to the first indication information, that the received data packet is the first type of data packet or the second type of data packet.
- the embodiment of the present invention can ensure that after the source access network device and the target access network device perform role exchange, the terminal device can identify, according to the first indication information, whether the received data packet is the first type of data packet or the first A second type of packet that enables the packet to be decrypted with the correct key.
- the first indication information includes at least one of the following information: a sequence number corresponding to a last data packet in the first type of data packet, and a first data packet in the second type data packet.
- the corresponding sequence number, the difference between the sequence number and the offset value corresponding to the last data packet in the first type of data packet, and the difference between the sequence number and the offset value corresponding to the first data packet in the second type of data packet is included in the first indication information.
- the terminal device after receiving the first indication information sent by the access network device, the terminal device further includes: the terminal device sending the confirmation message of the first indication information to the access network device.
- the confirmation message is sent by the terminal device through a packet data convergence protocol status report or by a control protocol data unit of a packet data convergence protocol, where the control protocol data unit carries the indication indicated by the first indication information. Serial number.
- the first indication information is carried in a data protocol data unit or a control protocol data unit.
- the data protocol data unit further carries a third indication information, where the third indication information is used to indicate that the first protocol information is carried in the data protocol data unit, where the data protocol data unit number is The sequence number indicated by the first indication information.
- an embodiment of the present invention provides another data transmission method, where the method is applied to an access network device side.
- the method includes: the access network device sends fourth indication information to the terminal device, where the fourth indication information is used to indicate that the data packet received before the fourth indication information is a first type of data packet, where the fourth indication information is The received data packet is a second type of data packet, the first type of data packet is encrypted by using a first encryption key, and the second type of data packet is encrypted by using a second encryption key.
- the access network device sends the first indication information to the terminal device, and the terminal device can ensure that after the source access network device and the target access network device perform role exchange, the terminal device can Identifies whether the received packet is a first type of packet or a second type of packet, so that the packet can be decrypted with the correct key.
- the radio link layer control protocol entity of the terminal device has a reordering function.
- the access network device before the access network device sends the fourth indication information to the terminal device, the access network device sends a radio resource control reconfiguration message to the terminal device, where the radio resource control reconfiguration message is used to indicate the The terminal device turns on the reordering function of the radio link layer control protocol entity.
- the fourth indication information is carried in a data protocol data unit or a control protocol data unit. in.
- an embodiment of the present invention provides another data transmission method, which is applied to a terminal device side.
- the method includes: receiving, by the terminal device, fourth indication information that is sent by the access network device, where the fourth indication information is used to indicate that the data packet received before the fourth indication information is a first type of data packet, where the fourth indication is The data packet received after the information is a second type of data packet, the first type of data packet is encrypted by using a first encryption key, and the second type of data packet is encrypted by using a second encryption key.
- the terminal device determines, according to the fourth indication information, that the received data packet is a first type of data packet or a second type of data packet.
- the embodiment of the present invention can ensure that after the source access network device and the target access network device perform role exchange, the terminal device can identify, according to the fourth indication information, whether the received data packet is the first type of data packet or the first A second type of packet that enables the packet to be decrypted with the correct key.
- the radio link layer control protocol entity of the terminal device has a reordering function.
- the terminal device before the terminal device receives the fourth indication information sent by the access network device, the terminal device receives the radio resource control reconfiguration message sent by the access network device.
- the terminal device starts the reordering function of the radio link layer control protocol entity according to the radio resource control reconfiguration message.
- the fourth indication information is carried in a data protocol data unit or a control protocol data unit.
- an embodiment of the present invention provides an access network device, where the access network device includes a module or unit for performing the data transmission method provided by the first aspect or any possible implementation manner of the first aspect. Therefore, the beneficial effects of the first aspect of the data transmission method can also be achieved.
- the embodiment of the present invention provides a terminal device, where the terminal device includes a module or a unit for performing the data transmission method provided by the second aspect or any possible implementation manner of the second aspect, and thus The beneficial effects of the second aspect of the data transmission method are achieved.
- the embodiment of the present invention provides another access network device, where the access network device includes a module for performing the data transmission method provided by the third aspect or any possible implementation manner of the third aspect, or The unit, therefore, can also achieve the beneficial effects of the third aspect of the data transmission method.
- the embodiment of the present invention provides another terminal device, where the terminal device includes a module or a unit for performing the data transmission method provided by any of the possible implementations of the fourth aspect or the fourth aspect, and thus The beneficial effects of the fourth aspect of the data transmission method can be achieved.
- an embodiment of the present invention provides another access network device, where the access network device includes a processor, a transmitter, and a memory.
- the processor is configured to invoke the data transfer program code stored in the memory to execute the data transmission method provided by the first aspect or the first aspect of the first aspect.
- an embodiment of the present invention provides another terminal device, where the terminal device includes a processor, a receiver, and a memory.
- the processor is configured to invoke the data transfer program code stored in the memory to execute the data transmission method provided by any of the foregoing second aspect or the second aspect.
- an embodiment of the present invention provides another access network device, where the access network device includes a processor, a transmitter, and a memory.
- the processor is configured to invoke the data transfer program code stored in the memory to perform the data transmission method provided by any of the foregoing third aspect or the third aspect.
- an embodiment of the present invention provides another terminal device, where the access network device includes a processor, a receiver, and a memory.
- the processor is configured to invoke the data transfer program code stored in the memory to execute the data transmission method provided by any of the foregoing fourth aspect or the fourth aspect.
- the embodiment of the present invention further provides a communication system, including: an access network device and a terminal device.
- the access network device is the access network device according to the fifth aspect or the ninth aspect, wherein the terminal device is the terminal device according to the sixth aspect or the tenth aspect.
- the access network device is the access network device according to the seventh aspect or the eleventh aspect, wherein the terminal device is the terminal device according to the eighth aspect or the twelfth aspect.
- an embodiment of the present invention provides a chip system, where the chip system includes a processor for supporting a data transmitting device to implement functions involved in the foregoing aspects, for example, generating or processing information involved in the foregoing method. .
- the chip system further includes a memory for holding program instructions and data necessary for the data transmitting device.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- the embodiment of the present invention provides a computer storage medium, configured to store computer software instructions used by the access network device according to the first aspect, where the instruction is executed by the access network device The access network device is caused to perform the method as described in the first aspect above.
- the embodiment of the present invention provides another computer storage medium, configured to store computer software instructions used by the terminal device in the second aspect, where the instruction causes the terminal to be executed by the terminal device The device performs the method as described in the second aspect above.
- the embodiment of the present invention provides another computer storage medium, configured to store computer software instructions used by the access network device in the foregoing third aspect, where the instruction is executed by the access network device
- the access network device is caused to perform the method as described in the third aspect above.
- the embodiment of the present invention provides another computer storage medium, configured to store computer software instructions used by the terminal device in the fourth aspect, where the instruction causes the terminal to be executed by the terminal device The device performs the method as described in the fourth aspect above.
- a nineteenth aspect the embodiment of the present invention provides a computer program, the program comprising computer software instructions, when executed by the access network device, causing the access network device to perform the method as described in the first aspect above Methods.
- an embodiment of the present invention provides another computer program, the program comprising computer software instructions, which, when executed by the terminal device, cause the terminal device to perform the method as described in the second aspect above.
- an embodiment of the present invention provides another computer program, the program comprising computer software instructions, when executed by the access network device, causing the access network device to perform the third aspect as described above Said method.
- the embodiment of the present invention provides another computer program, the program comprising computer software instructions, when executed by the terminal device, causing the terminal device to perform the method according to the fourth aspect above .
- 1 is a schematic diagram of the architecture of a layer 2 protocol stack
- FIG. 2 is a schematic structural diagram of a communication system according to an embodiment of the present invention.
- FIG. 3 is a schematic flowchart of a data transmission method according to an embodiment of the present invention.
- FIG. 4 is a schematic diagram of an access network device sending a data packet to a terminal device according to an embodiment of the present invention
- FIG. 5 is a schematic diagram of another access network device sending a data packet to a terminal device according to an embodiment of the present disclosure
- FIG. 6 is a schematic diagram of another access network device sending a data packet to a terminal device according to an embodiment of the present disclosure
- FIG. 7 is a schematic diagram of another access network device sending a data packet to a terminal device according to an embodiment of the present disclosure
- FIG. 8 is a schematic diagram of another access network device sending a data packet to a terminal device according to an embodiment of the present disclosure
- FIG. 9 is a schematic diagram of receiving, by a terminal device, data sent by an access network device according to an embodiment of the present disclosure.
- FIG. 10 is a schematic diagram of a terminal device receiving a data packet sent by an access network device according to an embodiment of the present disclosure
- FIG. 11 is a schematic diagram of another terminal device receiving a data packet sent by an access network device according to an embodiment of the present disclosure
- FIG. 12 is a schematic diagram of another terminal device receiving a data packet sent by an access network device according to an embodiment of the present disclosure
- FIG. 13 is a schematic diagram of another terminal device receiving a data packet sent by an access network device according to an embodiment of the present disclosure
- FIG. 14 is a schematic diagram of another terminal device according to an embodiment of the present invention receiving a data packet sent by an access network device;
- FIG. 15 is a schematic flowchart diagram of another data transmission method according to an embodiment of the present invention.
- FIG. 16 is a schematic diagram of another terminal device receiving a data packet sent by an access network device according to an embodiment of the present disclosure
- FIG. 17 is a schematic diagram of another terminal device according to an embodiment of the present invention receiving a data packet sent by an access network device;
- FIG. 18 is a schematic structural diagram of an access network device according to an embodiment of the present disclosure.
- FIG. 19 is a schematic structural diagram of a terminal device according to an embodiment of the present disclosure.
- FIG. 20 is a schematic structural diagram of another access network device according to an embodiment of the present disclosure.
- FIG. 21 is a schematic structural diagram of another terminal device according to an embodiment of the present invention.
- FIG. 2 is a schematic structural diagram of a communication system according to an embodiment of the present invention.
- the communication system 200 includes a terminal device 201, a source access network device 202, and a target access network device 203.
- the source access network device 202 is the primary access network device
- the target access network device 203 is the secondary access network device.
- the data packets from the core network user plane are encrypted by the PDCP entity of the source access network device 202, and transmitted to the terminal device 201 by the source access network device 202 and the target access network device 203 through the forked bearer.
- the source access network device 202 sends a part of the data packet in the forked bearer to the terminal device 201 through the PDCP entity, the RLC entity, the MAC entity, and the PHY entity of the source access network device 202, and the source access network device 202
- Another portion of the data packet in the forked bearer is forwarded to the target access network device 203, and then transmitted to the terminal device 201 by the RLC entity, the MAC entity, and the PHY entity of the target access network device 203.
- the PDCP entity of the target access network device 203 begins to encrypt the data, and transmits the source access network device 202 and the target access network device 203 through the forked bearer.
- the terminal device and the access network device can perform data communication, and the terminal device can also be referred to as user equipment, mobile station, access terminal, subscriber unit, subscriber station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal. , wireless communication devices, user agents or user devices.
- the terminal device may be a handheld terminal device, a notebook computer, a Subscriber Unit, a Cellular Phone, a Smart Phone, a wireless data card, Personal Digital Assistant (PDA), handheld devices with wireless communication capabilities, in-vehicle devices, wearable devices, and mobile stations in future 5G networks or the future evolution of the Public Land Mobile Network (PLMN) network Terminal equipment, etc.
- PDA Personal Digital Assistant
- handheld devices with wireless communication capabilities in-vehicle devices, wearable devices, and mobile stations in future 5G networks or the future evolution of the Public Land Mobile Network (PLMN) network Terminal equipment, etc.
- PLMN Public Land Mobile Network
- the terminal device and the access network device communicate with each other by using some air interface technology.
- the access network device is mainly responsible for radio resource management, quality of service (QoS) management, data compression, and encryption on the air interface side.
- Access network devices may include various forms of access network devices, such as macro access network devices, micro access network devices (also known as small stations), relay stations, access points, and the like.
- the names of devices with access network device functions may vary, for example, in a 5G communication system, called a next-generation Node B (gNB).
- gNB next-generation Node B
- eNB evolved NodeB
- 3G 3rd generation
- the access network device may have other names, such as a base station, which is not specifically limited in the embodiment of the present invention.
- the data transmission method includes but is not limited to the following steps S301 to S302:
- the access network device sends the first indication information to the terminal device, where the first indication information is used to indicate the last data packet in the first type of data packet or the first data packet in the second type of data packet.
- the first type of data packet is encrypted by using a first encryption key
- the second type of data packet is encrypted by using a second encryption key
- the first encryption key is different from the second encryption key
- the first type of data packet is obtained by using the first encryption key for the source access network device
- the second type of data packet is obtained by using the second encryption key for the target access network device.
- the source access network device is initially used as the primary access network device and the target access network device is used as the secondary access network device. After that, the primary and secondary access network devices perform role exchange, that is, the target access network device becomes the primary device.
- the access network device and the source access network device become the secondary access network device.
- the first indication information includes at least one of the following information: a sequence number corresponding to a last data packet in the first type of data packet, a sequence number and an offset value corresponding to a last data packet in the first type of data packet.
- the sequence number may refer to a sequence number (SN) of the data packet, or may be a count value (COUNT) corresponding to the data packet.
- COUNT Hyper Frame Number (HFN)+SN.
- COUNT can be a 32-bit variable. COUNT corresponds to the SN number.
- the lower 18 bits of COUNT are SN. If the SN is 12 bits, the lower 12 bits of COUNT are the SN. For example, COUNT is 32 bits and the lower 12 bits of COUNT are SN. Both the terminal device and the access network device maintain the HFN value, and the HFN maintained by the terminal device is equal to the HFN value maintained by the access network device. Taking SN as 12bit as an example, suppose that the SN number carried in packet 1 is 3, that is, 000000000011, and the COUNT value corresponding to packet 1 is 0000000000000000000000000011.
- the SN number carried by the data packet 4099 is also 3, that is, 000000000011, but the COUNT value corresponding to the data packet 4099 is 0000000000000001000000000011. It can be seen that although the SN numbers of the data packet 3 and the data packet 4099 are the same, the COUNT value is different. The SN value is recounted every 4096.
- the terminal device may directly learn the last data packet in the first type of data packet according to the first indication information. corresponding SN number. If the first indication information sent by the access network device is the SN number corresponding to the first data packet in the second type of data packet, the terminal device may directly learn the first one of the second type data packet according to the first indication information. The SN number corresponding to the packet. If the first indication information sent by the access network device is the count value corresponding to the last data packet in the first type of data packet, the terminal device may directly learn the last data packet in the first type of data packet according to the first indication information. Corresponding count value.
- the terminal device may directly learn the first one of the second type data packet according to the first indication information. The count value corresponding to the packet. If the terminal device and the access network device negotiate the offset value in advance, the access network device sends the difference between the SN number and the offset value corresponding to the last data packet in the first type of data packet to the terminal device, and the terminal device The SN number corresponding to the last data packet in the first type of data packet may also be calculated according to the difference value and the offset value.
- the difference between the count value and the offset value corresponding to the last data packet in the first type of data packet sent by the access network device to the terminal device, and the terminal device may also calculate the difference according to the difference value and the offset value.
- the difference between the SN number corresponding to the first data packet in the second type of data packet and the offset value sent by the access network device to the terminal device may also calculate the difference value according to the offset value.
- the terminal device may also calculate the difference value according to the difference value and the offset value.
- the count value corresponding to the first packet in the second type of packet may be calculated.
- the terminal device may calculate the COUNT value corresponding to the last data packet in the first type of data packet, or the terminal device may The COUNT value corresponding to the first packet in the second type of data packet can be calculated.
- a data packet with a SN number of 1 to 5 is a first type of data packet
- a data packet with a SN number of 6 to 8 is a second type of data packet.
- the first indication information may be the SN number 5 corresponding to the last data packet in the first type of data packet
- the terminal device may learn, according to the first indication information, that the SN number corresponding to the last data packet in the first type of data packet is 5.
- the first indication information may be the SN number 6 corresponding to the first data packet in the second type of data packet, and the terminal device may learn, according to the first indication information, the first data packet corresponding to the second type of data packet.
- the SN number is 6.
- the first indication information may be a difference 2 between the SN number 5 and the offset value 3 corresponding to the last data packet in the first type of data packet.
- the terminal device further calculates the SN number 5 corresponding to the last data packet in the first type of data packet according to the difference value 2 and the offset value 3.
- the first indication information is a difference 3 between the SN number 6 and the offset value 3 corresponding to the first data packet in the second type of data packet.
- the terminal device further calculates the SN number 6 corresponding to the first data packet in the second type of data packet according to the difference value 3 and the offset value 3.
- the method further includes: after receiving the acknowledgement (ACK) message of the first indication information sent by the terminal device, the access network device sends the acknowledgement (ACK) message to the terminal device The second type of data packet.
- the access network device sends the acknowledgement (ACK) message to the terminal device The second type of data packet.
- the RLC entity of the terminal device submits the time to the PDCP entity with the first indication information. Later, the access network device may not send the second type of data packet to the terminal device before receiving the ACK message of the first indication information.
- the second type of data packet is sent to the terminal device only after receiving the ACK message of the first indication information sent by the terminal device.
- the first indication information needs SN or COUNT related information with the PDCP old and new key encryption split point, that is, the last data packet encrypted by the old data key of the fifth data packet or the new data key of the sixth data packet
- the first packet encrypted.
- the key, the old key, and the first encryption key of the source access network device refer to the same meaning
- the second encryption key refers to the same meaning.
- the access network device described in step S301 may be a source access network device or a target access network device.
- the following two implementations are described separately.
- the access network device that sends the first indication information is the target access network device.
- the PDCP entity of the forked bearer is located in the primary access network.
- the network device, that is, the source access network device, that is, the PDCP entity of the source access network device encrypts the data packets carried by the fork and adds the SN number.
- the source access network device sends a part of the first type of data packet to the terminal device through the PDCP entity, the RLC entity, the MAC entity, and the PHY entity of the source access network device, and the source access network device forwards another part of the first type of data packet to the terminal device.
- the target access network device sends the first type of data packet to the terminal device by the RLC entity, the MAC entity, and the PHY entity of the target access network device.
- the Xn interface is notified that the target access network device does not receive the device that is forwarded by the source access network device to the target access network device.
- the notification mode can send signaling through the Xn interface.
- the notification mode can also be used to send an end-marker on the Xn interface on the Xn interface, which is different from the end-marker received after the path switch in the HO.
- the end-marker received after the path switching in the Long Term Evolution (LTE) HO indicates that the source access network device not receives the data forwarding through the X2 interface, so the end-marker needs to be distinguished.
- LTE Long Term Evolution
- the end-marker for the current path switch is not limited to LTE.
- the source access network device and the target access network device implement communication through the X2 interface.
- the source access network device and the target access network device use the Xn interface for communication.
- the target access network device is switched by the secondary access network device as the primary access network device, and the source access network device is switched from the primary access network device to the secondary access network device.
- the PDCP entity of the source access network device, the RLC entity, and the RLC entity of the MAC and the target access network device and the MAC entity have data packets encrypted by the source access network device, that is, the first type of data packet.
- the PDCP entity of the forked bearer is located in the target access network device, and the target access network device uses the new key (ie, the second encryption key) to encrypt the data (ie, the second type of data).
- the packet is no longer transmitted through the RLC entity, the MAC entity, and the PHY entity of the source access network device, but only through the RLC entity, the MAC entity, and the PHY entity of the target access network device. Therefore, after the target access network device performs the role exchange, the first type of data packet that is not transmitted needs to be sent to the terminal device. After the first type of data packet is sent out, the target access network device sends a start-marker to the terminal device, where the start identifier is the first indication information, and at this time, the terminal device does not necessarily be the first All packets were successfully received.
- the target access network device does not receive the start-marker ACK message.
- the second type of data packet is not sent to the terminal device.
- the start-marker needs SN or COUNT related information with the PDCP old and new key encryption split point.
- the data packet of No. 1-5 is the first type of data packet
- the data packet of No. 1-5 is the second type of data packet. After transmitting the data packet No.
- the target access network device sends a start-marker to the terminal device.
- the PDCP entity that is, the packet of the sixth packet and the subsequent data packet, is delivered by the RLC entity of the terminal device to the PDCP entity later than the start-marker, and the target access network device does not receive the ACK of the start-marker returned by the terminal device.
- the target access network device does not send the 6-8 packet.
- the start-marker needs the SN or COUNT related information with the PDCP new and old key encryption segment. For example, the start-marker carries the SN number 6, indicating Packets No. 6 and packets after the 6th are packets encrypted with the new key.
- the second type of data packet may be transmitted through the RLC entity, the MAC entity, and the PHY entity of the source access network device, or may be through the target access network.
- the device's RLC entity, MAC entity, and PHY entity transmit.
- the access network device that sends the first indication information may be the source access network device or the target access network device, or the source access network device and the target access network device respectively send the first indication information. The following three cases are described separately.
- the access network device that sends the first indication information is a source access network device.
- the PDCP of the forked bearer is located in the source access network device, and the source access network device accesses the source after all the first type of data packets are sent out.
- the air interface of the network device and the terminal device sends an end-marker to the terminal device, and the end-marker is the first indication information.
- the source access network device sends an end-marker to the terminal device through the air interface of the target access network device and the terminal device after all the first type of data packets are sent out, and the end-marker is the first indication information.
- the source access network device generates an end-marker, and sends the end-marker to the target access network device, and the target access network device sends the end-marker to the terminal device.
- the end-marker carries the SN or COUNT related information of the PDCP old and new key encryption segmentation points.
- the Xn interface is notified that the target access network device does not receive the source access network device and is forwarded to the target access network device by the source access network device.
- the first type of data packet, the notification method is as described above, and will not be described here.
- the second type of data packet may be transmitted to the terminal device through the RLC entity, the MAC entity, and the PHY entity of the source access network device, or may be through the RLC entity and MAC of the target access network device.
- the entity and the PHY entity are transmitted to the terminal device.
- the following two methods may be used: 1.
- the end-marker ACK message received by the access network device is identified by the PDCP entity, and the source access network device can pass through the air interface path of the source access network device and the terminal device or through the air interface path of the target access network device and the terminal device.
- the end-marker sent to the terminal device is identified by the PDCP entity, and the source access network device can pass through the air interface path of the source access network device and the terminal device or through the air interface path of the target access network device and the terminal device.
- the source access network device does not receive the ACK message of the end-marker returned by the terminal device or returned by the target access network device, and the source access network device does not send the second type of data packet to the terminal device.
- the source access network device sends the second type of data packet to the terminal device only after receiving the ACK message of the end-marker returned by the terminal device.
- the source access network device sends the second indication information to the target access network device, where the second indication information is used to indicate that the target access network device can send The second type of data packet is given to the terminal device. Therefore, the target access network device does not send the second type of data packet to the terminal device before receiving the second indication information sent by the source access network device.
- the source access network device does not receive the ACK message of the end-marker returned by the terminal device, and does not perform the role exchange of the primary and secondary access network devices.
- the role exchange of the primary and secondary access network devices is performed only when the ACK message of the end-marker returned by the terminal device is received.
- Manner 2 The ACK message of the end-marker received by the access network device is identified by the RLC entity.
- the following two sub-modes can be used: sub-mode 1. If the source access network device passes through the source access network device and the air interface of the terminal device Pathway The end-marker sent to the terminal device, the source access network device does not receive the end-marker ACK message returned by the terminal device, and the source access network device does not send the second type of data packet to the terminal device. The source access network device sends the second type of data packet to the terminal device only after receiving the ACK message of the end-marker returned by the terminal device.
- the source access network device sends the second indication information to the target access network device, where the second indication information is used to indicate that the target access network device can send The second type of data packet is given to the terminal device. Therefore, the target access network device does not send the second type of data packet to the terminal device before receiving the second indication information sent by the source access network device.
- Sub-mode 2 If the source access network device sends an end-marker to the terminal device through the air interface path of the target access network device and the terminal device, the target access network device does not receive the end-marker returned by the terminal device. The ACK message, the target access network device does not send the second type of data packet to the terminal device.
- the target access network device sends the second type of data packet to the terminal device only after receiving the ACK message of the end-marker returned by the terminal device. After receiving the ACK message of the end-marker returned by the terminal device, the target access network device sends a second indication information to the source access network device, where the second indication information is used to indicate that the source access network device can send the second Class data packets to the terminal device. Therefore, the source access network device does not send the second type of data packet to the terminal device before receiving the second indication information sent by the target access network device.
- the data packet of No. 1-5 is the first type of data packet
- the data packet of No. 1-5 is the second type of data packet.
- the source access network device sends the data packet No. 2
- the source access network device sends an end-marker to the terminal device.
- the roles of the primary and secondary access network devices are then exchanged.
- the source access network does not send packets 7 and 8 to the terminal device before receiving the ACK message from the end-marker.
- the source access network device does not send the second indication information to the target access network device before receiving the ACK message of the end-marker, and the target access network device does not send the second indication information before receiving the second indication information.
- Number packet to the terminal device.
- the source access network device receives the ACK message of the end-marker returned by the terminal device, the data packet of the seventh and eighth packets is sent to the terminal device. And sending the second indication information to the target access network device, and after receiving the second indication information, the target access network device sends the data packet No. 6 to the terminal device.
- the access network device that sends the first indication information is the target access network device.
- the PDCP of the forked bearer is located in the source access network device, and after the source access network device stops performing the PDCP function (including encryption, adding the SN number, etc.)
- the notification that the target access network device does not receive the first type of data packet that is forwarded by the source access network device to the target access network device by using the Xn interface, and the notification manner is as described above, and details are not described herein again.
- the primary and secondary access network devices are in role exchange, the RLC entity of the target access network device and the MAC entity have a first type of data packet.
- the target access network device sends a first type of data packet to the terminal device, and then sends a first to the terminal device through the air interface of the target access network device and the terminal device.
- the start-marker is the first indication information.
- the target access network device sends a start-marker to the terminal device through the air interface of the source access network device and the terminal device after all the first type of data packets are sent to the terminal device, where the start-marker is the first indication. information. That is to say, the target access network device sends the start-marker to the source access network device, and the source access network device sends the start-marker to the terminal device.
- the start-marker carries the SN or COUNT related information of the PDCP old and new key encryption segmentation points.
- the second type of data packet may be transmitted to the terminal device through the RLC entity, the MAC entity, and the PHY entity of the source access network device, or may be through the RLC entity and MAC of the target access network device. Entity and The PHY entity is transmitted to the terminal device.
- the following two methods may be used: 1.
- the ACK message of the start-marker received by the access network device is identified by the PDCP entity, and the target access network device can pass the air interface of the target access network device and the terminal device or the air interface path of the source access network device and the terminal device.
- the start-marker sent to the terminal device, the target access network device does not receive the ACK message of the start-marker returned by the terminal device or returned by the source access network device, and the target access network device does not send the terminal device to the terminal device.
- the target access network device sends the second type of data packet to the terminal device only after receiving the ACK message of the start-marker returned by the terminal device. And after receiving the ACK message of the start-marker returned by the terminal device, the target access network device sends the second indication information to the source access network device, where the second indication information is used to indicate that the target access network device can send The second type of data packet is given to the terminal device. Therefore, the source access network device does not send the second type of data packet to the terminal device before receiving the second indication information sent by the target access network device.
- Manner 2 The ACK message of the end-marker received by the access network device is identified by the RLC entity.
- the following two sub-modes can be used: sub-mode 1. If the target access network device passes through the air interface of the target access network device and the terminal device. The start-marker sent by the path to the terminal device, the target access network device does not receive the start-marker ACK message returned by the terminal device, and the target access network device does not send the second type of data packet to the terminal device. The target access network device sends the second type of data packet to the terminal device only after receiving the ACK message of the start-marker returned by the terminal device.
- the target access network device After receiving the ACK message of the start-marker returned by the terminal device, the target access network device sends the second indication information to the source access network device, where the second indication information is used to indicate that the source access network device can send The second type of data packet is given to the terminal device. Therefore, the source access network device does not send the second type of data packet to the terminal device before receiving the second indication information sent by the target access network device.
- Sub-mode 2 If the target access network device sends a start-marker to the terminal device through the air interface path of the source access network device and the terminal device, the source access network device does not receive the start-marker returned by the terminal device. The ACK message, the source access network device does not send the second type of data packet to the terminal device.
- the source access network device sends the second type of data packet to the terminal device only after receiving the ACK message of the start-marker returned by the terminal device. And after receiving the ACK message of the start-marker returned by the terminal device, the source access network device sends the second indication information to the target access network device, where the second indication information is used to indicate that the target access network device can send The second type of data packet is given to the terminal device. Therefore, the target access network device does not send the second type of data packet to the terminal device before receiving the second indication information sent by the source access network device.
- the data packet of No. 1-5 is the first type of data packet
- the data packet of the sixth to eighth is the second type of data packet.
- the target access network device After transmitting the data packet No. 5, the target access network device sends a start-marker to the terminal device.
- the target access network The device does not send packet 6 to the terminal device before receiving the ACK message of the start-marker.
- the target access network device does not send the second indication information to the source access network device before receiving the ACK message of the start-marker, and the source access network device does not send the second indication information before receiving the second indication information.
- No. 8 data packet to the terminal device.
- the target access network device receives the ACK message of the start-marker returned by the terminal device, the data packet No. 6 is sent to the terminal device.
- the access network device that sends the first indication information is a source access network device. Standby and target access network devices. In this case, before the primary and secondary access network device roles are exchanged, the PDCP of the forked bearer is located in the source access network device, and after the source access network device stops performing the PDCP function (including encryption, adding the SN number, etc.) And the notification that the target access network device does not receive the first type of data packet that is forwarded by the source access network device to the target access network device by using the Xn interface, and the notification manner is as described above, and details are not described herein again.
- the source access network device sends an end-marker to the terminal device after all the first type of data packets are sent out.
- the end-marker carries the SN or COUNT related information of the PDCP old and new key encryption segmentation points.
- the second type of data packet may be transmitted to the terminal device through the RLC entity, the MAC entity, and the PHY entity of the source access network device, or may be through the RLC entity and MAC of the target access network device.
- the entity and the PHY entity are transmitted to the terminal device.
- the source access network device does not send the second type of data packet to the terminal device to the end-marker ACK message returned by the terminal device.
- the source access network device sends the second type of data packet to the terminal device only after receiving the ACK message of the end-marker returned by the terminal device.
- the target access network device sends a start-marker to the terminal device, where the start-marker carries the SN or COUNT related information of the PDCP old and new key encryption split point.
- the target access network device To ensure that the start-marker arrives at the PDCP entity of the terminal device before the second type of data packet, that is, the start-marker is delivered by the RLC entity of the terminal device to the PDCP entity earlier than the second type of data packet, and the target access network device is not received.
- the ACK message to the start-marker the target access network device does not send the second type of data packet to the terminal device.
- the target access network device sends the second type of data packet to the terminal device only after receiving the ACK message of the start-marker returned by the terminal device.
- the data packet No. 1-5 is the first type data packet
- the data packet No. 1-6 is the second type data packet.
- the source access network device After transmitting the data packet No. 2 to the terminal device, the source access network device sends an end-marker to the terminal device. The roles of the primary and secondary access network devices are then exchanged.
- the source access network The device does not send packets 7 and 8 to the terminal device before receiving the ACK message from the end-marker.
- the target access network device When the source access network device receives the ACK message of the end-marker returned by the terminal device, the data packet of the seventh and eighth packets is sent to the terminal device. Similarly, after transmitting the data packet No. 5 to the terminal device, the target access network device sends a start-marker to the terminal device. In order to ensure that the start-marker arrives at the PDCP entity of the terminal device before the data packet No. 6, that is, the start-marker is delivered by the RLC entity of the terminal device to the PDCP entity earlier than the data packet of the sixth and subsequent packets, the target access network The device does not send packet 6 to the terminal device before receiving the ACK message of the start-marker. When the target access network device receives the ACK message of the start-marker returned by the terminal device, the data packet No. 6 is sent to the terminal device.
- first indication information may be carried in a data PDU or a control PDU.
- the data PDU includes an SN field, and therefore, the SN field in the data PDU in the prior art can be used to indicate the first indication information.
- the first indication information may also employ a new type of control PDU.
- the control PDU carries the SN number or the COUNT value
- the SN number may be the SN number corresponding to the last data packet in the first type of data packet, and the SN number corresponding to the first data packet in the second type data packet, The difference between the SN number and the offset value of the last packet in the first type of data packet or the difference between the SN number and the offset value corresponding to the first data packet in the second type of data packet.
- the corresponding COUNT value and offset value of the packet The difference or the difference between the COUNT value corresponding to the first packet in the second type of packet and the offset value.
- the first indication information indicates the SN number 6 of the first data packet in the second type of data packet, and the first indication information may be indicated by using the data PDU with the SN number of 6, the SN in the data PDU. The number is 6.
- the SN field in the control PDU can be set to 000000000110.
- the data PDU needs to carry the third indication information, where the third indication information is used by the terminal device to identify that the data PDU carries the first indication information.
- the terminal device can monitor the third indication information only when the source access network device and the target access network device perform role exchange. For example, after receiving the Radio Resource Control (RRC) reconfiguration message sent by the source access network device, the terminal device starts to detect whether the third indication information is carried in the received data PDU, and is detecting After the third indication information, the detection is stopped.
- the RRC reconfiguration message may indicate that the primary and secondary access network devices will perform role exchange.
- the first indication information is the SN number 6.
- the third indication information may be carried in the P domain or the R domain in the data PDU header of the SN number 6. For example, when the bit is 1, It indicates that the data PDU carries the first indication information. When the bit is 0, it indicates that the data PDU does not carry the first indication information.
- the two implementations described above are to send the first indication information to the terminal device after the first type of data packet is sent, and before the second type of data packet, in the third implementation manner of the embodiment of the present invention, The first indication information is sent to the terminal device before the first type of data packet is sent.
- the third implementation is described below.
- the source access network device sends a warning mark through the air interface of the source access network device and the terminal device or any one of the target access network device and the air interface path of the terminal device ( Warning-marker)
- Warning-marker is the first indication information.
- the first indication information may include at least one of the following information: an SN number or a COUNT value corresponding to a last data packet in the first type of data packet, an SN number corresponding to the first data packet in the second type of data packet, or COUNT value, the difference between the SN number or COUNT value corresponding to the last packet in the first type of data packet and the offset value, the SN number or COUNT value corresponding to the first data packet in the second type of data packet, and the partial value The difference in the value.
- the first indication information may also be carried in the data PDU or the control PDU.
- the SN number of the data PDU is the SN number of the PDU, and the SN number corresponding to the last data packet in the first type of data packet or the second type of data packet
- the SN number difference offset value N corresponding to the first data packet indicates that the data packet from the Nth data packet after the SN number of the data PDU or the Nth data packet and the Nth data packet is the first data packet.
- the scope of the second type of data packet, the second type of data packet depends on the definition of the offset value.
- the terminal device may obtain the N value from the RRC reconfiguration message.
- the data PDU is also required to carry the third indication information, where the third indication information is used to indicate that the first indication information is carried in the data PDU.
- the SN number carried by the data PDU is 3, and the offset value is 3, indicating that the data packet with the SN number greater than 6 is the second type data packet, or the data packet with the SN number greater than or equal to 6 is the second type data.
- the scope of the packet, the second type of packet depends on the offset value.
- the first indication information may also be carried in the control PDU.
- the target access network device and the terminal device are pre-known to the offset value N as an example. In other optional implementation manners, if the source access network device and the terminal device are not known in advance, The offset value N, then the offset value N can be carried in the data PDU or the control PDU.
- the data PDU carrying the first information carries the offset value N
- the control PDU may also carry the first indication information and the offset value N.
- the source terminal device may send the first indication information to the terminal device before sending the first data packet in the first type of data packet, or may be the Mth in sending the first type data packet ( M is smaller than the number of packets of the first type) before the data packet is sent to the terminal device
- the first indication information is sent by the embodiment of the present invention.
- the second type of data packets may be transmitted through the RLC entity, the MAC entity, and the PHY entity of the source access network device, or may be through the RLC entity, the MAC entity, and the PHY of the target access network device.
- the entity transmits.
- the target access network device sends the second type of data packet, it should ensure that the terminal device has received the warning-marker.
- the data packet No. 1-5 is the first type data packet
- the data packet No. 1-6 is the second type data packet.
- Method 1 The source access network device may continue to send N data packets in the first type of data packet but not the second type data packet before receiving the ACK message of the warning-marker.
- the second type of data packet is not sent to the terminal device until the ACK message of the warning-marker is received.
- the warning-marker needs SN or COUNT related information with the PDCP new and old key encryption segmentation points (ie, packet 6 is the first packet in the second type of packet).
- Method 2 can be guaranteed by selecting a sufficiently large N.
- the PDCP PDU in the reordering window is decrypted and stored.
- the offset value "N" can be set to a reordering window length or longer than a reordering window to ensure that the terminal device receives the warning-marker.
- the second type of data packet cannot be processed by the PDCP entity of the terminal device.
- FIG. 9 is a schematic diagram of a terminal device receiving data sent by an access network device according to an embodiment of the present invention.
- the offset value "N" can be set to a reordering window length.
- the total number of SNs is the maximum value of the SN number having a length of 12 bits defined in the communication standard, or the maximum value of the SN number having a length of 18 bits.
- the warning-marking is a data PDU
- the third indication information is needed and corresponding detection is performed.
- the warning-marker is a control PDU
- the first method is to control whether the SN or COUNT carried by the PDU is the difference between the SN number or the COUNT value corresponding to the last packet in the first type of data packet and the offset value, or the second The difference between the SN number or the COUNT value corresponding to the first packet in the class packet and the offset value, and the access network device does not send the data packet corresponding to the SN number or COUNT value carried by the control PDU or the corresponding SN to the terminal device. Multiple packets after the number or COUNT value.
- the terminal device After receiving the control PDU, the terminal device skips the data packet of the unsent sequence number or specifies a plurality of data packets, and directly processes the subsequent data packet.
- the data packet of the new and old key demarcation lines is the No. 5 data packet
- the access network device sends the data packet to the terminal device, only the data of 1, 3, 4, 5... is sent.
- the packet is sent, only 1, 4, 5... is sent.
- the reordering window can be moved backward without receiving the 2 and 3 packets, and how many are skipped.
- the serial number depends on the access network device configuration.
- the second method is to control the SN number or COUNT value corresponding to the last data packet in the first type of data packet carried by the PDU, or the SN number or COUNT value corresponding to the first data packet in the second type of data packet, And the access network device does not send the data packet of the SN number or the difference between the COUNT value and the offset value carried by the control PDU or the plurality of data packets corresponding to the difference between the SN number or the COUNT value and the offset value to the terminal device.
- the terminal device After receiving the control PDU, the terminal device skips the data packet of the unsent sequence number and directly processes the subsequent data packet.
- the data packet of the old and new key demarcation lines is the No. 5 data packet
- the reordering window can be moved backward without receiving the No. 2 packet, or the dividing line is 5, carried
- the third method is to control whether the SN or COUNT carried by the PDU is the difference between the SN number or the COUNT value corresponding to the last packet in the first type of data packet and the offset value, or the first one of the second type of data packets.
- the difference between the SN number or the COUNT value of the data packet and the offset value, and when the access network device sends the control PDU, the data PDU carrying the SN number has not been sent yet.
- the fourth method is to control the SN or COUNT value corresponding to the last data packet in the first type of data packet, or the SN or COUNT value corresponding to the first data packet in the second type of data packet carried by the PDU, and
- the access network device sends the control PDU
- the data PDU carrying the SN number or the corresponding COUNT value minus the offset value has not been sent.
- the terminal device receives the first indication information sent by the access network device, and determines, according to the first indication information, that the received data packet is a first type data packet or a second type data packet.
- the terminal device Receiving, by the terminal device, the first indication information, determining, according to the first indication information, an SN number or a COUNT value of a last data packet in the first type of data packet, or an SN of the first data packet in the second type of data packet Number or COUNT value. For example, if the first indication information directly indicates the SN number of the last data packet of the first type of data packet or the SN number of the first data packet of the second type of data packet, the terminal device can directly obtain the first type of data. The SN number of the last packet of the packet or the SN number of the first packet of the second type of packet.
- the terminal device needs to determine the first according to the first indication information and the offset value.
- the SN number corresponding to the last packet in the class packet If the first indication information directly indicates the count value corresponding to the last data packet in the first type of data packet, the terminal device may directly learn, according to the first indication information, the count corresponding to the last data packet in the first type of data packet. value. If the first indication information directly indicates the count value corresponding to the first data packet in the second type of data packet, the terminal device may directly learn, according to the first indication information, that the first data packet in the second type of data packet corresponds to Count value.
- the terminal device may calculate the first class according to the difference value and the offset value. The count value corresponding to the last packet in the packet. If the first indication information directly indicates the difference between the count value and the offset value corresponding to the first data packet in the second type of data packet, the terminal device may also calculate the second value according to the difference value and the offset value. The count value corresponding to the first packet in the class packet. For example, if the first indication information is 3 and the offset value is 2, the terminal device determines that the last data packet in the first type of data packet corresponds to an SN number of 5.
- the terminal device needs to determine the first indication information according to the first indication information and the offset value.
- the SN number corresponding to the first packet in the second type of data packet For example, if the first indication information is 4 and the offset value is 2, the terminal device determines that the first data packet in the second type of data packet corresponds to an SN number of 6.
- the offset value is pre-negotiated between the terminal device and the access network device.
- the access network device that sends the first indication information is the target access network device
- the second type of data packet is only transmitted by the RLC entity, the MAC entity, and the PHY entity of the target access network device.
- the PDCP entity of the terminal device is based on the corresponding relationship of the access network device that sends the data, that is, the data that is handed over from the source access network device or the RLC entity corresponding to the target access network device, and combined with the received first indication information. Determine that the received packet is The first type of data packet is also the second type of data packet.
- the terminal device includes two RLC entities, two MAC entities, and two PHY entities, where one RLC entity corresponds to the source access network device, and another RLC entity corresponds to the target access network device. If the terminal device receives the data packet from the source access network device, the terminal device may determine that the data packet is the first type of data packet. If the terminal device receives the data packet from the target access network device before receiving the first indication information, the terminal device may determine that the data packet is the first type of data packet. After receiving the first indication information, the terminal device receives the data packet from the target access network device, and the terminal device determines the last data packet of the first type of data packet according to the COUNT value of the data packet and the first indication information.
- Corresponding COUNT value to determine whether the received data packet is a first type of data packet or a second type of data packet.
- a packet whose COUNT value is less than or equal to the COUNT value of the last packet of the first type of data packet is determined as the first type of data packet, and the COUNT value is greater than the COUNT value of the last data packet of the first type of data packet.
- the terminal device determines, according to the COUNT value of the data packet and the COUNT value corresponding to the first data packet of the second type of data packet indicated by the first indication information, whether the received data packet is the first type of data packet or the first data packet. The second type of data packet.
- the packet is determined to be the second type of packet.
- the terminal device has two sets of RLC entities, a MAC entity, and a PHY entity.
- the set of RLC entities, MAC entities, and PHY entities are corresponding to the protocol stack of the source access network device, and the other set of RLC entities, MAC entities, and PHY entities are corresponding to the protocol stack of the target access network device.
- RCL-1 corresponds to the source access network device
- RCL-2 corresponds to the source access network device.
- the data packets of the first and second numbers received by the terminal device from the source access network device can be determined that the data packets of the first and second packets are the first type of data packets.
- the terminal device may determine that the data packets No. 5 and No. 3 are the first type data packet.
- the first packet of the second type of packet indicated by the received start-marker has a COUNT value of 6.
- the terminal device After receiving the start-marker, the terminal device receives the data packets of 6, 4, 8, and 7.
- the terminal device determines that the fourth packet with the COUNT value of 4 is the first class according to the COUNT value 6 indicated by the start-marker.
- 6, 8, and 7 with COUNT values of 6, 8, and 7, respectively are the second type of data packets.
- the access network device that sends the first indication information is a source access network device, and after the primary and secondary access network device roles are exchanged, the second type of data packet can pass
- the RLC entity, the MAC entity, and the PHY entity of the source access network device are transmitted to the terminal device, and may also be transmitted to the terminal device through the RLC entity, the MAC entity, and the PHY entity of the target access network device. If the terminal device receives the data packet from the source access network device or the target access network device before receiving the first indication information, the terminal device may determine that the received data packet is the first type of data packet.
- the terminal device After receiving the first indication information, the terminal device receives the data packet from the source access network device or the target access network device, and the terminal device determines the first type of data according to the COUNT value of the data packet and the first indication information.
- the COUNT value corresponding to the last packet of the packet determines whether the received packet is the first type of packet or the second type of packet.
- a packet whose COUNT value is less than or equal to the COUNT value of the last packet of the first type of data packet is determined as the first type of data packet, and the COUNT value is greater than the COUNT value of the last data packet of the first type of data packet. Determined to be the second type of packet.
- the terminal device determines, according to the COUNT value of the data packet and the COUNT value of the first data packet of the second type of data packet indicated by the first indication information, whether the received data packet is the first type of data packet or the second data packet.
- Class data package Determining a packet whose COUNT value is smaller than the COUNT value of the first packet of the second type of packet as the first type of packet, and the COUNT value is greater than or equal to the COUNT of the first packet of the second type of packet The value packet is determined to be the second type of packet.
- the terminal device before the end device receives the end-marker, the terminal device receives the data packets 2 and 1 received from the source access network device, and can determine that the data packets of the second and the first packets are the first type of data packets.
- the terminal device receives the data packets No. 5 and No. 4 received from the target access network device before receiving the end-marker, and can determine that the data packets of the fifth and fourth packets are the first type of data packet.
- the COUNT value of the last packet of the first type of packet indicated by the end-marker received by the terminal device is 5. After receiving the end-marker, the terminal device receives the data packets No. 3 and No.
- packet number 6 with a COUNT value of 6 is a second type of data packet.
- the terminal device After receiving the end-marker, the terminal device receives the data packets No. 8 and No. 7 from the source access network device, and the terminal device determines that the COUNT value is 8, 7 and 8, according to the COUNT value 5 indicated by the end-marker.
- the number packet is the second type of packet.
- the access network device that sends the first indication information is the target access network device, and after the primary and secondary access network device roles are exchanged, the second type of data packet can pass
- the RLC entity, the MAC entity, and the PHY entity of the source access network device are transmitted to the terminal device, and may also be transmitted to the terminal device through the RLC entity, the MAC entity, and the PHY entity of the target access network device. If the terminal device receives the data packet from the source access network device or the target access network device before receiving the first indication information, the terminal device may determine that the received data packet is the first type of data packet.
- the terminal device After receiving the first indication information, if the terminal device receives the data packet from the source access network device or the target access network device, the terminal device determines, according to the COUNT value of the data packet and the first type of data indicated by the first indication information.
- the COUNT value corresponding to the last packet of the packet determines whether the received packet is the first type of packet or the second type of packet.
- a packet whose COUNT value is less than or equal to the COUNT value of the last packet of the first type of data packet is determined as the first type of data packet, and the COUNT value is greater than the COUNT value of the last data packet of the first type of data packet. Determined to be the second type of packet.
- the terminal device determines, according to the COUNT value of the data packet and the COUNT value of the first data packet of the second type of data packet indicated by the first indication information, whether the received data packet is the first type of data packet or the second data packet.
- Class data package Determining a packet whose COUNT value is smaller than the COUNT value of the first packet of the second type of data packet as the first type of data packet, and setting the COUNT value to be greater than or equal to the SN number of the first data packet of the second type of data packet. The packet is determined to be the second type of packet.
- the terminal device before the start device receives the start-marker, the terminal device receives the data packets 2 and 1 received from the source access network device, and can determine that the data packets of the second and the first packets are the first type of data packets.
- the terminal device receives the data packets No. 5 and No. 4 received from the target access network device before receiving the start-marker, and can determine that the data packets of the fifth and fourth packets are the first type of data packet.
- the COUNT value of the first packet of the second type of packet indicated by the start-marker received by the terminal device is 6. After receiving the start-marker, the terminal device receives the data packets No. 3 and No.
- packet number 6 with a COUNT value of 6 is a second type of data packet.
- the terminal device After receiving the start-marker, the terminal device receives the data packets No. 8 and No. 7 from the source access network device, and the terminal device determines that the COUNT value is 8, 7 and 8, according to the COUNT value 6 indicated by the start-marker.
- the number packet is the second type of packet.
- the access network device that sends the first indication information is the source access network device and the target access network device, and after the roles of the primary and secondary access network devices are exchanged,
- the second type of data packet may be transmitted to the terminal device through the RLC entity, the MAC entity, and the PHY entity of the source access network device, or may be transmitted to the terminal device through the RLC entity, the MAC entity, and the PHY entity of the target access network device.
- the terminal device sends the source access network device without receiving it.
- the terminal device may determine that the received data packet is the first type of data packet.
- the terminal device After receiving the first indication information sent by the source access network device, if the terminal device receives the data packet from the source access network device, the terminal device sends the data packet according to the COUNT value of the data packet and the first information sent by the source access network device.
- the COUNT value corresponding to the last packet of the first type of data packet indicated by the indication information is used to determine whether the received data packet is the first type of data packet or the second type of data packet.
- a packet whose COUNT value is less than or equal to the COUNT value of the last packet of the first type of data packet is determined as the first type of data packet, and the COUNT value is greater than the COUNT value of the last data packet of the first type of data packet. Determined to be the second type of packet.
- the terminal device may determine that the received data packet is the first type of data packet. After receiving the first indication information sent by the target access network device, the terminal device receives the data packet from the target access network device, and the terminal device sends the first packet according to the COUNT value of the data packet and the target access network device.
- the COUNT value of the first packet of the second type of data packet indicated by the indication information is used to determine whether the received data packet is a first type of data packet or a second type of data packet.
- the packet is determined to be the second type of packet.
- the data packets of the 2nd and the 1st packets received from the source access network device can determine that the data packets of the second and the first packets are The first type of data packet.
- the COUNT value of the last data packet of the first type of data packet received by the terminal device according to the end-marker sent by the source access network device is 5.
- the terminal device receives the data packets No. 8 and No. 7 from the source access network device, and the terminal device determines that the COUNT value is 8, 7 and 8, according to the COUNT value 5 indicated by the end-marker.
- the number packet is the second type of packet.
- the data packets No. 5 and No. 4 received from the target access network device can determine the data of the 5th and the 4th with the COUNT value being 5 and 4 respectively.
- the package is the first type of packet.
- the COUNT value of the first data packet of the second type of data packet received by the terminal device according to the start-marker sent by the target access network device is 6.
- the terminal device receives the data packets No. 3 and No. 6 from the target access network device, and the terminal device determines that the NUMBER value of the third packet is 3 according to the COUNT value 6 indicated by the start-marker.
- packet number 6 with a COUNT value of 6 is a second type of data packet.
- the access network device that sends the first indication information is the source access network device
- the second type of data packet may be transmitted by the RLC entity, the MAC entity, and the PHY entity of the source access network device.
- the transmission may be performed by an RLC entity, a MAC entity, and a PHY entity of the target access network device.
- the terminal device receives the data packet from the source access network device or the target access network device, and determines the received data packet as the first type of data packet.
- the terminal device directly indicates that the first indication information directly indicates the COUNT value of the last data packet in the first type of data packet or the COUNT value of the first data packet in the second type data packet.
- the terminal device may determine, according to the first indication information, a COUNT value of a last data packet in the first type of data packet or a COUNT value of the first data packet in the second type of data packet. If the first indication information carries the SN number or the COUNT value and the N, the terminal device can calculate the COUNT value or the second type of data packet of the last data packet in the first type of data packet according to the SN number or the COUNT value and the N value. The COUNT value of the first packet in . For example, the first indication information is carried in the data PDU, where the SN number of the data PDU is 1, and the data PDU carries N, and the terminal device can determine the SN number of the last data packet in the first type of data packet. Is 5.
- the SN number of the data PDU is 1, and the N carried by the data PDU is 5, and the terminal device can determine the second type of data packet.
- the first packet in the SN number is 6.
- the first indication information specifically indicates whether the SN number of the last data packet in the first type of data packet or the SN number of the first data packet in the second type of data packet may be that the terminal device negotiates with the source access network device in advance. of.
- the data PDU carries N, and the terminal device can determine that the SN number of the first data packet in the second type of data packet is 6.
- the terminal device After receiving the first indication information, the terminal device receives the data packet from the source access network device or the target access network device, and according to the COUNT value corresponding to the received data packet and the first type of data indicated by the first indication information.
- the COUNT value corresponding to the last packet in the packet determines whether the received packet is a first type of packet or a second type of packet. Determining a packet whose COUNT value is less than or equal to the COUNT value of the last packet in the first type of packet as the first type of packet, and the COUNT value is greater than the COUNT value of the last packet in the first type of packet.
- the packet is determined to be the second type of packet.
- the terminal device determines, according to the first indication information, a COUNT value of the first data packet of the second type of data packet, and according to the COUNT value of the received data packet and the second type data packet indicated by the first indication information.
- the COUNT value of a packet determines whether the received packet is a first type of packet or a second type of packet. Determining a packet whose COUNT value is smaller than the COUNT value of the first packet of the second type of packet as the first type of packet, and the COUNT value is greater than or equal to the COUNT value of the first packet of the second type of packet.
- the packet is determined to be the second type of packet.
- the data packets of the 2nd and the 1st packets received from the source access network device can determine that the data packets 2 and 1 are The first type of data packet.
- the terminal device can determine that the data packet No. 5 is the first type of data packet before receiving the warning-marker sent by the source access network device and receiving the data packet No. 5 from the target access network device.
- the terminal device determines, according to the warning-marker, that the COUNT value of the first data packet of the second type of data packet is 6.
- the terminal device After receiving the warning-marker, the terminal device can determine the data packets of packets 4, 3, and 6 received from the target access network device, and determine that the packets with the COUNT value of 4, 3, and 6 are the first class. Packets, packet number 6 with a COUNT value of 6 is a second type of packet. After the terminal device receives the warning-marker, the data packets No. 8 and No. 7 received from the source access network device can determine that the data packets of the 8th and the 7th with the COUNT value of 8, 7 are the second type of data packets.
- the terminal device decrypts the received data packet by using the first encryption key, and the terminal device is within a period of time after the roles of the primary and secondary access network devices are exchanged. You can receive two types of key-encrypted data packets. How to perform key reconfiguration on the terminal device can be implemented in the following two ways. Method 1: The terminal device can flexibly configure two types of keys. That is to say, if the terminal device is different from the data packet received this time, the key reconfiguration is required. For example, if the data packet received by the terminal device is the first type of data packet and the data packet received this time is the second type of data packet, the terminal device needs to perform key reconfiguration and encrypt the encryption key in the PDCP entity.
- the terminal device Configured as the second encryption key.
- the data packet received by the terminal device is the second type of data packet
- the data packet received by the terminal device is the first type of data packet
- the terminal device needs to perform key reconfiguration, and configure the encryption key in the PDCP entity. Is the first encryption key.
- each time the terminal device receives a type of data packet it needs to perform key reconfiguration.
- the beneficial effect is to make full use of time resources and decrypt the second type of data packets as soon as possible.
- Manner 2 The terminal device performs key reconfiguration only once.
- the terminal device before receiving all the first type of data packets, if the terminal device receives the second type of data packet, the terminal device temporarily does not decrypt the second type of data packet, but performs the second type of data packet. Store, wait until the terminal device receives all the first type of data packets and decrypts the completion, the terminal device performs key reconfiguration, configures the encryption key in the PDCP entity as the second encryption key, and then receives the received The second type of packet is decrypted. In this way, the benefit is to reduce the time when the key is dynamically configured. Easy to implement.
- the terminal device may decrypt the data packet No. 2 by using the first encryption key.
- the key reconfiguration can be performed once, that is, the encryption key in the PDCP entity is configured as the second encryption key, and then the second encryption key is used to decrypt the data packet No. 6.
- the terminal device receives the data packet No. 4, and can perform the key reconfiguration again, that is, the encryption key in the PDCP entity is configured as the first encryption key, and then the first encryption key is used to perform the fourth encryption packet. Decrypt. After that, the terminal device receives the data packet No.
- the terminal device 8 can perform the key reconfiguration again, that is, the encryption key in the PDCP entity is configured as the second encryption key, and then the second encryption key is used to perform the eighth encryption packet.
- the terminal device can learn that the SN number of the last data packet in the first type of data packet is 5 according to the start-marker, and when the terminal device receives the data packet No. 6, it is learned that the first type of data packet has not been received yet. That is, only the data packets of 1, 5, 3, and 2 are received, and if the data packet No. 4 is not received, the terminal device temporarily does not perform the decryption of the data packet No. 6, but temporarily stores the data packet No. 6, and waits until it receives 4 packets.
- the terminal device After the data packet is decrypted and the first encryption key is used to decrypt the data packet No. 4, the terminal device performs a key reconfiguration, configures the key in the PDCP entity as the second encryption key, and then receives the number 6 The packet is decrypted.
- the terminal device when receiving the data packet No. 4 sent by the target access network device, the terminal device may decrypt the data packet No. 4 by using the first encryption key.
- the SN number of the first data packet of the second type of data packet is 6 according to the start-marker.
- the first encryption key is used for decryption.
- the terminal device continues to decrypt using the first encryption key.
- the key reconfiguration may be performed once, that is, the encryption key in the PDCP entity is configured as the second encryption key, and then the second encryption key pair is adopted.
- the packet is decrypted.
- the terminal device receives the end-marker sent by the source access network device, and according to the end-marker, the SN number of the last data packet of the first type of data packet is 5.
- the terminal device receives the data packet No. 8 sent by the source access network device, and decrypts the data packet No. 8 with the second encryption key.
- the terminal device decrypts the received data packets of packets 2, 5, and 4 by using the first encryption key before receiving the start-marker sent by the target access network device.
- the terminal device When the start-marker is received, the SN number of the first packet of the second type of data packet is 6 according to the start-marker. Then, when receiving the data packet No. 6, the terminal device learns that the data packet No. 1-5 before the data packet No. 6 is received, and the terminal device decrypts the data packet of the first to the first encryption key by using the first encryption key. After the decryption, the terminal device performs a key reconfiguration, configures the encryption key in the PDCP entity as the second encryption key, and decrypts the received data packets of 6, 8, and 7 by using the second encryption key.
- the terminal device after receiving the first indication information sent by the access network device, the terminal device sends an acknowledgement message of the first indication information to the access network device.
- the acknowledgment message is indicated by the terminal device by using the PDCP status report or by the control PDU of the PDCP, where the control PDU carries the SN number or the COUNT value of the first indication information, so that the access network device receives the control PDU. Then, according to the SN number or the COUNT value of the first indication information carried by the control PDU, it is learned that the first indication information has been correctly received by the terminal device.
- the access network device sends first indication information to the terminal device, where the first indication information may indicate the last data packet in the first type of data packet or the first data in the second type data packet.
- the terminal device may combine the first indication information to identify whether the received data packet is a first type data packet or a second type data packet. Therefore, the received data packet can be decrypted with the correct key.
- the data transmission method includes but is not limited to the following steps S1501 to S1502:
- the access network device sends fourth indication information to the terminal device, where the fourth indication information is used to indicate that the data packet received before the fourth indication information is the first type of data packet, and the data received after the fourth indication information is received.
- the package is the second type of packet.
- the first type of data packet is obtained by using a first encryption key
- the second type of data packet is obtained by encrypting with a second encryption key.
- the first type of data packet is obtained by using the first encryption key to be encrypted by the source access network device
- the second type of data packet is obtained by using the second encryption key for the target access network device.
- the RLC entity of the terminal device has a reordering function.
- the reordering function means that the RLC entity has a function of delivering data packets to the PDCP in order.
- the access network device described in step S1501 may be a source access network device or a target access network device.
- the source access network device After the source access network device and the target access network device perform the role exchange, the source access network device generates the fourth indication information, and then sends the fourth indication information by using the air interface path of the source access network device and the terminal device.
- the source access network device may also send the fourth indication information to the target access network device, to send the fourth indication information to the terminal device by using the air interface path of the target access network device and the terminal device.
- the access network device sends a Radio Resource Control (RRC) reconfiguration message to the terminal device.
- RRC Radio Resource Control
- the terminal device receives the RRC reconfiguration message sent by the access network device, and starts the reordering function of the RLC entity.
- the fourth indication information is carried in the data PDU or the control PDU.
- the implementation manner of carrying the fourth indication information in the data PDU or the control PDU may refer to the implementation manner of carrying the first indication information in the data PDU or the control PDU in the embodiment shown in FIG. 3 , and details are not described herein again.
- the PDCP entity of the forked bearer is located in the target access network device, and the second type of data packet no longer passes the RLC entity and the MAC entity of the source access network device. And PHY entity transmission, only through the RLC entity, MAC entity and PHY entity of the target access network device.
- the target access network device does not receive the ACK message of the fourth indication information.
- the second type of data packet was not sent to the terminal device. As shown in FIG. 4, the data packet of No.
- the target access network device After transmitting the data packet No. 5 to the terminal device, the target access network device sends a start-marker to the terminal device. In order to ensure that the start-marker arrives at the PDCP entity of the terminal device before the 6-8 data packet, that is, the RLC entity of the terminal device and the subsequent data packet are delivered to the PDCP entity later than the start-marker, the target is connected. The target access network device does not send the 6-8 packet before the network access device receives the ACK message of the start-marker returned by the terminal device.
- the PDCP entity of the forked bearer is located in the target access network device, and the second type of data packet may pass through the RLC entity and the MAC entity of the source access network device. And the PHY entity transmission may also be transmitted through the RLC entity, the MAC entity, and the PHY entity of the target access network device.
- the source access network device needs to send the fourth indication information to the terminal device.
- the primary and secondary access network devices then perform role swapping.
- the target access network device also needs to send the fourth indication information to the terminal device.
- the indication information is delivered by the RLC entity of the terminal device to the PDCP entity earlier than the second type of data packet and the second type of data packet, and the source access network device does not send the ACK message before receiving the fourth indication information.
- the second type of data packet is given to the terminal device.
- the target access network device is not received.
- the second type of data packet is not sent to the terminal device.
- the data packet No. 1-5 is the first type data packet, and the data packet No.
- the source access network device After transmitting the data packet No. 1 to the terminal device, the source access network device sends an end-marker to the terminal device. In order to ensure that the end-marker arrives at the PDCP entity of the terminal device before the 8th and 7th data packets, that is, the 8th and 7th packets and the subsequent data packets are delivered by the RLC entity of the terminal device to the PDCP entity later than the end-marker, The source access network device does not send the packets of packets 8 and 7 before receiving the ACK message of the end-marker returned by the terminal device. Similarly, after transmitting the data packet No. 4 to the terminal device, the target access network device sends a start-marker to the terminal device.
- the target access network device In order to ensure that the start-marker arrives at the PDCP entity of the terminal device before the 6th data packet, that is, the RLC entity of the terminal device and the subsequent data packet are delivered to the PDCP entity later than the start-marker, the target access network The target access network device does not send packet No. 6 until the device receives the ACK message of the start-marker returned by the terminal device.
- the terminal device receives the fourth indication information sent by the access network device, and determines, according to the fourth indication information, that the received data packet is the first type data packet or the second type data packet.
- the RLC entity of the terminal device has the reordering function, and the fourth indication information may not carry the SN information, and the terminal device receives the data packet and the access network device that sends the data packet according to the sequence of receiving the received data packet and the fourth indication information.
- the terminal device receives the data packet and the access network device that sends the data packet according to the sequence of receiving the received data packet and the fourth indication information.
- the data packet received by the PDCP before the fourth indication information is determined as the first type of data packet
- the data packet received by the PDCP after the fourth indication information is determined as the second type of data packet.
- the data packets of No. 1-5 are the first type of data packets
- the data packets of the sixth and eighth types are the second type of data packets.
- the sequence of data packets received by the two RLCs of the terminal device are, respectively, RLC-1:2, 1; RLC-2: start-marker, 4, 3, 5, 6, 7, 8.
- the RLC of the terminal device reorders the received data packets, that is, restores the SN number sequence of the data packets in one RLC entity. After reordering, the sequence of data packets received by the two RLCs of the terminal device are respectively, RLC-1:1, 2; RLC-2: 3, 4, 5, start-marker, 6, 7, 8.
- the PDCP entity of the terminal device may determine, according to the access network device that sends the data packet and the fourth indication information, that the data packet of the source access network device is the first type of data packet, and determines that the target access network device sends the data packet. Packets 3, 4, and 5 before the start-marker are the first type of data packets, and packets 6-8 after the start-marker are the second type of data packets.
- the data packets of No. 1-5 are the first type of data packets
- the data packets of the sixth and eighth types are the second type of data packets.
- the sequence of data packets received by the two RLCs of the terminal device are RLC-1:2, end-marker, 1, 8, and 7, RLC-2:3, start-marker, 5, 4, and 6.
- the RLC of the terminal device reorders the received data packets, that is, restores the SN number sequence of the data packets in one RLC entity. After reordering, the sequence of data packets received by the two RLCs of the terminal device are respectively, RLC-1:1, 2, end-marker, 7, 8; RLC-2: 3, 4, 5, start-marker, 6 .
- the PDCP entity of the terminal device may determine, according to the corresponding access network device that sends the data and the fourth indication information, that the data packets of the first and second packets before the source access network device sends the end-marker are the first type of data packet, the end-marker After the 7th and 8th packets are the second type of data packets, it is determined that the packets of the third, fourth, and fifth packets before the start-marker is sent by the target access network device are the first type of data packets, and the data packets of the sixth type after the start-marker are For the second type of data packet.
- the PDCP of the terminal device After determining the first type of data packet, the PDCP of the terminal device decrypts the first type of data packet by using the first encryption key. After determining the second type of data packet, the PDCP of the terminal device decrypts the second type of data packet by using the second encryption key.
- the access network device sends the fourth indication information to the terminal device, where the fourth indication information may indicate that the data packet received before the fourth indication information is the first type of data packet, and the fourth indication information
- the received data packet is then the second type of data packet.
- the RCL entity of the terminal device can reorder the out-of-order data packets to restore the original sequence of the received data packet, and the PDCP entity of the terminal device receives the fourth indication information.
- the fourth indication information can be combined to identify whether the received data packet is the first type of data packet or the second type of data packet. Therefore, the received data packet can be decrypted with the correct key.
- the present invention provides an access network device and a terminal device, which are used in the data transmission method provided by the embodiment of the present invention.
- the access network device 180 can include a processor 1801, a transmitter 1802, a receiver 1803, a coupler 1804, a memory 1805, a network interface 1806, and an antenna 1807. These components may be connected by a bus or other means, wherein the bus connection is taken as an example in FIG.
- the network interface 1806 is used by the access network device 180 to perform data communication with the terminal device.
- the access network device 180 may include one or more of a GSM (2G) wireless network interface, a WCDMA (3G) wireless network interface, and an LTE (4G) wireless network interface, etc., or may be a future 5G. Wireless network interface.
- the antenna 1807 is used to convert electromagnetic energy in the transmission line into electromagnetic waves in free space, or to convert electromagnetic waves in free space into electromagnetic energy in the transmission line;
- the coupler 1804 is used to divide the mobile signal into multiple channels and distribute it to multiple Receiver 1803.
- the transmitter 1802 is configured to perform a transmission process (eg, modulation) on the mobile communication signal generated by the processor 1801, and the receiver 1803 is configured to perform a reception process (eg, demodulation) on the mobile communication signal received by the antenna 1807, which may be regarded as one Wireless modem.
- the number of the transmitter 1802 or the receiver 1803 may be one or more.
- the memory 1805 is configured to store program code and data.
- the memory 1805 can be a read-only memory (ROM) or a random access memory (RAM).
- the processor 1801 is configured to invoke the program code stored in the memory 1805, and perform the following operations:
- the transmitter 1802 Transmitting, by the transmitter 1802, the first indication information to the terminal device, where the first indication information is used to indicate a last data packet in the first type of data packet or a first data packet in the second type of data packet, where One type of data packet is encrypted with a first encryption key, and the second type of data packet is encrypted with a second encryption key.
- the first indication information includes at least one of the following information: a sequence number corresponding to a last one of the first type of data packets, and a first data packet of the second type of data packets. Corresponding serial number, a difference between a sequence number and an offset value corresponding to a last data packet in the first type of data packet, a sequence number corresponding to the first data packet in the second type data packet, and an offset value Difference.
- the processor 1801 after the processor 1801 sends the first indication information to the terminal device by using the transmitter 1802, the processor 1801 is further configured to: after the receiver 1803 receives the confirmation message of the first indication information sent by the terminal device, And transmitting, by the transmitter 1802, the second type of data packet to the terminal device.
- the processor 1801 sends the first indication information to the terminal device by using the transmitter 1802, including:
- the first indication information is sent to the terminal device.
- the access network device 180 is a first access network device, and the first type of data packet is obtained by using the first encryption key to be encrypted by the first access network device, where The second type of data packet is obtained by using the second encryption key to be encrypted by the second access network device; after receiving the confirmation message of the first indication information sent by the terminal device, the processor 1801 transmits the The device 1802 sends the second indication information to the second access network device, where the second indication information is used to instruct the second access network device to send the second type of data packet.
- the first indication information is carried in a data protocol data unit or a control protocol data unit, or
- the processor 1801 sends the first indication information to the terminal device by using the transmitter 1802, including:
- the data protocol data unit includes third indication information, where the third indication information is used to indicate that the first indication information is carried in the data protocol data unit, where a sequence number of the data protocol data unit is The sequence number indicated by the first indication information.
- the processor 1801 is configured to invoke the program code stored in the memory 1805, and perform the following operations:
- the transmitter 1802 Transmitting, by the transmitter 1802, the fourth indication information to the terminal device, where the fourth indication information is used to indicate that the data packet received before the fourth indication information is a first type of data packet, after the fourth indication information
- the received data packet is a second type of data packet
- the first type of data packet is obtained by using a first encryption key
- the second type of data packet is obtained by using a second encryption key.
- the radio link layer control protocol entity of the terminal device has a reordering function.
- the processor 1801 before the processor 1801 sends the fourth indication information to the terminal device by using the transmitter 1802, the processor 1801 is further configured to: send, by using the transmitter 1802, a radio resource control reconfiguration message to the terminal device, where the radio resource control is performed.
- the reconfiguration message is used to instruct the terminal device to enable the reordering function of the radio link layer control protocol entity.
- the fourth indication information is carried in a data protocol data unit or a control protocol data unit.
- the terminal device 190 may include: an input and output module (including an audio input and output module 1908, a key input module 1909, and a display 1910, etc.), a user interface 1906, a processor 1901, a transmitter 1902, a receiver 1903, and a coupler 1904. Antenna 1907 and memory 1905. These components may be connected by a bus or other means, wherein the bus connection is taken as an example in FIG.
- the antenna 1907 is for converting electromagnetic energy in a transmission line into electromagnetic waves in free space, or converting electromagnetic waves in free space into electromagnetic energy in a transmission line.
- the coupler 1904 is configured to divide the mobile pass signal into multiple channels and distribute it to a plurality of receivers 1903.
- the transmitter 1902 is configured to perform a transmission process (eg, modulation) on the mobile communication signal generated by the processor 1901, and the receiver 1903 is configured to perform a reception process (eg, demodulation) on the mobile communication signal received by the antenna 1907, which may be regarded as one Wireless modem.
- the number of the transmitter 1902 or the receiver 1903 may be one or more.
- the input and output module is mainly used to implement the interaction function between the terminal device 190 and the user/external environment, and mainly includes an audio input and output module 1908, a key input module 1909, a display 1910, and the like.
- the input and output module may further include: a camera, a touch screen, a sensor, and the like.
- the input and output modules communicate with the processor 1901 through the user interface 1906.
- Memory 1905 is coupled to processor 1901 for storing various software programs and/or sets of instructions.
- memory 1905 can include high speed random access memory, and can also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
- the processor 1901 is configured to call the program and data stored in the memory 1905, and perform the following operations:
- the receiver 1903 Receiving, by the receiver 1903, the first indication information sent by the access network device, where the first indication information is used to indicate the last data packet in the first type of data packet or the first data packet in the second type of data packet,
- the first type of data packet is encrypted by using a first encryption key
- the second type of data packet is encrypted by using a second encryption key
- the first indication information includes at least one of the following information: a sequence number corresponding to a last one of the first type of data packets, and a first data packet of the second type of data packets. Corresponding serial number, a difference between a sequence number and an offset value corresponding to a last data packet in the first type of data packet, a sequence number corresponding to the first data packet in the second type data packet, and an offset value Difference.
- the processor 1901 is further configured to: send, by using the transmission 1902, the confirmation that the first indication information is sent to the access network device. Message.
- the confirmation message is sent by the terminal device by using a packet data convergence protocol status report or by a control protocol data unit of a packet data convergence protocol, where the control protocol data unit carries the first indication information indication Serial number.
- the first indication information is carried in a data protocol data unit or a control protocol data unit.
- the data protocol data unit further carries third indication information, where the third indication information is used to indicate that the first protocol information is carried in the data protocol data unit, and the sequence number of the data protocol data unit is a sequence number indicated by the first indication information.
- the processor 1901 is configured to invoke the program and data stored in the memory 1905, and perform the following operations: receiving, by the receiver 1903, fourth indication information sent by the access network device, where the The fourth indication information is used to indicate that the data packet received before the fourth indication information is a first type of data packet, and the data packet received after the fourth indication information is a second type of data packet, the first The class data packet is obtained by encrypting with a first encryption key, and the second type of data packet is obtained by encrypting with a second encryption key;
- the radio link layer control protocol entity of the terminal device 190 has a reordering function.
- the processor 1901 before the processor 1901 receives the fourth indication information sent by the access network device by the receiver 1903, the processor 1901 is further configured to:
- the reordering function of the radio link layer control protocol entity is enabled according to the radio resource control reconfiguration message.
- the fourth indication information is carried in a data protocol data unit or a control protocol data unit.
- FIG. 20 is a schematic structural diagram of another access network device according to an embodiment of the present invention. As shown in FIG. 20, the access network device 200 includes a generating unit 2001 and a transmitting unit 2002.
- the generating unit 2001 is configured to generate first indication information, where the first indication information is used to indicate the last data packet or the second type data packet in the first type of data packet.
- the first one of the data packets, the first type of data packet is encrypted with a first encryption key, and the second type of data data packet is encrypted with a second encryption key.
- the sending unit 2002 is configured to send the first indication information to the terminal device.
- the first indication information includes at least one of the following information: a sequence number corresponding to a last one of the first type of data packets, and a first data packet of the second type of data packets. Corresponding serial number, a difference between a sequence number and an offset value corresponding to a last data packet in the first type of data packet, a sequence number corresponding to the first data packet in the second type data packet, and an offset value Difference.
- the sending unit 2001 is further configured to: after the access network device 200 receives the confirmation message of the first indication information sent by the terminal device, The terminal device sends the second type of data packet.
- the sending unit 2002 sends the first indication information to the terminal device, specifically:
- the first indication information is sent to the terminal device.
- the access network device 200 is the first access network device, and the first type of data packet is obtained by the access network device 200 by using the first encryption key, and the second type of data packet is The second access network device is encrypted by using the second encryption key; after receiving the confirmation message of the first indication information sent by the terminal device, the access network device 200 sends the unit 2002, and further And the second indication information is used to send the second type of data packet to the second access network device.
- the first indication information is carried in a data protocol data unit or a control protocol data unit, or
- the sending unit 2002 sends the first indication information to the terminal device, specifically:
- the first indication information is sent to the terminal device by using a data protocol data unit or a control protocol data unit.
- the data protocol data unit includes third indication information, where the third indication information is used to indicate that the first indication information is carried in the data protocol data unit, where a sequence number of the data protocol data unit is The sequence number indicated by the first indication information.
- each function module in the access network device 200 described in the embodiment of the present invention refers to the related description of the corresponding access network device in the foregoing embodiment shown in FIG. 3, and details are not described herein again.
- the generating unit 2001 is configured to generate fourth indication information, where the fourth The indication information is used to indicate that the data packet received before the fourth indication information is a first type of data packet, and the data packet received after the fourth indication information is a second type of data packet, the first type The data packet is obtained by encrypting with a first encryption key, and the second type of data packet is obtained by encrypting with a second encryption key.
- the sending unit 2002 is configured to send fourth indication information to the terminal device.
- the radio link layer control protocol entity of the terminal device has a reordering function.
- the sending unit 2002 is further configured to: send a radio resource control reconfiguration message to the terminal device, where the radio resource control reconfiguration message is used to indicate the The terminal device turns on the reordering function of the radio link layer control protocol entity.
- the fourth indication information is carried in a data protocol data unit or a control protocol data unit.
- FIG. 21 is a schematic structural diagram of another terminal device according to an embodiment of the present invention.
- the terminal device 210 includes a receiving unit 2101 and a processing unit 2102.
- the receiving unit 2101 is configured to receive first indication information that is sent by the access network device, where the first indication information is used to indicate the last data packet in the first type of data packet. Or the first one of the second type of data packets, the first type of data packet is encrypted with a first encryption key, and the second type of data packet is encrypted with a second encryption key.
- the processing unit 2102 is configured to determine, according to the first indication information, that the received data packet is the first type of data packet or the second type of data packet.
- the first indication information includes at least one of the following information: a sequence number corresponding to a last one of the first type of data packets, and a first data packet of the second type of data packets. Corresponding serial number, a difference between a sequence number and an offset value corresponding to a last data packet in the first type of data packet, a sequence number corresponding to the first data packet in the second type data packet, and an offset value Difference.
- the terminal device 210 further includes: a sending unit 2103, after the receiving unit 2101 receives the first indication information sent by the access network device, the sending unit 2103 is configured to send the first indication information to the access network device. Confirmation message.
- the confirmation message is sent by the terminal device by using a packet data convergence protocol status report or by a control protocol data unit of a packet data convergence protocol, where the control protocol data unit carries the first indication information indication Serial number.
- the first indication information is carried in a data protocol data unit or a control protocol data unit.
- the data protocol data unit further carries third indication information, where the third indication information is used to indicate that the first protocol information is carried in the data protocol data unit, and the sequence number of the data protocol data unit is a sequence number indicated by the first indication information.
- the receiving unit 2101 is configured to receive fourth indication information that is sent by the access network device, where the fourth indication information is used to indicate that the fourth indication information is received before the fourth indication information.
- the packet is the first class According to the packet, the data packet received after the fourth indication information is a second type of data packet, where the first type of data packet is encrypted by using a first encryption key, and the second type of data packet is used.
- the second encryption key is encrypted.
- the processing unit 2102 is configured to determine, according to the fourth indication information, that the received data packet is the first type of data packet or the second type of data packet.
- the radio link layer control protocol entity of the terminal device 210 has a reordering function.
- the receiving unit 2101 before the receiving unit 2101 receives the fourth indication information sent by the access network device, the receiving unit 2101 is further configured to receive the radio resource control reconfiguration message sent by the access network device.
- the processing unit 2102 is further configured to enable a reordering function of the radio link layer control protocol entity according to the radio resource control reconfiguration message.
- the fourth indication information is carried in a data protocol data unit or a control protocol data unit.
- the steps of the method or algorithm described in this application may be implemented in a hardware manner or in a manner that the processor executes the software instructions.
- the software instructions may be composed of corresponding software modules, which may be stored in RAM, flash memory, ROM, Erasable Programmable ROM (EPROM), and electrically erasable programmable read only memory (Electrically EPROM).
- EEPROM Electrically erasable programmable read only memory
- registers hard disk, removable hard disk, compact disk read only (CD-ROM) or any other form of storage medium known in the art.
- An exemplary storage medium is coupled to the processor to enable the processor to read information from, and write information to, the storage medium.
- the storage medium can also be an integral part of the processor.
- the processor and the storage medium can be located in an ASIC. Additionally, the ASIC can be located in a primary access network device or a secondary access network device.
- the processor and the storage medium may also exist as discrete components in the primary access network device or the secondary access network device.
- the functions described in the embodiments of the present invention may be implemented in hardware, software, firmware, or any combination thereof.
- the functions may be stored in a computer readable medium or transmitted as one or more instructions or code on a computer readable medium.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
- a storage medium may be any available media that can be accessed by a general purpose or special purpose computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明实施例公开了一种数据传输方法、相关设备及通信系统,其中该方法包括:接入网设备向终端设备发送第一指示信息,所述第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,所述第一类数据包采用第一加密密钥加密,所述第二类数据包采用第二加密密钥加密。采用本发明实施例,可以保证在源接入网设备与目标接入网设备进行角色互换(即源接入网设备由主接入网设备转变为副接入网设备,目标接入网设备由副接入网设备转变为主接入网设备)后,终端设备可以使用正确的密钥对数据包进行解密。
Description
本发明实施例涉及通信技术领域,尤其涉及一种数据传输方法、相关设备及通信系统。
第五代(the fifth generation,5G)移动通信中,在切换(Handover,HO)时延上提出的需求为0ms,即在切换过程中终端设备在源接入网设备与目标接入网设备之间切换时无传输时间间断。为实现真正的0ms中断,需要终端设备与源接入网设备及目标接入网设备可以同时相连。双连接(Duel Connectivity,DC)就可以实现该功能,即终端设备同时与两个接入网设备相连。DC中包含的无线承载有三类,主小区组承载(Master Cell Group Bearer,MCG Bearer)、辅小区组承载(Secondary Cell Group Bearer,SCG Bearer)与分叉承载(Split Bearer),其中主小区组承载与辅小区组承载分别指仅通过主接入网设备(Master next-generation Node B,MgNB)与仅通过副接入网设备(Secondary next-generation Node B,SgNB)传输的无线承载,分叉承载可以实现同一个无线承载通过两个接入网设备进行传输。参见图1所示的层2协议栈的架构示意图,分叉承载的下行数据通过主接入网设备的分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)实体处理,一部分PDCP协议数据单元(Protocol Data Unit,PDU)通过主接入网设备的无线链路层控制协议(Radio Link Control,RLC)实体、媒体接入控制(Media Access Control,MAC)实体及物理层(Physical Layer,PHY)实体向终端设备传输,另一部分PDCP PDU通过主接入网设备与副接入网设备的X2接口到达副接入网设备,并通过副接入网设备的RLC、MAC及PHY向终端设备传输。
通过DC中的分叉承载可以实现同一个承载的数据通过两条路径向终端设备传输。针对0ms的HO时延要求,新的无线技术(New Radio,NR)中的HO过程可以通过三步实现:步骤一、将目标接入网设备(Target gNB)添加为源接入网设备(Source gNB)的副接入网设备。步骤二、主接入网设备(即源接入网设备)与副接入网设备(即目标接入网设备)做角色互换(即交换功能,由目标接入网设备做主接入网设备,源接入网设备做副接入网设备)。步骤三、将副接入网设备(即源接入网设备)移除。
由于在源接入网设备与目标接入网设备进行角色转换之前,数据包均由主接入网设备即源接入网设备的PDCP进行加密,并通过分叉承载由源接入网设备及目标接入网设备进行传输。当二者角色发生转换时,源接入网设备的PDCP、RLC以及MAC与目标接入网设备的RLC以及MAC内有由源接入网设备加密的数据包。当角色发生转换后,目标接入网设备的PDCP开始对数据进行加密,并通过分叉承载由源接入网设备及目标接入网设备进行传输。同时由于0ms HO的时延要求,应避免步骤二在角色转换中进行层2协议栈的重建或重置,因此,终端设备并不知道在收到无线资源控制(Radio Resource Control,RRC)重配消息后,主接入网设备与副接入网设备的转换在什么时间进行。由于空口上数据包到达终端设备的RLC为乱序的,而NR中RLC不能保证向PDCP进行按序递交,这将导致
终端设备的PDCP收到RLC提交的数据包为乱序,某些由目标接入网设备加密的数据包可能优先于角色转换之前源接入网设备加密的数据包到达RLC,从而导致终端设备无法知道哪些数据包是源接入网设备的密钥加密的,哪些是目标接入网设备的密钥加密的,因此无法正确解密数据包。
发明内容
本发明实施例提供了一种数据传输方法、相关设备及通信系统,可以保证在源接入网设备与目标接入网设备进行角色互换(即源接入网设备由主接入网设备转变为副接入网设备,目标接入网设备由副接入网设备转变为主接入网设备)后,终端设备可以使用正确的密钥对数据包进行解密。
本发明实施例具体可以通过如下技术方案实现:
第一方面,本发明实施例提供了一种数据传输方法,该方法应用于接入网设备侧。该方法包括:接入网设备向终端设备发送第一指示信息,该第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,该第一类数据包采用第一加密密钥加密,该第二类数据包采用第二加密密钥加密。通过实施本发明实施例,接入网设备将第一指示信息发送给终端设备,可以保证在源接入网设备与目标接入网设备进行角色互换后,终端设备基于该第一指示信息可以识别接收到的数据包是第一类数据包还是第二类数据包,从而能够采用正确的密钥对数据包进行解密。
在一个可能的设计中,该第一指示信息包括以下信息中的至少一种:该第一类数据包中的最后一个数据包对应的序号、该第二类数据包中的第一个数据包对应的序号、该第一类数据包中的最后一个数据包对应的序号与偏置值的差值、该第二类数据包中的第一个数据包对应的序号与偏置值的差值。
在一个可能的设计中,上述序号包括序列号或计数值。
在一个可能的设计中,该接入网设备向终端设备发送第一指示信息之后,接入网设备在接收到该终端设备发送的该第一指示信息的确认消息后,向该终端设备发送该第二类数据包。通过实施本发明实施例,可以确保终端设备在没有接收到第一指示信息之前接收不到第二类数据包,因此,终端设备在未接收到第一指示信息之前,可以继续采用第一加密密钥对接收到的数据包正确解密。
在一个可能的设计中,该接入网设备向终端设备发送第一指示信息,包括:该接入网设备在将该第一类数据包全部发送给该终端设备后,向该终端设备发送该第一指示信息。
在一个可能的设计中,该接入网设备为第一接入网设备,该第一类数据包为该第一接入网设备采用该第一加密密钥加密得到的,该第二类数据包为该第二接入网设备采用该第二加密密钥加密得到的。该第一接入网设备在接收到该终端设备发送的该第一指示信息的确认消息后,该第一接入网设备向该第二接入网设备发送第二指示信息,该第二指示信息用于指示该第二接入网设备发送该第二类数据包。
在一个可能的设计中,该第一指示信息携带在数据协议数据单元或控制协议数据单元中,或,该接入网设备向终端设备发送第一指示信息,包括:该接入网设备通过数据协议数据单元或控制协议数据单元向该终端设备发送该第一指示信息。
在一个可能的设计中,该数据协议数据单元包括第三指示信息,该第三指示信息用于指示该数据协议数据单元中携带该第一指示信息,该数据协议数据单元的序号为该第一指示信息指示的序号。
第二方面,本发明实施例提供了另一种数据传输方法,该方法应用于终端设备侧。该方法包括:终端设备接收接入网设备发送的第一指示信息,该第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,该第一类数据包采用第一加密密钥加密,该第二类数据包采用第二加密密钥加密。该终端设备根据该第一指示信息确定接收到的数据包为该第一类数据包或该第二类数据包。通过实施本发明实施例,可以保证在源接入网设备与目标接入网设备进行角色互换后,终端设备基于该第一指示信息可以识别接收到的数据包是第一类数据包还是第二类数据包,从而能够采用正确的密钥对数据包进行解密。
在一个可能的设计中,该第一指示信息包括以下信息中的至少一种:该第一类数据包中的最后一个数据包对应的序号、该第二类数据包中的第一个数据包对应的序号、该第一类数据包中的最后一个数据包对应的序号与偏置值的差值、该第二类数据包中的第一个数据包对应的序号与偏置值的差值。
在一个可能的设计中,该终端设备接收接入网设备发送的第一指示信息之后,还包括:该终端设备向该接入网设备发送该第一指示信息的确认消息。
在一个可能的设计中,该确认消息为该终端设备通过分组数据汇聚协议状态报告指示的或者通过分组数据汇聚协议的控制协议数据单元发送的,该控制协议数据单元携带该第一指示信息指示的序号。
在一个可能的设计中,该第一指示信息携带在数据协议数据单元或控制协议数据单元中。
在一个可能的设计中,该数据协议数据单元中还携带第三指示信息,该第三指示信息用于指示该数据协议数据单元中携带该第一指示信息,该数据协议数据单元的序号为该第一指示信息指示的序号。
第三方面,本发明实施例提供了另一种数据传输方法,该方法应用于接入网设备侧。该方法包括:接入网设备向终端设备发送第四指示信息,该第四指示信息用于指示在该第四指示信息之前接收到的数据包为第一类数据包,在该第四指示信息之后接收到的数据包为第二类数据包,该第一类数据包为采用第一加密密钥加密得到的,该第二类数据包为采用第二加密密钥加密得到的。通过实施本发明实施例,接入网设备将第一指示信息发送给终端设备,可以保证在源接入网设备与目标接入网设备进行角色互换后,终端设备基于该第四指示信息可以识别接收到的数据包是第一类数据包还是第二类数据包,从而能够采用正确的密钥对数据包进行解密。
在一个可能的设计中,该终端设备的无线链路层控制协议实体具有重排序功能。
在一个可能的设计中,该接入网设备向终端设备发送第四指示信息之前,该接入网设备向该终端设备发送无线资源控制重配置消息,该无线资源控制重配置消息用于指示该终端设备开启无线链路层控制协议实体的重排序功能。
在一个可能的设计中,该第四指示信息携带在数据协议数据单元或控制协议数据单元
中。
第四方面,本发明实施例提供了另一种数据传输方法,该方法应用于终端设备侧。该方法包括:终端设备接收接入网设备发送的第四指示信息,该第四指示信息用于指示在该第四指示信息之前接收到的数据包为第一类数据包,在该第四指示信息之后接收到的数据包为第二类数据包,该第一类数据包为采用第一加密密钥加密得到的,该第二类数据包为采用第二加密密钥加密得到的。终端设备根据第四指示信息确定接收到的数据包为第一类数据包或第二类数据包。通过实施本发明实施例,可以保证在源接入网设备与目标接入网设备进行角色互换后,终端设备基于该第四指示信息可以识别接收到的数据包是第一类数据包还是第二类数据包,从而能够采用正确的密钥对数据包进行解密。
在一个可能的设计中,该终端设备的无线链路层控制协议实体具有重排序功能。
在一个可能的设计中,该终端设备接收接入网设备发送的第四指示信息之前,该终端设备接收该接入网设备发送的无线资源控制重配置消息。该终端设备根据该无线资源控制重配置消息开启无线链路层控制协议实体的重排序功能。
在一个可能的设计中,该第四指示信息携带在数据协议数据单元或控制协议数据单元中。
第五方面,本发明实施例提供了一种接入网设备,该接入网设备包括用于执行第一方面或第一方面的任一种可能实现方式所提供的数据传输方法的模块或单元,因此也能实现第一方面数据传输方法所具备的有益效果。
第六方面,本发明实施例提供了一种终端设备,该终端设备包括用于执行第二方面或第二方面的任一种可能实现方式所提供的数据传输方法的模块或单元,因此也能实现第二方面数据传输方法所具备的有益效果。
第七方面,本发明实施例提供了另一种接入网设备,该接入网设备包括用于执行第三方面或第三方面的任一种可能实现方式所提供的数据传输方法的模块或单元,因此也能实现第三方面数据传输方法所具备的有益效果。
第八方面,本发明实施例提供了另一种终端设备,该终端设备包括用于执行第四方面或第四方面的任一种可能实现方式所提供的数据传输方法的模块或单元,因此也能实现第四方面数据传输方法所具备的有益效果。
第九方面,本发明实施例提供了另一种接入网设备,该接入网设备包括处理器、发射器和存储器。其中,所述处理器用于调用所述存储器存储的数据传输程序代码执行上述第一方面或第一方面任一种可能实现方式所提供的数据传输方法。
第十方面,本发明实施例提供了另一种终端设备,该终端设备包括处理器、接收器和存储器。其中,所述处理器用于调用所述存储器存储的数据传输程序代码执行上述第二方面或第二方面任一种可能实现方式所提供的数据传输方法。
第十一方面,本发明实施例提供了另一种接入网设备,该接入网设备包括处理器、发射器和存储器。其中,所述处理器用于调用所述存储器存储的数据传输程序代码执行上述第三方面或第三方面任一种可能实现方式所提供的数据传输方法。
第十二方面,本发明实施例提供了另一种终端设备,该接入网设备包括处理器、接收器和存储器。其中,所述处理器用于调用所述存储器存储的数据传输程序代码执行上述第四方面或第四方面任一种可能实现方式所提供的数据传输方法。
第十三方面,本发明实施例还提供了一种通信系统,包括:接入网设备和终端设备。其中:所述接入网设备为第五方面或第九方面所述的接入网设备,所述终端设备为第六方面或第十方面所述的终端设备。或者,所述接入网设备为第七方面或第十一方面所述的接入网设备,所述终端设备为第八方面或第十二方面所述的终端设备。
第十四方面,本发明实施例提供了一种芯片系统,该芯片系统包括处理器,用于支持数据发送设备实现上述方面中所涉及的功能,例如,生成或处理上述方法中所涉及的信息。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存数据发送设备必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
第十五方面,本发明实施例提供一种计算机存储介质,用于储存为上述第一方面所述的接入网面设备所用的计算机软件指令,所述指令当被所述接入网设备执行时使所述接入网设备执行如上述第一方面所述的方法。
第十六方面,本发明实施例提供另一种计算机存储介质,用于储存为上述第二方面所述终端设备所用的计算机软件指令,所述指令当被所述终端设备执行时使所述终端设备执行如上述第二方面所述的方法。
第十七方面,本发明实施例提供另一种计算机存储介质,用于储存为上述第三方面所述接入网设备所用的计算机软件指令,所述指令当被所述接入网设备执行时使所述接入网设备执行如上述第三方面所述的方法。
第十八方面,本发明实施例提供另一种计算机存储介质,用于储存为上述第四方面所述终端设备所用的计算机软件指令,所述指令当被所述终端设备执行时使所述终端设备执行如上述第四方面所述的方法。
第十九方面,本发明实施例提供一种计算机程序,该程序包括计算机软件指令,所述指令当被所述接入网设备执行时使所述接入网设备执行如上述第一方面所述的方法。
第二十方面,本发明实施例提供另一种计算机程序,该程序包括计算机软件指令,所述指令当被所述终端设备执行时使所述终端设备执行如上述第二方面所述的方法。
第二十一方面,本发明实施例提供另一种计算机程序,该程序包括计算机软件指令,所述指令当被所述接入网设备执行时使所述接入网设备执行如上述第三方面所述的方法。
第二十二方面,本发明实施例提供另一种计算机程序,该程序包括计算机软件指令,所述指令当被所述终端设备执行时使所述终端设备执行如上述第四方面所述的方法。
图1是层2协议栈的架构示意图;
图2是本发明实施例涉及的一种通信系统的架构示意图;
图3是本发明实施例提供的一种数据传输方法的流程示意图;
图4是本发明实施例提供的一种接入网设备向终端设备发送数据包的示意图;
图5是本发明实施例提供的另一种接入网设备向终端设备发送数据包的示意图;
图6是本发明实施例提供的另一种接入网设备向终端设备发送数据包的示意图;
图7是本发明实施例提供的另一种接入网设备向终端设备发送数据包的示意图;
图8是本发明实施例提供的另一种接入网设备向终端设备发送数据包的示意图;
图9是本发明实施例提供的一种终端设备接收接入网设备发送的数据的示意图;
图10是本发明实施例提供的一种终端设备接收到接入网设备发送的数据包的示意图;
图11是本发明实施例提供的另一种终端设备接收到接入网设备发送的数据包的示意图;
图12是本发明实施例提供的另一种终端设备接收到接入网设备发送的数据包的示意图;
图13是本发明实施例提供的另一种终端设备接收到接入网设备发送的数据包的示意图;
图14是本发明实施例提供的另一种终端设备接收到接入网设备发送的数据包的示意图;
图15是本发明实施例提供的另一种数据传输方法的流程示意图;
图16是本发明实施例提供的另一种终端设备接收到接入网设备发送的数据包的示意图;
图17是本发明实施例提供的另一种终端设备接收到接入网设备发送的数据包的示意图;
图18是本发明实施例提供的一种接入网设备的结构示意图;
图19是本发明实施例提供的一种终端设备的结构示意图;
图20是本发明实施例提供的另一种接入网设备的结构示意图;
图21是本发明实施例提供的另一种终端设备的结构示意图。
请参见图2,是本发明实施例涉及的一种通信系统的架构示意图,该通信系统200包括终端设备201、源接入网设备202和目标接入网设备203。其中,在源接入网设备202和目标接入网设备203进行角色转换之前,源接入网设备202为主接入网设备,目标接入网设备203为副接入网设备。来自核心网用户面的数据包均由源接入网设备202的PDCP实体进行加密,并通过分叉承载由源接入网设备202和目标接入网设备203传输给终端设备201。具体的,源接入网设备202将分叉承载中的数据包一部分通过源接入网设备202的PDCP实体、RLC实体、MAC实体以及PHY实体发送给终端设备201,源接入网设备202将分叉承载中的数据包另一部分转发给目标接入网设备203,再由目标接入网设备203的RLC实体、MAC实体以及PHY实体发送给终端设备201。当角色发生转换后,目标接入网设备203的PDCP实体开始对数据进行加密,并通过分叉承载由源接入网设备202及目标接入网设备203进行传输。
终端设备和接入网设备可以进行数据通信,终端设备也可以称为用户设备、移动台、接入终端、用户单元、用户站、移动站、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。终端设备可以是手持终端设备、笔记本电脑、用户单元(Subscriber Unit)、蜂窝电话(Cellular Phone)、智能电话(Smart Phone)、无线数据卡、
个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、车载设备、可穿戴设备以及未来5G网络中的移动台或者未来演进的公共陆地移动网(Public Land Mobile Network,PLMN)网络中的终端设备等。终端设备与接入网设备之间采用某种空口技术相互通信。
接入网设备主要负责空口侧的无线资源管理、服务质量(Quality of Service,QoS)管理、数据压缩和加密等功能。接入网设备可以包括各种形式的接入网设备,例如:宏接入网设备,微接入网设备(也称为小站),中继站,接入点等。在采用不同的无线接入技术的系统中,具备接入网设备功能的设备的名称可能会有所不同,例如,在5G通信系统中,称为下一代节点(next-generation Node B,gNB);在LTE系统中,称为演进的节点B(evolved NodeB,eNB或者eNodeB);在第三代(3rd Generation,3G)系统中,称为节点B(Node B)等。在未来的通信系统中,接入网设备还可以有其他名称,例如基站,本发明实施例不作具体限定。
基于图2所示的网络架构,结合图3来描述本发明实施例提供的一种数据传输方法。如图3所示,该数据传输方法包括但不限于如下步骤S301至S302:
S301:接入网设备向终端设备发送第一指示信息,第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包。
本发明实施例中,第一类数据包采用第一加密密钥加密,第二类数据包采用第二加密密钥加密。并且第一加密密钥与第二加密密钥不同。第一类数据包为源接入网设备采用第一加密密钥加密得到的,第二类数据包为目标接入网设备采用第二加密密钥得到的。这里,初始是源接入网设备作为主接入网设备且目标接入网设备作为副接入网设备,之后,主副接入网设备进行角色互换,即目标接入网设备变为主接入网设备且源接入网设备变为副接入网设备。
可选的,第一指示信息包括以下信息中的至少一种:第一类数据包中的最后一个数据包对应的序号、第一类数据包中的最后一个数据包对应的序号与偏置值的差值、第二类数据包中的第一个数据包对应的序号、第二类数据包中的第一个数据包对应的序号与偏置值的差值。其中,序号可以是指数据包的序列号(Sequence Number,SN),也可以是指数据包对应的计数值(COUNT)。需要说明的是,COUNT=超帧号(Hyper Frame Number,HFN)+SN。这里,COUNT可以是一个32bit的变量。COUNT跟SN号是对应的,如果SN是18bit,则COUNT的低18位就是SN。如果SN是12bit,则COUNT的低12位就是SN。例如,COUNT为32bit,COUNT的低12位为SN。终端设备与接入网设备均维护HFN值,且终端设备维护的HFN与接入网设备维护的HFN值相等。以SN为12bit为例,假设数据包1携带的SN号为3,即000000000011,则数据包1对应的COUNT值为00000000000000000000000000000011。数据包4099携带的SN号也是3,即000000000011,但数据包4099对应的COUNT值为00000000000000000001000000000011。可以看出,尽管数据包3和数据包4099的SN号相同,但COUNT值不同。SN值每隔4096进行一次重新计数。
如果接入网设备发送的第一指示信息为第一类数据包中的最后一个数据包对应的SN号,则终端设备可以直接根据第一指示信息获知第一类数据包中的最后一个数据包对应的
SN号。如果接入网设备发送的第一指示信息为第二类数据包中的第一个数据包对应的SN号,则终端设备可以直接根据第一指示信息获知第二类数据包中的第一个数据包对应的SN号。如果接入网设备发送的第一指示信息为第一类数据包中的最后一个数据包对应的计数值,则终端设备可以直接根据第一指示信息获知第一类数据包中的最后一个数据包对应的计数值。如果接入网设备发送的第一指示信息为第二类数据包中的第一个数据包对应的计数值,则终端设备可以直接根据第一指示信息获知第二类数据包中的第一个数据包对应的计数值。如果终端设备与接入网设备预先协商好偏置值,接入网设备向终端设备发送的是第一类数据包中的最后一个数据包对应的SN号与偏置值的差值,终端设备也可以根据该差值与该偏置值计算得到第一类数据包中的最后一个数据包对应的SN号。或者接入网设备向终端设备发送的是第一类数据包中的最后一个数据包对应的计数值与偏置值的差值,终端设备也可以根据该差值与该偏置值计算得到第一类数据包中的最后一个数据包对应的计数值。或者接入网设备向终端设备发送的是第二类数据包中的第一个数据包对应的SN号与偏置值的差值,终端设备也可以根据该差值与该偏置值计算得到第二类数据包中的第一个数据包对应的SN号。或者接入网设备向终端设备发送的是第二类数据包中的第一个数据包对应的计数值与偏置值的差值,终端设备也可以根据该差值与该偏置值计算得到第二类数据包中的第一个数据包对应的计数值。需要说明的是,不管终端设备接收到的第一指示信息为上述哪一种情况,终端设备均可以计算得出第一类数据包中的最后一个数据包对应的COUNT值,或者,终端设备均可以计算得出第二类数据包中的第一个数据包对应的COUNT值。终端设备在接收到携带SN号的数据包后,根据该数据包携带的SN号以及COUNT=HFN+SN,也可以计算得到该数据包对应的COUNT值。
例如,SN号分别为1至5号的数据包为第一类数据包,SN号分别为6至8号的数据包为第二类数据包。则第一指示信息可以是第一类数据包中的最后一个数据包对应的SN号5,终端设备根据第一指示信息即可获知第一类数据包中的最后一个数据包对应的SN号为5。或者,第一指示信息可以是第二类数据包中的第一个数据包对应的SN号6,终端设备根据第一指示信息即可获知第二类数据包中的第一个数据包对应的SN号为6。或者,SN号偏置值为3,则第一指示信息可以是第一类数据包中的最后一个数据包对应的SN号5与偏置值3的差值2。终端设备再根据差值2与偏置值3计算得到第一类数据包中的最后一个数据包对应的SN号5。或者,第一指示信息为第二类数据包中的第一个数据包对应的SN号6与偏置值3的差值3。终端设备再根据差值3与偏置值3计算得到第二类数据包中的第一个数据包对应的SN号6。
可选的,接入网设备向终端设备发送第一指示信息之后,还包括:接入网设备在接收到终端设备发送的第一指示信息的确认(Acknowledgement,ACK)消息后,向终端设备发送第二类数据包。这里,为保证第一指示信息在第二类数据包前到达终端设备的PDCP实体,即6数据号包及以后的数据包的由终端设备的RLC实体向PDCP实体递交时间比第一指示信息的晚,接入网设备可以在未收到第一指示信息的ACK消息之前,不向终端设备发送第二类数据包。只有在接收到终端设备发送的第一指示信息的ACK消息后,才会将第二类数据包发送给终端设备。此时,第一指示信息需要带有PDCP新旧密钥加密分割点的SN或COUNT相关信息,即5号数据包为旧密钥加密的最后一个数据包或者6号数据包为新密钥
加密的第一个数据包。第一指示信息包括的信息可以参考上一段的内容,此处不再赘述。需要说明的是,在本发明实施例中,源接入网设备的密钥、旧密钥、第一加密密钥指的是相同的含义,目标接入网设备的密钥、新密钥、第二加密密钥指的是相同的含义。
可选的,步骤S301中描述的接入网设备可以是源接入网设备,也可以是目标接入网设备。以下分别针对这两种实现方式进行描述。
在第一种实现方式中,发送第一指示信息的接入网设备为目标接入网设备。在目标接入网设备由副接入网设备切换为主接入网设备且源接入网设备由主接入网设备切换为副接入网设备之前,分叉承载的PDCP实体位于主接入网设备,即源接入网设备,也即是说,由源接入网设备的PDCP实体对分叉承载的数据包进行加密、加SN号等操作。源接入网设备将一部分第一类数据包通过源接入网设备的PDCP实体、RLC实体、MAC实体以及PHY实体发送给终端设备,源接入网设备将另一部分第一类数据包转发给目标接入网设备,再由目标接入网设备的RLC实体、MAC实体以及PHY实体将这部分第一类数据包发送给终端设备。
当源接入网设备停止行使PDCP实体的功能(包括加密、加SN号等)后,通过Xn接口告知目标接入网设备不会再收到由源接入网设备转发给目标接入网设备的第一类数据包。通知方式可以通过Xn接口发送信令。通知方式也可以通过在Xn接口发送Xn接口上的结束标记(end-marker),其与HO中路径切换(path switch)后收到的end-marker作用不同。长期演进(Long Term Evolution,LTE)HO中路径切换后收到的end-marker为源接入网设备告知目标接入网设备不会再通过X2接口收到数据转发,因此该end-marker需要区别于当前路径切换的end-marker。需要说明的是,在LTE中,源接入网设备与目标接入网设备之间通过X2接口实现通信。在5G中,源接入网设备与目标接入网设备之间采用Xn接口进行通信。
当主副接入网设备角色互换时,即目标接入网设备由副接入网设备切换为主接入网设备,源接入网设备由主接入网设备切换为副接入网设备,源接入网设备的PDCP实体、RLC实体以及MAC实体与目标接入网设备的RLC实体以及MAC实体内有由源接入网设备加密的数据包,即第一类数据包。主副接入网设备角色互换后,分叉承载的PDCP实体位于目标接入网设备,目标接入网设备使用新密钥(即第二加密密钥)加密的数据(即第二类数据包)不再通过源接入网设备的RLC实体、MAC实体及PHY实体传输,仅通过目标接入网设备的RLC实体、MAC实体及PHY实体进行传输。因此,目标接入网设备进行了角色互换后,需要先将未传输的第一类数据包发送给终端设备。目标接入网设备在将第一类数据包全部发送出去之后,发送开始标记(start-marker)给终端设备,该开始标识即为上述第一指示信息,此时,终端设备不一定将第一数据包全部接收成功。为了保证start-marker由终端设备的RLC实体向PDCP实体的递交时间比第二类数据包及以后的第二类数据包早,目标接入网设备在未收到start-marker的ACK消息之前,不发送第二类数据包给终端设备,此时,start-marker需要带有PDCP新旧密钥加密分割点的SN或COUNT相关信息。start-marker的内容可以参考上述第一指示信息的内容,此处不再赘述。如图4所示,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。目标接入网设备在将5号数据包发送给终端设备后,向终端设备发送start-marker。为了保证start-marker在6-8号数据包前到达终端设备
的PDCP实体,即6号包及以后的数据包的由终端设备的RLC实体向PDCP实体递交时间比start-marker的晚,目标接入网设备在未收到终端设备返回的start-marker的ACK消息之前,目标接入网设备不发送6-8号包,此时,start-marker需要带有PDCP新旧密钥加密分割点的SN或COUNT相关信息,例如,start-marker携带SN号6,指示6号数据包以及6号以后的数据包为新密钥加密的数据包。
在第二种实现方式中,主副接入网设备角色互换后,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体进行传输,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体进行传输。发送第一指示信息的接入网设备既可以为源接入网设备,也可以为目标接入网设备,也可以是源接入网设备和目标接入网设备各自发送第一指示信息。以下分别针对这三种情况进行描述。
在第二种实现方式中的第一种情况中,发送第一指示信息的接入网设备为源接入网设备。这种情况下,在主副接入网设备角色互换之前,分叉承载的PDCP位于源接入网设备,源接入网设备在将第一类数据包全部发送出去之后,通过源接入网设备与终端设备的空口通路向终端设备发送end-marker,该end-marker即上述第一指示信息。或者,源接入网设备在将第一类数据包全部发送出去之后,通过目标接入网设备与终端设备的空口通路向终端设备发送一个end-marker,该end-marker即上述第一指示信息。也即是说,源接入网设备生成一个end-marker,将该end-marker发送给目标接入网设备,并由目标接入网设备将该end-marker发送给终端设备。该end-marker携带有PDCP新旧密钥加密分割点的SN或COUNT相关信息。在源接入网设备停止行使PDCP的功能(包括加密、加SN号等)后,通过Xn接口告知目标接入网设备不会再收到由源接入网设备转发给目标接入网设备的第一类数据包,通知方式如前所述,此处不再赘述。主副接入网设备角色互换后,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备。
为保证end-marker在第二类数据包前到达终端设备的PDCP实体,即end-marker由终端设备的RLC实体向PDCP实体递交时间比第二类数据包早,可以采用如下两种方式:方式一、接入网设备接收的end-marker的ACK消息由PDCP实体识别,源接入网设备可以通过源接入网设备与终端设备的空口通路或通过目标接入网设备与终端设备的空口通路向终端设备发送的end-marker。那么源接入网设备在未接收到终端设备返回或通过目标接入网设备返回的end-marker的ACK消息,源接入网设备不会向终端设备发送第二类数据包。只有在接收到终端设备返回的end-marker的ACK消息后,源接入网设备才会将第二类数据包发送给终端设备。并且,源接入网设备在接收到终端设备返回的end-marker的ACK消息后,会向目标接入网设备发送第二指示信息,该第二指示信息用于指示目标接入网设备可以发送第二类数据包给终端设备。因此,目标接入网设备在未接收到源接入网设备发送的第二指示信息之前,不向终端设备发送第二类数据包。或者,源接入网设备在未接收到终端设备返回的end-marker的ACK消息,不进行主副接入网设备的角色互换。只有在接收到终端设备返回的end-marker的ACK消息时,才进行主副接入网设备的角色互换。
方式二、接入网设备接收的end-marker的ACK消息由RLC实体识别,则可以采用以下两种子方式:子方式一、如果源接入网设备是通过源接入网设备与终端设备的空口通路
向终端设备发送的end-marker,那么源接入网设备在未接收到终端设备返回的end-marker的ACK消息,源接入网设备不会向终端设备发送第二类数据包。只有在接收到终端设备返回的end-marker的ACK消息后,源接入网设备才会将第二类数据包发送给终端设备。并且,源接入网设备在接收到终端设备返回的end-marker的ACK消息后,会向目标接入网设备发送第二指示信息,该第二指示信息用于指示目标接入网设备可以发送第二类数据包给终端设备。因此,目标接入网设备在未接收到源接入网设备发送的第二指示信息之前,不向终端设备发送第二类数据包。子方式二、如果源接入网设备是通过目标接入网设备与终端设备的空口通路向终端设备发送的end-marker,那么目标接入网设备在未接收到终端设备返回的end-marker的ACK消息,目标接入网设备不会向终端设备发送第二类数据包。只有在接收到终端设备返回的end-marker的ACK消息后,目标接入网设备才会将第二类数据包发送给终端设备。目标接入网设备在接收到终端设备返回的end-marker的ACK消息后,会向源接入网设备发送第二指示信息,该第二指示信息用于指示源接入网设备可以发送第二类数据包给终端设备。因此,源接入网设备在未接收到目标接入网设备发送的第二指示信息之前,不向终端设备发送第二类数据包。
如图5所示,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。源接入网设备在将2号数据包发送出去之后,源接入网设备向终端设备发送end-marker。之后进行主副接入网设备的角色互换。为保证end-marker在6号数据包前到达终端设备的PDCP实体,即end-marker由终端设备的RLC实体向PDCP实体的递交时间比6号数据包及以后的数据包早,源接入网设备在未收到end-marker的ACK消息之前,不发送7、8号数据包给终端设备。并且源接入网设备在未收到end-marker的ACK消息之前,不会向目标接入网设备发送第二指示信息,目标接入网设备在未接收到第二指示信息之前,不发送6号数据包给终端设备。当源接入网设备接收到终端设备返回的end-marker的ACK消息后,才将7、8号数据包给终端设备。并且,向目标接入网设备发送第二指示信息,目标接入网设备接收到第二指示信息之后,发送6号数据包给终端设备。
在第二种实现方式中的第二种情况中,发送第一指示信息的接入网设备为目标接入网设备。这种情况下,在主副接入网设备角色互换之前,分叉承载的PDCP位于源接入网设备,在源接入网设备停止行使PDCP的功能(包括加密、加SN号等)后,通过Xn接口告知目标接入网设备不会再收到由源接入网设备转发给目标接入网设备的第一类数据包,通知方式如前所述,此处不再赘述。由于主副接入网设备在角色交换时,目标接入网设备的RLC实体以及MAC实体内有第一类数据包。因此,在主副接入网设备角色互换之后,目标接入网设备在将第一类数据包全部发送给终端设备之后,通过目标接入网设备与终端设备的空口通路向终端设备发送一个start-marker,该start-marker即上述第一指示信息。或者,目标接入网设备在将第一类数据包全部发送给终端设备之后,通过源接入网设备与终端设备的空口通路向终端设备发送start-marker,该start-marker即上述第一指示信息。也即是说,目标接入网设备将该start-marker发送给源接入网设备,源接入网设备将该start-marker发送给终端设备。该start-marker携带有PDCP新旧密钥加密分割点的SN或COUNT相关信息。主副接入网设备角色互换后,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备,也可以通过目标接入网设备的RLC实体、MAC实体及
PHY实体传输给终端设备。
为保证start-marker在第二类数据包前到达终端设备的PDCP实体,即start-marker由终端设备的RLC实体向PDCP实体递交时间比第二类数据包早,可以采用如下两种方式:方式一、接入网设备接收的start-marker的ACK消息由PDCP实体识别,目标接入网设备可以通过目标接入网设备与终端设备的空口通路或通过源接入网设备与终端设备的空口通路向终端设备发送的start-marker,那么目标接入网设备在未接收到终端设备返回或通过源接入网设备返回的start-marker的ACK消息,目标接入网设备不会向终端设备发送第二类数据包。只有在接收到终端设备返回的start-marker的ACK消息后,目标接入网设备才会将第二类数据包发送给终端设备。并且,目标接入网设备在接收到终端设备返回的start-marker的ACK消息后,会向源接入网设备发送第二指示信息,该第二指示信息用于指示目标接入网设备可以发送第二类数据包给终端设备。因此,源接入网设备在未接收到目标接入网设备发送的第二指示信息之前,不向终端设备发送第二类数据包。
方式二、接入网设备接收的end-marker的ACK消息由RLC实体识别,则可以采用以下两种子方式:子方式一、如果目标接入网设备是通过目标接入网设备与终端设备的空口通路向终端设备发送的start-marker,那么目标接入网设备在未接收到终端设备返回的start-marker的ACK消息,目标接入网设备不会向终端设备发送第二类数据包。只有在接收到终端设备返回的start-marker的ACK消息后,目标接入网设备才会将第二类数据包发送给终端设备。并且,目标接入网设备在接收到终端设备返回的start-marker的ACK消息后,会向源接入网设备发送第二指示信息,该第二指示信息用于指示源接入网设备可以发送第二类数据包给终端设备。因此,源接入网设备在未接收到目标接入网设备发送的第二指示信息之前,不向终端设备发送第二类数据包。子方式二、如果目标接入网设备是通过源接入网设备与终端设备的空口通路向终端设备发送的start-marker,那么源接入网设备在未接收到终端设备返回的start-marker的ACK消息,源接入网设备不会向终端设备发送第二类数据包。只有在接收到终端设备返回的start-marker的ACK消息后,源接入网设备才会将第二类数据包发送给终端设备。并且,源接入网设备在接收到终端设备返回的start-marker的ACK消息后,会向目标接入网设备发送第二指示信息,该第二指示信息用于指示目标接入网设备可以发送第二类数据包给终端设备。因此,目标接入网设备在未接收到源接入网设备发送的第二指示信息之前,不向终端设备发送第二类数据包。
如图6所示,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。目标接入网设备在将5号数据包发送出去之后,向终端设备发送start-marker。为保证start-marker在6号数据包前到达终端设备的PDCP实体,即start-marker由终端设备的RLC实体向PDCP实体的递交时间比6号数据包及以后的数据包早,目标接入网设备在未收到start-marker的ACK消息之前,不发送6号数据包给终端设备。并且目标接入网设备在未收到start-marker的ACK消息之前,不会向源接入网设备发送第二指示信息,源接入网设备在未接收到第二指示信息之前,不发送7、8号数据包给终端设备。当目标接入网设备接收到终端设备返回的start-marker的ACK消息后,才将6号数据包给终端设备。并且,向源接入网设备发送第二指示信息,源接入网设备接收到第二指示信息之后,发送7、8号数据包给终端设备。
在第二种实现方式中的第三种情况中,发送第一指示信息的接入网设备为源接入网设
备和目标接入网设备。这种情况下,在主副接入网设备角色互换之前,分叉承载的PDCP位于源接入网设备,在源接入网设备停止行使PDCP的功能(包括加密、加SN号等)后,通过Xn接口告知目标接入网设备不会再收到由源接入网设备转发给目标接入网设备的第一类数据包,通知方式如前所述,此处不再赘述。源接入网设备在将第一类数据包全部出去之后,向终端设备发送end-marker。该end-marker携带有PDCP新旧密钥加密分割点的SN或COUNT相关信息。主副接入网设备角色互换后,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备。为保证end-marker在第二类数据包前到达终端设备的PDCP实体,即end-marker由终端设备的RLC实体向PDCP实体递交时间比第二类数据包早,源接入网设备在未接收到终端设备返回的end-marker的ACK消息,源接入网设备不会向终端设备发送第二类数据包。只有在接收到终端设备返回的end-marker的ACK消息后,源接入网设备才会将第二类数据包发送给终端设备。同理,目标接入网设备在将第一类数据包全部发送给终端设备之后,向终端设备发送start-marker,该start-marker携带有PDCP新旧密钥加密分割点的SN或COUNT相关信息。为保证start-marker在第二类数据包前到达终端设备的PDCP实体,即start-marker由终端设备的RLC实体向PDCP实体递交时间比第二类数据包早,目标接入网设备在未接收到start-marker的ACK消息,目标接入网设备不会向终端设备发送第二类数据包。只有在接收到终端设备返回的start-marker的ACK消息后,目标接入网设备才会将第二类数据包发送给终端设备。
如图7所示,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。源接入网设备在将2号数据包发送给终端设备之后,向终端设备发送end-marker。之后进行主副接入网设备的角色互换。为保证end-marker在7号数据包前到达终端设备的PDCP实体,即end-marker由终端设备的RLC实体向PDCP实体的递交时间比7号数据包及以后的数据包早,源接入网设备在未收到end-marker的ACK消息之前,不发送7、8号数据包给终端设备。当源接入网设备接收到终端设备返回的end-marker的ACK消息后,才将7、8号数据包给终端设备。同理,目标接入网设备在将5号数据包发送给终端设备之后,向终端设备发送start-marker。为保证start-marker在6号数据包前到达终端设备的PDCP实体,即start-marker由终端设备的RLC实体向PDCP实体的递交时间比6号数据包及以后的数据包早,目标接入网设备在未收到start-marker的ACK消息之前,不发送6号数据包给终端设备。当目标接入网设备接收到终端设备返回的start-marker的ACK消息后,才将6号数据包给终端设备。
需要说明的是,上述第一指示信息可以携带在数据PDU或控制PDU中。现有技术中,数据PDU中包含SN字段,因此,可以延用现有技术中数据PDU中的SN字段来指示第一指示信息。第一指示信息也可以采用新类型的控制PDU。控制PDU带有SN号或COUNT值,带有的SN号可以是第一类数据包中的最后一个数据包对应的SN号、第二类数据包中的第一个数据包对应的SN号、第一类数据包中的最后一个数据包对应的SN号与偏置值的差值或者第二类数据包中的第一个数据包对应的SN号与偏置值的差值。带有的COUNT值可为第一类数据包中的最后一个数据包对应的COUNT值、第二类数据包中的第一个数据包对应的COUNT值、第一类数据包中的最后一个数据包对应的COUNT值与偏置值的
差值或者第二类数据包中的第一个数据包对应的COUNT值与偏置值的差值。例如,第一指示信息指示的是第二类数据包中的第一个数据包的SN号6,则可以采用SN号为6的数据PDU来指示该第一指示信息,该数据PDU中的SN号为6。或者,以SN为12bit为例,可以将控制PDU中的SN字段设置为000000000110。
若第一指示信息携带在数据PDU中,则该数据PDU中需要携带第三指示信息,该第三指示信息用于终端设备识别该数据PDU中携带该第一指示信息。并且终端设备可以仅在源接入网设备与目标接入网设备进行角色互换时,对第三指示信息进行监测。例如,终端设备在接收到源接入网设备发送的无线资源控制(Radio Resource Control,RRC)重配置消息后,开始对接收到的数据PDU中是否携带有第三指示信息进行检测,并且在检测到该第三指示信息后,停止检测。该RRC重配置消息可以指示出主副接入网设备将进行角色互换。例如,第一指示信息是SN号6,可以采用SN号为6的数据PDU报头中的P域或R域中的一个比特位来携带该第三指示信息,如当该比特位为1时,表明该数据PDU携带了第一指示信息,当该比特位为0时,表明该数据PDU未携带第一指示信息。
上述描述的两种实现方式均是在发送第一类数据包之后、第二类数据包之前向终端设备发送第一指示信息,在本发明实施例的第三种实现方式中,还可以是在发送第一类数据包之前向终端设备发送第一指示信息。下面对第三种实现方式进行描述。
在主副接入网设备角色互换之前,源接入网设备通过源接入网设备与终端设备的空口通路或者目标接入网设备与终端设备的空口通路中任意一个通路发送一个警示标记(warning-marker)给终端设备,该警示标记即为第一指示信息。该第一指示信息可以包括以下信息的至少一种:第一类数据包中的最后一个数据包对应的SN号或COUNT值、第二类数据包中的第一个数据包对应的SN号或COUNT值、第一类数据包中的最后一个数据包对应的SN号或COUNT值与偏置值的差值、第二类数据包中的第一个数据包对应的SN号或COUNT值与偏置值的差值。在这种实现方式中,该第一指示信息也是可以携带在数据PDU或控制PDU中的。若该第一指示信息携带在数据PDU中,该数据PDU的SN号为该PDU的SN号,其与第一类数据包中的最后一个数据包对应的SN号或第二类数据包中的第一个数据包对应的SN号相差偏置值N,说明从该数据PDU的SN号之后的第N个数据包以后,或第N个数据包以及第N个数据包以后的数据包为第二类数据包,第二类数据包的范围具体取决于偏置值的定义。其中,终端设备可以从RRC重配置消息中获取该N值。同样的,该数据PDU中也需要携带第三指示信息,该第三指示信息用于指示该数据PDU中携带该第一指示信息。例如,该数据PDU携带的SN号为3,偏置值为3,则表明SN号大于6的数据包为第二类数据包,或SN号大于或等于6的数据包均为第二类数据包,第二类数据包的范围具体取决于偏置值。同理,控制PDU中也可以携带第一指示信息。其中,本实施例是以目标接入网设备以及终端设备预先获知了该偏置值N为例进行的说明,在其他可选的实现方式中,若源接入网设备以及终端设备未预先获知了该偏置值N,那么在数据PDU或控制PDU中可以携带该偏置值N。例如,携带第一信息的数据PDU携带偏置值N,控制PDU也可以携带第一指示信息和偏置值N。需要说明的是,源终端设备可以在发送第一类数据包中的第一个数据包之前,向终端设备发送该第一指示信息,也可以是在发送第一类数据包中的第M(M小于第一类数据包的个数)个数据包之前,向终端设备发
送该第一指示信息,本发明实施例不作具体限定。
主副接入网设备角色互换后,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体进行传输。但在目标接入网设备发送第二类数据包前应确保终端设备已收到warning-marker。如图8所示,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。为保证warning-marker应在第二类数据包之前到达终端设备的PDCP实体,即warning-marker由终端设备的RLC实体向PDCP实体的递交时间比第二类数据包早,可以采用如下两种方式:方式一、源接入网设备在未收到warning-marker的ACK消息之前,可以继续发送第一类数据包中的N个数据包,但不发送第二类数据包。直至接收到warning-marker的ACK消息之后,才会向终端设备发送第二类数据包。这种情况下,warning-marker需要带有PDCP新旧密钥加密分割点的SN或COUNT相关信息(即6号包为第二类数据包中的第一个数据包)。方式二、可通过选择足够大的N来保证。根据PDCP实体的功能,对重排序窗内的PDCP PDU才进行解密存储,如偏置值“N”可以设置到一个重排序窗长或长于一个重排序窗,以保证终端设备收到warning-marker时,第二类数据包还不能被终端设备的PDCP实体处理。
参见图9,是本发明实施例提供的一种终端设备接收接入网设备发送的数据的示意图。如图9所示,偏置值“N”可以设置到一个重排序窗长。SN总数即为通信标准中定义的长度为12比特的SN号最大值,或长度为18比特的SN号最大值。终端设备在未接收到warning-marker时,新密钥加密的数据包不会进入重排序窗内,即不会进行数据包解密。终端设备接收到warning-marker时,重排序窗内均为旧密钥加密的数据包。其中,warning-marking是数据PDU时,需要有第三指示信息并进行相应检测。warning-marker是控制PDU时,第一种方法为控制PDU携带的SN或COUNT值为第一类数据包中的最后一个数据包对应的SN号或COUNT值与偏置值的差、或第二类数据包中的第一个数据包对应的SN号或COUNT值与偏置值的差,并且接入网设备不向终端设备发送控制PDU携带的SN号或COUNT值对应的数据包或对应SN号或COUNT值后的多个数据包。终端设备在收到该控制PDU后,将跳过未发送序号的数据包或指定多个数据包,直接对之后的数据包进行处理。例如,新旧密钥分界线的数据包为5号数据包,携带的SN号为2,N=3,接入网设备向终端设备发送数据包时只发1,3,4,5…号数据包,当收到带有SN号2的控制PDU时,重排序窗口可以在未收到2号数据包的情况下向后移动,或分界线为5,携带的为2,N=3,数据包发送时只发1,4,5…,当收到带有SN号2的控制PDU时,重排序窗口可以在未收到2、3号包的情况下向后移动,具体跳过多少个序号取决于接入网设备配置。第二种方法为控制PDU携带的为第一类数据包中的最后一个数据包对应的SN号或COUNT值、或第二类数据包中的第一个数据包对应的SN号或COUNT值,并且接入网设备不向终端设备发送控制PDU携带的SN号或COUNT值与偏置值的差的数据包或对应SN号或COUNT值与偏置值的差后的多个数据包。终端设备在收到该控制PDU后,将跳过未发送序号的数据包,直接对之后的数据包进行处理。例如,新旧密钥分界线的数据包为5号数据包,携带的SN号为5,N=3,数据包发送时只发1,3,4,5…,当收到带有5的控制PDU时,根据5-N=2,重排序窗口可以在未收到2号包的情况下向后移动,或分界线为5,携带的
SN号为5,N=3,数据包发送时只发1,4,5…,当收到带有5的控制PDU时,根据5-N=2,重排序窗口可以在未收到2、3号包的情况下向后移动,具体跳过多少个序号取决于接入网设备配置。第三种方法为控制PDU携带的SN或COUNT值为第一类数据包中的最后一个数据包对应的SN号或COUNT值与偏置值的差、或第二类数据包中的第一个数据包对应的SN号或COUNT值与偏置值的差,并且接入网设备发送控制PDU时,携带该SN号的数据PDU还未发送。例如,新旧密钥分界线的数据包为5号数据包,携带的为2,N=3,0号数据包发送时发带有2的控制PDU。第四种方法为控制PDU携带的为第一类数据包中的最后一个数据包对应的SN号或COUNT值、或第二类数据包中的第一个数据包对应的SN或COUNT值,并且接入网设备发送控制PDU时,携带该SN号或对应COUNT值减去偏置值的数据PDU还未发送。例如,新旧密钥分界线的数据包为5号数据包,携带的SN号为5,N=3,0号数据包发送时发带有SN号2的控制PDU。
S302:终端设备接收接入网设备发送的第一指示信息,根据第一指示信息确定接收到的数据包为第一类数据包或第二类数据包。
终端设备接收到第一指示信息,可以根据该第一指示信息确定第一类数据包中的最后一个数据包的SN号或COUNT值,或第二类数据包中的第一个数据包的SN号或COUNT值。例如,如果第一指示信息直接指示的是第一类数据包的最后一个数据包的SN号或第二类数据包的第一个数据包的SN号,则终端设备可以直接得到第一类数据包的最后一个数据包的SN号或第二类数据包的第一个数据包的SN号。如果第一指示信息指示的是第一类数据包中的最后一个数据包对应的SN号与偏置值的差值,则终端设备需要根据该第一指示信息以及该偏置值确定出第一类数据包中的最后一个数据包对应的SN号。如果第一指示信息直接指示的是第一类数据包中的最后一个数据包对应的计数值,则终端设备可以直接根据第一指示信息获知第一类数据包中的最后一个数据包对应的计数值。如果第一指示信息直接指示的是第二类数据包中的第一个数据包对应的计数值,则终端设备可以直接根据第一指示信息获知第二类数据包中的第一个数据包对应的计数值。如果第一指示信息直接指示的是第一类数据包中的最后一个数据包对应的计数值与偏置值的差值,终端设备也可以根据该差值与该偏置值计算得到第一类数据包中的最后一个数据包对应的计数值。如果第一指示信息直接指示的是第二类数据包中的第一个数据包对应的计数值与偏置值的差值,终端设备也可以根据该差值与该偏置值计算得到第二类数据包中的第一个数据包对应的计数值。例如,第一指示信息为3,偏置值为2,则终端设备确定出第一类数据包中的最后一个数据包对应的SN号为5。如果第一指示信息指示的是第二类数据包中的第一个数据包对应的SN号与偏置值的差值,则终端设备需要根据该第一指示信息以及该偏置值确定出第二类数据包中的第一个数据包对应的SN号。例如,第一指示信息为4,偏置值为2,则终端设备确定出第二类数据包中的第一个数据包对应的SN号为6。其中,偏置值为终端设备与接入网设备预先协商好的。
在上述第一种实现方式中,发送第一指示信息的接入网设备为目标接入网设备,第二类数据包仅通过目标接入网设备的RLC实体、MAC实体及PHY实体进行传输。则终端设备的PDCP实体基于发送数据的接入网设备的对应关系,即从源接入网设备还是目标接入网设备对应的RLC实体上交的数据,并结合收到的第一指示信息来判断接收到的数据包是
第一类数据包还是第二类数据包。需要说明的是,终端设备包含2个RLC实体、2个MAC实体、2个PHY实体,其中,一个RLC实体与源接入网设备对应,另一个RLC实体与目标接入网设备对应。若终端设备从源接入网设备接收到数据包,则终端设备可以确定出该数据包是第一类数据包。终端设备在未收到第一指示信息之前,如果从目标接入网设备接收到数据包,则终端设备可以确定出该数据包为第一类数据包。终端设备在收到第一指示信息之后,如果从目标接入网设备接收到数据包,则终端设备根据该数据包的COUNT值和第一指示信息指示的第一类数据包的最后一个数据包对应的COUNT值,来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于或等于第一类数据包的最后一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于第一类数据包的最后一个数据包的COUNT值的数据包确定为第二类数据包。或者,终端设备根据该数据包的COUNT值和第一指示信息指示的第二类数据包的第一个数据包对应的COUNT值,来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于第二类数据包的第一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于或等于第二类数据包的第一个数据包的COUNT值的数据包确定为第二类数据包。
如图10所示,由图4-8可知,终端设备具备两套RLC实体、MAC实体以及PHY实体。其中,一套RLC实体、MAC实体以及PHY实体是与源接入网设备的协议栈对应的,另一套RLC实体、MAC实体以及PHY实体是与目标接入网设备的协议栈对应的。图10中,RCL-1是与源接入网设备对应的,RCL-2是与源接入网设备对应的。终端设备从源接入网设备收到的1、2号数据包,可以确定出1、2号数据包为第一类数据包。终端设备在未接收到start-marker之前,从目标接入网设备接收到的数据包5号数据包和3号数据包,可以确定出5、3号数据包为第一类数据包。收到的start-marker指示的第二类数据包的第一个数据包的COUNT值为6。终端设备接收到start-marker,又接收到6、4、8、7号数据包,终端设备根据start-marker指示的COUNT值6,可以确定出COUNT值为4的4号数据包为第一类数据包,COUNT值分别为6、8、7的6、8、7号为第二类数据包。
在上述第二种实现方式中的第一种情况中,发送第一指示信息的接入网设备为源接入网设备,主副接入网设备角色互换后,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备。终端设备在未收到第一指示信息之前,如果从源接入网设备或目标接入网设备接收到数据包,则终端设备可以确定接收到的数据包为第一类数据包。终端设备在收到第一指示信息之后,如果从源接入网设备或目标接入网设备接收到数据包,则终端设备根据该数据包的COUNT值和第一指示信息指示的第一类数据包的最后一个数据包对应的COUNT值,来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于或等于第一类数据包的最后一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于第一类数据包的最后一个数据包的COUNT值的数据包确定为第二类数据包。或者,终端设备根据该数据包的COUNT值和第一指示信息指示的第二类数据包的第一个数据包的COUNT值,来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于第二类数据包的第一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于或等于第二类数据包的第一个数据包的COUNT
值的数据包确定为第二类数据包。
如图11所示,终端设备在未收到end-marker之前,从源接入网设备收到的2、1号数据包,可以确定出2、1号数据包为第一类数据包。终端设备在未收到end-marker之前,从目标接入网设备收到的5、4号数据包,可以确定出5、4号数据包为第一类数据包。终端设备收到的end-marker指示的第一类数据包的最后一个数据包的COUNT值为5。终端设备接收到end-marker,又从目标接入网设备接收到3和6号数据包,终端设备根据end-marker指示的COUNT值5,可以确定出COUNT值为3的3号数据包为第一类数据包,COUNT值为6的6号数据包为第二类数据包。终端设备接收到end-marker,又从源接入网设备接收到8、7号数据包,终端设备根据end-marker指示的COUNT值5,可以确定出COUNT值分别为8、7的8、7号数据包为第二类数据包。
在上述第二种实现方式中的第二种情况中,发送第一指示信息的接入网设备为目标接入网设备,主副接入网设备角色互换后,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备。终端设备在未收到第一指示信息之前,如果从源接入网设备或目标接入网设备接收到数据包,则终端设备可以确定接收到的数据包为第一类数据包。终端设备在收到第一指示信息之后,如果从源接入网设备或目标接入网设备接收到数据包,则终端设备根据该数据包的COUNT值和第一指示信息指示的第一类数据包的最后一个数据包对应的COUNT值,来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于或等于第一类数据包的最后一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于第一类数据包的最后一个数据包的COUNT值的数据包确定为第二类数据包。或者,终端设备根据该数据包的COUNT值和第一指示信息指示的第二类数据包的第一个数据包的COUNT值,来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于第二类数据包的第一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于或等于第二类数据包的第一个数据包的SN号的数据包确定为第二类数据包。
如图12所示,终端设备在未收到start-marker之前,从源接入网设备收到的2、1号数据包,可以确定出2、1号数据包为第一类数据包。终端设备在未收到start-marker之前,从目标接入网设备收到的5、4号数据包,可以确定出5、4号数据包为第一类数据包。终端设备收到的start-marker指示的第二类数据包的第一个数据包的COUNT值为6。终端设备接收到start-marker,又从目标接入网设备接收到3和6号数据包,终端设备根据start-marker指示的COUNT值6,可以确定出COUNT值为3的3号数据包为第一类数据包,COUNT值为6的6号数据包为第二类数据包。终端设备接收到start-marker,又从源接入网设备接收到8、7号数据包,终端设备根据start-marker指示的COUNT值6,可以确定出COUNT值分别为8、7的8、7号数据包为第二类数据包。
在上述第二种实现方式中的第三种情况中,发送第一指示信息的接入网设备为源接入网设备和目标接入网设备,主副接入网设备角色互换后,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体传输给终端设备。终端设备在未收到源接入网设备发送
的第一指示信息之前,如果从源接入网设备接收到数据包,则终端设备可以确定接收到的数据包为第一类数据包。终端设备在收到源接入网设备发送的第一指示信息之后,如果从源接入网设备接收到数据包,则终端设备根据该数据包的COUNT值以及源接入网设备发送的第一指示信息指示的第一类数据包的最后一个数据包对应的COUNT值,来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于或等于第一类数据包的最后一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于第一类数据包的最后一个数据包的COUNT值的数据包确定为第二类数据包。终端设备在未收到目标接入网设备发送的第一指示信息之前,如果从目标接入网设备接收到数据包,则终端设备可以确定接收到的数据包为第一类数据包。终端设备在收到目标接入网设备发送的第一指示信息之后,如果从目标接入网设备接收到数据包,则终端设备根据该数据包的COUNT值和目标接入网设备发送的第一指示信息指示的第二类数据包的第一个数据包的COUNT值,来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于第二类数据包的第一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于或等于第二类数据包的第一个数据包的COUNT值的数据包确定为第二类数据包。
如图13所示,终端设备在未收到源接入网设备发送的end-marker之前,从源接入网设备收到的2、1号数据包,可以确定出2、1号数据包为第一类数据包。终端设备收到源接入网设备发送的end-marker指示的第一类数据包的最后一个数据包的COUNT值为5。终端设备接收到end-marker,又从源接入网设备接收到8、7号数据包,终端设备根据end-marker指示的COUNT值5,可以确定出COUNT值分别为8、7的8、7号数据包为第二类数据包。终端设备在未收到目标接入网设备发送的start-marker之前,从目标接入网设备收到的5、4号数据包,可以确定出COUNT值分别为5、4的5、4号数据包为第一类数据包。终端设备收到目标接入网设备发送的start-marker指示的第二类数据包的第一个数据包的COUNT值为6。终端设备接收到start-marker,又从目标接入网设备接收到3和6号数据包,终端设备根据start-marker指示的COUNT值6,可以确定出COUNT值为3的3号数据包为第一类数据包,COUNT值为6的6号数据包为第二类数据包。
在上述第三种实现方式中,发送第一指示信息的接入网设备为源接入网设备,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体进行传输。则终端设备在接收到第一指示信息之前,如果从源接入网设备或目标接入网设备接收到数据包,则将接收到的数据包确定为第一类数据包。终端设备在接收到第一指示信息后,如果第一指示信息直接指示的是第一类数据包中的最后一个数据包的COUNT值或第二类数据包中的第一个数据包的COUNT值,则终端设备根据第一指示信息可以确定出第一类数据包中的最后一个数据包的COUNT值或第二类数据包中的第一个数据包的COUNT值。如果第一指示信息携带SN号或COUNT值以及N,则终端设备根据该SN号或COUNT值以及N值可以计算得到第一类数据包中的最后一个数据包的COUNT值或第二类数据包中的第一个数据包的COUNT值。例如,第一指示信息携带在数据PDU中,该数据PDU的SN号为1,该数据PDU携带的N为4,则终端设备可以确定出第一类数据包中的最后一个数据包的SN号为5。或者,数据PDU的SN号为1,该数据PDU携带的N为5,则终端设备可以确定出第二类数据包
中的第一个数据包的SN号为6。第一指示信息具体指示的是第一类数据包中的最后一个数据包的SN号还是第二类数据包中的第一个数据包的SN号可以是终端设备与源接入网设备预先协商的。该数据PDU携带的N为3,则终端设备可以确定出第二类数据包中的第一个数据包的SN号为6。终端设备接收到第一指示信息后,如果从源接入网设备或目标接入网设备接收到数据包,则根据接收到的数据包对应的COUNT值和第一指示信息指示的第一类数据包中的最后一个数据包对应的COUNT值来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于或等于第一类数据包中的最后一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于第一类数据包中的最后一个数据包的COUNT值的数据包确定为第二类数据包。或者,终端设备根据第一指示信息确定出第二类数据包的第一个数据包的COUNT值,则根据接收到的数据包的COUNT值和第一指示信息指示的第二类数据包的第一个数据包的COUNT值来确定接收到的该数据包是第一类数据包还是第二类数据包。将COUNT值小于第二类数据包的第一个数据包的COUNT值的数据包确定为第一类数据包,将COUNT值大于或等于第二类数据包的第一个数据包的COUNT值的数据包确定为第二类数据包。
如图14所示,终端设备在未收到源接入网设备发送的warning-marker之前,从源接入网设备收到的2、1号数据包,可以确定出2、1号数据包为第一类数据包。终端设备在未收到源接入网设备发送的warning-marker之前,从目标接入网设备收到的5号数据包,可以确定出5号数据包为第一类数据包。终端设备接收到源终端设备发送的warning-marker后,根据warning-marker确定出第二类数据包的第一个数据包的COUNT值为6。终端设备接收到warning-marker后,从目标接入网设备收到的4、3、6号数据包,可以确定出COUNT值分别为4、3、6的4、3号数据包为第一类数据包,COUNT值为6的6号数据包为第二类数据包。终端设备接收到warning-marker后,从源接入网设备收到的8、7号数据包,可以确定出COUNT值分别为8、7的8、7号数据包为第二类数据包。
需要说明的是,终端设备在接收到第一指示信息之前,采用第一加密密钥对接收到的数据包进行解密,终端设备在主副接入网设备的角色互换后的一段时间内,会收到两种密钥加密的数据包,终端设备如何进行密钥重配置,可以采用如下两种方式。方式一、终端设备可以采用灵活配置两种密钥。也即是说,如果终端设备前一次与本次接收到的数据包不同类,则需要进行密钥重配置。例如,终端设备前一次接收到的数据包为第一类数据包且本次接收到的数据包为第二类数据包,则终端设备需要进行密钥重配置,将PDCP实体中的加密密钥配置为第二加密密钥。或者终端设备前一次接收到的数据包为第二类数据包且本次接收到的数据包为第一类数据包,则终端设备需要进行密钥重配置,将PDCP实体中的加密密钥配置为第一加密密钥。在这种方式中,终端设备每接收到一类数据包,就需要进行一次密钥重配置。采用这种方式,有益效果是充分利用时间资源,尽快将第二类数据包解密。方式二、终端设备只进行一次密钥重配置。也即是说,终端设备在接收到全部的第一类数据包之前,如果接收到了第二类数据包,则暂时不对该第二类数据包进行解密,而是将该第二类数据包进行存储,等到终端设备将全部的第一类数据包全部接收到并且解密完成后,终端设备进行密钥重配置,将PDCP实体中的加密密钥配置为第二加密密钥,再对接收到的第二类数据包进行解密。采用这种方式,有益效果是减少动态配置密钥的时
间,便于实施。
参见图10,终端设备在接收到2号数据包时,可以采用第一加密密钥对2号数据包进行解密。在接收到6号数据包时,可以进行一次密钥重配置,即将PDCP实体中的加密密钥配置为第二加密密钥,进而采用第二加密密钥对6号数据包进行解密。之后,终端设备又接收到4号数据包,可以再进行一次密钥重配置,即将PDCP实体中的加密密钥配置为第一加密密钥,进而采用第一加密密钥对4号数据包进行解密。之后,终端设备又接收到8号数据包,可以再进行一次密钥重配置,即将PDCP实体中的加密密钥配置为第二加密密钥,进而采用第二加密密钥对8号数据包进行解密。或者,终端设备根据start-marker可以获知第一类数据包中的最后一个数据包的SN号为5,且终端设备在接收到6号数据包时,获知第一类数据包还没有全部接收到,即只接收到1、5、3、2号数据包,未接收到4号数据包,则终端设备暂时不进行6号数据包解密,而是将6号数据包暂存,等到接收到4号数据包并且采用第一加密密钥对4号数据包进行解密后,终端设备进行一次密钥重配置,将PDCP实体中的密钥配置为第二加密密钥,再对接收到的6号数据包进行解密。
参见图11,终端设备在接收到目标接入网设备发送的4号数据包时,可以采用第一加密密钥对4号数据包进行解密。在接收到目标接入网设备发送的start-marker时,根据start-marker获知第二类数据包的第一个数据包的SN号为6。则在接收到源终端设备发送的1号数据包时,继续采用第一加密密钥进行解密。终端设备在接收到目标接入网设备发送的3号数据包时,继续采用第一加密密钥进行解密。在接收到目标接入网设备发送的6号数据包时,可以进行一次密钥重配置,即将PDCP实体中的加密密钥配置为第二加密密钥,进而采用第二加密密钥对6号数据包进行解密。之后,终端设备接收到源接入网设备发送的end-marker,根据end-marker获知第一类数据包的最后一个数据包的SN号为5。之后,终端设备又接收源接入网设备发送的到8号数据包,采用第二加密密钥对8号数据包进行解密。或者,终端设备在接收到目标接入网设备发送的start-marker之前,对接收到的2、5、4号数据包采用第一加密密钥进行解密。在接收到start-marker时,根据start-marker获知第二类数据包的第一个数据包的SN号为6。则终端设备在接收到6号数据包时,获知6号数据包之前的1-5号数据包均接收到了,则终端设备对1-5号数据包采用第一加密密钥进行解密。解密之后,终端设备进行一次密钥重配置,将PDCP实体中的加密密钥配置为第二加密密钥,对接收到的6、8、7号数据包采用第二加密密钥进行解密。
可选的,终端设备在接收到接入网设备发送的第一指示信息之后,向接入网设备发送第一指示信息的确认消息。
可选的,确认消息为终端设备通过PDCP状态报告指示的或者通过PDCP的控制PDU指示的,该控制PDU携带第一指示信息的SN号或COUNT值,便于接入网设备在接收到该控制PDU后,根据该控制PDU携带的第一指示信息的SN号或COUNT值,获知第一指示信息已经被终端设备正确接收到了。
通过实施本发明实施例,接入网设备向终端设备发送第一指示信息,该第一指示信息可以指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,终端设备在接收到第一指示信息后,就可以结合第一指示信息来识别接收到的数据包是第一类数据包还是第二类数据包。因此,可以采用正确的密钥来对接收到的数据包进行解密。
基于图2所示的网络架构,结合图15来描述本发明实施例提供的另一种数据传输方法。如图15所示,该数据传输方法包括但不限于如下步骤S1501至S1502:
S1501:接入网设备向终端设备发送第四指示信息,第四指示信息用于指示在第四指示信息之前接收到的数据包为第一类数据包,在第四指示信息之后接收到的数据包为第二类数据包。
本发明实施例中,第一类数据包为采用第一加密密钥加密得到的,第二类数据包为采用第二加密密钥加密得到的。具体的,第一类数据包是源接入网设备采用第一加密密钥加密得到的,第二类数据包是目标接入网设备采用第二加密密钥加密得到的。
可选的,在本发明实施例中,终端设备的RLC实体具有重排序功能。这里,重排序功能是指RLC实体具有将数据包按序递交给PDCP的功能。
可选的,步骤S1501中描述的接入网设备可以是源接入网设备,也可以是目标接入网设备。源接入网设备与目标接入网设备在进行角色互换之前,源接入网设备生成第四指示信息后,可以通过源接入网设备与终端设备的空口通路将该第四指示信息发送给终端设备。源接入网设备也可以将第四指示信息发送给目标接入网设备,以通过目标接入网设备与终端设备的空口通路将第四指示信息发送给终端设备。
可选的,接入网设备向终端设备发送第四指示信息之前,接入网设备向终端设备发送无线资源控制(Radio Resource Control,RRC)重配置消息。终端设备接收接入网设备发送的RRC重配置消息,开启RLC实体的重排序功能。
可选的,第四指示信息携带在数据PDU或控制PDU中。第四指示信息携带在数据PDU或控制PDU中的实现方式可以参考图3所示实施例中在数据PDU或控制PDU中携带第一指示信息的实现方式,此处不再赘述。
在一种实现方式中,主副接入网设备角色互换后,分叉承载的PDCP实体位于目标接入网设备,第二类数据包不再通过源接入网设备的RLC实体、MAC实体及PHY实体传输,仅通过目标接入网设备的RLC实体、MAC实体及PHY实体进行传输。为了保证第四指示信息由终端设备的RLC实体向PDCP实体的递交时间比第二类数据包及以后的第二类数据包早,目标接入网设备在未收到第四指示信息的ACK消息之前,不发送第二类数据包给终端设备。如图4所示,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。目标接入网设备在将5号数据包发送给终端设备后,向终端设备发送start-marker。为了保证start-marker在6-8号数据包前到达终端设备的PDCP实体,即6号包及以后的数据包的由终端设备的RLC实体向PDCP实体递交时间比start-marker的晚,目标接入网设备在未收到终端设备返回的start-marker的ACK消息之前,目标接入网设备不发送6-8号包。
在另一种实现方式中,主副接入网设备角色互换后,分叉承载的PDCP实体位于目标接入网设备,第二类数据包可以通过源接入网设备的RLC实体、MAC实体及PHY实体传输,也可以通过目标接入网设备的RLC实体、MAC实体及PHY实体进行传输。在这种情况下,源接入网设备在将第一类数据包发送给终端设备后,需要向终端设备发送第四指示信息。之后主副接入网设备进行角色互换。并且,目标接入网设备在将第一类数据包发送给终端设备后,也需要向终端设备发送第四指示信息。为了保证源接入网设备发送的第四
指示信息由终端设备的RLC实体向PDCP实体的递交时间比第二类数据包及以后的第二类数据包早,源接入网设备在未收到第四指示信息的ACK消息之前,不发送第二类数据包给终端设备。为了保证目标接入网设备发送的第四指示信息由终端设备的RLC实体向PDCP实体的递交时间比第二类数据包及以后的第二类数据包早,目标接入网设备在未收到第四指示信息的ACK消息之前,不发送第二类数据包给终端设备。如图7所示,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。源接入网设备在将1号数据包发送给终端设备后,向终端设备发送end-marker。为了保证end-marker在8、7号数据包前到达终端设备的PDCP实体,即8、7号包及以后的数据包的由终端设备的RLC实体向PDCP实体递交时间比end-marker的晚,源接入网设备在未收到终端设备返回的end-marker的ACK消息之前,目标接入网设备不发送8、7号包。同理,目标接入网设备在将4号数据包发送给终端设备后,向终端设备发送start-marker。为了保证start-marker在6号数据包前到达终端设备的PDCP实体,即6号包及以后的数据包的由终端设备的RLC实体向PDCP实体递交时间比start-marker的晚,目标接入网设备在未收到终端设备返回的start-marker的ACK消息之前,目标接入网设备不发送6号数据包。
S1502:终端设备接收接入网设备发送的第四指示信息,根据第四指示信息确定接收到的数据包为第一类数据包或第二类数据包。
由于终端设备的RLC实体具备重排序功能,此时第四指示信息可以不携带SN信息,终端设备根据接收到的数据包与第四指示信息的接收先后顺序,以及发送数据包的接入网设备来确定接收到的数据包为第一类数据包还是第二类数据包。将PDCP在第四指示信息之前接收到的数据包确定为第一类数据包,将PDCP在第四指示信息之后接收到的数据包确定为第二类数据包。
在一种实现方式中,参见图16所示,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。终端设备的两个RLC接收到的数据包顺序分别为,RLC-1:2、1;RLC-2:start-marker、4、3、5、6、7、8。终端设备的RLC对接收到的数据包进行重排序,即恢复一个RLC实体内数据包的SN号顺序。重排序之后,终端设备的两个RLC接收到的数据包顺序分别为,RLC-1:1、2;RLC-2:3、4、5、start-marker、6、7、8。则终端设备的PDCP实体可以根据发出数据包的接入网设备以及第四指示信息,确定源接入网设备发出的1、2号数据包为第一类数据包,确定目标接入网设备发出start-marker之前的3、4、5号数据包为第一类数据包,start-marker之后的6-8号数据包为第二类数据包。
在另一种实现方式中,参见图17,1-5号数据包为第一类数据包,6-8号数据包为第二类数据包。终端设备的两个RLC接收到的数据包顺序分别为,RLC-1:2、end-marker、1、8、7;RLC-2:3、start-marker、5、4、6。终端设备的RLC对接收到的数据包进行重排序,即恢复一个RLC实体内数据包的SN号顺序。重排序之后,终端设备的两个RLC接收到的数据包顺序分别为,RLC-1:1、2、end-marker、7、8;RLC-2:3、4、5、start-marker、6。则终端设备的PDCP实体可以根据发出数据的对应接入网设备以及第四指示信息,确定源接入网设备发出end-marker之前的1、2号数据包为第一类数据包,end-marker之后的7、8号包为第二类数据包,确定目标接入网设备发出start-marker之前的3、4、5号数据包为第一类数据包,start-marker之后的6号数据包为第二类数据包。
终端设备的PDCP在确定了第一类数据包之后,采用第一加密密钥对第一类数据包进行解密。终端设备的PDCP在确定了第二类数据包之后,采用第二加密密钥对第二类数据包进行解密。
通过实施本发明实施例,接入网设备向终端设备发送第四指示信息,该第四指示信息可以指示在第四指示信息之前接收到的数据包为第一类数据包,在第四指示信息之后接收到的数据包为第二类数据包。终端设备的RCL实体在接收到乱序的数据包后,能够对乱序的数据包进行重排序,以恢复接收到的数据包的原本顺序,终端设备的PDCP实体在接收到第四指示信息后,就可以结合第四指示信息来识别接收到的数据包是第一类数据包还是第二类数据包。因此,可以采用正确的密钥来对接收到的数据包进行解密。
为了便于实施本发明实施例,本发明提供了一种接入网设备和终端设备,用于本发明实施例提供的数据传输方法。
参见图18,接入网设备180可包括:处理器1801、发射器1802、接收器1803、耦合器1804、存储器1805、网络接口1806、天线1807。这些部件可通过总线或者其它方式连接,其中,图18中以通过总线连接为例。
其中,网络接口1806用于接入网设备180与终端设备进行数据通信。具体实现中,接入网设备180可包括:GSM(2G)无线网络接口、WCDMA(3G)无线网络接口以及LTE(4G)无线网络接口等等中的一种或几种,也可以是未来5G的无线网络接口。
天线1807用于将传输线中的电磁能转换成自由空间中的电磁波,或者将自由空间中的电磁波转换成传输线中的电磁能;耦合器1804用于将移动通信号分成多路,分配给多个的接收器1803。
发射器1802用于对处理器1801生成的移动通信信号进行发射处理(例如调制),接收器1803用于对天线1807接收的移动通信信号进行接收处理(例如解调),二者可看作一个无线调制解调器。具体实现中,发射器1802或接收器1803的数量可以是一个或多个。
存储器1805用于存储程序代码和数据,具体实现中,存储器1805可以采用只读存储器(Read-Only Memory,ROM)或随机存取存贮器(Random Access Memory,RAM)。
在本发明实施例的第一种方案中,处理器1801用于调用存储于存储器1805中存储的程序代码,执行如下操作:
通过发射器1802向终端设备发送第一指示信息,所述第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,所述第一类数据包采用第一加密密钥加密,所述第二类数据包采用第二加密密钥加密。
可选的,所述第一指示信息包括以下信息中的至少一种:所述第一类数据包中的最后一个数据包对应的序号、所述第二类数据包中的第一个数据包对应的序号、所述第一类数据包中的最后一个数据包对应的序号与偏置值的差值、所述第二类数据包中的第一个数据包对应的序号与偏置值的差值。
可选的,处理器1801通过发射器1802向终端设备发送第一指示信息之后,处理器1801还用于:在接收器1803接收到所述终端设备发送的所述第一指示信息的确认消息后,通过发射器1802向所述终端设备发送所述第二类数据包。
可选的,处理器1801通过发射器1802向终端设备发送第一指示信息,包括:
在将所述第一类数据包全部发送给所述终端设备后,向所述终端设备发送所述第一指示信息。
可选的,所述接入网设备180为第一接入网设备,所述第一类数据包为所述第一接入网设备采用所述第一加密密钥加密得到的,所述第二类数据包为所述第二接入网设备采用所述第二加密密钥加密得到的;处理器1801在接收到所述终端设备发送的所述第一指示信息的确认消息后,通过发射器1802向所述第二接入网设备发送第二指示信息,所述第二指示信息用于指示所述第二接入网设备发送所述第二类数据包。
可选的,所述第一指示信息携带在数据协议数据单元或控制协议数据单元中,或,
处理器1801通过发射器1802向终端设备发送第一指示信息,包括:
通过数据协议数据单元或控制协议数据单元向所述终端设备发送所述第一指示信息。
可选的,所述数据协议数据单元包括第三指示信息,所述第三指示信息用于指示所述数据协议数据单元中携带所述第一指示信息,所述数据协议数据单元的序号为所述第一指示信息指示的序号。
需要说明的是,本发明实施例所描述的接入网设备180中各功能设备的功能可参见上述图3所示实施例中对应接入网设备的相关描述,此处不再赘述。
在本发明实施例的第二种方案中,处理器1801用于调用存储器1805中存储的程序代码,执行如下操作:
通过发射器1802向终端设备发送第四指示信息,所述第四指示信息用于指示在所述第四指示信息之前接收到的数据包为第一类数据包,在所述第四指示信息之后接收到的数据包为第二类数据包,所述第一类数据包为采用第一加密密钥加密得到的,所述第二类数据包为采用第二加密密钥加密得到的。
可选的,所述终端设备的无线链路层控制协议实体具有重排序功能。
可选的,处理器1801通过发射器1802向终端设备发送第四指示信息之前,处理器1801还用于:通过发射器1802向所述终端设备发送无线资源控制重配置消息,所述无线资源控制重配置消息用于指示所述终端设备开启无线链路层控制协议实体的重排序功能。
可选的,所述第四指示信息携带在数据协议数据单元或控制协议数据单元中。
需要说明的是,本发明实施例所描述的接入网设备180中各功能模块的功能可参见上述图15所示实施例中对应接入网设备的相关描述,此处不再赘述。
参见图19,终端设备190可包括:输入输出模块(包括音频输入输出模块1908、按键输入模块1909以及显示器1910等)、用户接口1906、处理器1901、发射器1902、接收器1903、耦合器1904、天线1907以及存储器1905。这些部件可通过总线或者其它方式连接,其中,图19中以通过总线连接为例。
其中:
天线1907用于将传输线中的电磁能转换成自由空间中的电磁波,或者将自由空间中的电磁波转换成传输线中的电磁能。耦合器1904用于将移动通信号分成多路,分配给多个的接收器1903。
发射器1902用于对处理器1901生成的移动通信信号进行发射处理(例如调制),接收器1903用于对天线1907接收的移动通信信号进行接收处理(例如解调),二者可看作一个无线调制解调器。具体实现中,发射器1902或接收器1903的数量可以是一个或多个。
所述输入输出模块主要用于实现终端设备190和用户/外部环境之间的交互功能,主要包括音频输入输出模块1908、按键输入模块1909以及显示器1910等。具体实现中,所述输入输出模块还可包括:摄像头、触摸屏以及传感器等等。其中,所述输入输出模块均通过用户接口1906与处理器1901进行通信。
存储器1905与处理器1901耦合,用于存储各种软件程序和/或多组指令。具体实现中,存储器1905可包括高速随机存取的存储器,并且也可包括非易失性存储器,例如一个或多个磁盘存储设备、闪存设备或其他非易失性固态存储设备。
在本发明实施例的第一种方案中,处理器1901用于调用存储器1905中存储的程序和数据,执行如下操作:
通过接收器1903接收接入网设备发送的第一指示信息,所述第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,所述第一类数据包采用第一加密密钥加密,所述第二类数据包采用第二加密密钥加密;
根据所述第一指示信息确定接收到的数据包为所述第一类数据包或所述第二类数据包。
可选的,所述第一指示信息包括以下信息中的至少一种:所述第一类数据包中的最后一个数据包对应的序号、所述第二类数据包中的第一个数据包对应的序号、所述第一类数据包中的最后一个数据包对应的序号与偏置值的差值、所述第二类数据包中的第一个数据包对应的序号与偏置值的差值。
可选的,处理器1901通过接收器1903接收接入网设备发送的第一指示信息之后,处理器1901还用于:通过发射1902向所述接入网设备发送所述第一指示信息的确认消息。
可选的,所述确认消息为所述终端设备通过分组数据汇聚协议状态报告指示的或者通过分组数据汇聚协议的控制协议数据单元发送的,所述控制协议数据单元携带所述第一指示信息指示的序号。
可选的,所述第一指示信息携带在数据协议数据单元或控制协议数据单元中。
可选的,所述数据协议数据单元中还携带第三指示信息,所述第三指示信息用于指示所述数据协议数据单元中携带所述第一指示信息,所述数据协议数据单元的序号为所述第一指示信息指示的序号。
需要说明的是,本发明实施例所描述的终端设备190中各功能模块的功能可参见上述图3所示实施例中对应终端设备的相关描述,此处不再赘述。
在本发明实施例的第二种方案中,处理器1901用于调用存储器1905中存储的程序和数据,执行如下操作:通过接收器1903接收接入网设备发送的第四指示信息,所述第四指示信息用于指示在所述第四指示信息之前接收到的数据包为第一类数据包,在所述第四指示信息之后接收到的数据包为第二类数据包,所述第一类数据包为采用第一加密密钥加密得到的,所述第二类数据包为采用第二加密密钥加密得到的;
根据所述第四指示信息确定接收到的数据包为所述第一类数据包或所述第二类数据包。
可选的,终端设备190的无线链路层控制协议实体具有重排序功能。
可选的,处理器1901通过接收器1903接收接入网设备发送的第四指示信息之前,处理器1901还用于:
通过接收器1903接收所述接入网设备发送的无线资源控制重配置消息;
根据所述无线资源控制重配置消息开启无线链路层控制协议实体的重排序功能。
可选的,所述第四指示信息携带在数据协议数据单元或控制协议数据单元中。
需要说明的是,本发明实施例所描述的终端设备190中各功能模块的功能可参见上述图15所示实施例中对应终端设备的相关描述,此处不再赘述。
请参见图20,是本发明实施例提供的另一种接入网设备的结构示意图。如图20所示,接入网设备200包括:生成单元2001和发送单元2002。
在本发明实施例的第一种方案中,生成单元2001,用于生成第一指示信息,所述第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,所述第一类数据包采用第一加密密钥加密,所述第二类数据包采用第二加密密钥加密。
发送单元2002,用于向终端设备发送第一指示信息。
可选的,所述第一指示信息包括以下信息中的至少一种:所述第一类数据包中的最后一个数据包对应的序号、所述第二类数据包中的第一个数据包对应的序号、所述第一类数据包中的最后一个数据包对应的序号与偏置值的差值、所述第二类数据包中的第一个数据包对应的序号与偏置值的差值。
可选的,发送单元2001向终端设备发送第一指示信息之后,发送单元2001,还用于在接入网设备200接收到所述终端设备发送的所述第一指示信息的确认消息后,向所述终端设备发送所述第二类数据包。
可选的,发送单元2002向终端设备发送第一指示信息,具体为:
在将所述第一类数据包全部发送给所述终端设备后,向所述终端设备发送所述第一指示信息。
可选的,接入网设备200为第一接入网设备,所述第一类数据包为接入网设备200采用所述第一加密密钥加密得到的,所述第二类数据包为所述第二接入网设备采用所述第二加密密钥加密得到的;接入网设备200在接收到所述终端设备发送的所述第一指示信息的确认消息后,发送单元2002,还用于向所述第二接入网设备发送第二指示信息,所述第二指示信息用于指示所述第二接入网设备发送所述第二类数据包。
可选的,所述第一指示信息携带在数据协议数据单元或控制协议数据单元中,或,
发送单元2002向终端设备发送第一指示信息,具体为:
备通过数据协议数据单元或控制协议数据单元向所述终端设备发送所述第一指示信息。
可选的,所述数据协议数据单元包括第三指示信息,所述第三指示信息用于指示所述数据协议数据单元中携带所述第一指示信息,所述数据协议数据单元的序号为所述第一指示信息指示的序号。
需要说明的是,本发明实施例所描述的接入网设备200中各功能模块的功能可参见上述图3所示实施例中对应接入网设备的相关描述,此处不再赘述。
在本发明实施例的第二种方案中,生成单元2001,用于生成第四指示信息,所述第四
指示信息用于指示在所述第四指示信息之前接收到的数据包为第一类数据包,在所述第四指示信息之后接收到的数据包为第二类数据包,所述第一类数据包为采用第一加密密钥加密得到的,所述第二类数据包为采用第二加密密钥加密得到的。
发送单元2002,用于向终端设备发送第四指示信息。
可选的,所述终端设备的无线链路层控制协议实体具有重排序功能。
可选的,发送单元2002向终端设备发送第四指示信息之前,发送单元2002还用于:向所述终端设备发送无线资源控制重配置消息,所述无线资源控制重配置消息用于指示所述终端设备开启无线链路层控制协议实体的重排序功能。
可选的,所述第四指示信息携带在数据协议数据单元或控制协议数据单元中。
需要说明的是,本发明实施例所描述的接入网设备200中各功能单元的功能可参见上述图15所示实施例中对应接入网设备的相关描述,此处不再赘述。
请参见图21,是本发明实施例提供的另一种终端设备的结构示意图。如图21所示,终端设备210包括:接收单元2101和处理单元2102。
在本发明实施例的第一种方案中,接收单元2101,用于接收接入网设备发送的第一指示信息,所述第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,所述第一类数据包采用第一加密密钥加密,所述第二类数据包采用第二加密密钥加密。
处理单元2102,用于根据所述第一指示信息确定接收到的数据包为所述第一类数据包或所述第二类数据包。
可选的,所述第一指示信息包括以下信息中的至少一种:所述第一类数据包中的最后一个数据包对应的序号、所述第二类数据包中的第一个数据包对应的序号、所述第一类数据包中的最后一个数据包对应的序号与偏置值的差值、所述第二类数据包中的第一个数据包对应的序号与偏置值的差值。
可选的,终端设备210还包括:发送单元2103,接收单元2101接收接入网设备发送的第一指示信息之后,发送单元2103,用于向所述接入网设备发送所述第一指示信息的确认消息。
可选的,所述确认消息为所述终端设备通过分组数据汇聚协议状态报告指示的或者通过分组数据汇聚协议的控制协议数据单元发送的,所述控制协议数据单元携带所述第一指示信息指示的序号。
可选的,所述第一指示信息携带在数据协议数据单元或控制协议数据单元中。
可选的,所述数据协议数据单元中还携带第三指示信息,所述第三指示信息用于指示所述数据协议数据单元中携带所述第一指示信息,所述数据协议数据单元的序号为所述第一指示信息指示的序号。
需要说明的是,本发明实施例所描述的终端设备210中各功能模块的功能可参见上述图3所示实施例中对应终端设备的相关描述,此处不再赘述。
在本发明实施例的第二种方案中,接收单元2101,用于接收接入网设备发送的第四指示信息,所述第四指示信息用于指示在所述第四指示信息之前接收到的数据包为第一类数
据包,在所述第四指示信息之后接收到的数据包为第二类数据包,所述第一类数据包为采用第一加密密钥加密得到的,所述第二类数据包为采用第二加密密钥加密得到的。
处理单元2102,用于根据所述第四指示信息确定接收到的数据包为所述第一类数据包或所述第二类数据包。
可选的,所述终端设备210的无线链路层控制协议实体具有重排序功能。
可选的,接收单元2101接收接入网设备发送的第四指示信息之前,接收单元2101,还用于接收所述接入网设备发送的无线资源控制重配置消息。
处理单元2102,还用于根据所述无线资源控制重配置消息开启无线链路层控制协议实体的重排序功能。
可选的,所述第四指示信息携带在数据协议数据单元或控制协议数据单元中。
需要说明的是,本发明实施例所描述的终端设备210中各功能单元的功能可参见上述图15所示实施例中对应终端设备的相关描述,此处不再赘述。
本申请中描述的方法或者算法的步骤可以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于RAM、闪存、ROM、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、电可擦可编程只读存储器(Electrically EPROM,简称:EEPROM)、寄存器、硬盘、移动硬盘、只读光盘(CD-ROM)或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于主接入网设备或辅接入网设备中。当然,处理器和存储介质也可以作为分立组件存在于主接入网设备或辅接入网设备中。
本领域技术人员应该可以意识到,在上述一个或多个示例中,本发明实施例所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。
以上所述的具体实施方式,对本发明实施例的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明实施例的具体实施方式而已,并不用于限定本发明实施例的保护范围,凡在本发明实施例的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本发明实施例的保护范围之内。
Claims (27)
- 一种数据传输方法,其特征在于,包括:接入网设备向终端设备发送第一指示信息,所述第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,所述第一类数据包采用第一加密密钥加密,所述第二类数据包采用第二加密密钥加密。
- 根据权利要求1所述的方法,其特征在于,所述第一指示信息包括以下信息中的至少一种:所述第一类数据包中的最后一个数据包对应的序号、所述第二类数据包中的第一个数据包对应的序号、所述第一类数据包中的最后一个数据包对应的序号与偏置值的差值、所述第二类数据包中的第一个数据包对应的序号与偏置值的差值。
- 根据权利要求1或2所述的方法,其特征在于,所述接入网设备向终端设备发送第一指示信息之后,还包括:所述接入网设备在接收到所述终端设备发送的所述第一指示信息的确认消息后,向所述终端设备发送所述第二类数据包。
- 根据权利要求1至3任一项所述的方法,其特征在于,所述接入网设备向终端设备发送第一指示信息,包括:所述接入网设备在将所述第一类数据包全部发送给所述终端设备后,向所述终端设备发送所述第一指示信息。
- 根据权利要求1至4任一项所述的方法,其特征在于,所述接入网设备为第一接入网设备,所述第一类数据包为所述第一接入网设备采用所述第一加密密钥加密得到的,所述第二类数据包为所述第二接入网设备采用所述第二加密密钥加密得到的;所述第一接入网设备在接收到所述终端设备发送的所述第一指示信息的确认消息后,所述第一接入网设备向所述第二接入网设备发送第二指示信息,所述第二指示信息用于指示所述第二接入网设备发送所述第二类数据包。
- 根据权利要求1至5任一项所述的方法,其特征在于,所述第一指示信息携带在数据协议数据单元或控制协议数据单元中,或,所述接入网设备向终端设备发送第一指示信息,包括:所述接入网设备通过数据协议数据单元或控制协议数据单元向所述终端设备发送所述第一指示信息。
- 根据权利要求6所述的方法,其特征在于,所述数据协议数据单元包括第三指示信息,所述第三指示信息用于指示所述数据协议数据单元中携带所述第一指示信息,所述数据协议数据单元的序号为所述第一指示信息指示的序号。
- 一种数据传输方法,其特征在于,包括终端设备接收接入网设备发送的第一指示信息,所述第一指示信息用于指示第一类数据包中的最后一个数据包或第二类数据包中的第一个数据包,所述第一类数据包采用第一加密密钥加密,所述第二类数据包采用第二加密密钥加密;所述终端设备根据所述第一指示信息确定接收到的数据包为所述第一类数据包或所述第二类数据包。
- 根据权利要求8所述的方法,其特征在于,所述第一指示信息包括以下信息中的至少一种:所述第一类数据包中的最后一个数据包对应的序号、所述第二类数据包中的第一个数据包对应的序号、所述第一类数据包中的最后一个数据包对应的序号与偏置值的差值、所述第二类数据包中的第一个数据包对应的序号与偏置值的差值。
- 根据权利要求8或9所述的方法,其特征在于,所述终端设备接收接入网设备发送的第一指示信息之后,还包括:所述终端设备向所述接入网设备发送所述第一指示信息的确认消息。
- 根据权利要求10所述的方法,其特征在于,所述确认消息为所述终端设备通过分组数据汇聚协议状态报告指示的或者通过分组数据汇聚协议的控制协议数据单元发送的,所述控制协议数据单元携带所述第一指示信息指示的序号。
- 根据权利要求8至11任一项所述的方法,其特征在于,所述第一指示信息携带在数据协议数据单元或控制协议数据单元中。
- 根据权利要求12所述的方法,其特征在于,所述数据协议数据单元中还携带第三指示信息,所述第三指示信息用于指示所述数据协议数据单元中携带所述第一指示信息,所述数据协议数据单元的序号为所述第一指示信息指示的序号。
- 一种数据传输方法,其特征在于,包括:接入网设备向终端设备发送第四指示信息,所述第四指示信息用于指示在所述第四指示信息之前接收到的数据包为第一类数据包,在所述第四指示信息之后接收到的数据包为第二类数据包,所述第一类数据包为采用第一加密密钥加密得到的,所述第二类数据包为采用第二加密密钥加密得到的。
- 根据权利要求14所述的方法,其特征在于,所述终端设备的无线链路层控制协议实体具有重排序功能。
- 根据权利要求14或15所述的方法,其特征在于,所述接入网设备向终端设备发 送第四指示信息之前,还包括:所述接入网设备向所述终端设备发送无线资源控制重配置消息,所述无线资源控制重配置消息用于指示所述终端设备开启无线链路层控制协议实体的重排序功能。
- 根据权利要求14至16任一项所述的方法,其特征在于,所述第四指示信息携带在数据协议数据单元或控制协议数据单元中。
- 一种数据传输方法,其特征在于,包括:终端设备接收接入网设备发送的第四指示信息,所述第四指示信息用于指示在所述第四指示信息之前接收到的数据包为第一类数据包,在所述第四指示信息之后接收到的数据包为第二类数据包,所述第一类数据包为采用第一加密密钥加密得到的,所述第二类数据包为采用第二加密密钥加密得到的;所述终端设备根据所述第四指示信息确定接收到的数据包为所述第一类数据包或所述第二类数据包。
- 根据权利要求18所述的方法,其特征在于,所述终端设备的无线链路层控制协议实体具有重排序功能。
- 根据权利要求18或19所述的方法,其特征在于,所述终端设备接收接入网设备发送的第四指示信息之前,还包括:所述终端设备接收所述接入网设备发送的无线资源控制重配置消息;所述终端设备根据所述无线资源控制重配置消息开启无线链路层控制协议实体的重排序功能。
- 根据权利要求18至20任一项所述的方法,其特征在于,所述第四指示信息携带在数据协议数据单元或控制协议数据单元中。
- 一种接入网设备,其特征在于,包括处理器和发射器,其中,所述处理器用于执行权利要求1至7任一项所述的数据传输方法。
- 一种终端设备,其特征在于,包括处理器和接收器,其中,所述处理器用于执行权利要求8至13任一项所述的数据传输方法。
- 一种通信系统,其特征在于,包括接入网设备和终端设备,其中,所述接入网设备为如权利要求22所述的接入网设备,所述终端设备为如权利要求23所述的终端设备。
- 一种接入网设备,其特征在于,包括处理器和发射器,其中,所述处理器用于执行权利要求14至17任一项所述的数据传输方法。
- 一种终端设备,其特征在于,包括处理器和接收器,其中,所述处理器用于执行权利要求18至21任一项所述的数据传输方法。
- 一种通信系统,其特征在于,包括接入网设备和终端设备,其中,所述接入网设备为如权利要求25所述的接入网设备,所述终端设备为如权利要求26所述的终端设备。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/095770 WO2019024032A1 (zh) | 2017-08-03 | 2017-08-03 | 数据传输方法、相关设备及通信系统 |
US16/633,108 US11297493B2 (en) | 2017-08-03 | 2017-08-03 | Data transmission method, related device, and communications system |
CN201780065295.2A CN109863731B (zh) | 2017-08-03 | 2017-08-03 | 数据传输方法、相关设备及通信系统 |
EP17920189.2A EP3641258B1 (en) | 2017-08-03 | 2017-08-03 | Data transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/095770 WO2019024032A1 (zh) | 2017-08-03 | 2017-08-03 | 数据传输方法、相关设备及通信系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019024032A1 true WO2019024032A1 (zh) | 2019-02-07 |
Family
ID=65233238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/095770 WO2019024032A1 (zh) | 2017-08-03 | 2017-08-03 | 数据传输方法、相关设备及通信系统 |
Country Status (4)
Country | Link |
---|---|
US (1) | US11297493B2 (zh) |
EP (1) | EP3641258B1 (zh) |
CN (1) | CN109863731B (zh) |
WO (1) | WO2019024032A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220150773A1 (en) * | 2019-08-01 | 2022-05-12 | Vivo Mobile Communication Co.,Ltd. | Data transmission method and user equipment |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4369848A3 (en) | 2017-08-11 | 2024-08-07 | Samsung Electronics Co., Ltd. | Method for performing bearer type change of a plurality of bearers configured for user equipment |
WO2020000260A1 (en) * | 2018-06-27 | 2020-01-02 | Mediatek Singapore Pte. Ltd. | Apparatus and methods to support dual-protocol for mobility enhancement |
CN110839267B (zh) * | 2018-08-17 | 2022-01-28 | 维沃移动通信有限公司 | 服务节点更新方法、终端设备和网络侧设备 |
CN113196715B (zh) * | 2018-10-12 | 2024-06-04 | 诺基亚技术有限公司 | 减少新无线电中的分组数据汇聚协议(pdcp)处的延时 |
CN111818630B (zh) * | 2019-07-12 | 2024-06-25 | 维沃移动通信有限公司 | 状态变量维护方法、装置及用户设备 |
WO2021015557A1 (en) * | 2019-07-25 | 2021-01-28 | Lg Electronics Inc. | Method and apparatus for preventing data transmission to a source network after receiving an uplink grant from a target network in a wireless communication system |
CN114697051B (zh) * | 2020-12-25 | 2024-01-09 | 华为技术有限公司 | 安全传输数据的方法、装置及系统 |
CN117063544A (zh) * | 2021-06-24 | 2023-11-14 | Oppo广东移动通信有限公司 | 一种变量的维护方法及装置、终端设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102823181A (zh) * | 2009-09-25 | 2012-12-12 | 捷讯研究有限公司 | 用于多载波网络操作的系统和方法 |
CN103314615A (zh) * | 2011-01-10 | 2013-09-18 | 阿尔卡特朗讯公司 | 无线电接入技术间切换期间的数据路径转换方法 |
CN104821859A (zh) * | 2014-01-30 | 2015-08-05 | 上海贝尔股份有限公司 | 用于在分组数据汇聚协议层处理数据的方法和设备 |
CN106537882A (zh) * | 2014-08-07 | 2017-03-22 | Lg 电子株式会社 | 在双连接系统中在用户设备处处理分组数据汇聚协议分组数据单元的方法及其设备 |
CN107438274A (zh) * | 2016-05-27 | 2017-12-05 | 中兴通讯股份有限公司 | 一种指示安全密钥更新的方法及装置 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2003839A1 (en) | 2007-06-08 | 2008-12-17 | Nokia Siemens Networks Oy | Methods, devices, system and related computer program product for key change |
US8830950B2 (en) * | 2007-06-18 | 2014-09-09 | Qualcomm Incorporated | Method and apparatus for PDCP reordering at handoff |
US8671451B1 (en) * | 2010-08-04 | 2014-03-11 | Marvell International Ltd. | Method and apparatus for preventing misuse of a group key in a wireless network |
US11026136B2 (en) * | 2014-03-07 | 2021-06-01 | Parallel Wireless, Inc. | Handovers with simplified network topology |
WO2016042766A1 (en) * | 2014-09-19 | 2016-03-24 | Nec Corporation | Apparatus for dual connectivity |
WO2016054818A1 (zh) * | 2014-10-11 | 2016-04-14 | 华为技术有限公司 | 数据处理方法和装置 |
EP3304974B1 (en) | 2015-05-29 | 2022-03-23 | Apple Inc. | Seamless mobility for 5g and lte systems and devices |
US20180324160A1 (en) * | 2015-10-08 | 2018-11-08 | Telefonaktiebolaget Lm Ericsson (Publ) | A radio access node and a method of operating the same |
WO2018023733A1 (en) * | 2016-08-05 | 2018-02-08 | Nokia Technologies Oy | Privacy preserving authentication and key agreement protocol for apparatus-to-apparatus communication |
US10735221B2 (en) * | 2017-03-28 | 2020-08-04 | Marvell International Ltd. | Flexible processor of a port extender device |
BR112019026822A2 (pt) * | 2017-06-16 | 2020-06-30 | Huawei Technologies Co., Ltd. | método e aparelho de comunicação |
-
2017
- 2017-08-03 WO PCT/CN2017/095770 patent/WO2019024032A1/zh unknown
- 2017-08-03 US US16/633,108 patent/US11297493B2/en active Active
- 2017-08-03 CN CN201780065295.2A patent/CN109863731B/zh active Active
- 2017-08-03 EP EP17920189.2A patent/EP3641258B1/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102823181A (zh) * | 2009-09-25 | 2012-12-12 | 捷讯研究有限公司 | 用于多载波网络操作的系统和方法 |
CN103314615A (zh) * | 2011-01-10 | 2013-09-18 | 阿尔卡特朗讯公司 | 无线电接入技术间切换期间的数据路径转换方法 |
CN104821859A (zh) * | 2014-01-30 | 2015-08-05 | 上海贝尔股份有限公司 | 用于在分组数据汇聚协议层处理数据的方法和设备 |
CN106537882A (zh) * | 2014-08-07 | 2017-03-22 | Lg 电子株式会社 | 在双连接系统中在用户设备处处理分组数据汇聚协议分组数据单元的方法及其设备 |
CN107438274A (zh) * | 2016-05-27 | 2017-12-05 | 中兴通讯股份有限公司 | 一种指示安全密钥更新的方法及装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3641258A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220150773A1 (en) * | 2019-08-01 | 2022-05-12 | Vivo Mobile Communication Co.,Ltd. | Data transmission method and user equipment |
Also Published As
Publication number | Publication date |
---|---|
US20200374690A1 (en) | 2020-11-26 |
EP3641258A4 (en) | 2020-05-27 |
CN109863731B (zh) | 2020-11-10 |
EP3641258A1 (en) | 2020-04-22 |
EP3641258B1 (en) | 2021-10-13 |
US11297493B2 (en) | 2022-04-05 |
CN109863731A (zh) | 2019-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019024032A1 (zh) | 数据传输方法、相关设备及通信系统 | |
US9226142B2 (en) | Mobile communication system, communication control method, and radio base station | |
TWI762684B (zh) | 切換方法、存取網設備和終端設備 | |
US8228871B2 (en) | Wireless handover optimization | |
US10945128B2 (en) | Data forwarding support in dual connectivity | |
US20210120459A1 (en) | Communication method and communications apparatus | |
US10263895B2 (en) | Data transmission method, central processing node, gateway, and base station | |
CN114071693B (zh) | 通信方法及装置 | |
CN110972215B (zh) | 一种切换方法及基站 | |
US20230171823A1 (en) | Information transmission method, network device and terminal | |
WO2019029642A1 (zh) | 通信方法、基站、终端设备和系统 | |
WO2018202131A1 (zh) | 通信方法、装置及系统 | |
CN112449348B (zh) | 通信方法和通信装置 | |
US20220030487A1 (en) | A sequence number (sn) synchronization mechanism in rlc-based forwarding | |
US10827403B2 (en) | Data transmission method, user equipment, base station, and system | |
US11057167B2 (en) | Method and apparatus for implementing efficient switching on a split bearer | |
CN109327833B (zh) | 一种通信方法及装置 | |
WO2020088611A1 (zh) | 一种重置mac层、数据传输方法及装置 | |
CN114071800B (zh) | 一种数据传输方法以及相关设备 | |
US20200128606A1 (en) | Method and system for data tunneling in device to device communication assisted by a telecommunication network | |
WO2020124540A1 (zh) | 一种数据包重排序方法、电子设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17920189 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2017920189 Country of ref document: EP Effective date: 20200113 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |