专利摘要:
transfer method and terminal. the present invention describes a transfer method and a terminal. the method comprises the following steps: receiving by a terminal a transfer command, wherein the transfer command is used to indicate that the terminal is to be transferred to a target cell; execution by the terminal of a transfer process, so that it is transferred to the target cell and maintains data communication with a source cell until the success of the transfer process is determined. the present invention can reduce and even eliminate transfer downtime in mobility management, so as to achieve a seamless transfer and improve the service experience to users.
公开号:BR112012012990B1
申请号:R112012012990-2
申请日:2011-01-07
公开日:2021-08-03
发明作者:Zhongda Du;Zhongming Chein
申请人:Zte Corporation;
IPC主号:
专利说明:

Field of Invention
The present invention relates to the field of communications, and particularly to a transfer method and a terminal. Fundamentals of the Invention
Fig. 1 shows a diagram of the protocol stack between a user equipment (UE), or a so-called terminal, and an eNode-B (eNB) according to the relevant technology; as shown in Fig. 1, the protocol stack of an interface between the UE and the eNB in a long-term evolution system (LTE) is divided into a plurality of protocol layers as follows from the bottom to the top: physical layer ( PHY), media access control layer (MAC), radio link control layer (RLC), packet data convergence protocol layer (PDCP) and radio resource control layer (RRC) in that the PHY layer primarily transmits information to the MAC or higher layers via a transmission channel; MAC layer mainly provides data transmission over a logical channel and takes care of radio resource allocation in order to terminate functions such as hybrid auto-repeat request (HARQ), scheduling (SCH), priority processing and multiplexing (MUX); the RLC layer mainly provides segmentation and retransmission services for user data and control data; the PDCP layer mainly terminates data transmission to the RRC or higher user plane layer; RRC mainly finishes transmission, paging, radio resource control connection management, radio bearer control, mobility function, reporting and terminal metering control. Before the UE sends data to the eNB, the UE needs to acquire uplink synchronization with the eNB, that is, acquire time advance (TA) of the transmission time; wherein the UE achieves the above goal by a random access process that is implemented in the MAC layer.
In order to provide higher data rate for mobile subscribers, the Long Term Evolution Advance System (LTE-A) proposes a carrier aggregation (CA) technology, with a purpose to provide greater bandwidth to the UE with corresponding capacity. to improve the peak rate of the EU. In LTE, the largest downlink transmission bandwidth supported by the system is 20MHz; AC technology is aggregated by two or more component carriers (C.r.) to spread the 20MHz wide rlp handa dn tmnr.missãn mainr qua 20MHz. but not exceeding 100MHz. The interface protocol stack between the UE and the eNB is mainly reflected in the difference between the MAC layer and the PHY layer. In the PHY layer, the CC is specific, and the difference from the MAC layer can be seen by taking Fig. 2 (Figure 5.2.1-2 Layer 2 Structure for UL in 36912) as an example; at the MAC layer, for HARQ, the CC is specific; for scheduling, priority processing, and multiplexing, CC is common.
Currently, under the condition that the frequency spectrum resource is strained, there may be a phenomenon that continuous DCs in a frequency domain cannot be allocated to an operator for use; therefore, AC, whether each DC is continuous in the frequency domain or not, where continuous AC means that each DC in the frequency domain is continuous, while discontinuous AC means that each DC in the frequency domain is not continuous. . AC can be split into single-band AC and multi-frequency band AC, whether each DC is in the same frequency band or not, where single-band AC means that all DCs participating in AC are in the same frequency band. frequency, and single-band AC can be AC continuous or AC discontinuous; multi-band AC means that AC participating DCs can be from different frequency bands, and multi-frequency band AC can be discontinuous AC only. The CA-capable UE LTE-A can transmit and receive data in a plurality of CCs at the same time, while the UE LTE can only transmit and receive data in a LTE-compatible CC. Correspondingly, the transmitting and receiving equipment of the UE can be a set of baseband equipment, with a single frequency band having a bandwidth greater than 20MHz, it can also be a plurality of baseband equipment, with multiple frequency bands, each having a bandwidth less than 20MHz.
In a mobile communication system, in order to guarantee quality of service and provide good service experience to the user, when a UE establishes a connection to a network in a cell, the UE still needs to measure the signal quality of the cell in service. and adjacent cells and select an appropriate cell to perform the transfer in order to fulfill the mobility request. Fig. 3 shows a flowchart of the transfer, according to the relevant technology; as shown in Fig. 3, in the LTE system, when the UE receives a command from the network side and needs to perform the transfer (point A shown in Fig. 3), the user plane reset (including the layer reset) MAC, PDCP layer reconstruction and RLC layer reconstruction) is performed and MAC layer, PDCP layer and RLC layer settings are updated according to the transfer command, the configuration including configuring the lower layer to adopt a integrity protection algorithm and a target cell encryption algorithm, and a random access is performed on the target cell, after the random access is finished, the UE can communicate with the target cell (point B shown in Fig .3); finally, the UE sends a complete handover command to the target cell. When the UE performs the random access process on the target cell, due to the capability of the UE, the data communication between the UE and the source cell needs to be interrupted. Between point A and point B, the UE cannot communicate with the source cell or target cell normally, and this period is called the transfer interruption time, where the interruption time is the time occupied by the random access process, that is, the time from the start of random access to the end of random access.
In the CA scene, the transfer interrupt time in mobility management is required to be 10.5 milliseconds (referring to section 16.5 at 36.912, Table 16.3-1: U-plane interrupt in LTE Advance); in the current present condition, the interrupt time is between 20 milliseconds to 30 milliseconds. From the description in Table 16.5-1 in 36912, the time occupied by the random access process is a major constituent of the transfer interruption time; if the terminal transfer time is too long, the normal service of the UE would be seriously impacted. Invention Summary
The main objective of the present invention is to provide a transfer scheme, to solve the problem in the relevant technology that the normal service of the terminal is impacted due to a long transfer interruption time caused by the long time occupied by the random access process.
In order to achieve the above objective, according to an aspect of the present invention, a transfer method is provided.
The handover method according to the present invention comprises the following steps: receiving by a terminal a handover command, wherein the handover command is used to indicate that the terminal is to be handed over to a target cell; execution by the terminal of a transfer process, so that it is transferred to the target cell and maintains data communication with a source cell until the success of the transfer process is determined.
In order to achieve the above objective, according to another aspect of the present invention, a terminal is provided.
The terminal, in accordance with the present invention, comprises: a transfer module used to receive a transfer command, wherein the transfer command is used to indicate that the terminal is to be transferred to a target cell; a communication module used to perform a handover process so that it is handover to the target cell; and a first data communication module used to maintain data communication with a source cell until the success of the transfer process is determined.
By the method in which the terminal performs a transfer process of transferring itself to a target cell and maintains data communication with a source cell until the success of the transfer process is determined, the present invention solves the problem in relevant technology that the normal service of the terminal is impacted due to a long transfer interruption time caused by the long time occupied by the random access process, thereby reducing and even eliminating the transfer interruption time in mobility management, so to achieve a seamless transfer and improve the service experience for users. Brief Description of Figures
For a better understanding of this invention, the annexed figures described hereinafter are provided to form a part of the application; the schematic embodiments of this invention and description thereof are used to illustrate the present invention, but not to constitute an improper boundary of the present invention. In the attached figures:
Fig. 1 shows a diagram of the protocol stack between the UE and the eNB, according to the relevant technology;
Fig. 2 shows a structural diagram of the MAC uplink according to the relevant technology;
Fig. 3 shows a flowchart of the transfer, according to the relevant technology;
Fig. 4 shows a flowchart of a transfer method according to the embodiment of the present invention; .
Fig. 5 shows a diagram of a transfer method according to the embodiment of the present invention;
Fig. 6 shows a flow diagram with a transfer method according to the embodiment of the present invention;
Fig. 7 shows a diagram of the composition structure of the UE, according to the relevant technology;
Fig. 8 shows a diagram of the composition structure of the UE, according to the embodiment of the present invention;
Fig. 9 shows a diagram of a first preferred example, according to the embodiment of the present invention;
Fig. 10 shows a flowchart of a first preferred example, in accordance with the embodiment of the present invention;
Fig. 11 shows a diagram of a second preferred example, according to the embodiment of the present invention;
Fig. 12 shows a diagram of a third preferred example, according to the embodiment of the present invention;
Fig. 13 shows a flowchart of a third preferred example, in accordance with the embodiment of the present invention;
Fig. 14 shows a diagram of a fourth preferred example in accordance with the embodiment of the present invention;
Fig. 15 shows a diagram of a fifth preferred example, according to the embodiment of the present invention. Detailed Description of the Invention
The present invention is described in detail below with reference to the accompanying figures in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present invention may be combined if not conflicting.
According to the embodiment of the present invention, a transfer method is provided. Fig. 4 shows a flowchart of a delivery method according to the embodiment of the present invention; as shown in Fig. 4, the method comprises the following steps wherein: S402: a terminal receives a transfer command, wherein the transfer command is used to indicate that the terminal is to be transferred to the target cell. S404: the terminal performs a transfer process so that it is transferred to the target cell and maintains data communication with a source cell until the success of the transfer process is determined, where the transfer process comprises: a random access process.
Specifically, the method can be understood as: the terminal maintains data communication with the source cell prior to transfer; upon receipt of a command to transfer itself to a target cell, the terminal performs the transfer process to transfer itself to the target cell; preferably, after determining the success of transferring itself to the target cell (for example, after the random access process is complete), the terminal completes data communication with the source cell and initiates a data communication with the target cell, or the terminal first initiates data communication with the target cell and then completes data communication with the source cell.
Next, the terminal sends a complete transfer message to the target cell. The above random access process comprises one of the following: conflicted random access process and non-conflicted random access process.
In which, the step in which the terminal performs the conflicting random access process of transferring itself to the target cell comprises the following steps in which: (1) the terminal sends a random access preamble to the target cell, in that the random access preamble carries a common preamble; (2) the terminal receives a random access response message from the target cell, wherein the random access response message is TA port and/or uplink grant information; (3) the terminal sends a Message3 to the target cell, where Message 3 is a MAC layer message or a physical layer message; preferably, Message3 is a MAC layer control cell and carries a temporary cellular radio network (C-RNTI) identity of the terminal in the target cell; (4) the terminal receives a Message4 from the target cell and confirms that the random access conflict is resolved, where Message4 contains a physical layer physical downlink control channel (PDCCH) signaling, where the signaling PDCCH contains C-RNTI content of the terminal in the target cell. If the terminal receives Message4 and confirms that the conflict is resolved, the terminal considers (determines) that the transfer process is successful.
After Step (4), the method further comprises a step: the terminal sends a Messageδ to the target cell, where the Messageδ is used to indicate that the transfer is complete.
It should be noted that: the target cell is configured to send the random access response message and/or Message4 to the terminal directly or via the source cell; the terminal is configured to send Message3 to the target cell directly or via the source cell.
In which, the step in which the terminal performs the conflict-free random access process of transferring itself to the target cell comprises the following steps in which: the terminal sends a random access preamble to the target cell, wherein the preamble random access port carries a specific preamble and is a specific resource configured to the endpoint by the target cell; then, the terminal receives a random access response message sent directly by the target cell, or the terminal receives a random access response message sent by the target cell through the source cell, where the random access response message TA port and/or uplink grant information; upon receipt of the random access response message, the terminal considers (determines) that the transfer process is successful; after determining the success of the transfer process, the terminal sends the target cell a Message3 which is used to indicate that the transfer is complete.
After the terminal receives the transfer command and before the terminal determines the success of the transfer process, one or more uplink bearers and/or one or more downlink bearers update the configuration of an underlying protocol in accordance with the command. transfer and perform the random access process with the target cell.
After determining the success of the transfer process, the terminal updates the underlying protocol configuration of other bearers according to the transfer command, where other bearers refer to other bearers configured in the transfer command other than those executing bearers the random access process.
The underlying protocol above is the bearer-relative MAC layer protocol and the physical layer protocol.
After determining the success of the transfer process, the terminal updates the configuration of a layer protocol above, according to the transfer command.
The above layer protocol comprises non-bearer related PDCP, RLC and MAC layer protocols. The above layer protocol comprises non-carrier RRC layer protocol.
After determining the success of the handover process, the terminal reaches the user interface protocol reset process, where the reset comprises MAC layer reset, PDCP layer rebuild, and RLC layer rebuild.
The user interface protocol comprises PDCP, RLC and MAC layer protocols. With the above modality, the terminal is allowed to maintain data communication with the source cell even during the random access process in the target cell, thus, the transfer interruption time in mobility management can be reduced and even eliminated. Furthermore, it is defined that the time for completion of data communication between the terminal and the source cell is after the random access process is complete.
It should be noted that the data communication mentioned in the modality refers to the packet switching of the usage plane or control plane between the terminal and the eNB. The main function of the handover execution process is that the terminal obtains the uplink synchronization information in the target cell so as to initiate data communication with the target cell. Generally, the transfer execution process comprises a random access process. Since the uplink random access resource during the random access process is decided by the terminal itself, then the random access process also needs to solve the problem of identity conflict.
The above steps are illustrated below in conjunction with Fig. 5 and Fig. 6. Fig. 5 shows a diagram of a transfer method according to the embodiment of the present invention; as shown in Fig. 5, in (a) of Fig. 5, the UE receives a command to transfer itself to the target cell (e.g. cell 1) normally; in (b) of Fig. 5, the UE receives a command to transfer itself to the target cell (e.g. cell 2), and the UE immediately initiates a random access to cell 2, however, the communication between the UE and cell 1 is still maintained; in (c) of Fig. 5, the UE performs random access to cell 2 successfully, communicates with cell 2 normally, and completes communication with cell 1; then, the transfer is complete.
Fig. 6 shows a flow diagram of a transfer method according to the embodiment of the present invention; as shown in Fig. 6, the terminal performs data communication with the source cell; at point A in Fig. 6, the terminal receives a transfer command; while maintaining communication with the source cell, the terminal initiates a random access process on the target cell; after the random access process is complete, the terminal completes communication with the source cell at point B and begins communication with the target cell. The terminal also informs the target cell of a transfer complete message.
Preferably, the target cell and the source cell can be on the same eNB, they can also be on different eNBs; they can be synchronous in time or asynchronous in time; they can be in the same frequency band, they can also be in different frequency bands.
Preferably, the above steps may not be performed based on the above sequence; for example, at point B, the terminal can first initiate communication with the target cell and then break communication with the source cell.
In the relevant technology, in order to complete the transfer operation, the UE may comprise several logic modules as follows: a transfer module (including the module receiving a transfer command from the network side, simplified as HO), a measurement module (including the module receiving a network-side measurement control command and executing the measurement and measurement reporting, simplified as MM), a data communication module (the module performing packet switching of a user or control plane with the eNB, simplified as DC). Fig. 7 shows a diagram of the composition structure, according to the relevant technology; as shown in Fig. 7, in terms of protocol layer, the data communication module from the bottom to the top comprises the processing of PHY, MAC, RLC and PDCP protocol layers; obviously, the data communication module also comprises a module for performing the random access process in the MAC layer, where the MAC layer is roughly divided into SCH, MUX, RACH and HARQ.
Fig. 8 shows a diagram of the UE composition structure, according to the embodiment of the present invention; as shown in Fig. 8, in order to complete the transfer in the mode, according to the capacity of the UE, there may be more DC modules, as shown in (a) of Fig. 8. Another terminal implementation mode is as shown in (b) of Fig. 8, a random access channel module (RACH) is added in (b) of Fig. 8, wherein the RACH module is a single module separate from the DC module, it can operate on a time basis of the target cell's downlink system and can terminate the random access function including conflict or non-conflict, based on the random access process. For conflict-based random access process, the RACH module also needs to terminate the HARQ function. RACH needs a corresponding separate PHY layer. Mode transfer is described in detail below in conjunction with the modules in the terminal.
According to the embodiment of the present invention, the terminal provided comprises: a transfer module used for receiving a transfer command, wherein the transfer command is used to indicate that the terminal is to be transferred to a target cell; a communication module used to perform a transfer process of transferring itself to the target cell; a first data communication module used to maintain data communication with a source cell until the success of the transfer process is determined.
It should be noted that the communication module comprises one of the following: a RACH random access module, a second data communication module.
Preferably, when the transfer process is a random access process, the first data communication module is additionally used to complete data communication with the source cell, after the communication module completes the random access process of transferring the itself to the target cell.
Preferably, the second communication module is further used to initiate a data communication with the target cell after or before the first data communication module completes data communication with the source cell, and sends a transfer complete message. to the target cell when determining the success of the transfer process after or before the first communication module completes data communication with the source cell.
Preferably, when performing the random access process with conflicts of transferring itself to the target cell, the data communication module is further used to send to the target cell a random access preamble bearing a common preamble code, receive from the target cell a TA port random access response message and/or uplink grant information, send to the target cell a Message3 which is a MAC layer message or a physical layer and port message a C-RNTI from the terminal in the target cell, receiving from the target cell a Message4 and confirming that the random access conflict is resolved, where Message4 is a MAC layer message or a physical layer message and contains the physical layer physical downlink control channel (PDCCH) signaling that contains the contents of the terminal C-RNTI in the target cell; after the terminal receives Message4 and confirms that the conflict is resolved, the terminal considers (determines) that the transfer process is successful, and sends the target cell a Message which is used to indicate that the transfer process is complete .
Preferably, when performing the conflict-free random access process of transferring itself to the target cell, the communication module is additionally used to send to the target cell a random access preamble that carries a specific preamble that is a specific configured resource to the terminal by the target cell, receive the random access response message sent by the target cell directly or receive the random access response message sent by the target cell through the source cell, where the access response message random TA port and/or uplink grant information; after the terminal receives the random access response message, the terminal considers (determines) that the transfer process is successful, and sends the target cell a Message3 which is used to indicate that the transfer is complete.
After the transfer module receives the transfer command and before the transfer process succeeds, the communication module has one or more uplink bearers and/or one or more downlink bearers updating the underlying protocol configuration in accordance with the transfer command and performing the random access process with the target cell, where the underlying protocol is the bearer MAC layer protocol and the physical layer protocol.
After the successful transfer process, the communication module is additionally used to update the underlying protocol configuration of other bearers according to the transfer command, where other bearers refer to the other bearers configured in the transfer command that not the holders running the random access process; the underlying protocol is the bearer-related MAC layer protocol and the physical layer protocol.
After the transfer process is successful, the communication module is additionally used to update the configuration of the layer protocol above, according to the transfer command, where the layer protocol above comprises PDCP, RLC and MAC layer protocols not relating to the bearer.
Preferred examples of the embodiment are described in detail below in conjunction with the attached figures. In the preferred examples below, each CC is either synchronous or asynchronous in the LTE-A cell; the source cell carrier and the target cell carrier in LTE or LTE-A are synchronous or asynchronous; the source cell and the target cell of the LTE or LTE-A are on the same eNB, or different eNBs, where the processing is the same. Preferred Example 1
Fig. 9 shows a diagram of a first preferred example, according to the embodiment of the present invention; as shown in Fig. 9, cell 1 is the LTE cell and supports a CC1 which is located in frequency band 1; cell 2 is LTE cell, where cell 2 is an adjacent cell of cell 1 and supports a CC2 which is located in frequency band 1. The transmitting equipment and receiving equipment of the UE are a set of equipment. baseband, which has a single-band frequency with bandwidth less than 20MHz, a first data communication module and a RACH module have a corresponding PHY layer; cell 1 belongs to eNB 1 cell 2 belongs to eNB 2.
Fig. 10 shows a flowchart of a first preferred example, in accordance with the embodiment of the present invention; the example flow is described below in conjunction with Fig. 10.
The current UE is in a connection state in cell 1. The network side transmits to the UE a measurement layer (modification control) of a triggering event (A3) where the adjacent cell has better quality of service than the cell in service, where the carrier frequency of the measured object is CC2.
The UE performs the measurement, finds that the CC2 of cell 2 meets the triggering condition of event A3 and sends the measurement report to the network side.
The network side decides to allow the UE to transfer to cell 2 (handover decision), and sends a handover prepare command (handover request) to cell 2.
After receiving the transfer prepare command, cell 2 allocates a preamble that is included in the transfer command (transfer request ACK) to be sent to cell 1, wherein the transfer command additionally includes the C-RNTI, allocated by cell 2, of the terminal in cell 2, the information of cell 2 (e.g. including CC2 and the relative information of CC2, other information of cell 2), then cell 1 forwards the transfer command to the UE (RRC reset (transfer)).
After the UE receives the transfer command, the RACH module and the corresponding physical layer update the configuration of the underlying protocol, according to the transfer command request, and perform the random access process with cell 2; that is, the RACH module of the terminal sends a random access preamble (Messageml) to cell 2 through the corresponding physical layer, where Messagel contains the specific preamble provided by cell 2; the specific preamble is a specific resource configured for the terminal by cell 2.
After receiving the Messagel, the cell 2 reserves resource for the UE and returns a Message2 to the UE, the Message2 including TA and/or grant information transmitted by the UE in uplink (UL grant).
After the UE receives the Message2, the function execution of the RACH module is completed, the conflict-free random access process performed in the cell 2 is terminated, the UE obtains downlink synchronization with the cell 2 and the TA considers that the transfer is successful, achieves user interface protocol reset process, reset including MAC layer reset, PDCP layer rebuild and RLC layer rebuild, updates carrier-related MAC and PHY layer settings of the first data communication module and updates the settings of the RRC, PDCP, RLC and MAC layer protocols, according to the transfer command, the configuration including configuring the lower layer to adopt an integrity protection algorithm and an integrity protection algorithm. cell 2 encryption, initiates communication with cell 2, sends cell 2 a Message3 (full HO) which is used to indicate that the transfer is complete. eta then cell 2 notifies the core network to perform path switching and the first data communication module completes communication with cell 1. Preferred Example 2
Fig. 11 shows a diagram of a second preferred example, according to the embodiment of the present invention; as shown in Fig. 11, cell 1 is the LTE cell and supports a CC1 which is located in frequency band 1; cell 2 is cell LTE-A, where cell 2 is a cell adjacent to cell 1 and supports the aggregation of two CCs, i.e. CC3 and CC4, both of which are located in frequency band 1 and they are continuous. The transmitting equipment and receiving equipment of the UE are a set of baseband equipment having a single frequency band with a bandwidth of 40MHz, a first data communication module, a RACH module having a layer corresponding PHY; cell 1 belongs to eNB 1 and cell 2 belongs to eNB 2.
The current UE is in a connection state in cell 1. The first data communication module takes care of data communication with cell 1 in CC1. The network side transmits to the UE a task of measuring a triggering event (A3) wherein the adjacent cell has better quality of service than the serving cell, wherein the carrier frequency of the measured object is CC3 and CC4; for flow, refer to the flow shown in Fig. 10 in Modality 1, no further description is needed here.
The UE performs the measurement, finds that the CC3 and CC4 of cell 2 meet the triggering condition of event A3 and sends the measurement report to the network side.
The network side decides to allow the UE to transfer to cell 2 and sends a transfer prepare command to cell 2.
Upon receiving the transfer prepare command, the cell 2 allocates a preamble, selects a CC as the CC for the UE to perform random access on the cell 2 (e.g., the CC3) and includes the information in the transfer command to send to the cell 1, in which the transfer command additionally gives the C-RNTI allocated by cell information from cell 2 (e.g. including CC3 and CC4, information from each bearer and other information from cell 2), then cell 1 forwards the handover command to the UE.
After the UE receives the transfer command, the RACH module and the corresponding physical layer update the configuration of the underlying protocol according to the transfer command request, and perform the random access process with cell 2; that is, the terminal RACH module sends a Messagel on CC3, where the Messagel contains the specific preamble provided by cell 2.
After receiving Messagel, cell 2 reserves resource for UE and returns Message2 to UE at CC3, where Message2 includes TA and/or UL grant; cell 2 also forwards Message2 to the UE through cell 1.
After the UE receives the Message2 in the CC3, the function execution of the RACH module is completed, the conflict-free random access process in the cell 2 is terminated, the UE obtains downlink synchronization with the cell 2 and the TA considers that the transfer process is successful, achieves user interface protocol reset process, reset including MAC layer reset, PDCP layer rebuild and RLC layer rebuild, updates MAC and PHY layer settings relating to the bearer of the first data communication module and updates the configurations of the RRC, PDCP, RLC and MAC layer protocols according to the transfer command, the configuration including the configuration of the lower layer to adopt an integrity protection algorithm and an encryption algorithm from cell 2 initiates communication with cell 2, sends cell 2 a Message3 (transfer complete), then cell 2 notifies the network of core to perform a path switch and the first data communication module completely completes communication with cell 1; after that, cell 2 can add CC4 as per the request; the UE can initiate a random access process on CC4 or not, whether CC4 is synchronous with CC3 or not. Preferred Example 3
Fig. 12 shows a diagram of a third preferred example, according to the embodiment of the present invention, as shown in Fig. 12, cell 1 is the LTE-A cell and supports the aggregation of the two CCs, or soy, the CC1 and CC2, both of which are located in frequency band 1 and are discontinuous; cell 2 is cell LTE-A, where cell 2 is a cell adjacent to cell 1 and supports the aggregation of three CCs, namely CC3, CC4 and CC5, of which CC3 and CC4 are located in frequency band 2 and are discontinuous, and CC5 is located in frequency band 3. The transmitting equipment and receiving equipment of the UE are three sets of baseband equipment, with three frequency bands each of which a bandwidth less than 20MHz, so to speak, and the UE has three data communication modules. Both cell 1 and cell 2 belong to eNB 1.
Fig. 13 shows a flowchart of a third preferred example, in accordance with the embodiment of the present invention; the example flow is illustrated below in conjunction with Fig. 13.
The current UE is in a link state in cell 1 and uses CC1 and CC2 at the same time; the first data communication module 1 takes care of data communication in CC1; the first data communication module in CC1; the first data communication module 2 takes care of data communication in the CC2; and the data communication module 3 is idle. The network side transmits to the UE a task of measuring a triggering event (A3) where the adjacent cell has better quality of service than the Serbian cell, where the carrier frequency of the measured object is CC3, CC4 and CC5.
The UE performs the measurement, finds that the CC3, CC4 and CC5 of cell 2 meet the triggering condition of event A3 and sends the report to the network side.
The network side decides to allow the UE to transfer to cell 2, and sends a transfer prepare command to cell 2.
Upon receiving the transfer prepare command, cell 2 includes the information (e.g. including CC3, CC4 and CC5, information of each bearer and other information from cell 2) of cell 2 in the transfer command to send to the cell 1, wherein the transfer command further includes the C-RNTI allocated by cell 2, then cell 1 forwards the transfer command to the UE and notifies the first data communication module 1 of the UE to stop data communication with cell 1 and switch to the second data communication module to start a random access process in cell 2.
After the UE receives the transfer command, the MAC layer, the PHY layer and the corresponding physical layer of the first data communication module 1 relating to CC1 update the underlying protocol configuration according to the transfer command, and execute the process of random access with cell 2, that is, they interrupt the communication with cell 1 in CC1, switch to the second data communication module and select to start in CC3 a random access process, that is, to send a Message including a common preamble. Since the UE has three sets of baseband equipment, at that time, the UE may not interrupt the communication with the cell 1 in the first data communication module 1, but transform the first data communication module 3 to the second data communication module to initiate a random access process from cell 2 in CC3.
After receiving Messagel, cell 1 reserves resource for the UE and returns a Message2 to the UE at CC3, where Message2 includes TA and/or UL grant; Message2 can also be forwarded to the UE by cell 1.
After receiving Message2 in CC3, the UE performs relative processing and sends a Message3 to cell 2, wherein Message3 is a MAC layer message or a physical layer message including the C-RNTI of the terminal in cell 2; if the UE receives Message2 routed by cell 1, Message3 can also be routed to cell 2 by cell 1.
After receiving Message3, cell 2 starts sending a Message4 in CC3, where Message4 is a MAC layer message or a physical layer message, containing the physical layer PDCCH signaling where the C-RNTI content of the terminal in the target cell is contained, so cell 2 notifies the core network to perform path switching.
After receiving the PDCCH in CC3, the UE confirms that the random access conflict is resolved, the random access process with conflicts of the UE in cell 2 is completed, the UE obtains downlink synchronization with the cell 2 and the TA, and thus it considers that the transfer process is successful, it achieves the user interface protocol reset process, the reset includes MAC layer reset, PDCP layer rebuild and RLC layer rebuild, updates the MAC and PHY layer settings relating to the bearer of the first data communication modules 2 and 3 and updates the settings of the RRC, PDCP, RLC and MAC layer protocols not relating to the bearer, according to the transfer command, the configuration including configure the lower layer to adopt an integrity protection algorithm and a cell 2 encryption algorithm, the UE initiates communication with cell 2 normally and sends a Message mδ (handover complete) to cell 2, UE starts to communicate with cell 2 normally and can completely interrupt communication with cell 1 at that time; after that, cell 2 can add CC4 and CC5 as per the request; UE can start a process on CC4 and CC5 or not, whether CC4 and CC5 are synchronous with CC3 or not. Preferred Example 4
Fig. 14 shows a diagram of a fourth preferred example, according to the embodiment of the present invention, as shown in Fig. 14, cell 1 is cell LTE-A and supports aggregation of the three CCs, i.e. CC1 , CC2 and CC3, all of which are located in frequency band 1 and are discontinuous; cell 2 is cell LTE-A, where cell 2 is an adjacent cell of cell 1 and supports the aggregation of two CCs, namely CC4 and CC5, both of which are located in frequency band 2 and are discontinuous. The transmitting and receiving equipment of the UE are three sets of baseband equipment, with three frequency bands, each having a bandwidth less than 20MHz, so to speak, and the UE has three modules of data communication. Cell 1 belongs to eNB 1 and cell 2 belongs to eNB 2.
The current UE is in a connection state in cell 1 and uses CC1, CC2 and CC3 at the same time, DC1, DC2 and DC3 take care of data communication in CC1, CC2 and CC3, respectively. The network side transmits to the UE a task of measuring a triggering event (A3) where the adjacent cell has better quality of service than the service cell, where the carrier frequency of the measured object is CC4 and CC5. The process can be with reference to Fig. 13 in Example 3, and no further description is needed here.
The UE performs the measurement, finds that the CC4 and CC5 of cell 2 meet the triggering condition of event A3 and sends the measurement report to the network side.
The network side decides to allow the UE to transfer to cell 2, and sends a transfer play command to cell 2.
After receiving the transfer prepare command, cell 2 includes the information (e.g. including CC4 and CC5, information from each bearer and other information from cell 2) of cell 2 in the transfer command to send to cell 1, wherein the handover command further includes the C-RNTI4 in CC4 and C-RNTI5 in CC5 allocated by cell 2, then cell 1 forwards the handover command to the UE.
After receiving the transfer command, the UE decides to make the CC1 with respect to the MAC layer, PHY layer and the corresponding physical layer of the first data communication module 1, update the underlying protocol configuration, according to the transfer command, and performing the random access process with cell 2; that is, interrupt communication with cell 1 in CC1 and select to initiate in CC4 a random access process of cell 2, that is, send a Message that includes a common preamble and the C-RNTI4. The UE also decides to do CC2 with respect to the MAC layer, the PHY layer and the corresponding physical layer of the first data communication module 2, update the underlying protocol configuration according to the transfer command, and execute the access process random with cell 2; that is, interrupt communication with cell 1 in CC2 and select to initiate in CC5 a random access process of cell 2, that is, send a Message that includes a common preamble and the C-RNTI5. In the following process, CC4 and CC5 are independent.
After receiving Messagel at CC4, cell 2 reserves resources for the UE and returns a Message 2 to the UE at CC4, where Message2 includes TA and/or UL grant; after receiving Messagel at CC5, cell 2 reserves resource for UE and returns a Message2 to UE at CC5, where Message2 includes TA and/or UL grant.
After receiving Message2 in CC4, UE performs relative processing and sends a CE MAC including C-RNTI4 to cell 2 in CC4; after receiving Message2 in CC5, UE performs relative processing and sends a CE MAC including C-RNTI5 to cell 2 in CC5.
After receiving Message2 on CC4, cell 2 starts sending PDCCH on CC4; after receiving Message2 on CC5, cell 2 starts sending PDCCH on CC5. Cell 2 notifies the core network to perform path switching.
After receiving the PDCCH in CC4 and the PDCCH in CC5, the UE confirms that the random access conflict is resolved, the random access process with conflicts in cell 2 is staged, thus the UE obtains downlink synchronization with the cell 2 and TA, considers the transfer process to be successful, achieves the user interface protocol reset process, reset including MAC layer reset, when PDCP layer rebuild and RLC layer rebuild, update the MAC and PHY layer settings relating to the bearer of the first data communication module 3 and updates the settings of the RRC, PDCP, RLC and MAC layer protocols not relating to the bearer, according to the transfer command, the configuration including configuring the lower layer to adopt an integrity protection algorithm and a cell 2 encryption algorithm, the UE initiates communication with the cell 2 and sends a Messageõ (transfers complete number) to cell 2. If the UE only receives the PDCCH in CC4, it can be considered that the random access conflict in CC4 is resolved and the random access process with conflicts in cell 2 is ended; UE obtains downlink synchronization with cell 2 and TA, considers the transfer process successful, achieves user interface protocol reset process, reset including MAC layer reset, rebuild of PDCP layer and RLC layer reconstruction, updates the settings of the MAC and PHY layers relative to the bearer of the first data communication modules 2 and 3 and updates the settings of the RRC, PDCP, RLC and MAC layer protocols, according to the transfer command, the configuration including the lower layer to adopt a cell 2 protection algorithm and encryption algorithm, the UE initiates communication with cell 2 normally in CC4 and sends a Messageõ (transfer complete) to cell 2, and CC5 can be added after CC4 is communicated normally. If the UE only receives the PDCCH in CC5, it can be considered that the random access conflict in CC5 is resolved and the random access process with conflicts in cell 2 is terminated; UE obtains downlink synchronization with cell 2 and TA, considers the transfer process successful, achieves user interface protocol reset process, reset including MAC layer reset, rebuild of PDCP layer and RLC layer reconstruction, updates the MAC and PHY layer settings relative to the bearer of the first data communication modules 1 and 3 and updates the settings of the RRC, PDCP, RLC and MAC non-carrier related protocols, accordingly with the transfer command, configuration including configuring the layer iiifeiiui to adopt an integrity protection algorithm and a cell 2 encryption algorithm, the UE initiates communication with cell 2 normally on CC5 and sends a Messageõ (transfer complete) to cell 2, and CC4 can be added after CC5 is communicated normally. At that time, communication with cell 1 in the first data communication module 1 can be interrupted. Preferred Mode 5
Fig. 15 shows a diagram of a fifth preferred example, according to the embodiment of the present invention; as shown in Fig. 15, cell 1 is cell LTE-A and supports the aggregation of two CCs, i.e. CC1 and CC2, both of which are located in frequency band 1 and are continuous; cell 2 is the LTE cell, where cell 2 is an adjacent cell of cell 1 and supports only one CC, i.e. CC5, which is located in frequency band 1. Transmission equipment and reception equipment of the UE is a set of basic equipment having a single frequency band with a bandwidth of 40MHz, a first data communication module and a RACH module; cell 1 belongs to eNB 1 and cell 2 belongs to eNB 2.
The current UE is in a link state in cell 1 and uses CC1 and CC2 at the same time; the DC takes care of data communication on CC1 and CC2. The network side transmits to the UE a task of measuring a triggering event (A3) where the adjacent cell has better quality of service than the cell in service, where the carrier frequency of the measured object is CC5. For flow, refer to the flow shown in Fig. 10 in Modality one, no further description is needed here.
The UE performs the measurement, finds that cell 2 meets the triggering condition of event A3 and sends the measurement report to the network side.
The network side decides to allow the UE to transfer to cell 2, and sends a transfer prepare command to cell 2.
Upon receiving the transfer prepare command, cell 2 allocates a preamble and includes the information in the transfer command to send to cell 1, wherein the transfer command further includes the C-RNTI allocated by cell 2 and other configuration information. of cell 2, then cell 1 forwards the transfer command to the UE.
After the UE receives the transfer command, the RACH module and the corresponding physical layer update the configuration of the underlying protocol of the description of the delicÃo TõTTra^utTTQuotation-of-wflWide-of^FansferenceT-and-executes the random access access with cell 2; that is, the RACH module starts a random access process in cell 2 and sends a Message in CC5, where the Message contains the specific preamble provided by cell 2.
After receiving Messagel, cell 2 reserves resource for the UE and returns a Message2 to the UE, where Message2 includes TA and/or UL grant; here, to simplify the UE implementation, Message2 may not be sent to the UE directly, but be sent to cell 1 through X2 and S1, and then be forwarded to the UE through cell 1. In this condition, the RACH module terminal only needs to use the corresponding physical layer uplink resource.
After receiving Message2 in CC5, the UE performs relative processing, the execution function of the RACH module is terminated, the conflict-free random access process of the UE in cell 2 is terminated, the UE obtains downlink synchronization with the cell 2 and TA, considers the transfer process to be successful, achieves the user interface protocol reset process, reset including MAC layer reset, PDCP layer rebuild and RLC layer rebuild, updates the MAC and PHY layer settings relating to the bearer of the first data communication module and updates the settings of the RRC, PDCP, RLC and MAC layer protocols not relating to the bearer according to the transfer command, the setting including setting the lower layer to adopt integrity protection algorithm and cell 2 encryption algorithm, start communication with cell 2 normally, send to cell 2 u In a transfer complete message, then cell 2 notifies the core network to perform path switching and stop communication with cell 1.
In summary, with the above modality of the present invention, the transfer interruption time in mobility management can be reduced and even eliminated, thus, a seamless transfer is obtained and the service experience for the users is improved.
Obviously, those skilled in the art should understand that the modules and steps described above can be implemented by a common computing device; the modules or steps can be integrated into a single computing device or distributed in a network composed of a plurality of computing devices; optionally, the modules or steps can be Impl^meπkii-lns. |">nr nm nnrlijn rln prngramarn PYPC.itable by UITI computing device, thus, they can be stored in a storage device to be performed by a computing device, and, under some conditions, the steps described above can be performed in a different order, they are either manufactured in a single integrated circuit module 5 respectively, or several of them can be manufactured in a single integrated circuit module for realization, thus the present invention is not limited to any combination of specific hardware and software.
The above is only the preferred embodiment of the present invention and is not intended to limit the present invention. For those skilled in the art, various modifications and changes can be made to the present invention. Any modification, equivalent replacement or improvement within the spirit and principle of the present invention are considered to fall within the scope of protection of the present invention.
权利要求:
Claims (28)
[0001]
1. A transfer method comprising the steps of: receiving by a terminal a transfer command, wherein the transfer command is used to indicate that the terminal is to be transferred to a target cell; and execution by the terminal of a transfer process, so that it is transferred to the target cell and maintains data communication with a source cell until the success of the transfer process is determined, the method characterized by the fact that, after the terminal receives the transfer command and before the transfer process succeeds, one or more uplink bearers and/or one or more downlink bearers update the respective configuration of an underlying protocol according to the transfer command and execute random access processes with the target cell, the underlying protocol being a bearer-related MAC layer protocol and a physical layer protocol; where, upon the success of the transfer process, the terminal updates the configuration of an underlying protocol of other bearers according to the transfer command, and where the other bearers refer to bearers configured in the transfer command, excluding if those holders running the random access process.
[0002]
2. Method according to claim 1, characterized in that the transfer process comprises: a random access process.
[0003]
3. Method according to claim 2, characterized in that, after the terminal completes the random access process of transferring itself to the target cell, the method further comprises: the terminal completes data communication with the source cell.
[0004]
4. Method according to claim 3, characterized in that, after the terminal completes the random access process of transferring itself to the target cell, the method further comprises: the terminal initiates a data communication with the target cell.
[0005]
5. Method according to claim 4, characterized by the fact that the random access process comprises one of the following: random access process with conflicts and random access process without conflict.
[0006]
6. Method according to claim 5, characterized in that the conflicting random access process executed by the terminal in order to be transferred to the target cell comprises the following steps: sending by the terminal a random access preamble to the target cell; receiving by the terminal a random access response message from the target cell; sending by the terminal a Message3 to the target cell, the Message3 carrying a temporary cellular radio network (C-RNTI) identity of the terminal in the target cell; and reception by the terminal of a Message4 from the target cell, confirming that a random access conflict is resolved.
[0007]
7. Method according to claim 6, characterized in that Message3 is one of a media access control (MAC) layer message and a physical layer message.
[0008]
8. Method according to claim 7, characterized in that Message3 is a MAC layer control cell.
[0009]
9. Method according to claim 6, characterized in that Message4 is one of a MAC layer message and a physical layer message.
[0010]
10. Method according to claim 9, characterized in that Message 4 contains physical layer physical downlink control channel (PDCCH) signaling, wherein the PDCCH signaling contains content of the C-RNTI of the terminal in the target cell.
[0011]
11. Method according to claim 6, characterized in that when the terminal receives Message4 and confirms that the random access conflict is resolved, the terminal determines that the transfer process is successful.
[0012]
12. Method according to claim 6, characterized in that: the target cell is configured to send the random access response message and/or Message4 to the terminal directly or through the source cell; and the terminal is configured to send Message3 to the target cell directly or via the source cell.
[0013]
13. Method according to claim 5, characterized in that the conflict-free random access process executed by the terminal in order to be transferred to the target cell comprises the following steps: sending by the terminal a random access preamble to the target cell, where the random access preamble is a specific resource configured for the endpoint by the target cell; and receiving by the terminal a random access response message from the target cell.
[0014]
14. Method according to claim 13, characterized in that the target cell is configured to send the random access response message to the terminal directly or through the source cell.
[0015]
15. Method according to claim 13, characterized in that, after the terminal receives the random access response message, the terminal determines that the transfer process is successful.
[0016]
16. Method according to claim 11 or 15, characterized in that, after the terminal determines that the transfer process is successful, the terminal sends a transfer complete message to the target cell.
[0017]
17. Method according to any one of claims 1 to 15, characterized in that, after the transfer process is successful, the terminal updates the configuration of a layer protocol above according to the transfer command.
[0018]
18. Method according to claim 17, characterized in that the above layer protocol comprises a non-carrier packet data convergence protocol (PDCP), radio link control (RLC) and layer protocols MAC.
[0019]
19. Method according to claim 17, characterized in that the above layer protocol comprises radio resource control layer protocol (RRC) not related to the bearer.
[0020]
20. Method according to any one of claims 1 to 15, characterized in that, after the success of the transfer process, the terminal reaches a reset process of a user interface protocol, in which the reset process comprises MAC layer restoration, PDCP layer reconstruction and RLC layer reconstruction.
[0021]
21. Method according to claim 20, characterized in that the user interface protocol comprises PDCP, RLC and MAC layer protocols.
[0022]
22. Terminal comprising: a transfer module configured to receive a transfer command, wherein the transfer command is used to indicate that the terminal is to be transferred to a target cell; a communication module configured to perform a transfer process so that it is transferred to the target cell; and a first data communication module configured to maintain data communication with a source cell until the success of the transfer process is determined, the terminal characterized in that after the transfer module receives the transfer command and before of the success of the transfer process, the communication module has one or more uplink carriers and/or one or more downlink carriers updating the respective configuration of an underlying protocol according to the transfer command and executing the respective processes of random access with the target cell, where the underlying protocol is a bearer-relative MAC layer protocol and a physical layer protocol; wherein, upon the success of the transfer process, the communication module is further used to update the configuration of an underlying protocol of other component bearers in accordance with the transfer command, and wherein the other component bearers refer to bearers configured in the transfer command excluding those component holders executing the random access process.
[0023]
23. Terminal, according to claim 22, characterized in that, if the transfer process is a random access process, the first data communication module is additionally configured to complete data communication with the source cell after completing the random access process of transferring itself to the target cell.
[0024]
24. Terminal, according to claim 23, characterized in that, while executing the random access process with conflicts of transferring itself to the target cell, the communication module is additionally configured to send a random access preamble carrying a preamble code common to the target cell, receiving a random access response message sent by the target cell directly or via the source cell, the message carrying time advance (TA) and/or link grant information upward, sending a Message3 to the target cell, Message3 carrying a C-RNTI of the terminal in the target cell, receiving from the target cell a Message4 containing physical layer PDCCH signaling, and confirming that the random access conflict is resolved, and send a Message5 to the target cell, the Message5 used to indicate that the transfer process is complete.
[0025]
25. Terminal according to claim 23, characterized in that, while executing the conflict-free random access process of transferring itself to the target cell, the communication module is additionally configured to send a random access preamble to the target cell, where the random access preamble is a specific resource configured to the endpoint by the target cell, receive a random access response message sent by the target cell directly or through the source cell, and directly send a Message3 to the target cell, where Message3 is used to indicate that the transfer process is complete.
[0026]
26. Terminal, according to claim 23, characterized in that, after the success of the transfer process, the communication module is additionally configured to update the configuration of a layer protocol above according to the transfer command, wherein the above layer protocol comprises non-bearer related PDCP, RLC, and MAC layer protocols.
[0027]
27. Terminal, according to any one of claims 22 to 26, characterized in that the communication module comprises one of the following: a random access RACH module and a second data communication module.
[0028]
28. Terminal according to claim 27, characterized in that the second data communication module is additionally configured for, before or after the first data communication module completes data communication with the source cell, initiate data communication with the target cell and send a complete transfer message to the target cell after determining the success of the transfer process.
类似技术:
公开号 | 公开日 | 专利标题
BR112012012990B1|2021-08-03|TRANSFER METHOD AND TERMINAL.
US11223986B2|2022-01-11|Communications system
US11190992B2|2021-11-30|Devices, methods and computer program products for an improved handover in inter-site carrier aggregation scenarios
JP6819757B2|2021-01-27|gNB-DU, gNB-CU, and methods thereof
US20210092777A1|2021-03-25|Method and apparatus for performing random access in a mobile communication system
ES2740048T3|2020-02-05|Procedure and device for transmitting and receiving data using multiple carriers in mobile communication systems
US9055491B2|2015-06-09|Handover device of wireless communication system using multi-component carrier and method thereof
US10085188B2|2018-09-25|Handover request indicating split of a radio bearer between cells
US20120026977A1|2012-02-02|Method and apparatus for handover in a multi-carrier system
US20100272067A1|2010-10-28|Carrier assignment with mobility support in multi-carrier OFDM systems
JP2021503802A|2021-02-12|How to communicate, terminal devices and network devices
US20130021996A1|2013-01-24|Method for reducing interference under multi-carrier configuration
CN105934991B|2019-12-17|User terminal, radio base station, radio communication system, and radio communication method
JP6922997B2|2021-08-18|Wireless terminal and its method
WO2012023039A2|2012-02-23|Method and apparatus for assigning a cell index in the wireless network
TW202143781A|2021-11-16|Handling of uplink listen-before-talk failures for handover
同族专利:
公开号 | 公开日
JP2013516869A|2013-05-13|
EP2503820B1|2019-03-06|
CN102123457A|2011-07-13|
BR112012012990A2|2017-06-20|
CN102123457B|2016-04-13|
EP2503820A1|2012-09-26|
JP5828843B2|2015-12-09|
WO2011082688A1|2011-07-14|
EP2503820A4|2016-11-16|
US20120218973A1|2012-08-30|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

KR100893860B1|2004-06-10|2009-04-20|엘지전자 주식회사|Method for Handover and Resuem Communication in Failing Handover applying to Broadband Wireless Access System|
CN101292446A|2005-10-31|2008-10-22|Lg电子株式会社|Method of transmitting a measurement report in a wireless mobile communications system|
KR101326372B1|2006-06-20|2013-11-11|인터디지탈 테크날러지 코포레이션|Methods and system for performing handover in a wireless communication system|
CN100542325C|2006-06-22|2009-09-16|华为技术有限公司|Method for handover control|
JP2006340382A|2006-07-10|2006-12-14|Fujitsu Ltd|Mobile station|
PT2087653E|2006-10-03|2015-02-06|Qualcomm Inc|Re-synchronization of temporary ue ids in a wireless communication system|
KR100938090B1|2006-10-19|2010-01-21|삼성전자주식회사|Method and apparatus for performing handover in mobile telecommunication system|
EP2648451B1|2007-05-24|2017-11-22|Huawei Technologies Co., Ltd.|Processing unit, mobile station device and method for random access without necessity of contention resolution|
CN101128062B|2007-09-24|2012-05-23|中兴通讯股份有限公司|Method for terminal random access to cellular wireless communication system and group identifier generation method|
CN101128063B|2007-09-24|2012-05-09|中兴通讯股份有限公司|Method for terminal random access to cellular wireless communication system and group identifier generation method|
CN104244345A|2008-06-30|2014-12-24|交互数字专利控股公司|Method of executing switching from source cell to target cell, and WTRU|
CN101635968A|2008-07-22|2010-01-27|株式会社Ntt都科摩|Switch processing method, base station and network communication system|
US20100034169A1|2008-08-04|2010-02-11|Qualcomm Incorporated|Packet data convergence protocal end of handover indication|JP5349319B2|2006-11-01|2013-11-20|テレフオンアクチーボラゲットエルエムエリクソン(パブル)|Telecommunications systems and encryption of control messages in such systems|
JP5314712B2|2011-02-14|2013-10-16|株式会社エヌ・ティ・ティ・ドコモ|Base station apparatus and user apparatus|
US20130107860A1|2011-10-27|2013-05-02|Qualcomm Incorporated|REDUCING SERVICE INTERRUPTION OF VOICE OVER INTERNET PROTOCOLCALLS DUE TO INTER-RADIO ACCESS TECHNOLOGYHANDOVER|
WO2013175755A1|2012-05-23|2013-11-28|日本電気株式会社|Communication system, access control device, and access device, and communication path control method using same|
JP5950785B2|2012-10-05|2016-07-13|株式会社Nttドコモ|Radio base station and mobile station|
JP6077839B2|2012-11-22|2017-02-08|株式会社Nttドコモ|Mobile communication system, radio base station and mobile station|
WO2015020035A1|2013-08-09|2015-02-12|京セラ株式会社|Base station|
CN105814939B|2013-12-09|2019-08-23|瑞典爱立信有限公司|Method, radio network node and user equipment|
JP6294492B2|2013-12-17|2018-03-14|華為技術有限公司Huawei Technologies Co.,Ltd.|Uplink data transmission confirmation apparatus, device and method|
CN105323852B|2014-07-28|2019-12-24|中兴通讯股份有限公司|Uplink bearer modification method and device|
US10244444B2|2015-03-04|2019-03-26|Qualcomm Incorporated|Dual link handover|
EP3294002B1|2015-05-29|2021-09-01|Huawei Technologies Co., Ltd.|Method for bearer establishment, user equipment and base station|
CN106331200A|2015-06-30|2017-01-11|华为技术有限公司|Method for transmitting data between nodes, gateway node and node|
CN106993313A|2016-01-21|2017-07-28|中兴通讯股份有限公司|A kind of method for realizing carrying switching and terminal and base station|
KR20170098042A|2016-02-19|2017-08-29|삼성전자주식회사|Apparatus and method for minimizing data interruption time during handover in a wireless network|
WO2017161479A1|2016-03-21|2017-09-28|华为技术有限公司|Cell handover method, apparatus and system|
WO2017171506A1|2016-04-01|2017-10-05|Samsung Electronics Co., Ltd.|Method and enb equipment for supporting seamless handover|
KR101954515B1|2016-04-01|2019-03-07|주식회사 케이티|Methods for controlling handover and Apparatus thereof|
CN113423124A|2016-04-01|2021-09-21|北京三星通信技术研究有限公司|Method for supporting seamless switching and base station equipment|
US10819388B2|2016-05-12|2020-10-27|Sharp Kabushiki Kaisha|Transmission device, reception device, and communication method|
CN107371208A|2016-05-13|2017-11-21|中兴通讯股份有限公司|Switching method and device|
CN107690197B|2016-08-05|2020-02-28|电信科学技术研究院|Transmission node replacement method and related equipment|
CN112738858A|2017-03-24|2021-04-30|华为技术有限公司|Method and device for switching|
MX2019015149A|2017-07-25|2020-02-19|Guangdong Oppo Mobile Telecommunications Corp Ltd|Switching method, access network device and terminal device.|
CN109526033B|2017-09-19|2021-06-22|中国移动通信有限公司研究院|Method and equipment for switching and computer storage medium|
EP3499804B1|2017-09-26|2020-06-10|Guangdong Oppo Mobile Telecommunications Corp., Ltd.|Network switching method and terminal device|
US20220053389A1|2018-09-27|2022-02-17|Apple Inc.|Pdcp and rohc handling for multi-connectivity handover|
US11006342B2|2018-11-12|2021-05-11|Qualcomm Incorporated|Handover techniques in wireless communications|
US10667192B1|2018-11-12|2020-05-26|Qualcomm Incorporated|Handover techniques in wireless communications|
EP3944668A1|2019-03-22|2022-01-26|Guangdong Oppo Mobile Telecommunications Corp., Ltd.|Handover processing method, terminal device and network device|
CN111818593A|2019-07-31|2020-10-23|维沃移动通信有限公司|Network switching method and terminal|
CN111800831B|2019-08-01|2021-09-07|维沃移动通信有限公司|Path conversion method, device, communication system and computer readable storage medium|
CN113141639A|2020-01-20|2021-07-20|上海华为技术有限公司|Data processing method and apparatus thereof|
法律状态:
2019-01-08| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2020-04-14| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
2021-07-06| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2021-08-03| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 07/01/2011, OBSERVADAS AS CONDICOES LEGAIS. PATENTE CONCEDIDA CONFORME ADI 5.529/DF, QUE DETERMINA A ALTERACAO DO PRAZO DE CONCESSAO. |
优先权:
申请号 | 申请日 | 专利标题
CN201010004557.4|2010-01-11|
CN201010004557.4A|CN102123457B|2010-01-11|2010-01-11|Changing method and terminal|
PCT/CN2011/070102|WO2011082688A1|2010-01-11|2011-01-07|Terminal and handover method|
[返回顶部]