Device and Method of Handling Radio Access Technology Tight Interworking of Two Cellular Systems

ABSTRACT

A network comprising a first base station (BS) and a second BS for handling a radio access technology (RAT) tight interworking, comprises the first BS connecting to a communication device via a first RAT; the first BS receiving a second message of a second RAT from the second BS, wherein the second message comprises a second transaction identifier (TI); the first BS transmitting a first message of the first RAT to the communication device via the first RAT, wherein the first message comprises the second message; the first BS receiving a first response message from the communication device; the second BS receiving a second response message from the first BS; and the second BS communicating via the second RAT with the communication device according to a configuration in the second message, when the first BS communicates via the first RAT with the communication device.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a divisional application of U.S. application Ser.No. 15/788,793, filed on Oct. 19, 2017, which claims the benefit of U.S.Provisional Application No. 62/410,860, filed on Oct. 21, 2016.

BACKGROUND OF THE INVENTION 1. Field of the Invention

The present invention relates to a communication device and a methodused in a wireless communication system, and more particularly, to acommunication device and a method of handling a radio access technologytight interworking of two cellular systems.

2. Description of the Prior Art

A long-term evolution (LTE) advanced (LTE-A) includes a carrieraggregation (CA), a Dual Connectivity (DC), a LTE transmission over anunlicensed spectrum (e.g., LTE-unlicensed (LTE-U) or licensed-assistedaccess (LAA)).

SUMMARY OF THE INVENTION

The present invention therefore provides a communication device andmethod for handling a radio access technology tight interworking of twocellular systems to solve the abovementioned problem.

A network comprising a first base station (BS) and a second BS forhandling a radio access technology (RAT) tight interworking, comprisesthe first BS of the network connecting to a communication device via afirst RAT; the first BS receiving a second message of a second RAT fromthe second BS of the network, wherein the second message comprises asecond transaction identifier (TI); the first BS transmitting a firstmessage of the first RAT to the communication device via the first RAT,wherein the first message comprises the second message and a first TI,and the second message configures the communication device to connect tothe second BS via the second RAT; the first BS receiving a firstresponse message of the first RAT from the communication device via thefirst RAT in response to the first message, wherein the first responsemessage comprises a second response message of the second RAT and thefirst TI, and the second response message comprises the second TI; thesecond BS receiving the second response message from the first BS inresponse to the second message; and the second BS communicating seconddata via the second RAT with the communication device according to aconfiguration of the second RAT in the second message, when the first BScommunicates first data via the first RAT with the communication device.

A method of handling a RAT tight interworking comprises a first BS of anetwork connecting to a communication device via a first RAT; the firstBS receiving a second message of a second RAT from a second BS of thenetwork, wherein the second message includes a second TI; the first BStransmitting a first message of the first RAT to the communicationdevice via the first RAT, wherein the first message includes the secondmessage and a first TI, and the second message configures thecommunication device to connect to the second BS via the second RAT; thefirst BS receiving a first response message of the first RAT from thecommunication device via the first RAT in response to the first message,wherein the first response message includes a second response message ofthe second RAT and the first TI, and the second response messageincludes the second TI; the second BS receiving the second responsemessage from the first BS in response to the second message; and thesecond BS communicating second data via the second RAT with thecommunication device according to a configuration of the second RAT inthe second message, when the first BS communicates first data via thefirst RAT with the communication device.

These and other objectives of the present invention will no doubt becomeobvious to those of ordinary skill in the art after reading thefollowing detailed description of the preferred embodiment that isillustrated in the various figures and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of a wireless communication systemaccording to an example of the present invention.

FIG. 2 is a schematic diagram of a communication device according to anexample of the present invention.

FIG. 3 is a flowchart of a process according to an example of thepresent invention.

FIG. 4 is a flowchart of a process according to an example of thepresent invention.

FIG. 5 is a flowchart of a process according to an example of thepresent invention.

FIG. 6 is a schematic diagram of an addition procedure according to anexample of the present invention.

FIG. 7 is a schematic diagram of a release procedure according to anexample of the present invention.

DETAILED DESCRIPTION

FIG. 1 is a schematic diagram of a wireless communication system 10according to an example of the present invention. The wirelesscommunication system 10 is briefly composed of a network and a pluralityof communication devices. The network and a communication device maycommunicate with each other via one or more carriers of licensed band(s)and/or unlicensed band(s). The network and the communication device maysimultaneously communicate with each other via one or multiple cells(e.g., one or multiple carriers) belonging to one or multiple basestation (BS). The abovementioned cells may be operated in the same ordifferent duplexing modes, i.e., frequency-division duplexing (FDD),time-division duplexing (TDD) and flexible duplexing.

In FIG. 1, the network and the communication devices are simply utilizedfor illustrating the structure of the wireless communication system 10.Practically, the network may be an evolved universal terrestrial radioaccess network (E-UTRAN) including at least one evolved Node-B (eNB).The network may be a fifth generation (5G) network including at leastone 5G BS which employs orthogonal frequency-division multiplexing(OFDM) and/or non-OFDM and a transmission time interval (TTI) shorterthan 1 ms (e.g. 1, 2, 3 or 4 OFDM symbols and 100 or 200 microseconds),to communicate with the communication devices. In general, a BS may alsobe used to refer any of the eNB and the 5G BS.

A communication device may be a user equipment (UE), a mobile phone, alaptop, a tablet computer, an electronic book, a portable computersystem, a vehicle, a ship or an aircraft. In addition, the network andthe communication device can be seen as a transmitter or a receiveraccording to direction (i.e., transmission direction), e.g., for anuplink (UL), the communication device is the transmitter and the networkis the receiver, and for a downlink (DL), the network is the transmitterand the communication device is the receiver.

A long-term evolution (LTE) and new radio (NR) tight interworking of a5G (e.g., NR) communication technology is discussed in 3rd GenerationPartnership Project (3GPP). In one example, the UE simultaneouslyconnects to a LTE BS (i.e., eNB) on at least one first carrier for a LTEcommunication and to a NR BS (i.e., gNB) on at least one second carrierfor a NR communication, e.g., a Dual Connectivity (DC) or an inter-BScarrier aggregation (CA). In another example, the UE simultaneouslyconnects to a gNB capable of a LTE communication and a NR communicationvia a first carrier for the LTE communication and via a second carrierfor the NR communication, e.g., an intra-eNB CA. Each of the firstcarrier and the second carrier may belong to a licensed spectrum or anunlicensed spectrum. However, it is not clear how to realize the LTE andNR tight interworking.

Besides the LTE and NR tight interworking described above, the UE may behanded over from a LTE radio access technology (RAT) to a NR RAT or fromthe NR RAT to the LTE RAT, i.e., inter-RAT handover. In one example, theUE only connecting to an eNB or simultaneously connecting to an eNB anda gNB receives an inter-RAT handover command indicating the UE tohandover to a gNB. In response to the inter-RAT handover command, the UEdoes not connect to the eNB. In one example, the UE only connecting to agNB or simultaneously connecting to an eNB and a gNB receives aninter-RAT handover command indicating the UE to handover to an eNB. Inresponse to the inter-RAT handover command, the UE does not connect tothe gNB.

FIG. 2 is a schematic diagram of a communication device 20 according toan example of the present invention. The communication device 20 may bea communication device or the network shown in FIG. 1, but is notlimited herein. The communication device 20 may include a processingcircuit 200 such as a microprocessor or Application Specific IntegratedCircuit (ASIC), a storage device 210 and a communication interfacingdevice 220. The storage device 210 may be any data storage device thatmay store a program code 214, accessed and executed by the processingcircuit 200. Examples of the storage device 210 include but are notlimited to a subscriber identity module (SIM), read-only memory (ROM),flash memory, random-access memory (RAM), hard disk, optical datastorage device, non-volatile storage unit, non-transitorycomputer-readable medium (e.g., tangible media), etc. The communicationinterfacing device 220 includes at least one transceiver and is used totransmit and receive signals (e.g., data, messages and/or packets)according to processing results of the processing circuit 200.

In the following embodiments, a UE is used for representing acommunication device in FIG. 1, to simplify the illustration of theembodiments.

FIG. 3 is a flowchart of a process 30 according to an example of thepresent invention. The process 30 is utilized in a UE, to handle a RATtight interworking. The process 30 includes the following steps:

Step 300: Start.

Step 302: Connect to a first BS via a first RAT.

Step 304: Receive a first message of the first RAT from the first BS viathe first RAT, wherein the first message includes a second message of asecond RAT and a first transaction identifier (TI), and the secondmessage configures the UE to connect to a second BS via the second RATand includes a second TI.

Step 306: Transmit a first response message to the first BS via thefirst RAT in response to the first message, wherein the first responsemessage includes the first TI and a second response message, and thesecond response message includes the second TI.

Step 308: Connect to the second BS via the second RAT in response to thesecond message.

Step 310: Communicate second data via the second RAT with the second BSaccording to a configuration of the second RAT in the second message,when communicating first data via the first RAT with the first BS.

Step 312: End.

According to the process 30, the RAT tight interworking can be realizedaccording to the above description. The first BS identifies atransaction with the UE according to the first TI, and the second BSidentifies a transaction with the UE according to the second TI.

Realization of the process 30 is not limited to the above description.The following examples may be applied to the process 30.

In one example, when the UE communicates with the first RAT and thesecond RAT according to the process 30, the UE receives a third messageof the first RAT from the first BS via the first RAT, wherein the thirdmessage includes a fourth message of the second RAT, and the fourthmessage configures the UE to connect to a third BS via the second RAT.Then, the UE transmits a third response message to the first BS via thefirst RAT in response to the third message. Accordingly, the UE connectsto the third BS via the second RAT in response to the fourth message.The UE may include a fourth response message of the second RAT in thethird response message. The third message and the third response messagemay include a third TI. The fourth message and fourth response messagemay include a fourth TI. The UE communicates (e.g., transmits orreceives) fourth data via the second RAT with the third BS according toa configuration of the second RAT in the fourth message, whencommunicating third data via the first RAT with the first BS.

In one example, the first BS, the second BS and the third BS are a sameBS or different BSs. In one example, a first container (e.g., a firstinformation element (IE)) defined in the first message includes thesecond message, and a second container (e.g., a second IE) defined inthe third message includes the fourth message. In one example, the firstBS sets a first value of the first TI in the first message, and the UEuses the first value of the first TI in the first response message. Thesecond BS sets a second value of the second TI in the second message,and the UE uses the second value of the second TI in the second responsemessage. The first BS sets a third value of the third TI in the thirdmessage, and the UE uses the third value of the third TI in the thirdresponse message. The second BS sets a fourth value of the fourth TI inthe fourth message, and the UE uses the fourth value of the fourth TI inthe fourth response message. In one example, the first BS and the secondBS set the first value and the second value independently. The first BSand the third BS set the third value and the fourth value independently.That is, a TI value determined by a BS has no correlation with a TIvalue determined by another BS.

In one example, the first data and the third data include a firstplurality of protocol data units (PDUs) of the first RAT, and the seconddata and the fourth data include a second plurality of PDUs of thesecond RAT. The UE does not transmit the second response message to thesecond BS directly. The UE does not transmit the fourth response messageto the third BS directly.

In one example, the first message, the first response message, the thirdmessage and the third response message are LTE radio resource control(RRC) messages, and the second message, the second response message, thefourth message and the fourth response message are NR/5G RRC messages.In one example, the first message and the third message are LTE RRCConnection Reconfiguration messages, and the first response message andthe third response message are LTE RRC Connection ReconfigurationComplete messages. In one example, the first message and the thirdmessage are LTE RRC messages defined for a LTE and NR tightinterworking, and the first response message and the third responsemessage are LTE RRC response messages defined for the LTE and NR tightinterworking. In one example, the second message and the fourth messageare NR/5G RRC Connection Reconfiguration messages, and the secondresponse message and the fourth response message are NR/5G RRCConnection Reconfiguration Complete messages. In one example, the secondmessage and the fourth message are NR/5G RRC messages defined for theLTE and NR tight interworking, and the second response message and thefourth response message are NR/5G RRC response messages defined for theLTE and NR tight interworking.

In one example, the first data and the third data include at least oneof a plurality of LTE PDUs (e.g., Media Access Control (MAC), Radio LinkControl (RLC) or Packet Data Convergence Protocol (PDCP) PDUs) andcontrol information on at least one LTE physical control channel (e.g.,Physical UL Control Channel (PUCCH), Physical DL Control Channel(PDCCH), Physical Random Access Channel (PRACH)), and the second dataand the fourth data include at least one of a plurality of NR/5G PDUs(e.g., MAC, RLC or PDCP PDUs) and control information on at least oneNR/5G physical control channel (e.g., PUCCH, PDCCH or PRACH).

In one example, the first message, the first response message, the thirdmessage and the third response message are NR/5G RRC messages, and thesecond message, the second response message, the fourth message and thefourth response message are LTE RRC messages. In one example, the firstmessage and the third message are NR/5G RRC Connection Reconfigurationmessages, and the first response message and the third response messageare NR/5G RRC Connection Reconfiguration Complete messages. In oneexample, the first message and the third message are NR/5G RRC messagesdefined for a LTE and NR tight interworking, and the first responsemessage and the third response message are NR/5G RRC response messagesdefined for the LTE and NR tight interworking. In one example, thesecond message and the fourth message are LTE RRC ConnectionReconfiguration messages, and the second response message and the fourthresponse message are LTE RRC Connection Reconfiguration Completemessages. In one example, the second message and the fourth message areLTE RRC messages defined for the LTE and NR tight interworking, and thesecond response message and the fourth response message are LTE RRCresponse messages defined for the LTE and NR tight interworking.

In one example, the first data and the third data include at least oneof a plurality of NR/5G PDUs (e.g., MAC, RLC or PDCP PDUs) and controlinformation on at least one NR/5G physical control channel (e.g., PUCCH,PDCCH, PRACH), and the second data and the fourth data include at leastone of a plurality of LTE PDUs (e.g., MAC, RLC or PDCP PDUs) and controlinformation on at least one LTE physical control channel (e.g., PUCCH,PDCCH, PRACH).

In one example, the UE performs a random access procedure to the secondBS or the third BS before or after transmitting the second responsemessage or the fourth response message, when connecting to the second BSor the third BS. The second message and the fourth message include arandom access configuration for the UE to perform the random accessprocedure according to the random access configuration.

In one example, a connection between the first BS and the second BS or aconnection between the first BS and the third BS is not secured. Thesecond BS or the third BS performs at least one of an integrityprotection and a ciphering on the second or fourth message according toat least one security key (e.g., key(s) for an integrity protection/anintegrity protection check and key(s) for a ciphering (e.g., anencryption)/a deciphering (e.g., a decryption)). The UE deciphers thesecond or fourth message according to the key(s) for the ciphering/thedeciphering and performs an integrity protection check on the second orfourth message (e.g., checks the integrity code is correct or not)according to the key(s) for the integrity protection/the integrityprotection check. The UE performs the at least one of the integrityprotection and the ciphering on the second or fourth response messageaccording to the at least one security key.

In one example, the second BS or third BS does not perform the integrityprotection and the ciphering on the second message or the fourthmessage. The UE does not perform the integrity protection and theciphering on the second response or fourth response message.

In one example, the first BS performs at least one of an integrityprotection and a ciphering on the first or third message according to atleast one security key (e.g., key(s) for an integrity protection/anintegrity protection check and key(s) for a ciphering/a deciphering).The UE deciphers the first or third message according to the key(s) forthe ciphering/the deciphering and performs an integrity protection checkon the first or third message (e.g., checks the integrity code iscorrect or not) according to the key(s) for the integrity protection/theintegrity protection check.

The UE performs the at least one of the integrity protection and theciphering on the first or third response message according to the atleast one security key. The first BS deciphers the first or thirdresponse message, performs an integrity protection check on the first orthird response message and transmits the second or fourth responsemessage to the second BS via the connection between the first BS and thesecond BS or to the third BS via the connection between the first BS andthe third BS.

In one example, the UE receives a message from the second or third BSvia the second RAT and transmits a response message responding themessage via the second RAT to the second or third BS. The second orthird BS performs the integrity protection and the ciphering on themessage according to at least one security key (e.g., key(s) for anintegrity protection/an integrity protection check and key(s) for aciphering (e.g., an encryption)/a deciphering (e.g., a decryption)) usedbetween the UE and the second or third BS. The UE performs the at leastone of the integrity protection (e.g., generates an integrity code fromthe response message) and the ciphering on the response messageaccording to the at least one security key (e.g., key(s) for anintegrity protection/an integrity protection check and key (s) foraciphering (e.g., an encryption)/a deciphering (e.g., a decryption)) usedbetween the UE and the second or third BS. The UE performs at least oneof a deciphering and an integrity protect check on the message accordingto the at least one security key. The second or third BS performs atleast one of a deciphering and an integrity protect check on theresponse message according to the at least one security key. In oneexample, the message and the response message are LTE RRC messages orNR/5G RRC messages as described above.

In one example, the UE receives a fifth message of the first RAT fromthe first BS via the first RAT, wherein the fifth message indicates arelease of the connection between the UE and the second BS. The UEtransmits a fifth response message to the first BS via the first RAT inresponse to the fifth message. The UE stops communicating (e.g.,transmitting or receiving) with the second BS in response to a releaserequest message.

In one example, the fifth message and the fifth response message includea fifth TI. The first BS sets a fifth value of the fifth TI in the fifthmessage, and the UE uses the fifth value of the fifth TI in the fifthresponse message. In one example, the fifth message and the fifthresponse message are LTE RRC messages or NR/5G RRC messages. The detailsof the LTE RRC messages and the NR/5G RRC messages can be referred tothe previous description, and are not narrated herein.

In one example, the first RAT is a LTE RAT (or called evolved universalterrestrial radio access (E-UTRA)), and the second RAT is a NR/5G RAT.In one example, the first BS is an eNB of a LTE RAT, and the second BSand the third BS are gNBs of a NR/5G RAT. In one example, the first RATis a NR/5G RAT, and the second RAT is a LTE RAT. In one example, thefirst BS is a gNB of a NR/5G RAT, and the second BS and the third BS areeNBs of a LTE RAT.

In one example, the configuration of the second RAT includes at leastone of a Physical configuration, a MAC configuration, a RLCconfiguration and a PDCP configuration. For example, the physicalconfiguration includes a transmission power configuration for a physicalchannel, a Hybrid Automatic Repeat Request (HARQ) feedback (e.g.,ACK/NAK) configuration, a channel state information (CSI) configuration,a reference signal configuration (e.g., a CSI reference signal), aphysical DL control channel configuration (e.g., a frequency location ofthe physical control channel, a resource allocation unit or a resourceallocation start position/offset), a physical UL control channelconfiguration, a physical DL shared channel (PDSCH) configuration, aphysical UL shared channel (PUSCH) configuration, a beam formingconfiguration, a Multi-input Multi-output (MIMO) configuration, atransmission mode configuration or a time-division duplexing (TDD)configuration. In one example, the MAC configuration includes at leastone of a timer or counter value for a MAC function (e.g., a bufferstatus reporting, a power headroom reporting or a HARQ), parameters fora logical channel prioritization, a semi-persistent scheduling (SPS)configuration and a length for a field (e.g., length indicator) used ina MAC PDU. In one example, the RLC configuration includes a logicalchannel configuration (e.g., a logical channel identity or a logicalchannel priority), a timer or counter value for a RLC function (e.g., anARQ, a reordering) or a length value for a field (e.g., a sequencenumber). In one example, the PDCP configuration includes a timer orcounter value for a PDCP function (e.g., an ARQ or a reordering) or alength value for a field (e.g., a sequence number).

In one example, the configuration of the second RAT includes a celladdition configuration. For example, the cell addition configurationindicates a first cell (or a first component carrier (CC)) of the secondBS. The UE connects to the first cell (or the first CC) according to thecell addition configuration. In one example, the configuration of thesecond RAT includes a cell removal configuration. For example, the UEconnects to a second cell (or a second CC) of the second BS, and thecell removal configuration configures the UE to disconnect from thefirst cell (or the first CC).

FIG. 4 is a flowchart of a process 40 according to an example of thepresent invention. The process 40 is utilized in a UE, to handle a RATtight interworking. The process 40 includes the following steps:

Step 400: Start.

Step 402: Connect to a first BS via a first RAT.

Step 404: Receive a message from the first BS via the first RAT.

Step 406: Determine that the message configures the UE to perform theRAT tight interworking or to perform an inter-RAT handover from thefirst RAT to a second RAT.

Step 408: Transmit a first response message to the first BS via thefirst RAT in response to the first message, connect to a second BS viathe second RAT in response to the message, transmit a second responsemessage of the second RAT to the second BS in response to the messageand communicate second data via the second RAT with the second BS whencommunicating first data via the first RAT with the first BS, whendetermining that the message configures the UE to perform the RAT tightinterworking.

Step 410: Not transmit the first response message to the first BS,disconnect from the first RAT, connect to the second BS via the secondRAT in response to the message, transmit a third response message of thesecond RAT to the second BS via the second RAT in response to themessage and communicate third data via the second RAT with the secondBS, when determining that the message configures the UE to perform theinter-RAT handover from the first RAT to the second RAT.

Step 412: End.

Realization of the process 40 is not limited to the above description.The following examples may be applied to the process 40. Examplesrelated to the process 30 may be applied to the process 40, and are notnarrated herein.

In one example, the message includes at least one of a first TI, asecond TI and a third TI, the first response message includes the firstTI, the second response message includes the second TI, and the thirdresponse message includes the third TI. In one example, the first BSsets a first value of the first TI in the message, and the UE uses thefirst value of the first TI in the first response message. In oneexample, the second BS sets a second value of the second TI in themessage, and the UE uses the second value of the second TI in the secondresponse message. In one example, the second BS sets a third value ofthe third TI in the message, and the UE uses the third value of thethird TI in the third response message. In one example, the first BS andthe second BS set the first value and the second value independently andset the first value and the third value independently.

FIG. 5 is a flowchart of a process 50 according to an example of thepresent invention. The process 50 is utilized in a network, to handle aRAT tight interworking. The process 50 includes the following steps:

Step 500: Start.

Step 502: A first BS of a network connects to a UE via a first RAT.

Step 504: The first BS receives a second message of a second RAT from asecond BS of the network, wherein the second message includes a secondTI.

Step 506: The first BS transmits a first message of the first RAT to theUE via the first RAT, wherein the first message includes the secondmessage and a first TI, and the second message configures the UE toconnect to the second BS via the second RAT.

Step 508: The first BS receives a first response message of the firstRAT from the UE via the first RAT in response to the first message,wherein the first response message includes a second response message ofthe second RAT and the first TI, and the second response messageincludes the second TI.

Step 510: The second BS receives the second response message from thefirst BS in response to the second message.

Step 512: The second BS communicates second data via the second RAT withthe UE according to a configuration of the second RAT in the secondmessage, when the first BS communicates first data via the first RATwith the UE.

Step 514: End.

Examples related to the process 30 may be applied to the process 50, andare not narrated herein. Realization of the process 50 is not limited tothe above description. The following examples may be applied to theprocess 50.

In one example, the first BS transmits an addition request message forthe UE to the second BS, to request the second BS to communicate datawith the UE, before receiving the second message of the second RAT fromthe second BS. In response to the addition request message, the secondBS transmits the second message to the first BS. When the first BSreceives the second message, the first BS includes the second message inthe first message. The first BS may configure the UE to report a signalstrength/quality of the second BS. The first BS may determine totransmit the addition request message, when the signal strength/qualityof the second BS is better than a threshold predetermined by the firstBS.

In one example, when the second BS connects to the UE via the secondRAT, the first BS receives a fourth message of the second RAT from athird BS of the network. The first BS transmits a third message of thefirst RAT to the UE via the first RAT, wherein the third messageincludes the fourth message, and the fourth message configures the UE toconnect to the third BS via the second RAT. The first BS receives athird response message of the first RAT responding the third messagefrom the UE via the first RAT. The third BS receives a fourth responsemessage of the second RAT responding the fourth message from the firstBS. The third BS communicates fourth data via the second RAT with the UEaccording to a configuration of the second RAT in the fourth message,when the first BS communicates third data via the first RAT with the UE.The third message and the third response message may include a third TI,and the fourth message and the fourth response message may include afourth TI, as described above.

In one example, the first BS determines to release a connection betweenthe UE and the second BS. The first BS transmits a release requestmessage to the second BS to indicate the release of the connection inresponse to the determination. The first BS transmits a fifth message ofthe first RAT to the UE via the first RAT in response to thedetermination, wherein the fifth message indicates the release of theconnection between the UE and the second BS. The first BS receives afifth response message responding the fifth message from the UE via thefirst RAT. The fifth message and the fifth response message may includea fifth TI (i.e., the same TI value). The second BS stops communicatingwith the UE in response to the release request message. That is, thefirst BS initiates a release of the connection between the second BS andthe UE. The fifth message does not include any message of the secondRAT. Furthermore, the release of the connection between the second BSand the UE may be initiated by the second BS.

In another example, the second BS determines to release the connectionbetween the UE and the second BS and transmits a release request messageto the first BS in response to the determination. The first BS receivesthe release request message for indicating the release of the connectionbetween the UE and the second BS. The second BS stops communicating withthe UE in response to the release request message/the determination. Thefirst BS transmits a sixth message of the first RAT to the UE via thefirst RAT in response to the release request message/the determination,wherein the sixth message indicates the release of the connectionbetween the UE and the second BS. The first BS receives a sixth responsemessage of the first RAT responding the sixth message from the UE viathe first RAT. The sixth message and the sixth response message mayinclude a sixth TI (i.e., the same TI value). In one example, the sixthmessage and the sixth response message are LTE RRC messages or NR/5G RRCmessages. The details of the LTE RRC messages and the NR/5G RRC messagescan be referred to the previous description, and are not narratedherein.

The examples for the process 50 can be referred to the previousdescription related to the process 30, and are not narrated herein.

FIG. 6 is a schematic diagram of an addition procedure 60 according toan example of the present invention. Operations of a UE, a first BS(e.g., eNB) and a second BS (e.g., gNB) in FIG. 6 are described asfollows. The UE communicates with the first BS via a first RAT (e.g., aLTE RAT), and communicates with the second BS via a second RAT (e.g., aNR/5G RAT). The first BS communicates with the second BS via the secondRAT. The first BS transmits an addition request message for the UE tothe second BS (Step 600). The second BS transmits a NR/5G RRC ConnectionReconfiguration message to the first BS in response to the additionrequest message (Step 602). The first BS transmits a LTE RRC ConnectionReconfiguration message to the UE in response to the reception of theNR/5G RRC Connection Reconfiguration message, wherein the LTE RRCConnection Reconfiguration message includes the NR/5G RRC ConnectionReconfiguration message (Step 604). The UE transmits a LTE RRCConnection Reconfiguration Complete message to the first BS in responseto the reception of the LTE RRC Connection Reconfiguration message (Step606). Accordingly, the UE can configure a connection between the secondBS and the UE via the second RAT in response to the NR/5G RRC ConnectionReconfiguration message. The first BS transmits the NR/5G RRC ConnectionReconfiguration Complete message to the second BS in response to thereception of the NR/5G RRC Connection Reconfiguration message (Step608).

FIG. 7 is a schematic diagram of a release procedure 70 according to anexample of the present invention. Operations of a UE, a first BS (e.g.,eNB) and a second BS (e.g., gNB) in FIG. 7 are described as follows. TheUE communicates with the first BS via a first RAT (e.g., a LTE RAT), andthe first BS communicates with the second BS via a second RAT (e.g., aNR/5G RAT). The first BS transmits a release request message forindicating a release of the connection between the second BS and the UEto the second BS (Step 700). The first BS transmits a LTE RRC ConnectionReconfiguration message to the UE (Step 702). The UE transmits a LTE RRCConnection Reconfiguration Complete message to the first BS in responseto the reception of the LTE RRC Connection Reconfiguration message (Step704). Accordingly, the UE can release the connection between the secondBS and the UE in response to the LTE RRC Connection Reconfigurationmessage.

Those skilled in the art should readily make combinations, modificationsand/or alterations on the abovementioned description and examples. Forexample, the skilled person easily makes new embodiments of the networkbased on the embodiments and examples of the UE, and makes newembodiments of the UE based on the embodiments and examples of thenetwork. The abovementioned description, steps and/or processesincluding suggested steps can be realized by means that could behardware, software, firmware (known as a combination of a hardwaredevice and computer instructions and data that reside as read-onlysoftware on the hardware device), an electronic system, or combinationthereof. An example of the means may be the communication device 20. Anyof the above processes and examples above may be compiled into theprogram code 214.

To sum up, the present invention provides a method and a communicationdevice for handling a RAT tight interworking of two cellular systems.The communication device connects to the second BS via the second RATaccording to the LTE RRC messages and the NR/5G RRC messages transmittedby the communication device, the first BS and the second BS. Thus, theRAT tight interworking of the two cellular systems can be realized.

Those skilled in the art will readily observe that numerousmodifications and alterations of the device and method may be made whileretaining the teachings of the invention. Accordingly, the abovedisclosure should be construed as limited only by the metes and boundsof the appended claims.

What is claimed is:
 1. A network comprising a first base station (BS) and a second BS for handling a radio access technology (RAT) tight interworking, comprising: the first BS of the network connecting to a communication device via a first RAT; the first BS receiving a second message of a second RAT from the second BS of the network, wherein the second message comprises a second transaction identifier (TI); the first BS transmitting a first message of the first RAT to the communication device via the first RAT, wherein the first message comprises the second message and a first TI, and the second message configures the communication device to connect to the second BS via the second RAT; the first BS receiving a first response message of the first RAT from the communication device via the first RAT in response to the first message, wherein the first response message comprises a second response message of the second RAT and the first TI, and the second response message comprises the second TI; the second BS receiving the second response message from the first BS in response to the second message; and the second BS communicating second data via the second RAT with the communication device according to a configuration of the second RAT in the second message, when the first BS communicates first data via the first RAT with the communication device.
 2. The network of claim 1, further comprising: the first BS transmitting an addition request message for the communication device to the second BS, to request the second BS to communicate data with the communication device, before receiving the second message of the second RAT from the second BS.
 3. The network of claim 1, wherein the first data comprises at least one of a plurality of long-term evolution (LTE) PDUs and control information on at least one LTE physical control channel, and the second data comprises at least one of a plurality of new radio (NR)/fifth generation (5G) PDUs and control information on at least one NR/5G physical control channel.
 4. The network of claim 1, wherein the first BS deciphers the first response message, performs an integrity protection check on the first response message and transmits the second response message to the second BS via a connection between the first BS and the second BS, when receiving the first response message.
 5. The network of claim 1, further comprising: the first BS determining to release a connection between the communication device and the second BS; the first BS transmitting a release request message to the second BS to indicate the release of the connection in response to the determination; the first BS transmitting a third message of the first RAT to the communication device via the first RAT in response to the determination, wherein the third message indicates the release of the connection between the communication device and the second BS; and the first BS receiving a third response message responding the third message from the communication device via the first RAT.
 6. The network of claim 1, further comprising: the first BS receiving a release request message for indicating a release of a connection between the communication device and the second BS; the first BS transmitting a fourth message of the first RAT to the communication device via the first RAT in response to the release request message, wherein the fourth message indicates the release of the connection between the communication device and the second BS; and the first BS receiving a fourth response message responding the fourth message from the communication device via the first RAT.
 7. A method for handling a radio access technology (RAT) tight interworking, comprising: a first base station (BS) of a network connecting to a communication device via a first RAT; the first BS receiving a second message of a second RAT from a second BS of the network, wherein the second message comprises a second transaction identifier (TI); the first BS transmitting a first message of the first RAT to the communication device via the first RAT, wherein the first message comprises the second message and a first TI, and the second message configures the communication device to connect to the second BS via the second RAT; the first BS receiving a first response message of the first RAT from the communication device via the first RAT in response to the first message, wherein the first response message comprises a second response message of the second RAT and the first TI, and the second response message comprises the second TI; the second BS receiving the second response message from the first BS in response to the second message; and the second BS communicating second data via the second RAT with the communication device according to a configuration of the second RAT in the second message, when the first BS communicates first data via the first RAT with the communication device.
 8. The method of claim 7, further comprising: the first BS transmitting an addition request message for the communication device to the second BS, to request the second BS to communicate data with the communication device, before receiving the second message of the second RAT from the second BS.
 9. The method of claim 7, wherein the first data comprises at least one of a plurality of long-term evolution (LTE) PDUs and control information on at least one LTE physical control channel, and the second data comprises at least one of a plurality of new radio (NR)/fifth generation (5G) PDUs and control information on at least one NR/5G physical control channel.
 10. The method of claim 7, wherein the first BS deciphers the first response message, performs an integrity protection check on the first response message and transmits the second response message to the second BS via a connection between the first BS and the second BS, when receiving the first response message.
 11. The method of claim 7, further comprising: the first BS determining to release a connection between the communication device and the second BS; the first BS transmitting a release request message to the second BS to indicate the release of the connection in response to the determination; the first BS transmitting a third message of the first RAT to the communication device via the first RAT in response to the determination, wherein the third message indicates the release of the connection between the communication device and the second BS; and the first BS receiving a third response message responding the third message from the communication device via the first RAT.
 12. The method of claim 7, further comprising: the first BS receiving a release request message for indicating a release of a connection between the communication device and the second BS; the first BS transmitting a fourth message of the first RAT to the communication device via the first RAT in response to the release request message, wherein the fourth message indicates the release of the connection between the communication device and the second BS; and the first BS receiving a fourth response message responding the fourth message from the communication device via the first RAT. 