Data Processing Method and Related Device

ABSTRACT

Implementations of the present application provide a data processing method and a related device. The method comprises: a user equipment receives control information from a first network node; the user equipment determines a data replication behavior of the user equipment according to the control information of the first network node and a set rule.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a 371 application of International Application No.PCT/CN2018/072248, filed on Jan. 11, 2018, which claims priority toInternational Application No. PCT/CN2017/103022, filed on Sep. 22, 2017,the entire disclosure of both of which are hereby incorporated byreference in their entireties.

TECHNICAL FIELD

The present application relates to the field of communicationtechnology, in particular to a data processing method and a relateddevice.

BACKGROUND

Under a Dual Connectivity (DC), a data duplication and transmission modeadopts a split bearer protocol architecture. For uplink and downlink, aPacket Data Convergence Protocol (PDCP) layer is located in a certainCell Group (CG), such as a Master Cell Group (MCG) or a Secondary CellGroup (SCG), and the CG is an anchor CG. The PDCP layer of a sending enddevice duplicates a PDCP Protocol Data Unit (PDU) into two same PDCPPDUs, for example, one is the PDCP PDU and the other is a DuplicatedPDCP PDU. The two PDCP PDUs pass through Radio Link Control (RLC) layersand Media Access control (MAC) layers of different CGs, and reach acorresponding MAC layer and RLC layer of a receiving end device throughan air interface respectively, and finally are converged at a PDCPlayer. When the PDCP layer detects that two PDCP PDUs are the same PDU,the PDCP layer discards one of the two PDCP PDUs and submits the otherPDU to a higher layer.

SUMMARY

Implementations of the present application provide a data processingmethod and a related device, to determine a data duplication operationof a user equipment.

In a first aspect, an implementation of the present application providesa data processing method. The method includes: a user equipment receivescontrol information from a first network node, and the user equipmentdetermines a data duplication operation of the user equipment accordingto the control information from the first network node and a set rule.

In a second aspect, an implementation of the present applicationprovides a data processing method. The method includes: a network nodesends control information to a user equipment, wherein the controlinformation is used for the user equipment to determine a dataduplication operation of the user equipment in combination with a setrule.

In a third aspect, an implementation of the present application providesa user equipment which includes a processing unit and a communicationunit. Herein the processing unit is configured to receive controlinformation from a first network node through the communication unit,and determine a data duplication operation of the user equipmentaccording to the control information from the first network node and aset rule.

In a fourth aspect, an implementation of the present applicationprovides a network node which includes a processing unit and acommunication unit. Herein the processing unit is configured to sendcontrol information to a user equipment through the communication unit,wherein the control information is used for the user equipment todetermine a data duplication operation of the user equipment incombination with a set rule.

In a fifth aspect, an implementation of the present application providesa user equipment which includes one or more processors, one or morememories, one or more transceivers, and one or more programs. The one ormore programs are stored in the one or more memories and configured tobe executed by the one or more processors. The one or more programsinclude instructions for performing acts in the method as described inthe first aspect.

In a sixth aspect, an implementation of the present application providesa network node which includes one or more processors, one or morememories, one or more transceivers, and one or more programs. The one ormore programs are stored in the one or more memories and configured tobe executed by the one or more processors. The one or more programsinclude instructions for performing acts in the method as described inthe second aspect.

In a seventh aspect, an implementation of the present applicationprovides a computer readable storage medium storing a computer programfor electronic data interchange. The computer program causes a computerto perform the method of the first aspect.

In an eighth aspect, an implementation of the present applicationprovides a computer readable storage medium storing a computer programfor electronic data interchange. The computer program causes a computerto perform the method of the second aspect.

In a ninth aspect, an implementation of the present application providesa computer program product. The computer program product includes anon-transitory computer readable storage medium storing a computerprogram, and the computer program is operable to cause a computer toperform the method of the first aspect.

In a tenth aspect, an implementation of the present application providesa computer program product. The computer program product includes anon-transitory computer readable storage medium storing a computerprogram, and the computer program is operable to cause a computer toperform the method of the second aspect.

These aspects and other aspects of the present application will be moreeasily understood from following descriptions of the implementations.

BRIEF DESCRIPTION OF DRAWINGS

To describe technical solutions of implementations of the presentapplication more clearly, accompanying drawings that need to be used indescriptions of the implementations will be briefly introduced below. Itis apparent that the accompanying drawings described below are only someimplementations of the present application. For a person of ordinaryskill in the art, other drawings may be obtained according to thesedrawings without paying an inventive effort.

FIG. 1 is a schematic diagram of a network architecture provided by animplementation of the present application.

FIG. 2 is a schematic flow chart of a data processing method provided byan implementation of the present application.

FIG. 3 is a schematic diagram of an overall structure of a MAC PDUprovided by an implementation of the present application.

FIG. 4 is a schematic structural diagram of a user equipment provided byan implementation of the present application.

FIG. 5 is a schematic structural diagram of a network node provided byan implementation of the present application.

FIG. 6 is a schematic structural diagram of another user equipmentprovided by an implementation of the present application.

FIG. 7 is a schematic structural diagram of another network nodeprovided by an implementation of the present application.

FIG. 8 is a schematic structural diagram of another user equipmentprovided by an implementation of the present application.

DETAILED DESCRIPTION

For one skilled in the art to better understand solutions of the presentapplication, technical solutions in implementations of the presentapplication will be described clearly and completely below withreference to the drawings in the implementations of the presentapplication. It is apparent that the described implementations are onlya part, but not all, of the implementations of the present application.According to the implementations of the present application, all otherimplementations obtained by a person of ordinary skill in the artwithout paying an inventive effort should fall within the protectionscope of the present application.

Details are given below respectively.

Terms “first”, “second”, “third” and “fourth”, or the like in thespecification, claims and drawings of the present application are usedto distinguish different objects and not used to describe a specificorder. In addition, terms “include” and “have” and any variationsthereof are intended to cover non-exclusive inclusion. For example, aprocess, method, system, product, or device that includes a series ofacts or units is not limited to the listed acts or units, but optionallyfurther includes acts or units that are not listed, or optionallyfurther includes other acts or units that are inherent to the process,method, product, or device.

The “implementation” mentioned in this disclosure means that aparticular feature, structure, or characteristic described incombination with the implementation may be included in at least oneimplementation of the present application. The appearance of the term invarious places of the specification does not necessarily refer to thesame implementation, nor is it an independent implementation mutuallyexclusive with other implementations or an alternative implementation.It is explicitly and implicitly understood by one skilled in the artthat implementations described in this disclosure may be combined withother implementations.

Implementations of the present application will be described below withreference to the accompanying drawings.

Refer to FIG. 1 that is a schematic diagram of a network architecturedisclosed in an implementation of the present application. As shown inFIG. 1, the network architecture includes a master network node (masternode, MN) 110 and at least one secondary network node (slave node, SN)120. Herein the master node 110 provides basic network coverage 130, andthe at least one secondary network node 120 provides relatively smallnetwork coverage 140. A user equipment (UE) 150 within both coverage ofthe network device 110 and the network device 120 can establishcommunication connections with the network device 110 and the networkdevice 120 simultaneously. Here, a case where one user equipment 150 issimultaneously connected to one master network node 110 and at least onesecondary network node 120 is referred to as Dual connectivity. In thefollowing descriptions, various implementations of the presentapplication will be described by taking the case where one userequipment 150 has a dual connectivity with one master network node 110and one secondary network node 120 as an example. However, one skilledin the art can understand that solutions described below are also fullyapplicable to the case where one user equipment has a dual connectivitywith one master network node and multiple secondary network nodes.

The user equipment (UE) is a device that provides voice and/or dataconnectivity to users, such as a handheld device or vehicle-mounteddevice with a wireless connection function. General user equipmentincludes, for example, a mobile phone, a tablet computer, a notebookcomputer, a palm computer, a mobile internet device (MID), a wearabledevice such as a smart watch, a smart bracelet, a pedometer.

The network node refers to a computer or another device connected to anetwork having an independent address and a function of transmitting orreceiving data. The network node may be a workstation, a customer,network user or personal computer, as well as a server, a printer andanother device connected to a network. Each workstation, server, userequipment and network device (which refers to a node device at a networkside, including but not limited to, an Evolved Node B (eNB), a radionetwork controller (RNC), a Node B (NB), a Base Station Controller(BSC), a Base Transceiver Station (BTS), a Home Base Station (e.g., aHome evolved NodeB, or a Home Node B, HNB), a BaseBand Unit (BBU), aMobility Management Entity (MME), and the like), i.e., devices havingtheir own unique network addresses, all are network nodes.

A data processing method provided by an implementation of the presentapplication will be described in detail below with reference to thenetwork architecture shown in FIG. 1.

In current discussion of New radio (NR), for a radio bearer configuredwith a data duplication and transmission function, the data duplicationand transmission function of the radio bearer may be dynamicallyactivated or de-activated through a Media Access Control (MAC) controlelement (CE).

For a case of dual connectivity, a master network node and a secondarynetwork node may respectively send a MAC CE to activate or de-activate adata duplication and transmission function of a certain split bearer ofa user equipment. It has been agreed that a MAC CE contains a bitmap andthe size of the bitmap is 1 byte in the current discussion of the NR.Different positions in the bitmap respectively correspond to differentbearer IDs of the user equipment. Bearers indicated by these bearer IDsare bearers configured with the data duplication and transmissionfunction. For example, bearer IDs of a user equipment are 0, 2, 3, 7, 8,10, and there is a corresponding relationship between the bitmapincluded in the MAC CE and the bearer IDs: a first bit in the bitmapcorresponds to bearer ID 0, a second bit corresponds to bearer ID 2, athird bit corresponds to bearer ID 3, and a fourth bit corresponds tobearer ID 7, a fifth bit corresponds to bearer ID 8, a sixth bitcorresponds to bearer ID 10, and a seventh bit and an eighth bit areinvalid bits. The corresponding relationship between the bitmap includedin the MAC CE and the bearer IDs is in an ascending order. Of course,the corresponding relationship between the bitmap included in the MAC CEand the bearer IDs may otherwise be in a descending order.

Since a MAC CE received by a user equipment may be issued by a masternetwork node or a secondary network node, it is possible that in aprotocol of the NR the user equipment is required to define a dataduplication operation of the user equipment according to both the MAC CEissued by the master network node and the MAC CE issued by the secondarynetwork node. When the user equipment receives Radio Resource Control(RRC) signaling, the user equipment should have an initial state. Whenthe user equipment receives a MAC CE issued by one network node but doesnot receive a MAC CE issued by the other network node, the userequipment cannot define a data duplication operation of the userequipment according to the both MAC CEs issued by the two network nodes.

To solve the above problem, refer to FIG. 2 that is a schematic flowchart of a data processing method provided by an implementation of thepresent application. The data processing method includes following actsS201 to S202.

In S201, a first network node sends control information to a userequipment.

In an implementation, a specific implementation for the first networknode to send the control information to the user equipment includes: thefirst network node sends a MAC CE to the user equipment, the MAC CEincluding the control information.

Specifically, an overall structure of a MAC PDU is shown in FIG. 3. AMAC PDU consists of a MAC header and a MAC payload. The MAC payloadconsists of MAC sub-protocol data units (MAC sub-PDUs), a MAC CE, andoptional padding bits. When the MAC header, the MAC sub-PDU and the MACCE cannot fully fill the entire MAC PDU, remaining bits in the MAC PDUneed to be filled by padding bits. There are many types of MAC CEs fortransmitting different control information of the MAC layer, such as aMAC CE for a Power Headroom Report, a MAC CE for a Buffer Status Report,and a MAC CE for sending a Timing Advance Command.

The MAC CE in the present application is used for controlling a dataduplication and transmission function of a user equipment. Animplementation for the first network node to send the MAC CE to the userequipment includes: when there is data to be sent to the user equipmentin the first network node, a PDCP layer of the first network nodeencapsulates the data to be sent into a PDCP PDU, then sends theencapsulated PDCP PDU to a RLC layer, and the RLC layer sends an RLC PDUto a MAC layer. Then the MAC layer puts control information to be sentin a MAC CE, and encapsulates the MAC CE and the data sent by the RLClayer into a MAC PDU, and then the MAC layer of the first network nodesends the encapsulated MAC PDU to the user equipment through aninterface.

In S202, the user equipment receives the control information from thefirst network node, and the user equipment determines a data duplicationoperation of the user equipment according to the control informationfrom the first network node and a set rule.

In the present application, the first network node may be a masternetwork node or a secondary network node. A second network node may be amaster network node or a secondary network node.

In an implementation, a specific implementation for the user equipmentto receive the control information from the first network node includes:the user equipment receives a MAC CE from the first network node, theMAC CE including the control information.

Specifically, the MAC layer of the user equipment receives the MAC PDUsent by the MAC layer of the first network node, and the MAC layer ofthe user equipment demultiplexes the received MAC PDU to obtain the MACCE included in the MAC PDU, that is, the MAC layer of the user equipmentobtains the control information included in the MAC CE.

In the current discussion of the NR, for a case of dual connectivity, amaster network node and a secondary network node may respectively send aMAC CE to activate or de-activate a data duplication function of acertain split bearer of a user equipment, and since the MAC CE receivedby the user equipment may be sent by the master network node or thesecondary network node, it is possible that in a protocol of the NR theuser equipment is required to define a data duplication operation of theuser equipment according to both the MAC CE sent by the master networknode and the MAC CE sent by the secondary network node. In addition, ithas been agreed that a MAC CE includes a bitmap and the size of thebitmap is 1 byte in the current discussion of the NR. If a MAC CEincludes control information, the control information may be informationin this 1 byte included in the MAC CE.

Based on the above case, assuming a first network node transmits controlinformation to a user equipment through a MAC CE. If the user equipmentcurrently only receives one MAC CE sent by one of a master network nodeand a secondary network node, then as the user equipment does notreceive a MAC CE sent by the other network node, the user equipmentcannot define a data duplication operation of the user equipmentaccording to the both MAC CEs sent by the two network nodes.

In regard to this problem, in an implementation, a specificimplementation of the present application includes: a MAC CE includescontrol information, the MAC CE includes a bitmap, the size of thebitmap is 1 byte, and the control information includes at least one bit.A specific implementation for the user equipment to determine the dataduplication operation of the user equipment according to the controlinformation from the first network node and a set rule includes: theuser equipment determines a value of bit i, wherein the bit i is one ofat least one bit included in control information which is determined bythe user equipment to be from a second network node; and the userequipment determines the data duplication operation of the userequipment according to the value of the bit i, a value of bit j and aset mapping relationship, wherein the bit j is one of at least one bitincluded in the control information from the first network node, and thebit i and the bit j satisfy at least one of the following conditions:the bit i and the bit j are of the same position in the controlinformation; the bit i and the bit j are of different positions in thecontrol information; and the bit i and the bit j correspond to a samedata bearer.

Specifically, assuming that control information from the second networknode includes 8 bits, and bit i is the 4^(th) bit of the 8 bits, andfurther assuming that control information from the first network nodeincludes 8 bits, and bit j is also the 4^(th) bit of the 8 bits, thenbit i and bit j are of the same position in the control information.

Specifically, the bit i and the bit j are of different positions in thecontrol information. For example, assuming that control information fromthe second network node includes 8 bits, and the bit i is the 4^(th) bitof the 8 bits, and further assuming that control information from thefirst network node includes 8 bits, and the bit j is the 5^(th) bit ofthe 8 bits, then the bit i and the bit j are of different positions inthe control information.

In an implementation, the set mapping relationship is a mappingrelationship among a value of one bit included in control informationfrom the first network node, a value of one bit included in controlinformation from the second network node, and a data duplicationoperation.

Herein, the set mapping relationship is shown in Table 1. The“Operation” in Table 1 may be a data duplication operation of a databearer, or a data duplication operation of a user equipment.

TABLE 1 Bit from a first Bit from a second network node network nodeOperation 1 1 Operation1 1 0 Operation2 0 1 Operation3 0 0 Operation4

Herein, Operation1, Operation2 and Operation3 are the same, and are adata duplication behavior, and Operation4 is a data non-duplicationbehavior. Alternatively, Operation2, Operation3, and Operation4 are thesame, which are the data non-duplication behavior, and Operation1 is thedata duplication behavior.

For example, it is assumed that control information from the firstnetwork node includes 8 bits, and the 8 bits of the control informationof the first network node are xx001101. Further it is assumed that afirst bit corresponds to bearer ID 0 of the user equipment, a second bitcorresponds to bearer ID 2 of the user equipment, a third bitcorresponds to bearer ID 3 of the user equipment, a fourth bitcorresponds to bearer ID 7 of the user equipment, a fifth bitcorresponds to bearer ID 8 of the user equipment, a sixth bitcorresponds to bearer ID 10 of the user equipment, and a seventh bit andan eighth bit are invalid bits. If the user equipment has already knowncontrol information from the second network node for the bearer ID 0,the bearer ID 2, the bearer ID 7 and the bearer ID 8, and in this case,the user equipment only does not know control information of the secondnetwork node for the bearer ID 3 and the bearer ID 10. In this case, theuser equipment determines values of bits corresponding to the bearer ID3 and the bearer ID 10 among bits included in the control informationfrom the second network node. For example, the user equipment determinesthat the value of the bit corresponding to the bearer ID 3 is 1, thenthe user equipment may acquire that an operation of the user equipmentfor the bearer ID 3 is the data duplication behavior according to theTable 1, and the user equipment determines that the value of the bitcorresponding to the bearer ID 10 is 0, then the user equipment mayacquire that an operation of the user equipment for the bearer ID 10 isthe data non-duplication behavior according to the Table 1.

For another example, if the user equipment receives a MAC CE sent by thefirst network node but does not receive a MAC CE sent by the secondnetwork node, the MAC CE sent by the first network node includes 1 byteinformation, and the 1 byte information is xx001101. Each bitcorresponds to one data bearer. If a first bit corresponds to bearer ID0 of the user equipment, a second bit corresponds to bearer ID 2 of theuser equipment, a third bit corresponds to bearer ID 3 of the userequipment, a fourth bit corresponds to bearer ID 7 of the userequipment, a fifth bit corresponds to bearer ID 8 of the user equipment,a sixth bit corresponds to bearer ID 10 of the user equipment, and aseventh bit and an eighth bit are invalid bits. For a data bearer ofbearer ID 0, the user equipment determines that a value of the bit forbearer ID 0 is 1 in the 1 byte information included in the MAC CE fromthe second network node. If Operation1, Operation2 and Operation3 inTable 1 are all the data duplication behavior, Operation4 is the datanon-duplication behavior. Then the user equipment may acquire that adata duplication operation for the Bearer ID 0 is the data duplicationbehavior according to Table 1, the MAC CE sent by the first networknode, and the value of the bit for Bearer ID 0 determined by the userequipment. The user equipment determines data duplication operations forother data bearers in the same way as that for bearer ID 0, which willnot be described here.

It can be seen that in the present application, in a case of dualconnectivity, when a user equipment only receives a MAC CE of onenetwork node, the user equipment determines a value of a bit included ina MAC CE sent by the other network node, then the user equipment definesa data duplication operation of the user equipment according to a valueof a bit included in the received MAC CE of the one network node, thedetermined value of a bit included in the MAC CE of the other networknode and a preset mapping relationship, thereby avoiding a situationthat the user equipment cannot determine a data duplication operationdue to reception of a MAC CE of one network node only.

In an implementation, the value of the bit i is determined based on thevalue of the bit j.

Specifically, determining the value of bit j is 1, the user equipmentdetermines the value of bit i is 1, or, determining the value of bit jis 0, the user equipment determines the value of bit i is 0.Alternatively, determining the value of bit j is 1, the user equipmentdetermines the value of bit i is 0, or determining the value of bit j is0, the user equipment determines the value of bit i is 1.

In an implementation, the value of the bit i is determined based on aconfiguration for an initial state of the data duplication through RRCsignaling.

Specifically, if the configuration for the initial state of the dataduplication through the RRC signaling is deactivation, the userequipment determines that the value of bit i is 0. If the configurationfor the initial state of the data duplication through the RRC signalingis activation, the user equipment determines that the value of bit i is1, or the like.

In an implementation, the control information includes at least one bit.Before the user equipment determines the data duplication operation ofthe user equipment according to the control information from the firstnetwork node and the set rule, the method further includes: the userequipment receives control information from the second network node; anddetermining, by the user equipment, the data duplication operation ofthe user equipment according to the control information from the firstnetwork node and the set rule, includes: the user equipment determinesthe data duplication operation of the user equipment according to avalue of bit x, a value of bit y and a set mapping relationship, whereinthe bit x is one of at least one bit included in the control informationfrom the second network node received by the user equipment, the bit yis one of at least one bit included in the control information from thefirst network node, and the bit x and the bit y satisfy at least one ofthe following conditions: the bit x and the bit y are of the sameposition in the control information; the bit x and the bit y are ofdifferent positions in the control information; and the bit x and thebit y correspond to a same data bearer.

Herein, a specific implementation of whether bit x and bit y are of thesame position in the control information may refer to the aforementionedimplementation of whether bit i and bit j are of the same position inthe control information, and will not be described here.

Specifically, in a case of dual connectivity, when the user equipmentcurrently receives a MAC CE from one network node but does not receive aMAC CE from the other network node, for this case, the user equipmentmaintains a default state indicated by RRC signaling unchanged until aMAC CE from the other network node arrives, and then the user equipmentdefines the data duplication operation of the user equipment accordingto the both MAC CEs from the two network nodes.

For example, if the user equipment receives a MAC CE sent by the firstnetwork node and a MAC CE sent by the second network node, the MAC CEsent by the first network node includes 1 byte information, and the 1byte information is xx001101; the MAC CE sent by the second network nodeincludes 1 byte information, and the 1 byte information is xx100101. Forthe MAC CE sent by the first network node, a first bit corresponds tobearer ID 0 of the user equipment, a second bit corresponds to bearer ID2 of the user equipment, a third bit corresponds to bearer ID 3 of theuser equipment, a fourth bit corresponds to bearer ID 7 of the userequipment, a fifth bit corresponds to bearer ID 8 of the user equipment,a sixth bit corresponds to bearer ID 10 of the user equipment, and aseventh bit and an eighth bit are invalid bits. For the MAC CE sent bythe second network node, a first bit corresponds to bearer ID 0 of theuser equipment, a second bit corresponds to bearer ID 2 of the userequipment, a third bit corresponds to bearer ID 3 of the user equipment,a fourth bit corresponds to bearer ID 7 of the user equipment, a fifthbit corresponds to bearer ID 8 of the user equipment, a sixth bitcorresponds to bearer ID 10 of the user equipment, and a seventh bit andan eighth bit are invalid bits. If Operation1, Operation2, andOperation3 in Table 1 are all the data duplication behavior andOperation4 is the data non-duplication behavior, then the user equipmentmay acquire that a data duplication operation for bearer ID 0 is thedata duplication behavior according to the value of the first bit of the1 byte in the MAC CE sent by the first network node, the value of thefirst bit of the 1 byte in the MAC CE sent by the second network node,and the Table 1. The user equipment determines data duplicationoperations for other data bearers in the same way as that for bearer ID0, which will not be described here.

It should be noted that the above examples are only used to explain aninventive principle of the present application and should not beconstrued as limitations.

Refer to FIG. 4 that is a user equipment provided by an implementationof the present application. The user equipment includes one or moreprocessors, one or more memories, one or more transceivers, and one ormore programs. The one or more programs are stored in the one or morememories, and configured to be executed by the one or more processors.

The one or more programs include instructions for performing thefollowing acts: receiving control information from a first network node;and determining a data duplication operation of the user equipmentaccording to the control information from the first network node and aset rule.

In an implementation, the control information includes at least one bit,in an aspect of determining the data duplication operation of the userequipment according to the control information from the first networknode and the set rule, the one or more programs include instructionsspecifically for performing the following acts: determining a value ofbit i, wherein the bit i is one of at least one bit included in controlinformation which is determined by the user equipment to be from asecond network node; and determining the data duplication operation ofthe user equipment according to the value of the bit i, a value of bit jand a set mapping relationship, wherein the bit j is one of at least onebit included in the control information from the first network node, andthe bit i and the bit j satisfy at least one of the followingconditions: the bit i and the bit j are of the same position in thecontrol information; the bit i and the bit j are of different positionsin the control information; and the bit i and the bit j correspond to asame data bearer.

In an implementation, the value of the bit i is determined based on thevalue of the bit j.

In an implementation, the value of the bit i is determined based on aconfiguration for an initial state of the data duplication through RRCsignaling.

In an implementation, the control information includes at least one bit,before determining the data duplication operation of the user equipmentaccording to the control information from the first network node and theset rule, the one or more programs further include instructions forperforming the following acts: receiving control information from thesecond network node; in an aspect of determining the data duplicationoperation of the user equipment according to the control informationfrom the first network node and the set rule, the one or more programsinclude instructions specifically for performing the following acts:determining the data duplication operation of the user equipmentaccording to a value of bit x, a value of bit y and a set mappingrelationship, wherein the bit x is one of at least one bit included inthe control information from the second network node received by theuser equipment, the bit y is one of at least one bit included in thecontrol information from the first network node, and the bit x and thebit y satisfy at least one of the following conditions: the bit x andthe bit y are of the same position in the control information; the bit xand the bit y are of different positions in the control information; andthe bit x and the bit y correspond to a same data bearer.

In an implementation, the set mapping relationship is a mappingrelationship among a value of one bit included in the controlinformation from the first network node, a value of one bit included inthe control information from the second network node, and a dataduplication operation of the user equipment.

In an implementation, the set mapping relationship is a mappingrelationship among a value of one bit included in the controlinformation from the first network node, a value of one bit included inthe control information from the second network node, and a dataduplication operation of a data bearer.

In an implementation, in an aspect of receiving the control informationfrom the first network node, the one or more programs includeinstructions specifically for performing the following acts: receiving aMAC CE from the first network node, the MAC CE including the controlinformation.

It should be noted that specific implementations of the contentdescribed in the implementation may refer to those of the above methodand will not be described herein.

Refer to FIG. 5 that is a network node provided by an implementation ofthe present application. The network node includes one or moreprocessors, one or more memories, one or more transceivers, and one ormore programs. The one or more programs are stored in the one or morememories, and configured to be executed by the one or more processors.

The one or more programs include instructions for performing thefollowing act: sending control information to a user equipment, whereinthe control information is used for the user equipment to determine adata duplication operation of the user equipment in combination with aset rule.

In an implementation, in an aspect of sending the control information tothe user equipment, the one or more programs include instructionsspecifically for performing the following act: sending a MAC CE to theuser equipment, the MAC CE including the control information.

It should be noted that specific implementations of the contentdescribed in the implementation may refer to those of the above methodand will not be described herein.

Refer to FIG. 6 that is a schematic structural diagram of a userequipment provided by an implementation of the present application. Theuser equipment includes a processing unit 601, a communication unit 602,and a storage unit 603.

The processing unit 601 is configured to receive control informationfrom a first network node through the communication unit 602; anddetermine a data duplication operation of the user equipment accordingto the control information from the first network node and a set rule.

In an implementation, the control information includes at least one bit,in an aspect of determining the data duplication operation of the userequipment according to the control information from the first networknode and the set rule, the processing unit 601 is specificallyconfigured to determine a value of bit i, wherein the bit i is one of atleast one bit included in control information which is determined by theuser equipment to be from a second network node; and determine the dataduplication operation of the user equipment according to the value ofthe bit i, a value of bit j and a set mapping relationship, wherein thebit j is one of at least one bit included in the control informationfrom the first network node, and the bit i and the bit j satisfy atleast one of the following conditions: the bit i and the bit j are ofthe same position in the control information; the bit i and the bit jare of different positions in the control information; and the bit i andthe bit j correspond to a same data bearer.

In an implementation, the value of the bit i is determined based on thevalue of the bit j.

In an implementation, the value of the bit i is determined based on aconfiguration for an initial state of the data duplication through RRCsignaling.

In an implementation, the control information includes at least one bit,the processing unit 601 is further configured to receive the controlinformation from the second network node through the communication unit.

In an aspect of determining the data duplication operation of the userequipment according to the control information from the first networknode and the set rule, the processing unit 601 is specificallyconfigured to determine the data duplication operation of the userequipment according to a value of bit x, a value of bit y and a setmapping relationship, wherein the bit x is one of at least one bitincluded in the control information from the second network nodereceived by the user equipment, the bit y is one of at least one bitincluded in the control information from the first network node, and thebit x and the bit y satisfy at least one of the following conditions:the bit x and the bit y are of the same position in the controlinformation; the bit x and the bit y are of different positions in thecontrol information; and the bit x and the bit y correspond to a samedata bearer.

In an implementation, the set mapping relationship is a mappingrelationship among a value of one bit included in the controlinformation from the first network node, a value of one bit included inthe control information from the second network node, and a dataduplication operation.

In an implementation, in an aspect of receiving the control informationfrom the first network node, the processing unit 601 is specificallyconfigured to receive a MAC CE from the first network device, the MAC CEincluding the control information.

The processing unit 601 may be a processor or a controller (e.g., theprocessing unit 601 may be a Central Processing Unit (CPU), ageneral-purpose processor, a Digital Signal Processor (DSP), AnApplication-Specific Integrated Circuit (ASIC), a Field ProgrammableGate Array (FPGA), or another programmable logic device, a transistorlogic device, a hardware component, or any combination thereof. Theprocessing unit 601 may implement or execute various illustrativelogical blocks, modules, and circuits described in combination withdisclosed contents of the present application. Or the processor may be acombination that implements computing functions, e.g., a combinationthat includes one or more microprocessors, a combination of a DSP and amicroprocessor, etc.). The communication unit 602 may be a transceiver,a transceiving circuit, a radio chip, a communication interface, etc.,and the storage unit 603 may be a memory.

When the processing unit 601 is a processor, the communication unit 602is a communication interface, and the storage unit 603 is a memory, theuser equipment involved in the implementations of the presentapplication may be the user equipment shown in FIG. 4.

Refer to FIG. 7 that is a schematic structural diagram of a network nodeprovided in the implementation. The network node includes a processingunit 701, a communication unit 702 and a storage unit 703.

The processing unit 701 is configured to send control information to auser equipment through the communication unit 702, wherein the controlinformation is used for the user equipment to determine a dataduplication operation of the user equipment in combination with a setrule.

In an implementation, in an aspect of sending the control information tothe user equipment, the processing unit 701 is specifically configuredto send a MAC CE to the user equipment, the MAC CE including the controlinformation.

The processing unit 701 may be a processor or a controller (e.g., theprocessing unit 701 may be a Central Processing Unit (CPU), ageneral-purpose processor, a Digital Signal Processor (DSP), AnApplication-Specific Integrated Circuit (ASIC), a Field ProgrammableGate Array (FPGA), or another programmable logic device, a transistorlogic device, a hardware component, or any combination thereof. Theprocessing unit 701 may implement or execute various illustrativelogical blocks, modules, and circuits described in combination withdisclosed contents of the present application. Or, the processor may bea combination that implements computing functions, e.g., a combinationthat includes one or more microprocessors, a combination of a DSP and amicroprocessor, etc.). The communication unit 702 may be a transceiver,a transceiving circuit, a radio chip, a communication interface, etc.,and the storage unit 703 may be a memory.

When the processing unit 701 is a processor, the communication unit 702is a communication interface, and the storage unit 703 is a memory, thenetwork node involved in the implementations of the present applicationmay the network node shown in FIG. 5.

A user equipment is further provided in an implementation of the presentapplication. As shown in FIG. 8, for ease of illustration, only partsrelated to implementations of the present application are shown, and thespecific technical details which are not disclosed may refer to those ofthe methods of the implementations of the present application. Anexample in which the user equipment is a mobile phone is taken fordescription.

FIG. 8 shows a block diagram of a partial structure of a mobile phonerelated to a user equipment provided by an implementation of the presentapplication. Referring to FIG. 8, the mobile phone includes parts suchas a radio frequency (RF) circuit 10, a memory 20, an input unit 30, adisplay unit 40, a sensor 50, an audio circuit 60, a wireless fidelity(WiFi) module 70, a processor 80, and a power supply 90. A personskilled in the art can understand that the structure of the mobile phoneshown in FIG. 8 does not constitute a limitation to the mobile phone,and the mobile phone may include more parts or fewer parts than thoseshown in the figure, or some parts combined, or a different partarrangement.

In the following, various composition parts of the mobile phone arespecifically described with reference to FIG. 8.

The RF circuit 10 may be configured to receive and send information.Generally, the RF circuit 10 includes, but is not limited to, anantenna, at least one amplifier, a transceiver, a coupler, a Low NoiseAmplifier (LNA), a duplexer, and the like. In addition, the RF circuit10 may further communicate with a network and another device viawireless communication. The wireless communication may use anycommunication standard or protocol, which includes, but is not limitedto, Global System for Mobile Communication (GSM), General Packet RadioService (GPRS), Code Division Multiple Access (CDMA), Wideband CodeDivision Multiple Access (WCDMA), Long Term Evolution (LTE), e-mail,Short Messaging Service (SMS), and the like.

The memory 20 may be configured to store software programs and modules,and the processor 80 runs the software programs and modules stored inthe memory 20 to perform various functional applications and dataprocessing of the mobile phone. The memory 20 may mainly include aprogram storage area and a data storage area. The program storage areamay store an operating system, an application program required for atleast one function, and the like. The data storage area may store dataor the like created according to usage of the mobile phone. In addition,the memory 20 may include a high speed random access memory, and mayfurther include a non-volatile memory, such as at least one magneticdisk storage device, a flash memory, or other volatile solid-statestorage device.

The input unit 30 may be configured to receive input digital orcharacter information, and generate key signal inputs related to usersettings and function control of the mobile terminal. Specifically, theinput unit 30 may include a fingerprint identification module componentand other input devices. The fingerprint identification module componentmay collect fingerprint data inputted by the user thereon. Other inputdevices may include, but are not limited to, one or more of a touchcontrol screen, a physical keyboard, a function key (for example, avolume control key, or a switch key), a track ball, a mouse, a joystick,and so on.

The display unit 40 may be configured to display information input bythe user or information provided for the user, and various menus of themobile phone. The display unit 40 may include a display screen 41.Optionally, the display screen 41 may be configured by adopting a LiquidCrystal Display (LCD), an Organic Light-Emitting Diode (OLED), or thelike.

The mobile phone may further include at least one sensor 50, such as anoptical sensor, a motion sensor or other sensor. Specifically, theoptical sensor may include an ambient light sensor and a proximitysensor, wherein the ambient light sensor may adjust luminance of thedisplay screen 41 according to brightness of the ambient light, and theproximity sensor may turn off the display screen 41 and/or backlightwhen the mobile phone is moved near the ear. As one type of the motionsensor, an acceleration sensor may detect magnitudes of accelerations invarious directions (generally triaxial directions), may detect themagnitude and direction of the gravity when the sensor is still, may beused in an application for identifying a gesture of a mobile phone (forexample, switching between landscape and portrait, related games, andgesture calibration of a magnetometer), and a function related tovibration identification (such as a pedometer and a tap), and the like.Other sensors, for example, a gyroscope, a barometer, a hygrometer, athermometer, and an infrared sensor, which may be further configured inthe mobile phone are not described repeatedly herein.

An audio circuit 60, a speaker 61, and a microphone 62 may provide audiointerfaces between the user and the mobile phone. The audio circuit 60converts received audio data into electrical signals, then transmits theconverted electrical signals to the speaker 61, and after that thespeaker 61 converts the converted electrical signals into sound signalsfor playing. On the other hand, the microphone 62 converts collectedsound signals into electrical signals, the electrical signals arereceived by the audio circuit 60 and converted into audio data, andafter the audio data is processed by the processor 80, the processedaudio data is sent to another mobile phone via the RF circuit 10, or theprocessed audio data is played to the memory 20 for further processing.

WiFi is a short-range wireless transmission technology. The mobile phonemay help users to send and receive e-mails, browse web pages and accessstreaming media and the like through the WiFi module 70. The WiFi module70 provides users with wireless broadband Internet access. Although FIG.8 shows the WiFi module 70, it can be understood that, the WiFi module70 is not an essential part of the mobile phone, and may be completelyomitted as required without changing the essence of the presentinvention.

The processor 80 is a control center of the mobile phone, and connectsvarious parts of the whole mobile phone by using various interfaces andcircuits. By running or executing software programs and/or modulesstored in the memory 20 and invoking data stored in the memory 20, theprocessor 80 performs various functions of the mobile phone andprocesses data, thereby performing overall monitoring on the mobilephone. Optionally, the processor 80 may include one or multipleprocessing units. Preferably, the processor 80 may integrate anapplication processor and a modulation and demodulation processor,wherein the application processor mainly processes an operating system,a user interface, an application program, and so on, and the modulationand demodulation processor mainly processes wireless communication. Itcan be understood that, the foregoing modulation and demodulationprocessor may be not integrated into the processor 80.

The mobile phone further includes the power supply 90 (such as abattery) for supplying power to various parts. Preferably, the powersupply may be logically connected to the processor 80 by using a powermanagement system, thereby implementing functions such as charging,discharging, and power consumption management through the powermanagement system.

Although not shown in the figure, the mobile phone may further include acamera, a Bluetooth module, and the like, which are not furtherdescribed herein.

In the foregoing implementations shown in FIG. 2, the flow at the userequipment in each act method may be implemented based on the structureof the mobile phone.

In the foregoing implementations shown in FIG. 6, the function of eachunit may be implemented based on the structure of the mobile phone.

An implementation of the present application further provides a computerreadable storage medium. The computer readable storage medium stores acomputer program for electronic data interchange, and the computerprogram causes a computer to perform parts or all of the acts describedfor the user equipment in the above method implementations.

An implementation of the present application further provides a computerreadable storage medium. The computer readable storage medium stores acomputer program for electronic data interchange, and the computerprogram causes a computer to perform parts or all of the acts describedfor the network node in the above method implementations.

An implementation of the present application further provides a computerprogram product. The computer program product includes a non-transitorycomputer readable storage medium storing a computer program, and thecomputer program is operable to cause a computer to perform parts or allof the acts described for the user equipment in the above methods. Thecomputer program product may be a software installation package.

An implementation of the present application further provides a computerprogram product. The computer program product includes a non-transitorycomputer readable storage medium storing a computer program, and thecomputer program is operable to cause a computer to perform parts or allof the acts described for the network node in the above methodimplementations. The computer program product may be a softwareinstallation package.

The acts of the method or algorithm described in the implementations ofthe present application may be implemented in hardware or may beimplemented by a processor executing software instructions. The softwareinstructions may be composed by corresponding software modules. Thesoftware modules may be stored in a Random Access Memory (RAM), a flashmemory, a Read Only Memory (ROM), an Erasable Programmable Read OnlyMemory (EPROM), an Electrically Erasable Programmable Read Only Memory(EEPROM), a register, a hard disk, a removable hard disk, a Compact DiscRead-Only Memory (CD-ROM), or a storage medium in any other formwell-known in the art. An example storage medium is coupled to theprocessor such that the processor can read information from the storagemedium, and write information to the storage medium. Of course, thestorage medium may be a component of the processor. The processor andthe storage medium may be located in an ASIC. In addition, the ASIC maybe located in an access network device, a target network device, or acore network device. Or, the processor and the storage medium may act asseparate components in the access network device, the target networkdevice, or the core network device.

Those skilled in the art should realize that in one or more examplesdescribed above, the functions described in the implementations of thepresent application may be implemented in whole or in parts throughsoftware, hardware, firmware, or any combination thereof. When thefunctions described in the implementations of the present applicationare implemented through software, these functions may be implemented inwhole or in parts in the form of a computer program product. Thecomputer program product includes one or more computer instructions.When the computer program instructions are loaded and executed on acomputer, the flows or functions according to the implementations of thepresent application are generated in whole or in parts. The computer maybe a general purpose computer, a special purpose computer, a computernetwork, or other programmable devices. The computer instructions may bestored in a computer-readable storage medium, or transmitted from onecomputer-readable storage medium to another computer-readable storagemedium, for example, the computer instructions may be transmitted from awebsite site, a computer, a server, or a data center to another websitesite, computer, server, or data center through a wired mode (e.g., acoaxial cable, an optical fiber, a Digital Subscriber Line (DSL)) or awireless mode (e.g., infrared radiation, radio, microwave, etc.). Thecomputer-readable storage medium may be any available medium that thecomputer can access, or a data storage device such as an integratedserver or data center that includes one or more available media. Theavailable medium may be a magnetic medium (e.g., a floppy disk, a harddisk, a magnetic tape), an optical medium (e.g., a Digital Video Disc(DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), orthe like.

The purposes, technical solutions and benefits of the implementationshave been described in details in the above specific implementations. Itshould be understood that the above is only the specific implementationsof implementations of the present application, and is not used to limitthe protection scope of implementations of the present application. Anymodification, equivalent substitution, improvement and the like, made onthe basis of technical solutions of implementations of the presentapplication shall be included in the protection scope of implementationsof the present application.

1. A method for data processing, comprising: receiving, by a userequipment, control information from a first network node; anddetermining, by the user equipment, a data duplication operation of theuser equipment according to the control information from the firstnetwork node and a set rule.
 2. The method of claim 1, wherein thecontrol information comprises at least one bit, and determining, by theuser equipment, the data duplication operation of the user equipmentaccording to the control information from the first network node and theset rule, comprises: determining, by the user equipment, a value of biti, wherein the bit i is one of at least one bit included in controlinformation which is determined by the user equipment to be from asecond network node; and determining, by the user equipment, the dataduplication operation of the user equipment according to the value ofthe bit i, a value of bit j and a set mapping relationship; wherein thebit j is one of at least one bit included in the control informationfrom the first network node, and the bit i and the bit j satisfy atleast one of the following conditions: the bit i and the bit j are ofthe same position in the control information; the bit i and the bit jare of different positions in the control information; or the bit i andthe bit j correspond to a same data bearer.
 3. The method of claim 2,wherein the value of the bit i is determined based on the value of thebit j.
 4. The method of claim 2, wherein the value of the bit i isdetermined based on a configuration for an initial state of the dataduplication through radio resource control (RRC) protocol signaling. 5.The method of claim 1, wherein the control information comprises atleast one bit, the method further comprises: receiving, by the userequipment, control information from a second network node; whereindetermining, by the user equipment, the data duplication operation ofthe user equipment according to the control information from the firstnetwork node and the set rule, comprises: determining, by the userequipment, the data duplication operation of the user equipmentaccording to a value of bit x, a value of bit y and a set mappingrelationship, wherein the bit x is one of at least one bit included inthe control information from the second network node received by theuser equipment, the bit y is one of at least one bit included in thecontrol information from the first network node, and the bit x and thebit y satisfy at least one of the following conditions: the bit x andthe bit y are of the same position in the control information the bit xand the bit y are of different positions in the control information; orthe bit x and the bit y correspond to a same data bearer.
 6. The methodof claim 2, wherein the set mapping relationship is a mappingrelationship among a value of one bit included in the controlinformation from the first network node, a value of one bit included inthe control information from the second network node, and a dataduplication operation of the user equipment.
 7. The method of claim 2,wherein the set mapping relationship is a mapping relationship among avalue of one bit included in the control information from the firstnetwork node, a value of one bit included in the control informationfrom the second network node, and a data duplication operation of a databearer.
 8. The method of claim 1, wherein receiving, by the userequipment, the control information from the first network nodecomprises: receiving, by the user equipment, a Media Access Control(MAC) Control Element (CE) from the first network node, wherein the MACCE comprises the control information. 9-10. (canceled)
 11. A userequipment comprising a processor and a communication interface; whereinthe processor is configured to receive control information from a firstnetwork node through the communication interface, and determine a dataduplication operation of the user equipment according to the controlinformation from the first network node and a set rule.
 12. The userequipment of claim 11, wherein the control information comprises atleast one bit, and the processor is specifically configured to:determine a value of bit i, wherein the bit i is one of at least one bitincluded in control information which is determined by the userequipment to be from a second network node; and determine the dataduplication operation of the user equipment according to the value ofthe bit i, a value of bit j and a set mapping relationship; wherein thebit j is one of at least one bit included in the control informationfrom the first network node, and the bit i and the bit j satisfy atleast one of the following conditions: the bit i and the bit j are ofthe same position in the control information; the bit i and the bit jare of different positions in the control information; or the bit i andthe bit j correspond to a same data bearer.
 13. The user equipment ofclaim 12, wherein the value of the bit i is determined based on thevalue of the bit j.
 14. The user equipment of claim 13, wherein thevalue of the bit i is determined based on a configuration for an initialstate of the data duplication through radio resource control (RRC)protocol signaling.
 15. The user equipment of claim 11, wherein thecontrol information comprises at least one bit, the processor is furtherconfigured to receive control information from a second network nodethrough the communication interface; in an aspect of determining thedata duplication operation of the user equipment according to thecontrol information from the first network node and the set rule, theprocessor is specifically configured to: determine the data duplicationoperation of the user equipment according to a value of bit x, a valueof bit y and a set mapping relationship, wherein the bit x is one of atleast one bit included in the control information from the secondnetwork node received by the user equipment, the bit y is one of atleast one bit included in the control information from the first networknode, and the bit x and the bit y satisfy at least one of the followingconditions: the bit x and the bit y have are of same position in thecontrol information; the bit x and the bit y are of different positionsin the control information; or the bit x and the bit y correspond to asame data bearer.
 16. A network node, comprising a processor and acommunication interface; wherein the processor is configured to sendcontrol information to a user equipment through the communicationinterface, wherein the control information is used for the userequipment to determine a data duplication operation of the userequipment in combination with a set rule. 17-20. (canceled)
 21. Themethod of claim 3, wherein the set mapping relationship is a mappingrelationship among a value of one bit included in the controlinformation from the first network node, a value of one bit included inthe control information from the second network node, and a dataduplication operation of the user equipment.
 22. The method of claim 4,wherein the set mapping relationship is a mapping relationship among avalue of one bit included in the control information from the firstnetwork node, a value of one bit included in the control informationfrom the second network node, and a data duplication operation of theuser equipment.
 23. The method of claim 5, wherein the set mappingrelationship is a mapping relationship among a value of one bit includedin the control information from the first network node, a value of onebit included in the control information from the second network node,and a data duplication operation of the user equipment.
 24. The methodof claim 3, wherein the set mapping relationship is a mappingrelationship among a value of one bit included in the controlinformation from the first network node, a value of one bit included inthe control information from the second network node, and a dataduplication operation of a data bearer.
 25. The method of claim 4,wherein the set mapping relationship is a mapping relationship among avalue of one bit included in the control information from the firstnetwork node, a value of one bit included in the control informationfrom the second network node, and a data duplication operation of a databearer.
 26. The method of claim 5, wherein the set mapping relationshipis a mapping relationship among a value of one bit included in thecontrol information from the first network node, a value of one bitincluded in the control information from the second network node, and adata duplication operation of a data bearer.