Method and device for deactivating ip sessions of lower priority
A priority and deactivation technology, which is applied in the direction of secure communication devices, connection management, digital transmission systems, etc., can solve problems such as unpredictable deactivation and poor user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] wireless communication system
[0021] now refer to Figure 1A , FIG. 1 shows a block diagram of an example wireless network 100 and mobile device 10 . The wireless network 100 has a first routing area 30 and a second routing area 40 . There may be other routing areas as well, but are not shown for clarity. Each routing area has at least one RNC (Radio Network Controller). In the illustrated embodiment, the first routing area 30 has a first RNC 31 and a second RNC 32 , and the second routing area has a single RNC 41 . Each RNC 31, 32, 41 is associated with the corresponding RNC Id. The first RNC 31 and the second RNC 32 of the first routing area 30 have an RNC Id 31a and an RNC Id 32a respectively, while the single RNC 41 of the second routing area 40 has an RNC Id 41a. Each cell (not shown) within the RNC is associated (via Node B) with a RAI (Routing Area Identity) in a hierarchical manner. RAI can include one or more cells and span RNCs. In some embodiments, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 