Application identifier set configuration method, equipment, device and medium
A technology for applying identification and configuration methods, applied in the direction of digital transmission systems, electrical components, transmission systems, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0115] In this example, when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface so that the configurations take effect at the same time and are completely synchronized.
[0116] In the way of using V3 and V6 interfaces, MIB configuration and authorized DST set configuration are completely synchronized, and protocol configuration can be used during implementation.
[0117] The Executing Entity in the example is the MO Configuration Entity.
[0118] The MO configuration entity configures the MIB and MO at the same time, only one occurs in the carrier MIB, and the other occurs in the carrier MO, that is, the carrier is different. One uses the existing protocol process to configure MO, and the other is to configure MIB in the application management entity. Specifically, it can be realized by determining the content of DME-DSMService.request or directly configuring MIB, that is, it does not need t...
Embodiment 2
[0123] In this example, when the MO configuration entity performs configuration, the MO configuration entity configures the V3 interface and the V6 interface as follows: the configuration takes effect at the same time and the MIB AID set configured on the V6 interface is the AID corresponding to the authorized DST service set configured on the V3 interface A subset of a collection.
[0124] In the way of using V3 and V6 interfaces, MIB configuration and authorized DST set configuration are configured synchronously, and the former is a subset of the latter.
[0125] The Executing Entity in the example is the MO Configuration Entity.
[0126] The MO configuration entity configures the MIB and MO at the same time, only one occurs in the carrier MO, and the other occurs in the carrier application management entity, that is, the carrier is different. One is to configure the MO using the existing protocol process, and the other is to configure the MIB by determining the con...
Embodiment 3
[0135] In this example, before the MIB configuration is completed, the application layer actively queries the DST configuration.
[0136] The executing entity in the example is the application layer.
[0137] The application layer makes a query judgment before sending DME-DSMService.request, and sends DME-DSMService.request when certain requirements are met. At present, the protocol has no specific behavior process and principles, that is, AID service requests can be sent as needed; in some scenarios, secondary filtering is required in addition to AID distribution.
[0138] In the specific implementation, the application layer actively inquires when sending the DME-DSMService.request message, if the AID to be received belongs to the authorized V2XoverPC5 / AuthorizedV2XServiceList / / V2XServiceIdentifier set element, then send DME-DSMService.request, otherwise, give up the request, through this interaction can ensure that the AID set maintained by MIB is equal to the aut...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


