An application identification set configuration method, device, device and medium
A technology that uses identification and configuration methods, and is applied in the direction of safety communication devices, digital transmission systems, electrical components, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0119] The execution entity in the example is the MO configuration entity.
Embodiment 2
[0123] In this example, the network layer only needs to do the corresponding AID distribution processing, and does not need to do secondary filtering. Application layer and MIB also
[0127] The execution entity in the example is the MO configuration entity.
[0129] In this example, the network layer needs to perform secondary filtering in addition to AID distribution.
Embodiment 3
[0137] In this example, before the MIB configuration is completed, the application layer actively queries the DST configuration.
[0138] The execution entity in the example is the application layer.
[0142] If the configuration is the full set, the network layer only needs to do the work of AID distribution; if the configuration is a subset, that is
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


