CN111586734B - Meticulous monitoring method and meticulous monitoring system for group in LTE broadband cluster - Google Patents

Meticulous monitoring method and meticulous monitoring system for group in LTE broadband cluster Download PDF

Info

Publication number
CN111586734B
CN111586734B CN201910116483.4A CN201910116483A CN111586734B CN 111586734 B CN111586734 B CN 111586734B CN 201910116483 A CN201910116483 A CN 201910116483A CN 111586734 B CN111586734 B CN 111586734B
Authority
CN
China
Prior art keywords
group
meticulous
monitoring
meticulous monitoring
key task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910116483.4A
Other languages
Chinese (zh)
Other versions
CN111586734A (en
Inventor
魏建苗
张玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu TD Tech Ltd
Original Assignee
Chengdu TD Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu TD Tech Ltd filed Critical Chengdu TD Tech Ltd
Priority to CN201910116483.4A priority Critical patent/CN111586734B/en
Publication of CN111586734A publication Critical patent/CN111586734A/en
Application granted granted Critical
Publication of CN111586734B publication Critical patent/CN111586734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/08Trunked mobile radio systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the invention provides a group meticulous monitoring method and system in an LTE broadband cluster. The method comprises the following steps: the method comprises the steps that a key task service client sends meticulous monitoring activation requests to a key task service server, wherein the meticulous monitoring activation requests comprise identification of a group needing meticulous monitoring; meticulous monitoring activation responses corresponding to the meticulous monitoring activation requests are returned to the mission critical service client by a mission critical service server. The embodiment of the invention can carry out meticulous monitoring on a specific group, realize authority control and processes under various service scenes, and also realize the time point control of joining and quitting monitoring.

Description

Meticulous monitoring method and meticulous monitoring system for group in LTE broadband cluster
Technical Field
The invention belongs to the technical field of Long Term Evolution (LTE), and particularly relates to a meticulous monitoring method and a meticulous monitoring system for a group in an LTE broadband cluster.
Background
LTE is a long term evolution of The Universal Mobile Telecommunications System (UMTS) technology standard established by The third Generation Partnership project (3 gpp) organization.
A trunking communication system refers to a mobile communication system in which a plurality of users share a set of radio channels and dynamically use these channels. The trunking communication system wins praise in the market with complete scheduling function and excellent performance. However, with the emerging applications of cloud computing, internet of things, big data and the like, the enterprise operation flow and production system are deeply changed, the requirements of all industries on 'comprehensive control and field visibility' in the communication process are increased day by day, and the traditional cluster mode based on narrow bands is more and more difficult to continue. In a narrowband trunking system, aiming at a point-to-point private call, a scheduling system has a function of careful monitoring, namely, a user is appointed to conduct careful monitoring, and when the user conducts the point call, a monitoring person (often an authorized scheduling person) can monitor the call of the user and is not discovered by two parties of the call.
With the LTE technology in public networks, group communication is coming to be broadband. The broadband digital trunking communication system is a dedicated mobile communication system which is based on broadband mobile communication technology and provides a command scheduling function in a multimedia trunking service mode. The method can realize the cooperative fusion scheduling capability of multiple services such as voice scheduling, data scheduling, video scheduling and the like.
In a broadband trunking system, there are scenarios that require listening to a group. However, in the broadband trunking system defined by the current 3GPP protocol, the implementation of the group-specific careful monitoring function is still blank, and the functional requirements and implementation methods for group-specific monitoring are not proposed.
Disclosure of Invention
The embodiment of the invention provides a group meticulous monitoring method and system in an LTE broadband cluster.
The technical scheme of the embodiment of the invention is as follows:
a meticulous monitoring method for a group in an LTE broadband cluster, comprising:
a key task service client sends meticulous monitoring activation requests to a key task service server, wherein the meticulous monitoring activation requests comprise identifiers of groups needing meticulous monitoring;
meticulous monitoring activation responses corresponding to the meticulous monitoring activation requests are returned to the mission critical service client by a mission critical service server.
In one embodiment, wherein:
when the key task service server judges that the key task service client does not have meticulous monitoring authority, the key task service server returns meticulous monitoring activation failure response to the key task service client;
when the key task service server judges that the group needing careful monitoring does not have the meticulous monitoring authority, the key task service server returns meticulous monitoring activation failure response to the key task service client;
when the key task service server judges that the key task service client does not have meticulous monitoring authority and the group needing meticulous monitoring does not have meticulous monitoring authority, the key task service server returns meticulous monitoring activation failure response to the key task service client;
and when the key task service server judges that the key task service client has the meticulous monitoring authority and the group needing meticulous monitoring has the meticulous monitoring authority, the key task service server returns meticulous monitoring activation response to the key task service client.
In one embodiment, the group session of the group requiring careful monitoring is in an established state prior to the mission critical services client sending a careful monitoring activation request to a mission critical services server.
In one embodiment, when the meticulous snoop activation response is a meticulous snoop activation success response, the method further comprises:
sending meticulous monitoring group call requests to the mission-critical service client when the mission-critical service server determines that the group sessions of the group needing meticulous monitoring are in an established state, wherein the meticulous monitoring group call requests comprise the identification of the group needing meticulous monitoring;
the mission-critical service client returning meticulous listening group call responses to the meticulous listening group call requests to the mission-critical service server.
In one embodiment, the mission critical services server joins the mission critical services client to the group session when the meticulous monitoring of group call responses is meticulous monitoring of group call successful responses.
In one embodiment, when the meticulous monitoring of activation responses is meticulous monitoring of activation success responses and a group session of a group requiring meticulous monitoring is not established, the method further comprises:
establishing a group session of the group needing careful monitoring;
the method comprises the steps that after a group conversation of the group needing careful monitoring is established, the key task service server sends meticulous monitoring group call requests to the key task service client, wherein the meticulous monitoring group call requests comprise the identification of the group needing careful monitoring;
the mission-critical service client returning meticulous listening group call responses to the meticulous listening group call requests to the mission-critical service server.
In one embodiment, the mission critical services server joins the mission critical services client to the group session when the meticulous monitoring of group call responses is meticulous monitoring of group call successful responses.
In one embodiment, the method further comprises:
the method comprises the steps that a key task service client sends meticulous monitoring deactivation requests to a key task service server, wherein the meticulous monitoring deactivation requests comprise identifiers of groups needing to cancel meticulous monitoring;
and the key task service server returns meticulous monitoring and deactivation responses corresponding to the meticulous monitoring and deactivation requests to the key task service client.
In one embodiment, the method further comprises:
meticulous monitoring deactivation responses are meticulous monitoring deactivation success responses, the group sessions of the group needing meticulous monitoring cancellation are in an established state, and the mission critical service client is joined in the group session, quitting the mission critical service client from the group session.
A meticulous monitoring system of a group in an LTE broadband cluster comprises a mission critical service client and a mission critical service server, wherein:
a critical task service client, configured to send meticulous monitoring activation requests to a critical task service server, where the meticulous monitoring activation requests include identifiers of groups that need meticulous monitoring;
and the key task service server is used for returning meticulous monitoring activation response corresponding to the meticulous monitoring activation request to the key task service client.
In one embodiment, the mission critical services server, when determining that the mission critical services client is not meticulous in monitoring, returns a meticulous in monitoring activation failure response to the mission critical services client; when the key task service server judges that the group needing careful monitoring does not have the meticulous monitoring authority, returning meticulous monitoring activation failure response to the key task service client; when the key task service server judges that the key task service client does not have meticulous monitoring authority and the group needing meticulous monitoring does not have meticulous monitoring authority, returning meticulous monitoring activation failure response to the key task service client; and when the key task service server judges that the key task service client has meticulous monitoring authority and the group needing meticulous monitoring has the meticulous monitoring authority, returning meticulous monitoring activation success response to the key task service client.
In one embodiment, the group session of the group requiring careful monitoring is in an established state prior to the mission critical services client sending a careful monitoring activation request to a mission critical services server.
In one embodiment, the critical task serving server, further configured to, when the meticulous monitoring activation responses are meticulous monitoring activation success responses and it is determined that the group sessions of the group needing meticulous monitoring are in an established state, send meticulous monitoring group call requests to the critical task serving client, including the identities of the group needing meticulous monitoring;
the key task service client is further configured to return meticulous monitoring group call responses corresponding to the meticulous monitoring group call requests to the key task service server.
In one embodiment, the mission critical services server is further configured to join the mission critical services client to the group session when the meticulous monitoring of group call responses is meticulous monitoring of group call successful responses.
In one embodiment, the mission-critical service server is further configured to send, to the mission-critical service client, a meticulous monitoring group call request including an identification of the group requiring meticulous monitoring, while the meticulous monitoring activation response is a meticulous monitoring activation success response and the group session of the group requiring meticulous monitoring is not established, after waiting for the meticulous monitoring group session to be established;
the critical task service client is further configured to return meticulous monitoring group call responses corresponding to the meticulous monitoring group call requests to the critical task service server.
In one embodiment, the mission critical services server is further configured to join the mission critical services client to the group session when the meticulous monitoring of group call responses is meticulous monitoring of group call successful responses.
In one embodiment, a mission-critical service client is further configured to send meticulous monitoring deactivation requests to the mission-critical service server, the meticulous monitoring deactivation requests including an identification of a group that needs to cancel meticulous monitoring;
and the key task service server is also used for returning meticulous monitoring deactivation response corresponding to the meticulous monitoring deactivation request to the key task service client.
In one embodiment, the mission critical service server, further configured to, when the meticulous monitoring deactivation response is a meticulous monitoring deactivation success response, the group sessions of the group for which careful monitoring needs to be canceled are in an established state, and the mission critical service client has joined the group session, withdraw the mission critical service client from the group session.
A computer readable storage medium having stored therein computer readable instructions for performing the meticulous monitoring of groups of the LTE broadband cluster of any one of the above.
In the technical scheme, in the embodiment of the invention, a key task service client sends meticulous monitoring activation requests to a key task service server, wherein the meticulous monitoring activation requests comprise the identifications of groups needing meticulous monitoring; the critical task service server returns a meticulous monitoring activation response corresponding to the meticulous monitoring activation request to the critical task service client. Therefore, the embodiment of the invention realizes meticulous monitoring aiming at a specific group in the LTE broadband cluster.
In addition, the embodiment of the invention realizes meticulous monitoring authority control and the flow under various service scenes, and also realizes the time point control of joining and quitting monitoring.
Drawings
Fig. 1 is a flowchart of a method for meticulous monitoring of groups in an LTE broadband cluster in accordance with the present invention.
FIG. 2 is a flow chart of careful monitoring of cancellation of groups in an LTE broadband cluster in accordance with the present invention.
Fig. 3 is a flowchart of a group listen command process with a group session in an un-established state according to the present invention.
Fig. 4 is a schematic diagram of a group listen command process with a group session in an un-established state according to the present invention.
Fig. 5 is a flowchart of a group listen command process with a group session in an established state according to the present invention.
Fig. 6 is a diagram illustrating a group listen command process with a group session in an established state according to the present invention.
FIG. 7 is a diagram of a careful monitoring system of a group in an LTE broadband cluster in accordance with the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the accompanying drawings.
For simplicity and clarity of description, the invention will be described below by describing several representative embodiments. Numerous details of the embodiments are set forth to provide an understanding of the principles of the invention. It will be apparent, however, that the invention may be practiced without these specific details. Some embodiments are not described in detail, but rather are merely provided as frameworks, in order to avoid unnecessarily obscuring aspects of the invention. Hereinafter, "comprising" means "including but not limited to", "according to … …" means "according to at least … …, but not according to only … …". In view of the language convention of chinese, the following description, when it does not specifically state the number of a component, means that the component may be one or more, or may be understood as at least one.
In the embodiment of the invention, function definition, a flow mechanism and an authorization mechanism based on meticulous group monitoring are provided.
Fig. 1 is a flowchart of a method for meticulous monitoring of groups in an LTE broadband cluster in accordance with the present invention.
As shown in fig. 1, the method includes:
step 101: a Critical task (MC) service client (service client) sends a meticulous listening activation request (listening activation request) to a Critical task service server (MC service server), wherein the meticulous listening activation request comprises an identification of a group needing meticulous listening.
Step 102: the critical task service server returns a meticulous listening activation response (Discreet listening activation response) corresponding to the meticulous listening activation request to the critical task service client.
The key task service server judges whether a key task service client sending meticulous monitoring activation requests has monitoring authority and judges whether a group needing meticulous monitoring has monitored authority, if at least one of the key task service client sending meticulous monitoring activation requests has no authority, failure response is sent to the key task service client, wherein the result carries specific reasons, and if not, successful monitoring response is sent.
Specifically, the method comprises the following steps:
(1) And when the key task service server judges that the key task service client does not have meticulous monitoring authority, the key task service server returns meticulous monitoring activation failure response to the key task service client.
(2) And when the key task service server judges that the group needing careful monitoring does not have the meticulous monitoring authority, the key task service server returns meticulous monitoring activation failure response to the key task service client.
(3) And when the critical task service server judges that the critical task service client does not have meticulous monitoring authority and a group needing meticulous monitoring does not have meticulous monitoring authority, the critical task service server returns meticulous monitoring activation failure response to the critical task service client.
(4) And when the key task service server judges that the key task service client has the meticulous monitoring authority and the group needing the meticulous monitoring has the meticulous monitoring authority, the key task service server returns meticulous monitoring activation response to the key task service client.
In the specific implementation, the original MC service ID in the existing meticulous monitoring activation request in the prior art can be changed to be optional, and the identification of the group of the meticulous monitoring (MC service group ID) is added to serve as the meticulous monitoring activation request of the embodiment of the invention. Preferably, the meticulous-monitoring-enabled response also carries an optional meticulous-monitoring group identification (MC service group ID).
It can be seen that the instruction issuing process based on the meticulous monitoring can be realized based on the flow of fig. 1.
In addition, the embodiment of the invention also provides a group-based meticulous monitoring cancellation command issuing process.
Fig. 2 is a flowchart of careful monitoring of cancellation groups in an LTE broadband cluster in accordance with the present invention.
As shown in fig. 2, the method includes:
step 201: the key task service client sends meticulous listening deactivation request (meticulous listening activation request) to the key task service server, wherein the meticulous listening deactivation request comprises identification of a group needing to cancel meticulous listening.
Step 202: the critical task service server returns a meticulous listening deactivation response (Discreet listening activation response) corresponding to the meticulous listening deactivation request to the critical task service client.
Here, when the mission critical service server determines that meticulous monitoring deactivation can be successfully performed for the group needing to cancel, returning a successful deactivation response to the mission critical service client; and when the key task service server determines that the meticulous monitoring deactivation cannot be successfully carried out aiming at the group needing to cancel the meticulous monitoring, returning a deactivation failure response to the key task service client.
Wherein, when the meticulous monitoring deactivation response is the meticulous monitoring deactivation success response, the group conversation of the group needing to cancel the meticulous monitoring is in the established state and the key task service client terminal is added into the group conversation of the group, the key task service client terminal is quitted (bye) the group conversation of the group needing to cancel the meticulous monitoring.
In a specific implementation, an original MC service ID of an existing request for meticulous monitoring deactivation in the prior art may be changed to be optional, and an optional identifier (MC service group ID) of a group that needs to cancel meticulous monitoring may be added as the request for meticulous monitoring deactivation according to the embodiment of the present invention. Preferably, the meticulous monitoring deactivation response also carries an optional identifier (MC service group ID) of the group needing to cancel meticulous monitoring.
Based on the flows of fig. 1 and fig. 2, the timing control of joining and exiting snooping can be realized.
In one embodiment, a group session of a group requiring careful monitoring is in an established state before a mission critical services client sends a careful monitoring activation request to a mission critical services server. Wherein, when the meticulous monitoring activation response is a meticulous monitoring activation successful response, the method further comprises: sending meticulous monitoring group call requests to a key task service client when a key task service server determines that group conversations of a group needing meticulous monitoring are in an established state, wherein the meticulous monitoring group call requests comprise identifiers of the group needing meticulous monitoring; the key task service client returns meticulous monitoring group call responses corresponding to the meticulous monitoring group call requests to the key task service server.
Preferably, the mission critical service server joins the mission critical service clients to the group session when the meticulous monitoring of the group call responses is meticulous to the successful group call responses. At this time, the mission-critical service client serves as a listener, and can perform local recording on the monitored content when the call content and the talkback information of the group can be acquired.
In one embodiment, when the meticulous monitoring of activation responses is meticulous monitoring of activation success responses and a group session of a group requiring meticulous monitoring is not established, the method further comprises: the method comprises the steps that after a key task service server waits for a group conversation of a group needing careful monitoring to be established, a meticulous monitoring group call request is sent to a key task service client, wherein the meticulous monitoring group call request comprises an identification of the group needing careful monitoring; and the key task service client returns meticulous monitoring group call response corresponding to the meticulous monitoring group call request to a key task service server.
Preferably, the mission-critical service server joins the mission-critical service client to the group session when the monitoring-meticulous group call response is a monitoring-meticulous group call successful response. At this time, the mission-critical service client serves as a listener, and can perform local recording on the monitored content when the call content and the talkback information of the group can be acquired.
Based on the embodiment of the present invention, in a cluster scheduling system of an LTE broadband cluster, when a scheduling station or a user terminal is implemented as a mission-critical service client shown in fig. 1 and 2, the scheduling station or the user terminal may perform meticulous monitoring on a specific group. When the group establishes and switches the talkback, the dispatching desk or the user terminal as the listener can acquire the conversation content and the talkback information of the group, and the dispatching desk or the terminal as the listener can also perform local sound recording on the monitored content.
Furthermore, the embodiment of the invention also realizes a perfect authorization mechanism, which comprises the following steps: the monitor needs to have the authority to monitor the group, and only authorized monitors can monitor the group; snooped groups need to have snooped permissions, only authorized groups can be snooped, and so on. In addition, in the embodiment of the invention, the commands related to meticulous monitoring comprise starting meticulous monitoring and ending meticulous monitoring; when careful monitoring is finished, the current session and subsequent sessions of the group cannot be monitored.
Embodiments of the present invention may be embodied in a variety of application scenarios.
For example, the embodiments of the present invention may be specifically implemented in an application scenario of Mission critical push-to-talk (MCPTT). MCPTT is an all-IP application layer service running on an LTE network, and the implementation scheme based on the IMS domain is used, so that the advantages of large bandwidth, low delay, easiness in large-scale networking and the like are integrated. The enhanced PTT service provided by the MCPTT service is suitable for scenes of executing key tasks, and supports functions of authentication, group attachment, group management, group calling, single calling, priority calling, floor control, position reporting and the like.
Moreover, the group meticulous monitoring service process of the embodiment of the invention can have the following two commonly used scenes:
(1) Meticulous monitoring that the group is not active at the beginning (i.e., the group session is in an un-established state);
(2) Meticulous monitoring begins when the group is active (i.e., the group session is in an established state).
It will be appreciated by those skilled in the art that the implementation of the embodiments of the present invention in MCPTT application scenarios, which will be described in detail below, is only an exemplary illustration and is not intended to limit the scope of the embodiments of the present invention.
Fig. 3 is a flowchart of a group listen command process with a group session in an un-established state according to the present invention. Fig. 4 is a schematic diagram of a group listen command process with a group session in an un-established state according to the present invention.
As can be seen from fig. 4, the main logical network elements of the system architecture include a Dispatch Console (DC), a User Equipment (UE), and an MCPTT server (MCPTTServer). The scheduling console integrates a scheduling control interface, can retrieve, download and play back historical videos, and can perform scheduling operation on the videos, such as distribution and wall climbing. The user terminal is a wireless terminal device developed based on LTE and can support high-resolution video playing. The MCPTT server provides key cluster services for the 3GPP scheduling server. The MCPTT Client (MCPTT Client) is a 3GPP trunking service Client, and may be specifically implemented as a dispatcher station or a user terminal.
As can be seen in fig. 4, the group session for group a, which includes UE1 and UE2, was in an unacknowledged state prior to the careful monitoring. First, a dispatch station, acting as a listener, sends a meticulous listening command. Then, a group session for group a is established. Then, the dispatcher station may then listen to the group session for group a.
Fig. 3 depicts an implementation of a group listen command with a group session in an un-established state. In fig. 3, the MCPTT client 3 is a listener (either a dispatch station or a user terminal). The MCPTT client 3 has previously submitted a listening request for a group (e.g., group a in fig. 4) to the MCPTT server before the group session of the group is established, and the MCPTT server returns a listening success message to the MCPTT client 3. The MCPTT client 1 (e.g., UE1 in group a) then establishes a group session for that group a, and the MCPTT server is responsible for establishing the group session to the other group members (e.g., UE 2). The MCPTT server judges whether the group A is monitored, if so, the MCPTT server establishes a group conversation to the monitor MCPTT client 3, which is equivalent to the MCPTT server taking the MCPTT client 3 as a group member to join the group conversation of the group A. Finally, the group session of the group a is successfully established, and the MCPTT client 3 can monitor the group session, including being able to obtain the change of the talkback information.
As shown in fig. 3, the method includes:
step 301: the MCPTT client 3 (e.g., the dispatch station in fig. 4) acting as a listener sends a meticulous listening activation request (listening activation request) to the MCPTT server, which includes an identification of a group that needs to be listened to (e.g., an identification of group a).
Step 302: the MCPTT server returns, to the MCPTT client 3 as the listener, a meticulous listening activation response (listening activating response) corresponding to the meticulous listening activation request, wherein the meticulous listening activation response carries an identification of the group that needs to be meticulous listening. The MCPTT server judges whether the MCPTT client side 3 sending the meticulous monitoring activation request has monitoring authority and judges whether a group needing to be monitored has monitored authority, if at least one of the MCPTT client side 3 does not have the authority, failure response is sent to the MCPTT client side 3, the result carries a specific reason, and if not, successful monitoring response is sent. The subsequent flow steps 303 to 309 describe the processing procedure after the MCPTT server sends a successful listening response to the MCPTT client 3.
Step 303: MCPTT client 1 (e.g., UE1 in Group a) sends a Group session request (Group call request) to the MCPTT server.
Step 304: the MCPTT server sends a Group session request (Group call request) to the MCPTT client 2, e.g., UE2 in Group a.
Step 305: when the MCPTT server determines that a Group session of the Group needing careful monitoring is in an established state, sending a meticulous monitoring Group call request (monitoring Group call request) to the MCPTT client 3, wherein the meticulous monitoring Group call request comprises an identification of the Group needing careful monitoring (for example, an identification of the Group A).
Step 306: the MCPTT client 2 returns a Group call response (Group call response) to the MCPTT server indicating that the MCPTT client 2 can join the Group session.
Step 307: the MCPTT client 3 returns a meticulous listening Group call response (listening Group call response) to the MCPTT server, which also includes the identity of the Group that needs to be meticulous. It is assumed here that the careful listening of group call responses is a successful response.
Step 308: the MCPTT server sends a Group call response (Group call response) to the MCPTT client 1 indicating that the MCPTT client 1 can join the Group session.
Step 309: and establishing a media plane. So far, the MCPTT client 3 has joined the group session as a listener, can acquire the conversation content and the talkback information of the group, and can also perform local recording on the monitored content.
Fig. 5 is a flowchart of a group listen command process with a group session in an established state according to the present invention. Fig. 6 is a diagram illustrating a group listen command process with a group session in an established state according to the present invention.
As can be seen from fig. 6, the main logical network elements of the system architecture include a Dispatch Console (DC), a User Equipment (UE), and an MCPTT server (MCPTTServer). The scheduling console integrates a scheduling control interface, can retrieve, download and play back historical videos, and can perform scheduling operation on the videos, such as distribution and wall climbing. The user terminal is a wireless terminal device developed based on LTE and can support high-resolution video playing. The MCPTT server provides key cluster services for the 3GPP scheduling server. The MCPTT Client (MCPTT Client) is a 3GPP trunking service Client, and may be specifically implemented as a dispatcher station or a user terminal.
As can be seen in fig. 6, the group session for group a, which includes UE1 and UE2, was in the established state prior to the careful monitoring. First, a group session for group a is in progress. Then, the dispatch station as a listener sends meticulous listening commands. Then, the dispatcher station may then listen to the group session for group a.
Fig. 6 depicts an implementation of a group listen command with a group session in an established state. In fig. 6, MCPTT client 1 (which may be either a dispatcher or a user terminal) establishes a group session. The MCPTT server is then responsible for establishing a group session to the other group member MCPTT clients 2. In the process of session proceeding, the MCPTT client 3 as the listener successfully submits a request for monitoring the group session to the MCPTT server, and the MCPTT server sends a monitoring success message to the MCPTT client 3. The MCPTT server needs to determine whether the group session is already established, and if so, establish the group session to the listener MCPTT client 3, which is equivalent to the MCPTT server joining the MCPTT client 3 as a group member in the group session. Finally, the MCPTT client 3 joins the group session, and the MCPTT client 3 can listen to the group session, including being able to obtain the change of the talkback information.
As shown in fig. 5, the method includes:
step 501: MCPTT client 1 (e.g., UE1 in Group a) sends a Group session request (Group call request) to the MCPTT server.
Step 502: the MCPTT server sends a Group session request (Group call request) to the MCPTT client 2, e.g., UE2 in Group a.
Step 503: the MCPTT client 2 returns a Group session response (Group call response) to the MCPTT server indicating that the MCPTT client 2 can join the Group session.
Step 504: the MCPTT server returns a Group session response (Group call response) to MCPTT client 1 indicating that MCPTT client 1 can join the Group session.
Step 505: and establishing a media plane. At this point, the group session has already been established.
Step 506: the MCPTT client 3 (e.g., the dispatch station in fig. 4) acting as a listener sends a meticulous listening activation request (listening activation request) to the MCPTT server, which includes an identification of a group that needs to be listened to (e.g., an identification of group a).
Step 507: the MCPTT server returns meticulous listening activation response (listening speaking response) corresponding to the meticulous listening activation request to the MCPTT client 3 which is taken as a listener, wherein the meticulous listening activation response carries the identification of the group needing meticulous listening. The MCPTT server judges whether the MCPTT client side 3 sending the meticulous monitoring activation request has monitoring authority and judges whether a group needing to be monitored has monitored authority, if at least one of the MCPTT client side 3 does not have the authority, failure response is sent to the MCPTT client side 3, the result carries a specific reason, and if not, successful monitoring response is sent. The subsequent flow steps 508 to 510 describe the processing procedure after the MCPTT server sends a successful listening response to the MCPTT client 3.
Step 508: when the MCPTT server determines that the Group conversation of the Group needing careful monitoring is in the established state, sending a meticulous monitoring Group call request (meticulous monitoring Group call request) to the MCPTT client 3, wherein the meticulous monitoring Group call request comprises the identification of the Group needing careful monitoring (such as the identification of the Group A).
Step 509: the MCPTT client 3 returns a meticulous listening Group call response (listening Group call response) to the MCPTT server, which also includes the identity of the Group that needs to be meticulous. It is assumed here that the meticulous listening to group call responses is a successful response.
Step 510: and establishing a media plane. Thus, the MCPTT client 3, as a listener, has joined the group session, and can acquire the conversation content and the talkback information of the group, and can perform local recording on the monitored content.
Based on the above description, the embodiment of the present invention further provides a meticulous monitoring system for the group in the LTE broadband cluster.
FIG. 7 is a diagram of a careful monitoring system of a group in an LTE broadband cluster in accordance with the present invention.
As shown in fig. 7, the system includes a mission critical services client 701 and a mission critical services server 702, where:
the key task service client 701 is used for sending a meticulous monitoring activation request by the key task service server 702, wherein the meticulous monitoring activation request comprises an identifier of a group needing meticulous monitoring;
a mission critical services server 702 configured to return a meticulous interception activation response corresponding to the meticulous interception activation request to the mission critical services client 701.
In one embodiment, the mission critical services server 702, configured to return a meticulous-monitoring-activation-failure response to the mission critical services client 701 when the mission critical services server 702 determines that the mission critical services client 701 does not have meticulous monitoring authority; when the key task service server 702 judges that the group needing careful monitoring does not have the meticulous monitoring authority, returning meticulous monitoring activation failure response to the key task service client 701; when the mission critical service server 702 determines that the mission critical service client 701 has meticulous listening permissions and the group requiring meticulous listening has meticulous listening permissions, returning meticulous listening activation success responses to the mission critical service client 701.
In one embodiment, the group sessions of the group requiring careful monitoring are in an established state before the mission critical services client 701 sends a careful monitoring activation request to the mission critical services server 702.
In one embodiment, the mission critical services server 702 is further configured to send meticulous monitoring of group call requests to the mission critical services client 701, including an identification of the group requiring meticulous monitoring, when the meticulous monitoring of activation responses is meticulous monitoring of activation success responses and it is determined that a group session of the group requiring meticulous monitoring is in an established state;
the mission critical service client 701 is further configured to return meticulous listening group call responses to the meticulous listening group call requests to the mission critical service server 702.
In one embodiment, the mission critical services server 702 is further configured to join the mission critical services client 701 to the group session when meticulous monitoring of group call responses is meticulous monitoring of group call successful responses.
In one embodiment, the mission-critical service server 702 is further configured to send a meticulous monitoring group call request to the mission-critical service client 701, after waiting for a meticulous monitoring-required group session to be established, when the meticulous monitoring-activation response is a meticulous monitoring-activation-successful response and the meticulous monitoring-required group session is not established, where the meticulous monitoring-required group call request includes an identification of the meticulous monitoring-required group;
the mission critical service client 701 is also configured to return meticulous listening group call responses to the meticulous listening group call requests to the mission critical service server 702.
In one embodiment, the mission critical services server 702 is further configured to join the mission critical services client 701 to the group session when meticulous monitoring of group call responses is meticulous monitoring of group call successful responses.
In one embodiment, the mission critical service client 701 is further configured to send a meticulous monitoring deactivation request to the mission critical service server 702, where the meticulous monitoring deactivation request includes an identifier of a group that needs to cancel meticulous monitoring;
the mission critical services server 702 is further configured to return a meticulous monitoring deactivation response corresponding to the meticulous monitoring deactivation request to the mission critical services client 701.
In one embodiment, the mission critical service server 702, is further configured to drop the mission critical service client 701 out of the group session when meticulous monitoring deactivation of the response is that the deactivation of the successful response is meticulous monitoring, the group sessions of the group for which meticulous monitoring needs to be cancelled are in an established state, and the mission critical service client 701 has joined the group session.
Specifically, the mission-critical service client 701 may be implemented as a dispatcher station, and may also be implemented as a user terminal.
In summary, in the embodiments of the present invention, a critical task service client sends a meticulous monitoring activation request to a critical task service server, where the meticulous monitoring activation request includes an identifier of a group that needs to be carefully monitored; and the key task service server returns meticulous monitoring and activating responses corresponding to the meticulous monitoring and activating requests to the key task service client. Therefore, the embodiment of the invention realizes meticulous monitoring aiming at a specific group.
In addition, the embodiment of the invention also realizes meticulous monitoring authority control and the flow under various service scenes, and also realizes the time point control of joining and quitting monitoring.
It should be noted that not all steps and modules in the above flows and structures are necessary, and some steps or modules may be omitted according to actual needs. The execution order of the steps is not fixed and can be adjusted as required. The division of each module is only for convenience of describing adopted functional division, and in actual implementation, one module may be divided into multiple modules, and the functions of multiple modules may also be implemented by the same module, and these modules may be located in the same device or in different devices.
The hardware modules in the various embodiments may be implemented mechanically or electronically. For example, a hardware module may include a specially designed permanent circuit or logic device (e.g., a special purpose processor such as an FPGA or ASIC) for performing specific operations. A hardware module may also comprise programmable logic devices or circuits (e.g., including a general-purpose processor or other programmable processor) that are temporarily configured by software to perform certain operations. The implementation of the hardware module in a mechanical manner, or in a dedicated permanent circuit, or in a temporarily configured circuit (e.g., configured by software) may be determined by cost and time considerations.
The present invention also provides a machine-readable storage medium storing instructions for causing a machine to perform a method as described herein. Specifically, a system or an apparatus equipped with a storage medium on which a software program code that realizes the functions of any of the embodiments described above is stored may be provided, and a computer (or a CPU or MPU) of the system or the apparatus is caused to read out and execute the program code stored in the storage medium. Further, part or all of the actual operations may be performed by an operating system or the like operating on the computer by instructions based on the program code. The functions of any of the above-described embodiments may also be implemented by writing the program code read out from the storage medium to a memory provided in an expansion board inserted into the computer or to a memory provided in an expansion unit connected to the computer, and then causing a CPU or the like mounted on the expansion board or the expansion unit to perform part or all of the actual operations based on the instructions of the program code.
Embodiments of the storage medium used to provide the program code include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs, DVD + RWs), magnetic tapes, non-volatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer or the cloud by a communication network.
"exemplary" means "serving as an example, instance, or illustration" herein, and any illustration, embodiment, or steps described as "exemplary" herein should not be construed as a preferred or advantageous alternative. For the sake of simplicity, the drawings are only schematic representations of the parts relevant to the invention, and do not represent the actual structure of the product. Moreover, in the interest of brevity and understanding, only one of the components having the same structure or function is illustrated schematically or designated in some of the drawings. In this document, "a" does not mean that the number of the relevant portions of the present invention is limited to "only one", and "a" does not mean that the number of the relevant portions of the present invention "more than one" is excluded. In this document, "upper", "lower", "front", "rear", "left", "right", "inner", "outer", and the like are used only to indicate relative positional relationships between relevant portions, and do not limit absolute positions of the relevant portions.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (17)

1. A meticulous monitoring method for a group in an LTE broadband cluster, comprising:
the method comprises the steps that a key task service client sends meticulous monitoring activation requests to a key task service server, wherein the meticulous monitoring activation requests comprise identification of a group needing meticulous monitoring;
a key task service server returns meticulous monitoring activation responses corresponding to the meticulous monitoring activation requests to the key task service client;
when the meticulous monitoring activation response is meticulous monitoring activation success response and a group session of a group requiring meticulous monitoring is not established, the method further comprises:
the method comprises the steps that after a group conversation of the group needing careful monitoring is established, the key task service server sends meticulous monitoring group call requests to the key task service client, wherein the meticulous monitoring group call requests comprise the identification of the group needing careful monitoring;
the mission-critical service client returning meticulous listening group call responses to the meticulous listening group call requests to the mission-critical service server.
2. The method of claim 1, wherein:
when the key task service server judges that the key task service client does not have meticulous monitoring authority, the key task service server returns meticulous monitoring activation failure response to the key task service client;
when the key task service server judges that the group needing careful monitoring does not have the meticulous monitoring authority, the key task service server returns meticulous monitoring activation failure response to the key task service client;
when the key task service server judges that the key task service client does not have meticulous monitoring authority and the group needing meticulous monitoring does not have meticulous monitoring authority, the key task service server returns meticulous monitoring activation failure response to the key task service client;
and when the key task service server judges that the key task service client has the meticulous monitoring authority and the group needing meticulous monitoring has the meticulous monitoring authority, the key task service server returns meticulous monitoring activation response to the key task service client.
3. The meticulous monitoring method of groups in an LTE broadband cluster of claim 1 or 2,
group sessions of the group needing careful monitoring are in an established state before the mission-critical service client sends a meticulous monitoring activation request to a mission-critical service server.
4. The meticulous monitoring of a group of LTE broadband clusters of claim 3, wherein when the meticulous monitoring activation responses are meticulous monitoring activation success responses, the method further comprises:
sending meticulous monitoring group call requests to the key task service client when the key task service server determines that the group conversation of the group needing meticulous monitoring is in an established state, wherein the meticulous monitoring group call requests comprise the identification of the group needing meticulous monitoring;
the mission-critical service client returning meticulous listening group call responses to the meticulous listening group call requests to the mission-critical service server.
5. The method of claim 4, wherein the method of meticulous monitoring of the group in the LTE broadband cluster,
when the meticulous monitoring group call response is meticulous monitoring group call success response, the mission critical service server joins the mission critical service client into the group conversation.
6. The method of claim 1, wherein the method of meticulous monitoring of a group of LTE broadband clusters,
and when the meticulous monitoring group call response is meticulous monitoring group call success response, the key task service server adds the key task service client into the group conversation.
7. The method of claim 1, in which the method further comprises:
the method comprises the steps that a key task service client sends meticulous monitoring deactivation requests to a key task service server, wherein the meticulous monitoring deactivation requests comprise identifiers of groups needing to cancel meticulous monitoring;
and the key task service server returns meticulous monitoring and deactivation responses corresponding to the meticulous monitoring and deactivation requests to the key task service client.
8. The method of claim 7, further comprising:
and when the meticulous monitoring deactivation response is the meticulous monitoring deactivation success response, the group conversation of the group needing to cancel the meticulous monitoring is in the established state and the key task service client side is joined in the group conversation, the key task service client side is quitted from the group conversation.
9. A meticulous monitoring system of group in LTE broadband cluster, characterized by that, include the service client end of key task and service server of key task, wherein:
the system comprises a key task service client, a meticulous monitoring activation request and a meticulous monitoring activation request server, wherein the meticulous monitoring activation request comprises an identification of a group needing meticulous monitoring;
a critical task service server, configured to return meticulous monitoring activation responses, corresponding to the meticulous monitoring activation requests, to a critical task service client;
the key task service server is further configured to send a meticulous monitoring group call request to the key task service client after waiting for the meticulous monitoring-required group session to be established when the meticulous monitoring activation response is a meticulous monitoring activation successful response and the meticulous monitoring-required group session is not established, where the meticulous monitoring group call request includes an identifier of the meticulous monitoring-required group;
the key task service client is further configured to return meticulous monitoring group call responses corresponding to the meticulous monitoring group call requests to the key task service server.
10. The meticulous monitoring system of a group of LTE broadband clusters of claim 9, wherein,
the key task service server is used for returning meticulous monitoring activation failure response to the key task service client when the key task service server judges that the key task service client does not have meticulous monitoring authority; when the key task service server judges that the group needing careful monitoring does not have the meticulous monitoring authority, returning meticulous monitoring activation failure response to the key task service client; when the key task service server judges that the key task service client does not have meticulous monitoring authority and the group needing meticulous monitoring does not have meticulous monitoring authority, returning meticulous monitoring activation failure response to the key task service client; and when the key task service server judges that the key task service client has meticulous monitoring authority and the group needing meticulous monitoring has the meticulous monitoring authority, returning meticulous monitoring activation success response to the key task service client.
11. The meticulous monitoring system of groups in an LTE broadband cluster of claims 9 or 10,
before the mission-critical service client sends a meticulous monitoring activation request to a mission-critical service server, the group session of the group needing meticulous monitoring is in an established state.
12. The system of claim 11,
the key task serving server, when the meticulous monitoring activation response is a meticulous monitoring activation success response and it is determined that a group session of the group needing meticulous monitoring is in an established state, sending a meticulous monitoring group call request to the key task serving client, the meticulous monitoring group call request including an identification of the group needing meticulous monitoring;
the critical task service client is further configured to return meticulous monitoring group call responses corresponding to the meticulous monitoring group call requests to the critical task service server.
13. The meticulous monitoring system of a group of LTE broadband clusters of claim 12, wherein,
the mission critical service server is further configured to join the mission critical service client to the group session when the meticulous monitoring of group call responses is meticulous monitoring of group call successful responses.
14. The system of claim 9, in which,
the mission critical service server is further configured to join the mission critical service client to the group session when the meticulous monitoring of group call responses is meticulous monitoring of group call successful responses.
15. The meticulous monitoring system of a group of LTE broadband clusters of claim 14, wherein,
the key task service client is also used for sending meticulous monitoring deactivation requests to the key task service server, wherein the meticulous monitoring deactivation requests comprise the identifiers of the groups needing to cancel meticulous monitoring;
a critical task service server, further configured to return a meticulous listening deactivation response, corresponding to the meticulous listening deactivation request, to the critical task service client.
16. The meticulous monitoring system of a group of LTE broadband clusters of claim 15, wherein,
the key task service server is further configured to, when the meticulous monitoring deactivation response is a meticulous monitoring deactivation success response, the group session of the group for which the meticulous monitoring needs to be canceled is in an established state, and the key task service client has joined the group session, withdraw the key task service client from the group session.
17. A computer-readable storage medium having computer-readable instructions stored thereon for performing the meticulous monitoring of a group of the LTE broadband cluster of any of claims 1-8.
CN201910116483.4A 2019-02-15 2019-02-15 Meticulous monitoring method and meticulous monitoring system for group in LTE broadband cluster Active CN111586734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910116483.4A CN111586734B (en) 2019-02-15 2019-02-15 Meticulous monitoring method and meticulous monitoring system for group in LTE broadband cluster

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910116483.4A CN111586734B (en) 2019-02-15 2019-02-15 Meticulous monitoring method and meticulous monitoring system for group in LTE broadband cluster

Publications (2)

Publication Number Publication Date
CN111586734A CN111586734A (en) 2020-08-25
CN111586734B true CN111586734B (en) 2023-03-31

Family

ID=72114793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910116483.4A Active CN111586734B (en) 2019-02-15 2019-02-15 Meticulous monitoring method and meticulous monitoring system for group in LTE broadband cluster

Country Status (1)

Country Link
CN (1) CN111586734B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859650A (en) * 2006-03-27 2006-11-08 华为技术有限公司 Method for monitoring cluster service process and cluster communication system
CN102387259A (en) * 2011-10-20 2012-03-21 中兴通讯股份有限公司 Method, system and device for monitoring call of intra-group subscribers by telephone operator
CN103220631A (en) * 2012-01-18 2013-07-24 鼎桥通信技术有限公司 Trunked communication system, monitoring terminals and joining method thereof
CN105704681A (en) * 2014-11-25 2016-06-22 北京信威通信技术股份有限公司 Meticulous monitoring method of end-to-end encrypted call
CN105828351A (en) * 2015-01-06 2016-08-03 普天信息技术有限公司 Method and system for carrying out monitoring on terminal or group
WO2017003175A1 (en) * 2015-06-29 2017-01-05 Samsung Electronics Co., Ltd. Method and apparatus for providing service in a wireless communication system
CN107995662A (en) * 2016-10-27 2018-05-04 成都鼎桥通信技术有限公司 Motion management method and device in the cluster SC-PTM of LTE broadbands

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7221660B1 (en) * 2000-08-08 2007-05-22 E.F. Johnson Company System and method for multicast communications using real time transport protocol (RTP)
CA2914786C (en) * 2013-06-17 2021-06-22 Selex Es S.P.A. Sip extension for dmr networks matching pmr features
US10079822B2 (en) * 2014-06-30 2018-09-18 Intel IP Corporation Techniques for securely receiving critical communication content associated with a critical communication service
KR102520817B1 (en) * 2015-08-11 2023-04-12 삼성전자주식회사 A method of setting up a PTT group call in a wireless communication network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859650A (en) * 2006-03-27 2006-11-08 华为技术有限公司 Method for monitoring cluster service process and cluster communication system
CN102387259A (en) * 2011-10-20 2012-03-21 中兴通讯股份有限公司 Method, system and device for monitoring call of intra-group subscribers by telephone operator
CN103220631A (en) * 2012-01-18 2013-07-24 鼎桥通信技术有限公司 Trunked communication system, monitoring terminals and joining method thereof
CN105704681A (en) * 2014-11-25 2016-06-22 北京信威通信技术股份有限公司 Meticulous monitoring method of end-to-end encrypted call
CN105828351A (en) * 2015-01-06 2016-08-03 普天信息技术有限公司 Method and system for carrying out monitoring on terminal or group
WO2017003175A1 (en) * 2015-06-29 2017-01-05 Samsung Electronics Co., Ltd. Method and apparatus for providing service in a wireless communication system
CN107995662A (en) * 2016-10-27 2018-05-04 成都鼎桥通信技术有限公司 Motion management method and device in the cluster SC-PTM of LTE broadbands

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"S6-181363 pCR 23_784 Solution for MC service server providing discreet listening of group calls".《3GPP tsg_sa\wg6_missioncritical》.2018, *
S6-181023 "Key issue concerning group membership for discreet listening";Motorola Solutions;《3GPP tsg_sa\wg6_missioncritical》;20180716;全文 *

Also Published As

Publication number Publication date
CN111586734A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
CN107950010B (en) Merging active group calls
RU2316911C2 (en) Method and device for finishing participation of a user in group call in group communication network
US10123182B2 (en) Merging active group calls
JP2005312045A (en) Method and apparatus for dynamic group address creation
MXPA04007879A (en) A method and an apparatus for registering a user in a group communication network.
US10142808B2 (en) Floor control method and apparatus
US20150201079A1 (en) Method and Device for Distributing Mobile Attendant Call
WO2018098609A1 (en) Communication method and apparatus
US11251981B2 (en) Communication method and apparatus
CN110662179B (en) Call processing method and device based on LTE broadband trunking system
CN110166405B (en) Communication method, related device and system
US20110319117A1 (en) Method and apparatus for dynamically adding participants into an existing talk group
CN110166406A (en) Manage method, system and the relevant device of media transmission access
CN114554550A (en) Communication method and device for 5G access network and edge cloud gateway
CN111586734B (en) Meticulous monitoring method and meticulous monitoring system for group in LTE broadband cluster
CN112788738A (en) Code number processing method and device for public and private network convergence system
KR101011891B1 (en) Method and apparatus for determining pt server having controlling function
WO2019161721A1 (en) Correspondence processing method and device based on interworking rcs system
CN113365228A (en) Method and apparatus for switching to mission critical push-to-talk workgroup
CN113099391B (en) Method and system for independently deployed 5G system to bear MBMS
EP4075762A1 (en) Edge computing
CN110149596B (en) Group calling transfer method and storage medium
CN108093375B (en) Method for realizing calling service in station area and scheduling information server
CN113068275B (en) Multicast service realization method and device and communication equipment
CN113099389B (en) Method and system for independently deployed 5G system to bear MBMS

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant