WO2025246824A1 - Communication method and communication apparatus - Google Patents
Communication method and communication apparatusInfo
- Publication number
- WO2025246824A1 WO2025246824A1 PCT/CN2025/093103 CN2025093103W WO2025246824A1 WO 2025246824 A1 WO2025246824 A1 WO 2025246824A1 CN 2025093103 W CN2025093103 W CN 2025093103W WO 2025246824 A1 WO2025246824 A1 WO 2025246824A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- target server
- uss
- network
- drone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/16—Performing reselection for specific purposes
- H04W36/22—Performing reselection for specific purposes for handling the traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/06—Airborne or Satellite Networks
Definitions
- This application relates to the field of communications, and more particularly to communication methods and communication devices.
- UAVs unrewed aerial vehicles
- USS UAV system service provider
- the communication method and communication device provided in this application can solve the problem of obtaining information from the target server and sending it to relevant network elements in the scenario of switching from the source server to the target server to create a connection between the UAV and the target server, so as to ensure that the service and management of the UAV are not interrupted.
- a communication method is provided. This method can be executed by a component of a first device, such as a processor, chip, or chip system of the first device, or by a logic module or software capable of implementing all or part of the first device.
- This method is applied in scenarios where a drone switches from a source server to a target server, and includes: the first device acquiring information from the target server, the target server information being used to establish a connection between the drone and the target server; and the first device sending the target server information.
- the source server can be the server of the source UAV system service provider, and correspondingly, the target server is the server of the target UAV system service provider.
- the first device can obtain the information of the target server, and then the first device sends the information of the target server to other network elements, thereby creating a connection between the UAV and the target server, ensuring that the service and management of the UAV are not interrupted.
- the method further includes: the first device sending target server information to the drone. That is, the first device can send target server information to the drone for the drone to establish a connection to the target server.
- the first device is a source server.
- the first device sends information about the target server, including sending the target server information to the first network device. That is, as a type of first device, the source server can determine the target server information and further send the target server information to the first network device, so that the first network device can establish a connection between the drone and the target server.
- the first device sends target server information to the drone, including: the source server sending the target server information to the drone via an application layer path or a network layer path. That is, as a type of first device, after discovering the target server's information, the source server can send the target server's information to the drone via an application layer path or a network layer path, so that the drone can establish a connection to the target server.
- the first device is a first network device.
- the first device sends information about the target server, including sending the target server information to the source server. That is, as a type of first device, the first network device can determine the target server information and further send it to the source server, so that the source server can establish a connection between the drone and the target server.
- the first device sends target server information to the drone, including: the first network device sending the target server information to the drone via a network layer path; or, the first network device sending the target server information to the drone via a source server. That is, as one type of first device, the first network device sends target server information to the drone via a network layer path; or, the first network device sends target server information to the drone via a source server, for the drone to establish a connection to the target server.
- the first device acquires the target server information by: obtaining the target server information based on the drone's location information and configuration information on the first device, wherein the configuration information includes a mapping relationship between the drone's location information and the target server information.
- the first device can determine the target server information based on the drone's location information and local configuration information, wherein the configuration information includes a mapping relationship between the drone's location information and the target server information.
- the first device obtains information from the target server by: the first device sending a first request to the second device, the first request being used to request information from the target server, the first request including the location information of the drone; and the first device receiving the information from the target server from the second device.
- the first device sends a first request to the second device, the first request being used to request information from the target server, the first request including the location information of the drone.
- the second device could be a network storage function element in the operator's network, or a domain name server that is managed by a third party to address the servers of the unmanned aerial vehicle system service provider.
- the first device sends information about the target server, including: the first device sending the target server information and first instruction information, the first instruction information being used to instruct the drone to switch from the source server to the target server. It should be understood that if the first device is the source server, the source server, while sending the target server information to the first network device and/or the drone, may also send the first instruction information instructing the drone to switch from the source server to the target server. This allows one or more of the source server, the first network device, and the drone to establish a connection between the drone and the target server, ensuring uninterrupted service and management for the drone pair.
- the first network device while sending the target server information to the source server and/or the drone, may also send the first instruction information instructing the drone to switch from the source server to the target server. This allows one or more of the source server, the first network device, and the drone to establish a connection between the drone and the target server, ensuring uninterrupted service and management for the drone pair.
- the first device sends information about the target server, including: the first device sending the target server information and second instruction information, the second instruction information being used to instruct the creation of a connection between the drone and the target server.
- the first device is a source server
- the source server while sending the target server information to the first network device and/or the drone, may also send the second instruction information instructing the creation of a connection between the drone and the target server. This allows one or more of the source server, the first network device, and the drone to establish a connection between the drone and the target server, ensuring uninterrupted service and management of the drone pair.
- the first network device while sending the target server information to the source server and/or the drone, may also send the second instruction information instructing the creation of a connection between the drone and the target server. This allows one or more of the source server, the first network device, and the drone to establish a connection between the drone and the target server, ensuring uninterrupted service and management of the drone pair.
- the first network device is one or more of the following network elements: Access and Mobility Management Function (AMF) network element, Session Management Function (SMF) network element, Unmanned Aerial Vehicle System Network Function (UAS) NF network element, and Network Open Function (NEF) network element.
- AMF Access and Mobility Management Function
- SMF Session Management Function
- UAS Unmanned Aerial Vehicle System Network Function
- NEF Network Open Function
- a communication device for implementing the various methods described above.
- This communication device can be a first device in any of the above aspects or any implementation thereof, or a device including the first device, or a device included in the first device, such as a chip.
- the communication device includes modules, units, or means corresponding to the above methods, which can be implemented in hardware, software, or by hardware executing corresponding software.
- the hardware or software includes one or more modules or units corresponding to the above functions.
- the communication device may include a processing module and a transceiver module.
- the transceiver module also referred to as a transceiver unit, is used to implement the transmission and/or reception functions in any of the above aspects and their possible implementations.
- the transceiver module may consist of transceiver circuits, transceivers, transceivers, or communication interfaces.
- the processing module can be used to implement the processing functions in any of the above aspects and their possible implementations.
- the transceiver module includes a sending module and a receiving module, which are used to implement the sending and receiving functions in any of the above aspects and any possible implementation methods.
- a communication device comprising: at least one processor; said processor being configured to execute a computer program or instructions to cause the communication device to perform the method described in any of the preceding aspects.
- the communication device further includes the memory.
- the memory is coupled to the processor; the memory may be integrated with the processor, or it may be independent of the processor.
- the processor is used to execute computer programs or instructions stored in the memory.
- the memory is independent of the communication device.
- the communication device further includes a communication interface for communicating with modules outside the communication device.
- the communication device can be the first device in any of the above aspects or any implementation thereof, or a device containing the first device, or a device contained in the first device, such as a chip.
- a computer-readable storage medium stores a computer program or instructions that, when executed on a communication device, enable the communication device to perform the methods described in any of the above aspects or any implementation thereof.
- a computer program product containing instructions is provided, which, when run on a communication device, enables the communication device to perform the methods described in any of the foregoing aspects or any implementation thereof.
- a communication device e.g., a chip or chip system
- the communication device including a processor for implementing the functions involved in any of the above aspects or any implementation thereof.
- the communication device includes a memory for storing necessary program instructions and data.
- the device when it is a chip system, it can be composed of chips or contain chips and other discrete components.
- the aforementioned sending action/function can be understood as an output
- the aforementioned receiving action/function can be understood as an input
- a seventh aspect provides a communication system comprising: a source server and a first network device as described in any of the above aspects or any implementation thereof.
- Figure 1 is a schematic diagram of the architecture of a communication system provided in an embodiment of this application.
- FIG. 2 is a schematic diagram of the architecture of another communication system provided in an embodiment of this application.
- Figure 3 illustrates a schematic diagram of an application scenario applicable to an embodiment of this application
- Figure 4 is a flowchart illustrating an information transmission method provided in an embodiment of this application.
- FIG. 5 is a schematic flowchart of an information transmission method provided in an embodiment of this application.
- Figure 6 is a flowchart illustrating an information transmission method according to an embodiment of this application.
- Figure 7 is a flowchart illustrating an information transmission method according to an embodiment of this application.
- Figure 8 is a schematic diagram of a communication device structure provided in an embodiment of this application.
- Figure 9 is a schematic diagram of a communication device structure provided in an embodiment of this application.
- V2X vehicle-to-everything
- D2D device-to-device
- V2X vehicle-to-everything
- 4G mobile communication systems such as Long Term Evolution (LTE) systems, Worldwide Interoperability for Microwave Access (WiMAX) communication systems
- 5G mobile communication systems such as New Radio (NR) systems, and future communication systems, etc.
- "instruction” can include direct and indirect instructions, as well as explicit and implicit instructions.
- the information indicated by a certain piece of information (such as the first instruction information, second instruction information, or third instruction information below) is called the information to be instructed.
- the information to be instructed there are many ways to indicate the information to be instructed, such as, but not limited to, directly indicating the information to be instructed, such as the information to be instructed itself or its index. It can also indirectly indicate the information to be instructed by indicating other information, where there is a correlation between the other information and the information to be instructed. It can also indicate only a part of the information to be instructed, while the other parts are known or pre-agreed upon.
- the instruction of specific information can be achieved by using a pre-agreed (e.g., protocol-defined) arrangement order of various pieces of information, thereby reducing instruction overhead to some extent.
- a pre-agreed e.g., protocol-defined
- common parts of various pieces of information can be identified and indicated uniformly to reduce the instruction overhead caused by individually indicating the same information.
- the specific indication method can also be any existing indication method, such as, but not limited to, the above-mentioned indication methods and their various combinations. Specific details of various indication methods can be found in existing technologies, and will not be repeated here. As described above, for example, when multiple pieces of information of the same type need to be indicated, the indication methods for different pieces of information may differ.
- the required indication method can be selected according to specific needs. This application embodiment does not limit the selected indication method; therefore, the indication methods involved in this application embodiment should be understood to cover various methods that enable the party to be indicated to obtain the information to be indicated.
- Predefined or “pre-configured” can be achieved by pre-saving corresponding codes, tables, or other means that can be used to indicate relevant information in the device. This application does not limit the specific implementation method. "Saving” can refer to saving in one or more memories. These memories can be separate installations or integrated into the encoder, decoder, processor, or communication device. Alternatively, some memories can be separately installed, while others are integrated into the decoder, processor, or communication device. The type of memory can be any form of storage medium, and this application does not limit this.
- protocol mentioned in the embodiments of this application may refer to a protocol family in the field of communication, a standard protocol with a similar protocol family frame structure, or a related protocol applied to future communication systems.
- the embodiments of this application do not specifically limit this.
- At least one of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, and c can be single or multiple.
- first and second are used in the embodiments of this application to distinguish identical or similar items with substantially the same function and effect. Those skilled in the art will understand that the terms “first” and “second” do not limit the quantity or execution order, and that "first” and “second” are not necessarily different.
- the terms “exemplary” or “for example” are used to indicate that something is being used as an example, illustration, or description. Any embodiment or design scheme described as “exemplary” or “for example” in the embodiments of this application should not be construed as being more preferred or advantageous than other embodiments or design schemes. Specifically, the use of terms such as “exemplary” or “for example” is intended to present related concepts in a concrete manner for ease of understanding.
- FIG. 1 is a diagram of a 5G network architecture based on a service-oriented interface provided in this application embodiment.
- This architecture includes user equipment (UE), radio access network (RAN), operation administration and maintenance (OAM), access and mobility management function (AMF), session management function (SMF), user plane function (UPF), policy control function (PCF), unified data management (UDM), NRF, NWDAF, NEF, AF, and other network elements.
- UE Can be located within the beam/cell coverage area of the access network device, and the access network device can provide communication services to the terminal device.
- the UE can be a device with wireless transceiver capabilities or a chip or chip system that can be configured on the device. It allows users to access the network and is used to provide voice and/or data connectivity to users.
- the UE can also be referred to as a terminal device, subscriber unit, terminal, mobile station (MS), or mobile terminal (MT), etc.
- the UE in Figure 1 can be a mobile phone, tablet computer, or computer with wireless transceiver capabilities.
- the terminal device can also be a user station, mobile station, remote station, remote terminal device, mobile terminal device, user terminal device, wireless communication equipment, user agent, user device, cellular phone, cordless phone, session initiation protocol (SIP) phone, wireless local loop (WLL) station, personal digital assistant (PDA), handheld device with wireless communication capabilities, computing device, processing device connected to a wireless modem, in-vehicle equipment, wearable device, terminal device in the Internet of Things (IoT), home appliance, virtual reality (VR) terminal, augmented reality (AR) terminal, etc.
- IoT Internet of Things
- VR virtual reality
- AR augmented reality
- Wireless terminals in various fields including (e.g., AR) terminals, wireless terminals in industrial control, wireless terminals in autonomous driving, wireless terminals in telemedicine, wireless terminals in smart grids, wireless terminals in smart cities, wireless terminals in smart homes, vehicles with vehicle-to-vehicle (V2V) communication capabilities, intelligent connected vehicles, drones with unmanned aerial vehicle-to-unmanned aerial vehicle (U2U) communication capabilities, terminal devices in future networks, or terminal devices in future evolved public land mobile networks (PLMNs), are not restricted.
- V2V vehicle-to-vehicle
- U2U unmanned aerial vehicle-to-unmanned aerial vehicle
- PLMNs public land mobile networks
- RAN This can be any device deployed in the access network capable of wireless communication with terminal devices. It can also be a chip or chip system that can be configured in the aforementioned devices, a logical node or logical module, or a function implemented in software. It can be used to implement functions such as wireless physical control, resource scheduling and wireless resource management, wireless access control, and mobility management. Specifically, network devices can be devices that support wired access or devices that support wireless access.
- an access network device may consist of one or more access network (AN)/radio access network (RAN) nodes.
- AN/RAN nodes may be: evolved Node B (gNB), transmission reception point (TRP), evolved Node B (eNB), radio network controller (RNC), Node B (NB), base station controller (BSC), base transceiver station (BTS), home base station (e.g., home evolved Node B, or home Node B (HNB)), base band unit (BBU), or wireless fidelity (Wi-Fi) access point (AP), etc.
- gNB evolved Node B
- TRP transmission reception point
- eNB evolved Node B
- RNC radio network controller
- Node B Node B
- BSC base station controller
- BTS base transceiver station
- home base station e.g., home evolved Node B, or home Node B (HNB)
- BBU base band unit
- Wi-Fi wireless fidelity
- a radio access network device can also be a device that includes centralized unit (CU) nodes, distributed unit (DU) nodes, or both CU and DU nodes.
- the access network device can be logically divided into CU and DU, with some protocol layer functions centrally controlled by the CU, and the remaining part or all of the protocol layer functions distributed in the DU, which is centrally controlled by the CU.
- the centralized unit (CU) can be further divided into a control plane (CU-CP) and a user plane (CU-UP).
- CU-CP control plane
- CU-UP user plane
- the CU including CU-CP or CU-UP or DU can also have different names.
- the CU can also be called O-CU (open CU)
- the DU can also be called O-DU
- the CU-CP can also be called O-CU-CP
- the CU-UP can also be called O-CU-UP.
- NWDAF network element Possesses functions such as data collection, model training, data analysis, and model inference. It can collect relevant data from network function network elements, third-party service servers, terminal devices, or network management systems (e.g., OAM), perform data analysis or model training based on the relevant data, and provide data analysis results to network function network elements, third-party service servers, terminal devices, or network management systems, or provide trained models to other data analysis function network elements.
- Network data analysis function network elements can be divided into analysis logic functions and model training logic functions.
- the analysis logic function is the logical function within the network data analysis function network element, used to perform model inference, derive analysis results (i.e., derive statistical or predictive analysis results based on the analysis consumer's request), and provide analysis results.
- the model training logic function is the logical function within the network data analysis function network element, used to train models and provide training services (e.g., providing trained models).
- a network data analysis function network element may contain only analysis logic functions, only model training logic functions, or both. This application embodiment does not specifically limit this.
- AMF network elements are primarily responsible for terminal device access authentication, mobility management, signaling interaction between various functional network elements, and the termination of non-access stratum (NAS) layer signaling security. For example, they manage user registration status, reachability status, N1/N2 interface signaling transmission, access authentication and authorization, user connection status, user registration and network entry, tracking area updates, cell handover user authentication, and key security.
- NAS non-access stratum
- SMF network elements primarily provide functions such as session management (e.g., session establishment, modification, and release), network protocol (IP) address allocation and management, and selection and control of user plane network elements.
- session management e.g., session establishment, modification, and release
- IP network protocol
- UPF network elements are responsible for packet routing and forwarding, policy enforcement, traffic reporting, and Quality of Services (QoS) processing.
- QoS Quality of Services
- UDM network elements manage user contracts, authorize access, and generate authentication information.
- NRF network elements provide the ability to register and discover network elements in the network.
- PCF network element mainly responsible for generating policies such as terminal device access policy and quality of service flow control policy, and can also provide the generated policies to access and mobility management function network elements or session management function network elements.
- OAM Operaational Information Management
- OAM primarily performs daily network and service analysis, forecasting, planning, and configuration, as well as network and service testing and fault management.
- OAM can interact with RAN (Radio Array) to obtain UE location information measured by RAN or reported by UE.
- RAN Radio Array
- Application Function (AF) network elements primarily serve as intermediary functional entities for interaction between application servers in the data network (DN) and network elements in the core network. They transmit application-side requests to the network side (e.g., quality of service requirements or user status event subscriptions). Application servers can use them to dynamically control network service quality and billing, and obtain operational information of a specific network element in the core network.
- the application function network element can be a functional entity deployed by the operator (i.e., a trusted AF), or a functional entity deployed by a service provider.
- This service provider can be a third-party service provider (corresponding to an untrusted AF) or an internal service provider of the operator (corresponding to a trusted AF), without limitation.
- NEF network element mainly responsible for providing network capabilities and event access to external entities (such as untrusted AF network elements), as well as receiving relevant external information (such as receiving information provided by untrusted AF network elements).
- the interfaces between the various control plane network elements in Figure 1 are service-oriented interfaces.
- Nnef, Nnrf, Nnwdaf, Namf, Npcf, Nsmf, and Nudm are the service interfaces provided by NEF, NRF, NWDAF, AMF, PCF, SMF, and UDM, respectively, used to invoke the corresponding service operations.
- N1, N2, N3, N4, N6, and N9 are interface sequence numbers. The meanings of these interface sequence numbers can be found in the definitions in the 3GPP standard protocols, and are not limited here.
- Service-oriented architecture enables the 5G core network to form a flat architecture.
- control plane network function entities in the same network slice can discover each other through NRF network elements, obtain each other's access address information, and then communicate directly with each other through the control plane signaling bus.
- interfaces between the various control plane network elements in Figure 1 can also be point-to-point interfaces, which will not be elaborated here.
- network elements or functions can be network components in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (e.g., a cloud platform).
- network element can also be referred to as “functional network element,” “functional entity,” “entity,” “node,” “device,” or “apparatus,” etc., and this application does not impose any limitations on this.
- network elements can be co-located. When two network elements are co-located, the interaction between these two network elements provided in the embodiments of this application becomes the internal operation of the co-located network element or can be omitted.
- this application will subsequently use the Access and Mobility Management Function (AMF) network element and the Session Management Function (SMF) network element as examples.
- AMF Access and Mobility Management Function
- SMF Session Management Function
- AMF Access and Mobility Management Function
- SMF Session Management Function
- network function elements such as AMF, SMF, PCF, AF, and UDM are all referred to as network function (NF) elements; or, in other network architectures, a collection of AMF, SMF, PCF, AF, and UDM elements can be referred to as control plane function elements.
- FIG 1 shows the communication system applicable to the embodiments of this application.
- unrewed aerial vehicles UAVs
- UAVs unrewed aerial vehicles
- FIG. 1 shows the communication system applicable to the embodiments of this application.
- UAVs unrewed aerial vehicles
- FIG. 1 shows the communication system applicable to the embodiments of this application.
- UAVs unrewed aerial vehicles
- FIG. 1 shows the communication system applicable to the embodiments of this application.
- UAVs unrewed aerial vehicles
- drones may also provide temporary communication services, where they carry wireless access nodes. This is often used in scenarios involving major events such as live football matches or emergencies such as earthquakes and tsunamis.
- 3GPP is discussing UAV networking-related issues, which could address problems such as identification, authorization, and tracking when remotely controlling UAVs.
- UAS Unmanned Aerial System
- UAV Unmanned Aerial System
- C2 command and control
- UAV identification and tracking UAV is a type of UE, and can also be referred to as UE.
- UAS stands for Unmanned Aerial System.
- Figure 2 illustrates an architecture diagram of another communication system to which this application embodiment applies.
- Figure 2 is also a logical architecture diagram of a drone in both 5G and 4G systems.
- This network architecture may include, but is not limited to, the following network elements (or functional network elements, functional entities, nodes, devices, etc.):
- UAV i.e., UE
- 4G access network (R)AN)
- 5G access network NG-RAN 5G core network
- 5G core 5G core
- 5G core 5G core
- 4G core network evolved packet core, EPC
- USS UAS network function
- UAS NF UAS network function
- DN third party authorized entity
- UAV Unmanned Aerial Vehicle
- UAV Unmanned Aerial Vehicle
- UAV also known as unmanned aerial vehicle or aerial robot
- the UAVs in this application embodiment can be unmanned helicopters, fixed-wing aircraft, multi-rotor aircraft, unmanned airships, and unmanned paragliders; they can also include near-space aircraft, such as stratospheric airships, high-altitude balloons, and solar-powered UAVs; and they can be quadcopters, hexacopters, single-axis UAVs, vector control UAVs, and other types of UAVs.
- UAVs in this application embodiment can be used in industrial, civilian, agricultural, construction, film and television, environmental protection, and other fields, as well as in special industries that utilize UAV operations, such as using UAVs for inspection, aerial photography, environmental monitoring, border surveillance, express delivery, power line inspection, land rights confirmation, flood control and drought relief, disaster relief, etc.
- UAVs can also be considered a type of UE (User Equipment) device. This application embodiment does not limit the name and form of the UAV.
- UAV unmanned aerial vehicle
- UAS Unmanned Aerial Vehicle System, which may include one or more unmanned aerial vehicle controllers (UAVCs) and one or more unmanned aerial vehicles (UAVs).
- UAVs unmanned aerial vehicle controllers
- UAVs unmanned aerial vehicles
- one UAV controller can control one or more UAVs
- one UAV can be controlled by one or more UAV controllers
- multiple UAV controllers can also coordinate to control multiple UAVs. This application does not limit this aspect.
- USS Unmanned Aerial Vehicle System Service Provider. This entity provides services to drone operators or pilots to meet their operational requirements and support the safe and efficient use of airspace. USS can provide any subset of functionalities to meet the provider's business objectives; for example, USS can be responsible for UAV authentication and authorization, C2 communication authentication and authorization, and UAV identification and tracking functions.
- UTM This stands for UAS Traffic Management, a system that securely and effectively integrates unmanned aerial vehicle (UAV) systems with other airspace users. It's a suite of functions and services for managing a range of automated equipment operations (e.g., UAV authentication, UAV service authorization, UAV policy management, airspace UAV traffic control, etc.).
- USS and UTM can be the same network element or entity, and can be in a relationship of inclusion or being included, or parallel; this application does not limit this.
- USS, UTM, and USS/UTM refer to the same network element or entity, whose name may be server, application server, or service entity, etc.
- UAS NF The UAS network function is supported by NEF and is used for USS to provide external services.
- the UAS NF utilizes the existing NEF service open service (interface is Nnef in Figure 1) for UAV authentication/authorization, UAV flight authorization, UAV-UAV pairing authorization, and related re-authentication/re-authorization and revocation; for location reporting, status monitoring, obtaining a list of aerial photography terminals in a geographic area, and QoS/traffic filtering control for C2 communication.
- a dedicated NEF can be deployed to provide UAS NF functionality, i.e., support for UAS-specific features/application programming interfaces (APIs) and NEF-specific features/APIs, used to provide capabilities and open services to the USS.
- UAS NF, NEF, and UAS NF/NEF refer to the same network element or the same entity, whose name may be a network function entity, etc.
- TPAE A third-party authorized entity that can identify and/or track UAVs and check for illegal UAVs within a certain range.
- the USS can communicate with the 5GC through the UAS NF/NEF on the one hand, and can also connect to the UPF through the N6 interface to transmit data on the other hand.
- Figure 3 illustrates a schematic diagram of an application scenario applicable to an embodiment of this application.
- a drone may fly from service area #1, which is served by USS#1, to service area #2, which is served by USS#2. Accordingly, the USS providing services to the drone also switches from USS#1 to USS#2.
- this application proposes a communication method applicable to scenarios where a drone switches from a source server to a target server.
- a first device can acquire information from the target server and then send it to other devices to establish a connection between the drone and the target server, thereby ensuring the continuity of drone flight services.
- Figure 4 is a flowchart illustrating an information transmission method provided in an embodiment of this application.
- the source server obtains information from the target server, and the target server's information is used to create a connection between the drone and the target server.
- the source server can be the server of the source UAV system service provider, and correspondingly, the target server is the server of the target UAV system service provider.
- the target server information includes the target server's identification information or address information.
- the source server obtains information about the target server by: the source server obtaining information about the target server based on the location information of the drone and the configuration information on the source server, wherein the configuration information includes a mapping relationship between the location information of the drone and the information of the target server.
- the source server obtains information from the target server by: the source server sending a first request to a second device, the first request being used to request information from the target server, the first request including the location information of the drone; and the first device receiving the information from the target server from the second device.
- the source server sends the target server's information to the first network device.
- the first network device is one or more of the following network elements: access and mobility management function network element, session management function network element, unmanned aerial vehicle system network function network element, and network open function network element.
- the source server sends target server information to the first network device, including: the source server sending target server information and first instruction information to the first network device, the first instruction information being used to instruct the drone to switch from the source server to the target server.
- the source server sends target server information to the first network device, including: the source server sending target server information and second instruction information to the first network device, the first instruction information being used to instruct the drone to switch from the source server to the target server.
- the information sent by the source server to the first network device also includes the current authentication result with the source server, such as success or failure.
- a failed authentication result can be used to indicate that the current authentication between the drone and the source server has failed, which can trigger the drone to re-initiate the authentication and authorization process.
- the source server sends the target server's information to the drone.
- the drone sends the target server's information to the drone.
- the source server sends the target server's information to the first network device, and then the first network device further sends the target server's information to the drone through network service operations and/or network messages.
- step S402 the step of the source server sending the target server's information to the first network device is step S402, or it can be a new step independent of step S402. No limitation is made in this embodiment of the invention.
- the first network device can send information about the target server to the drone through network service operations and/or network messages from other intermediate network devices.
- Application layer path The source server sends the target server's information to the drone through application layer service operations and/or application layer messages.
- the source server sends target server information to the drone, including: the source server sending target server information and first instruction information to the drone, the first instruction information being used to instruct the drone to switch from the source server to the target server.
- the source server sends information about the target server to the drone, including: the source server sending information about the target server to the drone and second instruction information, wherein the first instruction information is used to instruct the drone to switch from the source server to the target server.
- the target server information may be the target server's address information and/or the drone identifier assigned by the target server to the drone.
- the source server sends information about the target server (and first instruction information, or/and second instruction information) to the first network device and/or the drone, so that one or more of the source server, the first network device, and the drone can create a connection between the drone and the target server, ensuring that the service and management of the drone are not interrupted.
- FIG. 5 is a flowchart illustrating another information transmission method provided in an embodiment of this application.
- the first network device obtains information from the target server, which is used to create or instruct the creation of a connection between the drone and the target server.
- the first network device is one or more of the following network elements: access and mobility management function network element, session management function network element, unmanned aerial vehicle system network function network element, and network open function network element.
- the target server is the server of the target drone system service provider.
- the first network device obtains information about the target server by: the first network device obtaining information about the target server based on the location information of the drone and configuration information on the first network device, wherein the configuration information includes a mapping relationship between the location information of the drone and the information of the target server.
- the first network device obtains information from the target server by: the first network device sending a first request to a second device, the first request being used to request information from the target server, the first request including the location information of the drone; and the first network device receiving the information from the target server from the second device.
- the first network device sends the target server's information to the source server.
- the source server is the server of the source drone system service provider.
- the first network device sends target server information to the source server, including: the first network device sending target server information and first instruction information to the source server, the first instruction information being used to instruct the drone to switch from the source server to the target server.
- the first network device sends target server information to the source server, including: the first network device sending target server information and second instruction information to the source server, the first instruction information being used to instruct the drone to switch from the source server to the target server.
- the first network device sends the target server information to the drone. Specifically, there are two possible paths:
- the first network device sends the target server information to the UAV through network service operations and/or network messages.
- the first network device can send information about the target server to the drone through network service operations and/or network messages from other intermediate network devices.
- Application layer path The first network device sends the target server information to the source server, and the source server sends the target server information to the UAV through application layer service operations and/or application layer messages.
- step S502 the step of the first network device sending the target server's information to the source server is step S502, or it can be a new step independent of step S502.
- This embodiment of the invention does not impose any restrictions.
- the first network device sends target server information to the drone, including: the first network device sending target server information and first instruction information to the drone, the first instruction information being used to instruct the drone to switch from the source server to the target server.
- the first network device sends target server information to the drone, including: the first network device sending target server information and second instruction information to the drone, the first instruction information being used to instruct the drone to switch from the source server to the target server.
- the first network device sends information about the target server (and first instruction information, or, and second instruction information) to the source server and/or the drone, so that one or more of the source server, the first network device, and the drone can create a connection between the drone and the target server, ensuring that the service and management of the drone are not interrupted.
- Figure 6 is a flowchart illustrating an information transmission method provided by this application embodiment in conjunction with the architectural diagrams in Figures 1 and 2.
- the unmanned aerial vehicle is a source USS (i.e., S-USS)
- the target USS i.e., T-USS
- the first network device is a UAS NF/NEF
- the intermediate network device is an AMF/SMF.
- S-USS obtains information from T-USS for the UAV, where S-USS is the source USS serving the UAV, T-USS is the target USS serving the UAV, and the information from T-USS is used to create a connection between the UAV and T-USS.
- the S-USS can obtain information from the T-USS if it determines that it is unable to provide services or management for the UAV.
- the S-USS determines that it cannot provide services or management for the UAV, including: the S-USS determines that it cannot provide services or management for the UAV based on the UAV moving out of or about to move out of the S-USS's service area, or the S-USS determines that it cannot provide services or management for the UAV based on the S-USS's load exceeding a certain threshold.
- the T-USS information is the T-USSID and/or T-USS Address (e.g., the T-USS's IP address, port number, protocol number, etc.). It is worth noting that any other instances of this invention involving USS information or information about the source UAV system service provider's server can refer to the description of T-USS information here (i.e., it can be either an ID or an Address), and will not be repeated here.
- the S-USS obtains information about the T-USS for the UAV, including obtaining information about the target T-USS by relating the service area information of the USS locally configured by the S-USS based on the UAV's location information to the information of the USS.
- USS includes both the S-USS and the T-USS.
- the S-USS obtains information from the T-USS for the UAV, including the S-USS sending a first request message to a second device.
- the first request message is used to request information from the T-USS, wherein the first request message includes the location information of the UAV, and then the S-USS receives the information from the T-USS from the second device.
- the second device can be a 5GS network repository function (NRF) network element or a domain name server (DNS) managed by a third party for USS addressing.
- NRF 5GS network repository function
- DNS domain name server
- the location information of a UAV may include one or more of the following: the UAV's cell ID, a list of cell IDs, or a tracking area ID (TAI); whether the UAV is within the area of interest (AIO), which can be set as the service area of each USS, or a list of tracking area IDs (TAI), or GPS location information, etc. It is worth noting that any other instances of UAV location information or drone location information in embodiments of this invention can refer to the description of UAV location information herein, and will not be repeated here.
- the S-USS obtains the UAV's location information before the UAV obtains information from the T-USS. It should be understood that the S-USS can obtain the UAV's location information from the application layer, or the S-USS can trigger the UAV's localization process to obtain the UAV's location information, or the S-USS can subscribe to the AMF through the UAS NF/NEF to obtain the UAV's location information.
- S602 S-USS sends UAV context information to T-USS.
- the S-USS sends the UAV's context information to the T-USS based on the information from the T-USS.
- the context information of the UAV includes one or more of the following: UAV identification information, UAV location information, UAV open network element (NEF) information, and the authentication result of the UAV.
- UAV identification information UAV location information
- UAV open network element (NEF) information UAV open network element
- the identification information of a UAV includes one or more of the following: the UAV's International Mobile Subscriber Identity (IMSI), the UAV's Subscription Permanent Identifier (SUPI), the UAV's International Mobile Equipment Identity (IMEI), the UAV's Permanent Equipment Identifier (PEI), the UAV's Generic Public Subscription Identifier (GPSI), and the UAV's Civil Aviation Administration-Level UAV Identification (CAA-Level UAV ID).
- IMSI International Mobile Subscriber Identity
- SUPI UAV's Subscription Permanent Identifier
- IMEI International Mobile Equipment Identity
- PEI the UAV's Permanent Equipment Identifier
- GPSI Generic Public Subscription Identifier
- CAA-Level UAV ID Civil Aviation Administration-Level UAV Identification
- the S-USS can request the identification information assigned to the UAV by the T-USS from the T-USS, and then send it to the UAV through a network layer or application layer path.
- S603 S-USS sends a first notification message to UAS NF/NEF, which carries the UAV identifier and T-USS information.
- the UAV's identifier and the T-USS information are used to create a connection between the UAV and the T-USS.
- the S-USS before sending the first notification message to the UAS NF/NEF, receives a first subscription message from the UAS NF/NEF.
- the first subscription message is used to subscribe to the changed USS information corresponding to the changes in the USS serving the UAV, or the first subscription message is used to subscribe to the information of the USS serving the UAV, wherein the first subscription message includes the identification information of the UAV.
- the first notification message may include only the information of the T-USS serving that UAV.
- UAS NF/NEF stores the UAV's identifier and T-USS information.
- UAV identifier and T-USS information stored in the UAS NF/NEF are used to create a connection between the UAV and the T-USS.
- the UAS NF/NEF stores the UAV's identifier and T-USS information, including: the UAS NF/NEF stores or configures the mapping relationship between the UAV's identifier and the T-USS information.
- the UAS NF/NEF sends an instruction message to the UAV through the SMF/AMF network element, instructing the UAV to establish a connection with the T-USS.
- the indication information is T-USS information.
- the T-USS information may be T-USS identification information and/or identification information assigned by T-USS to the UAV.
- the instruction message instructs the UAV to recreate the connection with the USS. It should be understood that in this case, the UAV is unaware of the network side's or application provider's actions regarding the handover from S-USS to T-USS.
- the UAS NF/NEF sends indication information to the UAV through the SMF/AMF network element, including: the UAS-NF/NEF can first send the indication information to the SMF or AMF through the service operation of the SMF or AMF, and then the SMF or AMF sends the indication information to the UAV through a non-access stratum (NAS) message.
- NAS non-access stratum
- the S-USS sends an instruction message to the UAV through the application layer, instructing the UAV to establish a connection with the T-USS.
- the indication information is information from the T-USS.
- the instruction message instructs the UAV to recreate the connection with the USS. It should be understood that in this case, the UAV is unaware of the network side's or application provider's actions regarding the handover from S-USS to T-USS.
- the UAV sends a NAS message to the SMF/SMF to establish a connection between the UAV and the T-USS.
- the NAS message includes the UAV's identifier.
- the UAV sends an authentication and authorization message to the UAS NF/NEF to establish a connection between the UAV and the T-USS.
- the authentication and authorization message includes the UAV's identifier.
- UAV NF/NEF obtains the T-USS serving the UAV based on the UAV's identifier.
- the UAV NF/NEF determines the T-USS serving the UAV based on the UAV's identifier and the mapping relationship between the UAV's identifier and the T-USS information configured or stored on the UAV NF/NEF.
- the UAV NF/NEF sends an authentication and authorization message to the T-USS to establish a connection between the UAV and the T-USS.
- the NAS message includes the UAV's identifier.
- the T-USS can establish a connection between the UAV and the T-USS, and then the T-USS can serve or manage the UAV.
- the T-USS can identify the UAV's default USS based on the UAV identifier reported by the UAV.
- the default USS can indicate the USS that assigned the UAV identifier to the UAV.
- the T-USS requests the authentication result of the UAV from the default USS, optionally including the UAV's identifier information.
- the authentication result of the UAV can be success or failure.
- the T-USS can obtain the UAV's authentication result by requesting it from the S-USS or by obtaining the UAV's context from the S-USS.
- step S602 can be executed in the following two ways:
- Method 1 After determining the information of the T-USS serving the UAV, the S-USS proactively sends the UAV's context information to the T-USS;
- T-USS After receiving the authentication and authorization message (including the UAV identifier) from UAS-NEF, T-USS requests the context information of the UAV from S-USS.
- the T-USS obtains the S-USS information (ID or Address) from the UAS NF/NEF, the S-USS, or a second device.
- ID or Address the S-USS information
- steps S603, S605a, or S605b may also include an indicator 1 for instructing the UAV to switch from the S-USS to the T-USS, or an indicator 2 for instructing the creation of a connection between the UAV and the T-USS.
- the S-USS sends the T-USS information (and indicator 1, or indicator 2) to the UAS NF/NEF and/or UAV, so that one or more of the S-USS, UAS NF/NEF and UAV can create a connection between the UAV and the T-USS, ensuring that the service and management of the UAV are not interrupted.
- Figure 7 is a flowchart illustrating an information transmission method provided by this application embodiment in conjunction with the architectural diagrams in Figures 1 and 2.
- the unmanned aerial vehicle is a source USS (i.e., S-USS)
- the target USS i.e., T-USS
- the first network device is a UAS NF/NEF
- the intermediate network device is an AMF/SMF.
- UAS NF/NEF obtains T-USS information for the UAV, where T-USS is the target USS serving the UAV, and the T-USS information is used to create a connection between the UAV and the T-USS.
- UAS NF/NEF can obtain T-USS information if it is determined that S-USS is unable to provide services or management for UAV.
- the UAS NF/NEF determines that the S-USS cannot provide services or management for the UAV, including: the UAS NF/NEF determines that it cannot provide services or management for the UAV based on the UAV moving out of or about to move out of the S-USS's service area, or the UAS NF/NEF determines that it cannot provide services or management for the UAV based on the S-USS's load exceeding a certain threshold.
- the UAS NF/NEF configures a mapping between USS information (ID or Address) and the USS's service area. It should be understood that USS here includes S-USS and T-USS.
- the UAS NF/NEF sends a second subscription message to the USS or the network repository function (NRF), the second subscription message being used to subscribe to the load information of the USS; the UAS NF or NEF receives a second response message from the USS or NRF, the second response message including the load information of the USS.
- the USS here includes both S-USS and T-USS.
- the UAS NF/NEF obtains T-USS information for the UAV. This includes the UAS NF/NEF acquiring the target T-USS information based on the UAV's location information and the relationship between the locally configured USS area information and USS information.
- USS includes both S-USS and T-USS.
- the UAS NF/NEF obtains T-USS information for the UAV, including the UAS NF/NEF sending a first request message to a second device.
- the first request message is used to request T-USS information, wherein the first request message includes the location information of the UAV.
- the UAS NF/NEF receives the T-USS information from the second device.
- the second device can be a 5GS network repository function (NRF) network element or a domain name server (DNS) managed by a third party for USS addressing.
- NRF 5GS network repository function
- DNS domain name server
- the S-USS obtains the UAV's location information before the UAS NF/NEF obtains the T-USS information for the UAV.
- the UAS NF/NEF can obtain the UAV's location information from the UAV through the application layer between the S-USS and the UAV, or the UAS NF/NEF can trigger the UAV's localization process to obtain the UAV's location information, or the S-USS can subscribe to the AMF to obtain the UAV's location information.
- UAS NF/NEF sends a second notification message to S-USS, which carries the UAV identifier and T-USS information.
- the UAV's identifier and the T-USS information are used to create a connection between the UAV and the T-USS.
- the UAS NF/NEF before sending the second notification message to the S-USS, receives a second subscription message from the S-USS.
- the second subscription message is used to subscribe to the changed USS information corresponding to the changes in the USS serving the UAV, or the second subscription message is used to subscribe to the information of the USS serving the UAV.
- the second subscription message includes the identification information of the UAV.
- the second notification message may include only the information of the T-USS serving that UAV.
- S703 S-USS sends UAV context information to T-USS.
- the S-USS sends the UAV's context information to the T-USS based on the information from the T-USS.
- the context information of the UAV includes one or more of the following: UAV identification information, UAV location information, UAV open network element (NEF) information, and the authentication result of the UAV.
- UAV identification information UAV location information
- UAV open network element (NEF) information UAV open network element
- the UAS NF/NEF sends an instruction message to the UAV through the SMF/AMF network element, instructing the UAV to establish a connection with the T-USS.
- the indication information is T-USS information.
- the T-USS information may be T-USS identification information and/or identification information assigned by T-USS to the UAV.
- the instruction message instructs the UAV to recreate the connection with the USS. It should be understood that in this case, the UAV is unaware of the network side's or application provider's actions regarding the handover from S-USS to T-USS.
- the UAS NF/NEF sends indication information to the UAV through the SMF/AMF network element, including: the UAS-NF/NEF can first send the indication information to the SMF or AMF through the service operation of the SMF or AMF, and then the SMF or AMF sends the indication information to the UAV through a non-access stratum (NAS) message.
- NAS non-access stratum
- the S-USS sends an instruction message to the UAV through the application layer, instructing the UAV to establish a connection with the T-USS.
- the indication information is T-USS information.
- the T-USS information may be T-USS identification information and/or identification information assigned by T-USS to the UAV.
- the instruction message instructs the UAV to recreate the connection with the USS. It should be understood that in this case, the UAV is unaware of the network side's or application provider's actions regarding the handover from S-USS to T-USS.
- Steps S705 to S708 are the same as steps S606 to 609 in the flowchart of the embodiment shown in Figure 6, and will not be described again.
- T-USS upon receiving an authentication and authorization message (including the UAV's identifier) from the UAV NF/NEF, T-USS can establish a connection between the UAV and T-USS, and then T-USS can serve or manage the UAV.
- an authentication and authorization message including the UAV's identifier
- step S703 can be executed in the following two ways:
- Method 1 After determining the information of the T-USS serving the UAV, the S-USS proactively sends the UAV's context information to the T-USS;
- T-USS After receiving the authentication and authorization message (including the UAV identifier) from UAS-NEF, T-USS requests the context information of the UAV from S-USS.
- the T-USS obtains the S-USS information (ID or Address) from the UAS NF/NEF, the S-USS, or a second device.
- ID or Address the S-USS information
- steps S702, S704a, or S704b may also include an indicator 1 for instructing the UAV to switch from the S-USS to the T-USS, or an indicator 2 for instructing the creation of a connection between the UAV and the T-USS.
- the UAS NF/NEF sends information about the T-USS (and indicator 1, or indicator 2) to the S-USS and/or UAV, so that one or more of the S-USS, UAS NF/NEF and UAV can create a connection between the UAV and the T-USS, ensuring that the service and management of the UAV are not interrupted.
- the scenario described in this invention is a situation where a drone switches from a source server to a target server.
- the existing technology presented in this invention can also be used for a drone's initial connection to a server, where the server may be the drone's default server but not the serving server corresponding to the drone's current service area.
- the default server can be the server that assigns the drone identifier to the drone.
- the drone can initially connect to the default server, which determines the serving server corresponding to the drone's current service area and initiates a server switch for the drone.
- the UAS NF/NEF can determine the serving server corresponding to the drone's current service area using the method mentioned in this invention and send the drone's creation/authentication request to the serving server corresponding to the drone's current service area. Specific method details are the same as above and will not be elaborated further.
- the embodiments of this application also provide a communication device for implementing the various methods described above.
- This communication device can be the source server in the above method embodiments, or a device containing the source server, or a component usable in the source server device; or, the communication device can be the first network device in the above method embodiments, or a device containing the first network device, or a component usable in the first network device.
- the communication device includes hardware structures and/or software modules corresponding to the execution of each function.
- This application embodiment can divide the communication device into functional modules according to the above method embodiment. For example, each function can be divided into a separate functional module, or two or more functions can be integrated into one processing module.
- the integrated module can be implemented in hardware or as a software functional module. It should be noted that the module division in this application embodiment is illustrative and only represents one logical functional division. In actual implementation, there may be other division methods.
- Figure 8 is a schematic diagram of the structure of a communication device provided in an embodiment of this application.
- the communication device 800 includes: a processing module 801 and a transceiver module 802.
- the processing module 801 is used to execute the processing functions of the source server or the first network device in the above method embodiment.
- the transceiver module 802 is used to execute the transceiver functions of the source server or the first network device in the above method embodiment.
- the communication device 800 provided in this embodiment can execute the above information transmission method, the technical effects it can achieve can be referred to the above method embodiment, and will not be repeated here.
- the transceiver module 802 may include a receiving module and a transmitting module (not shown in Figure 8). The transceiver module is used to implement the transmitting and receiving functions of the communication device 800.
- the communication device 800 may further include a storage module (not shown in FIG8) that stores programs or instructions.
- the processing module 801 executes the program or instructions, the communication device 800 can perform the functions of the source server or the first network device in any of the methods shown in FIG4 to FIG7.
- the processing module 801 involved in the communication device 800 can be implemented by a processor or processor-related circuit components, and can be a processor or processing unit;
- the transceiver module 802 can be implemented by a transceiver or transceiver-related circuit components, and can be a transceiver or transceiver unit.
- FIG9 is a schematic diagram of another communication device provided in an embodiment of this application.
- the communication device may be a source server or a first network device, or it may be a chip (system) or other component or assembly that can be disposed in the source server or the first network device.
- the communication device 900 may include a processor 901.
- the communication device 900 may further include a memory 902 and/or a transceiver 903.
- the processor 901 is coupled to the memory 902 and the transceiver 903, for example, they can be connected via a communication bus.
- the processor 901 is the control center of the communication device 900. It can be a single processor or a collective term for multiple processing elements.
- the processor 901 can be one or more central processing units (CPUs), application-specific integrated circuits (ASICs), or one or more integrated circuits configured to implement the embodiments of this application, such as one or more digital signal processors (DSPs), or one or more field-programmable gate arrays (FPGAs).
- CPUs central processing units
- ASICs application-specific integrated circuits
- DSPs digital signal processors
- FPGAs field-programmable gate arrays
- the processor 901 can perform various functions of the communication device 900 by running or executing software programs stored in the memory 902 and calling data stored in the memory 902.
- processor 901 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG9.
- the communication device 900 may also include multiple processors, such as processors 901 and 904 shown in FIG. 9.
- processors 901 and 904 shown in FIG. 9.
- processors 901 and 904 may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU).
- a processor may refer to one or more devices, circuits, and/or processing cores used to process data (e.g., computer program instructions).
- the memory 902 is used to store the software program that executes the solution of this application, and is controlled by the processor 901 to execute it.
- the specific implementation method can be referred to the above method embodiment, and will not be repeated here.
- the memory 902 can be a read-only memory (ROM) or other type of static storage device capable of storing static information and instructions, random access memory (RAM) or other type of dynamic storage device capable of storing information and instructions, or it can be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compressed optical discs, laser discs, optical discs, digital universal optical discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium capable of carrying or storing desired program code in the form of instructions or data structures and accessible by a computer, but is not limited thereto.
- the memory 902 can be integrated with the processor 901 or exist independently and coupled to the processor 901; this application embodiment does not specifically limit this.
- Transceiver 903 is used for communication with other communication devices. For example, if communication device 900 is a source server, transceiver 903 can be used to communicate with a first network device or a drone. As another example, if communication device 900 is a first network device, transceiver 903 can be used to communicate with a source server or a drone.
- transceiver 903 may include a receiver and a transmitter (not shown separately in Figure 9). The receiver is used to implement the receiving function, and the transmitter is used to implement the transmitting function.
- the transceiver 903 can be an input/output interface or interface circuit for inputting and/or outputting signals.
- the transceiver 903 can be integrated with the processor 901, or it can exist independently and be coupled to the processor 901. This application embodiment does not specifically limit this.
- the structure of the communication device 900 shown in Figure 9 does not constitute a limitation on the communication device.
- the actual communication device may include more or fewer components than shown, or combine certain components, or have different component arrangements.
- the communication device 900 can execute the above-described information transmission method, and therefore the technical effects it can achieve can be referred to the above-described method embodiments, which will not be repeated here.
- this application also provides a computer-readable storage medium storing a computer program or instructions that, when executed by a computer, implement the functions of the above-described method embodiments.
- this application also provides a computer program product that, when executed by a computer, implements the functions of the above-described method embodiments.
- this application embodiment also provides a communication system, which includes the first network element and the second network element described in the above method embodiments.
- the communication system further includes the third network element described in the above method embodiments.
- this application also provides a communication method, which includes the method described in any of the above-described method embodiments or any implementation thereof.
- implementation can be achieved, in whole or in part, through software, hardware, firmware, or any combination thereof.
- implementation can be, in whole or in part, in the form of a computer program product.
- This computer program product includes one or more computer instructions.
- the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer instructions can be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another.
- computer instructions can be transmitted from one website, computer, server, or data center to another via wired (e.g., coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means.
- the computer-readable storage medium can be any available medium accessible to a computer or a data storage device containing one or more servers, data centers, etc., that can be integrated with the medium.
- the available media can be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media, or semiconductor media (e.g., solid-state drives (SSDs)).
- the disclosed systems, apparatuses, and methods can be implemented in other ways.
- the apparatus embodiments described above are merely illustrative; for instance, the division of units is only a logical functional division, and in actual implementation, there may be other division methods.
- multiple units or components may be combined or integrated into another system, or some features may be ignored or not executed.
- the coupling or direct coupling or communication connection shown or discussed may be through some interfaces; the indirect coupling or communication connection between apparatuses or units may be electrical, mechanical, or other forms.
- the units described as separate components may or may not be physically separate.
- the components shown as units may or may not be physical units; that is, they may be located in one place or distributed across multiple network units. Some or all of the units can be selected to achieve the purpose of this embodiment according to actual needs.
- the functional units in the various embodiments of this application can be integrated into one processing unit, or each unit can exist physically separately, or two or more units can be integrated into one unit.
- the aforementioned functions are implemented as software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
- This computer software product is stored in a storage medium and includes several instructions to cause a computer device (which may be a personal computer, server, or network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of this application.
- the aforementioned storage medium includes various media capable of storing program code, such as USB flash drives, portable hard drives, read-only memory (ROM), random access memory (RAM), magnetic disks, or optical disks.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Astronomy & Astrophysics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本申请要求于2024年5月27日提交国家知识产权局、申请号为202410673934.5、申请名称为“通信方法及通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to Chinese Patent Application No. 202410673934.5, filed on May 27, 2024, entitled "Communication Method and Communication Device", the entire contents of which are incorporated herein by reference.
本申请涉及通信领域,尤其涉及通信方法及通信装置。This application relates to the field of communications, and more particularly to communication methods and communication devices.
近年来,在第五代(5th generation,5G)通信系统的基础上,无人机(uncrewed aerial vehicle,UAV)的应用越来越普及。无人机在无人机系统服务供应商(UAS service supplier,USS)对应的服务区域内飞行时,可以通过5G网络创建与USS之间的服务连接,进而USS可以通过5G网络更好地服务和管理无人机。In recent years, the application of unrewed aerial vehicles (UAVs) has become increasingly widespread based on 5G communication systems. When UAVs fly within the service area of a UAV system service provider (USS), they can establish a service connection with the USS through the 5G network, allowing the USS to better serve and manage the UAVs.
然而,当无人机无法被源USS服务时,如何通过5G网络切换到另一个目标USS继续为无人机提供服务和管理,还有待研究。However, how to switch to another target USS via 5G network to continue providing services and management for drones when the source USS is unable to serve them remains to be studied.
本申请实施例提供的通信方法及通信装置,能够解决源服务器到目标服务器切换场景中获取目标服务器的信息并发送给相关网元以创建无人机到目服务器之间的连接,确保对无人机的服务和管理不中断。The communication method and communication device provided in this application can solve the problem of obtaining information from the target server and sending it to relevant network elements in the scenario of switching from the source server to the target server to create a connection between the UAV and the target server, so as to ensure that the service and management of the UAV are not interrupted.
为达到上述目的,本申请的实施例采用如下技术方案:To achieve the above objectives, the embodiments of this application adopt the following technical solutions:
第一方面,提供一种通信方法,该方法可以由第一设备的部件,例如第一设备的处理器、芯片、或芯片系统等执行,还可以由能实现全部或部分第一设备的逻辑模块或软件实现。该方法应用在无人机从源服务器切换到目标服务器的场景,包括:第一设备获取目标服务器的信息,目标服务器的信息用于创建无人机到目标服务器之间的连接;第一设备发送目标服务器的信息。Firstly, a communication method is provided. This method can be executed by a component of a first device, such as a processor, chip, or chip system of the first device, or by a logic module or software capable of implementing all or part of the first device. This method is applied in scenarios where a drone switches from a source server to a target server, and includes: the first device acquiring information from the target server, the target server information being used to establish a connection between the drone and the target server; and the first device sending the target server information.
由于本申请实施例中,源服务器可以是源无人机系统服务供应商的服务器,相应地,目标服务器是目标无人机系统服务供应商的服务器,在源服务器到目标服务器切换场景中,第一设备可以获取到目标服务器的信息,然后第一设备将该目标服务器的信息发送给其他网元,从而可以创建无人机到目标服务器的连接,确保该对无人机的服务和管理不中断。In this embodiment of the application, the source server can be the server of the source UAV system service provider, and correspondingly, the target server is the server of the target UAV system service provider. In the scenario of switching from the source server to the target server, the first device can obtain the information of the target server, and then the first device sends the information of the target server to other network elements, thereby creating a connection between the UAV and the target server, ensuring that the service and management of the UAV are not interrupted.
在一种可能的实现方式中,方法还包括:第一设备向无人机发送目标服务器的信息。也就是说,第一设备可以将目标服务器的信息发送给无人机,用于该无人机创建到目标服务器的连接。In one possible implementation, the method further includes: the first device sending target server information to the drone. That is, the first device can send target server information to the drone for the drone to establish a connection to the target server.
在一种可能的实现方式中,第一设备为源服务器,第一设备发送目标服务器的信息,包括:源服务器向第一网络设备发送目标服务器的信息。也就是说,作为第一设备的一种,源服务器可以确定目标服务器的信息,进一步将目标服务器的信息发送给第一网络设备,用于第一网络设备创建无人机到该目标服务器的连接。In one possible implementation, the first device is a source server. The first device sends information about the target server, including sending the target server information to the first network device. That is, as a type of first device, the source server can determine the target server information and further send the target server information to the first network device, so that the first network device can establish a connection between the drone and the target server.
在一种可能的实现方式中,第一设备向无人机发送目标服务器的信息,包括:源服务器通过应用层路径或者网络层路径向无人机发送目标服务器的信息。也就是说,作为第一设备的一种,源服务器可以发现目标服务器的信息后,可以通过应用层路径或者网络层路径向无人机发送目标服务器的信息,用于该无人机创建到目标服务器的连接。In one possible implementation, the first device sends target server information to the drone, including: the source server sending the target server information to the drone via an application layer path or a network layer path. That is, as a type of first device, after discovering the target server's information, the source server can send the target server's information to the drone via an application layer path or a network layer path, so that the drone can establish a connection to the target server.
在一种可能的实现方式中,第一设备为第一网络设备,第一设备发送目标服务器的信息,包括:第一网络设备向源服务器发送目标服务器的信息。也就是说,作为第一设备的一种,第一网络设备可以确定目标服务器的信息,并进一步向源服务器发送目标服务器的信息,用于源服务器创建无人机到该目标服务器的连接。In one possible implementation, the first device is a first network device. The first device sends information about the target server, including sending the target server information to the source server. That is, as a type of first device, the first network device can determine the target server information and further send it to the source server, so that the source server can establish a connection between the drone and the target server.
在一种可能的实现方式中,第一设备向无人机发送目标服务器的信息,包括:第一网络设备通过网络层路径向无人机发送目标服务器的信息;或者,第一网络设备通过源服务器向无人机发送目标服务器的信息。也就是说,作为第一设备的一种,第一网络设备通过网络层路径向无人机发送目标服务器的信息;或者,第一网络设备通过源服务器向无人机发送目标服务器的信息,用于该无人机创建到目标服务器的连接。In one possible implementation, the first device sends target server information to the drone, including: the first network device sending the target server information to the drone via a network layer path; or, the first network device sending the target server information to the drone via a source server. That is, as one type of first device, the first network device sends target server information to the drone via a network layer path; or, the first network device sends target server information to the drone via a source server, for the drone to establish a connection to the target server.
在一种可能的实现方式中,第一设备获取目标服务器的信息,包括:第一设备根据无人机的位置信息以及第一设备上的配置信息获取目标服务器的信息,配置信息中包括无人机的位置信息与目标服务器的信息之间的映射关系。也就是说,第一设备可以根据无人机的位置信息以及本地配置信息确定目标服务器的信息,其中,配置信息上包括无人机的位置信息与目标服务器的信息之间的映射关系。In one possible implementation, the first device acquires the target server information by: obtaining the target server information based on the drone's location information and configuration information on the first device, wherein the configuration information includes a mapping relationship between the drone's location information and the target server information. In other words, the first device can determine the target server information based on the drone's location information and local configuration information, wherein the configuration information includes a mapping relationship between the drone's location information and the target server information.
在一种可能的实现方式中,第一设备获取目标服务器的信息,包括:第一设备向第二设备发送第一请求,第一请求用于请求目标服务器的信息,第一请求中包括无人机的位置信息;第一设备从第二设备接收目标服务器的信息。也就是说,第一设备向第二设备发送第一请求,第一请求用于请求目标服务器的信息,第一请求中包括无人机的位置信息。In one possible implementation, the first device obtains information from the target server by: the first device sending a first request to the second device, the first request being used to request information from the target server, the first request including the location information of the drone; and the first device receiving the information from the target server from the second device. In other words, the first device sends a first request to the second device, the first request being used to request information from the target server, the first request including the location information of the drone.
在一种可能的实现方式中,第二设备可以是运营商网络中的网络存储功能网元,也可以是,第三方管控用于寻址无人机系统服务供应商的服务器的域名服务器。In one possible implementation, the second device could be a network storage function element in the operator's network, or a domain name server that is managed by a third party to address the servers of the unmanned aerial vehicle system service provider.
在一种可能的实现方式中,第一设备发送目标服务器的信息,包括:第一设备发送目标服务器的信息以及第一指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器。应理解,如果第一设备是源服务器,源服务器在向第一网络设备和/或无人机发送目标服务器的信息的同时,可以发送用于指示无人机从源服务器切换到目标服务器的第一指示信息,这样源服务器、第一网络设备以及无人机中的一个或者多个可以创建无人机与目标服务器之间的连接,确保该对无人机的服务和管理不中断;如果第一设备是第一网络设备,第一网络设备在向源服务器和/或无人机发送目标服务器的信息的同时,可以发送用于指示无人机从源服务器切换到目标服务器的第一指示信息,这样源服务器、第一网络设备以及无人机中的一个或者多个可以创建无人机与目标服务器之间的连接,确保该对无人机的服务和管理不中断。In one possible implementation, the first device sends information about the target server, including: the first device sending the target server information and first instruction information, the first instruction information being used to instruct the drone to switch from the source server to the target server. It should be understood that if the first device is the source server, the source server, while sending the target server information to the first network device and/or the drone, may also send the first instruction information instructing the drone to switch from the source server to the target server. This allows one or more of the source server, the first network device, and the drone to establish a connection between the drone and the target server, ensuring uninterrupted service and management for the drone pair. If the first device is the first network device, the first network device, while sending the target server information to the source server and/or the drone, may also send the first instruction information instructing the drone to switch from the source server to the target server. This allows one or more of the source server, the first network device, and the drone to establish a connection between the drone and the target server, ensuring uninterrupted service and management for the drone pair.
在一种可能的实现方式中,第一设备发送目标服务器的信息,包括:第一设备发送目标服务器的信息以及第二指示信息,第二指示信息用于指示创建无人机到目标服务器之间的连接。应理解,如果第一设备是源服务器,源服务器在向第一网络设备和/或无人机发送目标服务器的信息的同时,可以发送用于指示创建无人机到目标服务器之间的连接的第二指示信息,这样源服务器、第一网络设备以及无人机中的一个或者多个可以创建无人机与目标服务器之间的连接,确保该对无人机的服务和管理不中断;如果第一设备是第一网络设备,第一网络设备在向源服务器和/或无人机发送目标服务器的信息的同时,可以发送用于指示创建无人机到目标服务器之间的连接的第二指示信息,这样源服务器、第一网络设备以及无人机中的一个或者多个可以创建无人机与目标服务器之间的连接,确保该对无人机的服务和管理不中断。In one possible implementation, the first device sends information about the target server, including: the first device sending the target server information and second instruction information, the second instruction information being used to instruct the creation of a connection between the drone and the target server. It should be understood that if the first device is a source server, the source server, while sending the target server information to the first network device and/or the drone, may also send the second instruction information instructing the creation of a connection between the drone and the target server. This allows one or more of the source server, the first network device, and the drone to establish a connection between the drone and the target server, ensuring uninterrupted service and management of the drone pair. Similarly, if the first device is a first network device, the first network device, while sending the target server information to the source server and/or the drone, may also send the second instruction information instructing the creation of a connection between the drone and the target server. This allows one or more of the source server, the first network device, and the drone to establish a connection between the drone and the target server, ensuring uninterrupted service and management of the drone pair.
在一种可能的实现方式中,第一网络设备为下列网元中的一种或者多种:接入与移动性管理功能AMF网元、会话管理功能SMF网元、无人机航空系统网络功能UAS NF网元、网络开放功能NEF网元。In one possible implementation, the first network device is one or more of the following network elements: Access and Mobility Management Function (AMF) network element, Session Management Function (SMF) network element, Unmanned Aerial Vehicle System Network Function (UAS) NF network element, and Network Open Function (NEF) network element.
第二方面,提供了一种通信装置用于实现上述各种方法。该通信装置可以为上述任一方面或其任一实现方式中的第一设备,或者包含上述第一设备的装置,或者上述第一设备中包含的装置,比如芯片。所述通信装置包括实现上述方法相应的模块、单元、或手段(means),该模块、单元、或means可以通过硬件实现,软件实现,或者通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。Secondly, a communication device is provided for implementing the various methods described above. This communication device can be a first device in any of the above aspects or any implementation thereof, or a device including the first device, or a device included in the first device, such as a chip. The communication device includes modules, units, or means corresponding to the above methods, which can be implemented in hardware, software, or by hardware executing corresponding software. The hardware or software includes one or more modules or units corresponding to the above functions.
在一些可能的设计中,该通信装置可以包括处理模块和收发模块。该收发模块,也可以称为收发单元,用以实现上述任一方面及其任意可能的实现方式中的发送和/或接收功能。该收发模块可以由收发电路,收发机,收发器或者通信接口构成。该处理模块,可以用于实现上述任一方面及其任意可能的实现方式中的处理功能。In some possible designs, the communication device may include a processing module and a transceiver module. The transceiver module, also referred to as a transceiver unit, is used to implement the transmission and/or reception functions in any of the above aspects and their possible implementations. The transceiver module may consist of transceiver circuits, transceivers, transceivers, or communication interfaces. The processing module can be used to implement the processing functions in any of the above aspects and their possible implementations.
在一些可能的设计中,收发模块包括发送模块和接收模块,分别用于实现上述任一方面及其任意可能的实现方式中的发送和接收功能。In some possible designs, the transceiver module includes a sending module and a receiving module, which are used to implement the sending and receiving functions in any of the above aspects and any possible implementation methods.
第三方面,提供了一种通信装置,包括:至少一个处理器;所述处理器用于执行计算机程序或指令,以使该通信装置执行上述任一方面所述的方法。Thirdly, a communication device is provided, comprising: at least one processor; said processor being configured to execute a computer program or instructions to cause the communication device to perform the method described in any of the preceding aspects.
一种可能的实现中,该通信装置还包括该存储器。可选地,存储器与处理器耦合,存储器可以与处理器集成在一起,或者,存储器可以独立于该处理器。可选的,所述处理器用于执行存储器中存储的计算机程序或指令。In one possible implementation, the communication device further includes the memory. Optionally, the memory is coupled to the processor; the memory may be integrated with the processor, or it may be independent of the processor. Optionally, the processor is used to execute computer programs or instructions stored in the memory.
一种可能的实现中,该存储器独立于该通信装置。In one possible implementation, the memory is independent of the communication device.
一种可能的实现中,该通信装置还包括通信接口,该通信接口用于与该通信装置之外的模块通信。In one possible implementation, the communication device further includes a communication interface for communicating with modules outside the communication device.
该通信装置可以为上述任一方面或其任一实现方式中的第一设备,或者包含上述第一设备的装置,或者上述第一设备中包含的装置,比如芯片。The communication device can be the first device in any of the above aspects or any implementation thereof, or a device containing the first device, or a device contained in the first device, such as a chip.
第四方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序或指令,当其在通信装置上运行时,使得通信装置可以执行上述任一方面或其任一实现方式所述的方法。Fourthly, a computer-readable storage medium is provided that stores a computer program or instructions that, when executed on a communication device, enable the communication device to perform the methods described in any of the above aspects or any implementation thereof.
第五方面,提供了一种包含指令的计算机程序产品,当其在通信装置上运行时,使得该通信装置可以执行上述任一方面或其任一实现方式所述的方法。Fifthly, a computer program product containing instructions is provided, which, when run on a communication device, enables the communication device to perform the methods described in any of the foregoing aspects or any implementation thereof.
第六方面,提供了一种通信装置(例如,该通信装置可以是芯片或芯片系统),该通信装置包括处理器,用于实现上述任一方面或其任一实现方式中所涉及的功能。In a sixth aspect, a communication device (e.g., a chip or chip system) is provided, the communication device including a processor for implementing the functions involved in any of the above aspects or any implementation thereof.
在一些可能的设计中,该通信装置包括存储器,该存储器,用于保存必要的程序指令和数据。In some possible designs, the communication device includes a memory for storing necessary program instructions and data.
在一些可能的设计中,该装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件。In some possible designs, when the device is a chip system, it can be composed of chips or contain chips and other discrete components.
可以理解的是,第二方面至第六方面中任一方面提供的通信装置是芯片时,上述的发送动作/功能可以理解为输出,上述的接收动作/功能可以理解为输入。It is understood that when the communication device provided by any of the second to sixth aspects is a chip, the aforementioned sending action/function can be understood as an output, and the aforementioned receiving action/function can be understood as an input.
其中,第二方面至第六方面中任一种设计方式所带来的技术效果可参见上述第一方面中不同设计方式所带来的技术效果,在此不再赘述。The technical effects of any of the design methods in aspects two through six can be found in the technical effects of the different design methods in aspect one above, and will not be repeated here.
第七方面,提供一种通信系统,该通信系统包括:上述任一方面或其任一实现方式中的源服务器和第一网络设备。A seventh aspect provides a communication system comprising: a source server and a first network device as described in any of the above aspects or any implementation thereof.
图1是本申请实施例提供的一种通信系统的架构示意图;Figure 1 is a schematic diagram of the architecture of a communication system provided in an embodiment of this application;
图2是本申请实施例提供的另一种通信系统的架构示意图;Figure 2 is a schematic diagram of the architecture of another communication system provided in an embodiment of this application;
图3示出了本申请实施例适用的一种应用场景的示意图;Figure 3 illustrates a schematic diagram of an application scenario applicable to an embodiment of this application;
图4是本申请实施例提供的一种信息传输方法的流程示意图一;Figure 4 is a flowchart illustrating an information transmission method provided in an embodiment of this application;
图5是本申请实施例提供的一种信息传输方法的流程示意图二;Figure 5 is a schematic flowchart of an information transmission method provided in an embodiment of this application;
图6是本申请实施例提供的一种信息传输方法的流程示意图三;Figure 6 is a flowchart illustrating an information transmission method according to an embodiment of this application.
图7是本申请实施例提供的一种信息传输方法的流程示意图四;Figure 7 is a flowchart illustrating an information transmission method according to an embodiment of this application;
图8是本申请实施例提供的一种通信装置结构示意图一;Figure 8 is a schematic diagram of a communication device structure provided in an embodiment of this application;
图9是本申请实施例提供的一种通信装置结构示意图二。Figure 9 is a schematic diagram of a communication device structure provided in an embodiment of this application.
下面将结合附图,对本申请中的技术方案进行描述。The technical solutions in this application will now be described with reference to the accompanying drawings.
本申请实施例的技术方案可以应用于各种通信系统,例如无线网络系统,车到任意物体(vehicle to everything,V2X)通信系统、设备间(device-to-device,D2D)通信系统、车联网通信系统、4G移动通信系统,如长期演进(long term evolution,LTE)系统、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、5G移动通信系统,如新无线(new radio,NR)系统,以及未来的通信系统等。The technical solutions of this application embodiment can be applied to various communication systems, such as wireless network systems, vehicle-to-everything (V2X) communication systems, device-to-device (D2D) communication systems, vehicle-to-everything (V2X) communication systems, 4G mobile communication systems such as Long Term Evolution (LTE) systems, Worldwide Interoperability for Microwave Access (WiMAX) communication systems, 5G mobile communication systems such as New Radio (NR) systems, and future communication systems, etc.
在本申请实施例中,“指示”可以包括直接指示和间接指示,也可以包括显式指示和隐式指示。将某一信息(如下文的第一指示信息、第二指示信息、或者第三指示信息等)所指示的信息称为待指示信息,则具体实现过程中,对待指示信息进行指示的方式有很多种,例如但不限于,可以直接指示待指示信息,如待指示信息本身或者待指示信息的索引等。也可以通过指示其他信息来间接指示待指示信息,其中该其他信息与待指示信息之间存在关联关系。还可以仅仅指示待指示信息的一部分,而待指示信息的其他部分则是已知的或者提前约定的。例如,还可以借助预先约定(例如协议规定)的各个信息的排列顺序来实现对特定信息的指示,从而在一定程度上降低指示开销。同时,还可以识别各个信息的通用部分并统一指示,以降低单独指示同样的信息而带来的指示开销。In the embodiments of this application, "instruction" can include direct and indirect instructions, as well as explicit and implicit instructions. The information indicated by a certain piece of information (such as the first instruction information, second instruction information, or third instruction information below) is called the information to be instructed. In the specific implementation process, there are many ways to indicate the information to be instructed, such as, but not limited to, directly indicating the information to be instructed, such as the information to be instructed itself or its index. It can also indirectly indicate the information to be instructed by indicating other information, where there is a correlation between the other information and the information to be instructed. It can also indicate only a part of the information to be instructed, while the other parts are known or pre-agreed upon. For example, the instruction of specific information can be achieved by using a pre-agreed (e.g., protocol-defined) arrangement order of various pieces of information, thereby reducing instruction overhead to some extent. At the same time, common parts of various pieces of information can be identified and indicated uniformly to reduce the instruction overhead caused by individually indicating the same information.
此外,具体的指示方式还可以是现有各种指示方式,例如但不限于,上述指示方式及其各种组合等。各种指示方式的具体细节可以参考现有技术,本文不再赘述。由上文所述可知,举例来说,当需要指示相同类型的多个信息时,可能会出现不同信息的指示方式不相同的情形。具体实现过程中,可以根据具体的需要选择所需的指示方式,本申请实施例对选择的指示方式不做限定,如此一来,本申请实施例涉及的指示方式应理解为涵盖可以使得待指示方获知待指示信息的各种方法。Furthermore, the specific indication method can also be any existing indication method, such as, but not limited to, the above-mentioned indication methods and their various combinations. Specific details of various indication methods can be found in existing technologies, and will not be repeated here. As described above, for example, when multiple pieces of information of the same type need to be indicated, the indication methods for different pieces of information may differ. In the specific implementation process, the required indication method can be selected according to specific needs. This application embodiment does not limit the selected indication method; therefore, the indication methods involved in this application embodiment should be understood to cover various methods that enable the party to be indicated to obtain the information to be indicated.
“预先定义”或“预先配置”可以通过在设备中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请实施例对于其具体的实现方式不做限定。其中,“保存”可以是指,保存在一个或者多个存储器中。所述一个或者多个存储器可以是单独的设置,也可以是集成在编码器或者译码器,处理器、或通信装置中。所述一个或者多个存储器也可以是一部分单独设置,一部分集成在译码器、处理器、或通信装置中。存储器的类型可以是任意形式的存储介质,本申请实施例并不对此限定。"Predefined" or "pre-configured" can be achieved by pre-saving corresponding codes, tables, or other means that can be used to indicate relevant information in the device. This application does not limit the specific implementation method. "Saving" can refer to saving in one or more memories. These memories can be separate installations or integrated into the encoder, decoder, processor, or communication device. Alternatively, some memories can be separately installed, while others are integrated into the decoder, processor, or communication device. The type of memory can be any form of storage medium, and this application does not limit this.
本申请实施例中涉及的“协议”可以是指通信领域中协议族、类似协议族帧结构的标准协议、或者应用于未来的通信系统中的相关协议,本申请实施例对此不作具体限定。The “protocol” mentioned in the embodiments of this application may refer to a protocol family in the field of communication, a standard protocol with a similar protocol family frame structure, or a related protocol applied to future communication systems. The embodiments of this application do not specifically limit this.
本申请实施例中,“当……时”、“在……的情况下”、“若”以及“如果”等描述均指在某种客观情况下设备会做出相应的处理,并非是限定时间,且也不要求设备在实现时一定要有判断的动作,也不意味着存在其它限定。In the embodiments of this application, descriptions such as "when," "under the circumstances," "if," and "if" all refer to the device making corresponding processing under certain objective circumstances, and are not limited to a specific time. They do not require the device to make a judgment action during implementation, nor do they imply any other limitations.
在本申请实施例的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请实施例中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A、B可以是单数或者复数。并且,在本申请实施例的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a、b或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。同时,在本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念,便于理解。In the description of the embodiments of this application, unless otherwise stated, "/" indicates that the objects before and after are in an "or" relationship. For example, A/B can represent A or B. "And/or" in the embodiments of this application is merely a description of the relationship between related objects, indicating that three relationships can exist. For example, A and/or B can represent: A alone, A and B simultaneously, and B alone, where A and B can be singular or plural. Furthermore, in the description of the embodiments of this application, unless otherwise stated, "multiple" refers to two or more. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, and c can be single or multiple. Furthermore, to facilitate a clear description of the technical solutions in the embodiments of this application, the terms "first" and "second" are used in the embodiments of this application to distinguish identical or similar items with substantially the same function and effect. Those skilled in the art will understand that the terms "first" and "second" do not limit the quantity or execution order, and that "first" and "second" are not necessarily different. Meanwhile, in the embodiments of this application, the terms "exemplary" or "for example" are used to indicate that something is being used as an example, illustration, or description. Any embodiment or design scheme described as "exemplary" or "for example" in the embodiments of this application should not be construed as being more preferred or advantageous than other embodiments or design schemes. Specifically, the use of terms such as "exemplary" or "for example" is intended to present related concepts in a concrete manner for ease of understanding.
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。The network architecture and business scenarios described in the embodiments of this application are for the purpose of more clearly illustrating the technical solutions of the embodiments of this application, and do not constitute a limitation on the technical solutions provided in the embodiments of this application. As those skilled in the art will know, with the evolution of network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of this application are also applicable to similar technical problems.
为便于理解本申请实施例,图1为本申请实施例提供的一种基于服务化接口的5G网络架构图。该架构包括终端装置(user equipment,UE)、无线接入网装置(radio access network,RAN)、操作/管理和维护(operation administration and maintenance,OAM)、接入和移动性管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、用户面功能(user plane function,UPF)、策略控制功能(policy control function,PCF)、统一数据管理(unified data management,UDM)、NRF、NWDAF、NEF、AF等网元。To facilitate understanding of the embodiments of this application, Figure 1 is a diagram of a 5G network architecture based on a service-oriented interface provided in this application embodiment. This architecture includes user equipment (UE), radio access network (RAN), operation administration and maintenance (OAM), access and mobility management function (AMF), session management function (SMF), user plane function (UPF), policy control function (PCF), unified data management (UDM), NRF, NWDAF, NEF, AF, and other network elements.
其中,in,
UE:可以位于接入网装置的波束/小区覆盖范围内,接入网装置可以为终端装置提供通信服务。UE: Can be located within the beam/cell coverage area of the access network device, and the access network device can provide communication services to the terminal device.
其中,图1中的UE可以是具有无线收发功能的设备或可设置于该设备的芯片或芯片系统,可以允许用户接入网络,是用于向用户提供语音和/或数据连通性的设备。UE也可以称为终端装置、用户单元(subscriber unit)、终端(terminal)或者移动台(mobile station,MS)或者移动终端(mobile terminal,MT)等。In Figure 1, the UE can be a device with wireless transceiver capabilities or a chip or chip system that can be configured on the device. It allows users to access the network and is used to provide voice and/or data connectivity to users. The UE can also be referred to as a terminal device, subscriber unit, terminal, mobile station (MS), or mobile terminal (MT), etc.
示例性的,图1中的UE可以是手机(mobile phone)、平板电脑或带无线收发功能的电脑。终端装置还可以是用户站、移动站、远方站、远程终端装置、移动终端装置、用户终端装置、无线通信设备、用户代理、用户装置、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备、连接到无线调制解调器的处理设备、车载设备、可穿戴设备、物联网中的终端装置、家用电器、虚拟现实(virtual reality,VR)终端、增强现实(augmented reality,AR)终端、工业控制中的无线终端、无人驾驶中的无线终端、远程医疗中的无线终端、智能电网中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、具有车对车(vehicle-to-vehicle,V2V)通信能力的车辆、智能网联车、有无人机对无人机(unmanned aerial vehicle to unmanned aerial vehicle,U2U)通信能力的无人机、未来网络中的终端装置或者未来演进的公共陆地移动网络(public land mobile network,PLMN)中的终端装置等,不予限制。For example, the UE in Figure 1 can be a mobile phone, tablet computer, or computer with wireless transceiver capabilities. The terminal device can also be a user station, mobile station, remote station, remote terminal device, mobile terminal device, user terminal device, wireless communication equipment, user agent, user device, cellular phone, cordless phone, session initiation protocol (SIP) phone, wireless local loop (WLL) station, personal digital assistant (PDA), handheld device with wireless communication capabilities, computing device, processing device connected to a wireless modem, in-vehicle equipment, wearable device, terminal device in the Internet of Things (IoT), home appliance, virtual reality (VR) terminal, augmented reality (AR) terminal, etc. Wireless terminals in various fields, including (e.g., AR) terminals, wireless terminals in industrial control, wireless terminals in autonomous driving, wireless terminals in telemedicine, wireless terminals in smart grids, wireless terminals in smart cities, wireless terminals in smart homes, vehicles with vehicle-to-vehicle (V2V) communication capabilities, intelligent connected vehicles, drones with unmanned aerial vehicle-to-unmanned aerial vehicle (U2U) communication capabilities, terminal devices in future networks, or terminal devices in future evolved public land mobile networks (PLMNs), are not restricted.
RAN:可以是任意一种部署在接入网中能够和终端装置进行无线通信的设备,还可以是可设置于上述设备的芯片或芯片系统,还可以是逻辑节点或者逻辑模块或者以软件方式实现的功能,可以用于实现无线物理控制功能、资源调度和无线资源管理、无线接入控制以及移动性管理等功能。具体的,网络设备可以为支持有线接入的设备,也可以为支持无线接入的设备。RAN: This can be any device deployed in the access network capable of wireless communication with terminal devices. It can also be a chip or chip system that can be configured in the aforementioned devices, a logical node or logical module, or a function implemented in software. It can be used to implement functions such as wireless physical control, resource scheduling and wireless resource management, wireless access control, and mobility management. Specifically, network devices can be devices that support wired access or devices that support wireless access.
示例性的,接入网装置可以由一个或多个接入网(access network,AN)/无线接入网(radio access network,RAN)节点组成。AN/RAN节点可以为:继续演进的节点B(gNB)、传输接收点(transmission reception point,TRP)、演进型节点B(evolved NodeB,eNB)、无线网络控制器(radio network controller,RNC)、节点B(NodeB,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home NodeB,HNB)、基带单元(base band unit,BBU),或无线保真(wireless fidelity,Wi-Fi)接入点(access point,AP)等。For example, an access network device may consist of one or more access network (AN)/radio access network (RAN) nodes. AN/RAN nodes may be: evolved Node B (gNB), transmission reception point (TRP), evolved Node B (eNB), radio network controller (RNC), Node B (NB), base station controller (BSC), base transceiver station (BTS), home base station (e.g., home evolved Node B, or home Node B (HNB)), base band unit (BBU), or wireless fidelity (Wi-Fi) access point (AP), etc.
又一种示例中,无线接入网装置也可以是包括集中单元(centralized unit,CU)节点、或者包括分布单元(distributed unit,DU)节点、或者包括CU节点和DU节点的设备。例如,可以将接入网装置从逻辑功能角度划分为CU和DU,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。更进一步,集中式单元CU还可以划分为控制面(CU-CP)和用户面(CU-UP)。在不同系统中,CU(包括CU-CP或CU-UP)、或DU也可以有不同的名称,例如,在开放式无线接入网(open radio access network,O-RAN)系统中,CU也可以称为O-CU(开放式CU),DU也可以称为O-DU,CU-CP也可以称为O-CU-CP,CU-UP也可以称为O-CU-UP。In another example, a radio access network device can also be a device that includes centralized unit (CU) nodes, distributed unit (DU) nodes, or both CU and DU nodes. For example, the access network device can be logically divided into CU and DU, with some protocol layer functions centrally controlled by the CU, and the remaining part or all of the protocol layer functions distributed in the DU, which is centrally controlled by the CU. Furthermore, the centralized unit (CU) can be further divided into a control plane (CU-CP) and a user plane (CU-UP). In different systems, the CU (including CU-CP or CU-UP) or DU can also have different names. For example, in an open radio access network (O-RAN) system, the CU can also be called O-CU (open CU), the DU can also be called O-DU, the CU-CP can also be called O-CU-CP, and the CU-UP can also be called O-CU-UP.
NWDAF网元:具备数据收集、模型训练、数据分析、模型推理等功能,可以用于收集来自网络功能网元、第三方业务服务器、终端装置或网管系统(例如OAM)中的相关数据,基于相关数据做数据分析或模型训练,并向网络功能网元、第三方业务服务器、终端装置或网管系统提供数据分析结果,或者向其它数据分析功能网元提供训练的模型。网络数据分析功能网元按照功能可以分为分析逻辑功能和模型训练逻辑功能。其中,分析逻辑功能是网络数据分析功能网元中的逻辑功能,用于执行模型推理、推导分析结果(即根据分析消费者的请求推导统计或预测的分析结果)、开放分析结果。模型训练逻辑功能是网络数据分析功能网元中的逻辑功能,用于训练模型并开放训练服务(例如,提供训练过的模型)。一个网络数据分析功能网元可能只包含分析逻辑功能或者只包含模型训练逻辑功能,也可能同时包含分析逻辑功能和模型训练逻辑功能,本申请实施例对此不作具体限定。NWDAF network element: Possesses functions such as data collection, model training, data analysis, and model inference. It can collect relevant data from network function network elements, third-party service servers, terminal devices, or network management systems (e.g., OAM), perform data analysis or model training based on the relevant data, and provide data analysis results to network function network elements, third-party service servers, terminal devices, or network management systems, or provide trained models to other data analysis function network elements. Network data analysis function network elements can be divided into analysis logic functions and model training logic functions. The analysis logic function is the logical function within the network data analysis function network element, used to perform model inference, derive analysis results (i.e., derive statistical or predictive analysis results based on the analysis consumer's request), and provide analysis results. The model training logic function is the logical function within the network data analysis function network element, used to train models and provide training services (e.g., providing trained models). A network data analysis function network element may contain only analysis logic functions, only model training logic functions, or both. This application embodiment does not specifically limit this.
AMF网元:主要负责终端装置的接入认证、移动性管理、各个功能网元间的信令交互、对非接入层(non-access stratum,NAS)层信令安全的终结等工作,如:对用户的注册状态、可达性状态、N1/N2接口信令传输、接入鉴权和授权、用户的连接状态、用户注册入网、跟踪区更新、小区切换用户认证、密钥安全等进行管理。AMF network elements are primarily responsible for terminal device access authentication, mobility management, signaling interaction between various functional network elements, and the termination of non-access stratum (NAS) layer signaling security. For example, they manage user registration status, reachability status, N1/N2 interface signaling transmission, access authentication and authorization, user connection status, user registration and network entry, tracking area updates, cell handover user authentication, and key security.
SMF网元:主要提供对终端装置会话的会话管理(如会话建立、修改、释放)、网络协议(internet protocol,IP)地址分配和管理以及用户面网元的选择和控制等工作。SMF network elements primarily provide functions such as session management (e.g., session establishment, modification, and release), network protocol (IP) address allocation and management, and selection and control of user plane network elements.
UPF网元:负责分组路由转发,策略实施,流量报告,服务质量(Quality of Services,QoS)处理等。UPF network elements are responsible for packet routing and forwarding, policy enforcement, traffic reporting, and Quality of Services (QoS) processing.
UDM网元:对用户进行签约管理、接入授权、鉴权信息生成等。UDM network elements: manage user contracts, authorize access, and generate authentication information.
NRF网元:提供网络中网元的注册和发现能力。NRF network elements: provide the ability to register and discover network elements in the network.
PCF网元;主要负责终端装置接入策略和服务质量流控制策略等策略的生成,还可以向接入与移动性管理功能网元、或会话管理功能网元等提供生成的策略。PCF network element; mainly responsible for generating policies such as terminal device access policy and quality of service flow control policy, and can also provide the generated policies to access and mobility management function network elements or session management function network elements.
OAM:主要完成日常网络和业务的分析、预测、规划和配置工作,以及对网络及其业务的测试和故障管理等。OAM可以和RAN交互,获取RAN侧由RAN测量的或者UE测量上报的UE位置信息。OAM (Operational Information Management) primarily performs daily network and service analysis, forecasting, planning, and configuration, as well as network and service testing and fault management. OAM can interact with RAN (Radio Array) to obtain UE location information measured by RAN or reported by UE.
AF网元:主要是提供数据网络(data network,DN)中的应用服务器和核心网中的网元交互的中间功能实体,传递应用侧对网络侧的需求(例如,服务质量需求或用户状态事件订阅等),应用服务器可以通过它实现对网络服务质量和计费的动态控制、获取核心网中某个网元的运行信息等。在本申请实施例中,应用功能网元可以是运营商部署的功能实体,也就是可信AF,也可以是服务提供商部署的功能实体,该服务提供商可以是第三方服务提供商(对应于不可信AF),还可以是运营商内部的服务提供商(对应于可信AF),不予限制。Application Function (AF) network elements primarily serve as intermediary functional entities for interaction between application servers in the data network (DN) and network elements in the core network. They transmit application-side requests to the network side (e.g., quality of service requirements or user status event subscriptions). Application servers can use them to dynamically control network service quality and billing, and obtain operational information of a specific network element in the core network. In this embodiment, the application function network element can be a functional entity deployed by the operator (i.e., a trusted AF), or a functional entity deployed by a service provider. This service provider can be a third-party service provider (corresponding to an untrusted AF) or an internal service provider of the operator (corresponding to a trusted AF), without limitation.
NEF网元:主要负责对外部访问的实体(如不可信AF网元)提供网络的能力和事件开放,以及接收相关外部信息(如接收不可信AF网元提供的信息)。NEF network element: mainly responsible for providing network capabilities and event access to external entities (such as untrusted AF network elements), as well as receiving relevant external information (such as receiving information provided by untrusted AF network elements).
从图1可以看出,图1中的各个控制面网元之间的接口是服务化的接口。As can be seen from Figure 1, the interfaces between the various control plane network elements in Figure 1 are service-oriented interfaces.
例如,图1中的Nnef、Nnrf、Nnwdaf、Namf、Npcf、Nsmf、Nudm分别为上述NEF、NRF、NWDAF、AMF、PCF、SMF和UDM提供的服务化接口,用于调用相应的服务化操作。N1、N2、N3、N4,N6以及N9为接口序列号。这些接口序列号的含义可参见3GPP标准协议中定义的含义,在此不做限制。For example, in Figure 1, Nnef, Nnrf, Nnwdaf, Namf, Npcf, Nsmf, and Nudm are the service interfaces provided by NEF, NRF, NWDAF, AMF, PCF, SMF, and UDM, respectively, used to invoke the corresponding service operations. N1, N2, N3, N4, N6, and N9 are interface sequence numbers. The meanings of these interface sequence numbers can be found in the definitions in the 3GPP standard protocols, and are not limited here.
服务化使得5G核心网形成一个扁平化的架构,通过控制面的信令总线,同一个网络切片的控制面网络功能实体之间可以通过NRF网元相互发现对方,获得对方的访问地址信息,然后可以通过控制面信令总线直接相互通信。Service-oriented architecture enables the 5G core network to form a flat architecture. Through the control plane signaling bus, control plane network function entities in the same network slice can discover each other through NRF network elements, obtain each other's access address information, and then communicate directly with each other through the control plane signaling bus.
需要说明的是,图1中的各个控制面网元之间的接口还可以是点对点接口,这里不再赘述。It should be noted that the interfaces between the various control plane network elements in Figure 1 can also be point-to-point interfaces, which will not be elaborated here.
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。It is understood that the aforementioned network elements or functions can be network components in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (e.g., a cloud platform).
以上“网元”也可以称为“功能网元”、“功能实体”、“实体”“节点”、“设备”或“装置”等,本申请并不做限制。在实际部署中,网元可以合设,当两个网元合设的时候,本申请实施例提供的这两个网元之间的交互就成为该合设网元的内部操作或者可以省略。The term "network element" can also be referred to as "functional network element," "functional entity," "entity," "node," "device," or "apparatus," etc., and this application does not impose any limitations on this. In actual deployment, network elements can be co-located. When two network elements are co-located, the interaction between these two network elements provided in the embodiments of this application becomes the internal operation of the co-located network element or can be omitted.
为方便说明,本申请后续,以接入与移动性管理功能网元为AMF网元,会话管理功能网元为SMF网元为例进行说明。进一步地,将AMF网元简称为AMF,SMF网元简称为SMF。即本申请后续所描述的AMF均可替换为接入与移动性管理功能网元,SMF均可替换为会话管理功能网元。For ease of explanation, this application will subsequently use the Access and Mobility Management Function (AMF) network element and the Session Management Function (SMF) network element as examples. Furthermore, the AMF network element will be abbreviated as AMF, and the SMF network element as SMF. That is, the AMF described in this application can be replaced by the Access and Mobility Management Function network element, and the SMF can be replaced by the Session Management Function network element.
需要说明的是,图1中所涉及的各个网元以及网元之间的通信接口的名称是以目前协议中规定的为例进行简单说明的,但并不限定本申请实施例只能够应用于目前已知的通信系统。因此,以目前协议为例描述时出现的标准名称,都是功能性描述,本申请对于网元、接口或信令等的具体名称并不限定,仅表示网元、接口或者信令的功能,可以对应的扩展到其它系统,比如5G或未来通信系统中。It should be noted that the names of the various network elements and communication interfaces between them shown in Figure 1 are simplified examples based on the current protocols, but this does not limit the embodiments of this application to only currently known communication systems. Therefore, the standard names appearing when describing using the current protocols as examples are functional descriptions. This application does not limit the specific names of network elements, interfaces, or signaling, but only indicates the function of the network element, interface, or signaling, which can be extended to other systems, such as 5G or future communication systems.
另外,还需要说明的是,在某些网络架构中,AMF网元、SMF网元、PCF网元、AF网元以及UDM网元等网络功能网元实体都称为网络功能(network function,NF)网元;或者,在另一些网络架构中,AMF网元,SMF网元,PCF网元,AF网元,UDM网元等网元的集合都可以称为控制面功能网元。Additionally, it should be noted that in some network architectures, network function elements such as AMF, SMF, PCF, AF, and UDM are all referred to as network function (NF) elements; or, in other network architectures, a collection of AMF, SMF, PCF, AF, and UDM elements can be referred to as control plane function elements.
图1为本申请实施例适用的通信系统。近年来,在图1所示的通信系统的基础上,无人机(uncrewed aerial vehicle,UAV)作为一种终端设备,应用越来越普及,例如,在民用领域,从个人娱乐的小型无人机,到各种各样的带来经济价值的无人机(如,植保无人机、救灾无人机、消防无人机、快递无人机)等等,种类繁多。Figure 1 shows the communication system applicable to the embodiments of this application. In recent years, based on the communication system shown in Figure 1, unrewed aerial vehicles (UAVs) have become increasingly popular as a terminal device. For example, in the civilian field, there are many types of UAVs, ranging from small drones for personal entertainment to various drones that bring economic value (such as agricultural drones, disaster relief drones, firefighting drones, and delivery drones).
除此之外,无人机还可能提供临时的通信服务,即无人机上载有无线接入节点,这常应用于重大事件如足球比赛直播,或紧急事件如地震海啸等场景。当前3GPP正在讨论UAV联网相关课题,可以解决远程控制UAV时的识别、授权以及寻迹等问题。In addition to these functions, drones may also provide temporary communication services, where they carry wireless access nodes. This is often used in scenarios involving major events such as live football matches or emergencies such as earthquakes and tsunamis. Currently, 3GPP is discussing UAV networking-related issues, which could address problems such as identification, authorization, and tracking when remotely controlling UAVs.
一种可能的方式中,无人机系统服务供应商(UAS service supplier,USS)为UAV安全和有效使用空域提供服务,负责UAV的鉴权授权、命令和控制(command and control,C2)通信的鉴权授权、UAV的识别寻迹等。UAV是UE的一种,也可以称为UE。其中,UAS为无人机航空系统(uncrewed aerial system,UAS)。In one possible approach, the Unmanned Aerial System (UAS) service provider (USS) provides services for the safe and efficient use of airspace by UAVs, responsible for UAV authentication and authorization, command and control (C2) communication authentication and authorization, and UAV identification and tracking. UAV is a type of UE, and can also be referred to as UE. UAS stands for Unmanned Aerial System.
为了便于理解,下面结合图2对UAV、USS、UAS等内容进行介绍。To facilitate understanding, the following section will introduce UAV, USS, UAS, and other related terms with reference to Figure 2.
作为示例性说明,图2示出了本申请实施例适用的另一种通信系统的架构示意图,图2同时还是无人机在5G系统和4G系统的逻辑架构示意图。该网络架构可以包括但不限于以下网元(或者称为功能网元、功能实体、节点、设备等):As an example, Figure 2 illustrates an architecture diagram of another communication system to which this application embodiment applies. Figure 2 is also a logical architecture diagram of a drone in both 5G and 4G systems. This network architecture may include, but is not limited to, the following network elements (or functional network elements, functional entities, nodes, devices, etc.):
UAV(即UE)、4G接入网((R)AN)、5G接入网NG-RAN、5G核心网(5G core,5GC)、4G核心网(evolved packet core,EPC)、USS、UAS网络功能(UAS network function,UAS NF)、DN和第三方授权实体(third party authorized entity,TPAE)。UAV (i.e., UE), 4G access network ((R)AN), 5G access network NG-RAN, 5G core network (5G core, 5GC), 4G core network (evolved packet core, EPC), USS, UAS network function (UAS network function, UAS NF), DN and third party authorized entity (TPAE).
下面分别对图2中示出的相关网元或设备进行简单介绍:The following is a brief introduction to the relevant network elements or devices shown in Figure 2:
1、UAV:无人机,还可以称为无人驾驶飞机、空中机器人,是利用无线电遥控设备和自备的程序控制装置的不载人飞机,可以在无人驾驶的条件下完成空中飞行任务和各种负载任务。本申请实施例中的无人机可以是无人直升机、固定翼机、多旋翼飞行器、无人飞艇、无人伞翼机;还可以包括临近空间飞行器,例如平流层飞艇、高空气球、太阳能无人机等;还可以是四轴、六轴、单轴、矢量控制等多种形式的无人机。本申请实施例中的无人机可以用于工业、民用、农业、建筑、影视、环保等领域以及用到无人机作业的特种行业,例如用无人机来进行巡视、航拍、环境监测、边防监控、送快递、电力巡检、确权、防汛抗旱、灾后救援等等。无人机也可以看成是一种UE类型的设备。本申请实施例对无人机的名称和形式并不限定。1. UAV: Unmanned Aerial Vehicle (UAV), also known as unmanned aerial vehicle or aerial robot, is an unmanned aircraft that utilizes radio remote control equipment and its own program control device to complete aerial flight missions and various payload tasks under unmanned conditions. The UAVs in this application embodiment can be unmanned helicopters, fixed-wing aircraft, multi-rotor aircraft, unmanned airships, and unmanned paragliders; they can also include near-space aircraft, such as stratospheric airships, high-altitude balloons, and solar-powered UAVs; and they can be quadcopters, hexacopters, single-axis UAVs, vector control UAVs, and other types of UAVs. The UAVs in this application embodiment can be used in industrial, civilian, agricultural, construction, film and television, environmental protection, and other fields, as well as in special industries that utilize UAV operations, such as using UAVs for inspection, aerial photography, environmental monitoring, border surveillance, express delivery, power line inspection, land rights confirmation, flood control and drought relief, disaster relief, etc. UAVs can also be considered a type of UE (User Equipment) device. This application embodiment does not limit the name and form of the UAV.
应理解,本文对无人机的具体类型不作限定。随着智能化的发展,为应用于不同的场景或完成不同的空中飞行任务,具备无人驾驶飞机功能的设备的名称可能会有所不同。为方便描述,本申请所有实施例中,上述能够具备无人驾驶飞机功能的装置统称为无人机。It should be understood that this document does not limit the specific type of drone. With the development of intelligent technology, the names of devices with unmanned aerial vehicle (UAV) capabilities may vary depending on the application scenario or the completion of different aerial flight missions. For ease of description, in all embodiments of this application, the aforementioned devices capable of UAV functionality are collectively referred to as UAVs.
2、UAS:无人机航空系统,可以包括一个或多个无人机控制器(uncrewed aerial vehicle controller,UAVC)和一个或多个无人机。例如,一个无人机控制器可以控制一个或多个无人机,一个无人机也可以被一个或多个无人机控制器控制,多个无人机控制器也可以协同控制多个无人机,本申请实施例对此不做限定。2. UAS: Unmanned Aerial Vehicle System, which may include one or more unmanned aerial vehicle controllers (UAVCs) and one or more unmanned aerial vehicles (UAVs). For example, one UAV controller can control one or more UAVs, one UAV can be controlled by one or more UAV controllers, and multiple UAV controllers can also coordinate to control multiple UAVs. This application does not limit this aspect.
3、USS:无人机系统服务供应商,通过向无人机的运营者或飞行员提供服务,以满足无人机运营要求,为安全、高效地使用空域提供支持的实体。USS可以提供任何功能子集以满足提供商的业务目标,例如USS可以负责UAV的鉴权授权、C2通信的鉴权授权、UAV的识别寻迹等功能。3. USS: Unmanned Aerial Vehicle System Service Provider. This entity provides services to drone operators or pilots to meet their operational requirements and support the safe and efficient use of airspace. USS can provide any subset of functionalities to meet the provider's business objectives; for example, USS can be responsible for UAV authentication and authorization, C2 communication authentication and authorization, and UAV identification and tracking functions.
需要说明的是,USS的命名仅为便于表示其功能,而不应对本申请构成任何限定,本申请并不排除在以后的标准中采用其他命名的可能。It should be noted that the naming of USS is only for the convenience of indicating its function and should not constitute any limitation on this application. This application does not exclude the possibility of using other names in future standards.
4、UTM:即UAS Traffic Management,无人机航空驾驶系统流量管理,UTM一种能够安全有效地将飞行中的无人机与其他空域用户集成在一起的系统,是一套用于管理一系列自动设备操作的功能和服务(例如无人机鉴权、无人机业务授权、无人机策略管理、空域无人机流量控制等)。USS和UTM可以是同一个网元或实体,可以是包含或者被包含关系,也可以是并列关系,本申请对此不做限定。在本申请实施例中,USS、UTM、USS/UTM指的是同一个网元或同一个实体,其名称可能是服务器、应用服务器或者服务实体等。4. UTM: This stands for UAS Traffic Management, a system that securely and effectively integrates unmanned aerial vehicle (UAV) systems with other airspace users. It's a suite of functions and services for managing a range of automated equipment operations (e.g., UAV authentication, UAV service authorization, UAV policy management, airspace UAV traffic control, etc.). USS and UTM can be the same network element or entity, and can be in a relationship of inclusion or being included, or parallel; this application does not limit this. In the embodiments of this application, USS, UTM, and USS/UTM refer to the same network element or entity, whose name may be server, application server, or service entity, etc.
5、UAS NF:UAS网络功能由NEF支持,用于USS对外公开服务。UAS NF利用现有的NEF业务开放服务(接口为图1中的Nnef),用于无人机鉴权/授权、无人机飞行授权、无人机-无人机配对授权,以及相关的再鉴权/再授权和撤销;用于位置报告、状态监控、获取地理区域内航拍终端列表以及C2通信的QoS/流量过滤控制。5. UAS NF: The UAS network function is supported by NEF and is used for USS to provide external services. The UAS NF utilizes the existing NEF service open service (interface is Nnef in Figure 1) for UAV authentication/authorization, UAV flight authorization, UAV-UAV pairing authorization, and related re-authentication/re-authorization and revocation; for location reporting, status monitoring, obtaining a list of aerial photography terminals in a geographic area, and QoS/traffic filtering control for C2 communication.
此外,还可部署专用NEF,可以提供UAS NF功能,即支持UAS特定特性/应用程序编程接口(application programming interface,API)和NEF特定特性/API,用于向USS提供能力开放业务等。在本申请实施例中,UAS NF、NEF、UAS NF/NEF指的是同一个网元或同一个实体,其名称可能是网络功能实体等。In addition, a dedicated NEF can be deployed to provide UAS NF functionality, i.e., support for UAS-specific features/application programming interfaces (APIs) and NEF-specific features/APIs, used to provide capabilities and open services to the USS. In the embodiments of this application, UAS NF, NEF, and UAS NF/NEF refer to the same network element or the same entity, whose name may be a network function entity, etc.
6、TPAE:第三方授权实体,可以识别和/或寻迹UAV,在一定范围内检查是否有非法的UAV。6. TPAE: A third-party authorized entity that can identify and/or track UAVs and check for illegal UAVs within a certain range.
如图2所示,以5G系统为例,USS一方面可以通过UAS NF/NEF与5GC进行通信,另一方面还可以通过N6接口连接UPF,传输数据。As shown in Figure 2, taking the 5G system as an example, the USS can communicate with the 5GC through the UAS NF/NEF on the one hand, and can also connect to the UPF through the N6 interface to transmit data on the other hand.
图3示出了本申请实施例适用的一种应用场景的示意图。作为一个示例,如图3所示,无人机可能由USS#1负责的服务区域#1飞行至USS#2负责的服务区域#2,相应地,为无人机提供服务的USS也由USS#1切换为USS#2。Figure 3 illustrates a schematic diagram of an application scenario applicable to an embodiment of this application. As an example, as shown in Figure 3, a drone may fly from service area #1, which is served by USS#1, to service area #2, which is served by USS#2. Accordingly, the USS providing services to the drone also switches from USS#1 to USS#2.
在为无人机提供服务的USS由源USS(即USS#1)切换到目标USS(即USS#2)的场景中,如何发现目标USS,然后创建无人机到目标服务器之间的连接,以确保无人机的飞行服务的连续性,成为有待解决的技术问题。In scenarios where the USS providing services to drones switches from the source USS (i.e., USS#1) to the target USS (i.e., USS#2), how to discover the target USS and then establish a connection between the drone and the target server to ensure the continuity of the drone's flight services becomes a technical problem that needs to be solved.
针对上述问题,本申请提出了一种通信方法,应用在无人机从源服务器切换到目标服务器的场景,第一设备可以获取目标服务器的信息,然后发送出去给其他设备,用于创建所述无人机到所述目标服务器之间的连接,从而确保无人机飞行服务的连续性。To address the aforementioned issues, this application proposes a communication method applicable to scenarios where a drone switches from a source server to a target server. A first device can acquire information from the target server and then send it to other devices to establish a connection between the drone and the target server, thereby ensuring the continuity of drone flight services.
下面将结合图4,通过方法实施例具体介绍上述通信系统中各网元/装置之间的交互流程。本申请实施例提供的信息传输方法可以适用于上述图1和图2所示的通信系统。The interaction process between various network elements/devices in the above-described communication system will be specifically described below with reference to Figure 4, through a method embodiment. The information transmission method provided in this application embodiment can be applied to the communication systems shown in Figures 1 and 2 above.
图4是本申请实施例提供的一种信息传输方法的流程示意图一。Figure 4 is a flowchart illustrating an information transmission method provided in an embodiment of this application.
S401,源服务器获取目标服务器的信息,目标服务器的信息用于创建无人机到目标服务器之间的连接。S401, the source server obtains information from the target server, and the target server's information is used to create a connection between the drone and the target server.
应理解,源服务器可以是源无人机系统服务供应商的服务器,相应地,目标服务器是目标无人机系统服务供应商的服务器。It should be understood that the source server can be the server of the source UAV system service provider, and correspondingly, the target server is the server of the target UAV system service provider.
应理解,目标服务器的信息包括目标服务器的标识信息或者地址信息。It should be understood that the target server information includes the target server's identification information or address information.
在一种可能的实施方式中,源服务器获取目标服务器的信息,包括:源服务器根据无人机的位置信息以及源服务器上的配置信息获取目标服务器的信息,配置信息中包括无人机的位置信息与目标服务器的信息之间的映射关系。In one possible implementation, the source server obtains information about the target server by: the source server obtaining information about the target server based on the location information of the drone and the configuration information on the source server, wherein the configuration information includes a mapping relationship between the location information of the drone and the information of the target server.
在一种可能的实施方式中,源服务器获取目标服务器的信息,包括:源服务器向第二设备发送第一请求,第一请求用于请求目标服务器的信息,第一请求中包括无人机的位置信息;第一设备从第二设备接收目标服务器的信息。In one possible implementation, the source server obtains information from the target server by: the source server sending a first request to a second device, the first request being used to request information from the target server, the first request including the location information of the drone; and the first device receiving the information from the target server from the second device.
S402,源服务器向第一网络设备发送目标服务器的信息。S402, the source server sends the target server's information to the first network device.
应理解,第一网络设备为下列网元中的一种或者多种:接入与移动性管理功能网元、会话管理功能网元、无人机航空系统网络功能网元、网络开放功能网元。It should be understood that the first network device is one or more of the following network elements: access and mobility management function network element, session management function network element, unmanned aerial vehicle system network function network element, and network open function network element.
在一种可能的实施方式中,源服务器向第一网络设备发送目标服务器的信息,包括:源服务器向第一网络设备发送目标服务器的信息以及第一指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器。In one possible implementation, the source server sends target server information to the first network device, including: the source server sending target server information and first instruction information to the first network device, the first instruction information being used to instruct the drone to switch from the source server to the target server.
在一种可能的实施方式中,源服务器向第一网络设备发送目标服务器的信息,包括:源服务器向第一网络设备发送目标服务器的信息以及第二指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器。In one possible implementation, the source server sends target server information to the first network device, including: the source server sending target server information and second instruction information to the first network device, the first instruction information being used to instruct the drone to switch from the source server to the target server.
在一种可能的实施方式中,源服务器向第一网络设备发送的信息中,还包括当前与源服务器的鉴权结果,比如成功或者失败。失败的鉴权结果可以用于表明无人机与源服务器当前鉴权结果失败,可以触发无人机再次发起鉴权授权流程。In one possible implementation, the information sent by the source server to the first network device also includes the current authentication result with the source server, such as success or failure. A failed authentication result can be used to indicate that the current authentication between the drone and the source server has failed, which can trigger the drone to re-initiate the authentication and authorization process.
S403,源服务器向无人机发送目标服务器的信息。具体地,可以有以下两种可选路径:S403, the source server sends the target server's information to the drone. Specifically, there are two possible paths:
a)网络层路径:源服务器将目标服务器的信息发送给第一网络设备,然后第一网络设备进一步通过网络服务操作和/或网络消息将目标服务器的信息发送给无人机。a) Network layer path: The source server sends the target server's information to the first network device, and then the first network device further sends the target server's information to the drone through network service operations and/or network messages.
应理解,源服务器将目标服务器的信息发送给第一网络设备的步骤是步骤S402,也可以是独立于步骤S402新的步骤,本发明实施例中不做限制。It should be understood that the step of the source server sending the target server's information to the first network device is step S402, or it can be a new step independent of step S402. No limitation is made in this embodiment of the invention.
在一种可能的实施方式中,第一网络设备可以通过其他中间网络设备的网络服务操作和/或网络消息将目标服务器的信息发送给无人机。In one possible implementation, the first network device can send information about the target server to the drone through network service operations and/or network messages from other intermediate network devices.
b)应用层路径:源服务器通过应用层服务操作和/或应用层消息将目标服务器的信息发送给无人机。b) Application layer path: The source server sends the target server's information to the drone through application layer service operations and/or application layer messages.
在一种可能的实施方式中,源服务器向无人机发送目标服务器的信息,包括:源服务器向无人机发送目标服务器的信息以及第一指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器。In one possible implementation, the source server sends target server information to the drone, including: the source server sending target server information and first instruction information to the drone, the first instruction information being used to instruct the drone to switch from the source server to the target server.
在一种可能的实施方式中,源服务器向无人机发送目标服务器的信息,包括:源服务器向无人机发送目标服务器的信息以及第二指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器。In one possible implementation, the source server sends information about the target server to the drone, including: the source server sending information about the target server to the drone and second instruction information, wherein the first instruction information is used to instruct the drone to switch from the source server to the target server.
在路径a)或者b)中,目标服务器的信息可以是目标服务器的地址信息和/或目标服务器为所述无人机分配的无人机标识。In path a) or b), the target server information may be the target server's address information and/or the drone identifier assigned by the target server to the drone.
应理解,图4所示的本申请实施例中,源服务器向第一网络设备和/或无人机发送目标服务器的信息(以及第一指示信息,或者/和,以及第二指示信息),这样源服务器、第一网络设备以及无人机中的一个或者多个可以创建无人机与目标服务器之间的连接,确保该对无人机的服务和管理不中断。It should be understood that in the embodiment of this application shown in Figure 4, the source server sends information about the target server (and first instruction information, or/and second instruction information) to the first network device and/or the drone, so that one or more of the source server, the first network device, and the drone can create a connection between the drone and the target server, ensuring that the service and management of the drone are not interrupted.
图5是本申请实施例提供的另一种信息传输方法的流程示意图二。Figure 5 is a flowchart illustrating another information transmission method provided in an embodiment of this application.
S501,第一网络设备获取目标服务器的信息,目标服务器的信息用于创建或者用于指示创建无人机到目标服务器之间的连接。S501, the first network device obtains information from the target server, which is used to create or instruct the creation of a connection between the drone and the target server.
应理解,第一网络设备为下列网元中的一种或者多种:接入与移动性管理功能网元、会话管理功能网元、无人机航空系统网络功能网元、网络开放功能网元。It should be understood that the first network device is one or more of the following network elements: access and mobility management function network element, session management function network element, unmanned aerial vehicle system network function network element, and network open function network element.
应理解,目标服务器是目标无人机系统服务供应商的服务器。It should be understood that the target server is the server of the target drone system service provider.
在一种可能的实施方式中,第一网络设备获取目标服务器的信息,包括:第一网络设备根据无人机的位置信息以及第一网络设备上的配置信息获取目标服务器的信息,配置信息中包括无人机的位置信息与目标服务器的信息之间的映射关系。In one possible implementation, the first network device obtains information about the target server by: the first network device obtaining information about the target server based on the location information of the drone and configuration information on the first network device, wherein the configuration information includes a mapping relationship between the location information of the drone and the information of the target server.
在一种可能的实施方式中,第一网络设备获取目标服务器的信息,包括:第一网络设备向第二设备发送第一请求,第一请求用于请求目标服务器的信息,第一请求中包括无人机的位置信息;第一网络设备从第二设备接收目标服务器的信息。In one possible implementation, the first network device obtains information from the target server by: the first network device sending a first request to a second device, the first request being used to request information from the target server, the first request including the location information of the drone; and the first network device receiving the information from the target server from the second device.
S502,第一网络设备向源服务器发送目标服务器的信息。S502, the first network device sends the target server's information to the source server.
应理解,源服务器是源无人机系统服务供应商的服务器。It should be understood that the source server is the server of the source drone system service provider.
在一种可能的实施方式中,第一网络设备向源服务器发送目标服务器的信息,包括:第一网络设备向源服务器发送目标服务器的信息以及第一指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器。In one possible implementation, the first network device sends target server information to the source server, including: the first network device sending target server information and first instruction information to the source server, the first instruction information being used to instruct the drone to switch from the source server to the target server.
在一种可能的实施方式中,第一网络设备向源服务器发送目标服务器的信息,包括:第一网络设备向源服务器发送目标服务器的信息以及第二指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器In one possible implementation, the first network device sends target server information to the source server, including: the first network device sending target server information and second instruction information to the source server, the first instruction information being used to instruct the drone to switch from the source server to the target server.
S503,第一网络设备向无人机发送目标服务器的信息。具体地,可以有以下两种可选路径:S503, the first network device sends the target server information to the drone. Specifically, there are two possible paths:
a)网络层路径:第一网络设备通过网络服务操作和/或网络消息将目标服务器的信息发送给无人机。a) Network layer path: The first network device sends the target server information to the UAV through network service operations and/or network messages.
在一种可能的实施方式中,第一网络设备可以通过其他中间网络设备的网络服务操作和/或网络消息将目标服务器的信息发送给无人机。In one possible implementation, the first network device can send information about the target server to the drone through network service operations and/or network messages from other intermediate network devices.
b)应用层路径:第一网络设备向源服务器发送目标服务器的信息,源服务器通过应用层服务操作和/或应用层消息将目标服务器的信息发送给无人机。b) Application layer path: The first network device sends the target server information to the source server, and the source server sends the target server information to the UAV through application layer service operations and/or application layer messages.
应理解,第一网络设备向源服务器发送目标服务器的信息的步骤是步骤S502,也可以是独立于步骤S502新的步骤,本发明实施例中不做限制。It should be understood that the step of the first network device sending the target server's information to the source server is step S502, or it can be a new step independent of step S502. This embodiment of the invention does not impose any restrictions.
在一种可能的实施方式中,第一网络设备向无人机发送目标服务器的信息,包括:第一网络设备向无人机发送目标服务器的信息以及第一指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器。In one possible implementation, the first network device sends target server information to the drone, including: the first network device sending target server information and first instruction information to the drone, the first instruction information being used to instruct the drone to switch from the source server to the target server.
在一种可能的实施方式中,第一网络设备向无人机发送目标服务器的信息,包括:第一网络设备向无人机发送目标服务器的信息以及第二指示信息,第一指示信息用于指示无人机从源服务器切换到目标服务器。In one possible implementation, the first network device sends target server information to the drone, including: the first network device sending target server information and second instruction information to the drone, the first instruction information being used to instruct the drone to switch from the source server to the target server.
应理解,图5所示的本申请实施例中,第一网络设备向源服务器和/或无人机发送目标服务器的信息(以及第一指示信息,或者,以及第二指示信息),这样源服务器、第一网络设备以及无人机中的一个或者多个可以创建无人机与目标服务器之间的连接,确保该对无人机的服务和管理不中断。It should be understood that in the embodiment of this application shown in Figure 5, the first network device sends information about the target server (and first instruction information, or, and second instruction information) to the source server and/or the drone, so that one or more of the source server, the first network device, and the drone can create a connection between the drone and the target server, ensuring that the service and management of the drone are not interrupted.
作为一种图4所示实施例的具体实现方式,图6是本申请实施例结合图1和图2架构示意图提供的一种信息传输方法的流程示意图三。具体地,无人机为UAV,源服务器为Source USS(即S-USS),目标服务器为Target USS(即T-USS),第一网络设备为UAS NF/NEF,中间网络设备为AMF/SMF。As a specific implementation of the embodiment shown in Figure 4, Figure 6 is a flowchart illustrating an information transmission method provided by this application embodiment in conjunction with the architectural diagrams in Figures 1 and 2. Specifically, the unmanned aerial vehicle (UAV) is a source USS (i.e., S-USS), the target USS (i.e., T-USS) is a target USS, the first network device is a UAS NF/NEF, and the intermediate network device is an AMF/SMF.
S601,S-USS为UAV获取T-USS的信息,其中,S-USS为服务于该UAV的源USS,T-USS为服务于该UAV的目标USS,T-USS的信息用于创建无人机到该T-USS之间的连接。S601, S-USS obtains information from T-USS for the UAV, where S-USS is the source USS serving the UAV, T-USS is the target USS serving the UAV, and the information from T-USS is used to create a connection between the UAV and T-USS.
应理解,S-USS可以在确定无法为UAV提供服务或者管理的情况下,获取T-USS的信息。It should be understood that the S-USS can obtain information from the T-USS if it determines that it is unable to provide services or management for the UAV.
在一种可能的实施方式中,S-USS确定无法为UAV提供服务或者管理,包括:S-USS根据UAV移出或者将要移出S-USS的服务区域确定无法为UAV提供服务或者管理,或者,S-USS根据S-USS的负载超出一定阈值确定无法为UAV提供服务或者管理。In one possible implementation, the S-USS determines that it cannot provide services or management for the UAV, including: the S-USS determines that it cannot provide services or management for the UAV based on the UAV moving out of or about to move out of the S-USS's service area, or the S-USS determines that it cannot provide services or management for the UAV based on the S-USS's load exceeding a certain threshold.
在一种可能的实施方式中,T-USS的信息为T-USSID和/或T-USS Address(例如T-USS的IP地址、端口号、协议号等信息)。值得说明的是,本发明实施例其他地方涉及USS的信息或者源无人机系统服务供应商的服务器的信息,都可以参考此处关于T-USS的信息的说明(即可以是ID,也可以是Address),不再赘述。In one possible implementation, the T-USS information is the T-USSID and/or T-USS Address (e.g., the T-USS's IP address, port number, protocol number, etc.). It is worth noting that any other instances of this invention involving USS information or information about the source UAV system service provider's server can refer to the description of T-USS information here (i.e., it can be either an ID or an Address), and will not be repeated here.
在一种可能的实施方式中,S-USS为UAV获取T-USS的信息,包括S-USS根据UAV的位置信息本地配置的USS的服务区域信息与USS的信息之间的关系,获取目标T-USS的信息。这里USS包括S-USS以及T-USS。In one possible implementation, the S-USS obtains information about the T-USS for the UAV, including obtaining information about the target T-USS by relating the service area information of the USS locally configured by the S-USS based on the UAV's location information to the information of the USS. Here, USS includes both the S-USS and the T-USS.
在一种可能的实施方式中,S-USS为UAV获取T-USS的信息,包括S-USS向第二设备发送第一请求消息,第一请求消息用于请求T-USS的信息,其中,第一请求消息中包括UAV的位置信息,进而,S-USS从第二设备接收到T-USS的信息。In one possible implementation, the S-USS obtains information from the T-USS for the UAV, including the S-USS sending a first request message to a second device. The first request message is used to request information from the T-USS, wherein the first request message includes the location information of the UAV, and then the S-USS receives the information from the T-USS from the second device.
应理解,第二设备可以是5GS的网络存储功能(network repository function,NRF)网元或者第三方管控用于USS寻址的域名服务器(domain name server,DNS)。It should be understood that the second device can be a 5GS network repository function (NRF) network element or a domain name server (DNS) managed by a third party for USS addressing.
应理解,UAV的位置信息,可以包括以下信息中的一种或者多种:UAV的小区标识(Cell ID)或者小区标识列表(Cell ID list)或者追踪区域标识(tracking area ID,TAI),UAV是否在感兴趣的区域area of interest内,感兴趣的区域可以设定为每个USS的服务区域,或者追踪区域标识列表(TAI list)或者全球定位系统(Global Positioning System,GPS)位置信息等。值得说明的是,本发明实施例其他地方涉及UAV的位置信息或者无人机的位置信息,都可以参考此处关于UAV的位置信息的说明,不再赘述。It should be understood that the location information of a UAV may include one or more of the following: the UAV's cell ID, a list of cell IDs, or a tracking area ID (TAI); whether the UAV is within the area of interest (AIO), which can be set as the service area of each USS, or a list of tracking area IDs (TAI), or GPS location information, etc. It is worth noting that any other instances of UAV location information or drone location information in embodiments of this invention can refer to the description of UAV location information herein, and will not be repeated here.
在一种可能的实施方式中,S-USS为UAV获取T-USS的信息前,S-USS获取UAV的位置信息。应理解,S-USS可以通过应用层从UAV获取UAV的位置信息,或者,S-USS触发UAV的定位流程以获取UAV的位置信息,或者,S-USS通过UAS NF/NEF向AMF订阅以获取到UAV的位置信息。In one possible implementation, the S-USS obtains the UAV's location information before the UAV obtains information from the T-USS. It should be understood that the S-USS can obtain the UAV's location information from the application layer, or the S-USS can trigger the UAV's localization process to obtain the UAV's location information, or the S-USS can subscribe to the AMF through the UAS NF/NEF to obtain the UAV's location information.
S602,S-USS向T-USS发送UAV的上下文信息。S602, S-USS sends UAV context information to T-USS.
应理解,S-USS根据T-USS的信息向T-USS发送UAV的上下文信息。It should be understood that the S-USS sends the UAV's context information to the T-USS based on the information from the T-USS.
在一种可能的实施方式中,UAV的上下文信息包括一下信息中的一种或者多种:UAV的标识信息、UAV的位置信息、UAV的开放网元NEF信息,所述无人机的鉴权结果等。In one possible implementation, the context information of the UAV includes one or more of the following: UAV identification information, UAV location information, UAV open network element (NEF) information, and the authentication result of the UAV.
应理解,UAV的标识信息包括一下信息中的一种或者多种:UAV的国际移动用户识别码(international mobile subscriber identity,IMSI)、UAV的用户永久标识(subscription permanent identifier,SUPI)、UAV的国际移动设备标识(international mobile equipment identity,IMEI)、UAV的永久设备标识(permanent equipment identifier,PEI)、UAV的一般公共订阅标识符(generic public subscription identifier,GPSI)、UAV的民航局级别的无人机的标识(civil aviation administration level UAV identification,CAA-Level UAV ID)。值得说明的是,本发明实施例其他地方涉及UAV的标识信息或者无人机的标识信息,都可以参考此处关于UAV的标识信息的说明,不再赘述。It should be understood that the identification information of a UAV includes one or more of the following: the UAV's International Mobile Subscriber Identity (IMSI), the UAV's Subscription Permanent Identifier (SUPI), the UAV's International Mobile Equipment Identity (IMEI), the UAV's Permanent Equipment Identifier (PEI), the UAV's Generic Public Subscription Identifier (GPSI), and the UAV's Civil Aviation Administration-Level UAV Identification (CAA-Level UAV ID). It is worth noting that any other instances of UAV identification information or drone identification information in the embodiments of this invention can refer to the description of UAV identification information here, and will not be repeated here.
可选的,S-USS可以向T-USS请求T-USS为无人机分配的标识信息,之后通过网络层或者应用层路径发给所述无人机。Optionally, the S-USS can request the identification information assigned to the UAV by the T-USS from the T-USS, and then send it to the UAV through a network layer or application layer path.
S603,S-USS向UAS NF/NEF发送第一通知消息,第一通知消息中携带UAV的标识以及T-USS的信息。S603, S-USS sends a first notification message to UAS NF/NEF, which carries the UAV identifier and T-USS information.
应理解,UAV的标识以及T-USS的信息用于创建UAV到该T-USS之间的连接。It should be understood that the UAV's identifier and the T-USS information are used to create a connection between the UAV and the T-USS.
在一种可能的实施方式中,S-USS在向UAS NF/NEF发送第一通知消息之前,S-USS从UAS NF/NEF接收第一订阅消息,第一订阅消息用于订阅服务于UAV的USS的变化对应的变化后的USS信息,或者,第一订阅消息用于订阅服务于UAV的USS的信息,其中,第一订阅消息中包括UAV的标识信息。In one possible implementation, before sending the first notification message to the UAS NF/NEF, the S-USS receives a first subscription message from the UAS NF/NEF. The first subscription message is used to subscribe to the changed USS information corresponding to the changes in the USS serving the UAV, or the first subscription message is used to subscribe to the information of the USS serving the UAV, wherein the first subscription message includes the identification information of the UAV.
应理解,如果第一订阅消息中仅包括一个UAV对应的标识信息情况下,第一通知消息中可以仅包括该服务于该UAV的T-USS的信息。It should be understood that if the first subscription message includes only the identification information corresponding to a UAV, the first notification message may include only the information of the T-USS serving that UAV.
S604,可选的,UAS NF/NEF保存UAV的标识以及T-USS的信息。S604, optional, UAS NF/NEF stores the UAV's identifier and T-USS information.
应理解,UAS NF/NEF保存的UAV的标识以及T-USS的信息用于创建UAV到T-USS之间的连接。It should be understood that the UAV identifier and T-USS information stored in the UAS NF/NEF are used to create a connection between the UAV and the T-USS.
在一种可能的实施方式中,UAS NF/NEF保存UAV的标识以及T-USS的信息,包括:UAS NF/NEF保存或者配置UAV的标识以及T-USS的信息之间的映射关系。In one possible implementation, the UAS NF/NEF stores the UAV's identifier and T-USS information, including: the UAS NF/NEF stores or configures the mapping relationship between the UAV's identifier and the T-USS information.
S605a,UAS NF/NEF通过SMF/AMF网元向UAV发送指示信息,指示UAV创建与T-USS之间的连接。In S605a, the UAS NF/NEF sends an instruction message to the UAV through the SMF/AMF network element, instructing the UAV to establish a connection with the T-USS.
在一种可能的实施方式中,指示信息是T-USS的信息。T-USS的信息可以是T-USS的标识信息和/或T-USS为所述无人机分配的标识信息。In one possible implementation, the indication information is T-USS information. The T-USS information may be T-USS identification information and/or identification information assigned by T-USS to the UAV.
在一种可能的实施方式中,作为一种替代的实施方式,指示信息指示UAV重新创建与USS之间的连接。应理解,在这种情况下,UAV不感知网络侧或者应用提供方关于从S-USS到T-USS的切换行为。In one possible implementation, as an alternative, the instruction message instructs the UAV to recreate the connection with the USS. It should be understood that in this case, the UAV is unaware of the network side's or application provider's actions regarding the handover from S-USS to T-USS.
在一种可能的实施方式中,UAS NF/NEF通过SMF/AMF网元向UAV发送指示信息,包括:UAS-NF/NEF可以通过SMF或者AMF的服务操作首先将该指示信息发送给SMF或者AMF,然后SMF或者AMF通过非接入层(non-access stratum,NAS)消息将指示信息发送给UAV。In one possible implementation, the UAS NF/NEF sends indication information to the UAV through the SMF/AMF network element, including: the UAS-NF/NEF can first send the indication information to the SMF or AMF through the service operation of the SMF or AMF, and then the SMF or AMF sends the indication information to the UAV through a non-access stratum (NAS) message.
S605b,S-USS通过应用层向UAV发送指示信息,指示UAV创建与T-USS之间的连接。In S605b, the S-USS sends an instruction message to the UAV through the application layer, instructing the UAV to establish a connection with the T-USS.
在一种可能的实施方式中,指示信息是T-USS的信息。In one possible implementation, the indication information is information from the T-USS.
在一种可能的实施方式中,作为一种替代的实施方式,指示信息指示UAV重新创建与USS之间的连接。应理解,在这种情况下,UAV不感知网络侧或者应用提供方关于从S-USS到T-USS的切换行为。In one possible implementation, as an alternative, the instruction message instructs the UAV to recreate the connection with the USS. It should be understood that in this case, the UAV is unaware of the network side's or application provider's actions regarding the handover from S-USS to T-USS.
S606,UAV向SMF/SMF发送NAS消息,用于创建UAV与T-USS之间的连接。其中,NAS消息中包括无人机的标识。S606, the UAV sends a NAS message to the SMF/SMF to establish a connection between the UAV and the T-USS. The NAS message includes the UAV's identifier.
S607,UAV向UAS NF/NEF发送鉴权授权消息,用于创建UAV与T-USS之间的连接。其中,鉴权授权消息中包括UAV的标识。S607, the UAV sends an authentication and authorization message to the UAS NF/NEF to establish a connection between the UAV and the T-USS. The authentication and authorization message includes the UAV's identifier.
S608,UAV NF/NEF根据无人机的标识获取服务于UAV的T-USS。S608, UAV NF/NEF obtains the T-USS serving the UAV based on the UAV's identifier.
在一种可能的实施方式中,UAV NF/NEF根据无人机的标识以及UAV NF/NEF上配置或者保存的UAV的标识与T-USS的信息之间的映射关系,确定服务于UAV的T-USS。In one possible implementation, the UAV NF/NEF determines the T-USS serving the UAV based on the UAV's identifier and the mapping relationship between the UAV's identifier and the T-USS information configured or stored on the UAV NF/NEF.
S609,UAV NF/NEF向T-USS发送鉴权授权消息,用于创建UAV到T-USS之间的连接。其中,NAS消息中包括UAV的标识。S609, the UAV NF/NEF sends an authentication and authorization message to the T-USS to establish a connection between the UAV and the T-USS. The NAS message includes the UAV's identifier.
至此,T-USS在接收到来自UAV NF/NEF的鉴权授权消息(包括UAV的标识)情况下,可以创建UAV到T-USS之间的连接,然后由T-USS服务或者管理该UAV。一种可能的实现方式中,T-USS可以通过所述无人机上报的无人机标识确认无人机的default USS,default USS可以表明为所述无人机分配无人机标识的USS。T-USS向default USS请求所述无人机的鉴权结果,可选的,带上所述无人机的标识信息。所述无人机的鉴权结果可以为成功或者失败。另一种可能的实现方式中,T-USS可以通过向S-USS请求所述无人机的鉴权结果或者从S-USS处获得的所述无人机的上下文获取所述无人机的鉴权结果。At this point, upon receiving an authentication and authorization message (including the UAV's identifier) from the UAV NF/NEF, the T-USS can establish a connection between the UAV and the T-USS, and then the T-USS can serve or manage the UAV. In one possible implementation, the T-USS can identify the UAV's default USS based on the UAV identifier reported by the UAV. The default USS can indicate the USS that assigned the UAV identifier to the UAV. The T-USS requests the authentication result of the UAV from the default USS, optionally including the UAV's identifier information. The authentication result of the UAV can be success or failure. In another possible implementation, the T-USS can obtain the UAV's authentication result by requesting it from the S-USS or by obtaining the UAV's context from the S-USS.
值得说明的是,步骤S602的执行有以下两种方式:It is worth noting that step S602 can be executed in the following two ways:
方式一、S-USS在确定好服务于UAV的T-USS的信息后主动向T-USS发送UAV的上下文信息;Method 1: After determining the information of the T-USS serving the UAV, the S-USS proactively sends the UAV's context information to the T-USS;
方式二、T-USS从UAS-NEF接收到鉴权授权消息(包括UAV的标识)后,向S-USS请求获得UAV的上下文信息。Method 2: After receiving the authentication and authorization message (including the UAV identifier) from UAS-NEF, T-USS requests the context information of the UAV from S-USS.
作为方式二的一种可选的实施方式中,T-USS从UAS NF/NEF或者S-USS或者第二设备获取S-USS的信息(ID或者Address)。As an alternative implementation of Method Two, the T-USS obtains the S-USS information (ID or Address) from the UAS NF/NEF, the S-USS, or a second device.
应理解,步骤S603、步骤S605a或者步骤S605b中,还可以包括用于指示UAV从S-USS切换到T-USS的indicator 1或者用于指示创建UAV到T-USS之间的连接的indicator 2。It should be understood that steps S603, S605a, or S605b may also include an indicator 1 for instructing the UAV to switch from the S-USS to the T-USS, or an indicator 2 for instructing the creation of a connection between the UAV and the T-USS.
应理解,图6所示的本申请实施例中,S-USS向UAS NF/NEF和/或UAV发送T-USS的信息(以及indicator 1,或者,以及indicator 2),这样S-USS、UAS NF/NEF以及UAV中的一个或者多个可以创建UAV与T-USS之间的连接,确保该对UAV的服务和管理不中断。It should be understood that in the embodiment of this application shown in Figure 6, the S-USS sends the T-USS information (and indicator 1, or indicator 2) to the UAS NF/NEF and/or UAV, so that one or more of the S-USS, UAS NF/NEF and UAV can create a connection between the UAV and the T-USS, ensuring that the service and management of the UAV are not interrupted.
作为一种图5所示实施例的具体实现方式,图7是本申请实施例结合图1和图2架构示意图提供的一种信息传输方法的流程示意图四。具体地,无人机为UAV,源服务器为Source USS(即S-USS),目标服务器为Target USS(即T-USS),第一网络设备为UAS NF/NEF,中间网络设备为AMF/SMF。As a specific implementation of the embodiment shown in Figure 5, Figure 7 is a flowchart illustrating an information transmission method provided by this application embodiment in conjunction with the architectural diagrams in Figures 1 and 2. Specifically, the unmanned aerial vehicle (UAV) is a source USS (i.e., S-USS), the target USS (i.e., T-USS) is a target USS, the first network device is a UAS NF/NEF, and the intermediate network device is an AMF/SMF.
S701,UAS NF/NEF为UAV获取T-USS的信息,其中,T-USS为服务于该UAV的目标USS,T-USS的信息用于创建无人机到该T-USS之间的连接。S701, UAS NF/NEF obtains T-USS information for the UAV, where T-USS is the target USS serving the UAV, and the T-USS information is used to create a connection between the UAV and the T-USS.
应理解,UAS NF/NEF可以在确定S-USS无法为UAV提供服务或者管理的情况下,获取T-USS的信息。It should be understood that UAS NF/NEF can obtain T-USS information if it is determined that S-USS is unable to provide services or management for UAV.
在一种可能的实施方式中,UAS NF/NEF确定S-USS无法为UAV提供服务或者管理,包括:UAS NF/NEF根据UAV移出或者将要移出S-USS的服务区域确定无法为UAV提供服务或者管理,或者,UAS NF/NEF根据S-USS的负载超出一定阈值确定无法为UAV提供服务或者管理。In one possible implementation, the UAS NF/NEF determines that the S-USS cannot provide services or management for the UAV, including: the UAS NF/NEF determines that it cannot provide services or management for the UAV based on the UAV moving out of or about to move out of the S-USS's service area, or the UAS NF/NEF determines that it cannot provide services or management for the UAV based on the S-USS's load exceeding a certain threshold.
在一种可能的实施方式中,UAS NF/NEF配置USS的信息(ID或者Address)与USS的服务区域之间的映射关系。应理解,这里USS包括S-USS和T-USS。In one possible implementation, the UAS NF/NEF configures a mapping between USS information (ID or Address) and the USS's service area. It should be understood that USS here includes S-USS and T-USS.
在一种可能的实施方式中,UAS NF/NEF向USS或者网络存储功能(network repository function,NRF)发送第二订阅消息,第二订阅消息用于订阅USS的负载信息;UAS NF、NEF从USS或者NRF接收第二响应消息,第二响应消息中包括USS的负载信息。应理解,这里USS包括S-USS和T-USS。In one possible implementation, the UAS NF/NEF sends a second subscription message to the USS or the network repository function (NRF), the second subscription message being used to subscribe to the load information of the USS; the UAS NF or NEF receives a second response message from the USS or NRF, the second response message including the load information of the USS. It should be understood that the USS here includes both S-USS and T-USS.
在一种可能的实施方式中,UAS NF/NEF为UAV获取T-USS的信息,包括UAS NF/NEF根据UAV的位置信息以及本地配置的USS的区域信息与USS的信息之间的关系,获取目标T-USS的信息。这里USS包括S-USS以及T-USS。In one possible implementation, the UAS NF/NEF obtains T-USS information for the UAV. This includes the UAS NF/NEF acquiring the target T-USS information based on the UAV's location information and the relationship between the locally configured USS area information and USS information. Here, USS includes both S-USS and T-USS.
在一种可能的实施方式中,UAS NF/NEF为UAV获取T-USS的信息,包括UAS NF/NEF向第二设备发送第一请求消息,第一请求消息用于请求T-USS的信息,其中,第一请求消息中包括UAV的位置信息,进而,UAS NF/NEF从第二设备接收到T-USS的信息。In one possible implementation, the UAS NF/NEF obtains T-USS information for the UAV, including the UAS NF/NEF sending a first request message to a second device. The first request message is used to request T-USS information, wherein the first request message includes the location information of the UAV. Then, the UAS NF/NEF receives the T-USS information from the second device.
应理解,第二设备可以是5GS的网络存储功能(network repository function,NRF)网元或者第三方管控用于USS寻址的域名服务器(domain name server,DNS)。It should be understood that the second device can be a 5GS network repository function (NRF) network element or a domain name server (DNS) managed by a third party for USS addressing.
在一种可能的实施方式中,UAS NF/NEF为UAV获取T-USS的信息前,S-USS获取UAV的位置信息。应理解,UAS NF/NEF可以通过S-USS与UAV之间的应用层从UAV获取UAV的位置信息,或者,UAS NF/NEF触发UAV的定位流程以获取UAV的位置信息,或者,S-USS向AMF订阅以获取到UAV的位置信息。In one possible implementation, the S-USS obtains the UAV's location information before the UAS NF/NEF obtains the T-USS information for the UAV. It should be understood that the UAS NF/NEF can obtain the UAV's location information from the UAV through the application layer between the S-USS and the UAV, or the UAS NF/NEF can trigger the UAV's localization process to obtain the UAV's location information, or the S-USS can subscribe to the AMF to obtain the UAV's location information.
S702,UAS NF/NEF向S-USS发送第二通知消息,第二通知消息中携带UAV的标识以及T-USS的信息。S702, UAS NF/NEF sends a second notification message to S-USS, which carries the UAV identifier and T-USS information.
应理解,UAV的标识以及T-USS的信息用于创建UAV到该T-USS之间的连接。It should be understood that the UAV's identifier and the T-USS information are used to create a connection between the UAV and the T-USS.
在一种可能的实施方式中,UAS NF/NEF在向S-USS发送第二通知消息之前,UAS NF/NEF从S-USS接收第二订阅消息,第二订阅消息用于订阅服务于UAV的USS的变化对应的变化后的USS信息,或者,第二订阅消息用于订阅服务于UAV的USS的信息,其中,第二订阅消息中包括UAV的标识信息。In one possible implementation, before sending the second notification message to the S-USS, the UAS NF/NEF receives a second subscription message from the S-USS. The second subscription message is used to subscribe to the changed USS information corresponding to the changes in the USS serving the UAV, or the second subscription message is used to subscribe to the information of the USS serving the UAV. The second subscription message includes the identification information of the UAV.
应理解,如果第二订阅消息中仅包括一个UAV对应的标识信息情况下,第二通知消息中可以仅包括该服务于该UAV的T-USS的信息。It should be understood that if the second subscription message includes only the identification information corresponding to a UAV, the second notification message may include only the information of the T-USS serving that UAV.
S703,S-USS向T-USS发送UAV的上下文信息。S703, S-USS sends UAV context information to T-USS.
应理解,S-USS根据T-USS的信息向T-USS发送UAV的上下文信息。It should be understood that the S-USS sends the UAV's context information to the T-USS based on the information from the T-USS.
在一种可能的实施方式中,UAV的上下文信息包括一下信息中的一种或者多种:UAV的标识信息、UAV的位置信息、UAV的开放网元NEF信息,所述无人机的鉴权结果等。In one possible implementation, the context information of the UAV includes one or more of the following: UAV identification information, UAV location information, UAV open network element (NEF) information, and the authentication result of the UAV.
S704a,UAS NF/NEF通过SMF/AMF网元向UAV发送指示信息,指示UAV创建与T-USS之间的连接。In S704a, the UAS NF/NEF sends an instruction message to the UAV through the SMF/AMF network element, instructing the UAV to establish a connection with the T-USS.
在一种可能的实施方式中,指示信息是T-USS的信息。T-USS的信息可以是T-USS的标识信息和/或T-USS为所述无人机分配的标识信息。In one possible implementation, the indication information is T-USS information. The T-USS information may be T-USS identification information and/or identification information assigned by T-USS to the UAV.
在一种可能的实施方式中,作为一种替代的实施方式,指示信息指示UAV重新创建与USS之间的连接。应理解,在这种情况下,UAV不感知网络侧或者应用提供方关于从S-USS到T-USS的切换行为。In one possible implementation, as an alternative, the instruction message instructs the UAV to recreate the connection with the USS. It should be understood that in this case, the UAV is unaware of the network side's or application provider's actions regarding the handover from S-USS to T-USS.
在一种可能的实施方式中,UAS NF/NEF通过SMF/AMF网元向UAV发送指示信息,包括:UAS-NF/NEF可以通过SMF或者AMF的服务操作首先将该指示信息发送给SMF或者AMF,然后SMF或者AMF通过非接入层(non-access stratum,NAS)消息将指示信息发送给UAV。In one possible implementation, the UAS NF/NEF sends indication information to the UAV through the SMF/AMF network element, including: the UAS-NF/NEF can first send the indication information to the SMF or AMF through the service operation of the SMF or AMF, and then the SMF or AMF sends the indication information to the UAV through a non-access stratum (NAS) message.
S704b,S-USS通过应用层向UAV发送指示信息,指示UAV创建与T-USS之间的连接。S704b, the S-USS sends an instruction message to the UAV through the application layer, instructing the UAV to establish a connection with the T-USS.
在一种可能的实施方式中,指示信息是T-USS的信息。T-USS的信息可以是T-USS的标识信息和/或T-USS为所述无人机分配的标识信息。In one possible implementation, the indication information is T-USS information. The T-USS information may be T-USS identification information and/or identification information assigned by T-USS to the UAV.
在一种可能的实施方式中,作为一种替代的实施方式,指示信息指示UAV重新创建与USS之间的连接。应理解,在这种情况下,UAV不感知网络侧或者应用提供方关于从S-USS到T-USS的切换行为。In one possible implementation, as an alternative, the instruction message instructs the UAV to recreate the connection with the USS. It should be understood that in this case, the UAV is unaware of the network side's or application provider's actions regarding the handover from S-USS to T-USS.
S705~S708,同图6实施例流程示意的步骤S606~609,不再赘述。Steps S705 to S708 are the same as steps S606 to 609 in the flowchart of the embodiment shown in Figure 6, and will not be described again.
至此,T-USS在接收到来自UAV NF/NEF的鉴权授权消息(包括UAV的标识)情况下,可以创建UAV到T-USS之间的连接,然后由T-USS服务或者管理该UAV。At this point, upon receiving an authentication and authorization message (including the UAV's identifier) from the UAV NF/NEF, T-USS can establish a connection between the UAV and T-USS, and then T-USS can serve or manage the UAV.
值得说明的是,步骤S703的执行有以下两种方式:It is worth noting that step S703 can be executed in the following two ways:
方式一、S-USS在确定好服务于UAV的T-USS的信息后主动向T-USS发送UAV的上下文信息;Method 1: After determining the information of the T-USS serving the UAV, the S-USS proactively sends the UAV's context information to the T-USS;
方式二、T-USS从UAS-NEF接收到鉴权授权消息(包括UAV的标识)后,向S-USS请求获得UAV的上下文信息。Method 2: After receiving the authentication and authorization message (including the UAV identifier) from UAS-NEF, T-USS requests the context information of the UAV from S-USS.
作为方式二的一种可选的实施方式中,T-USS从UAS NF/NEF或者S-USS或者第二设备获取S-USS的信息(ID或者Address)。As an alternative implementation of Method Two, the T-USS obtains the S-USS information (ID or Address) from the UAS NF/NEF, the S-USS, or a second device.
应理解,步骤S702、步骤S704a或者步骤S704b中,还可以包括用于指示UAV从S-USS切换到T-USS的indicator 1或者用于指示创建UAV到T-USS之间的连接的indicator 2。It should be understood that steps S702, S704a, or S704b may also include an indicator 1 for instructing the UAV to switch from the S-USS to the T-USS, or an indicator 2 for instructing the creation of a connection between the UAV and the T-USS.
应理解,图7所示的本申请实施例中,UAS NF/NEF向S-USS和/或UAV发送T-USS的信息(以及indicator 1,或者,以及indicator 2),这样S-USS、UAS NF/NEF以及UAV中的一个或者多个可以创建UAV与T-USS之间的连接,确保该对UAV的服务和管理不中断。It should be understood that in the embodiment of this application shown in Figure 7, the UAS NF/NEF sends information about the T-USS (and indicator 1, or indicator 2) to the S-USS and/or UAV, so that one or more of the S-USS, UAS NF/NEF and UAV can create a connection between the UAV and the T-USS, ensuring that the service and management of the UAV are not interrupted.
应理解,本发明的场景是在无人机从源服务器切换到目标服务器的场景。该发明所呈现的现有技术也可以用于无人机初次创建到服务器的连接,且该服务器可能是无人机的default服务器但不是无人机所在的服务区域对应的serving服务器场景,default服务器可以表明为所述无人机分配无人机标识的服务器。一种可能的实现方式中,无人机可以初次连接到default服务器,由default服务器判断无人机当前所在的服务区域对应的serving服务器,由default服务器发起无人机的服务器切换。另一种可能的实现方式中,当无人机的创建请求到UAS NF/NEF时,UAS NF/NEF可以通过本发明提到的方法确定无人机当前所在的服务区域对应的serving服务器,将无人机的创建/鉴权认证请求发送到无人机当前所在的服务区域对应的serving服务器。具体方法细节同上,不再细述。It should be understood that the scenario described in this invention is a situation where a drone switches from a source server to a target server. The existing technology presented in this invention can also be used for a drone's initial connection to a server, where the server may be the drone's default server but not the serving server corresponding to the drone's current service area. The default server can be the server that assigns the drone identifier to the drone. In one possible implementation, the drone can initially connect to the default server, which determines the serving server corresponding to the drone's current service area and initiates a server switch for the drone. In another possible implementation, when a drone's creation request reaches the UAS NF/NEF, the UAS NF/NEF can determine the serving server corresponding to the drone's current service area using the method mentioned in this invention and send the drone's creation/authentication request to the serving server corresponding to the drone's current service area. Specific method details are the same as above and will not be elaborated further.
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。相应的,本申请实施例还提供了通信装置,该通信装置用于实现上述各种方法。该通信装置可以为上述方法实施例中的源服务器,或者包含上述源服务器的装置,或者为可用于源服务器装置的部件;或者,该通信装置可以为上述方法实施例中的第一网络设备,或者包含上述第一网络设备的装置,或者为可用于第一网络设备的部件。可以理解,该通信装置为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。The above mainly describes the solutions provided by the embodiments of this application from the perspective of interaction between various network elements. Correspondingly, the embodiments of this application also provide a communication device for implementing the various methods described above. This communication device can be the source server in the above method embodiments, or a device containing the source server, or a component usable in the source server device; or, the communication device can be the first network device in the above method embodiments, or a device containing the first network device, or a component usable in the first network device. It is understood that, in order to achieve the above functions, the communication device includes hardware structures and/or software modules corresponding to the execution of each function. Those skilled in the art should readily recognize that, in conjunction with the units and algorithm steps of the various examples described in the embodiments disclosed herein, this application can be implemented in hardware or a combination of hardware and computer software. Whether a function is executed by hardware or by computer software driving hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of this application.
本申请实施例可以根据上述方法实施例对通信装置进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。This application embodiment can divide the communication device into functional modules according to the above method embodiment. For example, each function can be divided into a separate functional module, or two or more functions can be integrated into one processing module. The integrated module can be implemented in hardware or as a software functional module. It should be noted that the module division in this application embodiment is illustrative and only represents one logical functional division. In actual implementation, there may be other division methods.
以通信装置为上述方法实施例中的源服务器或第一网络设备为例,图8是本申请实施例提供的一种通信装置的结构示意图。如图8所示,通信装置800包括:处理模块801和收发模块802。其中,处理模块801,用于执行上述方法实施例中源服务器或第一网络设备的处理功能。收发模块802,用于执行上述方法实施例中源服务器或第一网络设备的收发功能。Taking the communication device as the source server or the first network device in the above method embodiment as an example, Figure 8 is a schematic diagram of the structure of a communication device provided in an embodiment of this application. As shown in Figure 8, the communication device 800 includes: a processing module 801 and a transceiver module 802. The processing module 801 is used to execute the processing functions of the source server or the first network device in the above method embodiment. The transceiver module 802 is used to execute the transceiver functions of the source server or the first network device in the above method embodiment.
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。All relevant content of each step involved in the above method embodiments can be referenced from the functional description of the corresponding functional module, and will not be repeated here.
由于本实施例提供的通信装置800可执行上述信息传输方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。Since the communication device 800 provided in this embodiment can execute the above information transmission method, the technical effects it can achieve can be referred to the above method embodiment, and will not be repeated here.
一种可能的设计方案中,收发模块802可以包括接收模块和发送模块(图8中未示出)。其中,收发模块用于实现通信装置800的发送功能和接收功能。In one possible design, the transceiver module 802 may include a receiving module and a transmitting module (not shown in Figure 8). The transceiver module is used to implement the transmitting and receiving functions of the communication device 800.
一种可能的设计方案中,通信装置800还可以包括存储模块(图8中未示出),该存储模块存储有程序或指令。当处理模块801执行该程序或指令时,使得通信装置800可以执行图4~图7中任一所示出的方法中源服务器,或第一网络设备的功能。In one possible design, the communication device 800 may further include a storage module (not shown in FIG8) that stores programs or instructions. When the processing module 801 executes the program or instructions, the communication device 800 can perform the functions of the source server or the first network device in any of the methods shown in FIG4 to FIG7.
应理解,通信装置800中涉及的处理模块801可以由处理器或处理器相关电路组件实现,可以为处理器或处理单元;收发模块802可以由收发器或收发器相关电路组件实现,可以为收发器或收发单元。It should be understood that the processing module 801 involved in the communication device 800 can be implemented by a processor or processor-related circuit components, and can be a processor or processing unit; the transceiver module 802 can be implemented by a transceiver or transceiver-related circuit components, and can be a transceiver or transceiver unit.
示例性地,图9为本申请实施例提供的另一种通信装置的结构示意图。该通信装置可以是源服务器或第一网络设备,也可以是可设置于源服务器或第一网络设备的芯片(系统)或其他部件或组件。如图9所示,通信装置900可以包括处理器901。一种可能的设计方案中,通信装置900还可以包括存储器902和/或收发器903。其中,处理器901与存储器902和收发器903耦合,如可以通过通信总线连接。For example, FIG9 is a schematic diagram of another communication device provided in an embodiment of this application. The communication device may be a source server or a first network device, or it may be a chip (system) or other component or assembly that can be disposed in the source server or the first network device. As shown in FIG9, the communication device 900 may include a processor 901. In one possible design, the communication device 900 may further include a memory 902 and/or a transceiver 903. The processor 901 is coupled to the memory 902 and the transceiver 903, for example, they can be connected via a communication bus.
下面结合图9对通信装置900的各个构成部件进行具体的介绍:The following section, with reference to Figure 9, provides a detailed description of each component of the communication device 900:
其中,处理器901是通信装置900的控制中心,可以是一个处理器,也可以是多个处理元件的统称。例如,处理器901是一个或多个中央处理器(central processing unit,CPU),也可以是特定集成电路(application specific integrated circuit,ASIC),或者是被配置成实施本申请实施例的一个或多个集成电路,例如:一个或多个微处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA)。The processor 901 is the control center of the communication device 900. It can be a single processor or a collective term for multiple processing elements. For example, the processor 901 can be one or more central processing units (CPUs), application-specific integrated circuits (ASICs), or one or more integrated circuits configured to implement the embodiments of this application, such as one or more digital signal processors (DSPs), or one or more field-programmable gate arrays (FPGAs).
一种可能的设计方案中,处理器901可以通过运行或执行存储在存储器902内的软件程序,以及调用存储在存储器902内的数据,执行通信装置900的各种功能。In one possible design, the processor 901 can perform various functions of the communication device 900 by running or executing software programs stored in the memory 902 and calling data stored in the memory 902.
在具体的实现中,作为一种实施例,处理器901可以包括一个或多个CPU,例如图9中所示出的CPU0和CPU1。In a specific implementation, as one example, processor 901 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG9.
在具体实现中,作为一种实施例,通信装置900也可以包括多个处理器,例如图9中所示的处理器901和处理器904。这些处理器中的每一个可以是一个单核处理器(single-CPU),也可以是一个多核处理器(multi-CPU)。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。In a specific implementation, as one embodiment, the communication device 900 may also include multiple processors, such as processors 901 and 904 shown in FIG. 9. Each of these processors may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). Here, a processor may refer to one or more devices, circuits, and/or processing cores used to process data (e.g., computer program instructions).
其中,所述存储器902用于存储执行本申请方案的软件程序,并由处理器901来控制执行,具体实现方式可以参考上述方法实施例,此处不再赘述。The memory 902 is used to store the software program that executes the solution of this application, and is controlled by the processor 901 to execute it. The specific implementation method can be referred to the above method embodiment, and will not be repeated here.
一种可能的设计方案中,存储器902可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器902可以和处理器901集成在一起,也可以独立存在,并与处理器901耦合,本申请实施例对此不作具体限定。In one possible design, the memory 902 can be a read-only memory (ROM) or other type of static storage device capable of storing static information and instructions, random access memory (RAM) or other type of dynamic storage device capable of storing information and instructions, or it can be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compressed optical discs, laser discs, optical discs, digital universal optical discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium capable of carrying or storing desired program code in the form of instructions or data structures and accessible by a computer, but is not limited thereto. The memory 902 can be integrated with the processor 901 or exist independently and coupled to the processor 901; this application embodiment does not specifically limit this.
收发器903,用于与其他通信装置之间的通信。例如,通信装置900为源服务器,收发器903可以用于与第一网络设备、或无人机等通信。又例如,通信装置900为第一网络设备,收发器903可以用于与源服务器、或无人机等通信。Transceiver 903 is used for communication with other communication devices. For example, if communication device 900 is a source server, transceiver 903 can be used to communicate with a first network device or a drone. As another example, if communication device 900 is a first network device, transceiver 903 can be used to communicate with a source server or a drone.
一种可能的设计方案中,收发器903可以包括接收器和发送器(图9中未单独示出)。其中,接收器用于实现接收功能,发送器用于实现发送功能。In one possible design, transceiver 903 may include a receiver and a transmitter (not shown separately in Figure 9). The receiver is used to implement the receiving function, and the transmitter is used to implement the transmitting function.
一种可能的设计方案中,收发器903可以是输入输出接口或接口电路,用于输入和/或输出信号。In one possible design, the transceiver 903 can be an input/output interface or interface circuit for inputting and/or outputting signals.
一种可能的设计方案中,收发器903可以和处理器901集成在一起,也可以独立存在,并与处理器901耦合,本申请实施例对此不作具体限定。In one possible design, the transceiver 903 can be integrated with the processor 901, or it can exist independently and be coupled to the processor 901. This application embodiment does not specifically limit this.
需要说明的是,图9中示出的通信装置900的结构并不构成对该通信装置的限定,实际的通信装置可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。It should be noted that the structure of the communication device 900 shown in Figure 9 does not constitute a limitation on the communication device. The actual communication device may include more or fewer components than shown, or combine certain components, or have different component arrangements.
此外,通信装置900可执行上述信息传输方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。Furthermore, the communication device 900 can execute the above-described information transmission method, and therefore the technical effects it can achieve can be referred to the above-described method embodiments, which will not be repeated here.
在一种可能的实现方式中,本申请实施例还提供了一种计算机可读存储介质,其上存储有计算机程序或指令,该计算机程序或指令被计算机执行时实现上述方法实施例的功能。In one possible implementation, this application also provides a computer-readable storage medium storing a computer program or instructions that, when executed by a computer, implement the functions of the above-described method embodiments.
在一种可能的实现方式中,本申请实施例还提供了一种计算机程序产品,该计算机程序产品被计算机执行时实现上述方法实施例的功能。In one possible implementation, this application also provides a computer program product that, when executed by a computer, implements the functions of the above-described method embodiments.
在一种可能的实现方式中,本申请实施例还提供一种通信系统,该通信系统包括上述方法实施例所述的第一网元和第二网元。In one possible implementation, this application embodiment also provides a communication system, which includes the first network element and the second network element described in the above method embodiments.
在一种可能的实现方式中,该通信系统还包括上述方法实施例所述的第三网元。In one possible implementation, the communication system further includes the third network element described in the above method embodiments.
在一种可能的实现方式中,本申请实施例还提供一种通信方法,该通信方法包括上述任一方法实施例或其任一实现方式所述的方法。In one possible implementation, this application also provides a communication method, which includes the method described in any of the above-described method embodiments or any implementation thereof.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质或者半导体介质(例如固态硬盘(solid state drive,SSD))等。In the above embodiments, implementation can be achieved, in whole or in part, through software, hardware, firmware, or any combination thereof. When implemented using software programs, implementation can be, in whole or in part, in the form of a computer program product. This computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the flow or function according to the embodiments of this application is generated. The computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another. For example, computer instructions can be transmitted from one website, computer, server, or data center to another via wired (e.g., coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium accessible to a computer or a data storage device containing one or more servers, data centers, etc., that can be integrated with the medium. The available media can be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media, or semiconductor media (e.g., solid-state drives (SSDs)).
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art will recognize that the units and algorithm steps of the various examples described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are implemented in hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art will understand that, for the sake of convenience and brevity, the specific working processes of the systems, devices, and units described above can be referred to the corresponding processes in the foregoing method embodiments, and will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods can be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative; for instance, the division of units is only a logical functional division, and in actual implementation, there may be other division methods. For example, multiple units or components may be combined or integrated into another system, or some features may be ignored or not executed. Furthermore, the coupling or direct coupling or communication connection shown or discussed may be through some interfaces; the indirect coupling or communication connection between apparatuses or units may be electrical, mechanical, or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate. The components shown as units may or may not be physical units; that is, they may be located in one place or distributed across multiple network units. Some or all of the units can be selected to achieve the purpose of this embodiment according to actual needs.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, the functional units in the various embodiments of this application can be integrated into one processing unit, or each unit can exist physically separately, or two or more units can be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the aforementioned functions are implemented as software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of this application, in essence, or the part that contributes to the prior art, or a portion of the technical solution, can be embodied in the form of a software product. This computer software product is stored in a storage medium and includes several instructions to cause a computer device (which may be a personal computer, server, or network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of this application. The aforementioned storage medium includes various media capable of storing program code, such as USB flash drives, portable hard drives, read-only memory (ROM), random access memory (RAM), magnetic disks, or optical disks.
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看附图、公开内容、以及所附权利要求书,可理解并实现公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。Although this application has been described herein in conjunction with various embodiments, those skilled in the art, by reviewing the accompanying drawings, the disclosure, and the appended claims, will understand and implement other variations of the disclosed embodiments in carrying out the claimed application. In the claims, the word "comprising" does not exclude other components or steps, and "a" or "an" does not exclude multiple instances. A single processor or other unit can implement several functions listed in the claims. While different dependent claims may recite certain measures, this does not mean that these measures cannot be combined to produce good results.
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Although this application has been described in conjunction with specific features and embodiments, it is obvious that various modifications and combinations can be made thereto without departing from the scope of this application. Accordingly, this specification and drawings are merely exemplary illustrations of the application as defined by the appended claims, and are considered to cover any and all modifications, variations, combinations, or equivalents within the scope of this application. Clearly, those skilled in the art can make various alterations and modifications to this application without departing from its scope. Thus, if such modifications and modifications fall within the scope of the claims and their equivalents, this application is also intended to include such modifications and modifications.
Claims (17)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410673934.5A CN121037931A (en) | 2024-05-27 | 2024-05-27 | Communication method and communication device |
| CN202410673934.5 | 2024-05-27 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025246824A1 true WO2025246824A1 (en) | 2025-12-04 |
Family
ID=97758800
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2025/093103 Pending WO2025246824A1 (en) | 2024-05-27 | 2025-05-07 | Communication method and communication apparatus |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN121037931A (en) |
| WO (1) | WO2025246824A1 (en) |
-
2024
- 2024-05-27 CN CN202410673934.5A patent/CN121037931A/en active Pending
-
2025
- 2025-05-07 WO PCT/CN2025/093103 patent/WO2025246824A1/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| CN121037931A (en) | 2025-11-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11095731B2 (en) | System and methods for generating a slice deployment description for a network slice instance | |
| US11601367B2 (en) | Systems and methods for dynamic network function resource allocation through the network repository function | |
| US20220277657A1 (en) | Methods and Apparatus for Enhancing Unmanned Aerial Vehicle Management Using a Wireless Network | |
| CN109891832B (en) | Network slice discovery and selection | |
| US11445515B2 (en) | Network slice selection based on requested service | |
| US20230397155A1 (en) | Height-Based Management of Wireless Device | |
| EP4072071A1 (en) | Slice control method and apparatus | |
| US20220053584A1 (en) | Method for establishing communication bearer, device, and system | |
| WO2020156126A1 (en) | Wireless communication method and communication device | |
| CN116866881A (en) | A communication method and device | |
| WO2023213177A1 (en) | Communication method and apparatus | |
| US20250193088A1 (en) | Method and apparatus for configuring artificial intelligence and machine learning traffic transport in wireless communications network | |
| KR20230115880A (en) | Communication method and apparatus for xr serice in wireless communication system | |
| CN111726240B (en) | Terminal control method, device and system | |
| WO2025246824A1 (en) | Communication method and communication apparatus | |
| US20240388909A1 (en) | Authorization method and apparatus | |
| KR20210039737A (en) | Apparatus and method for routing unmanned aerial vehicle to avoid interference in mobile communication system | |
| CN120730306A (en) | Authentication method and communication device | |
| CN121056340A (en) | Communication method and communication device | |
| WO2025201040A1 (en) | Communication method, apparatus and system | |
| WO2025124448A1 (en) | Communication method, and apparatus | |
| CN120569930A (en) | Wireless communication method and communication device | |
| WO2025180089A1 (en) | Communication method and apparatus | |
| WO2025241913A1 (en) | Session establishment method, apparatus and system | |
| TW202537331A (en) | Network-assisted daa for aerial ues |