CN107018051B - Network access method based on queuing - Google Patents
Network access method based on queuing Download PDFInfo
- Publication number
- CN107018051B CN107018051B CN201710195536.7A CN201710195536A CN107018051B CN 107018051 B CN107018051 B CN 107018051B CN 201710195536 A CN201710195536 A CN 201710195536A CN 107018051 B CN107018051 B CN 107018051B
- Authority
- CN
- China
- Prior art keywords
- access
- network
- user
- queuing
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a network access method based on queuing, which mainly solves the problem of broadband resource waste caused by a large number of access requests sent by users during intensive access under high load of a network in the prior art. The scheme is as follows: when the number of users of the target network service reaches the access control requirement, the access of subsequent user access requests is suspended in a mode of queuing according to a first-come first-serve criterion, the queuing information is periodically updated and sent to the equipment requesting to access the network, and the queuing users are successively authorized to access the network according to the current network operation condition, so that the situation that too many users repeatedly try to access the network when the network traffic is busy is avoided. The invention is based on the principle of fair access, reduces unnecessary invalid access attempts and improves the network access efficiency; the normal operation of the network is guaranteed, and the user satisfaction is improved.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a queuing-based network access method which can be used for reducing the times of invalid user access applications during intensive access under high network load, protecting a network and improving the user satisfaction.
Background
The network is easy to be paralyzed in the service peak, mainly because a large number of users need to access the network, and the network has an access control mechanism, when the number of the accessed users reaches a certain number, the access control mechanism of the network is started, and the users applying for access subsequently can be refused to access the network; however, when the user is denied access, the user often tries to apply for access again, and repeatedly operates for a plurality of times to obtain an earlier opportunity to access the network, and the successful access of the user to the network has great randomness; when the users refused to access the network try to access repeatedly, a large amount of messages for applying for accessing the network appear on the target network, and therefore bandwidth resources are occupied.
In patent application No. 201610687036.0 entitled "a network access method and apparatus", a method is proposed that includes obtaining access selection parameters, calculating access membership of each access network according to the selection parameters, and selecting an access network according to the access membership. Another method for performing access control based on a backoff policy is to set a backoff time for a user equipment requesting access, and it is expected to alleviate a collision by the backoff policy and further to promote the resolution of the collision, the policy based on access Class barring (acb) is that an access network broadcasts an access probability and AC barring time for the user equipments within access Class AC (access Class) 0-9, and then each user equipment decides whether to initiate a random access process immediately by its randomly generated probability, if the probability value generated by each user equipment is less than the probability value broadcasted by the access network, then the random access is initiated, otherwise, the access behavior for a period of time is automatically barred, the policy is more suitable for processing the user equipments in the conventional cellular network, and most of the current research on network access control is concentrated in the wireless access field, the method is still highly random, does not meet fair access criteria, and is not transparent to the operator of the access device, who cannot determine when he can access the network.
When the information of the user applying for accessing the target network and the target network cannot be interacted in time, the user applying for accessing the target network can not determine when the user can access the network, subjectively, the more times of applying for accessing is, the larger the success rate of accessing is, so that the situation that the user which can not successfully access the network repeatedly sends an access request occurs, the increase of the times of invalid access application causes the waste of broadband resources, network operation faults are caused, and the satisfaction degree of the user is reduced.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a network access method based on queuing to avoid the problem of broadband resource waste caused by repeated sending of access requests by users when the network is intensively accessed under high load, thereby protecting the network and improving the satisfaction degree of the users.
The technology of the invention is as follows: adopting a mode of queuing users needing to access the network, when the number of users of the target network service reaches the access control requirement, queuing the subsequent user access network request according to the first come first serve criterion, periodically updating and sending the queuing information to the equipment requesting to access the network, and finally operating the access network by the user requesting to access the network according to the prompt of the queuing information on the equipment; the waste of invalid application to network resources is reduced, the network is protected from paralysis, and the user satisfaction is improved. The method comprises the following implementation steps:
1) setting network parameters:
setting various parameters of the target network, including: a) a system default queuing number, b) a user number authorized to be accessed at one time, c) an access control user threshold, d) a queuing information updating period, and e) an access time window time length;
2) the user sends the request information of accessing the target network:
a user needing to access a target network sends access request information to the target network through the existing network, wherein the access request information comprises an identification number (ID) of the user and a queuing number defaulted by a system;
3) the target network counts the number of users of the current service:
after a target network is started, setting the number of service users to be 0, adding 1 to the number of the service users when one user is successfully accessed in the working process, subtracting 1 from the number of the service users when one user exits the network, and repeating the steps, wherein the number of the service users of the target network is counted in real time by the target network, so that the number of the service users of the target network is equal to the number of the current service users of the target network;
4) the user accesses the target network:
the target network judges the number of users of the current service, determines whether the number of users is greater than or equal to a preset access control user threshold, if the number of users of the current service is greater than or equal to the access control user threshold, an access control mechanism is started, and the step (4.1) is executed; otherwise, the access control mechanism is not started, and the step (4.2) is executed;
(4.1) suspending access: the target network queues the user newly applying for network access according to the first-come first-serve criterion and distributes a queuing number, and the queuing information is sent to the equipment requesting for network access; the target network updates the queuing information periodically and sends out periodically, the user requesting to access the network determines the time waiting for access according to the queuing information on the equipment, applies for accessing the network again when obtaining authorization, and the target network receives the network access request of the authorized user and permits the authorized user to access the network;
(4.1a) the target network queues the temporarily network-inaccessible users:
when the access control mechanism is started, the target network queues users which can not access the network temporarily and gives out queue numbers, and simultaneously sends access response information, wherein the information carries the corresponding queue numbers of the users and the maximum queue number of the current service user of the target network;
(4.1b) the target network sends the maximum queuing number of the current service user:
the target network sends the maximum queuing number information of the current service user to the user to be accessed in the queue according to the queuing information updating period; after receiving the information indication popup, the user determines the time needing to wait for access according to the queuing information on the equipment, and determines to continue waiting or close the popup, if closing is selected, the user indicates that the queuing opportunity is given up, at the moment, the user sends a queuing giving up indication to the target network, and the target network removes the user from the queue list after receiving the indication;
(4.1c) the target network authorizes the user to access the network:
when the number of the target network service users is reduced, the target network authorizes a plurality of users waiting to be accessed to access the network, after the users waiting to be accessed in line receive authorization information sent by the target network, the network access information indicates that the popup window is changed into an authorized access popup window, the popup window adopts a countdown structure to display time allowed to access the target network, reminds the users to access the network within the time range, and the authorized users can select to click an access button at the moment so as to apply for network access and also can click a abandon button to abandon the obtained authorization;
(4.1d) authorized user sends network access request:
the authorized user initiates a network access request through an authorized access popup within a specified time range, wherein the network access request information carries a queuing number of the user;
(4.1e) authorized user access to network
In the time range allowing the access to the target network, the target network receives the network access request of the authorized user and permits the user to access the network; and when all the users authorized at this time have access to the network or the time allowed to access the target network is over, returning to the step (4.1 b).
(4.2) normal access: the target network accepts the network access request of the user, processes the request information and allows the access to the network.
The existing network in the step 2) comprises a wireless network and a wired network; the user's ID uses IP, MAC or a combination of both; the default queuing number of the system is a system default value, the system default value is configured by a network administrator, is the same for all users, and is only used for distinguishing the first access application users.
And (4.1) subtracting the maximum queuing number of the current service user of the network from the queuing number allocated to the user for waiting for access in the step (4.1b) and estimating.
Compared with the prior art, the invention has the following advantages:
firstly, improving the satisfaction degree of users:
the invention introduces a queuing mechanism in a network access control state, authorizes the user to access according to the number size of queuing, and embodies a fair access principle of first-come first-served; the user can know the dynamic information of the network in time, thereby reducing unnecessary invalid access attempts, improving the satisfaction degree of the user and ensuring the normal operation of the network.
Secondly, improving the network access efficiency:
the invention sends authorization access information to users with application access conditions in a network access control state, authorizes a plurality of users to access a network at one time, sets an authorization access time window, and waits for the authorized users to send network access request information within the time specified by the authorization access time window; on the premise of embodying fair access, the success rate of user network access is ensured and the network access efficiency is improved.
Drawings
FIG. 1 is a flow chart of a method implementation of the present invention;
FIG. 2 is a diagram illustrating a pop-up window for network access information indication on a device when a user is waiting in a queue according to the present invention;
FIG. 3 is a schematic diagram of an authorized access popup on a device when a queued user is authorized to access a network in accordance with the present invention;
Detailed Description
The method of the present invention is further described in detail and in full with reference to the accompanying drawings, in which:
referring to fig. 1, the network access method based on queuing according to the present invention includes the following steps:
step 1) setting network parameters:
setting various parameters of the target network, including: a) the system defaultQueueNumber is a number which is carried by a user applying for accessing to a network for the first time and is a fixed identifier which is the same for all users and is only used for distinguishing the user applying for the first time; b) the number of users granted at one time is preferably greater than or equal to 2, and because the authorized users have the possibility of giving up network access, the access rate can be better ensured by multiple users granted at one time; c) a controlledthreshold is set as the number of service users when the network can provide the best service state, that is, when the number of users of the network service is slightly larger than the threshold of the number of user accesses, the network can still normally operate in the state just exceeding the limit number, but the service quality is reduced; d) the queuing information updating period queueUpdatePeriod is determined according to the frequency of increase and decrease changes of queuing users on the target network, if the increase and decrease changes of the users on the target network are faster, the updating period is set to be shorter, and if the increase and decrease changes of the users on the target network are slower, the updating period is set to be longer, so that the requirement that the users know the dynamic state of the network queuing information in time is met; e) the access time window time length grantedAccessDuration is a time limit for obtaining the permission of the authorized user to access the network, and is used for reminding the authorized user to initiate a network access request in the time range and accessing the network as soon as possible; all the above items can be set by the network administrator according to the actual conditions of the respective networks.
Step 2) the user sends the request information of the access target network:
a user needing to access a target network sends access request information to the target network through the existing wireless network or wired network, wherein the access request information comprises an identification number (ID) of the user and a queuing number defaulted by a system; the user ID may be an internet protocol address IP, a hardware address MAC or other address for identifying the user, or a combination of several addresses.
Step 3), the target network counts the number of users of the current service:
the target network needs to count the number of users in service at any time, when a new user accesses, the number of corresponding new access users is increased, and when a user exits, the number of corresponding exiting users is reduced; after the target network is started, the number of the service users of the target network is set to be 0, the number of the service users of the target network is increased by 1 when one user is successfully accessed in the working process, the number of the service users of the target network is decreased by 1 when one user exits the network, and by analogy, the target network counts the number of the current service users in real time, so that the numerical value of the number of the target network service users is equal to the number of the current service users of the target network.
Step 4) judging whether the number of the users currently served is larger than or equal to the threshold of the access control user:
when processing an access request of an access user, the target network firstly judges the number of users of the current service to determine whether the number of users is greater than or equal to a preset access control user threshold, and if the number of users of the current service is greater than or equal to the access control user threshold, the access control mechanism is started, so that the subsequent users are prevented from entering the network, and the purpose of limiting the number of users of the current service is achieved. In the network access control state, executing the step (4.1); otherwise, the access control mechanism is not started, the user normally accesses the network, and the step (4.2) is executed;
step (4.1) suspending access:
when the number of the accessed users is larger than or equal to the preset access control user threshold on the target network, the target network temporarily blocks the subsequent newly applied network access users who want to enter the network due to the opening of the access control mechanism, the network access time of the part of users is delayed, and the users in the queue are sequentially authorized to access the network according to the first-come-first-serve principle after being queued according to the time sequence; the target network allocates queuing numbers for users who newly apply for network access, and sends queuing information to the equipment requesting for network access, the queuing information is periodically updated and periodically sent, the users requesting for network access determine the time waiting for access according to the queuing information on the equipment, the users apply for network access again when obtaining authorization, the target network receives the network access request of the authorized user and grants the authorized user to access the network, and the occurrence of network paralysis and other faults is avoided by the mode of suspending access.
Step (4.1a), the target network queues the users which can not access the network temporarily:
when the target network is busy, under the action of the access control mechanism, the target network does not temporarily accept new user access; at this moment, the network queues the part of users which can not access the network temporarily according to the rule of first-come first-serve and gives out a queuing number, and simultaneously sends access response information, wherein the information carries the corresponding queuing number of the user and the maximum queuing number of the current service user of the target network, after the user applying for accessing the target network receives the access response information, a network access information indication popup window is generated on the equipment of the user, as shown in figure 2, wherein the network access information indication popup window comprises the queuing number, the maximum queuing number of the current service user and the network access information indication popup window with waiting time, and the waiting time information is determined by the difference between the local time of receiving the access response information and the real-time local time;
step (4.1b) the target network sends the maximum queuing number of the current service user:
the target network sends the maximum queuing number information of the current service user to the user to be accessed in the queue according to the queuing information updating period, so that the user to be accessed can update the information in the network access information indication popup window immediately; after receiving the information, the user waiting for access in line performs subtraction operation by using the queuing number and the maximum queuing number of the current service user of the target network to know how many users in front of the user wait for access, further estimates the waiting time needed for accessing the target network, and decides to continue waiting or quit waiting, if the user wants to quit waiting, the user clicks a small fork at the upper right corner of the figure 2 to close a popup window, so that the queuing opportunity can be abandoned, after the network access information indicates that the popup window is closed, the user can send a queuing abandoning instruction to the target network, and the target network removes the user from the queue list after receiving the instruction.
Step (4.1c) the target network authorizes the user to access the network:
after the number of the target network service users is reduced, the target network authorizes a plurality of users waiting for access to access the network and sends an access time window to each authorized user, in order to ensure that after the target network sends authorization information, the users waiting for access are ensured to send access requests by a large probability event, and the number of the users authorized for access at one time by the target network is more than 2; after a user waiting for access in a queue receives authorization information sent by a target network, network access information on equipment indicates that a popup window is changed into an authorized access popup window, as shown in fig. 3, the popup window adopts a countdown structure to display time allowed to access the target network, and reminds the user to access the network within the time range, meanwhile, the window comprises an access button and a abandon button for the user to select, at the moment, the authorized user can select to click the access button to apply for accessing the target network, and can also click the abandon button to abandon the authorization obtained at this time, so that the user exits the queue.
Step (4.1d) authorized user sends network access request:
the authorized user initiates a network access request through an authorized access popup within a specified time range, wherein the network access request information carries a queuing number of the user;
step (4.1e) authorized user accessing network
In the time range allowing the target network to be accessed, the target network receives the network access request of the authorized user, permits the user to access the network and updates the maximum queuing number of the current service user of the target network; and when all the users authorized at this time have access to the network or the time allowed to access the target network is over, executing the step (4.1 b).
Step (4.2) normal access:
when the number of the accessed users is smaller than the preset access control user threshold on the target network, the access control mechanism is not started, and the target network receives the request of the users for accessing the network, processes the request information and allows the users to access the network; at the moment, the user applying for network access can normally access the network to obtain the service without queuing and waiting.
Referring to fig. 2, a popup is indicated for a network access message generated on a device of a user during queuing waiting in the present invention, where the popup includes a queuing number allocated to the queued user, a maximum queuing number of a current service user of a target network, and a user waiting time; the waiting time information is obtained by subtracting the real-time local time from the local time when the user equipment receives the access response information, and is displayed to the user; the information window is convenient for a user to know access information and network service information of a target network in real time, the user is prevented from blindly sending an access application due to an unknown condition, unnecessary waste of network resources is caused by repeated access attempts, and the repeated access attempts have high randomness, the success rate of network access is low, and the satisfaction degree of the user is influenced.
Referring to fig. 3, the invention is an authorized access popup displayed on a device of a user waiting for access in line after receiving authorization information sent by a target network, wherein the popup represents that the user enters an authorized access state from a waiting in line state; at the moment, the network access information displayed to the user indicates that the popup is replaced by the authorized access popup in a queuing state, a countdown structure is adopted in the authorized access popup to display the time for allowing the access to the target network, the user is reminded of accessing the network in the time range, meanwhile, the window comprises an access button and a abandon button for the user to select, the access button is clicked to indicate that the authorized user applies for accessing the target network, and the abandon button is clicked to indicate that the authorized user abandons the access opportunity and quits the queue; on the premise of embodying fair access, the information window adopts a countdown mode to ensure access efficiency, so that a user can conveniently determine an access time point, the times of sending an access request by the user are reduced, and the probability of successful access of the user to a target network is improved.
The foregoing description is only an example of the present invention and is not intended to limit the invention, so that it will be apparent to those skilled in the art that various changes and modifications in form and detail may be made therein without departing from the spirit and scope of the invention.
Claims (6)
1. A network access method based on queuing comprises the following steps:
1) setting network parameters:
setting various parameters of the target network, including: a) a system default queuing number, b) a user number authorized to be accessed at one time, c) an access control user threshold, d) a queuing information updating period, and e) an access time window time length;
2) the user sends the request information of accessing the target network:
a user needing to access a target network sends access request information to the target network through the existing network, wherein the access request information comprises an identification number (ID) of the user and a queuing number defaulted by a system;
3) the target network counts the number of users of the current service:
after a target network is started, setting the number of service users to be 0, adding 1 to the number of the service users when one user is successfully accessed in the working process, subtracting 1 from the number of the service users when one user exits the network, and repeating the steps, wherein the number of the service users of the target network is counted in real time by the target network, so that the number of the service users of the target network is equal to the number of the current service users of the target network;
4) the user accesses the target network:
the target network judges the number of users of the current service, determines whether the number of users is greater than or equal to a preset access control user threshold, if the number of users of the current service is greater than or equal to the access control user threshold, an access control mechanism is started, and the step (4.1) is executed; otherwise, the access control mechanism is not started, and the step (4.2) is executed;
(4.1) suspending access: the target network queues the user newly applying for network access according to the first-come first-serve criterion and distributes a queuing number, and the queuing information is sent to the equipment requesting for network access; the target network updates the queuing information periodically and sends out periodically, the user requesting to access the network determines the time waiting for access according to the queuing information on the equipment, applies for accessing the network again when obtaining authorization, and the target network receives the network access request of the authorized user and permits the authorized user to access the network;
(4.2) normal access: the target network accepts the network access request of the user, processes the request information and allows the access to the network.
2. A queuing-based network access method as claimed in claim 1, characterized in that: the implementation steps of the deferred access in the step (4.1) are as follows:
(4.1a) the target network queues the temporarily network-inaccessible users:
when the access control mechanism is started, the target network queues users which can not access the network temporarily and gives out queue numbers, and simultaneously sends access response information, wherein the information carries the corresponding queue numbers of the users and the maximum queue number of the current service user of the target network;
(4.1b) the target network sends the maximum queuing number of the current service user:
the target network sends the maximum queuing number information of the current service user to the user to be accessed in the queue according to the queuing information updating period; after receiving the information indication popup, the user determines the time needing to wait for access according to the queuing information on the equipment, and determines to continue waiting or close the popup, if closing is selected, the user indicates that the queuing opportunity is given up, at the moment, the user sends a queuing giving up indication to the target network, and the target network removes the user from the queue list after receiving the indication;
(4.1c) the target network authorizes the user to access the network:
when the number of the target network service users is reduced, the target network authorizes a plurality of users waiting to be accessed to access the network, after the users waiting to be accessed in line receive authorization information sent by the target network, the network access information indicates that the popup window is changed into an authorized access popup window, the popup window adopts a countdown structure to display time allowed to access the target network, reminds the users to access the network within the time range, and the authorized users can select to click an access button at the moment so as to apply for network access and also can click a abandon button to abandon the obtained authorization;
(4.1d) authorized user sends network access request:
the authorized user initiates a network access request through an authorized access popup within a specified time range, wherein the network access request information carries a queuing number of the user;
(4.1e) authorized user access to network
In the time range allowing the access to the target network, the target network receives the network access request of the authorized user and permits the user to access the network; and when all the users authorized at this time have access to the network or the time allowed to access the target network is over, returning to the step (4.1 b).
3. A queuing-based network access method as claimed in claim 1, characterized in that: the existing network in the step 2) comprises a wireless network and a wired network.
4. A queuing-based network access method as claimed in claim 1, characterized in that: the identification number ID of the user in step 2) uses an Internet protocol address IP, a hardware address MAC or a combination of the two.
5. A queuing-based network access method as claimed in claim 1, characterized in that: the default queuing number of the system in the step 2) is a system default value, the system default value is configured by a network administrator, is the same for all users, and is only used for distinguishing the first access application users.
6. A queuing-based network access method as claimed in claim 2, characterized in that: and (4.1) subtracting the maximum queuing number of the current service user of the network from the queuing number allocated to the user for waiting for access in the step (4.1b) and estimating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710195536.7A CN107018051B (en) | 2017-03-29 | 2017-03-29 | Network access method based on queuing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710195536.7A CN107018051B (en) | 2017-03-29 | 2017-03-29 | Network access method based on queuing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107018051A CN107018051A (en) | 2017-08-04 |
CN107018051B true CN107018051B (en) | 2020-12-15 |
Family
ID=59444994
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710195536.7A Active CN107018051B (en) | 2017-03-29 | 2017-03-29 | Network access method based on queuing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107018051B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112601289B (en) * | 2020-12-07 | 2021-10-01 | 广州技象科技有限公司 | Multi-user access method and device based on uplink data transmission |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102469219A (en) * | 2010-11-12 | 2012-05-23 | 中兴通讯股份有限公司 | Call-center-based queuing processing method and system |
US20130060652A1 (en) * | 2011-05-31 | 2013-03-07 | Mark Calvano | Increasing the utility of opportunistic and time critical goods and services |
CN103298062B (en) * | 2013-05-21 | 2016-08-10 | 华为技术有限公司 | Access method and the access point of wireless network |
CN105163370B (en) * | 2015-08-05 | 2018-12-07 | 中国联合网络通信集团有限公司 | Network insertion processing method and access point |
CN105141978B (en) * | 2015-08-07 | 2018-05-18 | 小米科技有限责任公司 | Video access control method, device and Cloud Server |
-
2017
- 2017-03-29 CN CN201710195536.7A patent/CN107018051B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107018051A (en) | 2017-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017000673A1 (en) | Shared cache allocation method and apparatus and computer storage medium | |
KR101412235B1 (en) | Method and apparatus for screening request to establish sip session | |
CN111756487B (en) | Resource reselection method, node equipment and resource reselection device | |
WO2014075555A1 (en) | Method and device for scheduling slot resources | |
GB2448003A (en) | Controlling information requests in a communications network to prevent congestion | |
JP2013532930A (en) | Method and program for cell burring in a cellular network | |
WO2018133606A1 (en) | Access control method, access network element, user equipment, and computer storage medium | |
US10536321B2 (en) | Message attack defense method and apparatus | |
CN107911849B (en) | Access preemption method in admission control judgment of LTE (Long term evolution) system | |
Nielsen et al. | A tractable model of the LTE access reservation procedure for machine-type communications | |
EP4145885A1 (en) | Information processing method and apparatus, device and readable storage medium | |
US7613205B1 (en) | Token-assignment networks over ethernet and methods therefor | |
CN109699089A (en) | A kind of channel access method and device | |
WO2014059820A1 (en) | Access control method and device for machine type terminal | |
CN107018051B (en) | Network access method based on queuing | |
CN102006282A (en) | Centralized control method for database access in client/server mode | |
WO2014032577A1 (en) | Random access response method and apparatus | |
CN105848149B (en) | Security authentication method for wireless local area network | |
CN103974443B (en) | Distributed channel connection control method and equipment | |
CN113038401A (en) | Differentiated resource scheduling method and device, computing equipment and computer storage medium | |
Benveniste | 'Tiered contention multiple access'(TCMA), a QoS-based distributed MAC protocol | |
CN107547561B (en) | Method and device for carrying out DDOS attack protection processing | |
CN106412630A (en) | Video list switch control method and apparatus | |
Bello et al. | Frame based back-off for Q-learning RACH access in LTE networks | |
KR100526184B1 (en) | Method of multimedia data transmssion in wireless network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |