US Patent Application 18352884. ACL CONFIGURATION METHOD AND APPARATUS simplified abstract

From WikiPatents
Jump to navigation Jump to search

ACL CONFIGURATION METHOD AND APPARATUS

Organization Name

HUAWEI TECHNOLOGIES CO., LTD.


Inventor(s)

Meiling Tang of Shenzhen (CN)

ACL CONFIGURATION METHOD AND APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18352884 titled 'ACL CONFIGURATION METHOD AND APPARATUS

Simplified Explanation

This patent application describes a method and apparatus for configuring an access control list (ACL) in a base station network.

  • The method involves including the user plane IP address of a first base station in signaling messages, such as handover requests or configuration updates.
  • This allows a target base station to obtain the user plane IP address of the first base station without needing to perform a transport network layer (TNL) address discovery procedure.
  • Once the IP address is obtained, an ACL can be configured based on this information.
  • The purpose of configuring the ACL is to prevent scenarios where packets sent by the first base station are discarded by a second base station during a base station handover.
  • By avoiding packet discards and improving data transmission reliability, this method enhances the overall performance of the base station network.


Original Abstract Submitted

This application discloses an access control list (ACL) configuration method and apparatus. A first base station may include a user plane Internet Protocol (IP) address of the first base station in signaling such as a handover request message, a configuration update message, or a secondary station addition request message, so that a target base station can obtain the user plane IP address of the first base station without performing a transport network layer (TNL) address discovery procedure. Then, an ACL can be configured based on the obtained IP address. Therefore, a case in which a packet sent by the first base station is discarded by a second base station in a base station handover scenario can be effectively avoided, and data transmission reliability can be improved.