作者: Ivan Ore , Jarkko T. Koskela , Kari Sipila , Lars Dalsgaard
DOI:
关键词:
摘要: Access verification is adaptively done using an identifier of a first or second length, by comparing field node address that has the determined length against locally stored access list. At least compared either added to list cell selection candidate nodes where allowed identifiers, excluded from it restricted identifiers. The in three sections. section service type, which UE can use determine whether not restricted/allowed. section, area ID group network nodes. plus third identifies one