Message switching method, wireless communication system, wireless terminal device, and wireless base station device
A wireless communication system and wireless terminal technology, applied in the field of wireless base station devices, can solve the problems of wasting frequency bands, increasing delay, and long time.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 Embodiment approach
[0058] figure 2 It is a figure which shows the system configuration example of this embodiment. Wireless communication according to this embodiment is performed between a wireless base station device (BS) 100 and a plurality of wireless terminal devices (MS) 200, 200a, and 200b. MS200, 200a, 200b are located in the area where BS100 is responsible for communication. In addition, BS100 is connected to routing device 300 . The routing device 300 is connected to a plurality of BSs 100, 100a, 100b. The routing device 300 performs directional route control of data such as packet data received via the BSs 100, 100a, and 100b.
[0059] Hereinafter, taking the communication between BS100 and MS200 as an example, the communication method according to the embodiment of the present invention will be specifically described.
[0060] image 3 It is a block diagram showing the functions of a radio base station (BS). The BS 100 has an antenna 111 for transmitting and receiving wireless...
no. 2 Embodiment approach
[0200] Next, a second embodiment will be described. The second embodiment corresponds to a case where the MS transmits a message to the BS after performing some processing whose processing time cannot be predicted based on a message from the BS. That is, in the first embodiment, the delay time until preparation for transmission of a message to be transmitted by the MS and the size of the message are set in advance in the MS. However, depending on the content of processing, the delay time may not be constant. For example, if it is a PKM message, authentication information is exchanged. At this time, on the MS side, verification of validity of information contained in a message received from the BS, generation of a key, etc. may be performed, and the delay until the next message is transmitted to the BS may not be constant.
[0201] In the second embodiment, even when the delay time is not constant and preparations for message transmission cannot be completed with a predetermi...
no. 3 Embodiment approach
[0270] The third embodiment is a modified example of the first embodiment. In the third embodiment, BS 100 has default values related to the delay time and message size of the transmission message transmitted from the MS. Furthermore, as long as no unique message parameters are notified from the MS, the BS performs automatic band allocation in consideration of delay time based on default values. When a unique message parameter is notified from the MS, the BS performs automatic band allocation in consideration of delay time based on the notified message parameter.
[0271] The functions of BS and MS used to realize this processing are respectively related to image 3 , Figure 4 The first embodiment shown is the same. Among them, the processing performed by the control unit 150 of the BS 100 , the data stored in the storage unit 160 of the BS 100 , and the processing performed by the control unit 250 of the MS 200 are different. Therefore, citing image 3 , Figure 4 Th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 