Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and devcie for providing a secure link in a mobile communication system

A technology of mobile communication system and safety link, applied in the field of mobile communication system

Inactive Publication Date: 2004-10-13
TELEFON AB LM ERICSSON (PUBL)
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another disadvantage of the second mechanism is that in MS16, the overhead in terms of storage and processing capacity with two-level ARQ protocol is much higher than with a single ARQ protocol
This is of course not optimal, and is the main disadvantage of the third mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and devcie for providing a secure link in a mobile communication system
  • Method and devcie for providing a secure link in a mobile communication system
  • Method and devcie for providing a secure link in a mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

[0035] refer to figure 2 , where a generic protocol stack 50 is shown which will be used in this detailed description to represent specific protocols at different layers applied within a cellular mobile communication system operating in accordance with the present invention. It should be noted, however, that the invention is not limited to the use of any particular protocol on any of the different layers. For example, the L3 layer is used to represent any network protocol, such as Internet Protocol (IP). However, the L3 layer can also include framed protocols, such as the Point-to-Point Protocol (PPP), for example. The L3 layer may also include control plane protocols such as for example Radio Resource Control (RRC) as used in Universal Mobile Telecommunications System (UMTS). Thus, the L3 layer denotes any protocol used to generate Protocol Data Units (PDUs) that are passed to the next layer, in this case the L2_AR...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A technique for providing a secure link when transitioning between pairs of link layer protocol entities in a mobile communication system is disclosed. The first pair of link layer protocol entities includes a first transmitting link layer protocol entity and a first receiving link layer protocol entity. The second pair of link layer protocol entities includes a second transmitting link layer protocol entity and a second receiving link layer protocol entity. The technique is realized by first suspending data transmissions from the first transmitting link layer protocol entity to the first receiving link layer protocol entity, and then initiating data transmissions from the second transmitting link layer protocol entity to the second receiving link layer protocol entity. Unacknowledged segmented data in the first transmitting link layer protocol entity is then tunneled from the first transmitting link layer protocol entity to the first receiving link layer protocol entity through the second transmitting link layer protocol entity and the second receiving link layer protocol entity.

Description

field of invention [0001] The present invention relates generally to mobile communication systems and, more particularly, to techniques for providing secure links when transitioning from a first pair of link layer protocol entities to a second pair of link layer protocol entities in a mobile communication system. Background of the invention [0002] Referring to FIG. 1, a schematic diagram of a typical cellular mobile communication system 10 is shown. System 10 includes a core network (CN) 12 , a radio access network (RAN) 14 and a plurality of mobile stations (MS) 16 . The RAN 14 is divided into controller nodes 18 and base transceiver station (BTS) nodes 20 . Of course, RAN 14 may consist of several RANs, each RAN containing one or more controller nodes 18 and BTS nodes 20, as understood by those of ordinary skill in the art. The system architecture is like this: CN12 is connected to several controller nodes 18, each controller node 18 is connected to several BTS nodes 2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04L1/16H04L1/18H04L29/06H04L29/08H04W36/02
CPCH04L1/1874H04W36/02H04L1/1887H04L1/1835H04L1/1607H04L29/06H04L69/324H04L9/40
Inventor C·罗波尔M·约翰松R·舍德斯特伦B·拉通伊J·萨赫斯
Owner TELEFON AB LM ERICSSON (PUBL)