Unlock instant, AI-driven research and patent intelligence for your innovation.

Application identifier set configuration method, equipment, device and medium

A technology for applying identification and configuration methods, applied in the direction of digital transmission systems, electrical components, transmission systems, etc.

Active Publication Date: 2021-06-29
DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an application identification set configuration method, equipment, device and medium to solve the problem of invalid protocol maintenance in MIB AID

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application identifier set configuration method, equipment, device and medium
  • Application identifier set configuration method, equipment, device and medium
  • Application identifier set configuration method, equipment, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0115] In this example, when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface so that the configurations take effect at the same time and are completely synchronized.

[0116] In the way of using V3 and V6 interfaces, MIB configuration and authorized DST set configuration are completely synchronized, and protocol configuration can be used during implementation.

[0117] The Executing Entity in the example is the MO Configuration Entity.

[0118] The MO configuration entity configures the MIB and MO at the same time, only one occurs in the carrier MIB, and the other occurs in the carrier MO, that is, the carrier is different. One uses the existing protocol process to configure MO, and the other is to configure MIB in the application management entity. Specifically, it can be realized by determining the content of DME-DSMService.request or directly configuring MIB, that is, it does not need t...

Embodiment 2

[0123] In this example, when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface as follows: the configuration takes effect at the same time and the MIB AID set configured on the V6 interface is the AID corresponding to the authorized DST service set configured on the V3 interface A subset of a collection.

[0124] In the way of using V3 and V6 interfaces, MIB configuration and authorized DST set configuration are configured synchronously, and the former is a subset of the latter.

[0125] The Executing Entity in the example is the MO Configuration Entity.

[0126] The MO configuration entity configures the MIB and MO at the same time, only one occurs in the carrier MO, and the other occurs in the carrier application management entity, that is, the carrier is different. One is to configure the MO using the existing protocol process, and the other is to configure the MIB by determining the con...

Embodiment 3

[0135] In this example, before the MIB configuration is completed, the application layer actively queries the DST configuration.

[0136] The executing entity in the example is the application layer.

[0137] The application layer makes a query judgment before sending DME-DSMService.request, and sends DME-DSMService.request when certain requirements are met. At present, the protocol has no specific behavior process and principles, that is, AID service requests can be sent as needed; in some scenarios, secondary filtering is required in addition to AID distribution.

[0138] In the specific implementation, the application layer actively inquires when sending the DME-DSMService.request message, if the AID to be received belongs to the authorized V2XoverPC5 / AuthorizedV2XServiceList / / V2XServiceIdentifier set element, then send DME-DSMService.request, otherwise, give up the request, through this interaction can ensure that the AID set maintained by MIB is equal to the aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application identifier set configuration method, equipment, a device and a medium. The method comprises the following steps: determining an interested management information base application identifier set and an authorized destination address service set; and configuring the management information base application identifier set and the authorized destination address service set to be as follows: the management information base application identifier set is equal to an application identifier set corresponding to the authorized destination address service set, or the management information base application identifier set is a subset of the application identifier set corresponding to the authorized destination address service set. According to the invention, the management information base does not maintain an invalid application recognition entity, and the network layer and the application layer do not carry out useless entity maintenance. Furthermore, a protocol behavior, an interface configuration target and an implementation scheme are clarified aiming at the problem.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, and in particular to an application identification set configuration method, equipment, device and medium. Background technique [0002] At present, the MIB AID (Management Information Base Application Identifier; MIB: Management Information Base, master information block; AID: Application Identifier, Application Identifier) ​​set interested in the network layer and the DST (Destination Address, Destination) service set authorized by the air interface are Completely independent, in this case, although the configuration is completely flexible, its disadvantages are: [0003] The description of network layer behavior is not clear, there are some invalid protocol maintenance and increased processing complexity. Contents of the invention [0004] The invention provides an application identification set configuration method, equipment, device and medium to solve the problem o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06H04L29/08
CPCH04L41/0813H04L63/10H04L67/51H04L67/60
Inventor 冯媛王世良李丹阳
Owner DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD