Information processing method, and communication device
An information processing method and equipment technology, applied in wireless communication, connection management, electrical components, etc., can solve problems such as unclear identification of communication counterparts and communication confusion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 2
[0148] Embodiment 2 can be based on the method of Embodiment 1, except that the first context identifier or the second context identifier follows the Figure 5 rules, the specific process will not be repeated. This embodiment may include one of the following situations:
[0149] the least significant bit LSB of the part of the first network device identifier is located at the most significant bit MSB or the least significant bit LSB of the second context identifier; and / or
[0150] the least significant bit LSB of the part of the terminal identifier is located at the most significant bit MSB or the least significant bit LSB of the second context identifier; and / or
[0151] The least significant bit LSB of the first network device identifier is located at the most significant bit MSB or the least significant bit LSB of the first context identifier; and / or
[0152] The least significant bit LSB of the terminal identifier is located at the most significant bit MSB or the least ...
Embodiment 3
[0160] Embodiment 3 The indication information may be used to carry the length information of the context identifier. For the convenience of writing, the length information of the base station ID in the context identifier, or the length information of the terminal ID, or the length information of the context identifier, or the starting position of the terminal ID, or the ending position of the base station ID are collectively referred to as the context identifier character length information. The communication party can distinguish the part of the required ID in the context identifier through the length information, and then complete the function of identifying the ID. This embodiment can be applied to full context identifiers or truncated context identifiers. There is no limit to first or second here.
[0161] Embodiment 3 is similar to the method of Embodiment 1, but further includes the use of length information. The method further includes: the first network device send...
Embodiment 4
[0167] Embodiment 4 One of Embodiments 1 to 3 is applied to the connection restoration process. More specifically, this embodiment may support recovery identifiers in an inactive state.
[0168] Including but not limited to, the first context identifier or the second context identifier may be called an inactive radio network temporary identifier (I-RNTI). The identifier may include context (context) information of the inactive terminal. Or the configuration information including the first context identifier or the second context identifier is the above-mentioned I-RNTI. The first context identifier or the second context identifier may be a complete context identifier or a truncated context identifier.
[0169] Such as Figure 7 As shown, step 701 and figure 2 The step 201 is the same, and the step 703 is the same as figure 2 Step 703 is the same. Optionally, step 702 and figure 2 Step 202 is the same.
[0170] The second network device receives the second context id...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


