白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Transmission method and network device

專利號(hào)
US12160931B2
公開(kāi)日期
2024-12-03
申請(qǐng)人
HUAWEI TECHNOLOGIES CO., LTD.(CN Shenzhen)
發(fā)明人
Rui Wang; Mingzeng Dai; Haiyan Luo; Xiaoying Xu; Tingting Geng; Hongzhuo Zhang
IPC分類
H04W8/24; H04W24/02; H04W74/0833
技術(shù)領(lǐng)域
node,network,terminal,message,device,first,rrc,du,context,cu
地域: Guangdong

摘要

This application provides a method, includes: a first network node sends an inactivity timer of a terminal device to a second network node, the first network node receives an inactive state indication of the terminal device from the second network node, wherein the inactive state indication of the terminal device is used by the first network node to determine whether the terminal device to enter an inactive state, the first network node notifies the second network node that the terminal device enters the inactive state.

說(shuō)明書

The DU has all or some protocol layer functions of an existing base station, namely, some RRC/SDAP/PDCP/RLC/MAC/PHY protocol layer function units, for example, including some RRC functions and PDCP/RLC/MAC/PHY protocol layer functions; or including PDCP/RLC/MAC/PHY protocol layer functions; or including RLC/MAC/PHY protocol layer functions, or including some RLC/MAC/PHY functions; or including only all or some PHY functions. It should be noted that the functions of the protocol layers mentioned herein may change, and all changes fall within the protection scope of this application.

It should be understood that in this embodiment of this application, different protocol layers may be separately deployed on the first network node and the second network node. A possible implementation is: deploying at least a first protocol layer on the second network node, and deploying at least a second protocol layer and a third protocol layer on the first network node.

For example, the first protocol layer may be an RRC layer, the second protocol layer may be a MAC layer, and the third protocol layer may be a PHY layer.

It should be understood that the examples of the first protocol layer, the second protocol layer, and the third protocol layer are merely example descriptions, and should not constitute any limitation to this application. The first protocol layer and the second protocol layer may alternatively be other protocol layers defined in an existing protocol (for example, the LTE protocol) or a future protocol. This is not particularly limited in this application.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋