Intra-cell handover method and intra-cell handover equipment
An intra-cell handover and cell technology, applied in the field of intra-cell handover methods and devices, can solve problems such as unspecified specific procedures, and achieve the effects of avoiding re-establishment and updating of security parameters and business interruption.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0078] Example one:
[0079] The specific process is as Figure 5a Shown:
[0080] Step S01: After the terminal receives and receives a certain amount of data or repeatedly establishes and deletes bearers for a certain number of times, the base station of the serving cell initiates an intra-cell handover.
[0081] Step S02: The base station of the serving cell sends an RRC connection reconfiguration message carrying a handover command to the terminal, where the target cell carried in the handover parameter is the current cell, that is, the cell where the terminal is located before handover, and carries the updated security parameters, including Encryption and decryption keys and integrity protection keys. In particular, the handover parameter also carries the new C-RNTI allocated for the terminal but does not carry the dedicated preamble code. As shown in Table 1 below, the new C-RNTI is different from the C-RNTI used by the terminal before the handover.
[0082]
[0083]
[0084] Ta...
Example Embodiment
[0100] Embodiment two:
[0101] The specific process is as Figure 5b Shown:
[0102] Step S11: After the terminal receives and receives a certain amount of data or repeatedly establishes and deletes the bearer for a certain number of times, the base station of the serving cell initiates an intra-cell handover.
[0103] Step S12: The base station of the serving cell sends an RRC connection reconfiguration message carrying a handover command to the UE. The target cell carried in the handover parameter is the current cell, that is, the cell where the UE is before handover, and carries the updated security parameters, including Encryption and decryption keys and integrity protection keys. In particular, the handover parameter also carries the dedicated preamble code but does not carry the new C-RNTI allocated for the UE.
[0104] Step S13: The behaviors of the L2 protocol layers of the base station of the serving cell are as follows:
[0105] The PDCP layer stops sending downlink data (i...
Example Embodiment
[0117] Example three:
[0118] The specific process is as Figure 5c Shown:
[0119] Step S21: After the terminal receives and receives a certain amount of data or repeatedly establishes and deletes bearers for a certain number of times, the base station of the serving cell initiates an intra-cell handover.
[0120] Step S22: The base station of the serving cell sends an RRC connection reconfiguration message carrying a handover command to the UE. The target cell carried in the handover parameter is the current cell, that is, the cell where the UE is before handover, and carries the updated security parameters, including Encryption and decryption keys and integrity protection keys. In particular, the handover parameter also carries a dedicated preamble code and a new C-RNTI allocated for the UE.
[0121] Step S23: The behaviors of the L2 protocol layers of the base station of the serving cell are as follows:
[0122] The PDCP layer stops sending downlink data (including signaling data...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap