A method for solving configuration failure of radio resource control process

A radio resource control and configuration failure technology, applied in wireless communication, radio/inductive link selection arrangement, selection device, etc., can solve problems such as RRC process configuration failure

Inactive Publication Date: 2008-02-20
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0037] In order to solve the above technical problems, the present invention provides a method for solving the failure of RRC process configuration, which can effectively s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for solving configuration failure of radio resource control process
  • A method for solving configuration failure of radio resource control process

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] Example 1.

[0051] Fig. 3 is a safe mode control process with two consecutive successful configurations in a preferred embodiment of the present invention. In this embodiment, the IE "Ciphering ModeInfo" is included in the two consecutive safe mode command messages, and the time when the second safe mode command message arrives at the UE may be earlier than the first safe mode completion message PDU correctly receives the response. UE's time.

[0052] As shown in Figure 3, the two consecutive safe mode control procedures of the present invention include the following steps:

[0053] Step 301: RNC-L3 sends the first security mode command message to RNC-L2, which contains the IE "Ciphering Mode Info", RNC-L3 sends the security mode command message to UE-L2, and UE-L2 correctly receives the first security mode command message. After a safe mode command message PDU, upload it to UE-L3, and return the first safe mode command message PDU correctly received response to RNC-L2, RN...

Example Embodiment

[0066] Example 2.

[0067] In this embodiment, the IE "IntegrityProtection Mode Info" is included in the two consecutive safe mode command messages, and the time when the second safe mode command message arrives at the UE may be earlier than the first safe mode completion message PDU is correctly received The time the response arrives at the UE.

[0068] The processing flow of this embodiment is basically the same as the steps 301 to 306 described in Embodiment 1. the difference lies in:

[0069] 1. In this embodiment, the UE needs to modify the information element Reconfiguration in the variable INTEGRITY_PROTECTION_INFO in step 302, step 305, and step 306;

[0070] 2. In this embodiment, in steps 302 and 306, UE-L3 will perform integrity protection configuration after receiving the security mode command message.

[0071] Through the method of this embodiment, it is also possible to basically guarantee the normal progress of the two safe mode control processes.

Example Embodiment

[0072] Example 3.

[0073] In this embodiment, two consecutive security mode command messages may include IE "CipheringMode Info", or IE "Integrity Protection Mode Info", or both IE "Ciphering Mode Info" and IE "Integrity Protection Mode Info" , And the IEs contained in the two safe mode command messages have an intersection.

[0074] As mentioned above, this embodiment can include the following five situations: in the two consecutive safe mode control processes, the first safe mode command message contains the IE "Ciphering Mode Info", and the second safe mode command The message contains both IE "Ciphering Mode Info" and IE "Integrity Protection Mode Info"; or vice versa; or the first safe mode command message includes IE "Integrity Protection Mode Info", and the second safe mode command The message contains both IE "Ciphering Mode Info" and IE "Integrity Protection Mode Info"; or vice versa; or two consecutive safe mode command messages contain both IE "Ciphering Mode Info" and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method of resolving the failure allocation in wireless resource controlling process, which comprises the following steps: a) the user facility will receive the wireless resource controlling order which has safety guarantee element; b) deciding if the reshuffling element value corresponding to the condition variable is true, if it is, the user facility will stored the received wireless resource controlling process order; after the last wireless resource controlling process over, processing the stored wireless source controlling process order; c) if it not true, the user facility will process the received wireless resource controlling order directly. Said method can increase the compatibility of 3GPP agreement.

Description

technical field [0001] The invention relates to a radio resource control (RRC) process of a wideband code division multiple access (WCDMA) system, in particular to a method for solving the configuration failure of the RRC process. Background technique [0002] The WCDMA system is composed of a core network (CN), a universal mobile communication system terrestrial radio access network (UTRAN) and user equipment (UE). The main function of UTRAN is to implement functions such as system access control, mobility management, and radio resource management and control. The UTRAN includes one or more radio network subsystems (RNS) connected to the CN through the Iu interface, and one RNS may include a radio network controller (RNC) and one or more base stations Node B. [0003] The interface between UE and UTRAN is Uu interface, also called wireless interface, which uses wireless transmission technology to connect user equipment to the fixed network part of the system. The protocol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04W76/02
Inventor 龚晓东
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products