Data transmission processing method, user terminal, network device and system
A technology of user terminal and network equipment, applied in the field of communication, can solve the problem of high complexity of the protocol layer
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0231] For this example, the following data transmission process is illustrated as an example:
[0232] Such as Figure 4 As shown, the three-layer protocol stack structure is taken as an example for illustration. The L3 protocol layer under the three-layer protocol stack structure has a pre-segmentation function, and may also have functions such as header compression and security. Of course, header compression and security-related functions can also be extracted separately to generate a protocol layer L4 above L3, so that the protocol stack structure becomes a four-layer protocol stack. Since the four-layer protocol stack or the three-layer protocol stack does not affect the content to be protected by this patent, so here only the three-layer protocol stack structure is introduced as an example. Under the four-layer protocol layer structure, the following descriptions are also applicable.
[0233] exist Figure 4 Among them, the L3 protocol layer of the network device is ...
example 2
[0262] This example is used to illustrate the uplink data transmission process.
[0263] Such as Figure 5 As shown, the three-layer protocol stack structure is taken as an example for illustration. The L3 layer under the three-layer protocol stack structure has a segmentation function, and can also have functions such as header compression and security. Of course, header compression and security-related functions can also be extracted separately to generate a protocol layer L4 located above the L3 protocol layer, so that the protocol stack structure becomes a four-layer protocol stack. Since the four-layer protocol stack or the three-layer protocol stack does not affect the content to be protected by this patent, so here only the three-layer protocol stack structure is introduced as an example. Under the four-layer protocol layer structure, the following descriptions are also applicable.
[0264] exist Figure 5 Among them, the L3 protocol layer of the user terminal is a ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


