摘要:
The present invention provides a cell selection method and apparatus. The cell selection method includes: sending, by a non-access stratum of user equipment UE, network list information to an access stratum of the UE, where the network list information includes a list of forbidden networks and a list of forbidden networks for a GPRS service; determining, by the non-access stratum, indication information about a cell selection priority according to an operation mode of the UE; and sending, by the non-access stratum, the indication information to the access stratum, so that the access stratum selects a suitable cell according to the network list information and the indication information. The present invention can effectively prevent the UE from entering a state of being able to normally camp but unable to obtain a normal service, thereby improving user experience.
摘要:
Embodiments of the present invention provide a data forwarding method, device, and communications system, which relate to the field of communications and can achieve accuracy and continuity of data transmission during carrier aggregation for cells between base stations. The method includes: sending, by a primary base station, a first message to a secondary base station, where the first message is used to instruct the secondary base station to perform handover, and the first message includes an identifier of a target base station; confirming, by the primary base station, that the secondary base station forwards data to the target base station; and sending, by the primary base station, a second message to a user equipment, where the second message is used to instruct the user equipment to acquire the data from the target base station. The embodiments of the present invention are used for data forwarding.
摘要:
Embodiments of the present invention provide a method for acquiring a UE capability, a terminal, and a base station. A method for acquiring a UE capability includes: receiving, by a target base station, a handover request sent by a core network device or a source base station, where the handover request carries first UE capability information; and if the first UE capability information indicates an incomplete capability of a UE, after the UE is handed over to the target base station, the target base station determines, according to the first UE capability information, whether to acquire a complete capability of the UE.
摘要:
A method of distributing a security key context, where the method includes receiving, by a mobility management entity, a first indication from a primary base station, where the first indication is used for requesting a path switch from the mobility management entity and indicating that the path switch is triggered by carrier aggregation between base stations, processing the path switch according to the first indication, keeping, according to the first indication, the security key context for the path switch unchanged, and sending a second indication to the primary base station to indicate the primary base station to keep the security key context unchanged, or sending a third indication to the primary base station to indicate the primary base station to acquire a quantity of times of reversal of a next hop chaining counter in the security key context.
摘要:
The present application provides a data transmission method in a wireless communication system. A first security parameter indication is introduced into uplink data on a first bearer, and a base station can determine, based on the first security parameter indication in the uplink data, whether first security processing of the uplink data is performed using a first security parameter or a second security parameter, so as to select a corresponding security parameter to perform second security processing; and a second security parameter indication is introduced into downlink data, and UE can determine, based on the second security parameter indication in the downlink data, whether the first security processing of the data is performed using the first security parameter or the second security parameter, so as to select a corresponding security parameter to perform the second security processing.
摘要:
Embodiments of the present invention provide a method for determining a measurement gap length and a network device. The method includes the following steps: determining, by a first network device, whether a master eNodeB is synchronous with a secondary eNodeB; and when the master eNodeB is synchronous with the secondary eNodeB, determining, by the first network device, that the measurement gap length is a first length; or when the master eNodeB is not synchronous with the secondary eNodeB, determining, by the first network device, that the measurement gap length is a second length; where the first length is less than the second length.
摘要:
The present invention provides a security key change method and a user equipment (UE). The method performed by the UE includes: receiving a key change command message from a master eNodeB (MeNB), wherein the key change command message comprises an indication that a change of a security key between the UE and a secondary eNodeB (SeNB), and the UE is configured with a dual connectivity between the MeNB and the SeNB; updating a security key between the UE and the SeNB; performing random access to the SeNB; and sending a key change complete message to the MeNB.
摘要:
A method of distributing a security key context, where the method includes receiving, by a mobility management entity, a first indication from a primary base station, where the first indication is used for requesting a path switch from the mobility management entity and indicating that the path switch is triggered by carrier aggregation between base stations, processing the path switch according to the first indication, and keeping, according to the first indication, the security key context for the path switch unchanged, and sending a second indication to the primary base station, to indicate the primary base station to keep the security key context unchanged, or sending a third indication to the primary base station, to indicate the primary base station to acquire a quantity of times of reversal of a next hop chaining counter in the security key context.
摘要:
Example configuration methods and apparatus are described. An example communications system includes a master node and a secondary node that jointly provide a service for a terminal. One example method includes generating configuration information for a signaling radio bearer (SRB) by the secondary node, where the SRB is used to transmit a radio resource control (RRC) message between the secondary node and the terminal. The secondary node sends the configuration information for the SRB to the master node, so that the configuration information for the SRB is sent to the terminal through the master node. The secondary node receives a result of configuring the SRB by the terminal by using the configuration information for the SRB. In this way, the SRB can be established on the secondary node, and used for RRC message transmission between the secondary node and the terminal.
摘要:
A method includes: determining, by a terminal device, a carrier aggregation capability and baseband capabilities of the terminal device, where the carrier aggregation capability includes a quantity of carriers and a bandwidth of a carrier in a carrier aggregation group supported by the terminal device, and the baseband capabilities include a multiple-input multiple-output (MIMO) capability; sending, by the terminal device, the information of the carrier aggregation capability and the baseband capabilities to a network device; and receiving, by the terminal device, configuration information.