Security negotiation method and device
A security and negotiation information technology, applied in security devices, electrical components, transmission systems, etc., can solve problems such as scenarios where the separation of control plane functional entities and user plane functional entities is not applicable
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0198] figure 1 It is a schematic diagram of a communication system. Such as figure 1 As shown, the system includes: DU, a control plane (CU-Control Plane, CU-CP) of the centralized unit, and a user plane (CU-User Plane, CU-UP) of the centralized unit.
[0199] Such as figure 1 As shown, the system may be a network device system, which is composed of one CU-CP, multiple DUs, and multiple CU-UPs. Among them, CU-CP and DU can be connected through F1-C interface, between CU-UP and DU can be connected through F1-U interface, between CU-UP and CU-CP can be connected through E1 interface.
[0200] Among them, the DU covers the physical layer of baseband processing and some functions of the media access control (Media Access Control, MAC) layer / radio link control (Radio Link Control, RLC) layer. Considering the transmission resources of the Radio Remote Unit (RRU) and the DU, some physical layer functions of the DU can be moved up to the RRU. With the miniaturization of RRUs, ev...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com